Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 12 | Issue 12 | December 2024

Volume 12 | Issue 12 | Month December 2024  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6)OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: AUTOMATING FLOWER RECOGNITION: A CONVOLUTIONAL NEURAL NETWORK APPROACH

  Author Name(s): Mugi Ganesh, Mr. G. Rajasekharam, Tata Narasimha Murthy

  Published Paper ID: - IJCRTAS02022

  Register Paper ID - 274201

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRTAS02022 and DOI :

  Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTAS02022
Published Paper PDF: download.php?file=IJCRTAS02022
Published Paper PDF: http://www.ijcrt.org/papers/IJCRTAS02022.pdf

  Your Paper Publication Details:

  Title: AUTOMATING FLOWER RECOGNITION: A CONVOLUTIONAL NEURAL NETWORK APPROACH

 DOI (Digital Object Identifier) :

 Pubished in Volume: 12  | Issue: 12  | Year: December 2024

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 12

 Issue: 12

 Pages: 179-186

 Year: December 2024

 Downloads: 73

  E-ISSN Number: 2320-2882

 Abstract

The goal of this paper is to identify flower varieties in conjunction with Kaggle Flowers dataset employing Convolutional Neural Networks (CNNs). The dataset contains images of five classes of flowers being, daisy, dandelion, rose, sunflower, and tulip. A classifier based on CNN was developed based on 4323 images and was able to attain a classification accuracy rate of 99.09%. The framework displays an efficient interface where users can upload images of flowers with hopes of obtaining an accurate classification. The model performance was improved by implementing data augmentation and multi-level design of CNN enabling the model to accommodate images variability. This application is useful in areas such as botany, gardening and retail sector because it helps people to use images in identifying and selecting their opportunities faster and more accurately. The project demonstrates the efficiency of CNN networks as applied in image classification and their future use into practice.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: COST-EFFECTIVE DROWSINESS DETECTION WITH ADAPTIVE VISUAL BEHAVIOR ANALYSIS

  Author Name(s): Vanapalli Likhitha, Mr. Koppala K V P Sekhar, Dr. LekkalaChinnnari

  Published Paper ID: - IJCRTAS02021

  Register Paper ID - 274213

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRTAS02021 and DOI :

  Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTAS02021
Published Paper PDF: download.php?file=IJCRTAS02021
Published Paper PDF: http://www.ijcrt.org/papers/IJCRTAS02021.pdf

  Your Paper Publication Details:

  Title: COST-EFFECTIVE DROWSINESS DETECTION WITH ADAPTIVE VISUAL BEHAVIOR ANALYSIS

 DOI (Digital Object Identifier) :

 Pubished in Volume: 12  | Issue: 12  | Year: December 2024

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 12

 Issue: 12

 Pages: 172-178

 Year: December 2024

 Downloads: 54

  E-ISSN Number: 2320-2882

 Abstract

Drowsy driving is one of the major causes of road accident and fatalities. This paper proposes a low-cost, a real-time, driver drowsiness detection system through webcam based behavioral analysis and technologically modified software. Facial features are defined to evaluate anthropometric measures such as eye aspect ratio (EAR) and Mouth Creating Ratio (MAR). Adaptive thresholding is used to identify prolonged eye closure or yawning where drowsiness is likely to set in. It deploys a learning of classification Support Vector Machines (SVM) that detects and recognizes images for later use offline achieving 95.58% sensitivity and 100% specificity. Such a system is non-obtrusive and cost effective thereby reducing the risk of drowsy driving. Future work should involve embedding into car systems and evaluation based on the actual driving experience.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

MAR, Drowsy, SVM

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: MACHINE LEARNING APPROACH TO IDENTIFYING AND COMBATING CHILD PREDATORS ON SOCIAL MEDIA

  Author Name(s): Gudivada Mahesh, Mrs. A. Naga Durga Bhavani, Dasari Karthik Raj

  Published Paper ID: - IJCRTAS02020

  Register Paper ID - 274214

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRTAS02020 and DOI :

  Author Country : Indian Author, India, - , --, - , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTAS02020
Published Paper PDF: download.php?file=IJCRTAS02020
Published Paper PDF: http://www.ijcrt.org/papers/IJCRTAS02020.pdf

  Your Paper Publication Details:

  Title: MACHINE LEARNING APPROACH TO IDENTIFYING AND COMBATING CHILD PREDATORS ON SOCIAL MEDIA

 DOI (Digital Object Identifier) :

