IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.
ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)
| IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: A CONVOLUTIONAL LSTM-BASED OPTIMIZED MODEL FOR ANOMALY DETECTION IN SMART GRID SYSTEMS
Author Name(s): A.VINOD KUMAR, NALAJALA SAI TEJA, MADDINENI AKHILKRISHNA, REPALLE HARSHA VARDHAN REDDY, CHIMAKURTHY CHARAN SRINIVAS
Published Paper ID: - IJCRT2605565
Register Paper ID - 308520
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2605565 and DOI :
Author Country : Indian Author, India, 500039 , HYDERABAD, 500039 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2605565 Published Paper PDF: download.php?file=IJCRT2605565 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2605565.pdf
Title: A CONVOLUTIONAL LSTM-BASED OPTIMIZED MODEL FOR ANOMALY DETECTION IN SMART GRID SYSTEMS
DOI (Digital Object Identifier) :
Pubished in Volume: 14 | Issue: 5 | Year: May 2026
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 14
Issue: 5
Pages: e886-e891
Year: May 2026
Downloads: 25
E-ISSN Number: 2320-2882
Smart grids are modern electrical networks that integrate digital technologies, smart meters, and communication systems to efficiently monitor and manage electricity generation, transmission, and distribution. However, increasing reliance on digital infrastructure makes smart grids vulnerable to cyber threats such as False Data Injection (FDI) attacks and energy theft, which manipulate meter readings or sensor data leading to incorrect billing, operational instability, and potential power system failures. This paper proposes a Convolutional Long Short-Term Memory (ConvLSTM) based optimized model for detecting anomalies in smart grid systems. The model combines the strengths of Convolutional Neural Networks (CNN) for extracting spatial features and Long Short-Term Memory (LSTM) networks for learning temporal patterns from time-series smart meter data. The dataset employed consists of smart grid energy consumption data containing both normal and anomalous patterns. Data preprocessing techniques including handling missing values, outlier reduction, normalization using standard scaling, and class balancing via SMOTE are applied to improve model performance. The ConvLSTM model is trained and evaluated using standard performance metrics. Experimental results demonstrate that the proposed model achieves an accuracy of 78.92%, demonstrating reliable anomaly detection and improved identification of abnormal smart grid behaviors to help utility providers enhance grid security.
Licence: creative commons attribution 4.0
Anomaly Detection, Smart Grid, ConvLSTM, Deep Learning, False Data Injection, Energy Theft, Time-Series Analysis, Cyber Security.
Paper Title: A Game-Theoretic Framework for AI-Enabled Supply Chain Resilience Under Disruption Risk
Author Name(s): Dr. Ghouse Mohiyaddin Sharif, Omar Abdullah Nasser Alsiyabi
Published Paper ID: - IJCRT2605564
Register Paper ID - 308580
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2605564 and DOI :
Author Country : Indian Author, Oman, 314 , muladha, 314 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2605564 Published Paper PDF: download.php?file=IJCRT2605564 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2605564.pdf
Title: A GAME-THEORETIC FRAMEWORK FOR AI-ENABLED SUPPLY CHAIN RESILIENCE UNDER DISRUPTION RISK
DOI (Digital Object Identifier) :
Pubished in Volume: 14 | Issue: 5 | Year: May 2026
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 14
Issue: 5
Pages: e876-e885
Year: May 2026
Downloads: 27
E-ISSN Number: 2320-2882
Global supply chains are increasingly exposed to disruptions caused by geopolitical tensions, pandemics, cyber threats, climate events, and regulatory uncertainty. While traditional supply chain strategies have emphasized cost efficiency and lean operations, recent crises have highlighted the need for resilience--the capacity to anticipate, absorb, respond to, and recover from disruptions. At the same time, Artificial Intelligence (AI) has enhanced forecasting, visibility, and real-time decision support through machine learning, predictive analytics, and digital twins. However, the impact of AI depends not only on technical capability but also on how supply chain partners respond strategically to AI-generated information. This paper develops a conceptual framework that integrates AI, John Nash's game theory, and supply chain resilience. Suppliers and manufacturers are modeled as rational actors choosing between cooperation (information sharing and joint risk mitigation) and non-cooperation (independent decision-making). The framework proposes that AI reduces information asymmetry, improves transparency, and reshapes payoff structures, making cooperative equilibria more attractive and stable. These equilibria enhance preparedness, response speed, recovery effectiveness, and organizational learning. The study contributes by linking digital intelligence, strategic behavior, and resilience in a unified theoretical model. It also offers practical guidance for managers seeking to use AI as a strategic coordination mechanism rather than merely an operational tool. The framework provides a foundation for future empirical, simulation-based, and analytical research on resilient and intelligent supply networks.
