16 INTERNATIONAL MULTIDISCIPLINARY CONFERENCE ON INFORMATION SCIENCE, MANAGEMENT RESEARCH AND SOCIAL SCIENCES (ICISMRSS – 2022) 18th & 19th April 2022 ITED WITH GRA RED D C AC A+ E An ISO Certified Institution - 21001 : 2018 An ISO 21001 : 2018 Certified Institution Palakkad Main Road, Navakkarai Coimbatore Affiliated to Bharathiar University, Coimbatore Approved by Govt. of Tamil Nadu, Recognized by Tamil Nadu - 641 105 UGC, New Delhi Under Section 2(f) and 12(B) /ajkcollege /ajkinstitutions www.ajkcas.com Ph: 0422 - 3501700 in Association with NAAC PROCEEDINGS Volume I Department of Computer Applications TED WITH GR EDI AD CR AC A+ E An ISO Certified Institution - 21001 : 2018 An ISO 21001 : 2018 Certified Institution Palakkad Main Road, Navakkarai Coimbatore Affiliated to Bharathiar University, Coimbatore Approved by Govt. of Tamil Nadu, Recognized by Tamil Nadu - 641 105 UGC, New Delhi Under Section 2(f) and 12(B) /ajkcollege /ajkinstitutions www.ajkcas.com Ph: 0422 - 3501700 NAAC ISBN: 978-93-5619-947-7 978-93-5619-947-7 ISBN: Proceedings of the International Multidisciplinary Conference on Information Science, Management Research and Social Sciences (ICISMRSS – 2022) Volume 1 © AJK College of Arts and Science, Coimbatore, April 2022. All rights reserved. No part of the material protected by this Copyright notice may be reproduced or utilized in any form or by any means, electronic or mechanical including photocopying, recording or by any information storage and retrieval system, without prior written permission from the copyright owner. Statement and options in this proceedings or those of the contributors and the publisher assume no responsibility for them. ISBN: 978-93-5619-947-7 EDITORIAL BOARD Chief Patron Dr. AJEET KUMAR LAL MOHAN Patron Mrs. BINDU AJEET Principal Dr. B. SATHEESHKUMAR Chief Editor Dr. ANEESHKUMAR A.S. Editorial Board Mrs. N. RAJESWARI Mrs. A. MEENA Mrs. ARCHANA KRISHNAN KALLINGAL AJK College of Arts and Science Palakkad Main Road, Navakkarai Coimbatore - 641 105 Tamil Nadu, India Website: https://ajkcas.com/ Mail-id: imc@ajkcas.com MESSAGE FROM CHIEF PATRON With immense pleasure, I congratulate the Departments of Computer Applications of AJK College of Arts and Science for organizing International Multidisciplinary Conference on Information Science, Management Research and Social Sciences on 18th & 19th April 2022. The AJK College of Arts and Science (AJKCAS) has institutionalised community-service approach to provide opportunities to the students hailing from rural areas, girl students, and students from marginalized sections of society. It has marked its significant presence by attaining A+ grade in NAAC and 115th rank amongst the Higher Educational Institutions in India with its effective participation in the country’s rural development process through "Unnat Bharat Abhiyan". The college provides a high degree of personalized education and supports the advancement and dissemination of knowledge through quality teaching, research and scholarly activities. In addition to academic, vocational, and technical skills, AJKCAS facilitates the students to gain knowledge and develop relevant values, attitudes, and skills for a fuller participation in society through Life Skills. The Quality research and effective presentation of the research work is the need of the hour. I’m greatly delighted that this International Conference will draw in the participation of a large number of eminent personalities, academicians, research scholars and industrialists who willing be sharing their experiences and research results of Multi-disciplinary subjects which would definitely have a meaningful impact on the participants. My heartiest appreciations to the Principal, Convenor, Organizing Members for their sincere efforts to make this event a success and for editing the proceedings to promote the spirit of research development in AJKCAS. Dr. AJEET KUMAR LAL MOHAN Secretary Professor and Research Guide Department of Catering Science & Hotel Management AJK College of Arts and Science Coimbatore, India International Multidisciplinary Conference on Information Science, Management Research, and Social Sciences Organized by the AJK College of Arts and Science, Coimbatore, India in association with ISMASI, Azteca University, Mexico, North America MESSAGE An innovative application of scientific inventions to solve varieties of problems of human beings in society leads to the development of engineering and