 Pubished in Volume: 12  | Issue: 12  | Year: December 2024

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 12

 Issue: 12

 Pages: 165-171

 Year: December 2024

 Downloads: 56

  E-ISSN Number: 2320-2882

 Abstract

Children are increasingly becoming vulnerable to cyber harassment and predatory behavior on social media. Hence, this project aims to enhance the online safety of children by building a system which uses machine learning algorithms to detect and combat online harassment. The developed system integrates various supervised learning algorithms namely, support vector machine, random forest, naive bayes, k nearest neighbors and decision tree. Upon analyzing user content, the algorithm seeks possible abuse potential regarding posts and messages. Numerous harassing and non-harassing texts are included in the dataset which is used to create algorithms for prediction of such actions in real time. The system will first send alerts to a designated authority within the cyber cell every time, austere patterns are observed. This way, no time is wasted in the intervention. The system further enables providing a quicker and reasonable approach to tackle the issues that come up with young people by ensuring their safety as much as possible.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

K-Nearest Neighbors, SVM, Decision Tree

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: HIGH-QUALITY IMAGE RECONSTRUCTION USING DEEP LEARNING TECHNIQUES

  Author Name(s): Ayti Shanmukha Sai Vamsi, Dr. T. Ravi Babu, Dr. Chukkala Visweswara Rao

  Published Paper ID: - IJCRTAS02019

  Register Paper ID - 274197

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRTAS02019 and DOI :

  Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTAS02019
Published Paper PDF: download.php?file=IJCRTAS02019
Published Paper PDF: http://www.ijcrt.org/papers/IJCRTAS02019.pdf

  Your Paper Publication Details:

  Title: HIGH-QUALITY IMAGE RECONSTRUCTION USING DEEP LEARNING TECHNIQUES

 DOI (Digital Object Identifier) :

 Pubished in Volume: 12  | Issue: 12  | Year: December 2024

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 12

 Issue: 12

 Pages: 158-164

 Year: December 2024

 Downloads: 56

  E-ISSN Number: 2320-2882

 Abstract

The goal of this paper is to boost the resolution of images using Convolutional Neural Networks (CNN) along with the auto-encoder layers. This method trains the CNN model with pairs of low-resolution and high-resolution images so that it can learn to improve the pixel values of low-quality images. The pixel values of low-intensity pixels are replaced with high-intensity pixels and a high-resolution image is generated. The intention of the system is to provide effective enhanced images that can be used in a variety of fields including medicine, satellite, and surveillance images. We propose our own dataset and code to emphasize the focus on the novelty while ensuring the efficacy. Having conducted a number of tests, the project brings forth enhancement in the quality of the reconstructed image which depicts the superiority of auto-encoders and CNNs as promising tools for further developments in super-resolution imaging technology.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CNN, Auto-encoder

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: AUTOMATED FORENSIC ANALYSIS OF SCANNED IMAGES VIA ELA AND CNNS

  Author Name(s): Boddeti Nagendra Kumar, Mr. N Mahendra, Maradana Siva

  Published Paper ID: - IJCRTAS02018

  Register Paper ID - 274199

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRTAS02018 and DOI :

  Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTAS02018
Published Paper PDF: download.php?file=IJCRTAS02018
Published Paper PDF: http://www.ijcrt.org/papers/IJCRTAS02018.pdf

  Your Paper Publication Details:

  Title: AUTOMATED FORENSIC ANALYSIS OF SCANNED IMAGES VIA ELA AND CNNS

 DOI (Digital Object Identifier) :

 Pubished in Volume: 12  | Issue: 12  | Year: December 2024

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 12

 Issue: 12

 Pages: 151-157

 Year: December 2024

 Downloads: 41

  E-ISSN Number: 2320-2882

 Abstract

The focus of this work relates to the identification and tampering detection of forensic scanners through deep neural production techniques. Tools built on convolution neural networks (CNNs) and the CASIA dataset are employed to determine which type of scanner was used to create an image and locate portions that were edited. Among others, processes involve transforming the photographs into error level analysis (ELA) images in order to accentuate the inconsistencies and training a CNN in a procedure where the CNN architecture is optimized. The system achieves promising levels of performance and is thus appropriate for distinguishing between images that are or are not altered. As demonstrated by the series of experiments, the model was able to withstand different circumstances and enabled accuracy of over 82% during validation. This work has a considerable contribution to automated media forensics since it solves the problem of scanner identification and digital manipulation detection in an effective and scalable manner.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CNN, ELA, SCANNER