Licence: creative commons attribution 4.0
Artificial Intelligence; Game Theory; Supply Chain Resilience; Disruption Risk; Strategic Decision-Making; Information Asymmetry; Nash Equilibrium; Collaborative Supply Chains
Paper Title: ACCIDENT DETECTION AND AUTOMATIC AMBULANCE ALRET
Author Name(s): Ms.R.SUGANYA, MUHAMMAD HASHIR M, DEEPAN A, YESHWANTH M
Published Paper ID: - IJCRT2605563
Register Paper ID - 308574
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2605563 and DOI :
Author Country : Indian Author, India, India , Chennai-44, India , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2605563 Published Paper PDF: download.php?file=IJCRT2605563 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2605563.pdf
Title: ACCIDENT DETECTION AND AUTOMATIC AMBULANCE ALRET
DOI (Digital Object Identifier) :
Pubished in Volume: 14 | Issue: 5 | Year: May 2026
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 14
Issue: 5
Pages: e870-e875
Year: May 2026
Downloads: 28
E-ISSN Number: 2320-2882
This research focuses on the development of an advanced system for accident detection and automatic ambulance alert to enhance emergency response efficiency. With the increasing frequency of road accidents, rapid detection and immediate response are critical for minimizing casualties. The proposed system utilizes state-of-the-art sensors and image processing techniques to accurately identify and analyze accident scenarios in real-time. Key components of the system include onboard sensors such as accelerometers and gyroscopes . These sensors continuously monitor vehicle dynamics and surroundings, enabling the system to detect sudden changes indicative of an accident. Once an accident is confirmed, the system automatically triggers an alert to emergency services, providing crucial information about the incident's location and severity. Furthermore, the system incorporates geolocation technology to precisely pinpoint the accident site, facilitating quicker ambulance dispatch. The automated ambulance alert aims to reduce response times, ensuring timely medical assistance for accident victims. This innovative approach not only streamlines emergency services but also contributes to the overall improvement of road safety. The study demonstrates the feasibility and effectiveness of the proposed system through simulations and real-world testing, showcasing its potential to significantly impact emergency response outcomes in accident scenarios.
Licence: creative commons attribution 4.0
Accident Detection and Automatic Ambulance Alert in the project is described in the diagram below. Here is a brief description of each of them and how they all interact with one another
Paper Title: DESIGN THINKING-BASED MUSIC CLUSTERING AND CLASSIFICATION USING DEEP LEARNING AND CONSENSUS TECHNIQUES
Author Name(s): Mrs. Asha N S, Amrutha H Anand, Chandana G V, Deepa S G, Gagana N
Published Paper ID: - IJCRT2605562
Register Paper ID - 308549
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2605562 and DOI :
Author Country : Indian Author, India, 577003 , Davanagere, 577003 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2605562 Published Paper PDF: download.php?file=IJCRT2605562 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2605562.pdf
Title: DESIGN THINKING-BASED MUSIC CLUSTERING AND CLASSIFICATION USING DEEP LEARNING AND CONSENSUS TECHNIQUES
DOI (Digital Object Identifier) :
Pubished in Volume: 14 | Issue: 5 | Year: May 2026
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 14
Issue: 5
Pages: e860-e869
Year: May 2026
Downloads: 26
E-ISSN Number: 2320-2882
This work presents a system for grouping and analysing music using machine learning and user-focused design. The system converts audio signals into numerical features such as MFCC and STFT, then groups similar tracks using clustering methods. It combines multiple clustering approaches to improve grouping stability and accuracy. The design also focuses on user needs through iterative development and feedback. Results show better grouping quality and improved usability. The system supports applications like recommendation systems and audio analysis.
Licence: creative commons attribution 4.0
Keywords : Music Clustering, Feature Extraction (MFCC, STFT), Hierarchical Classification, Consensus Clustering, User-Centered Design (UCD), Multi-View Learning, Music Recommendation Systems.
