IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.
ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)
| IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: Integrating Art and Culture in Education
Author Name(s): Banya Chatterjee
Published Paper ID: - IJCRT2408183
Register Paper ID - 267272
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2408183 and DOI :
Author Country : Indian Author, India, 713386 , Asansol, 713386 , | Research Area: Arts1 All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2408183 Published Paper PDF: download.php?file=IJCRT2408183 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2408183.pdf
Title: INTEGRATING ART AND CULTURE IN EDUCATION
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 8 | Year: August 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Arts1 All
Author type: Indian Author
Pubished in Volume: 12
Issue: 8
Pages: b661-b666
Year: August 2024
Downloads: 229
E-ISSN Number: 2320-2882
Art and culture both are important for integrating in education because these create a cooperative nature among the students. Not only bookish knowledge is helpful for the students but also through this art and culture students can conduct the education with the real life experience. Through integrating art in the education system students can build their critical thinking skills. They can relate their education with the practical life situation. And culture also helps the students for improving their social interaction, how to behave with their family members how to behave with their parents, how to behave with their peer groups and siblings and also how to behave with the social people. Education with art and culture helps students explore their emotions, encouraging empathy and emotional intelligence. By expressing themselves through various art forms, students learn to understand and respect diverse perspectives, fostering tolerance and harmony in society.
Licence: creative commons attribution 4.0
Creativity, Real life experience, Imagination, Problem Solving Skill, Art and Culture, Society, Social Behavior, Values and Norms, innovation, holistic development.
Paper Title: HAZARD ASSESSMENT OF HEALTH AND SAFETY IN SPINING INDUSTRY
Author Name(s): K. DENESH, S. PRAKASH, G. MURUGAN
Published Paper ID: - IJCRT2408182
Register Paper ID - 267268
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2408182 and DOI :
Author Country : Indian Author, India, 637003 , Namakkal, 637003 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2408182 Published Paper PDF: download.php?file=IJCRT2408182 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2408182.pdf
Title: HAZARD ASSESSMENT OF HEALTH AND SAFETY IN SPINING INDUSTRY
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 8 | Year: August 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 12
Issue: 8
Pages: b651-b660
Year: August 2024
Downloads: 199
E-ISSN Number: 2320-2882
The hazard analysis and management are vital in textile industry to avoid losing customers and wasting resources caused by the failures in production systems. Risk analysis is also very significant to decrease possible hazards and to avoid possible damage in production systems. In this study, an approach based on Failure Mode and Effects Analysis (FMEA) and Fault Tree Analysis (FTA) is proposed to analyze the ring spinning yarn production process in a textile industry. First, the possible hazards in the production line, yarn production system, in an integrated company operating in the textile sector are analyzed by FTA method. Then, FMEA is applied to ring spinning yarn production process in a textile industry to rank all possible risks corresponding to hazards in descending order with respect to both occupational health and safety. It is very important to remove all possible hazards in textile industry to decrease the number of risks related to occupational health and safety. Therefore, in total of 57 hazard root causes are determined in the yarn production department. Subsequently, the faults related to the hazard root causes are examined by FTA and then risk corresponding to these hazards are prioritized by FMEA. The results obtained from the proposed FTA-FMEA approach show that decision makers and engineers can easily decrease the number of hazards and risks with respect to both occupational health and safety in practice.
Licence: creative commons attribution 4.0
Safety, Failure Mode and Effects Analysis, Hazard and Risk Assessment.
Paper Title: REGULATORY PERSPECTIVE FOR ANIMAL EXPERIMENTATION DURING PRECLINICAL DRUG DEVELOPMENT OF ANXIOLYTIC
Author Name(s): Diksha V. Moon, Neha d.Meshram, Madhura P. Dixit, Milind Umekar
Published Paper ID: - IJCRT2408181
Register Paper ID - 267215
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2408181 and DOI :
Author Country : Indian Author, India, 441002 , kamptee, 441002 , | Research Area: Pharmacy All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2408181 Published Paper PDF: download.php?file=IJCRT2408181 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2408181.pdf
Title: REGULATORY PERSPECTIVE FOR ANIMAL EXPERIMENTATION DURING PRECLINICAL DRUG DEVELOPMENT OF ANXIOLYTIC
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 8 | Year: August 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Pharmacy All
Author type: Indian Author
Pubished in Volume: 12
Issue: 8
Pages: b639-b650
Year: August 2024
Downloads: 177
E-ISSN Number: 2320-2882
The study focusses on the preclinical development of anxiolytic herbal drug Gotu Kola, which is used as an anxiolytic. The drug's anxiolytic activity was tested on wrister albino rats, following module 4 of the CTD. Animal experiments were conducted, including open field tests, elevated plus maze tests, and light and dark apparatus tests. Dopamine and acetylcholine esterase estimation were performed. Results showed that a single dose of Gotu Kola and a combined dose of caffeine and Gotu Kola alleviate anxiety. Similar effects were observed in the elevated plus maze test and open field test. Mandhukhpqrni and it's combination with caffeine effects in open field test. Combined administration increases the acetylcholine esterase and dopamine level in brain. The study adheres to regulatory authorities' rules and regulations.
