IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.
ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)
| IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: A DESIGN AND SIMULATION OF DISTRIBUTED TRUST MODEL FOR WIRELESS SENSOR NETWORKS
Author Name(s): S. Kiran Kumar, R. Raja Kishore M. Tech, Dr. M. Narsing Yadav
Published Paper ID: - IJCRT1704153
Register Paper ID - 170395
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT1704153 and DOI :
Author Country : Indian Author, -, - , -, - , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT1704153 Published Paper PDF: download.php?file=IJCRT1704153 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT1704153.pdf
Title: A DESIGN AND SIMULATION OF DISTRIBUTED TRUST MODEL FOR WIRELESS SENSOR NETWORKS
DOI (Digital Object Identifier) :
Pubished in Volume: 5 | Issue: 4 | Year: November 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 5
Issue: 4
Pages: 1179-1189
Year: November 2017
Downloads: 1367
E-ISSN Number: 2320-2882
Now a days wireless sensor networks are rapidly growing technologies that have been widely used in many applications such as emergency response, healthcare monitoring, battlefield surveillance, habitat monitoring, traffic management, smart power grid, etc. However the wireless media and resource-constraint nature of a sensor network makes it an ideal medium for malicious attackers to intrude the system. Thus providing security is extremely important for the safe application of WSNs. Various security mechanisms like cryptography, authentication, confidentiality, and message integrity, have been proposed to avoid security threats such as eavesdropping, message replay, and fabrication of messages. To establish secure communications, we need to ensure that all communicating nodes are trusted first, according to the number of packets received by sensor nodes, direct trust and recommendation trust are selectively calculated after that communication trust, energy trust and data trust are considered during the calculation of direct trust. Distributed trust model can evaluate trustworthiness of sensor nodes more precisely and prevent the security breaches more effectively. A network Controller is designed to monitor network nodes continuously and if malicious node is found then it changes the routing path. By adding network controller to this model will reduces the packet drop ratio between nodes. Hence Performance of the model increases and Simulation results of Trust models are shown in output.
Licence: creative commons attribution 4.0
A DESIGN AND SIMULATION OF DISTRIBUTED TRUST MODEL FOR WIRELESS SENSOR NETWORKS
Paper Title: ONGC WORKSHOP AND MAINTENANCE
Author Name(s): Karan Jani
Published Paper ID: - IJCRT1704152
Register Paper ID - 170424
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT1704152 and DOI :
Author Country : Indian Author, 380061, India , ahmedabad, India , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT1704152 Published Paper PDF: download.php?file=IJCRT1704152 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT1704152.pdf
Title: ONGC WORKSHOP AND MAINTENANCE
DOI (Digital Object Identifier) :
Pubished in Volume: 5 | Issue: 4 | Year: November 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 5
Issue: 4
Pages: 1174-1178
Year: November 2017
Downloads: 1458
E-ISSN Number: 2320-2882
work of maintenance department of ONGC and brief knowledge about crude oil production and equipment used
Licence: creative commons attribution 4.0
ONGC, crude oil process , maintanance and production of ONGC
Paper Title: WIRELESS HOME SECURITY SYSTEM WITH MOBILE
Author Name(s): Kulbhushan Singh
Published Paper ID: - IJCRT1704148
Register Paper ID - 170491
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT1704148 and DOI :
Author Country : Indian Author, -, - , -, - , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT1704148 Published Paper PDF: download.php?file=IJCRT1704148 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT1704148.pdf
Title: WIRELESS HOME SECURITY SYSTEM WITH MOBILE
DOI (Digital Object Identifier) :
Pubished in Volume: 5 | Issue: 4 | Year: November 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 5
Issue: 4
Pages: 1156-1157
Year: November 2017
Downloads: 1514
E-ISSN Number: 2320-2882
Security and automation is a prime concern in our day-to-day life. The approach to home and industrial automation and security system design is almost standardized nowadays. In this paper, we have tried to increase these standards by combining new design techniques and developed a low cost home and industrial automated security systems. Everyone wants to be as much as secure as possible. The design of simple hardware circuit enables every user to use this wireless home security system with PIR sensor, Gas sensor, Smoke sensor and Main fuse Failure Detector at Home & Industries.Wireless security is the prevention of unauthorized access or damage to MOBILE using wireless networks Systematic solution for home. The aim of this paper is to investigate a cost effective solution that will provide controlling of home appliances remotely and will also enable home security against intrusion in the absence of home owner. The system uses latest wireless communication like Bluetooth, Infrared and Wi-Fi access to the system for security and automated appliance control. Home security has been a major issue where crime is increasing and everybody wants to take proper measures to prevent intrusion. System will works on different wireless communications and latest 3 of 10 mobiles uses for security purpose. The proposed system characteristics involve remote controlling of appliances, intrusion detection, system security and auto-configuration such that system automatically adjusts the system settings on running hardware support check.
