IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.
ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)
| IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: RejecTech: Enhanced Call Filtering and Rejection Mechanism via Android Application
Author Name(s): Vaibhavi Satpute, Pallavi Dhole, Srushti Bartere, Sakshi Kaple, Taiba Khan, Vedanti Sambhe
Published Paper ID: - IJCRT2502502
Register Paper ID - 276745
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2502502 and DOI :
Author Country : Indian Author, India, 444701 , Amravati, 444701 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2502502 Published Paper PDF: download.php?file=IJCRT2502502 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2502502.pdf
Title: REJECTECH: ENHANCED CALL FILTERING AND REJECTION MECHANISM VIA ANDROID APPLICATION
DOI (Digital Object Identifier) :
Pubished in Volume: 13 | Issue: 2 | Year: February 2025
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 13
Issue: 2
Pages: e254-e258
Year: February 2025
Downloads: 128
E-ISSN Number: 2320-2882
RejecTech is an innovative Android-based application developed using Java, XML, and Firebase, designed to provide advanced call filtering and rejection mechanisms for enhanced user convenience and security. This application tracks and monitors all incoming calls, identifying spam or repetitive calls with high accuracy. Calls flagged as spam or persistently recurring can be automatically blocked, ensuring a distraction-free user experience. The app empowers users to set a "lag to red" threshold, enabling dynamic control over the spam detection sensitivity. Users can also monitor their call logs in real time and manually unblock specific numbers if needed, ensuring flexibility in managing blocked calls. With Firebase integration, the app ensures seamless data management and efficient processing of call records. RejecTech's robust call-filtering capabilities make it a reliable tool for reducing spam and repetitive call disruptions, enhancing both productivity and peace of mind.
Licence: creative commons attribution 4.0
Firebase, Android App, Call Block, Call Filter
Paper Title: Artificial Intelligence: A Boon Or A Curse
Author Name(s): Dr. Puja Kumari Gupta
Published Paper ID: - IJCRT2502501
Register Paper ID - 277396
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2502501 and DOI :
Author Country : Indian Author, India, 846004 , Darbhanga , 846004 , | Research Area: Medical Science All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2502501 Published Paper PDF: download.php?file=IJCRT2502501 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2502501.pdf
Title: ARTIFICIAL INTELLIGENCE: A BOON OR A CURSE
DOI (Digital Object Identifier) :
Pubished in Volume: 13 | Issue: 2 | Year: February 2025
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Medical Science All
Author type: Indian Author
Pubished in Volume: 13
Issue: 2
Pages: e249-e253
Year: February 2025
Downloads: 175
E-ISSN Number: 2320-2882
We are a privileged generation living in this era full of technological advancements. Gone are the days when almost every work was done manually and now we are living in a time where a lot of work is done by machines, software, and various automated processes. In this regard, Artificial Intelligence (AI) has a special place in all the advancements of today. Artificial Intelligence or AI is nothing but the science of computers and machines that develop intelligence like humans. In this technology, machines are able to perform some simple to complex tasks that humans need to perform on a regular basis. Since AI systems are used day in and day out in our daily lives, it would not be wrong to say that our lives have also been upgraded with the use of this technology. AI systems are efficient enough to reduce human efforts in various fields. To perform various activities in the industry, many of them are using Artificial Intelligence to create machine slaves that perform various activities on a regular basis. Artificial Intelligence applications help in completing the work faster and with accurate results. Error-free and efficient world is the main objective behind Artificial Intelligence. In recent years, many sectors have started using AI technology to reduce human efforts and get efficient and faster results. Obviously, the positive potential of Artificial Intelligence is indeed huge and still untapped. One of the major disadvantages of Artificial Intelligence is the potential theft of personal data, especially in healthcare, education and other sectors, as well as the misuse of citizen databases by private companies and security agencies. Artificial Intelligence systems controlling so many aspects of society raise ethical and privacy concerns. Preventing unauthorized access to sensitive information of both citizens and organizations is important. All digital information is vulnerable to hacking and misuse. Hence, there is a dire need for Artificial Intelligence enabled systems to handle data securely with relevant privacy safeguards. AI involves a lot of expense as it requires the latest hardware and software to remain relevant. As of now, AI capabilities are already limited by the data given to it and it lacks creativity. Unlike humans, AI cannot think of anything new or out of the box. Another disadvantage of AI is that it can make humans lazy. If repetitive tasks, calculations and data analysis are permanently handed over to robots, humans will potentially use their brains lesser and their reactions to any task or event will be sloppy.
