IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.
ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)
| IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: Gold Lost GPS System. A hybrid architecture for real-time gold asset monitoring, traceability, and recovery.
Author Name(s): MUKUL JAIN, ROHIT SINGH, AKASH KUMAR, MEENA CHAUDHARY, GUNJAN CHANDWANI
Published Paper ID: - IJCRT25A1121
Register Paper ID - 297791
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT25A1121 and DOI :
Author Country : Indian Author, India, 131101 , sonipat, 131101 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT25A1121 Published Paper PDF: download.php?file=IJCRT25A1121 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT25A1121.pdf
Title: GOLD LOST GPS SYSTEM. A HYBRID ARCHITECTURE FOR REAL-TIME GOLD ASSET MONITORING, TRACEABILITY, AND RECOVERY.
DOI (Digital Object Identifier) :
Pubished in Volume: 13 | Issue: 11 | Year: November 2025
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 13
Issue: 11
Pages: i570-i576
Year: November 2025
Downloads: 5
E-ISSN Number: 2320-2882
Gold has high value and portability. This makes it vulnerable to theft, loss, and tampering in personal, industrial, and financial settings. Traditional security measures include vaults, guards, and CCTV. These provide deterrence and evidence after incidents. But they fail to offer real-time visibility of asset locations. This paper proposes the Gold Lost GPS System. It is a hybrid architecture that combines GPS and GNSS tracking with IoT smart sensors. It also uses secure communication protocols and cloud-based analytics. All this enables continuous monitoring, anomaly detection, and rapid recovery workflows. We present an expanded system design here. We include methodology for evaluation, implementation details, and application scenarios. These cover supply chains, banking, mining, and personal ownership. A comparative analysis looks at RFID, CCTV, and blockchain-only solutions. It shows the proposed systems strengths in global coverage and event-driven intelligence. There are trade-offs in power management and indoor occlusions though. We address challenges like jamming, battery life, cost, and reliability. We also cover ethical and legal considerations such as privacy, data governance, and consent. Future enhancements integrate AI for threat prediction, biometric access control, blockchain provenance, and 5G or satellite IoT for global interoperability. Case studies and a hypothetical recovery scenario illustrate practical outcomes. A user-centric interface design underscores usability and accessibility. We conclude with a vision for democratizing gold security. This happens via unobtrusive wearables and standardized platforms. The aim is to strengthen trust, reduce losses, and improve stakeholder confidence.
Licence: creative commons attribution 4.0
The Gold Lost GPS System integrates hardware trackers, sensors, communication modules, cloud infrastructure, and user-facing applications. It forms a modular stack that supports secure, real-time asset visibility.
Paper Title: Area Harvested and Production of Fruit Crops In Northeast India: An Analysis
Author Name(s): Dr. Samad Ali
Published Paper ID: - IJCRT25A1120
Register Paper ID - 297767
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT25A1120 and DOI :
Author Country : Indian Author, India, 783370 , Kokrajhar, 783370 , | Research Area: Social Science All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT25A1120 Published Paper PDF: download.php?file=IJCRT25A1120 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT25A1120.pdf
Title: AREA HARVESTED AND PRODUCTION OF FRUIT CROPS IN NORTHEAST INDIA: AN ANALYSIS
DOI (Digital Object Identifier) :
Pubished in Volume: 13 | Issue: 11 | Year: November 2025
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Social Science All
Author type: Indian Author
Pubished in Volume: 13
Issue: 11
Pages: i562-i569
Year: November 2025
Downloads: 7
E-ISSN Number: 2320-2882
The northeastern states like Assam, Arunachal Pradesh, Manipur, Mizoram, Meghalaya, Nagaland, Tripura and Sikkim are suitable for the production of different horticultural crops such as different varieties of fruits. The region has sub-tropical climate with hot, humid summers, severe monsoons and mild winters. The hilly areas of northeastern states are suitable for the production of different types of fruits such as apple, kiwi, litchi, citrus, orange, banana, pineapple, plum, guava, peach, jack fruit, mango, grapes, papaya, lemon, passion fruit, dragon fruit, pear, walnut, strawberry etc. This paper is an effort to study the growth trends in the area harvested and production of fruit crops in the northeastern region of India from the year of 2004-05 to 2023-24. As per the findings of the study, the fitted trend line of the variable of the area harvested under the fruit crops and total production of fruit crops in the northeast region of India has recorded increasing trends over the period under the study. The estimated compound annual growth rates of area harvested under fruit crops cultivation and the total production of fruit crops in the northeast region are found significant over the study period.