Licence: creative commons attribution 4.0
Mobile, Camera, Internet, Chips, Bluetooth, SMS, Web Technique, Electric Circuit.
Paper Title: INTELLIGENT E –RESTAURENT BILLING SYSTEM
Author Name(s): M.BHAVYASRI, MOHDAMEENUDDIN
Published Paper ID: - IJCRT1704147
Register Paper ID - 170460
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT1704147 and DOI :
Author Country : Indian Author, -, - , -, - , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT1704147 Published Paper PDF: download.php?file=IJCRT1704147 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT1704147.pdf
Title: INTELLIGENT E –RESTAURENT BILLING SYSTEM
DOI (Digital Object Identifier) :
Pubished in Volume: 5 | Issue: 4 | Year: November 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 5
Issue: 4
Pages: 1151-1155
Year: November 2017
Downloads: 1407
E-ISSN Number: 2320-2882
Today’s era is said to be the world of technology. So many efforts have been taken by restaurants owners also to adopt information and communication technologies such as PDA, wireless LAN, costly multi-touch screens etc. to enhance dining experience. This paper highlights some of the limitations of the conventional paper based and PDA-based food ordering system and proposed the low cost touch screen based Restaurant Management System using an android Smartphone or tablet as a solution. The system consists of a Smartphone/tablet at the customer table contains the android application with all the menu details. The customer tablet, kitchen display connects directly with each other through Bluetooth/wifi . Orders made by the customers will be instantly reach the kitchen module. This wireless application is user-friendly, improves efficiency and accuracy for restaurants by saving time, reduces human errors and provides customer feedback. This system successfully overcomes the drawbacks in earlier automated food ordering systems and is less expensive as it requires a one-time investment for gadgets.
Licence: creative commons attribution 4.0
INTELLIGENT E –RESTAURENT BILLING SYSTEM
Paper Title: COMPUTER AIDED PROCESS PLANNING AND OPTIMIZATION OF SPIKE SUPPORT
Author Name(s): Dr J.V.R.Ramesh, K.Yogesh
Published Paper ID: - IJCRT1704146
Register Paper ID - 170471
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT1704146 and DOI :
Author Country : Indian Author, --, - , -, - , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT1704146 Published Paper PDF: download.php?file=IJCRT1704146 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT1704146.pdf
Title: COMPUTER AIDED PROCESS PLANNING AND OPTIMIZATION OF SPIKE SUPPORT
DOI (Digital Object Identifier) :
Pubished in Volume: 5 | Issue: 4 | Year: November 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 5
Issue: 4
Pages: 1141-1150
Year: November 2017
Downloads: 1370
E-ISSN Number: 2320-2882
In manufacturing, the goal is to produce components that meet the design specifications. The design specification ensures the functionality aspect. Spike support is used in a fourth-generation man-portable fire-and-forget anti-tank guided missile with tandem-charged heat warhead, developed and designed by the ISRAELI company and in service with some nations. As it is a missile component, it should be light in weight at the same time strength should be more. Aluminum material is used for spike support due to its best material properties. Due to this thin wall thickness, there is more chance of rejections and reworks. Nowadays rejection is a serious problem that has been arising in every manufacturing industry. Due to this reason, the manufacturing sector is advancing into losses. There are many factors responsible for rejection and reworks, such as human errors, machine errors, process planning, material errors etc. CAD/CAM/CAE systems play a crucial role in design optimization and process optimization of any component and it is helpful in reducing the reworks and rejections. By considering the above important aspect, this project is taken up for reducing the rejections to the least values. The aim of the project is to reduce and maintain the rejection rate below six percent which was previously 9 percent and reduces and keep the rework rate below 10 percent which was previously 15%. Initially, the optimum cutting speed of the tool is evaluated by doing the harmonic analysis in the CAE system using ANSYS software. Once the cutting speeds are determined, manufacturing process plan will be developed in cam system using the NX-CAM software. Process optimization was also carried out by using the mandrel for a job holding to reduce damage to the component while machining operation is running.
