IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.
ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)
| IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: Nature and Environment in the Dnyaneshwari
Author Name(s): Dr Bharati Khapekar
Published Paper ID: - IJCRT2009036
Register Paper ID - 198423
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2009036 and DOI :
Author Country : Indian Author, 440034, India , NAGPUR, India , | Research Area: Arts Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2009036 Published Paper PDF: download.php?file=IJCRT2009036 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2009036.pdf
Title: NATURE AND ENVIRONMENT IN THE DNYANESHWARI
DOI (Digital Object Identifier) :
Pubished in Volume: 8 | Issue: 9 | Year: September 2020
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Arts
Author type: Indian Author
Pubished in Volume: 8
Issue: 9
Pages: 274-282
Year: September 2020
Downloads: 1528
E-ISSN Number: 2320-2882
??????? ??? ??????? ????????????? ??? ???. ?? ???????? ????????? ??????? ?????? ???? ??? ?? ??? ??? ???? ??? ???? ?? ?????? ???? ????????? ????:???? ?????????? ??????? ???? ????. ?????, ?????, ????, ????, ????? ?????????? ????? ???, ???, ??????, ????? ??????? ?????? ??????? ???. ?? ?? ???????? ????? ???????????? ??????????? ?????? ????? ???. ???????????? ??? ???????? ??? ???. ????? ????????? ???? ??????????? ??????? ???? ?????????? ???? ?????????? ??????????? ???? ??????? ???? ???. ???????? ?? ????????? ??????????, ?????? ?????????? ?????? ?????? ???. ???????????????? ??????????? ????? ???? ????????????? ??????? ???. ??????????? ???????????????? ????????????? ????? ????? ???.
Licence: creative commons attribution 4.0
????????, ???????, ??????, ???????????
Paper Title: A STUDY OF FACTORS AFFECTING THE PERFORMANCE OF THE CONSTRUCTION PROJECT
Author Name(s): Rohan Ramesh Pandit, Vidhyasagar Moogi
Published Paper ID: - IJCRT2009035
Register Paper ID - 198420
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2009035 and DOI :
Author Country : Indian Author, 590001, belgaum , belagavi, belgaum , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2009035 Published Paper PDF: download.php?file=IJCRT2009035 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2009035.pdf
Title: A STUDY OF FACTORS AFFECTING THE PERFORMANCE OF THE CONSTRUCTION PROJECT
DOI (Digital Object Identifier) :
Pubished in Volume: 8 | Issue: 9 | Year: September 2020
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 8
Issue: 9
Pages: 270-273
Year: September 2020
Downloads: 1640
E-ISSN Number: 2320-2882
Construction project's success depends on how well it performs. There are many factors affecting construction performance resulting in construction delay or construction failure. The purpose of the study is to determine the factors influencing construction project efficiency, and to generate perceptions of their relative importance. The questionnaires have been distributed to main project participants. A systematic analysis of the literature has been implemented to produce a collection of variables that are thought to influence project performance. The findings of the survey show that the most significant factors influencing the success of a project are: escalation in material cost, quality and shortage of materials, safety training, technical capability of site engineer, positive attitude of project participants, climatic conditions and suggestions are made for addressing all of those factors.
Licence: creative commons attribution 4.0
Analysis, survey, performance
Paper Title: LESSONS ON GOOD LEADERSHIP FROM �DEVI MAHATMYA�
Author Name(s): Biswajit Satpathy
Published Paper ID: - IJCRT2009034
Register Paper ID - 198387
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2009034 and DOI :
Author Country : Indian Author, 768019, India , Sambalpur, India , | Research Area: Management Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2009034 Published Paper PDF: download.php?file=IJCRT2009034 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2009034.pdf
Title: LESSONS ON GOOD LEADERSHIP FROM �DEVI MAHATMYA�
DOI (Digital Object Identifier) :
Pubished in Volume: 8 | Issue: 9 | Year: September 2020
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Management
Author type: Indian Author
Pubished in Volume: 8
Issue: 9
Pages: 262-269
Year: September 2020
Downloads: 1607
E-ISSN Number: 2320-2882
Thousands of years before the introduction and the development of Modern Management Theories, Indian scriptures have discussed about the concept of good leadership that the present day researchers are talking about. Good leadership is the key to good governance and welfare of the nation and organizations. It is the virtues and values of the leaders, that shapes our society and organizations and therefore good leadership can only restructure our life. The Devi Mahatmya teaches the concept of good leadership through stories of fight between the Devi and the Demons, the good against the bad forces in a symbolic battlefield. Sri Swami Krishnananda explains that all the demons in the Devi Mahatmya are the indwelling bad forces like kama (lust), krodha (anger), lobha (greed), mada (pride), moha (attachment), and matsarya (jealousy)affecting our body, mind and soul. Devi kills these demons in us. Killing or controlling these forces can only one become a good leader. This paper uses hermeneutics a qualitative research methodology, which is the interpretation of an ancient or a classical literature. The paper explains the exotic meaning of Devi Mahatmya in the light of good leadership.