Licence: creative commons attribution 4.0
Fruit Crops, Area Harvested, Production, Northeastern Region.
Paper Title: Psychological, Biological, and Hybrid Accounts of Personal Identity: A Comparative Analysis
Author Name(s): Subhankar Purkait
Published Paper ID: - IJCRT25A1119
Register Paper ID - 297796
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT25A1119 and DOI :
Author Country : Indian Author, India, 700032 , Kolkata , 700032 , | Research Area: Arts1 All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT25A1119 Published Paper PDF: download.php?file=IJCRT25A1119 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT25A1119.pdf
Title: PSYCHOLOGICAL, BIOLOGICAL, AND HYBRID ACCOUNTS OF PERSONAL IDENTITY: A COMPARATIVE ANALYSIS
DOI (Digital Object Identifier) :
Pubished in Volume: 13 | Issue: 11 | Year: November 2025
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Arts1 All
Author type: Indian Author
Pubished in Volume: 13
Issue: 11
Pages: i559-i561
Year: November 2025
Downloads: 8
E-ISSN Number: 2320-2882
This paper provides an academic overview of the debate on personal identity, focusing on three main approaches: the Psychological, Biological, and Hybrid theories. It examines the Psychological Approach, which grounds identity in psychological continuity such as memory and consciousness, illustrated by the Transplant Intuition. The Biological Approach argues for identity based on the persistence of the human organism, challenging psychological criteria and rejecting the Transplant Intuition. The paper discusses key objections to the Biological Approach, including its counterintuitive implications and methodological concerns. The Hybrid Approach is presented as a middle ground, integrating both biological and psychological elements, though it faces unresolved questions about their interaction. The paper also addresses the "Too Many Minds" objection, which challenges non-biological accounts by highlighting problems with overlapping identities. The conclusion emphasizes the complexity of personal identity, noting that purely biological continuity fails to fully capture what matters for survival, and calls for a nuanced understanding of the relationship between persons and human animals.
Licence: creative commons attribution 4.0
Personal Identity, Psychological Approach Psychological Continuity, Consciousness, Biological Continuity, Identity Persistence
Paper Title: FINGERPRINT-BASED SECURE E-VOTING SYSTEM USING BIOMETRICS
Author Name(s): Shilpa N S, Dakshatha N, Deekshitha H S, Manasa N
Published Paper ID: - IJCRT25A1118
Register Paper ID - 296996
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT25A1118 and DOI :
Author Country : Indian Author, India, 560083 , Bengaluru, 560083 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT25A1118 Published Paper PDF: download.php?file=IJCRT25A1118 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT25A1118.pdf
Title: FINGERPRINT-BASED SECURE E-VOTING SYSTEM USING BIOMETRICS
DOI (Digital Object Identifier) :
Pubished in Volume: 13 | Issue: 11 | Year: November 2025
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 13
Issue: 11
Pages: i551-i558
Year: November 2025
Downloads: 7
E-ISSN Number: 2320-2882
Electronic voting (e-voting) systems are designed to make elections faster, more efficient, and more transparent compared to traditional paper-based voting. However, many existing systems still face problems like voter impersonation, multiple voting, and tampering with voting data.To solve these issues, this research proposes a secure e-voting system that uses fingerprint-based biometric authentication. In this system, each voter's fingerprint is captured and converted into a unique encrypted template, preventing duplication or forgery.When a voter comes to vote, their fingerprint is matched with the stored record to ensure that only the right person can vote--and only once. To protect the security of the votes, encryption methods such as AES or RSA are used during both data transmission and storage.The system also generates a unique transaction ID as a receipt for each voter. This allows the voter to confirm that their vote was recorded, without revealing who they voted for.Overall, the proposed system increases transparency, blocks fraudulent activities, and provides strong end-to-end security throughout the election process. Experimental results show that combining biometric authentication with encryption greatly improves the accuracy of voter verification and the overall reliability of the system compared to traditional e-voting methods.