Licence: creative commons attribution 4.0
Artificial Intelligence, Autonomous system, Human brain, Unauthorised access, Humanity, etc.
Paper Title: Baccho ke mansik vikas mein mata-pita aur adhyatm ki bhoomika
Author Name(s): Dr. Ajay Kumar
Published Paper ID: - IJCRT2502500
Register Paper ID - 277538
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2502500 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2502500 Published Paper PDF: download.php?file=IJCRT2502500 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2502500.pdf
Title: BACCHO KE MANSIK VIKAS MEIN MATA-PITA AUR ADHYATM KI BHOOMIKA
DOI (Digital Object Identifier) :
Pubished in Volume: 13 | Issue: 2 | Year: February 2025
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 13
Issue: 2
Pages: e241-e248
Year: February 2025
Downloads: 117
E-ISSN Number: 2320-2882
Baccho ke mansik vikas mein mata-pita aur adhyatm ki bhoomika
Licence: creative commons attribution 4.0
Baccho ke mansik vikas mein mata-pita aur adhyatm ki bhoomika
Paper Title: Baccho ke mansik swasth pr internet ki bhoomika
Author Name(s): Dr. Ajay Kumar
Published Paper ID: - IJCRT2502499
Register Paper ID - 277537
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2502499 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2502499 Published Paper PDF: download.php?file=IJCRT2502499 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2502499.pdf
Title: BACCHO KE MANSIK SWASTH PR INTERNET KI BHOOMIKA
DOI (Digital Object Identifier) :
Pubished in Volume: 13 | Issue: 2 | Year: February 2025
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 13
Issue: 2
Pages: e235-e240
Year: February 2025
Downloads: 116
E-ISSN Number: 2320-2882
Baccho ke mansik swasth pr internet ki bhoomika
Licence: creative commons attribution 4.0
Baccho ke mansik swasth pr internet ki bhoomika
Paper Title: Enhancing Cloud Security and Data Privacy with Blockchain and Quantum Cryptography
Author Name(s): Neethu V A, Dr. Mohammad Akram Khan
Published Paper ID: - IJCRT2502498
Register Paper ID - 277529
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2502498 and DOI : http://doi.one/10.1729/Journal.43690
Author Country : Indian Author, India, 695523 , Thiruvananthapuram, 695523 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2502498 Published Paper PDF: download.php?file=IJCRT2502498 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2502498.pdf
Title: ENHANCING CLOUD SECURITY AND DATA PRIVACY WITH BLOCKCHAIN AND QUANTUM CRYPTOGRAPHY
DOI (Digital Object Identifier) : http://doi.one/10.1729/Journal.43690
Pubished in Volume: 13 | Issue: 2 | Year: February 2025
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 13
Issue: 2
Pages: e230-e234
Year: February 2025
Downloads: 139
E-ISSN Number: 2320-2882
The integration of blockchain and quantum cryptography into cloud security is poised to revolutionize the way sensitive data is protected in the digital age. Cloud computing, while offering scalable and cost-effective solutions, faces increasing threats from cyberattacks that compromise data integrity and privacy. Blockchain, with its decentralized and immutable ledger system, offers a robust mechanism for securing data by ensuring transparency, traceability, and resistance to tampering. It allows for secure and verifiable transactions, which is crucial for maintaining the confidentiality of cloud-based data. Quantum cryptography, on the other hand, leverages the principles of quantum mechanics to provide ultra-secure encryption methods, making it nearly impossible for attackers to decrypt data without detection. Together, blockchain and quantum cryptography create a dual-layered defense system that enhances both data privacy and security in cloud environments. This combination addresses the growing need for next-generation security protocols to protect against sophisticated cyber threats and quantum computing's potential to break existing encryption methods. This paper explores the synergy between these two technologies, highlighting their potential to safeguard sensitive information, foster trust in cloud services, and pave the way for a secure, data-centric future in the cloud computing era.