technology. It is believed that continuous research and innovations in engineering and technology and managing them systematically can only solve basic (human need based) problems, comfortable (human wants based) problems, and desires (human dream based) problems of society. The systematic management of 21st century Engineering and Technologies includes identifying the potential breakthrough technologies and developing them systematically to realize the dreams to take the civilization to its supersaturated level with abilities such as ubiquitous, omnipotent, and immortal superhuman beings. In this regard, the International Multidisciplinary Conference on Information Science, Management Research and Social Science is being organized Today (18th & 19th April 2022) by the AJK College of Arts and Science, (NAAC Accredited & Bharathiar University affiliated), Coimbatore, India under the Convener-ship of Dr. Aneeshkumar A. S., in association with the ISMASI, Azteca University, Mexico, North America under the leadership of Prof. Ricardo Saavedra Hidalgo, to help young and experienced researchers to exchange new ideas, concepts, and methods in Science, Technology, Management, and Social Science. I wish all the best for all participants and online paper presenters of the conference, which helps further research and contributions in the field and future endeavour in society. With Thanks to everyone, Dr. P. S. Aithal M.Sc.(Physics), M.Sc.(E-Business), M.I.T(I.T.), M.Tech.(I.T.), Ph.D.(Physics), Ph.D.(Business Management), PostDoc.@PRL, Ahmedabad, PostDoc.@CREOL, UCF, USA. Vice Chancellor Srinivas University Mangalore, Karnataka, India Prof. Ricardo Saavedra Hidalgo Director & Chair, International Programs, Azteca Iniversity, Mexico The Conference aims to bring different ideologies under one roof and provide opportunities to exchange ideas face to face, to establish research relations and to find global partners for future collaboration. The conferences and educational forums should uphold the quality of learning and encourage research. I thank and congratulate the team of AJK College of Arts and Science for the association with Azteca University. I am sure that the theme of the conference will provide meaningful platform to researchers and all the participants to exchange their experiences and ideas. The guidance given by eminent researchers will be an intellectual treat to the delegates. I wish the International conference a Grand Success!!! Prof. Ricardo Saavedra Hidalgo Crown University Int'l Chartered Inc (CUICI) International Centre for Curriculum & Research Development Santa Cruz Campus, Argentina, South America (URL: https://www.crownintl.education/) Santa Cruz, Argentina ● California, USA ● Bong, Liberia ● Cotonou, Benin ● Worldwide Online Operations UNESCO Laureate Prof. Sir Bashiru Aremu Vice Chancellor, (CUICI) & President, (ICCRD) From the Desk of Chief Mentor This is an important juncture of all of us regarding this International Conference. Today (1804-2022) on this auspicious day I would like to congratulate and thanks Dr. A. S. Aneeshkumar, the Convener and whole organizing committee and team of AJK College of Arts and Science and Azteca University of this International Multidisciplinary Conference on Information Science, Management Research and Social Science 2022. It is creditable to note that as ICCRD is under the CUICI, Argentina (and worldwide on-campus and online operations) is actively engaged for further promotion of research and development activities. Therefore all the participants including paper presenters and whole knowledge community will get benefit from the same. With Thanks to everyone, UNESCO Laureate Prof. Sir Bashiru Aremu Vice Chancellor, (CUICI) & President, (ICCRD) 19-03-2021, Santa Cruz, Argentina, South America International Registration ●Approval ● Accreditation ● Association Message from Keynote Speaker It gives me great pleasure to extend my warm greetings to the International Multidisciplinary Conference on Information Science, Management Research and Social Sciences (ICISMRSS – 2022) hosted by the AJK College of Arts and Science. In this Covid -19 situation, the entire world is affected. But I am happy to hear that the Research and knowledge sharing is going to make through this Conference. The theme and objective of the conference is to facilitate an International forum for worldwide researchers, Academicians, Scientists and Industrialists to put forward their insights and research