Paper Title: THE ARCHITECT AND THE ARTIFACT: MASUJI ONO AND STEVENS AS VICTIMS OF STRUCTURAL COLLAPSE
Author Name(s): Dr. Sidharth Tanmoy Dash
Published Paper ID: - IJCRT2605561
Register Paper ID - 308571
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2605561 and DOI :
Author Country : Indian Author, India, 752050 , Jatni, 752050 , | Research Area: Languages Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2605561 Published Paper PDF: download.php?file=IJCRT2605561 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2605561.pdf
Title: THE ARCHITECT AND THE ARTIFACT: MASUJI ONO AND STEVENS AS VICTIMS OF STRUCTURAL COLLAPSE
DOI (Digital Object Identifier) :
Pubished in Volume: 14 | Issue: 5 | Year: May 2026
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Languages
Author type: Indian Author
Pubished in Volume: 14
Issue: 5
Pages: e857-e859
Year: May 2026
Downloads: 32
E-ISSN Number: 2320-2882
This paper explores the profound thematic and structural parallels between Masuji Ono in An Artist of the Floating World and Stevens in The Remains of the Day. Both protagonists function as high-level stewards of crumbling ideologies--specifically the imperialist fervour of Sh?wa-era Japan and the rigid class hierarchy of the British landed gentry. By examining their roles as unreliable narrators and "victims" of their own professional devotion, this study argues that both men are casualties of a "falling structural world." In this context, the moral frameworks they served have not only collapsed physically and politically but have been retroactively condemned by the very societies they aimed to improve. Their tragedy lies in the irreconcilable gap between their subjective sense of "dignity" and the objective historical reality of their complicity.
Licence: creative commons attribution 4.0
Kazuo Ishiguro, Masuji Ono, Stevens, unreliable narration, moral ambiguity, historical complicity, social isolation, guilt, denial, emotional suppression
Paper Title: A TREND DETECTION-BASED AUTO-SCALING METHOD FOR CONTAINERS IN HIGH-CONCURRENCY SCENARIOS
Author Name(s): DR.K.SUBBA RAO, KARNATAPU VISHNU SAKETH, RAVIPATI LOKESH SAI KUMAR, SHAIK SAHIL, GUNUKULA RAKESH
Published Paper ID: - IJCRT2605560
Register Paper ID - 308519
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2605560 and DOI :
Author Country : Indian Author, India, 500039 , HYDERABAD, 500039 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2605560 Published Paper PDF: download.php?file=IJCRT2605560 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2605560.pdf
Title: A TREND DETECTION-BASED AUTO-SCALING METHOD FOR CONTAINERS IN HIGH-CONCURRENCY SCENARIOS
DOI (Digital Object Identifier) :
Pubished in Volume: 14 | Issue: 5 | Year: May 2026
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 14
Issue: 5
Pages: e850-e856
Year: May 2026
Downloads: 22
E-ISSN Number: 2320-2882
With the rapid advancement of cloud computing and the widespread adoption of containerized applications, managing high-concurrency workloads efficiently has become a significant challenge in modern distributed systems. Traditional auto-scaling techniques, particularly reactive approaches such as threshold-based scaling, often fail to respond promptly to sudden and unpredictable workload variations, resulting in resource over-provisioning or under-provisioning and degraded system performance. To address these limitations, this paper proposes a trend detection-based auto-scaling method that integrates Long Short-Term Memory (LSTM)-based workload prediction with a trend detection mechanism. A cooldown strategy is also implemented to prevent frequent and unnecessary scaling operations, ensuring system stability. The proposed approach effectively combines prediction, trend awareness, and controlled execution to optimize resource utilization while maintaining performance under dynamic workload conditions in containerized environments.
Licence: creative commons attribution 4.0
Auto-scaling, LSTM, Trend Detection, Kubernetes, Containers, High-Concurrency, Cloud Computing, Workload Prediction, Pod Allocation.