Licence: creative commons attribution 4.0
Blockchain, Quantum Cryptography, Cloud Security, Data Privacy, Post-Quantum Cryptography, Zero-Knowledge Proofs (ZKP), Multi-Party Computation (MPC), Quantum Key Distribution (QKD)
Paper Title: A Critical Analysis of Nathaniel Hawthorne's The Scarlet Letter
Author Name(s): BADDA GOWTHAMI MISHRA, GRANDHI LAKSHMI SARASWATHI, AYALURI NAGA SURYA KUMARI
Published Paper ID: - IJCRT2502497
Register Paper ID - 277524
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2502497 and DOI :
Author Country : Indian Author, India, 534005 , Eluru , 534005 , | Research Area: Arts All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2502497 Published Paper PDF: download.php?file=IJCRT2502497 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2502497.pdf
Title: A CRITICAL ANALYSIS OF NATHANIEL HAWTHORNE'S THE SCARLET LETTER
DOI (Digital Object Identifier) :
Pubished in Volume: 13 | Issue: 2 | Year: February 2025
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Arts All
Author type: Indian Author
Pubished in Volume: 13
Issue: 2
Pages: e228-e229
Year: February 2025
Downloads: 223
E-ISSN Number: 2320-2882
A Critical Analysis of Nathaniel Hawthorne's The Scarlet Letter Abstract: Nathaniel Hawthorne's The Scarlet Letter (1850) is a seminal work in American literature, offering profound insights into themes of sin, guilt, and redemption. This paper critically examines the novel's exploration of Puritan society, its psychological depth, and its symbolic complexity. By analyzing key characters, motifs, and Hawthorne's narrative techniques, this study highlights how The Scarlet Letter remains a timeless reflection on human morality and societal hypocrisy. Introduction: Hawthorne's The Scarlet Letter is set in 17th-century Puritan Massachusetts and revolves around Hester Prynne, a woman condemned to wear a scarlet "A" as punishment for adultery. The novel delves into themes of sin, punishment, and identity while critiquing the rigid moral codes of Puritan society. This paper aims to explore the novel's psychological depth, its symbolic elements, and its critique of oppressive social structures. Theme of Sin and Redemption: The novel presents a nuanced view of sin, showing how individuals respond differently to guilt and shame. Hester Prynne transforms her punishment into a symbol of resilience and grace, while Arthur Dimmesdale, her secret lover, suffers privately under the weight of his concealed sin. Roger Chillingworth, Hester's estranged husband, represents vengeance and the destructive power of unbridled obsession. Through these characters, Hawthorne illustrates how sin can lead to both destruction and redemption. Symbolism in The Scarlet Letter Hawthorne employs rich symbolism to enhance the novel's thematic depth. The scarlet letter itself evolves from a mark of shame to a symbol of strength and defiance. Pearl, Hester's daughter, embodies the living consequence of sin but also serves as a force of truth and transformation. The forest represents freedom and natural law, standing in contrast to the rigid structures of Puritan society. These symbols reinforce Hawthorne's critique of societal norms and the complexities of human nature. Puritan Society and Hypocrisy: Hawthorne's portrayal of the Puritan community reveals its inherent contradictions. While society claims to uphold morality and justice, it often fosters hypocrisy and cruelty. The public shaming of Hester contrasts with the hidden sins of figures like Dimmesdale, highlighting the discrepancy between appearance and reality. Hawthorne suggests that true morality is not dictated by rigid laws but by individual conscience and empathy. Narrative Style and Psychological Depth: Hawthorne's use of a third-person omniscient narrator allows for deep psychological exploration of his characters. His introspective and descriptive style immerses readers in the moral dilemmas faced by Hester, Dimmesdale, and Chillingworth. Through internal monologues and symbolic imagery, the novel captures the torment of hidden guilt and the complexities of human emotions. Conclusion: The Scarlet Letter remains a powerful exploration of sin, identity, and societal oppression. Hawthorne's masterful use of symbolism, psychological depth, and critique of Puritan values make the novel a timeless piece of literature. By examining how individuals confront their past and seek redemption, The Scarlet Letter continues to resonate with contemporary readers and scholars alike.
