{"title":"Recent Advancement in Blockchain: A study","authors":"Navneet Kaur, Devesh Saini","doi":"10.46860/cgcijctr.2024.04.10.373","DOIUrl":"https://doi.org/10.46860/cgcijctr.2024.04.10.373","url":null,"abstract":"With technological innovation occurring at an ever-increasing rate, block chain has become one of the hottest new Internet trends. Because it is a distributed and decentralised database, blockchain has restored the definition of trust—providing security through cryptography and consensus mechanism without needing any third party. Hence the aim of this study is to provide an overview on the concept of blockchains, historical development, and application of Block chain in real life. In addition, the working of interlinked blockchains (blockmesh), their merits and applications are discussed. This will be useful to clarify the uses and usage of blockmesh in our daily lives. Finally, a slight peek in the past of the block chain would also be discussed to show the exponential growth in the blockchain technology.","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"315 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140719484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A statistical model for estimating size and productivity ratio in SDLC","authors":"","doi":"10.46860/cgcijctr.2024.04.10.370","DOIUrl":"https://doi.org/10.46860/cgcijctr.2024.04.10.370","url":null,"abstract":"During a software development life cycle, one has to estimate the effort and schedule required to produce a software unit. Estimates for The effort and schedule are derived from other measurements such as size and productivity Ratio. Size may be estimated using methods such as Function Point, WBS, LOC, etc., and the Productivity Ratio is expressed as Size / Time to complete the Unit of Software. Such estimates are static and do not consider real-time Parameters which cause variations from the estimate. In this paper, a statistical model for Size and Productivity Ratios is derived using Historical values after considering several factors influencing the size and the productivity ratio of produced software. Typically, an estimate of the effort and schedule is required to complete. A software work product an enhancement request or a software fix. We use Function Points or WBS to estimate the size of the software in consideration. We use baseline values for estimating productivity Ratios. Real-time values however differ from Baseline values as they are influenced by several factors. Here are some factors which would influence the Actual Size of the software Later on we will use Statistical techniques of Multivariable Parameter estimation and logistic Regression to derive run time equations of Size and Productivity Ratio.","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"2007 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140718586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Role of Excipients in Liquisolid Technology","authors":"Shaveta Sharma","doi":"10.46860/cgcijctr.2022.07.31.296","DOIUrl":"https://doi.org/10.46860/cgcijctr.2022.07.31.296","url":null,"abstract":"This article gives criteria for choosing excipients in liquisolid technology. Liquisolid technology is applicable for non polar drugs by converting drug solution into dry free flowing powder. Patient compliance is more in oral route of administration .Numerous techniques like solid dispersion, micronisation, lyophilisation co-grinding, co-precipitation,complexation and nanotechnology are used to increase aqueous solubility Solid dispersion having stability issues while micronization and complexation can cause agglomeration. In Nanotechnology, high cost involved in sophicticated instruments. Liquisolid technology is considered to be one of the best technique to to overcome solubility,dissolution and bioavailability. It convert drug solution into dry free flowing powder. This technique is simple manufacturing process with low production cost. In vitro release is enhanced by using this technology. There is significant role of excipients in this novel technique to get effective release of drug. Associated problems of BCS class II and IV is mostly solved in respect to solubility. Especially carrier with high specific surface area gives good results in overcoming all challenges. Carriers such as Lactose, Starch, Avicel pH101,Fujacilin, Neusilin ,each having specific properties in release of drug. Among all mostly used carriers are Avicel, Fujacilin and Neusilin as with highest Specific Surface Area (SSA) than others. PVP and SSG is considered best disintegrating agent as having good swelling property and flow property as Polyvinypyrrolidine can be used in high dose drugs. With large SSA and high adsorptive property Neusilin, Aerosil , PVP as carrier, coating material and disintegrating agent are considered perfect excipients in liquisolid technology.","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115399942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Encryption Using Morse Code","authors":"Aditya Pathak, Anmol Kaur, Sagar","doi":"10.46860/cgcijctr.2022.07.31.319","DOIUrl":"https://doi.org/10.46860/cgcijctr.2022.07.31.319","url":null,"abstract":"Cryptography in general means hiding, while in technical terms cryptography means protecting data from unauthorized access of someone, or cryptography can be considered as a method that ciphers the