Paper Title: Battery Management System
Author Name(s): Vrushank Hole, Deepraj Bhalerao, Pournima Khode, David Zachariah
Published Paper ID: - IJCRT2605559
Register Paper ID - 308502
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2605559 and DOI :
Author Country : Indian Author, India, 412201 , Pune, 412201 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2605559 Published Paper PDF: download.php?file=IJCRT2605559 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2605559.pdf
Title: BATTERY MANAGEMENT SYSTEM
DOI (Digital Object Identifier) :
Pubished in Volume: 14 | Issue: 5 | Year: May 2026
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 14
Issue: 5
Pages: e844-e849
Year: May 2026
Downloads: 31
E-ISSN Number: 2320-2882
In today's rapidly advancing technological world, efficient battery management is essential for applications such as electric vehicles, renewable energy systems, and portable electronics. A Battery Management System (BMS) ensures safe and reliable operation by monitoring key parameters like voltage, current, and temperature; however, existing systems often lack features such as user-defined charging limits, real-time State of Charge (SoC) and State of Health (SoH) monitoring, and effective fault protection. This paper presents the design and implementation of an improved BMS that incorporates a smart charging limiter, real-time monitoring, and MOSFET-based protection mechanisms. The system utilizes an analog front-end and a microcontroller to continuously monitor battery parameters and automatically protect against over-voltage, under-voltage, over-current, and overheating conditions. Additionally, the system provides monitoring of key parameters such as voltage, current, temperature, SoC, and SoH through a mobile application using the Blynk platform. The proposed system enhances battery safety, improves performance, and extends battery lifespan, making it suitable for modern energy storage applications.
Licence: creative commons attribution 4.0
1. Battery Management System (BMS) 2. Lithium-Ion Battery 3. State of Charge (SoC) 4. State of Health (SoH) 5. Real-Time Monitoring 6. Smart Charging Limiter 7. Battery Safety 8. BQ76920 9. ESP32 Microcontroller 10. MOSFET Protection 11. CAN Communication 12. Blynk Platform 13. IoT-Based Monitoring 14. Cell Balancing 15. Protection Circuitry
Paper Title: Platform Lock-in and the Ownership-Access Transition: An Exploratory Study of Consumer Perceptions in the Indian Digital Economy
Author Name(s): Karan Ganesh Shetty, Prof. Anandsingh Rajawat
Published Paper ID: - IJCRT2605558
Register Paper ID - 308515
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2605558 and DOI :
Author Country : Indian Author, India, 400097 , Mumbai, 400097 , | Research Area: Management All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2605558 Published Paper PDF: download.php?file=IJCRT2605558 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2605558.pdf
Title: PLATFORM LOCK-IN AND THE OWNERSHIP-ACCESS TRANSITION: AN EXPLORATORY STUDY OF CONSUMER PERCEPTIONS IN THE INDIAN DIGITAL ECONOMY
DOI (Digital Object Identifier) :
Pubished in Volume: 14 | Issue: 5 | Year: May 2026
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Management All
Author type: Indian Author
Pubished in Volume: 14
Issue: 5
Pages: e835-e843
Year: May 2026
Downloads: 34
E-ISSN Number: 2320-2882
The global digital economy is undergoing a structural transformation in which consumers are progressively transitioning from ownership rights to perpetual licensees paying recurring rents for digital goods and services. This paper explores the "Techno-Feudalism" framework advanced by Yanis Varoufakis, contrasting it against the "Platform Capitalism" counter-narrative, to examine how digital platforms in India extract cloud rent from consumers and businesses through algorithmically governed ecosystems. Employing a mixed-methods design combining secondary data analysis of global subscription economy trends with an exploratory pilot survey of urban Indian digital consumers (n=100), the study investigates the economic drivers compelling the transition from ownership to subscription models, the theoretical validity of digital rentier frameworks, and the psychological impact of subscription proliferation. Key findings reveal that 86% of the primarily urban, Gen-Z respondents prefer perpetual ownership over subscription access, yet 86% currently pay for at least one subscription service. This reflects a structural preference-reality dissonance driven by ecosystem lock-in, choice architecture, and the systematic elimination of buy-once alternatives. Platform entrapment is widespread, with 86% of respondents feeling trapped within digital ecosystems, and the average perceived ownership score standing at only 2.43 out of 5. The paper situates these findings within the theoretical debates between Technofeudalism and late-stage capitalism, while examining India's stalled Digital Competition Bill 2024 and institutional capacity constraints at the Competition Commission of India as of early 2026. The research concludes that without robust ex-ante legislative intervention and institutional capacity building, the Indian digital economy risks consolidating into a rentier system structurally constraining consumer economic agency.