Licence: creative commons attribution 4.0
Gotu kola , Preclinical study, CTD
Paper Title: Evaluating the Growth Strategy and Performance of Select Blue-Chip Schemes in Delivering Optimal Returns to Investors and Mutual Fund Firms
Author Name(s): Ellangi Pushpalatha
Published Paper ID: - IJCRT2408180
Register Paper ID - 267226
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2408180 and DOI :
Author Country : Indian Author, India, 500061 , Hyderabad, 500061 , | Research Area: Management All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2408180 Published Paper PDF: download.php?file=IJCRT2408180 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2408180.pdf
Title: EVALUATING THE GROWTH STRATEGY AND PERFORMANCE OF SELECT BLUE-CHIP SCHEMES IN DELIVERING OPTIMAL RETURNS TO INVESTORS AND MUTUAL FUND FIRMS
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 8 | Year: August 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Management All
Author type: Indian Author
Pubished in Volume: 12
Issue: 8
Pages: b625-b638
Year: August 2024
Downloads: 165
E-ISSN Number: 2320-2882
Abstract: This research looks at how well blue-chip mutual funds perform in the banking industry. It focuses on risk-return trade-offs and performance evaluation utilizing metrics including Jensen's Alpha, Treynor Ratio, and Sharpe Ratio. Three years' worth of data are included in the investigation, which includes major mutual funds like SBI, Canara, Kotak, and others. The results show that annual returns fluctuate, showing positive returns during times of good market circumstances and negative returns during difficult times. Since volatility differs throughout funds, it is crucial to take risk into account while making investment decisions. While risk-adjusted performance indicators provide information about the effectiveness of fund management strategies, beta values show market sensitivity. Investors are given recommendations that prioritize risk-adjusted returns, diversity, and well-informed decision-making.
Licence: creative commons attribution 4.0
Blue chip mutual funds, Banking sector, Risk-return trade-off, Performance analysis
Paper Title: Early warning signs and red flags for Independent Directors
Author Name(s): Manoj Singh, Mathew John
Published Paper ID: - IJCRT2408179
Register Paper ID - 267248
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2408179 and DOI :
Author Country : Indian Author, India, 122052 , Gurugram, 122052 , | Research Area: Management All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2408179 Published Paper PDF: download.php?file=IJCRT2408179 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2408179.pdf
Title: EARLY WARNING SIGNS AND RED FLAGS FOR INDEPENDENT DIRECTORS
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 8 | Year: August 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Management All
Author type: Indian Author
Pubished in Volume: 12
Issue: 8
Pages: b620-b624
Year: August 2024
Downloads: 179
E-ISSN Number: 2320-2882
Amidst a global economic downturn, the Indian economy stands out as a more promising prospect. The Indian government has committed to improving the ease of doing business, promoting market integrity, and expanding corporate governance, which has boosted investor and stakeholder confidence. Achieving these objectives requires good governance and strong frameworks. Corporate governance is gaining momentum in India due to past failures, unethical practices, and insufficient disclosures. In recent years, the frequency, intensity, and magnitude of corporate governance failures have increased. India has seen examples of entities with good and bad corporate governance, including Kingfisher Airlines, Jet Airways, Punjab National Bank, DHFL, PMC Bank, Infrastructure Leasing & Financial Services (IL&FS), Rotomac Bank Fraud, and Videocon-ICICI Bank. The Companies Act 2013 has given Independent Directors more power and responsibility, making them responsible for any shortcomings in corporate governance. Independent Directors play an active role in various committees to ensure good governance and protect the interests of all stakeholders. This article, based on secondary data and the Company Auditor's Report Order (CARO), highlights the key areas where an Independent Director can play a proactive role in sensing early warning signs, detecting them in advance, taking preventive measures, and mitigating risks that may arise. In recent corporate frauds, analysing the roles of Independent Directors has revealed that they either did not play their role effectively, were not aware of the issues, or could not read the early warning signs properly. Author through this article has emphasised on the key areas which are to be watched carefully and Independent Directors can sense reflags from there. If they are proactive and keep their eyes open and regularly track these areas they can avoid certain frauds. This article will help directors to be more aware abut the key areas and how to use these indicators to avoid fraud in their organization.
Licence: creative commons attribution 4.0
Independent Directors, Red Flags, Watch Dog Fraud, Early Warning Signs
Paper Title: Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography
Author Name(s): Chalapaka Avinash, Pilla Devi Prasanna
Published Paper ID: - IJCRT2408178
Register Paper ID - 267267
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2408178 and DOI :
Author Country : Indian Author, India, 530045 , Visakhapatnam, 530045 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2408178 Published Paper PDF: download.php?file=IJCRT2408178 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2408178.pdf
Title: SCALABLE AND SECURE BIG DATA IOT SYSTEM BASED ON MULTIFACTOR AUTHENTICATION AND LIGHTWEIGHT CRYPTOGRAPHY
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 8 | Year: August 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 12
Issue: 8
Pages: b610-b619
Year: August 2024
Downloads: 152
E-ISSN Number: 2320-2882
Nowadays, almost all organizations focus on adopting cloud computing approaches for Internet of Things (IoT) applications. Integrating IoT devices with cloud computing technology is considered an effective method for storing and managing the enormous amount of data generated by various devices. However, ensuring the security of big data within these organizations presents a challenge in the IoT-cloud architecture. To address security concerns, we propose a cloud-enabled IoT environment supported by multifactor authentication and lightweight cryptographic encryption schemes to protect the big data system. The proposed hybrid cloud environment aims to secure organizations' data in a highly secure manner. This hybrid cloud environment combines private and public clouds. In this setup, we encrypt the data using AES, and the cloud provides additional security. Users who request access to a file must obtain a decryption key from a Trusted Authority (TA). Only those who receive keys from the TA can decrypt the file and access it in its original form. The performance of the proposed architecture is evaluated using metrics such as computational time, security strength, encryption time, and decryption time.
Licence: creative commons attribution 4.0
Cloud Computing, Internet of Things (IoT), Big Data Security, Multifactor Authentication, Lightweight Cryptography, AES Encryption, Hybrid Cloud Environment, Private Cloud, Public Cloud, Trusted Authority (TA), Data Encryption, Data Decryption, Computational Time, Security Strength, Encryption Time, Decryption Time.
Paper Title: Mathematics Education and Nemeth Braille Code
Author Name(s): Mrs. Puja
Published Paper ID: - IJCRT2408177
Register Paper ID - 267216
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2408177 and DOI :
Author Country : Indian Author, India, 226017 , Lucknow, 226017 , | Research Area: Medical Science All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2408177 Published Paper PDF: download.php?file=IJCRT2408177 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2408177.pdf
Title: MATHEMATICS EDUCATION AND NEMETH BRAILLE CODE
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 8 | Year: August 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Medical Science All
Author type: Indian Author
Pubished in Volume: 12
Issue: 8
Pages: b602-b609
Year: August 2024
Downloads: 235
E-ISSN Number: 2320-2882
Abstract Education is an important aspect for everyone's development. It helps in all round development of an individual. It opens various opportunities in life. Similarly mathematics education is important for everyone as it is more closely to our daily life as compared to other subjects. Mathematics is so valuable, important, psychologically based and so closely connected with our day to day life, justified to be included in school curriculum. A sighted person acquire around 80-85% of information through vision. In case of visual disabilities (divyangjan) it is not so, they face various kinds of difficulties in acquiring information from their environment. They use their remaining senses to get information from their surroundings. They use multi-sensory approach to learn their subjects. Their teachers should make them to learn converting visual ideas to non-visual information through multi-sensory approach. Mathematics is a subject which has its own language, symbols, full of pictorial representations, abstract nature, and graphs/ diagrams etc.. The nature of mathematics itself is a barrier for students with visual disabilities. To make the student with visual disabilities to understand the concept, Nemeth Braille Code plays major role to access Mathematics. Adequate and effective use of Nemeth Braille Code can overcome the hurdles in mathematics education among students with visual disabilities. They can learn almost each and every mathematical concepts by using this Code. This paper gives an overview of Nemeth Braille Code in getting mathematics education among students with visual disabilities.
Licence: creative commons attribution 4.0
Key words: Mathematics, Student with Visual disabilities, Nemeth Braille Code, Divyangjan
Paper Title: Text Encryption And Decryption Using Algebraic Matrix Approach
Author Name(s): Udayasri Rapaka, Pinnamraju.T.S.Priya
Published Paper ID: - IJCRT2408176
Register Paper ID - 267266
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2408176 and DOI :
Author Country : Indian Author, India, 530026 , Viskhapatnam, 530026 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2408176 Published Paper PDF: download.php?file=IJCRT2408176 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2408176.pdf
Title: TEXT ENCRYPTION AND DECRYPTION USING ALGEBRAIC MATRIX APPROACH
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 8 | Year: August 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 12
Issue: 8
Pages: b592-b601
Year: August 2024
Downloads: 204
E-ISSN Number: 2320-2882
This abstract presents an encryption and decryption algorithm employing an algebraic matrix approach. The method utilizes matrix operations, including multiplication and inversion, to enhance security. By integrating algebraic structures into the encryption process, the algorithm aims to provide robust protection against unauthorized access. The abstract explores the theoretical foundations, algorithmic design, and potential applications of this cyclic square matrix-based encryption approach. Evaluation of the algorithm's efficiency and security in comparison to traditional methods is also discussed. Cryptographic algorithms provide security of data against attacks during encryption and decryption. However, they are computationally intensive process which consume large amount of CPU time and space at time encryption and decryption. The proposed algorithm is simple but difficult to break the process.
Licence: creative commons attribution 4.0
matrix operations, ensuring secure communication, matrix multiplication, matrix inversion, key generation, and cryptographic algorithm
Paper Title: Queen Mary's Hospital
Author Name(s): Ajay Kumar Awasthi
Published Paper ID: - IJCRT2408175
Register Paper ID - 267254
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2408175 and DOI :
Author Country : Indian Author, India, 226020 , Lucknow, 226020 , | Research Area: Medical Science All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2408175 Published Paper PDF: download.php?file=IJCRT2408175 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2408175.pdf
Title: QUEEN MARY'S HOSPITAL
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 8 | Year: August 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Medical Science All
Author type: Indian Author
Pubished in Volume: 12
Issue: 8
Pages: b587-b591
Year: August 2024
Downloads: 210
E-ISSN Number: 2320-2882
This article explores the development of women's medical education in India, focusing on the establishment of a pioneering institution in Lucknow. Historically, Indian medicine was dominated by Ayurveda, with the practice largely restricted to upper-caste Vaids, while women were confined to domestic roles. The introduction of Unani, Siddha, and Western medicine brought new dynamics to the field, with Western medicine quickly gaining institutional support and popularity. This shift created new opportunities for women, leading to increased demand for female medical professionals. The article specifically examines the efforts to establish a medical college for women in Lucknow. Despite existing hospitals dedicated to Western medicine, none offered medical education, forcing female students to travel to distant cities. Recognizing the need for local education, the Taluqdars of Awadh championed the creation of a medical college, with a proposal for a women's branch gaining traction. Raja Tasadduq Rasul Khan's generous donation facilitated this initiative, and the foundation stone for the King George Medical College was laid in 1905. However, progress on the women's branch lagged behind the main college. Financial and planning challenges delayed its establishment until 1909, when detailed plans for a female medical college, including a hostel, were finalized. By 1932, Queen Mary's Hospital for Women and Children was inaugurated, marking a significant milestone in advancing women's medical education and professional opportunities in the region.
Licence: creative commons attribution 4.0
Women, Medicine, Lucknow, Education, Taluqdars.
Paper Title: SMART DETECTION DESIGNS OF HTML WEB PAGE URL PHISHING ATTACKS BASED ON NATURAL LANGUAGE PROCESSING
Author Name(s): Mohammed Mubeen, Md. Ateeq Ur Rahman, Jothikumar. R
Published Paper ID: - IJCRT2408174
Register Paper ID - 267241
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2408174 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2408174 Published Paper PDF: download.php?file=IJCRT2408174 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2408174.pdf
Title: SMART DETECTION DESIGNS OF HTML WEB PAGE URL PHISHING ATTACKS BASED ON NATURAL LANGUAGE PROCESSING
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 8 | Year: August 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 12
Issue: 8
Pages: b582-b586
Year: August 2024
Downloads: 212
E-ISSN Number: 2320-2882
Phishing attacks are a type of cybercrime that has grown in recent years. It is part of social engineering attacks where an attacker deceives users by sending fake messages using social media platforms or emails. Phishing attacks steal users' information or download and install malicious software. They are hard to detect because attackers can design a phishing message that looks legitimate to a user. This message may contain a phishing URL so that even an expert can be a victim. This URL leads the victim to a fake website that steals information, such as login information, payment information, etc. Researchers and engineers work to develop methods to detect phishing attacks without the need for the eyes of experts. Even though many papers discuss HTML and URL-based phishing detection methods, there is no comprehensive survey to discuss these methods. Therefore, this paper comprehensively surveys HTML and URL phishing attacks and detection methods. We review the current state-of-art machine learning models to detect URL-based and hybrid-based phishing attacks in detail. We compare each model based on its data preprocessing, feature extraction, model design, and performance.
Licence: creative commons attribution 4.0
SMART DETECTION DESIGNS OF HTML WEB PAGE URL PHISHING ATTACKS BASED ON NATURAL LANGUAGE PROCESSING

