IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.
ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)
| IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: BUILDING SERVICES WHICH ARE EASILY PROGRAMMABLE, VERSATILE, ELASTIC, INTEGRATED AND FLEXIBLE
Author Name(s): Laxman Jadhav
Published Paper ID: - IJCRT1704500
Register Paper ID - 171356
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT1704500 and DOI :
Author Country : Indian Author, -, - , -, - , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT1704500 Published Paper PDF: download.php?file=IJCRT1704500 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT1704500.pdf
Title: BUILDING SERVICES WHICH ARE EASILY PROGRAMMABLE, VERSATILE, ELASTIC, INTEGRATED AND FLEXIBLE
DOI (Digital Object Identifier) :
Pubished in Volume: 5 | Issue: 4 | Year: December 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 5
Issue: 4
Pages: 3735-3738
Year: December 2017
Downloads: 1448
E-ISSN Number: 2320-2882
Licence: creative commons attribution 4.0
Building Services which are easily programmable, versatile, elastic, integrated and flexible
Paper Title: WOMEN EMPOWERMENT
Author Name(s): Sandeep Pandya
Published Paper ID: - IJCRT1704499
Register Paper ID - 171357
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT1704499 and DOI :
Author Country : Indian Author, -, - , -, - , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT1704499 Published Paper PDF: download.php?file=IJCRT1704499 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT1704499.pdf
Title: WOMEN EMPOWERMENT
DOI (Digital Object Identifier) :
Pubished in Volume: 5 | Issue: 4 | Year: December 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 5
Issue: 4
Pages: 3730-3734
Year: December 2017
Downloads: 1407
E-ISSN Number: 2320-2882
Women empowerment is the process of treating the women with same status with that of men in all the fields of the society. Women Empowerment has become a movement now but in our country it only seems a distant dream. We have restricted our perceptions to only upliftment of women- from the value of an object to the value of a living being. But what is required in the present period is something beyond it. We make a great show off whenever a woman makes high achievements but instead of showing off why not accept it to be natural and normal like we do with men doing the same. During Vedic era women had enjoyed equal status with men. Various modes were also adopted to ensure that this stature continues. Like Stridhan and the description of women scholars like Maitray, Gargi shows the importance a woman hold during that period.
Licence: creative commons attribution 4.0
Paper Title: STUDENTS ATTITUDES TOWARDS THE USE OF ICT IN SECONDARY SCHOOLS IN ARUNACHAL PRADESH
Author Name(s): Miss Ligang Suniya, Prof. T. Lhungdim
Published Paper ID: - IJCRT1704498
Register Paper ID - 171366
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT1704498 and DOI :
Author Country : Indian Author, 791112, India , Itanagar, India , | Research Area: Medical Science Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT1704498 Published Paper PDF: download.php?file=IJCRT1704498 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT1704498.pdf
Title: STUDENTS ATTITUDES TOWARDS THE USE OF ICT IN SECONDARY SCHOOLS IN ARUNACHAL PRADESH
DOI (Digital Object Identifier) :
Pubished in Volume: 5 | Issue: 4 | Year: December 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Medical Science
Author type: Indian Author
Pubished in Volume: 5
Issue: 4
Pages: 3725-3729
Year: December 2017
Downloads: 1505
E-ISSN Number: 2320-2882
Licence: creative commons attribution 4.0
Attitude, information and communication technology, secondary school student
Paper Title: A REVIEW PAPER ON SQL INJECTION AND CROSS SITE SCRIPTING VULNERABILITIES
Author Name(s): Shivani Sukhanand, Priyanka Sharma
Published Paper ID: - IJCRT1704497
Register Paper ID - 171391
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT1704497 and DOI :
Author Country : Indian Author, --, - , -, - , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT1704497 Published Paper PDF: download.php?file=IJCRT1704497 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT1704497.pdf
Title: A REVIEW PAPER ON SQL INJECTION AND CROSS SITE SCRIPTING VULNERABILITIES
DOI (Digital Object Identifier) :
Pubished in Volume: 5 | Issue: 4 | Year: December 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 5
Issue: 4
Pages: 3720-3724
Year: December 2017
Downloads: 1484