contributions. Dr. Sharif M. Abu Karsh Associate Professor in Finance, Faculty of Administrative and Financial Sciences, Arab American University, Palestine. Message from Keynote Speaker It is gives me an immense pleasure to act as Keynote Speaker for this International ConferenceIMCISMRSS-2022. It is an important auspicious day for me since this International Multidisciplinary Conference on Information Science, Management Research and Social Science (IMCISMRSS-22) is multidisciplinary one. I am thankful to the organizing body i.e. AJK College of Arts and Science, Coimbatore, TN, India which is a NAAC Accredited A+, & Bhartihar University, TN, India affiliated institute located at Coimbatore, India for their interest to hold an important event with the International School of Management, Applied Science and Informatics (ISMASI), Azteca University. I rendering my sincere thanks and appreciation to the whole organizersI offer my love and wish to remarkable 200 Paper presenters for their Paper Publication also to make this Conference as a true and biggest knowledge event . My sincere thanks to all of them who were involved with IMCISMRSS-2022 once again! Dr. Randa Hariri Associate Professor, Dar Al Hekma University, Jeddah, Kingdom of Saudi Arabia Message from Keynote Speaker Dr. Kenneth Okereafor Deputy General Manager, Department of Information and Communications Technology, National Health Insurance Scheme (NHIS), Abuja It is an immense pleasure for me that Department of Computer Applications, AJK College of Arts and Science, India is going to organize the International Multidisciplinary Conference on Information Science, Management Research and Social Sciences on 18 -19 April 2022 in association with the ISMASI, Azteca University, North America. I would like to congratulate and thank Dr. Aneeshkumar, A.S., the Convener and whole organizing team and other associated team members of this international conference. I am thankful to the AJK College of Arts and Science and Azteca University for taking the initiative of gathering international research scholars, academicians and professionals under this platform of acquiring and dissemination of knowledge through research and development activities. I hope all the valuable participants including paper presents, discussants, session chairs and the whole research-based knowledge community will be benefitted from the conference. I wish the success of the international conference. Preface The Departments of Computer Applications, AJK College of Arts and Science, Coimbatore delighted to organize International Multidisciplinary Conference on Information Science, Management Research and Social Sciences (ICISMRSS – 2022) in association with Azteca University on 18th & 19th April 2022 and feel pleasure to presenting you the first Volume of the Conference Proceedings. It is going to be the flagship publication regarding various dimensions of research. It is an ideal opportunity to present research experiences, latest developments, innovations in different fields of research and multidisciplinary approaches. The objective of this Multidisciplinary platform is to provide a common forum for a constructive dialogue on theoretical concepts and practical ideas. It brings together Academicians, Research Scholars, Scientists, Industrial Professionals and Students and share their ideas, research results and to explore collaborations. The information presented herein should help to open up new avenues for research and provide growers to with new ideas to help them improve their technical as well as research efficiency. I am very happy to say that we have received overwhelming number of contributions and enthusiastic support for this Conference. I take both pleasure and honour to extend my gratitude to the distinguished Chief Guest, Keynote Speakers and Session Chairs for accepting my invitation and providing wonderful talk over here. I express our thanks to all those who succour us in various ways in making the International Multidisciplinary Conference a splendid success. I express our gratitude to Dr. Ajeet Kumar Lal Mohan, Secretary, AJK College of Arts and Science and Mrs. Bindu Ajeet, Director, AJK College of Arts and Science for providing support and facilitation. I am grateful to the Principal and Academic Dean of AJK College of Arts and Science for the constant support and guidance. I am pleased to thank and express sincere appreciation to my Colleagues who work as Organizing