Full Paper View Go Back
A Comparative study about pi in various ancient civilization and it’s present scenario
Neha Choubey1 , Garima Singh2 , Anshu Singh3
Section:Research Paper, Product Type: Journal-Paper
Vol.11 ,
Issue.3 , pp.50-56, Jun-2024
Online published on Jun 30, 2024
Copyright © Neha Choubey, Garima Singh, Anshu Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Neha Choubey, Garima Singh, Anshu Singh, “A Comparative study about pi in various ancient civilization and it’s present scenario,” International Journal of Scientific Research in Mathematical and Statistical Sciences, Vol.11, Issue.3, pp.50-56, 2024.
MLA Style Citation: Neha Choubey, Garima Singh, Anshu Singh "A Comparative study about pi in various ancient civilization and it’s present scenario." International Journal of Scientific Research in Mathematical and Statistical Sciences 11.3 (2024): 50-56.
APA Style Citation: Neha Choubey, Garima Singh, Anshu Singh, (2024). A Comparative study about pi in various ancient civilization and it’s present scenario. International Journal of Scientific Research in Mathematical and Statistical Sciences, 11(3), 50-56.
BibTex Style Citation:
@article{Choubey_2024,
author = {Neha Choubey, Garima Singh, Anshu Singh},
title = {A Comparative study about pi in various ancient civilization and it’s present scenario},
journal = {International Journal of Scientific Research in Mathematical and Statistical Sciences},
issue_date = {6 2024},
volume = {11},
Issue = {3},
month = {6},
year = {2024},
issn = {2347-2693},
pages = {50-56},
url = {https://www.isroset.org/journal/IJSRMSS/full_paper_view.php?paper_id=3537},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRMSS/full_paper_view.php?paper_id=3537
TI - A Comparative study about pi in various ancient civilization and it’s present scenario
T2 - International Journal of Scientific Research in Mathematical and Statistical Sciences
AU - Neha Choubey, Garima Singh, Anshu Singh
PY - 2024
DA - 2024/06/30
PB - IJCSE, Indore, INDIA
SP - 50-56
IS - 3
VL - 11
SN - 2347-2693
ER -




Abstract :
Presently, blockchain-powered cryptocurrency has gained widespread recognition. Bitcoin stands out as one of the most valuable and sought-after digital currencies. However, Bitcoin`s accessibility is limited across various platforms, and its user-friendliness leaves much to be desired. Nonetheless, a new user-friendly cryptocurrency is on the horizon. Pi Coin aims to cater to a broader audience, potentially revolutionizing the future cryptocurrency landscape. While Bitcoin has already established its demand in the crypto sphere, Pi Coin is generating considerable buzz as it prepares for launch. This paper will explore the projected value of Pi Coin based on the timeline of Bitcoin`s development.
Key-Words / Index Term :
Blockchain, cryptocurrency, Bitocoin, Pi Network
References :
[1] R. Merkle, “Protocols for public key cryptosystems,” in Proceeding of the 1980 Symposium on Security and Privacy, IEEE Computer Society, pp. 122-133, April 1980.
[2] F. Tschorsch and B. Scheuermann, “Bitcoin and beyond: a technical survey on decentralized digital currencies,” IEEE Communications Surveys & Tutorials, vol.18, pp.2084-2123, March 2016.
[3] J. Douceur, “The Sybil attack,” in Proceedings of IPTPS `01 Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp. 251-260, March 2002.
[4] S. Barber, X. Boyen, E. Shi and E. Uzun, "Bitter to better—How to make bitcoin a better currency", Proc. 16th Int. Conf. Financial Cryptogr. Data Secur. (FC’12), pp. 399-414, Mar. 2012.
[5] N. Asokan, P. A. Janson, M. Steiner and M. Waidner, "The state of the art in electronic payment systems", IEEE Comput, vol. 30, pp. 28-35, Sep. 1997.
[6] Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin, “Secure Distributed Key Generation for Discrete-Log Based Cryptosystems”, Proc. Of the 17th Int. Conf. on Theory and application of cryptographic techniques, May 2005.
[7] A. Biryukov, D. Khovratovich, “Equihash: asymmetric proof-of work based on the generalized birthday problem,” Ledger, vol. 2, pp. 1-30, April 2017.
[8] Md. Mahfuzul Islam Shamim “IT Skills Development Project and Economic Development in Bangladesh”, Academic Journal of Digital Economics and Stability, vol. 19(7), pp.13-21, July 2022.
[9]K.M.Samin, Bijoy Kumar Deshmukhya, Farhan Bin Alam, "A Brief analysis on predicted future value of pi network on the basis of bitcoin", Global Mainstream Journal of Innovation, Engineering & Emerging Technology, October 2022.
[10] D. Malkhi and M. Reiter, “Byzantine quorum systems,” Distributed Computing, vol. 11, pp. 203-213, October 1998.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.