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: EFFICIENT ACTIVITY RECOGNITION: A HYBRID CNN-GRU-BIDIRECTIONAL APPROACH

  Author Name(s): Ganteda Roop Kumar, Mrs. P. Sailaja, Dr Surya Narayana Gorle

  Published Paper ID: - IJCRTAS02017

  Register Paper ID - 274200

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRTAS02017 and DOI :

  Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTAS02017
Published Paper PDF: download.php?file=IJCRTAS02017
Published Paper PDF: http://www.ijcrt.org/papers/IJCRTAS02017.pdf

  Your Paper Publication Details:

  Title: EFFICIENT ACTIVITY RECOGNITION: A HYBRID CNN-GRU-BIDIRECTIONAL APPROACH

 DOI (Digital Object Identifier) :

 Pubished in Volume: 12  | Issue: 12  | Year: December 2024

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 12

 Issue: 12

 Pages: 143-150

 Year: December 2024

 Downloads: 40

  E-ISSN Number: 2320-2882

 Abstract

This paper presents the design of a multiscale convolutional neural network (MCNN) for the task of human behavior recognition, with the aim of increasing accuracy and reducing complexity of the model. Previous models such as CNN2D and LSTM time series modeling relied on a mean global average but neglected other spatial and depth features resulting in inaccuracies. The MCNN model is based on the concept of space-time interaction and depth-separable convolution modules inserted into a CNN3D model in which both the spatial and temporal information are enhanced. The system was trained and evaluated on the UCI HAR dataset which has six activity labels that were recorded using smartphone's sensors. The evaluation showed that the new model offered a 94% accuracy rate while improving learning complexity. An extended hybrid model comprising of a combination of convolutional neural networks, Gated recurrent units, and bidirectional algorithms produced an accuracy of 96% while using less parameters thus showing tremendous effectiveness and capability for real world tasks.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

MCNN, GRU,CNN2D

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: SECURING DATA COMMUNICATION THROUGH HEBBIAN RULE NEURAL NETWORK ALGORITHMS

  Author Name(s): Pedapati Sai, Mr. N Mahendra, Dr. Bommana Indu

  Published Paper ID: - IJCRTAS02016

  Register Paper ID - 274202

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRTAS02016 and DOI :

  Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTAS02016
Published Paper PDF: download.php?file=IJCRTAS02016
Published Paper PDF: http://www.ijcrt.org/papers/IJCRTAS02016.pdf

  Your Paper Publication Details:

  Title: SECURING DATA COMMUNICATION THROUGH HEBBIAN RULE NEURAL NETWORK ALGORITHMS

 DOI (Digital Object Identifier) :

 Pubished in Volume: 12  | Issue: 12  | Year: December 2024

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 12

 Issue: 12

 Pages: 136-142

 Year: December 2024

 Downloads: 41

  E-ISSN Number: 2320-2882

 Abstract

Protection of data in digital communication is important to avoid any tampering especially for information of sensitive nature like financial or personal details. The branch of mathematics known as cryptography is concerned with the processes of encryption and decryption which allows secure communication across open and untrustworthy channels. In this project, auto-associative neural networks based on Hebb's rule are proposed to advance cryptographic processes. The system issues keys for encryption, teaches neural networks to encode-decode data streams, and measures the effectiveness of the system in terms of accuracy and time factors. To prevent data from the growing range of threats, the frameworks formulates protection with neural network flexibility. The system also provides the user with a graphical display so that recording and playback is performed automatically. Such method indicates the prospect of use of neural networks for the improvement of ordinary codes and ciphers, and focuses a number of challenges emerging from the contemporary information security.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cryptography, encryption, decryption

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: EVALUATING MACHINE LEARNING TECHNIQUES FOR BANKNOTE AUTHENTICATION

  Author Name(s): Puti Deepthi, Dr. A. Arjuna Rao, Jallu Latha

  Published Paper ID: - IJCRTAS02015

  Register Paper ID - 274203

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRTAS02015 and DOI :

  Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTAS02015
Published Paper PDF: download.php?file=IJCRTAS02015
Published Paper PDF: http://www.ijcrt.org/papers/IJCRTAS02015.pdf

  Your Paper Publication Details:

  Title: EVALUATING MACHINE LEARNING TECHNIQUES FOR BANKNOTE AUTHENTICATION

 DOI (Digital Object Identifier) :