Committee. This is also the time to thank Student volunteers for their support. I would thank the Paper presenters for their willingness to share their latest research and ideas. Without their efforts this Conference would not be possible. I expect your participation in future events and express thanks for carrying this International Conference to the Academic heights. Dr. Aneeshkumar A.S. Conference Convener Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 CONTENTS S. No. 1 Title Consumption of Ultra-Processed Foods and Anthropometric Status of Adults in Ikwuano Local Government Area, Abia State Nigeria Page No. 1-7 A.D. Oguizu, O.S. Nweze 2 MOTunAr Ontology: Creation and Axioms Impacts 8-14 Degachi Haifa, Yengui Ameni, Neji Mahmoud 3 Determinants of Employee Job Satisfaction: An Analysis of Structural Equation Model 15-21 Muhammad Alkirom Wildan 4 A Simple Optical Method for Determination of the Dielectric Constant of Salt (%) Water using Ultraviolet Light 22-25 Prof. Samir A. Hamouda, Maqboula Khamis Ibrahim 5 Growth Perspectives of Small Tea Growers – A Study in Golaghat District of Assam 26-29 Anitabh Kakoty, Dr. Ratan Kaurinta 6 Effective Learning and Classification using Random forest Algorithm 30-33 Seema Rani, Dr. (Prof.)Mukesh Singla 7 Corruption in India: Challenges and Prospects 34-40 Dr. Showket Ahmad Dar, Feroz Ahmad Wani 8 The Challenges Managers Have to Face in Making Ethical Decisions in Banking Industry 41-44 Dr. Manjit Kour 9 IoT Based Solutions for Monitoring of Landslides and Slope Failures 45-50 Dr Guntha Karthik 10 A Study on Machine Learning Methodologies for breast Carcinoma Disease Prediction 51-57 K. VigneshKumar, Dr. N. Sumathi, Dr. S. Ragul 11 Analyze the MIS Support in Education System, Challenges Arising Globalization and Liberalization S.Kiruthiga, N.Beulah Jebaseeli, Dr.D.Umanandhini, Dr.S.Sridevi ISBN: 978-93-5619-947-7 58-63 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 12 Security Based Home Automation using IoT Devices 64-67 Dr.J.Dhilipan, D.B.Shanmugam, Chiranjeevi .C 13 Empowerment of Self Help Groups Towards Women Microenterprise Improvement in Tamilnadu 68-70 V.Sudha, Dr.S.Balamurugan 14 Social Science with Gender Issues, Equality and Empowerment of Women and Girl Child 71-73 Dr. S. Kalaichelvi 15 AI based Drone Escort Ambulance Service System in Heavy Traffic 74 -76 S.Kiruthiga, N.Beulah Jebaseeli, Dr.D.Umanandhini, Dr.S.Sridevi 16 Mathematical Modelling on Vaccine Distribution for Prevention of Covid 77-82 Dr.P. Jamuna Devi, D. Mahalakshmi 17 Recent Trends in Tithe Green Banking Products and Services in India 83-87 Dr. D. Murugan 18 Art Authentication through Digital Techniques 88-91 Dr. K. Hema Shankari 19 Investigation Study on Energy Efficient Routing Techniques in Wireless Sensor Network 92-96 P.Arunkumar, Dr.K.K.Savitha 20 A Spatio – Temporal Analysis on Human Resource Management in Fishing – Some Evidential Proofs 97-100 Dr. H. Sulaiman 21 Analysing Problems of Tiny Agricultural Farmers with Special Reference to Selected Farmers Collectives in Kozhikode District, Kerala 101-105 Dr. M.Dhanabhakyam, Monish P 22 Social Role of IOT and Impact Analysis of its Penetration and Evolving into Society and Beneficiaries 106-109 P.Gayathridevi 23 Handwritten Digits Recognition using CNN Identifying the Regional Based Writing Style S.Sindhu, P M Kavitha, MD.Tafsil, Rajesh Rana, Akshay Kumar Rana ISBN: 978-93-5619-947-7 110-113 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 24 114-116 Modelling and Forecasting of Stock Price Volatilty– An Analysis K. Kannan, Dr. S. Balamurugan 25 Payment Transaction using Face-Recognition 117-120 P. M. Kavitha, D. B. Shanmugam, T. Akash, T. Karan Raj, A. Girish Gowtham 26 Study Paper on E-Recruitment 121-123 Priyanka Shivaji Patil 27 Analyze the Health Anagement Information System and Organizational Structure 124-130 Pushpa Rani, Dr. Brij Mohan Goel 28 A Study on Pradhan Mantri Jan Dhan Yojana in Public and Private Sector Banks in India 131-134 Dr. M. Sumathy, Sneha Jayalakshmi 29 Function of Management Information System in Education 135-140 Ms.Suman, Dr.