PH: +91-9888934889 E-Mail: editornrjitis@gmail.com ISSN: 2350-1278

National Research Journal of Information Technology & Information Science

An International Reputed Peer Reviewed Refereed Research Journal I Open Access Journal I Impact Factor: 7.9

Submit Papers Online
  • Home
  • Current Issue
  • Archives
  • Editorial Board
  • Submit Paper
  • Indexing
  • Research Areas
  • Author Instructions
  • For Authors
    • Manuscript Guidelines
    • Copyright Agreement Form
    • View Paper Template
  • Subscribe Journal
  • Contact
Business Economics
Sales And Marketing
Human Resource Management
Banking And Finance
Information Technology And Information Science
Education And Psychology
Biotechnology And Biosciences
Literary Aesthetics
Social Science
Business Economics Sales And Marketing Human Resource Management Banking And Finance Social Science
Information Technology And Information Science Education And Psychology Biotechnology And Biosciences Literary Aesthetics
Research Paper Issues | NRJITIS - National Research Journal of Information Technology & Information Science

Archives

  • Home /
  • Archives

Archives Volume-5, Issue-1 (January-June)

TABLE OF CONTENTS

Paper Title:
CASE STUDIES OF CYBERCRIMES IN INDIA
Author Name:
Amanpreet Kaur
Country:
India
Page No.:
1-14
View PDF
CASE STUDIES OF CYBERCRIMES IN INDIA
Author: Amanpreet Kaur

Computer crime, or Cybercrime, refers to any crime that involves a computer and a
network. Net crime is criminal exploitation of the Internet. Issues surrounding these
types of crimes have become high-profile, particularly those surrounding cracking,
copyright infringement, child pornography, and child grooming. There are also
problems of privacy when confidential information is lost or tampered. In 2010, the
top
ten
reported cybercrimes to the IC3 were 1. Non-delivery
payment/merchandise—14.4 percent of the sellers/purchasers did not receive
payment/merchandise.2. FBI-related scams—13.2percent of criminals pose as the
FBI to defraud victims.3. Identity Theft—9.8 percent were unauthorized use of
personal identifying information to commit crimes.4. Computer crimes—9.1 percent
were crimes that target a computer or were facilitated by acomputer.5.
Miscellaneous fraud—8.6percent of scams and fraud included sweepstakes and
work from- home scams.6. Advance fee fraud—7.6 percent were the Nigerian letter
scam.7. Spam—6.9 percent of users received unsolicited, mass produced bulk
messages.8. Auction fraud—5.9 percent was fraudulent or misleading information in
the context of an online auction site. 9. Credit card fraud—5.3 percent was
fraudulent charging of goods and/or services to a victim’s account. 10.
Overpayment fraud—5.3 percent of victims deposited bad. Here are the few cases
registered with the cybercrime.

Paper Title:
REVIEW ON POMEGRANATE DESEEDER
Author Name:
Amarpreet Singh
Country:
India
Page No.:
15-18
View PDF
REVIEW ON POMEGRANATE DESEEDER
Author: Amarpreet Singh

Here we have introduce device which is based on scientific principle of machine . it
is cheap simple and maintenance free that is produced as result of project work .
The existing with of pomegranate deseeding in agricultural industry consist of
remove the seed by hand which is totally manually and not effective as well as time
consuming ,as far as cost aspect as concerned to require the deseeder equipment
serves as cheaper as compared to human labour. the operating of this device is law a
is require only single person to as compared to manual method. Its maintenance cost
is about negligible as its require only periodic lubrications.

Paper Title:
OVARIAN CANCER STAGE BASED DETECTION ON CONVOLUTIONAL NEURAL NETWORK
Author Name:
Beant Kaur, Kulvinder Singh Mann, Manpreet Kaur Grewal
Country:
India
Page No.:
19-30
View PDF
OVARIAN CANCER STAGE BASED DETECTION ON CONVOLUTIONAL NEURAL NETWORK
Author: Beant Kaur, Kulvinder Singh Mann, Manpreet Kaur Grewal

Ovarian disease is the fifth most regular tumor influencing ladies today. Actually,
ovarian disease is responsible for a greater number of passing than whatever other
sort of female regenerative malignancy. According to the American Disease Society,
20,000 ladies are related to ovarian tumor consistently.
Ovarian malignancy is a tumor that starts in the ovaries. The ovaries are female
generative organs set inside the pelvis, generally the measurements of partner
degree almond.
Fig .1 Anatomy of Women Organ[2]
New cells will start to shape superfluously, and old cells won't bite the dust at the
correct time. This overabundance cell development could cause a tumor, which
might be considerate or harmful. Harmful tumors are destructive and could be life
debilitating. In specific cases, threatening diseases can be isolates, yet quite possibly
they could deliver back. Malignancy cells can likewise spread to different parts of
the body and prompt genuine inside damage [1].

