ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: A SYSTAMETIC APPROACH OF ENHANCING IMAGECHAIN USING BLOCK CHAIN
Author Name(s): R. Elankavi, M.Sandhya, S Omsai, B Pavani, E Prasad
Published Paper ID: - IJCRT2303956
Register Paper ID - 233679
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2303956 and DOI :
Author Country : Indian Author, India, 517501 , CHITTOOR, 517501 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303956 Published Paper PDF: download.php?file=IJCRT2303956 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303956.pdf
Title: A SYSTAMETIC APPROACH OF ENHANCING IMAGECHAIN USING BLOCK CHAIN
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 3 | Year: March 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 3
Pages: i52-i62
Year: March 2023
Downloads: 151
E-ISSN Number: 2320-2882
Digital images are linked together in an image chain using hash connections in a cryptographic structure. The main characteristic that sets it apart from block chains is that the images are not kept inside the blocks. Instead, the embedding procedure combines the block with the picture. The image chain is made up of normal graphic files that may be utilised in the same way as other images but also each of which has a data block that connects it to an earlier link in the chain. Apart for the photos themselves, the proposed approach doesn't call for any other files. It is portable and user-friendly due to the variety of file formats and embedding techniques it supports. The plan also offers a substantial amount of security and forgery resistance. This is accomplished by hashing the entire file with embedded data, making it impossible to change or remove the picture from the chain without the integrity being compromised. This project explains the fundamental idea of an image chain along with its components and uses. Block structure and embedding techniques are the two most crucial challenges.
Licence: creative commons attribution 4.0
picture watermarking, image chain, and cloud technologies
Paper Title: Self-Help Group (SHG) for Economical Development
Author Name(s): DR MADHUKAR PANDHARINATH AGHAV
Published Paper ID: - IJCRT2303955
Register Paper ID - 232837
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2303955 and DOI :
Author Country : Indian Author, India, 431515 , PARLI VAIJNATH, 431515 , | Research Area: Commerce and Management, MBA All Branch Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303955 Published Paper PDF: download.php?file=IJCRT2303955 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303955.pdf
Title: SELF-HELP GROUP (SHG) FOR ECONOMICAL DEVELOPMENT
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 3 | Year: March 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Commerce and Management, MBA All Branch
Author type: Indian Author
Pubished in Volume: 11
Issue: 3
Pages: i49-i51
Year: March 2023
Downloads: 144
E-ISSN Number: 2320-2882
India has a wide variety of cultural practices, customs, historical origins, etc. As a consequence, the government finds it challenging to address socioeconomic issues on its own. Therefore, bringing individuals together who are facing comparable problems could be a significant economic breakthrough for India. Many people think that social, female, and rural empowerment are all fueled by self-help organizations. According to the most current data, about one fourth of Indians live in rural poverty. One third of the labor population in India is made up of women. They have found it challenging to access and use the resources that could help them better their living circumstances, though, due to societal constraints.
Licence: creative commons attribution 4.0
SHG, Self-Help Group, Economics
Paper Title: Eatry Desktop Application
Author Name(s): Vaibhav singh, Shivansh mishra, Saurabh Kumar, Rohit Kumar, Sachin Bansal
Published Paper ID: - IJCRT2303954
Register Paper ID - 233668
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2303954 and DOI :
Author Country : Indian Author, India, 201310 , Greater Noida, 201310 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303954 Published Paper PDF: download.php?file=IJCRT2303954 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303954.pdf
Title: EATRY DESKTOP APPLICATION
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 3 | Year: March 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 3
Pages: i42-i48
Year: March 2023
Downloads: 139
E-ISSN Number: 2320-2882
Eatry is a modern management system designed to simplify and streamline hotel and restaurant operations. The platform aims to enhance efficiency and accuracy in managing hotel reservations, room assignments, guest billing, and other related tasks, as well as restaurant ordering, serving, and billing. Through Eatry, guests can book rooms, view availability, place orders, and make payments directly from their mobile devices. Hotel staff can manage room assignments, check-ins and check-outs, and monitor guest billing, while restaurant staff can track orders and manage tables with ease. Eatry's data analytics feature enables managers to monitor occupancy rates, track revenue, monitor sales, and make informed business decisions. By integrating these features into a single platform, Eatry enhances the efficiency of hotel and restaurant operations, leading to a better overall guest experience. Eatry is a powerful tool for hotels and restaurants of all sizes, and can help optimize operations, increase revenue, and improve profitability.
Licence: creative commons attribution 4.0
Hotel management, Restaurant management, Modern technology, Streamline operations, Data analytics, Revenue optimization
Paper Title: FROM A SOCIO-ECONOMIC PERSPECTIVE R.K. NARAYAN'S THE GUIDE
Author Name(s): KRISHNAMURTHY NOMULA
Published Paper ID: - IJCRT2303953
Register Paper ID - 233669
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2303953 and DOI :
Author Country : Indian Author, India, 506167 , Jangaon, 506167 , | Research Area: Arts1 All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303953 Published Paper PDF: download.php?file=IJCRT2303953 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303953.pdf
Title: FROM A SOCIO-ECONOMIC PERSPECTIVE R.K. NARAYAN'S THE GUIDE
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 3 | Year: March 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Arts1 All
Author type: Indian Author
Pubished in Volume: 11
Issue: 3
Pages: i37-i41
Year: March 2023
Downloads: 153
E-ISSN Number: 2320-2882
This essay discusses the socioeconomic issues raised by R.K. Narayan's book The Guide. The characters are analyzed in light of Post-Independence Indian economic ideas as they are set against this backdrop. The effects of westernization and modernization are also discussed, as well as how the protagonist Raju's idealistic attitude is gradually altered by new philosophies, cultures, and fashions. One of the key elements of R.K. Narayan's writings, the exaltation of human relationships, is the aim of this article. The book and the characters are so critically examined against the backdrop of societal changes because the study deals with socio-economic discourse.
Licence: creative commons attribution 4.0
Indian economic ideas, Westernization and Modernization.
Paper Title: ATOMIC PLATFORM FOR REGULATING CHARITY FUNDS USING BLOCKCHAIN TECHNOLOGY
Author Name(s): R.M Mallika, D. Dharani, D. Ganesh, H. Bhavana, G. Hima Sailaja
Published Paper ID: - IJCRT2303952
Register Paper ID - 233665
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2303952 and DOI :
Author Country : Indian Author, India, 517501 , CHITTOOR, 517501 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303952 Published Paper PDF: download.php?file=IJCRT2303952 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303952.pdf
Title: ATOMIC PLATFORM FOR REGULATING CHARITY FUNDS USING BLOCKCHAIN TECHNOLOGY
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 3 | Year: March 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 3
Pages: i29-i36
Year: March 2023
Downloads: 124
E-ISSN Number: 2320-2882
Legislators from all over the world are collecting taxes on the profit, but nobody knows where this vast amount of money is going. A significant majority of us must donate those funds in order to support a cause, receive gifts, or secure sponsorships. Everyone is simultaneously unsure of which association to trust and to whom to give their federal tax returns. The crowd funding entrance/local area/non-benefit association/peer-to-peer automatic aiding programme was introduced so that anyone could give/support money to people/startups that need/merit it in order to avoid these numerous uncertainties and questions. This CF application uses block chain innovation for safe financial transactions. Blockchain will be the only medium of exchange. Clients and employees from all around the world have gathered in this entryway to provide a hand and demonstrate humanity. It is an open source platform that is entirely transparent, trustworthy, and focused on the cause as well as how to make it as easy as possible for people to support it. Before funding, the government's income tax division can approve the funding and any appropriate tax exemptions for the charity, so the funding's transparency ensures its accuracy.
Licence: creative commons attribution 4.0
Black Chain, Information Security, Crowd Funding
Paper Title: Implementing Blood Bank Tracking System with Information Security Using Fuzzy Logic
Author Name(s): J. Jerin Jose, J . Keerthi, M . Reddy Asha, T . Ravindra, K . Jayanth
Published Paper ID: - IJCRT2303951
Register Paper ID - 233662
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2303951 and DOI :
Author Country : Indian Author, India, 517501 , CHITTOOR, 517501 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303951 Published Paper PDF: download.php?file=IJCRT2303951 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303951.pdf
Title: IMPLEMENTING BLOOD BANK TRACKING SYSTEM WITH INFORMATION SECURITY USING FUZZY LOGIC
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 3 | Year: March 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 3
Pages: i24-i28
Year: March 2023
Downloads: 150
E-ISSN Number: 2320-2882
A network-based system called Blood Bank Management is intended to store, process, retrieve, and analyse data related to the administrative and inventory management within a blood bank. This project intends to keep all the data regarding blood donors, the various blood types accessible in each blood bank, and assist them in managing more effectively. The goal is to increase openness in this industry, make it simple and free of corruption to receive blood from a blood bank, and improve the efficiency of the blood bank management system. Instead of storing blood, we are stocking the names of blood donors because our client is not interested in doing so. Blood donors must register in the database if they are interested in giving blood. There are no issues with the idea because there is no blood storage. In order to find the closest and most appropriate donors, the proposal integrates Nearest Neighbor Search with Fuzzy Expert. The need for blood must be expressed, and we provide the donor's information. Whether they are available or not, the donors are allowed to adjust their status.
Licence: creative commons attribution 4.0
fuzzy, neural networks, fuzzy AI, and blood bank management system
Paper Title: Detect and Display the Subterranean Failing of Cables Using IoT
Author Name(s): Miriyala Sailesh, Lanka Padmalatha, Niranjan Karre, Madugula Vamsi, Penumatcha Vikas
Published Paper ID: - IJCRT2303950
Register Paper ID - 233661
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2303950 and DOI :
Author Country : Indian Author, India, 521001 , Gudlavalleru, 521001 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303950 Published Paper PDF: download.php?file=IJCRT2303950 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303950.pdf
Title: DETECT AND DISPLAY THE SUBTERRANEAN FAILING OF CABLES USING IOT
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 3 | Year: March 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 3
Pages: i15-i23
Year: March 2023
Downloads: 144
E-ISSN Number: 2320-2882
This project aims to demonstrate the distance of a Subterranean cable defect from the main station through the internet. The implementation of Subterranean cables has various advantages over an overhead system, but the main disadvantage is that we cannot identify the specific site of the defect. When a defect occurs for whatever reason, the repair process for that individual cable is difficult due to the precise unknown location of the problem within the cable. This Internet of Things technology is used to determine the accurate location of the defect and convey data in graphical format to the website via an IOT module and accordingly in the LCD panel.. The classic idea of Ohms law is used in this paper.,Since resistance is proportional to the distance when a voltage is provided at the end , the current fluctuates depending on the location of defect in the cable. When a fault occurs occurs, the voltage between series resistors fluctuates according to the resistance, which varies with distance. This is then transmitted to generate precise digital data, which the programmed microcontroller detects and displays on the website in kilometres, along with the latitude and longitude
Licence: creative commons attribution 4.0
Fault Detection,ArduinoUno,Esp8266,Relays,GPS Module.
Paper Title: A PERCEPTIVE HYBRID MODEL FOR SPECIALIZED SYSTEM IN MALWARE DETECTION
Author Name(s): K. Sirisha, T. Muni Amala, N. Nikhil Chowdary, Y. Priyanka, K.Karthik
Published Paper ID: - IJCRT2303949
Register Paper ID - 233660
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2303949 and DOI :
Author Country : Indian Author, India, 517501 , CHITTOOR, 517501 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303949 Published Paper PDF: download.php?file=IJCRT2303949 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303949.pdf
Title: A PERCEPTIVE HYBRID MODEL FOR SPECIALIZED SYSTEM IN MALWARE DETECTION
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 3 | Year: March 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 3
Pages: i7-i14
Year: March 2023
Downloads: 137
E-ISSN Number: 2320-2882
Online social networks have become a popular means of communication for internet users, and as a result, harmful assaults that target these platforms are also on the rise. In this case, our goal is to build a hybrid specialized system that uses artificial intelligence and a fuzzy system technique to identify malware. Malicious assaults can cause harm to people and businesses by allowing crucial data to be completely altered or misrepresented while being transferred or stored on social media platforms. The hybrid model was put through malware detection tests that were made accessible in several public datasets in order to execute the fuzzy rules extraction and to confirm the effectiveness of the hybrid technique. It was contrasted in binary classification tests with artificial neural network models and hybrid models of fuzzy neural networks. The simulation findings show that the fuzzy neural network method to treating malware detection is workable and that it permits the construction of fuzzy rules that can help in the development of specialized systems. Next, utilizing the IPS-MD5 algorithm, we enhance it with the Text Mining and Op code-based learning method to stop the propagation of harmful software in social applications. As a result, the frequency of malicious assaults will decline.