Licence: creative commons attribution 4.0
Techno-feudalism, platform capitalism, subscription economy, digital ownership, cloud capital, consumer behaviour, Digital Competition Bill India, digital fatigue.
Paper Title: MACHINE LEARNING APPROACHES FOR ANOMALY DETECTION IN NETWORK TRAFFIC
Author Name(s): M.VIJAYA KUMAR, PANDARABOINA PHANIKUMAR, PENUMUDI RAJITHA, VADRANAM KEERTHI PRIYA, KATTUPALLI RAKESH KUMAR
Published Paper ID: - IJCRT2605557
Register Paper ID - 308517
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2605557 and DOI :
Author Country : Indian Author, India, 500039 , HYDERABAD, 500039 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2605557 Published Paper PDF: download.php?file=IJCRT2605557 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2605557.pdf
Title: MACHINE LEARNING APPROACHES FOR ANOMALY DETECTION IN NETWORK TRAFFIC
DOI (Digital Object Identifier) :
Pubished in Volume: 14 | Issue: 5 | Year: May 2026
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 14
Issue: 5
Pages: e829-e834
Year: May 2026
Downloads: 31
E-ISSN Number: 2320-2882
Anomaly detection in network traffic plays a critical role in ensuring network security, as unusual patterns may indicate cyberattacks, intrusions, or system failures. With the rapid growth of modern networks, the volume and complexity of traffic data have increased significantly, making traditional rule-based and statistical techniques less effective in identifying abnormal behaviour. This paper explores the use of machine learning techniques for efficient and accurate anomaly detection in network traffic. The proposed approach focuses on analysing network traffic characteristics and leveraging data-driven models to automatically learn normal and abnormal patterns. Machine learning algorithms including Isolation Forest, Naive Bayes, XGBoost, LightGBM, and Support Vector Machine (SVM) are employed to process large-scale datasets, enabling the detection of subtle and complex anomalies that are difficult to identify using conventional methods. The system incorporates data preprocessing using the KDDCup99 dataset, feature extraction via Principal Component Analysis (PCA), and class balancing through the Synthetic Minority Over-sampling Technique (SMOTE). The effectiveness of the proposed method is evaluated using standard performance metrics such as accuracy, precision, recall, and F1-score. The results demonstrate that machine learning-based approaches provide a scalable and reliable solution for real-time anomaly detection in modern network environments.
Licence: creative commons attribution 4.0
Anomaly Detection, Network Traffic, Machine Learning, KDDCup99, PCA, SMOTE, XGBoost, LightGBM, Isolation Forest, Intrusion Detection.
Paper Title: DIGITAL VAULT SYSTEM
Author Name(s): Sahil Tongale, DR. MANISHA BHARATI
Published Paper ID: - IJCRT2605556
Register Paper ID - 308478
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2605556 and DOI :
Author Country : Indian Author, India, 411062 , Pimpri-Chinchwad, 411062 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2605556 Published Paper PDF: download.php?file=IJCRT2605556 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2605556.pdf
Title: DIGITAL VAULT SYSTEM
DOI (Digital Object Identifier) :
Pubished in Volume: 14 | Issue: 5 | Year: May 2026
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 14
Issue: 5
Pages: e824-e828
Year: May 2026
Downloads: 26
E-ISSN Number: 2320-2882
In today's digital era, the secure storage and transmission of sensitive documents is a significant challenge. Manual record-keeping and traditional password-based systems are prone to threats such as unauthorized access, theft, and data manipulation. To resolve these concerns, this research proposes a secure Digital Locker System that enables users to store, upload, encrypt, and manage personal documents using AES-256 encryption with Fernet implementation and OTP-based authentication through Twilio. The system is developed using the Flask framework and provides a user-friendly interface resembling a physical locker. The Digital Locker ensures confidentiality, integrity, and high security of sensitive documents such as ID proofs, certificates, medical reports, and legal papers. This project demonstrates a scalable, secure, and user-centric digital document vault for individuals and organizations.
Licence: creative commons attribution 4.0
Digital Locker, Encryption, AES-256, OTP Verification, Flask, Secure Storage, Authentication