Licence: creative commons attribution 4.0
Biometric authentication, Cryptography, Electronic voting (E-voting), Fingerprint recognition, Security, Vote verification, Data encryption.
Paper Title: Cold Water Immersion Combined with Fasting Protocols for Stress Reactivity and Sleep: A Systematic Review and Meta-Analysis
Author Name(s): Dr.C.M. Dhivya, Dr. Shyamala Devi P, Dr. Rahul R.K
Published Paper ID: - IJCRT25A1117
Register Paper ID - 297828
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT25A1117 and DOI :
Author Country : Indian Author, India, 629161 , Kanniyakumari, 629161 , | Research Area: Humanities All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT25A1117 Published Paper PDF: download.php?file=IJCRT25A1117 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT25A1117.pdf
Title: COLD WATER IMMERSION COMBINED WITH FASTING PROTOCOLS FOR STRESS REACTIVITY AND SLEEP: A SYSTEMATIC REVIEW AND META-ANALYSIS
DOI (Digital Object Identifier) :
Pubished in Volume: 13 | Issue: 11 | Year: November 2025
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Humanities All
Author type: Indian Author
Pubished in Volume: 13
Issue: 11
Pages: i538-i550
Year: November 2025
Downloads: 8
E-ISSN Number: 2320-2882
Abstract Background: Cold water immersion (CWI) and intermittent fasting (IF) are increasingly adopted as hormetic strategies to improve stress resilience, autonomic regulation, and sleep quality. Methods: A systematic review and meta-analysis of controlled trials in healthy adults (>=18 years) synthesized data from 11 CWI and 23 IF studies assessing stress markers, heart rate variability (HRV), and sleep outcomes. Standardized mean differences with 95% confidence intervals were calculated. Results: CWI produced a large time-dependent reduction in stress at 12 hours post-exposure, alongside significant improvements in vagally mediated HRV indices and slow-wave sleep with fewer nocturnal arousals. IF, particularly 16:8 time-restricted eating, improved HRV over 8-12 weeks and induced adaptive endocrine changes, including increased cortisol and reduced triiodothyronine. Direct evidence for combined CWI+IF protocols was limited to a single pilot study. Conclusions: CWI and IF independently benefit stress reactivity, autonomic nervous system function, and sleep via hormetic mechanisms, with preliminary theoretical support for synergistic effects when combined. High-quality trials on combined protocols, diverse populations, and long-term safety are warranted.
Licence: creative commons attribution 4.0
Cold water immersion, intermittent fasting, hormesis, stress reactivity, heart rate variability, sleep architecture, autonomic nervous system, parasympathetic activity
Paper Title: Fraud Detection in Online Transactions Using Artificial Intelligence
Author Name(s): Anshul, Arsheya Anitk Mishra, Omansh, Dr. Meena Chaudhary, Dr. Narender Gautam
Published Paper ID: - IJCRT25A1115
Register Paper ID - 297788
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT25A1115 and DOI :
Author Country : Indian Author, India, 121010 , Faridabad, 121010 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT25A1115 Published Paper PDF: download.php?file=IJCRT25A1115 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT25A1115.pdf
Title: FRAUD DETECTION IN ONLINE TRANSACTIONS USING ARTIFICIAL INTELLIGENCE
DOI (Digital Object Identifier) :
Pubished in Volume: 13 | Issue: 11 | Year: November 2025
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 13
Issue: 11
Pages: i526-i533
Year: November 2025
Downloads: 8
E-ISSN Number: 2320-2882
With the rapid expansion of digital payments and e-commerce platforms, online financial transactions have become deeply integrated into everyday life. This growth, however, has been accompanied by a significant rise in fraudulent activities, including identity theft, card-not-present transactions, account takeovers, and phishing-driven attacks. Conventional rule-based fraud detection systems struggle to adapt to evolving fraud patterns and often produce high false-positive rates. To address these challenges, this research proposes TransGuard-AI, an Artificial Intelligence (AI)-driven fraud detection framework that employs supervised machine learning techniques to identify anomalous transaction behavior. The proposed system integrates Logistic Regression, Decision Tree, and Random Forest models, enabling comparative evaluation and ensemble-based insights. A structured feature engineering pipeline is designed to extract transactional attributes such as amount frequency, spending velocity, merchant category patterns, and geolocation deviation scores. Experiments were conducted using a benchmarked credit card fraud detection dataset containing anonymized real-world transaction records with highly imbalanced class proportions. To mitigate class imbalance, Random Under-Sampling (RUS) and Synthetic Minority Oversampling Technique (SMOTE) were applied. Model performance was evaluated using accuracy, precision, recall, F1-score, ROC-AUC, and confusion matrix analysis. Results show that Random Forest outperformed the baseline models, achieving high detection accuracy and improved recall for the minority (fraud) class, while effectively reducing false alarms. Logistic Regression demonstrated faster inference suitability for real-time processing, whereas Decision Tree offered interpretability and rule extraction capabilities. Overall, TransGuard-AI presents a robust and scalable approach for real-time fraud detection in financial systems. The integration of machine learning algorithms, advanced preprocessing, and anomaly-centric feature engineering significantly enhances detection capability, making the system suitable for deployment in modern transaction monitoring infrastructures.