( Prof ) MukeshSingla 30 Conceptual Insights of Smart Glasses 141-144 Ms.SaniaKukkar 31 Impact of Digitalization of Human Resource Functions in Private and Public Sector Life Insurance Companies 145-149 Ausaf Ahmad Khan 32 DC-IDS: Distributed Collaborative Intrusion Detection Systems for Vanets 150-154 C. Rajkumar, Dr. T. Sangeetha, P. Panneer Selvan 33 Voice Based Email for Visually Challenged 155-160 Dr.T.S.Suganya, M. Divya, V. Devi, Sunil S, Tamil Selvan T, Akshay Ashok 34 A Health Care System for Doctor’s Obtainability and Nearest Search using K-Means Clustering 161-163 V.Devi, Dr.T. S. Suganya, Dr.S.Jayachandran, Illavarasan, Dilip Kumar 35 Security Improvement of Cloud Data using Hybrid Cryptography and Steganography D.B.Shanmugam, Dr.N.Vijayalakshmi, S. Andrew Sesubalan, D.Immanuel, V.R.Shravan ISBN: 978-93-5619-947-7 164-169 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 36 The Peace of old Life vs. the Craze of Social Media 170-172 Dhanalakshmi M 37 Survival Study on Energy Optimized Data Forwarding Techniques in Wireless Sensor Network P.Thirunavukarasu, Dr.K.K.Savitha ISBN: 978-93-5619-947-7 173-178 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Consumption of Ultra-Processed Foods and Anthropometric Status of Adults in Ikwuano Local Government Area, Abia State Nigeria A.D. Oguizu1, O.S. Nweze2 1 Senior Lecturer, 2Graduate Student 1,2 Department of Human Nutrition and Dietetics, Michael Okpara University of Agriculture, Umudike, P.M.B. 7267, Umuahia, Abia State Abstract: Background: Ultra-processed foods are industrially formulated food products manufactured largely by food companies packaged in such a way to make them intensely palatable, have long shelf stability and eliminate the need for culinary preparations. Objective: This study assessed the consumption of ultra-processed foods and anthropometric status of adults aged (20-49 years) in Ikwuano Local Government Area Abia State, Nigeria. Methods: The study was a cross sectional survey of 440 adults randomly selected for the study. A well-structured and validated questionnaire was used to collect information on the socio-economic and demographic characteristics, the consumption of ultra-processed foods, the dietary pattern and anthropometric status of the respondents. The questionnaires were coded and entered into computer using the statistical package for social sciences (SPSS) version 23.0. The data were analyzed using descriptive statistics. Chisquare analysis was used to assess the relationship between the consumption of ultra-processed foods and anthropometric status of the respondents. Results: More than half of the respondents (67.0%) were males while 33.0% were females. Majority of the adults (62.3%) were between the ages of 26 and 32 years. Majority of the respondents (80.0%) were Christian, about 18.0% were traditionalist, and more than half of the respondents (82.2%) were Igbo. More than half of the respondents (63.6%) had tertiary education. About a quarter of the respondents (48.0%) were traders/business persons, 27.7% were civil/public servant, 8.2% were farmers and 2.5% were unemployed. About a quarter of the respondents (46.8%) earned less than ₦30,000 a month. only a few of the respondents (3.4%) earned above ₦91,000 per month. One third of the respondents consumed sweets, candies, soft drinks, pizza, burger, pasta, canned vegetables and sweetened breakfast cereals daily. About half of the respondents (53.0%) who were overweight consumed soft drinks daily. A total of 36.3% of the respondents were overweight, while 20% were obese. The chi-square analysis showed there was a significant association (p<0.000) between consumption of cake, pizza, burger and BMI of the respondents. Obesity was higher amongst male adults than female adults. Conclusion: One third of the respondents were overweight, while about 20% were obese. There is need to focus on educating the community on the need to consume home-made dishes from fresh indigenous foods. Keywords: Ultra-Processed Foods; Adults; Anthropometric Status; Abia State; Nigeria ISBN: 978-93-5619-947-7 I. INTRODUCTION The dietary patterns of the world population have been on transition due to the high consumption of readyto-eat foods, which have increased levels of fat and sugar, and lower intake of unprocessed foods, such as fruits, vegetables, tubers, and cereals (Monteiro et al., 2011). The potential cause of the pandemic of overweight, obesity and rapid rise of related chronic diseases especially in under developed countries is the corresponding increase in the production, processing and consumption of readily available ‘fast’ or ‘convenience’ ready-to-eat or ready-to-heat processed food and beverage products (WHO, 2010). Ultra-processed foods are defined within the NOVA classification system, which groups foods according to the extent and