Licence: creative commons attribution 4.0
Good leadership; Symbolic Battlefield; Devi Mahatmya.
Paper Title: NUMERICAL ANALYSIS OF THE PERFORMANCE CHARACTERISTICS OF ELLIPTICAL CIRCULATING FLUIDIZED BED (CFB)
Author Name(s): Md.Taskeen Ahmad, Sujeet Kumar Singh
Published Paper ID: - IJCRT2009033
Register Paper ID - 198395
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2009033 and DOI :
Author Country : Indian Author, 462038, India , Bhopal, India , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2009033 Published Paper PDF: download.php?file=IJCRT2009033 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2009033.pdf
Title: NUMERICAL ANALYSIS OF THE PERFORMANCE CHARACTERISTICS OF ELLIPTICAL CIRCULATING FLUIDIZED BED (CFB)
DOI (Digital Object Identifier) :
Pubished in Volume: 8 | Issue: 9 | Year: September 2020
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 8
Issue: 9
Pages: 252-261
Year: September 2020
Downloads: 1574
E-ISSN Number: 2320-2882
This research work numerically analyze the elliptical CFB boiler tube model using Ansys 15.0. The detailed analysis has been done for performance parameters such as temperature distribution, heat transfer coefficient on elliptical CFB boiler tube models. The result has been compared with the reference paper reported in the literature. This paper also shows the comparison of elliptical CFB boiler tube with fin configured CFB model at constant temperature.
Licence: creative commons attribution 4.0
Ansys, Boiler, governing equation, boundary condition
Paper Title: EXPLORING THE APPLICATION OF PHULKARI IN INTERIOR DESIGN
Author Name(s): Lashkar Vineela, Srishti Srivastava
Published Paper ID: - IJCRT2009032
Register Paper ID - 198408
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2009032 and DOI :
Author Country : Indian Author, 500090, India , HYDERABAD, India , | Research Area: Other Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2009032 Published Paper PDF: download.php?file=IJCRT2009032 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2009032.pdf
Title: EXPLORING THE APPLICATION OF PHULKARI IN INTERIOR DESIGN
DOI (Digital Object Identifier) :
Pubished in Volume: 8 | Issue: 9 | Year: September 2020
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Other
Author type: Indian Author
Pubished in Volume: 8
Issue: 9
Pages: 248-251
Year: September 2020
Downloads: 1696
E-ISSN Number: 2320-2882
Mankind�s instinctual yearning to beautify habitats has been with us for as long as they want to have shelter. This creative practice was since primeval times giving meaning to build spaces. The folk art and craft � art that develops its styles, techniques, and subject matters within the culture and history of a country & its people. This paper discusses the potential of application of the folk art and craft work of Punjab i.e. Phulkari in design. It begins with summarizing the fundamental techniques used and application they had so far in the field of art. The main objective is to analyze incorporation of phulkari work in the interior spaces and improve the performance of it in line with the humanitarian needs of the user. As phulkari is cultural craft it can lay vital foundation in art and architecture that can take up in developing inherently pleasing, elegant and lasting design. This is achieved by making sandwiched panels with phulkari cloths where the recycled paper is used to make threads of desired colors. Utilization of such art in interiors broadens the horizon of the artist and art itself, as this craft is practiced by young girls and women in villages of Punjab, this increase the scope of their employment and helps in empowering women to be entrepreneur with the skills they have been practicing since ages. As for the interiors every wall can be baag � �a garden� which is the gist of phulkari
Licence: creative commons attribution 4.0
folk art and craft, phulkari, sandwich panels, paper threads, sustainability, interiors, lasting design
Paper Title: INVENTION OF NEW DIAGNOSTIC ELECTRONIC STETHOSCOPE
Author Name(s): Wani sageer, Binti-islam, Hilal Ahmed Hajam, Aamir Reyaz shieikh
Published Paper ID: - IJCRT2009031
Register Paper ID - 198390
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2009031 and DOI :
Author Country : Indian Author, India, 190006 , Srinagar, 190006 , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2009031 Published Paper PDF: download.php?file=IJCRT2009031 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2009031.pdf