Licence: creative commons attribution 4.0
COMPUTER AIDED PROCESS PLANNING AND OPTIMIZATION OF SPIKE SUPPORT
Paper Title: VALUE PATTERN OF ADOLESCENT: A STUDY WITH REFERENCE TO CHILDREN IN COIMBATORE DISTRICT
Author Name(s): E.Sridevi, Dr.L.Ranjit
Published Paper ID: - IJCRT1704145
Register Paper ID - 170449
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT1704145 and DOI :
Author Country : Indian Author, 641032, India , Coimbatore, India , | Research Area: Medical Science Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT1704145 Published Paper PDF: download.php?file=IJCRT1704145 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT1704145.pdf
Title: VALUE PATTERN OF ADOLESCENT: A STUDY WITH REFERENCE TO CHILDREN IN COIMBATORE DISTRICT
DOI (Digital Object Identifier) :
Pubished in Volume: 5 | Issue: 4 | Year: November 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Medical Science
Author type: Indian Author
Pubished in Volume: 5
Issue: 4
Pages: 1135-1140
Year: November 2017
Downloads: 1397
E-ISSN Number: 2320-2882
Licence: creative commons attribution 4.0
Values, Adolescent, School, Children
Paper Title: A REVIEW OF DIGITAL STEGANOGRAPHY METHODS
Author Name(s): Asha Durafe
Published Paper ID: - IJCRT1704144
Register Paper ID - 170454
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT1704144 and DOI :
Author Country : Indian Author, 400701, India , Navi Mumbai, India , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT1704144 Published Paper PDF: download.php?file=IJCRT1704144 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT1704144.pdf
Title: A REVIEW OF DIGITAL STEGANOGRAPHY METHODS
DOI (Digital Object Identifier) :
Pubished in Volume: 5 | Issue: 4 | Year: November 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 5
Issue: 4
Pages: 1129-1134
Year: November 2017
Downloads: 1421
E-ISSN Number: 2320-2882
Security in data communication is a very important concern today. It is used in almost every region like e-commerce, education, and industry and data warehouse. Steganography literally means secret writing. The technique has been used in various forms for 2500 years or long but in the last two decades Steganography has been introduced to digital media. The goal of steganography is to hide information by concealing it into some other medium like image, audio or video so that only sender and intended recipient knows existence of information in communication. So the main focus of this paper is to study and discuss the trends which are already been proposed in the direction of cryptography and steganography. The main focus of this paper is on emerging concepts and recent techniques like Parity Coding, Least Significant Bit Coding (LSB), Phase Coding, Echo Data Hiding, Spread Spectrum about audio steganography. The performance of recent audio steganography techniques on the basis of strengths, weaknesses and hiding rate is evaluated. Some advancement like Generic Algorithm based Audio Steganography and steganalysis concepts are also discussed.