Paper Title:
ARE THE WEIGHTS OF BASIC CONTROL STRUCTURES OF SOFTWARE UNIVERSAL OR NOT?
Author Name:
Leena Jain, Satinderjit Singh
Country:
India
Page No.:
31-41
View PDF
ARE THE WEIGHTS OF BASIC CONTROL STRUCTURES OF SOFTWARE UNIVERSAL OR NOT?
Author: Leena Jain, Satinderjit Singh

Software‟s are inherently complex in nature. J.V. Guttag‟s [1] assertion that “large
software system are among the most complex systems engineered by man” seems to
be perfectly valid. For the Large Software projects the complexity may easily grow
out of the intellectual manageability of an individual in the team at any level. It is no
surprise that there is big failure rate for large-scale software projects. However there
are many types of complexity. The notion of Machine complexity or Algorithmic
complexity is different from human cognitive complexity of software. What may be
easy in terms of Algorithmic complexity of software may well be difficult in terms of
human comprehension or vice versa. Most of earlier complexity measures of
software were basically dealing with the algorithmic complexity only.

Paper Title:
CYBER BULLYING IN INDIA: CONSEQUENCES AND REMEDIES
Author Name:
Vijay Kumar & Majid Sadeeq
Country:
India
Page No.:
42-50
View PDF
CYBER BULLYING IN INDIA: CONSEQUENCES AND REMEDIES
Author: Vijay Kumar & Majid Sadeeq

Internet has changed every sphere of life, by bringing information available to vast
strata of the society. Technology has made things so easy that People around the
world can connect to each other with just click of the button. With the advancement
in technology, all the activities of the world have been shifted to virtual world.
People not only depend on internet for school, college projects but they use it for
overcoming their frustration and aggression which is not possible in offline mode.
Over the last decade, technology has become increasingly important in the lives of
adolescents. Adolescents are heavy users of electronic communication such as
instant messaging, e-mail, and text messaging. They are also heavy users of
communication oriented internet sites such as blogs, social networking sites for
sharing photos and videos. The internet offers connectivity to friends and family and
access to information. However, as with other social environments, the potential to
meet and interact with others in harmful ways exists. One such interaction of
growing concern is called Cyber-Bullying. It has the long lasting impact as it hurts
the self-image or threatens, or ha harms the privacy of an individual.

Paper Title:
SOFTWARE DESIGN ISSUES- INFORMATION SYSTEMS ANALYSIS
Author Name:
Vijay Kumar Sharma
Country:
India
Page No.:
51-56
View PDF
SOFTWARE DESIGN ISSUES- INFORMATION SYSTEMS ANALYSIS
Author: Vijay Kumar Sharma

The final aim of research in software designing is to improve the quality and
productivity associated with both the products and processes of software
development. The foreseen benefits are improvements in the organization of the
development process, increases in user’s satisfaction, and the delivery of superior
functionality to the market place in the structure of software and related products. A
number of software designing paradigms, approaches and methodologies be present
today. Although the object-oriented (OO) paradigm still remains one of most
popular, it is gradually replaced by the aspect-oriented (AO) because of the concern
crosscutting problem. Some of the major problems associated with the automation of
software development occur with respect to requirements specification, design,
reusability, maintenance, validation, verification, and testing.

Paper Title:
COLOR ANALYSIS OF REHYDRATED AND DRIED PRETREATED SWEET POTATOES
Author Name:
Gagan Jyot Kaur, A K Singh, Manpreet Singh and Preetinder Kaur
Country:
India
Page No.:
57-63
View PDF
COLOR ANALYSIS OF REHYDRATED AND DRIED PRETREATED SWEET POTATOES
Author: Gagan Jyot Kaur, A K Singh, Manpreet Singh and Preetinder Kaur

Sweet potato (Ipomoea batatas L.) is a large, starchy, sweet-tasting, tube root
belonging to the family Convolvulaceae and distantly related to the
potato(Solanumtuberosum).It is an excellent source of carbohydrates, vitamin A, caro
tene, calcium, phosphorus and a fair source of thiamine and iron. It is an inexpensive
but rich source of energy, high in carbohydrates and is called poor man food. It is the
seventh most important crop grown in 111 countries around the world. China is the
largest producer with 68.6% share of sweet potato production in the world and India
holds the eighth position.

