Impact Factor:6.549
 Scopus Suggested Journal: UNDER REVIEW for TITLE INCLUSSION

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary

Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Vigorous Recognition of Child Marriage Prophylaxis Through Cryptography: Impeccable Solutions Within Concatenated Management

Ms.Tarun Danti Dey, Ms. Tanny Das, Mr.S.M. Shahen Alam, Mr. Sritha Zith Dey Babu,
1*:Department of LAW, Chittagong Independent University, Chittagong, Bangladesh 2: Department of English Literature and Language, Brindaban Government College, Habiganj, Bangladesh 3: Department of Sociology, University of Dhaka, Bangladesh 4: Department of Computer Science, Chandigarh University, Punjab, India

Child marriage is the pervasive smeared crux in our Asia continent. It sways all-encompassing concavity on gender-oriented prejudice, emerging rate of the population as well. The objective of our paper defines settling up the age with deficient latitude accordant the propounded strait, fabricating a cryptosystem into society, embellishing the temporal and spatial equation to amplify a society. The collection of random or unstructured data replicates the method of cryptosystem and genetic algorithm through the deviation of true and standard value related to the concentration of the determined attributes of the analyte. Exertion and correlation of doctors with related schools corroborate the cultivation of physical and elementary mental health, ascertainment of sanitation. Indemnifying society consolidation regarding education cognition fastens partaking of Education Officers and Volunteers. Consciencement of parents’ employment endorses with the Representatives of NGOs’. Implementation of a female child ratifies with the aid of Banks and Financial Institutions. Social awareness fleeces with the concurrence of religious confessors and the honorable figures of the entertainment sphere. Birth registration, existing child's data, and rationing are verified respectively under the aegis of the root leveled officials and public representatives. Our proposed methodology comprehensively facilitates both the prerogative and underprivileged female children, along with their parents. Adolescents’ as well as females engaging in the skill development arena, certify their elevation of social status. The novelty of the paper is that it’s going to concrete the span of social science and big data.

Ms.Tarun Danti Dey,Ms. Tanny Das,Mr.S.M. Shahen Alam,Mr. Sritha Zith Dey Babu."Vigorous Recognition of Child Marriage Prophylaxis Through Cryptography: Impeccable Solutions Within Concatenated Management ". International Journal of Computer Engineering In Research Trends (IJCERT) , ISSN:2349-7084, Vol.7, Issue 08,pp.20-28, August- 2020, URL:,

Keywords : Cryptography, Unique-code, Undesired-marriage, Poverty, Econometrics, Disintegration

[1] Bartels SA, Michael S, Roupetz S, Garbern S, Kilzar L, Bergquist H, Bakhache N, Davison C, Bunting A. Making sense of child, early and forced marriage among Syrian refugee girls: a mixed methods study in Lebanon. BMJ global health. 2018 Jan 1;3(1).
[2] McFarlane J, Nava A, Gilroy H, Maddoux J. Child brides, forced marriage, and partner violence in America: Tip of an iceberg revealed. Obstetrics & Gynecology. 2016 Apr 1;127(4):706-13.
[3] Montazeri S, Gharacheh M, Mohammadi N, Alaghband Rad J, Eftekhar Ardabili H. Determinants of early marriage from married girls’ perspectives in Iranian setting: a qualitative study. Journal of environmental and public health. 2016 Mar 30;2016.
[4] Cherri Z, Gil Cuesta J, Rodriguez-Llanes JM, Guha-Sapir D. Early marriage and barriers to contraception among Syrian refugee women in Lebanon: a qualitative study. International journal of environmental research and public health. 2017 Aug;14(8):836.
[5] Santoso MV, Kerr RB, Hoddinott J, Garigipati P, Olmos S, Young SL. Role of women's Empowerment in child nutrition outcomes: a systematic review. Advances in Nutrition. 2019 Nov 1;10(6):1138-51.
[6] Galiè A, Teufel N, Korir L, Baltenweck I, Girard AW, Dominguez-Salas P, Yount KM. The women’s empowerment in livestock index. Social Indicators Research. 2019 Apr 15;142(2):799-825.
[7] Alcázar L, Balarin M, Espinoza Iglesias KH. Impacts of the Peruvian Conditional Cash Transfer Program on Womens Empowerment: A Quantitative and Qualitative Approach.
[8] Cornwall A. Women's empowerment: What works?. Journal of International Development. 2016 Apr;28(3):342-59.
[9] Bandiera O, Buehren N, Burgess R, Goldstein M, Gulesci S, Rasul I, Sulaiman M. Women’s empowerment in action: evidence from a randomized control trial in Africa. World Bank; 2018 Dec.
[10] Woya AA, Tekile AK, Mitiku AA. Womens empowerment on contraceptive use among married women in Amhara Region, Ethiopia. ISABB Journal of Health and Environmental Sciences. 2018 Jan 31;5(1):1-8.
[11] Prata N, Tavrow P, Upadhyay U. Women’s empowerment related to pregnancy and childbirth: introduction to special issue. BMC pregnancy and childbirth. 2017 Nov;17(2):1-5.
[12] Crittenden VL, Crittenden WF, Ajjan H. Empowering women micro-entrepreneurs in emerging economies: The role of information communications technology. Journal of Business Research. 2019 May 1;98:191-203.
[13] Abubakar NH, Dasuki SI. Empowerment in their hands: use of WhatsApp by women in Nigeria. Gender, Technology and Development. 2018 May 4;22(2):164-83.
[14] Adeni S. Information Communication Technology (ICT) and Women Empowerment for Rural Area. Jurnal InterAct. 2016 Nov 12;5(2):1-5.
[15] Singh S, Singh S, Kumar A. Women and ICT: A Study on Access and Perceptions in North India. Indian Journal of Human Development. 2018 Dec;12(3):401-19.
[16] Dey TD, Zith SZ, Pandey D, Sheik I. Persuasive Metamorphosis of Manufacturing Overhead at The Golden Doors of Disparaging Uttermost Cost of Goods. The International Journal of Technology Information and Computer (TIJOTIC). 2020 Jun 2;1(1):8-15.
[17] Babu SZ, Pandey D, Narayan V, Al Zubayer A, Sheik I. Abridgement of Business Data Drilling with the Natural Selection and Recasting Breakthrough: Drill Data With GA.

DOI Link :

Download :

Refbacks : Currently there are no Refbacks


Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors. 

News & Events

Latest issue :Volume 10 Issue 1 Articles In press

A plagiarism check will be implemented for all the articles using world-renowned software. Turnitin.

Digital Object Identifier will be assigned for all the articles being published in the Journal from September 2016 issue, i.e. Volume 3, Issue 9, 2016.

IJCERT is a member of the prestigious.Each of the IJCERT articles has its unique DOI reference.
DOI Prefix : 10.22362/ijcert

IJCERT is member of The Publishers International Linking Association, Inc. (“PILA”)

Emerging Sources Citation Index (in process)

IJCERT title is under evaluation by Scopus.

Key Dates

☞   LAST DATE OF SUBMISSION : 31st March 2023
In 7 Days

Important Announcements

All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.

Citation Index

Citations Indices All
Citations 1026
h-index 14
i10-index 20
Source: Google Scholar

Acceptance Rate (By Year)

Acceptance Rate (By Year)
Year Rate
2021 10.8%
2020 13.6%
2019 15.9%
2018 14.5%
2017 16.6%
2016 15.8%
2015 18.2%
2014 20.6%

Important Links

Conference Proposal