Title: INVENTION OF NEW DIAGNOSTIC ELECTRONIC STETHOSCOPE
DOI (Digital Object Identifier) :
Pubished in Volume: 8 | Issue: 9 | Year: September 2020
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 8
Issue: 9
Pages: 241-247
Year: September 2020
Downloads: 1747
E-ISSN Number: 2320-2882
The present invention was directed to a stethoscope system, which includes a local stethoscope unit with a chest piece assembly to generate a first analog auscultation signal and two inches PVC tubing which also acts as a mechanical low pass filter and prevents external scratching noise of hand during auscultation. A diaphragm of acoustic capacitive transducer is to receive the first analog auscultation signal. The present invention also is directed to a stethoscope system comprising a capacitive microphone unit. One novel feature of the device of the present invention is the use in the stethoscope units of a low frequency boost to improve the low frequency response down to approximately 20 Hz. The switchable bell/diaphragm and extension mode enables to auscultate a desired sound frequency performance bandwidth and for enhanced the bell-diaphragm characteristics of a traditional stethoscope. Another novel feature of invention is that it provides an efficient, low cost, low noise stethoscope system using a low cost low noise op amp. Another feature of the present invention is that it provides conversion of arterial sounds into graphic output via PC based oscilloscope software which leaves less chance of observation error.
Licence: creative commons attribution 4.0
auscultation, acoustic, capacitive, transducer, traditional, stethoscope.
Paper Title: ADOPTION OF PHYSICAL SECURITY FOR INFORMATION SYSTEMS IN UNIVERSITIES IN KENYA
Author Name(s): Ms Jane Akello Juma , Dr. Charles Ochieng
Published Paper ID: - IJCRT2009030
Register Paper ID - 198019
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2009030 and DOI :
Author Country : N, -, - , -, - , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2009030 Published Paper PDF: download.php?file=IJCRT2009030 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2009030.pdf
Title: ADOPTION OF PHYSICAL SECURITY FOR INFORMATION SYSTEMS IN UNIVERSITIES IN KENYA
DOI (Digital Object Identifier) :
Pubished in Volume: 8 | Issue: 9 | Year: September 2020
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: N
Pubished in Volume: 8
Issue: 9
Pages: 233-240
Year: September 2020
Downloads: 1599
E-ISSN Number: 2320-2882
Information systems are increasingly becoming important facilitators of efficiency in academic and administrative services delivery in universities world-wide as well as in Kenya. To meet the requirements of confidentiality, availability and integrity of the information systems, universities need to ensure physical security of these systems. This study specifically investigated the implementation levels of physical security measures employed by the randomly sampled private and public universities in Kenya. Questionnaires were used to collect data from purposively sampled university staff members, the data was then analyzed, interpreted and presented using both qualitative and quantitative methods. Data was analyzed to yield frequencies which were expressed into percentages for better understanding. Results revealed that while physical security mesures for information facilities are employed by a lot of the universities, most vital aspects like signage implemetation, ICT asset register, and recovery of portable devices is widely not practiced. The paper recommends better implemetation of physical security safeguards for university information systems. Further emanating research areas from the research study are discussed.
Licence: creative commons attribution 4.0
University Information Systems, Physical security measures, operation areas, IT Security.
Paper Title: NETWORK SECURITY IMPLEMENTATION: A CASE OF PUBLIC AND PRIVATE UNIVERSITIES IN KENYA.
Author Name(s): Dr. Charles Ochieng, Mr. Francis Onyango
Published Paper ID: - IJCRT2009029
Register Paper ID - 198023
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2009029 and DOI :
Author Country : N, -, - , -, - , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2009029 Published Paper PDF: download.php?file=IJCRT2009029 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2009029.pdf
Title: NETWORK SECURITY IMPLEMENTATION: A CASE OF PUBLIC AND PRIVATE UNIVERSITIES IN KENYA.