Licence: creative commons attribution 4.0
Keywords: The Scarlet Letter, Nathaniel Hawthorne, sin, redemption, Puritan society, symbolism, morality, psychological depth
Paper Title: ‘WORKING CAPITAL MANAGEMENT’ – An Analysis And Its Impact On Profitability With Reference To Fertilizer Industry In India
Author Name(s): Hingu Kajal Gunvantray, Dr. Sonal Nena
Published Paper ID: - IJCRT2502496
Register Paper ID - 277526
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2502496 and DOI :
Author Country : Indian Author, India, 365220 , Damnagar, 365220 , | Research Area: Commerce All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2502496 Published Paper PDF: download.php?file=IJCRT2502496 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2502496.pdf
Title: ‘WORKING CAPITAL MANAGEMENT’ – AN ANALYSIS AND ITS IMPACT ON PROFITABILITY WITH REFERENCE TO FERTILIZER INDUSTRY IN INDIA
DOI (Digital Object Identifier) :
Pubished in Volume: 13 | Issue: 2 | Year: February 2025
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Commerce All
Author type: Indian Author
Pubished in Volume: 13
Issue: 2
Pages: e214-e227
Year: February 2025
Downloads: 118
E-ISSN Number: 2320-2882
The Fertilizer Industry is one of the most and core industry in India. In India there are many large and developing industries (Crude oil, Coal, Refinery, Cement, Textile, Steel, FMCG, Agriculture) and has significant contribution to GDP of India. The main Objective of the study is to analyse the Working Capital Management Ratios and Net Profit Margin of company during the study period is 2019-20 to 2023-24. Data Collection is based on secondary data collection method. Sample Selection is judgemental non parametric sampling method is used. For Data Analysis ANOVA test is applied for Analysis of Working Capital Ratios and NPM, Correlation is used to know the relationship between Working Capital and Profitability and Regression is used know the how many impact is working of Working Capital on Profitability for selected companies. Findings is that are is no significant impact of Working Capital on Profitability.
Licence: creative commons attribution 4.0
CR- Current Ratio, QR- Quick Ratio, ITR- Inventory Turnover Ratio, CashR- Cash Ratio, NPM- Net Profit Margin, WCM- Working Capital Management
Paper Title: Survey On Sponge Attack Against Multi- Exit Networks With Data Poisoning
Author Name(s): Aishwarya B Bundele, Prof A V Deorankar
Published Paper ID: - IJCRT2502495
Register Paper ID - 277434
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2502495 and DOI :
Author Country : Indian Author, India, 444606 , Amravati, 444606 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2502495 Published Paper PDF: download.php?file=IJCRT2502495 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2502495.pdf
Title: SURVEY ON SPONGE ATTACK AGAINST MULTI- EXIT NETWORKS WITH DATA POISONING
DOI (Digital Object Identifier) :
Pubished in Volume: 13 | Issue: 2 | Year: February 2025
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 13
Issue: 2
Pages: e206-e213
Year: February 2025
Downloads: 141
E-ISSN Number: 2320-2882
This survey explores the evolving landscape of adversarial attacks on neural networks, with a focus on sponge attacks, which exploit the efficiency mechanisms of multi-exit networks (MENs) to maximize energy consumption and inference latency without degrading classification accuracy. Sponge attacks pose significant challenges to real-time applications like autonomous systems and healthcare diagnostics by negating the computational efficiency of MENs. Additionally, the survey examines the broader context of adversarial and backdoor attacks, such as data poisoning, which target model integrity during training. Recent advancements in defensive mechanisms, including certified defenses against poisoned data, defensive data augmentation, and anomaly detection, are analyzed for their effectiveness in addressing these threats. The role of real-time attack response systems (RTARS) and multi-exit architectures in mitigating latency-based attacks is also explored. Key findings highlight that while anomaly detection and pre-filtering techniques provide foundational security, gaps remain in handling hybrid and evolving adversarial threats like sponge poisoning. This survey concludes by identifying the necessity of integrating hybrid detection mechanisms--combining anomaly detection, real-time monitoring, and data augmentation--to enhance the robustness of neural networks against sponge attacks and other adversarial challenges, ensuring secure and efficient deployment in critical applications.
Licence: creative commons attribution 4.0
Anomaly Detection, Defensive Data Augmentation, RTARS, Neural Networks, Machine Learning.