Licence: creative commons attribution 4.0
Fraud Detection Machine Learning TransGuard-AI Logistic Regression Decision Tree Random Forest Feature Engineering Class Imbalance SMOTE Random Under-Sampling (RUS) Anomaly Detection Transaction Monitoring Credit Card Fraud ROC-AUC Real-Time Detection
Paper Title: Supportive Learning Environment and Enrichment Programmes in Primary Education
Author Name(s): MUKTAR HOSSAIN
Published Paper ID: - IJCRT25A1114
Register Paper ID - 297815
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT25A1114 and DOI :
Author Country : Indian Author, India, 732128 , MALDA, 732128 , | Research Area: Social Science All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT25A1114 Published Paper PDF: download.php?file=IJCRT25A1114 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT25A1114.pdf
Title: SUPPORTIVE LEARNING ENVIRONMENT AND ENRICHMENT PROGRAMMES IN PRIMARY EDUCATION
DOI (Digital Object Identifier) :
Pubished in Volume: 13 | Issue: 11 | Year: November 2025
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Social Science All
Author type: Indian Author
Pubished in Volume: 13
Issue: 11
Pages: i523-i525
Year: November 2025
Downloads: 10
E-ISSN Number: 2320-2882
A supportive learning environment and enrichment programmes are essential for holistic development of children in primary education (ages 5-11). This paper examines key components of emotional safety, classroom climate, teacher support, peer collaboration, learning corners, enrichment interventions, observation-based assessment, feedback cycles, creativity promotion, learning ownership, curiosity-based pedagogy, and community support. Research indicates that enriched environments increase engagement, reduce learning fear, enhance literacy and numeracy stamina, nurture divergent thinking, and improve social belonging. Recommendations include teacher scripting literacy bridges, scaffold feedback loops, task-mode choices, sampling portfolios, low-barrier instruction, and structured enrichment governance.
Licence: creative commons attribution 4.0
Learning Environment, Enrichment Programmes, Classroom Climate, Primary Holistic Growth
Paper Title: Some fixed Point Theorems in Ordered b-Metric Spaces with Auxiliary Functions
Author Name(s): Rajesh Kumar Nagwanshee, Dr.Alkesh Kumar Dhakde, Dr. M. S. Chauhan
Published Paper ID: - IJCRT25A1113
Register Paper ID - 297780
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT25A1113 and DOI :
Author Country : Indian Author, India, 460443 , Ghoradongri, 460443 , | Research Area: Mathematics All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT25A1113 Published Paper PDF: download.php?file=IJCRT25A1113 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT25A1113.pdf
Title: SOME FIXED POINT THEOREMS IN ORDERED B-METRIC SPACES WITH AUXILIARY FUNCTIONS
DOI (Digital Object Identifier) :
Pubished in Volume: 13 | Issue: 11 | Year: November 2025
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Mathematics All
Author type: Indian Author
Pubished in Volume: 13
Issue: 11
Pages: i514-i521
Year: November 2025
Downloads: 9
E-ISSN Number: 2320-2882
The main aim of these paper is to present some fixed point theorems for self mappings satisfying certain contraction which is involving an auxiliary function. Also ,the results is obtained for the existence of a common fixed point and coincidence point for generalize and ordered complete b- metric space ,Our results generalizes and extends some well-known results existing in the literature.
Licence: creative commons attribution 4.0
Keywords : Ordered b- metric space, Rational type generalized (?,?) contraction mapping ,fixed point ,complete metric space, weakly compatible mapping.