data so that the data can neither be read nor understood by humans. With the increasing level of internet consumption, the security of our data is the main concern. Due to increasing cyber-attacks, and over-relying on the internet, a lot of users’ data has been compromised. This has brought our attention to data security and cryptographic algorithms. Data security ensures the data of users is not being compromised and is present in such a format that an intruder won’t get access to our data, it ensures that the data is accessible to the intended user only, and anybody else can neither read nor change the data. To achieve such security, some algorithms or processes are needed. One such algorithm can be derived using Morse code since data in Morse code uses dots and dashes to represent alphabets and numbers. Even if such encryption is used directly, it may cause some threat to the user’s data as anyone with knowledge of Morse code can easily decrypt it, so to get more safety, the encrypted data is needed to be encrypted again with some other algorithm. Now, other than data safety, the safety of the algorithm is also required, as if someone gets to know about the algorithm, they can decrypt the data. The Python programming language provides a module named Cryptography in which Fernet can be used to encrypt the algorithm file as well as the data file again. Cryptography in python uses a symmetric encryption technique, i.e., it uses the same key to encrypt and decrypt the data. This technique is faster compared to asymmetric techniques. This paper demonstrates how Morse code, time & Python’s Cryptography module can be used together to provide maximum data safety.","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132464111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Lasers Assisted Machining Methods – Types, Mode of Operations, Comparison and Applications","authors":"Rahul Mehra, S Kumar","doi":"10.46860/cgcijctr.2022.07.31.307","DOIUrl":"https://doi.org/10.46860/cgcijctr.2022.07.31.307","url":null,"abstract":"Materials having high hardness and difficult to cut are becoming more popular in distinct industries such as automobile, aerospace, medical, construction, nuclear, sports and others. Because, hard and difficult to cut materials offered high strength to weight ratio, high resistance against wear, high yield strength, high resistance against corrosion, and ability to retain high strength at elevated temperature. However, the machining of hard and difficult to cut material poses a serious challenge owing to severe tool wear and higher cutting force involved. To overcome this, Laser assisted machining (LAM) has shown to be one of the most promising technologies for cutting difficult-to-cut materials. Hence, the aim of current review paper is to provide an overview on LAM, historical background, basic phenomena of laser generation, properties of lasers, generalized concept of laser- material interaction, types of lasers, distinct modes of laser operations and applications. Finally, the recent advances in laser assisted machining are discussed.","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132258408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Wave in Biometric System: Systematic Study","authors":"Saumya Rajvanshi, Shiv Chauhan, S. Kaur","doi":"10.46860/cgcijctr.2022.07.31.300","DOIUrl":"https://doi.org/10.46860/cgcijctr.2022.07.31.300","url":null,"abstract":"Biometric system is a technique used to identify a person using its personal identification methods. The main concept of biometric systems is to provide confidentiality and security to the user. A number of biometric systems are introduced but some systems are widely used and are famous because of their usage and security they provide. Physiological and Behavioral biometrics are the two types of biometric systems. Biometric systems include physiological biometrics like face recognition, fingerprint recognition, iris recognition and behavioral biometrics like signature recognition and voice recognition. All these recognition systems are discussed in this research paper. Biometric systems work on three levels: Enrollment, Verification, and Identification. Enrollment is the process in which patterns are captured from the user and stored in the database. Verification means to confirm that the sample entered by the user belongs to him or not. When the user wants to access the data then the user must use his/her biometrics so that the system checks that the person who wants to access the data is the real owner of the data or not. This process is identification. All three levels are the working levels of the Biometric System. In earlier years, biometrics were used only at ground levels to provide basic security to data but now the tables have turned. It is playing a major role in providing security to our data. Biometrics are not only used in day-to-day life in phone unlocking, phone assistants, attendance systems but also used at advanced levels like in airports, border security, cloud computing etc. In this research paper, we will discuss the future scope of biometric systems and how it could even change the future.","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133381915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Antennas for Various Applications","authors":"Preeti Bansal, Nidhi Chahal","doi":"10.46860/cgcijctr.2022.07.31.316","DOIUrl":"https://doi.org/10.46860/cgcijctr.2022.07.31.316","url":null,"abstract":"The paper presents about smart antennas for advancement in wireless and mobile communication. Smart antennas also called adaptive array antennas with better signal processing & can be used to calculate beam forming vectors which helps in tracking & locating antenna beam of target. Smart antennas are helpful in health monitoring in covid-19 pandemic and provides better service quality. Smart antenna is one of the rising innovations which can satisfy the prerequisites. Smart antennas are being used for controlling, monitoring and analyzing real time systems for various applications In smart antennas spatial division of the signal is used as compared to spectrum division, it can be beneficial for improving the performance of wireless communication. This paper describes how switched beam & adaptive array antennas differ from basic antennas.","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"41 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113992865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nouf Alqahtani, Wafa Alqarawi, A. Alghamdi, Ohud Alosaimi, O. Alrwais
{"title":"A Spatial Analysis of the Relationship between IT Jobs and Regions in Saudi Arabia","authors":"Nouf Alqahtani, Wafa Alqarawi, A. Alghamdi, Ohud Alosaimi, O. Alrwais","doi":"10.46860/cgcijctr.2022.07.31.286","DOIUrl":"https://doi.org/10.46860/cgcijctr.2022.07.31.286","url":null,"abstract":"Saudi Arabia has vast area with sprawling regions. As a result of diversification of kingdom's land-use (such as agriculture, residential, commercial and industrial), the employment opportunities are varied from one region to another. Saudi Arabia struggles with both high aggregate unemployment rates and persistent regional unemployment rate differentials. In this paper, we focus on Saudis’ male and female job seekers who imposes IT certifications or capabilities and sectors either public or private which provide IT job opportunities in Saudi’s regions. Using GIS-based analysis, in this research, we attend to examining spatial distributions of IT jobs and IT jobs seeker, and analyze relationship between IT jobs and Saudi’s regions in order to help both IT job seekers and providers to identify their destination for fill or provide suitable job vacancies and alleviate unemployment. This research shows that the regions with high residential density are highly centralized IT jobs and IT job seekers.","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133168720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sondhi, Palki Sahib Kaur, Savita Kant, Arshpreet Kaur
{"title":"Improvement of bread Quality by Inclusion of Alpha Amylase from Bacillus Licheniformis","authors":"S. Sondhi, Palki Sahib Kaur, Savita Kant, Arshpreet Kaur","doi":"10.46860/cgcijctr.2022.07.31.280","DOIUrl":"https://doi.org/10.46860/cgcijctr.2022.07.31.280","url":null,"abstract":"Amylases have discovered applications in various industries including juice preparing, processing of starch, bread improvement and other maturation forms including malting grain and in baking ventures. In this investigation, amylase extracted from Bacillus licheniformis MTCC 1483 was applied for the preparation of buns and for improvement of bread quality. It was evaluated that maximum loaf volume was obtained by an application of 3.5 unit/Kg flour of amylase at 37°C, pH 7.0 for 30min. Tactile attributes of bread viz. color, taste, flavor and acceptability were additionally upgraded. Thus, the bread prepared by using alpha amylase showed an increase in loaf volume and bread height with better taste and flavor. Overall results showed applicability of alpha amylase in baking industry.","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134584672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Research on the Techniques of Electricity Fraud Detection Using Different Machine Learning Techniques","authors":"Maninder Kaur, Samarth Chawla, Ruhi Dua","doi":"10.46860/cgcijctr.2022.07.31.293","DOIUrl":"https://doi.org/10.46860/cgcijctr.2022.07.31.293","url":null,"abstract":"The vulnerability of power theft has hampered the electricity industry for decades. It obstructs social progress by having varying degrees of impact on home, commercial, and industrial customers. Sneak thieves have caught up with contemporary metering systems, putting electricity suppliers in trouble financially. This comparative analysis is the first step in the presentation of principles. Theft of electricity has serious consequences for the power grid's proper operation as well as the economic benefits of power corporations and commercial power service providers. An effective anti-power-theft algorithm is required for tracking power usage statistics in order to detect electricity power theft. In this literature review, we differentiate the Support Vector Machine (SVM) algorithm with other techniques for detecting abnormal usage among consumers (i.e., electricity fraudsters) in time-series data on power consumption. The results show some combinations can reach significantly better values than others, comparing both the balancing techniques for a same machine learning method itself as well as comparing these combinations between themselves.","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115583840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}