E-ISSN Number: 2320-2882
As of late, web remains the favored stage for clients to do their business exercises. The movement of utilizations to web has been quick extending from applications like E-trade, Public gathering, E-administration, E-saving money, Shopping Portals or some other applications running on the web. Web Applications have expanded its use on account of simple availability to various clients around the globe. Be that as it may, as the utilization of the web has expanded, it has likewise given a bothersome or dull side to the use of html. Cross-webpage scripting (XSS) assaults keep on remaining the highest risk to web applications, databases and sites far and wide for a lot of time now. A study of around 15 million digital assaults in the second from last quarter of 2012 has uncovered that the greater part of these assaults are XSS based. In spite of the fact that assaults like SQL Injection, CSRF and Phishing are likewise normal, XSS still remains the favored procedure for programmers to complete malevolent exercises on web. This paper examines about XSS assaults, their operation and distinctive classifications of XSS assaults. The paper additionally features the alleviation situation and strategies feasible for anticipation. Data enters a Web application through an unauthorized source, most much of the time a web ask. The information is incorporated into dynamic substance that is sent to a web client without being approved for malignant substance. The malignant substance sent to the web program regularly appears as a fragment of JavaScript, however may likewise incorporate HTML, Flash, or some other sort of code that the program may execute. The assortment of assaults in view of XSS is practically boundless, however they regularly incorporate transmitting private information, similar to treats or other session data, to the aggressor, diverting the casualty to web content controlled by the assailant, or performing different vindictive operations on the client's machine under the pretense of the powerless.
Licence: creative commons attribution 4.0
Cross Site Scripting (XSS), SQL Injection, Phishing, Cyber Attacks, Web Application Security, Security, Software Security, Security Vulnerability, Black-Box Security Testing, Test Automation, web application, static analysis, Prevention, Detection, Fault injection.
Paper Title: A REVIEW PAPER ON MALWARE AND MALWARE PREVENTION AND DETECTION
Author Name(s): Nilesh Makwana, Chadresh Parekh
Published Paper ID: - IJCRT1704496
Register Paper ID - 171390
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT1704496 and DOI :
Author Country : Indian Author, --, - , -, - , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT1704496 Published Paper PDF: download.php?file=IJCRT1704496 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT1704496.pdf
Title: A REVIEW PAPER ON MALWARE AND MALWARE PREVENTION AND DETECTION
DOI (Digital Object Identifier) :
Pubished in Volume: 5 | Issue: 4 | Year: December 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 5
Issue: 4
Pages: 3713-3719
Year: December 2017
Downloads: 1418
E-ISSN Number: 2320-2882
In the course of the most recent decades, there were loads of concentrates made on malware and their countermeasures. The latest reports stress that the innovation of malevolent programming is quickly expanding. In addition, the serious utilization of systems and Internet expands the capacity of the spreading and the adequacy of this sort of programming. Then again, scientists and makers attempting awesome endeavors to create hostile to malware frameworks with powerful identification strategies for better insurance on PCs. Different applications contain bad conduct code; however those are not really malignant applications. The current framework classifications such applications as a malware applications. This issue will be overcome in proposed framework with the assistance of new element extraction calculation. In proposed framework chose android highlights will be separated for whole list of capabilities to recognize malware on four stages: bundle, client, application, and approval stage. The malware identification will be founded on behavioral and characterized by their hazard (High, Medium, and Low). This will be useful for the client to deal with the framework (Application) easily.
Licence: creative commons attribution 4.0
Malware, Malware Detection Systems, Antivirus, Malware Detection, Machine Learning, Pattern Recognition, Android.