DOI (Digital Object Identifier) :
Pubished in Volume: 8 | Issue: 9 | Year: September 2020
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: N
Pubished in Volume: 8
Issue: 9
Pages: 221-232
Year: September 2020
Downloads: 1571
E-ISSN Number: 2320-2882
While many scholars emphasize the importance of IT security management, existing studies hardly delve into the implementation of computer network security in institutions of higher learning. This study was conducted in the context of universities in Kenya, where it aimed at investigating the levels of implementation of IT security network key performance indicators KPIs. Questionnaires were as data collecting tools from university staff members. Collected data were analyzed to yield frequencies that were expressed in percentages and presented in tabular format. Results showed that while network security is vital for system security management, many universities have not adequately implemented vital aspects of network security. Further, in some universities where security appliances have been adopted, network penetration testing has never been done and WIFI access is available through single universal password for any user. Therefore, it is recommended that network security KPIs ought to be adopted in all universities to ensure improved information systems security management.
Licence: creative commons attribution 4.0
network security, information systems security, user-group, ICT security
Paper Title: THE SITUATION OF INFORMATION TECHNOLOGY SECURITY POLICY IN UNIVERSITIES IN KENYA
Author Name(s): Dr. Charles Ochieng, Mr. Stephen Ochieng
Published Paper ID: - IJCRT2009028
Register Paper ID - 198022
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2009028 and DOI :
Author Country : N, -, - , -, - , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2009028 Published Paper PDF: download.php?file=IJCRT2009028 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2009028.pdf
Title: THE SITUATION OF INFORMATION TECHNOLOGY SECURITY POLICY IN UNIVERSITIES IN KENYA
DOI (Digital Object Identifier) :
Pubished in Volume: 8 | Issue: 9 | Year: September 2020
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: N
Pubished in Volume: 8
Issue: 9
Pages: 212-220
Year: September 2020
Downloads: 1585
E-ISSN Number: 2320-2882
Despite assertion by many scholars that IT security is instrumental in the management of system security, existing studies hardly delve into the adoption, sensitization and implementation IT security policy in organizations. This survey conducted in the context of universities in Kenya aimed to assess the availability of IT security policy, IT security training and policy sensitization, and levels of implementation of IT security policys KPIs. Questionnaires were used to collect data from university staff members, then the data was analyzed using Microsoft Excel to yield frequencies which were expressed into percentages for ease of understanding. Results showed that while IT security policy is vital in system security management, many universities have not adopted it. Further, many staff members are neither trained, nor sensitized on IT security policy. Therefore, it is recommended that IT security policy with relevant KPIs ought to be adopted in all universities, staff trained and sensitized on the security policy for better information systems security management.
Licence: creative commons attribution 4.0
IT security policy, information systems, policy trainin and sensitization.
Paper Title: SECURITY OF CRITICAL DATA IN UNIVERSITIES.
Author Name(s): Mr. Stephen Ochieng , Dr. Charles Ochieng
Published Paper ID: - IJCRT2009027
Register Paper ID - 198020
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2009027 and DOI :
Author Country : N, -, - , -, - , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2009027 Published Paper PDF: download.php?file=IJCRT2009027 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2009027.pdf
Title: SECURITY OF CRITICAL DATA IN UNIVERSITIES.
DOI (Digital Object Identifier) :
Pubished in Volume: 8 | Issue: 9 | Year: September 2020
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: N
Pubished in Volume: 8
Issue: 9
Pages: 203-211
Year: September 2020
Downloads: 1548
E-ISSN Number: 2320-2882
Organizational critical data is essential for her core operations and stability of financial operations. Maintaining security of critical data in organizations has been scholarly and industrially emphasized in many cases. Nevertheless, studies focusing on highlighting university critical data and implementation of the key elements of the data security in institutions of higher learning is still inadequate. This study was conducted within computing context of universities in Kenya, where it aimed at investigating the critical data and the levels of implementation of key aspects of data security. Questionnaires were used for data collection from staff members who were mainly sectional heads of user departments and information systems administrators. The data analysis produced statistical values needed to address the study objectives. Results showed that academic and financal related data were considered as critical data in the university. Furthermore, it was found that many universities have fairly implemented vital aspects of data security. However, in some universities, data security practices were found to be inadequate. For example, use of portable external storage devices to tranfer files between computers and malware menace. Therefore, it is recommended that universities ought to ensure security practices for critical data for better information systems security management. The study also recommends that IT security policies should include critical data security for a given organization.
Licence: creative commons attribution 4.0
data security, critical data, data back-up, data retrieval, data encryption, information systems security, user priviledge, ICT security