Licence: creative commons attribution 4.0
Fuzzy Neural Networks, Machine Learning, Export Systems
Paper Title: Esther Morgan's "The Lost Word ": A Frantic Quest for a Feminist Identity
Author Name(s): Dr.Sunita Malik
Published Paper ID: - IJCRT2303948
Register Paper ID - 233622
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2303948 and DOI :
Author Country : Indian Author, India, 122009 , Gurugram, 122009 , | Research Area: Languages Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303948 Published Paper PDF: download.php?file=IJCRT2303948 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303948.pdf
Title: ESTHER MORGAN'S "THE LOST WORD ": A FRANTIC QUEST FOR A FEMINIST IDENTITY
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 3 | Year: March 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Languages
Author type: Indian Author
Pubished in Volume: 11
Issue: 3
Pages: i1-i6
Year: March 2023
Downloads: 433
E-ISSN Number: 2320-2882
Abstract Esther Morgan's poem "The Lost Word" is from her first collection ,Beyond Calling Distance. The very first line sets the theme and tone of the poem - "She's lost a word."The woman is desperately searching for a word she had used once upon a time, but now despite exerting much pressure on her brain, she cannot recall it; a powerful two-letter word the letter referred to here is "No."In a very subtle manner, the poem depicts a woman's powerlessness, even within the domestic space. The poem showcases her inability and inefficacy to say "no" to suggest how women are made to submit to patriarchal authority through gender conditioning. This paper focuses on how, through a short poem, Morgan draws attention to the desperation and helplessness a woman faces because she has lost her ability to say "no." She has forgotten to use the power to say "No" --a woman's struggle to find her tongue and language. The poem points out how women have been subjugated and suppressed everywhere due to patriarchy and its notions about not allowing women to have opinions and the freedom to deny. Gender inequality takes many forms, to fill a woman's mouth with someone else's language;(language is not just words, but within language lies one's nativity, dignity and culture), so much so that she forgets her language and, in the process, loses her capacity to refuse, refute and reject. The paper Esther Morgan's "The Lost Word": A Frantic Quest for a Feminist Identity" attempts to assert the need for a gender-neutral language where women can respond in negation and forging an identity for themselves.
Licence: creative commons attribution 4.0
No ,Inequality, Helplessness, Lost word ,Gender, Feminism
Paper Title: POLYHERBAL SHAMPOO POWDER
Author Name(s): Bhushan R. Pawar, Pooja Bhonde, Dr. Gajanan Sanap
Published Paper ID: - IJCRT2303947
Register Paper ID - 233659
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2303947 and DOI :
Author Country : Indian Author, India, 431111 , Aurangabad, 431111 , | Research Area: Pharmacy All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303947 Published Paper PDF: download.php?file=IJCRT2303947 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303947.pdf
Title: POLYHERBAL SHAMPOO POWDER
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 3 | Year: March 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Pharmacy All
Author type: Indian Author
Pubished in Volume: 11
Issue: 3
Pages: h995-h1003
Year: March 2023
Downloads: 141
E-ISSN Number: 2320-2882
The shampoo sector is probably the largest unit sale among the hair care products since shampoos are one of the cosmetic products used in daily life. Synthetic preservatives and detergents have sometimes been the cause of adverse effects among consumer. A more radical approach in reducing the synthetic ingredients is by incorporating natural extracts whose functionality is comparable with their synthetic ingredients. A shampoo is a cleaning aid for the hair and is counted among the foremost beauty products. Today's shampoo formulations are beyond the stage of pure cleaning of the hair. Additional benefits are expected, e.g. conditioning, smoothing of the hair surface, good health of hair, e.g. hair free of dandruff, dirt, grease and lice and, above all, it is safety benefits are expected. As the scalp is one of the most absorbent part of the body, product applied to the scalp go directly to the blood, without being filtered in any way. Formulation of shampoo must be safe and efficient for long use. The major objective of the present study was to formulate an herbal shampoo powder by means of eliminating harmful synthetic ingredients and substitutes them with natural ingredients. Our formulated herbal shampoo powder consists of fenugreek, hibiscus, ashwagandha , shikakai, amla, neem, reetha,cinnamon, kalonji , and rose petals in appropriate ratio.
Licence: creative commons attribution 4.0