Paper Title: A REVIEW PAPER ON AUTHENTICATION IN MOBILE PLATFORM
Author Name(s): Harshil K. Chaudhari, Chadresh Parekh
Published Paper ID: - IJCRT1704495
Register Paper ID - 171389
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT1704495 and DOI :
Author Country : Indian Author, -, - , -, - , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT1704495 Published Paper PDF: download.php?file=IJCRT1704495 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT1704495.pdf
Title: A REVIEW PAPER ON AUTHENTICATION IN MOBILE PLATFORM
DOI (Digital Object Identifier) :
Pubished in Volume: 5 | Issue: 4 | Year: December 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 5
Issue: 4
Pages: 3708-3712
Year: December 2017
Downloads: 1410
E-ISSN Number: 2320-2882
Today need of confirmation isn't restricted to secret key and PIN. It needs an abnormal state of security which can be accomplished by Keystroke bio-measurements. This paper endeavors to get the imposer regardless of the possibility that he conveys login subtle elements of client. The paper tries to survey the keystroke techniques and reach a typical inference. Including keystroke instrument with existing framework improves the security.
Licence: creative commons attribution 4.0
Keystroke Biometrics, Network Security, Password Security and Password Strengthening.
Paper Title: A Review Paper on Ransomware and Ransomware Prevention and Detection
Author Name(s): Alpesh Kavad, Chadresh Parekh
Published Paper ID: - IJCRT1704494
Register Paper ID - 171388
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT1704494 and DOI :
Author Country : Indian Author, -, - , -, - , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT1704494 Published Paper PDF: download.php?file=IJCRT1704494 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT1704494.pdf
Title: A REVIEW PAPER ON RANSOMWARE AND RANSOMWARE PREVENTION AND DETECTION
DOI (Digital Object Identifier) :
Pubished in Volume: 5 | Issue: 4 | Year: December 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 5
Issue: 4
Pages: 3702-3707
Year: December 2017
Downloads: 1369
E-ISSN Number: 2320-2882
Blackmail utilizing computerized stages is an expanding type of wrongdoing. A normally observed issue is blackmail as a disease of a Crypto Ransomware that encodes the records of the objective and requests a payment to recuperate the bolted information. By examining the four most basic Crypto Ransomwares, at composing, a reasonable weakness is distinguished; all diseases depend on apparatuses accessible on the objective framework to have the capacity to keep a straightforward recuperation after the assault has been recognized. By renaming the framework device that handles shadow duplicates it is conceivable to recoup from contaminations from every one of the four of the most well-known Crypto Ransomware. The arrangement is bundled in a solitary, simple to utilize content. Ransomware is a quickly developing danger to the information documents of people and organizations. It encodes documents on a contaminated PC and holds the way to decode the records until the point that the casualty pays a payoff. This malware is in charge of a huge number of dollars of misfortunes every year. Because of the a lot of cash to be made, new forms show up oftentimes. This permits bypassing antivirus programming and other interruption location techniques. In this paper, we show a concise history of Ransomware, the contentions for and against paying the payoff, best practices to keep a contamination, and to recuperate from a disease should one happen.
Licence: creative commons attribution 4.0
Crypto, Locker, Malware, Ransomware, Antivirus, malware, recovery, extortion, network security.
Paper Title: A STUDY ON SECURITY AND PRIVACY ISSUES OF CLOUD AND FOG COMPUTING FOR INTERNET OF THINGS(IOT)
Author Name(s): P.V. Madhumitha
Published Paper ID: - IJCRT1704493
Register Paper ID - 171350
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT1704493 and DOI :
Author Country : Indian Author, -, - , -, - , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT1704493 Published Paper PDF: download.php?file=IJCRT1704493 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT1704493.pdf
Title: A STUDY ON SECURITY AND PRIVACY ISSUES OF CLOUD AND FOG COMPUTING FOR INTERNET OF THINGS(IOT)
DOI (Digital Object Identifier) :
Pubished in Volume: 5 | Issue: 4 | Year: December 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 5
Issue: 4
Pages: 3693-3701
Year: December 2017
Downloads: 1371
E-ISSN Number: 2320-2882
Fog computing is a promising computing worldview that ex-tends cloud computing to the edge of networks. Like cloud computing yet with distinct qualities, fogcomputing faces new security and protection challenges other than those acquired from cloud computing. In this paper, we have reviewed these difficulties and comparing arrangements in a short way.