Paper Title: Inclusive Classroom Strategies for Primary Learners with Diverse Needs
Author Name(s): ROBIUL ISLAM
Published Paper ID: - IJCRT25A1112
Register Paper ID - 297814
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT25A1112 and DOI :
Author Country : Indian Author, India, 732128 , MALDA, 732128 , | Research Area: Arts1 All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT25A1112 Published Paper PDF: download.php?file=IJCRT25A1112 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT25A1112.pdf
Title: INCLUSIVE CLASSROOM STRATEGIES FOR PRIMARY LEARNERS WITH DIVERSE NEEDS
DOI (Digital Object Identifier) :
Pubished in Volume: 13 | Issue: 11 | Year: November 2025
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Arts1 All
Author type: Indian Author
Pubished in Volume: 13
Issue: 11
Pages: i510-i513
Year: November 2025
Downloads: 11
E-ISSN Number: 2320-2882
Inclusive education in the primary phase ensures meaningful and barrier-free learning for children of diverse developmental, sensory, cognitive, linguistic, socio-economic, and neuro-developmental backgrounds. This paper examines evidence-based classroom strategies that promote differentiated learning, peer-assisted collaboration, Universal Design for Learning (UDL) integration, assistive learning scaffolds, behavior-positive pedagogies, multimodal communication, teacher-mediated emotional support, inclusive assessment, and community participation. Guided by sociocultural, constructivist, and learner variability frameworks, research suggests that inclusion enhances participation, motivation, literacy progression, early numeracy understanding, emotional safety, error tolerance, and learning ownership. The paper concludes by recommending teacher training, structured sampling assessments, low-barrier learning design, and digital inclusion equity to operationalize respectful, child-centered classrooms without compromising academic rigor.
Licence: creative commons attribution 4.0
: Inclusive Pedagogy, Differentiation, UDL, Special Needs Support, Primary Participation, Assistive Tools
Paper Title: Blockchain and AI-Based Hybrid Framework for Secure, Transparent, and Scalable E-Voting Systems
Author Name(s): Harshit Panwar, Bhavesh Narang, Anurag Chaudary, Meena Chaudhary, Gunjan Chandwani
Published Paper ID: - IJCRT25A1111
Register Paper ID - 297769
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT25A1111 and DOI :
Author Country : Indian Author, India, 121004 , Faridabad, 121004 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT25A1111 Published Paper PDF: download.php?file=IJCRT25A1111 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT25A1111.pdf
Title: BLOCKCHAIN AND AI-BASED HYBRID FRAMEWORK FOR SECURE, TRANSPARENT, AND SCALABLE E-VOTING SYSTEMS
DOI (Digital Object Identifier) :
Pubished in Volume: 13 | Issue: 11 | Year: November 2025
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 13
Issue: 11
Pages: i504-i509
Year: November 2025
Downloads: 7
E-ISSN Number: 2320-2882
The modernization of democratic elections through digital technologies offers vast opportunities but also introduces complex challenges. Traditional electronic voting (e-voting) mechanisms often suffer from vulnerabilities such as centralized data control, opacity in verification processes, and high susceptibility to manipulation or cyberattacks. To address these limitations, this study presents a hybrid framework integrating blockchain and artificial intelligence (AI) to achieve enhanced security, transparency, and scalability in e-voting. The blockchain layer ensures immutability and distributed trust through consensus-based verification, while the AI layer provides adaptive intelligence for real-time fraud detection, biometric voter authentication, and anomaly analysis. The designed framework integrates several essential modules for voter registration, biometric verification, vote casting, AI-driven fraud monitoring, blockchain anchoring, and audit visualization. Experimental simulations with over one million synthetic votes demonstrate fraud detection accuracy of 98.5%, biometric verification accuracy of 99.1%, and an average vote confirmation latency of 1.7 seconds, confirming the framework's feasibility for secure, large-scale elections. The results highlight that the synergy between blockchain's decentralization and AI's adaptivity can form the foundation for a next-generation digital democracy.
Licence: creative commons attribution 4.0
E-voting; Blockchain; Artificial Intelligence; Cybersecurity; Smart Contracts; Fraud Detection; Biometric Authentication; Anomaly Detection.