 Pubished in Volume: 12  | Issue: 12  | Year: December 2024

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 12

 Issue: 12

 Pages: 127-135

 Year: December 2024

 Downloads: 44

  E-ISSN Number: 2320-2882

 Abstract

All traditional economic control has been nullified due to the existence of counterfeit currency, everywhere across the globe. Counterfeit detection using Decision Tree, Random Forest, SVM, Naives Bayes, and other approaches have been used by researchers in the recent past to test fake banknotes. A survey of UCI repository showed that some features were missing and a certain amount of data was pre-processed before model training. A number of splits in the training and testing samples were created and the algorithms were assessed and trained on parameters such as accuracy, precision, recall and F1 score. The outcomes have shown the strength of specific models such as Random Forest that almost achieved satisfactory classification accuracy and can be used in real-life applications within banking kiosks and ATMs. The research further highlights with facts, the need for automated systems which can curb financial fraud and the methodologies required to put in place an effective counterfeit detection machine learning system.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: DETECTING AND MITIGATING MALICIOUS ATTACKS IN FACIAL AUTHENTICATION SYSTEMS

  Author Name(s): Therikoti Madhavi, Dr. S. Sridhar, Dr. Chukkala Visweswara Rao

  Published Paper ID: - IJCRTAS02014

  Register Paper ID - 274204

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRTAS02014 and DOI :

  Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTAS02014
Published Paper PDF: download.php?file=IJCRTAS02014
Published Paper PDF: http://www.ijcrt.org/papers/IJCRTAS02014.pdf

  Your Paper Publication Details:

  Title: DETECTING AND MITIGATING MALICIOUS ATTACKS IN FACIAL AUTHENTICATION SYSTEMS

 DOI (Digital Object Identifier) :

 Pubished in Volume: 12  | Issue: 12  | Year: December 2024

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 12

 Issue: 12

 Pages: 116-126

 Year: December 2024

 Downloads: 38

  E-ISSN Number: 2320-2882

 Abstract

Security concerns have arisen in today's society as a result of using facial recognition systems that use deep learning model due to some feature being artificially manipulated. This paper revisits the question of how image manipulation in the form of social media filters for a facial feature or a facial expression impacts the recognition performance of models such as ResNet, MobileNet and InceptionV3. It was found that the recognition accuracy drops from 75% on unaltered images to 50% on altered images, thereby validating the observed weakness across the three architectures. Furthermore, a more advanced version VGG16 demonstrated to be more effective with 85% accuracy on altered images. This paper investigated these problems and proposed GRADCAM for heatmap analysis demonstrating why certain images with known resistive properties cannot be used to repulse such attacks, while also discussing possible countermeasures for protecting biometric systems.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

VGG16, MobileNet, biometric

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: LBP AND CNN FUSION FOR ROBUST FAKE IMAGE DETECTION

  Author Name(s): Gandreti Krishnaveni, Mr. N Mahendra, Pinninti Suresh Babu

  Published Paper ID: - IJCRTAS02013

  Register Paper ID - 274205

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRTAS02013 and DOI :

  Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTAS02013
Published Paper PDF: download.php?file=IJCRTAS02013
Published Paper PDF: http://www.ijcrt.org/papers/IJCRTAS02013.pdf

  Your Paper Publication Details:

  Title: LBP AND CNN FUSION FOR ROBUST FAKE IMAGE DETECTION

 DOI (Digital Object Identifier) :

 Pubished in Volume: 12  | Issue: 12  | Year: December 2024

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 12

 Issue: 12

 Pages: 110-115

 Year: December 2024

 Downloads: 45

  E-ISSN Number: 2320-2882

 Abstract

Biomedical imaging forgeries pose a challenge to social networks and forensics. It is becoming harder to tell these images apart from the real ones. This project employs a set of machine learning approaches, that CNN uses to solve the problem. A network called LBPNET is built with local binary patterns (LBP) for texture feature extraction. The parameters extracted through the LBP are used to train the CNN which learns the difference between real and fake face images. Advanced image preprocessing and training are integrated into the model in order to ensure high performance in a situation whereby real-time decision making has to occur. This work averts the threat that image forgeries bring to different sectors.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CNN, LBP, images

  License

Creative Commons Attribution 4.0 and The Open Definition



Call For Paper January 2025
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A digital object identifier by DOI.one How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer