首页 > 最新文献

CGC International Journal of Contemporary Technology and Research最新文献

英文 中文
Recent Advancement in Blockchain: A study 区块链的最新进展:一项研究
Pub Date : 2024-04-10 DOI: 10.46860/cgcijctr.2024.04.10.373
Navneet Kaur, Devesh Saini
With technological innovation occurring at an ever-increasing rate, block chain has become one of the hottest new Internet trends. Because it is a distributed and decentralised database, blockchain has restored the definition of trust—providing security through cryptography and consensus mechanism without needing any third party. Hence the aim of this study is to provide an overview on the concept of blockchains, historical development, and application of Block chain in real life. In addition, the working of interlinked blockchains (blockmesh), their merits and applications are discussed. This will be useful to clarify the uses and usage of blockmesh in our daily lives. Finally, a slight peek in the past of the block chain would also be discussed to show the exponential growth in the blockchain technology.
随着技术创新速度的不断加快,区块链已成为最热门的互联网新趋势之一。由于区块链是一种分布式、去中心化的数据库,它还原了信任的定义--通过密码学和共识机制提供安全保障,而不需要任何第三方。因此,本研究旨在概述区块链的概念、历史发展以及在现实生活中的应用。此外,还讨论了相互连接的区块链(blockmesh)的工作原理、优点和应用。这将有助于阐明区块链在我们日常生活中的用途和用法。最后,还将讨论区块链的过去,以显示区块链技术的指数级增长。
{"title":"Recent Advancement in Blockchain: A study","authors":"Navneet Kaur, Devesh Saini","doi":"10.46860/cgcijctr.2024.04.10.373","DOIUrl":"https://doi.org/10.46860/cgcijctr.2024.04.10.373","url":null,"abstract":"With technological innovation occurring at an ever-increasing rate, block chain has become one of the hottest new Internet trends. Because it is a distributed and decentralised database, blockchain has restored the definition of trust—providing security through cryptography and consensus mechanism without needing any third party. Hence the aim of this study is to provide an overview on the concept of blockchains, historical development, and application of Block chain in real life. In addition, the working of interlinked blockchains (blockmesh), their merits and applications are discussed. This will be useful to clarify the uses and usage of blockmesh in our daily lives. Finally, a slight peek in the past of the block chain would also be discussed to show the exponential growth in the blockchain technology.","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"315 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140719484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A statistical model for estimating size and productivity ratio in SDLC 用于估算 SDLC 中规模与生产率比率的统计模型
Pub Date : 2024-04-10 DOI: 10.46860/cgcijctr.2024.04.10.370
During a software development life cycle, one has to estimate the effort and schedule required to produce a software unit. Estimates for The effort and schedule are derived from other measurements such as size and productivity Ratio. Size may be estimated using methods such as Function Point, WBS, LOC, etc., and the Productivity Ratio is expressed as Size / Time to complete the Unit of Software. Such estimates are static and do not consider real-time Parameters which cause variations from the estimate. In this paper, a statistical model for Size and Productivity Ratios is derived using Historical values after considering several factors influencing the size and the productivity ratio of produced software. Typically, an estimate of the effort and schedule is required to complete. A software work product an enhancement request or a software fix. We use Function Points or WBS to estimate the size of the software in consideration. We use baseline values for estimating productivity Ratios. Real-time values however differ from Baseline values as they are influenced by several factors. Here are some factors which would influence the Actual Size of the software Later on we will use Statistical techniques of Multivariable Parameter estimation and logistic Regression to derive run time equations of Size and Productivity Ratio.
在软件开发生命周期中,我们必须估算制作一个软件单元所需的工作量和进度。对工作量和进度的估算来自于其他测量指标,如规模和生产率。规模可以用功能点、WBS、LOC 等方法估算,生产率则用规模/完成软件单元所需的时间来表示。这种估算是静态的,没有考虑导致估算值变化的实时参数。本文在考虑了影响软件规模和生产率的几个因素后,利用历史值推导出了规模和生产率的统计模型。通常情况下,需要对完成工作的工作量和进度进行估算。软件工作产品是一种增强请求或软件修复。我们使用功能点或 WBS 来估算软件的大小。我们使用基准值来估算生产率。然而,实时值与基准值不同,因为它们受到多种因素的影响。以下是影响软件实际大小的一些因素。稍后,我们将使用多变量参数估计和逻辑回归的统计技术,得出大小和生产率比率的运行时间方程。
{"title":"A statistical model for estimating size and productivity ratio in SDLC","authors":"","doi":"10.46860/cgcijctr.2024.04.10.370","DOIUrl":"https://doi.org/10.46860/cgcijctr.2024.04.10.370","url":null,"abstract":"During a software development life cycle, one has to estimate the effort and schedule required to produce a software unit. Estimates for The effort and schedule are derived from other measurements such as size and productivity Ratio. Size may be estimated using methods such as Function Point, WBS, LOC, etc., and the Productivity Ratio is expressed as Size / Time to complete the Unit of Software. Such estimates are static and do not consider real-time Parameters which cause variations from the estimate. In this paper, a statistical model for Size and Productivity Ratios is derived using Historical values after considering several factors influencing the size and the productivity ratio of produced software. Typically, an estimate of the effort and schedule is required to complete. A software work product an enhancement request or a software fix. We use Function Points or WBS to estimate the size of the software in consideration. We use baseline values for estimating productivity Ratios. Real-time values however differ from Baseline values as they are influenced by several factors. Here are some factors which would influence the Actual Size of the software Later on we will use Statistical techniques of Multivariable Parameter estimation and logistic Regression to derive run time equations of Size and Productivity Ratio.","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"2007 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140718586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Role of Excipients in Liquisolid Technology 赋形剂在液固技术中的作用
Pub Date : 2022-08-05 DOI: 10.46860/cgcijctr.2022.07.31.296
Shaveta Sharma
This article gives criteria for choosing excipients in liquisolid technology. Liquisolid technology is applicable for non polar drugs by converting drug solution into dry free flowing powder. Patient compliance is more in oral route of administration .Numerous techniques like solid dispersion, micronisation, lyophilisation co-grinding, co-precipitation,complexation and nanotechnology are used to increase aqueous solubility Solid dispersion having stability issues while micronization and complexation can cause agglomeration. In Nanotechnology, high cost involved in sophicticated instruments. Liquisolid technology is considered to be one of the best technique to to overcome solubility,dissolution and bioavailability. It convert drug solution into dry free flowing powder. This technique is simple manufacturing process with low production cost. In vitro release is enhanced by using this technology. There is significant role of excipients in this novel technique to get effective release of drug. Associated problems of BCS class II and IV is mostly solved in respect to solubility. Especially carrier with high specific surface area gives good results in overcoming all challenges. Carriers such as Lactose, Starch, Avicel pH101,Fujacilin, Neusilin ,each having specific properties in release of drug. Among all mostly used carriers are Avicel, Fujacilin and Neusilin as with highest Specific Surface Area (SSA) than others. PVP and SSG is considered best disintegrating agent as having good swelling property and flow property as Polyvinypyrrolidine can be used in high dose drugs. With large SSA and high adsorptive property Neusilin, Aerosil , PVP as carrier, coating material and disintegrating agent are considered perfect excipients in liquisolid technology.
本文给出了液固工艺中辅料的选择标准。液固技术是将药物溶液转化为干燥、自由流动的粉末,适用于非极性药物。许多技术如固体分散、微粉化、冻干共磨、共沉淀、络合和纳米技术被用于提高水溶解度。固体分散有稳定性问题,而微粉化和络合会导致团聚。在纳米技术中,高成本涉及到复杂的仪器。液体固体技术被认为是克服溶解度、溶解性和生物利用度的最佳技术之一。它将药物溶液转化为干燥的自由流动的粉末。该工艺制造工艺简单,生产成本低。使用该技术可提高体外释放。在此过程中,赋形剂对药物的有效释放起着重要的作用。BCS II类和IV类的相关问题主要解决在溶解度方面。特别是具有高比表面积的载体在克服各种挑战方面取得了很好的效果。载体如乳糖、淀粉、Avicel pH101、Fujacilin、Neusilin等,每一种都有特定的药物释放特性。在所有的载体中,使用最多的是Avicel、Fujacilin和Neusilin,它们的比表面积(SSA)最高。聚乙烯吡咯烷醚具有良好的溶胀性和流动性,可用于大剂量药物,被认为是最佳崩解剂。Neusilin、Aerosil、PVP作为载体、包衣材料和崩解剂被认为是液固技术中理想的辅料,具有较大的SSA和较高的吸附性能。
{"title":"The Role of Excipients in Liquisolid Technology","authors":"Shaveta Sharma","doi":"10.46860/cgcijctr.2022.07.31.296","DOIUrl":"https://doi.org/10.46860/cgcijctr.2022.07.31.296","url":null,"abstract":"This article gives criteria for choosing excipients in liquisolid technology. Liquisolid technology is applicable for non polar drugs by converting drug solution into dry free flowing powder. Patient compliance is more in oral route of administration .Numerous techniques like solid dispersion, micronisation, lyophilisation co-grinding, co-precipitation,complexation and nanotechnology are used to increase aqueous solubility Solid dispersion having stability issues while micronization and complexation can cause agglomeration. In Nanotechnology, high cost involved in sophicticated instruments. Liquisolid technology is considered to be one of the best technique to to overcome solubility,dissolution and bioavailability. It convert drug solution into dry free flowing powder. This technique is simple manufacturing process with low production cost. In vitro release is enhanced by using this technology. There is significant role of excipients in this novel technique to get effective release of drug. Associated problems of BCS class II and IV is mostly solved in respect to solubility. Especially carrier with high specific surface area gives good results in overcoming all challenges. Carriers such as Lactose, Starch, Avicel pH101,Fujacilin, Neusilin ,each having specific properties in release of drug. Among all mostly used carriers are Avicel, Fujacilin and Neusilin as with highest Specific Surface Area (SSA) than others. PVP and SSG is considered best disintegrating agent as having good swelling property and flow property as Polyvinypyrrolidine can be used in high dose drugs. With large SSA and high adsorptive property Neusilin, Aerosil , PVP as carrier, coating material and disintegrating agent are considered perfect excipients in liquisolid technology.","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115399942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Encryption Using Morse Code 使用莫尔斯电码进行数据加密
Pub Date : 2022-08-05 DOI: 10.46860/cgcijctr.2022.07.31.319
Aditya Pathak, Anmol Kaur, Sagar
Cryptography in general means hiding, while in technical terms cryptography means protecting data from unauthorized access of someone, or cryptography can be considered as a method that ciphers the data so that the data can neither be read nor understood by humans. With the increasing level of internet consumption, the security of our data is the main concern. Due to increasing cyber-attacks, and over-relying on the internet, a lot of users’ data has been compromised. This has brought our attention to data security and cryptographic algorithms. Data security ensures the data of users is not being compromised and is present in such a format that an intruder won’t get access to our data, it ensures that the data is accessible to the intended user only, and anybody else can neither read nor change the data. To achieve such security, some algorithms or processes are needed. One such algorithm can be derived using Morse code since data in Morse code uses dots and dashes to represent alphabets and numbers. Even if such encryption is used directly, it may cause some threat to the user’s data as anyone with knowledge of Morse code can easily decrypt it, so to get more safety, the encrypted data is needed to be encrypted again with some other algorithm. Now, other than data safety, the safety of the algorithm is also required, as if someone gets to know about the algorithm, they can decrypt the data. The Python programming language provides a module named Cryptography in which Fernet can be used to encrypt the algorithm file as well as the data file again. Cryptography in python uses a symmetric encryption technique, i.e., it uses the same key to encrypt and decrypt the data. This technique is faster compared to asymmetric techniques. This paper demonstrates how Morse code, time & Python’s Cryptography module can be used together to provide maximum data safety.
一般来说,密码学意味着隐藏,而在技术术语中,密码学意味着保护数据不被未经授权的人访问,或者密码学可以被认为是一种对数据进行加密的方法,使数据既不能被人类读取也不能被人类理解。随着互联网消费水平的提高,我们的数据安全是主要关注的问题。由于越来越多的网络攻击,以及对互联网的过度依赖,许多用户的数据已经被泄露。这引起了我们对数据安全和加密算法的关注。数据安全确保用户的数据不被泄露,并以入侵者无法访问我们的数据的格式存在,它确保数据仅供预期用户访问,其他人既不能读取也不能更改数据。为了实现这种安全性,需要一些算法或过程。一种这样的算法可以用莫尔斯电码推导出来,因为莫尔斯电码中的数据使用点和破折号来表示字母和数字。即使直接使用这种加密,也可能对用户的数据造成一定的威胁,因为任何了解莫尔斯电码的人都可以很容易地解密,所以为了获得更大的安全性,需要使用其他算法对加密后的数据进行再次加密。现在,除了数据安全之外,算法的安全性也是需要的,如果有人知道了算法,他们就可以解密数据。Python编程语言提供了一个名为Cryptography的模块,可以使用Fernet对算法文件和数据文件进行加密。python中的密码学使用对称加密技术,即使用相同的密钥加密和解密数据。与非对称技术相比,这种技术速度更快。本文演示了如何将摩尔斯电码,时间和Python的密码模块一起使用以提供最大的数据安全性。
{"title":"Data Encryption Using Morse Code","authors":"Aditya Pathak, Anmol Kaur, Sagar","doi":"10.46860/cgcijctr.2022.07.31.319","DOIUrl":"https://doi.org/10.46860/cgcijctr.2022.07.31.319","url":null,"abstract":"Cryptography in general means hiding, while in technical terms cryptography means protecting data from unauthorized access of someone, or cryptography can be considered as a method that ciphers the data so that the data can neither be read nor understood by humans. With the increasing level of internet consumption, the security of our data is the main concern. Due to increasing cyber-attacks, and over-relying on the internet, a lot of users’ data has been compromised. This has brought our attention to data security and cryptographic algorithms. Data security ensures the data of users is not being compromised and is present in such a format that an intruder won’t get access to our data, it ensures that the data is accessible to the intended user only, and anybody else can neither read nor change the data. To achieve such security, some algorithms or processes are needed. One such algorithm can be derived using Morse code since data in Morse code uses dots and dashes to represent alphabets and numbers. Even if such encryption is used directly, it may cause some threat to the user’s data as anyone with knowledge of Morse code can easily decrypt it, so to get more safety, the encrypted data is needed to be encrypted again with some other algorithm. Now, other than data safety, the safety of the algorithm is also required, as if someone gets to know about the algorithm, they can decrypt the data. The Python programming language provides a module named Cryptography in which Fernet can be used to encrypt the algorithm file as well as the data file again. Cryptography in python uses a symmetric encryption technique, i.e., it uses the same key to encrypt and decrypt the data. This technique is faster compared to asymmetric techniques. This paper demonstrates how Morse code, time & Python’s Cryptography module can be used together to provide maximum data safety.","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132464111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on Lasers Assisted Machining Methods – Types, Mode of Operations, Comparison and Applications 激光辅助加工方法综述:类型、操作方式、比较和应用
Pub Date : 2022-08-05 DOI: 10.46860/cgcijctr.2022.07.31.307
Rahul Mehra, S Kumar
Materials having high hardness and difficult to cut are becoming more popular in distinct industries such as automobile, aerospace, medical, construction, nuclear, sports and others. Because, hard and difficult to cut materials offered high strength to weight ratio, high resistance against wear, high yield strength, high resistance against corrosion, and ability to retain high strength at elevated temperature. However, the machining of hard and difficult to cut material poses a serious challenge owing to severe tool wear and higher cutting force involved. To overcome this, Laser assisted machining (LAM) has shown to be one of the most promising technologies for cutting difficult-to-cut materials. Hence, the aim of current review paper is to provide an overview on LAM, historical background, basic phenomena of laser generation, properties of lasers, generalized concept of laser- material interaction, types of lasers, distinct modes of laser operations and applications. Finally, the recent advances in laser assisted machining are discussed.
高硬度、难切割的材料在汽车、航空航天、医疗、建筑、核、体育等不同行业越来越受欢迎。因为,硬而难切割的材料具有高强度重量比、高耐磨性、高屈服强度、高抗腐蚀性以及在高温下保持高强度的能力。然而,由于刀具磨损严重,切削力较大,对硬、难切削材料的加工提出了严峻的挑战。为了克服这一点,激光辅助加工(LAM)已被证明是切割难切割材料最有前途的技术之一。因此,本文将对激光激光的历史背景、激光产生的基本现象、激光的性质、激光与材料相互作用的一般概念、激光的类型、激光操作的不同模式及其应用进行综述。最后讨论了激光辅助加工的最新进展。
{"title":"A Review on Lasers Assisted Machining Methods – Types, Mode of Operations, Comparison and Applications","authors":"Rahul Mehra, S Kumar","doi":"10.46860/cgcijctr.2022.07.31.307","DOIUrl":"https://doi.org/10.46860/cgcijctr.2022.07.31.307","url":null,"abstract":"Materials having high hardness and difficult to cut are becoming more popular in distinct industries such as automobile, aerospace, medical, construction, nuclear, sports and others. Because, hard and difficult to cut materials offered high strength to weight ratio, high resistance against wear, high yield strength, high resistance against corrosion, and ability to retain high strength at elevated temperature. However, the machining of hard and difficult to cut material poses a serious challenge owing to severe tool wear and higher cutting force involved. To overcome this, Laser assisted machining (LAM) has shown to be one of the most promising technologies for cutting difficult-to-cut materials. Hence, the aim of current review paper is to provide an overview on LAM, historical background, basic phenomena of laser generation, properties of lasers, generalized concept of laser- material interaction, types of lasers, distinct modes of laser operations and applications. Finally, the recent advances in laser assisted machining are discussed.","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132258408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Wave in Biometric System: Systematic Study 生物识别系统的新浪潮:系统研究
Pub Date : 2022-08-05 DOI: 10.46860/cgcijctr.2022.07.31.300
Saumya Rajvanshi, Shiv Chauhan, S. Kaur
Biometric system is a technique used to identify a person using its personal identification methods. The main concept of biometric systems is to provide confidentiality and security to the user. A number of biometric systems are introduced but some systems are widely used and are famous because of their usage and security they provide. Physiological and Behavioral biometrics are the two types of biometric systems. Biometric systems include physiological biometrics like face recognition, fingerprint recognition, iris recognition and behavioral biometrics like signature recognition and voice recognition. All these recognition systems are discussed in this research paper. Biometric systems work on three levels: Enrollment, Verification, and Identification. Enrollment is the process in which patterns are captured from the user and stored in the database. Verification means to confirm that the sample entered by the user belongs to him or not. When the user wants to access the data then the user must use his/her biometrics so that the system checks that the person who wants to access the data is the real owner of the data or not. This process is identification. All three levels are the working levels of the Biometric System. In earlier years, biometrics were used only at ground levels to provide basic security to data but now the tables have turned. It is playing a major role in providing security to our data. Biometrics are not only used in day-to-day life in phone unlocking, phone assistants, attendance systems but also used at advanced levels like in airports, border security, cloud computing etc. In this research paper, we will discuss the future scope of biometric systems and how it could even change the future.
生物识别系统是一种使用其个人识别方法来识别人的技术。生物识别系统的主要概念是为用户提供保密性和安全性。引入了许多生物识别系统,但有些系统被广泛使用,并因其使用和提供的安全性而闻名。生理和行为生物识别是两种类型的生物识别系统。生物识别系统包括生理生物识别,如面部识别、指纹识别、虹膜识别和行为生物识别,如签名识别和语音识别。本文对这些识别系统进行了讨论。生物识别系统在三个层面上工作:登记、验证和身份识别。注册是从用户处捕获模式并将其存储在数据库中的过程。验证是指确认用户输入的样品是否属于自己。当用户想要访问数据时,用户必须使用他/她的生物识别技术,以便系统检查想要访问数据的人是否是数据的真正所有者。这个过程就是识别。这三个层次都是生物识别系统的工作层次。早些年,生物识别技术仅用于地面层面,为数据提供基本安全保障,但现在情况发生了变化。它在为我们的数据提供安全保障方面发挥着重要作用。生物识别技术不仅在日常生活中应用于手机解锁、电话助理、考勤系统,而且在机场、边境安全、云计算等高级领域也有应用。在这篇研究论文中,我们将讨论生物识别系统的未来范围,以及它将如何改变未来。
{"title":"A New Wave in Biometric System: Systematic Study","authors":"Saumya Rajvanshi, Shiv Chauhan, S. Kaur","doi":"10.46860/cgcijctr.2022.07.31.300","DOIUrl":"https://doi.org/10.46860/cgcijctr.2022.07.31.300","url":null,"abstract":"Biometric system is a technique used to identify a person using its personal identification methods. The main concept of biometric systems is to provide confidentiality and security to the user. A number of biometric systems are introduced but some systems are widely used and are famous because of their usage and security they provide. Physiological and Behavioral biometrics are the two types of biometric systems. Biometric systems include physiological biometrics like face recognition, fingerprint recognition, iris recognition and behavioral biometrics like signature recognition and voice recognition. All these recognition systems are discussed in this research paper. Biometric systems work on three levels: Enrollment, Verification, and Identification. Enrollment is the process in which patterns are captured from the user and stored in the database. Verification means to confirm that the sample entered by the user belongs to him or not. When the user wants to access the data then the user must use his/her biometrics so that the system checks that the person who wants to access the data is the real owner of the data or not. This process is identification. All three levels are the working levels of the Biometric System. In earlier years, biometrics were used only at ground levels to provide basic security to data but now the tables have turned. It is playing a major role in providing security to our data. Biometrics are not only used in day-to-day life in phone unlocking, phone assistants, attendance systems but also used at advanced levels like in airports, border security, cloud computing etc. In this research paper, we will discuss the future scope of biometric systems and how it could even change the future.","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133381915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Antennas for Various Applications 用于各种应用的智能天线
Pub Date : 2022-08-05 DOI: 10.46860/cgcijctr.2022.07.31.316
Preeti Bansal, Nidhi Chahal
The paper presents about smart antennas for advancement in wireless and mobile communication. Smart antennas also called adaptive array antennas with better signal processing & can be used to calculate beam forming vectors which helps in tracking & locating antenna beam of target. Smart antennas are helpful in health monitoring in covid-19 pandemic and provides better service quality. Smart antenna is one of the rising innovations which can satisfy the prerequisites. Smart antennas are being used for controlling, monitoring and analyzing real time systems for various applications In smart antennas spatial division of the signal is used as compared to spectrum division, it can be beneficial for improving the performance of wireless communication. This paper describes how switched beam & adaptive array antennas differ from basic antennas.
本文介绍了智能天线在无线和移动通信中的应用。智能天线又称自适应阵列天线,具有较好的信号处理能力,可用于计算波束形成矢量,从而有助于跟踪和定位目标天线波束。智能天线有助于covid-19大流行期间的健康监测,并提供更好的服务质量。智能天线是新兴的创新技术之一,它能够满足这些前提条件。智能天线被用于各种应用的实时系统的控制、监测和分析。在智能天线中,信号的空间划分与频谱划分相比,有利于提高无线通信的性能。本文介绍了开关波束和自适应阵列天线与基本天线的区别。
{"title":"Smart Antennas for Various Applications","authors":"Preeti Bansal, Nidhi Chahal","doi":"10.46860/cgcijctr.2022.07.31.316","DOIUrl":"https://doi.org/10.46860/cgcijctr.2022.07.31.316","url":null,"abstract":"The paper presents about smart antennas for advancement in wireless and mobile communication. Smart antennas also called adaptive array antennas with better signal processing & can be used to calculate beam forming vectors which helps in tracking & locating antenna beam of target. Smart antennas are helpful in health monitoring in covid-19 pandemic and provides better service quality. Smart antenna is one of the rising innovations which can satisfy the prerequisites. Smart antennas are being used for controlling, monitoring and analyzing real time systems for various applications In smart antennas spatial division of the signal is used as compared to spectrum division, it can be beneficial for improving the performance of wireless communication. This paper describes how switched beam & adaptive array antennas differ from basic antennas.","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"41 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113992865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Spatial Analysis of the Relationship between IT Jobs and Regions in Saudi Arabia 沙特阿拉伯IT工作与地区关系的空间分析
Pub Date : 2022-08-05 DOI: 10.46860/cgcijctr.2022.07.31.286
Nouf Alqahtani, Wafa Alqarawi, A. Alghamdi, Ohud Alosaimi, O. Alrwais
Saudi Arabia has vast area with sprawling regions. As a result of diversification of kingdom's land-use (such as agriculture, residential, commercial and industrial), the employment opportunities are varied from one region to another. Saudi Arabia struggles with both high aggregate unemployment rates and persistent regional unemployment rate differentials. In this paper, we focus on Saudis’ male and female job seekers who imposes IT certifications or capabilities and sectors either public or private which provide IT job opportunities in Saudi’s regions. Using GIS-based analysis, in this research, we attend to examining spatial distributions of IT jobs and IT jobs seeker, and analyze relationship between IT jobs and Saudi’s regions in order to help both IT job seekers and providers to identify their destination for fill or provide suitable job vacancies and alleviate unemployment. This research shows that the regions with high residential density are highly centralized IT jobs and IT job seekers.
沙特阿拉伯幅员辽阔,地域广阔。由于王国土地使用的多样化(如农业、住宅、商业和工业),就业机会因地区而异。沙特阿拉伯正在与高总失业率和持续的地区失业率差异作斗争。在本文中,我们将重点放在沙特阿拉伯的男性和女性求职者身上,他们强加IT证书或能力,以及在沙特地区提供IT工作机会的公共或私营部门。在本研究中,我们使用基于gis的分析,研究了IT工作和IT求职者的空间分布,并分析了IT工作与沙特地区之间的关系,以帮助IT求职者和供应商确定他们的目的地填补或提供合适的职位空缺,并缓解失业。研究表明,居住密度高的地区是IT工作和IT求职者高度集中的地区。
{"title":"A Spatial Analysis of the Relationship between IT Jobs and Regions in Saudi Arabia","authors":"Nouf Alqahtani, Wafa Alqarawi, A. Alghamdi, Ohud Alosaimi, O. Alrwais","doi":"10.46860/cgcijctr.2022.07.31.286","DOIUrl":"https://doi.org/10.46860/cgcijctr.2022.07.31.286","url":null,"abstract":"Saudi Arabia has vast area with sprawling regions. As a result of diversification of kingdom's land-use (such as agriculture, residential, commercial and industrial), the employment opportunities are varied from one region to another. Saudi Arabia struggles with both high aggregate unemployment rates and persistent regional unemployment rate differentials. In this paper, we focus on Saudis’ male and female job seekers who imposes IT certifications or capabilities and sectors either public or private which provide IT job opportunities in Saudi’s regions. Using GIS-based analysis, in this research, we attend to examining spatial distributions of IT jobs and IT jobs seeker, and analyze relationship between IT jobs and Saudi’s regions in order to help both IT job seekers and providers to identify their destination for fill or provide suitable job vacancies and alleviate unemployment. This research shows that the regions with high residential density are highly centralized IT jobs and IT job seekers.","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133168720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of bread Quality by Inclusion of Alpha Amylase from Bacillus Licheniformis 加入地衣芽孢杆菌α淀粉酶改善面包品质
Pub Date : 2022-08-05 DOI: 10.46860/cgcijctr.2022.07.31.280
S. Sondhi, Palki Sahib Kaur, Savita Kant, Arshpreet Kaur
Amylases have discovered applications in various industries including juice preparing, processing of starch, bread improvement and other maturation forms including malting grain and in baking ventures. In this investigation, amylase extracted from Bacillus licheniformis MTCC 1483 was applied for the preparation of buns and for improvement of bread quality. It was evaluated that maximum loaf volume was obtained by an application of 3.5 unit/Kg flour of amylase at 37°C, pH 7.0 for 30min. Tactile attributes of bread viz. color, taste, flavor and acceptability were additionally upgraded. Thus, the bread prepared by using alpha amylase showed an increase in loaf volume and bread height with better taste and flavor. Overall results showed applicability of alpha amylase in baking industry.
淀粉酶已被应用于各种行业,包括果汁制备、淀粉加工、面包改良和其他成熟形式,包括麦芽谷物和烘焙企业。将地衣芽孢杆菌MTCC 1483中提取的淀粉酶应用于面包的制备和面包品质的改善。经评估,在37℃、pH 7.0条件下,添加3.5单位/Kg淀粉酶粉30min,可获得最大的面包体积。面包的触觉属性,即颜色、味道、风味和可接受性也得到了提升。由此可见,用α淀粉酶制备的面包,面包体积增大,面包高度增高,口感和风味都较好。结果表明α淀粉酶在烘焙工业中的适用性。
{"title":"Improvement of bread Quality by Inclusion of Alpha Amylase from Bacillus Licheniformis","authors":"S. Sondhi, Palki Sahib Kaur, Savita Kant, Arshpreet Kaur","doi":"10.46860/cgcijctr.2022.07.31.280","DOIUrl":"https://doi.org/10.46860/cgcijctr.2022.07.31.280","url":null,"abstract":"Amylases have discovered applications in various industries including juice preparing, processing of starch, bread improvement and other maturation forms including malting grain and in baking ventures. In this investigation, amylase extracted from Bacillus licheniformis MTCC 1483 was applied for the preparation of buns and for improvement of bread quality. It was evaluated that maximum loaf volume was obtained by an application of 3.5 unit/Kg flour of amylase at 37°C, pH 7.0 for 30min. Tactile attributes of bread viz. color, taste, flavor and acceptability were additionally upgraded. Thus, the bread prepared by using alpha amylase showed an increase in loaf volume and bread height with better taste and flavor. Overall results showed applicability of alpha amylase in baking industry.","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134584672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Research on the Techniques of Electricity Fraud Detection Using Different Machine Learning Techniques 基于不同机器学习技术的电力欺诈检测技术比较研究
Pub Date : 2022-08-05 DOI: 10.46860/cgcijctr.2022.07.31.293
Maninder Kaur, Samarth Chawla, Ruhi Dua
The vulnerability of power theft has hampered the electricity industry for decades. It obstructs social progress by having varying degrees of impact on home, commercial, and industrial customers. Sneak thieves have caught up with contemporary metering systems, putting electricity suppliers in trouble financially. This comparative analysis is the first step in the presentation of principles. Theft of electricity has serious consequences for the power grid's proper operation as well as the economic benefits of power corporations and commercial power service providers. An effective anti-power-theft algorithm is required for tracking power usage statistics in order to detect electricity power theft. In this literature review, we differentiate the Support Vector Machine (SVM) algorithm with other techniques for detecting abnormal usage among consumers (i.e., electricity fraudsters) in time-series data on power consumption. The results show some combinations can reach significantly better values than others, comparing both the balancing techniques for a same machine learning method itself as well as comparing these combinations between themselves.
几十年来,电力盗窃的脆弱性一直阻碍着电力行业的发展。它通过对家庭、商业和工业客户产生不同程度的影响来阻碍社会进步。偷窃者已经赶上了现代的计量系统,使电力供应商陷入了财务困境。这种比较分析是提出原则的第一步。窃电对电网的正常运行以及电力公司和商业电力服务商的经济效益造成了严重的影响。为了检测窃电行为,需要一种有效的反窃电算法来跟踪电力使用统计数据。在这篇文献综述中,我们将支持向量机(SVM)算法与其他技术区分开来,用于检测电力消耗时间序列数据中消费者(即电力欺诈者)的异常使用情况。结果表明,通过比较同一机器学习方法本身的两种平衡技术以及它们之间的组合,一些组合可以达到比其他组合明显更好的值。
{"title":"Comparative Research on the Techniques of Electricity Fraud Detection Using Different Machine Learning Techniques","authors":"Maninder Kaur, Samarth Chawla, Ruhi Dua","doi":"10.46860/cgcijctr.2022.07.31.293","DOIUrl":"https://doi.org/10.46860/cgcijctr.2022.07.31.293","url":null,"abstract":"The vulnerability of power theft has hampered the electricity industry for decades. It obstructs social progress by having varying degrees of impact on home, commercial, and industrial customers. Sneak thieves have caught up with contemporary metering systems, putting electricity suppliers in trouble financially. This comparative analysis is the first step in the presentation of principles. Theft of electricity has serious consequences for the power grid's proper operation as well as the economic benefits of power corporations and commercial power service providers. An effective anti-power-theft algorithm is required for tracking power usage statistics in order to detect electricity power theft. In this literature review, we differentiate the Support Vector Machine (SVM) algorithm with other techniques for detecting abnormal usage among consumers (i.e., electricity fraudsters) in time-series data on power consumption. The results show some combinations can reach significantly better values than others, comparing both the balancing techniques for a same machine learning method itself as well as comparing these combinations between themselves.","PeriodicalId":373538,"journal":{"name":"CGC International Journal of Contemporary Technology and Research","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115583840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
CGC International Journal of Contemporary Technology and Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1