Paper Title: DEMAND FORECASTING FOR E-COMMERCE PLATFORMS IN INDIA USING TIME SERIES MODELS
Author Name(s): Shatabdi Mandal, Dr. Pradip Chourasia
Published Paper ID: - IJCRT2502494
Register Paper ID - 277503
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2502494 and DOI :
Author Country : Indian Author, India, 462024 , bhopal, 462024 , | Research Area: Science All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2502494 Published Paper PDF: download.php?file=IJCRT2502494 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2502494.pdf
Title: DEMAND FORECASTING FOR E-COMMERCE PLATFORMS IN INDIA USING TIME SERIES MODELS
DOI (Digital Object Identifier) :
Pubished in Volume: 13 | Issue: 2 | Year: February 2025
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science All
Author type: Indian Author
Pubished in Volume: 13
Issue: 2
Pages: e201-e205
Year: February 2025
Downloads: 146
E-ISSN Number: 2320-2882
The Indian e-commerce sector has witnessed rapid expansion with the advent of digital marketplaces, leading to challenges in demand forecasting and inventory management. This study aims to predict product demand using time series models such as ARIMA, TBATS, and Autoregressive Neural Networks (AR-NN). Historical sales data from Indian e-commerce platforms is analyzed to identify trends, seasonal variations, and demand fluctuations. The models are evaluated based on Root Mean Square Error (RMSE) to determine their forecasting accuracy. The results indicate that ARIMA performs best for stable seasonal patterns, TBATS for irregular trends, and AR-NN for non-linear demand fluctuations. This research provides valuable insights for Indian e-commerce businesses to optimize inventory management, enhance supply chain efficiency, and improve overall customer satisfaction.
Licence: creative commons attribution 4.0
ARIMA, TBATS, Artificial Neural Network (AR-NN), Time Series Forecasting, E-commerce Demand, Inventory Optimization, Indian Market, Predictive Analytics, Machine Learning in Retail, Supply Chain Forecasting, Seasonal Demand Prediction, Consumer Behavior Analysis, Retail Sales Forecasting, Data-Driven Decision Making, Demand Planning, E-commerce Logistics, AI in Demand Forecasting, Business Intelligence in Retail, Sales Trend Analysis, Deep Learning for Demand Estimation.
Paper Title: Analysis the Determining Factors of Performance in Horizontal Jump
Author Name(s): Dr. Limon Kumar Saha
Published Paper ID: - IJCRT2502493
Register Paper ID - 277419
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2502493 and DOI :
Author Country : Indian Author, India, 700122 , Barrackpore, 700122 , | Research Area: Others area Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2502493 Published Paper PDF: download.php?file=IJCRT2502493 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2502493.pdf
Title: ANALYSIS THE DETERMINING FACTORS OF PERFORMANCE IN HORIZONTAL JUMP
DOI (Digital Object Identifier) :
Pubished in Volume: 13 | Issue: 2 | Year: February 2025
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Others area
Author type: Indian Author
Pubished in Volume: 13
Issue: 2
Pages: e191-e200
Year: February 2025
Downloads: 109
E-ISSN Number: 2320-2882
Focus of the researcher in present investigation was to understand about the contribution of velocity of the run-up and power of leg muscles on performance of horizontal jump as those are most influential factors to achieve the higher performance level in competition. To fulfill the purpose, 30 male district level horizontal jumpers were selected as subjects from different coaching clubs of North 24 Parganas, South 24 Parganas and Kolkata district of West Bengal for the present study. Their age were ranged from 12 to 14 years. Velocity of the run-up, power of leg muscles and performance of horizontal jumpers were measured through time of run up, Hop test and Running Broad Jump respectively. In order to analysis the data and find out the relationship, Pearson product moment correction of coefficient was applied. Further Multiple Correlation was applied to find out the combined effect of velocity of the run-up and power of leg muscle on performance of horizontal jump. Level of significance was set at 0.05 level. The researcher found significant relationship between velocity of run-up & performance in horizontal jump and also between the power of leg muscle & performance in horizontal jump. Researcher also noted that velocity of run-up and power of leg muscle both has a combined effect on performance in horizontal jump.
Licence: creative commons attribution 4.0
Key words: Velocity of run-up, Power and Horizontal jump.