Licence: creative commons attribution 4.0
Fog computing, cloud/mobile computing, security, privacy
Paper Title: CLASSIFICATION TECHNIQUES IN AUTOMATIC BUG TRIAGE TO DECREASING THE MANUAL AND TIME COST
Author Name(s): Mrs.T.Aruna Jyothi, Mr.V.Vinay Kumar
Published Paper ID: - IJCRT1704492
Register Paper ID - 171349
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT1704492 and DOI :
Author Country : Indian Author, India, 500059 , hyderabad, 500059 , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT1704492 Published Paper PDF: download.php?file=IJCRT1704492 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT1704492.pdf
Title: CLASSIFICATION TECHNIQUES IN AUTOMATIC BUG TRIAGE TO DECREASING THE MANUAL AND TIME COST
DOI (Digital Object Identifier) :
Pubished in Volume: 5 | Issue: 4 | Year: December 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 5
Issue: 4
Pages: 3688-3692
Year: December 2017
Downloads: 1392
E-ISSN Number: 2320-2882
Programming organizations spend more than 45 percent of cost in managing programming bugs. Bug triage is a vital advance during the time spent bug settling. The objective of bug triage is to dole out another coming bug to the right potential engineer. The current bug triage approaches depends on machine learning, which assemble classifiers from the preparation sets of bug reports. According to writing, need to build up a compelling model for doing information diminishment on bug informational collection which will decrease the size of the information and also increment the nature of the information., by lessening the time and cost. Numerous product organizations spend their the greater part of cost in managing these bugs. We are utilizing case determination and highlight choice at the same time with chronicled bug information. To diminish the manual and time cost, content arrangement methods are connected to play out the programmed bug triage.
Licence: creative commons attribution 4.0
Classification Techniques in Automatic Bug Triage to Decreasing the Manual and time Cost
Paper Title: AN EFFICIENT RECOMMENDATION MODEL WITH USER TRUST AND ITEM RATINGS
Author Name(s): Parimi.Gowthami, P.G.K.Sirisha, G.M.Naik
Published Paper ID: - IJCRT1704491
Register Paper ID - 171348
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT1704491 and DOI :
Author Country : Indian Author, -, - , -, - , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT1704491 Published Paper PDF: download.php?file=IJCRT1704491 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT1704491.pdf
Title: AN EFFICIENT RECOMMENDATION MODEL WITH USER TRUST AND ITEM RATINGS
DOI (Digital Object Identifier) :
Pubished in Volume: 5 | Issue: 4 | Year: December 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 5
Issue: 4
Pages: 3680-3687
Year: December 2017
Downloads: 1338
E-ISSN Number: 2320-2882
As a basic method for Information Filtering, the recommender frameworks have been pulled in and made a packet of enthusiasm for as far back as ten years. The past recommendation procedures and methodologies have been broadly dissected in the data recovery look into groups, machine learning systems and information mining. Due to their incredible business request, the proposal frameworks have been effectively worked out in modern conditions and in business zones, for example, proposal of the item at Amazon, proposal of music at iTunes, recommendation of motion pictures at Netflix, et cetera. Here, we are proposing an approach called TrustSVD, which is a confide in based framework factorization system for item or administration recommendations. This TrustSVD incorporates numerous different data sources into the recommendation framework to decrease the information sparsity and the cool begin issues and their debasement execution. A goal examination of social put stock in information from the few of true informational indexes tells that, the unequivocal and certain impact of the two appraisals and trust must be thought about for a recommendation show. Subsequently TrustSVD manufactures upon the best in class recommender method known as, SVD++ (which makes utilization of impact of understood and unequivocal evaluated things), by furthermore fusing both impact of trusted and trusting clients upon the expectation of the things for a dynamic client. In light of our astute information of recommender frameworks, the proposed strategy is the first to enhance SVD++ with the social put stock in data.
Licence: creative commons attribution 4.0
Recommender systems, social trust, collaborative filtering, implicit trust.