Licence: creative commons attribution 4.0
Steganography, data hiding, parity, coding, security measures, LSB, cryptography, steganalysis
Paper Title: DESIGN AND ANALYSIS OF TEST-RIG FOR MULTIPLE VALVE TESTING
Author Name(s): Joy Gohil
Published Paper ID: - IJCRT1704143
Register Paper ID - 170455
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT1704143 and DOI :
Author Country : Indian Author, 382481, India , Ahmedabad, India , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT1704143 Published Paper PDF: download.php?file=IJCRT1704143 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT1704143.pdf
Title: DESIGN AND ANALYSIS OF TEST-RIG FOR MULTIPLE VALVE TESTING
DOI (Digital Object Identifier) :
Pubished in Volume: 5 | Issue: 4 | Year: November 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 5
Issue: 4
Pages: 1085-1128
Year: November 2017
Downloads: 1409
E-ISSN Number: 2320-2882
Licence: creative commons attribution 4.0
Valve automation, Valve technology, Fluid mechanics, Mechanical, Advance Engineering, System analysis, Technology, Process engineering, Thermodynamics, Designing, Modeling, Analytical calculations.
Paper Title: A NEW SIFT AND SURF BASED VERIFICATION OF DOCUMENT IN AUTOMATIC LOGO EXTRACTION AND DETECTION
Author Name(s): LAKSHMI PRASAD CHENNAMSETTY, BOYAPATI BHARATHIDEVI
Published Paper ID: - IJCRT1704142
Register Paper ID - 170457
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT1704142 and DOI :
Author Country : Indian Author, -, - , -, - , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT1704142 Published Paper PDF: download.php?file=IJCRT1704142 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT1704142.pdf
Title: A NEW SIFT AND SURF BASED VERIFICATION OF DOCUMENT IN AUTOMATIC LOGO EXTRACTION AND DETECTION
DOI (Digital Object Identifier) :
Pubished in Volume: 5 | Issue: 4 | Year: November 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 5
Issue: 4
Pages: 1078-1084
Year: November 2017
Downloads: 1366
E-ISSN Number: 2320-2882
Algorithms and methods used for recognize of objects from images in imperative to implement numerous operations such as document verification and object identification. To extract and segmenting logo from transfer certificates or any other document become the difficult task. The present investigation is effort to design the necessary programme module to extract logo from different document. This well-defined module could be an efficient tool to recognize the valued document like TC or any other document that enhances accuracy to saves time, this Automated logo detection module and its application could be extended in access of other documentation. In this paper SIFT and SURF algorithm is used to extract logo from image. In the next step work may be used in noise removal technology. This module and its proper execution help to extract and matches the objects and will give promising results for document identification. We got 96% accuracy.
Licence: creative commons attribution 4.0
TC-Transfer Certificate, Logo Detection, Thresholding, feature extraction, SIFT, SURF, Bounding Box, match feature.
Paper Title: WOMEN AT THE MARGIN:A STUDY ON FEMALE DOMESTIC WORKERS IN ASSAM'S KARBI ANGLONG DISTRICT
Author Name(s): Dr.Mousumi Choudhury
Published Paper ID: - IJCRT1704141
Register Paper ID - 170415
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT1704141 and DOI :
Author Country : Indian Author, 782462, India , Diphu, India , | Research Area: Medical Science Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT1704141 Published Paper PDF: download.php?file=IJCRT1704141 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT1704141.pdf
Title: WOMEN AT THE MARGIN:A STUDY ON FEMALE DOMESTIC WORKERS IN ASSAM'S KARBI ANGLONG DISTRICT
DOI (Digital Object Identifier) :
Pubished in Volume: 5 | Issue: 4 | Year: November 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Medical Science
Author type: Indian Author
Pubished in Volume: 5
Issue: 4
Pages: 1071-1077
Year: November 2017
Downloads: 1437
E-ISSN Number: 2320-2882
This paper seeks to explore the plight and predicament of female domestic workers in Karbi Anglong district. Women suffer discrmination in the male dominated society.They are more vulnerable when they are parts of the lower rungs of the society.Domestic workers lack support system from the Govt. and in Karbi Anglong district,their plight is more severe since the district is infested by militancy and perpetual underdevelopment.
Licence: creative commons attribution 4.0
Marginalisation,vulnerable, insecurity,trafficking,abuse