Paper Title:
BLUE EYES TECHNOLOGY
Author Name:
Gurpreet Kaur
Country:
India
Page No.:
64-68
View PDF
BLUE EYES TECHNOLOGY
Author: Gurpreet Kaur

In future, you can interact with your computer and you can talk, listen and even
scream aloud with your computer. It can be done with the help of speech and face
recognition techniques. If you ask your computer to dial to your friend or relative at
his home or office then it does this with the help of mouse and dials your friend or
relative at his home or office and establishes a connection. So Blue Eyes technology
creates computational machines that have perceptual and sensory ability like those
of human beings. It uses non-obtrusive sensing method employing most modern
video cameras and microphones to identify the user’s actions through the use of
imparted sensory abilities.

Paper Title:
TECHNOLOGY-DRIVEN LEARNING ECOSYSTEM IN MANAGEMENT SCHOOLS
Author Name:
Nirmala K.D
Country:
India
Page No.:
69-78
View PDF
TECHNOLOGY-DRIVEN LEARNING ECOSYSTEM IN MANAGEMENT SCHOOLS
Author: Nirmala K.D

Abstract
There exists a strong and undeniable relationship between technological
advancement and the evolution of educational practices. In today’s informationdriven era, the ability to learn rapidly and effectively has become a defining
advantage for students seeking knowledge. Education is no longer restricted to the
physical boundaries of a traditional classroom; instead, it is gradually shifting from
teacher-centred instruction to learner-centred engagement. Technology continues to
transform every discipline, including business education, prompting institutions to
rethink conventional pedagogical models. One notable shift is the emergence of
flipped classrooms, wherein the transfer of knowledge takes place outside the
classroom and class time is reserved for interaction, discussion, and application. This
approach has shown significantly stronger impact compared to traditional lecturebased methods. This paper examines various forms of e-learning and explores the
technological innovations likely to shape the future of business education.
Key words: eLearning, Virtual Learning, Artificial Intelligence

Editorial Policy About Peer Reviewed Journal Publication Ethics & Practices Plagiarism Policy Open Access, Licencing & Copyright Disclaimer Policy Privacy Policy FAQ Special Issue About The Journal

Latest Announcements

  • CALL FOR PAPERS 2025 (January-June)

    01-01-2025

    SUBMIT PAPERS IN OUR RESEARCH JOURNAL! 2025
    National Research Journal of Information Technology and Information Science  contributes in the growth and application of Research & Technology, by delivering the latest information contained in research papers, which enables them to enhance understanding for advancements in research activities. We intends to Disseminate and promote the research works of research scholars, Academia.
  • Subscribe This Journal

    01-01-2025

    We Request to Subscribe our Journals for the Noble Cause to Spread Knowledge, Wisdom and also to Protect Intellectual Property Rights of Scholars Across the World.

    Subscription Price: 3500/- (Bi-Annual)

    CALL NOW!
    +91-9888934889, 7986925354

Publish
Conference
Or Seminar
papers in our journal

Read More

National Research Journal of Information Technology & Information Science

+91-9888934889

editornrjitis@gmail.com

Useful Links

  • Home
  • About The Publisher
  • Submit Paper Online
  • Call for Papers
  • Publication Ethics
  • Join Our Editorial Board
  • Journal Subscription
  • Contact Us

Explore Other Journals

  • NRJ of Human Resource Mgt.
  • National Research Journal of Business Economics
  • Sales and Marketing Management
  • Banking and Finance Management
  • Academe: Journal of Education and Psychology
  • Research and Reviews in Biotechnology and Biosciences
  • Journal of Literary Aesthetics
  • Social Science Journal

Downloads

  • Copyright Form
  • Paper Template
  • Manuscript Guidelines
  • e-Certificate
  • Sitemap
© 2026 National Research Journal of Information Technology & Information Science. All Rights Reserved.
Published By: National Press Associates www.npajournals.org