purpose of industrial processing. NOVA is a food classification system developed by researchers at the university of Sao Paulo Brazil (Monteiro et al., 2011). A practical way to identify an ultra-processed product is to check to see if its list of ingredients contains at least one item characteristic of the NOVA ultraprocessed food group, which is to say, either food substances never or rarely used in kitchens (Monteiro et al., 2015). Ultra-processed fast foods and soft drinks are the main business of transnational and big national catering chains, whose outlets are also often open until late at night, and whose products are designed to be consumed also in the street, while working or driving, or watching television (Allemandi, 2018). The consumption of ultra-processed foods are increasing rapidly, replacing use of traditional or indigenous, culturally acceptable freshly cooked food (Moodie et al., 2013). These Ultra-processed products are characteristically formulated from ‘refined’ and ‘purified’ ingredients freed from the fibrous watery matrix of their original raw materials. They are formulated to be sensually appealing, hyperpalatable, and habit-forming, by the use of sophisticated mixtures of cosmetic and other additives, and state of the craft packaging and marketing (Baker and Friel, 2016). 1 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 The World Health Organization stated that sugary drinks, energy dense snacks and 'fast food', all of which are ultra-processed, are key drivers of obesity, diabetes, cardiovascular diseases and certain cancers (WHO, 2018). Most people crave and consume more of these ready to eat or convenient foods not necessarily because they want them but because they see these ultra-processed foods are the fastest and easiest food to prepare or consume. Others also consume them just to save time while others take them as meal to meet up their daily dietary requirement. There is a major concern on the increase in the prevalence of non-communicable diseases like hypertension, diabetes and stroke amongst adults, hence this study assessed the consumption of ultra-processed foods, dietary pattern and anthropometric status of adults aged (20-49 years) in Ikwuano Local Government Area, Abia State. II. MATERIALS AND METHODS A preliminary visit was made to the local government chairman to obtain permission and approval for the research. The study was made possible by the approval of the members of the ethical committee of Ikwuano Local Government Area, Abia State. The respondents were also enlightened on the purpose of the study and their consent was obtained before the study was carried out. There was no monetary reward for participating in the study. Study Area: The study was carried out in Ikwuano Local Government Area, Abia State, Nigeria. Ikwuano is one of the local government areas in Abia State. The headquarters is in Isiala Oboro. Ikwuano local government has an area of 281 km2 and a population of 137,993 at the 2006 census. It is made up of about 37 communities and 314 villages and is bounded by Ini local government area of Akwa-Ibom State by the West and Umuahia South to the North. The occupations of the people are trading and small scale farming. Ikwuano LGA is known for her agricultural activities with much concentration of palm oil/kernel, cocoa, cocoyam, maize, melon, cassava, yam and a variety of vegetables. It is also known as the Food Basket of Abia State because of its richness in agricultural produce. Population of the Study: The population of the study consists of both female and male adults (20-49 years) in Ikwuano Local Government Area, Abia State. III. SAMPLE SIZE AND CALCULATIONS The sample was determined using the Yamane’s formula (Yamane, 1973) for sample size estimation. Sample size (n) = n = sample size N = Total population in Ikwuano LGA (137,993) 1 = constant e = Precision or sampling error (0.05)2 Substituting the values in the formula gives: n= ISBN: 978-93-5619-947-7 n= n= n =399.9 ≈ 400 Calculating drop out of 10%; = 40 Sample size = 400 + 40 = 440 Sample size was rounded up to 440 to make up for drop outs. 3.1 Sampling Procedure A multi-stage sampling technique was used for this study. Ikwuano comprises of 37 communities and four wards. Two wards (Oboro and Ibere) were selected using simple random sampling for the study. Five villages were randomly selected from the two wards out of the four wards in Ikwuano local government. The villages selected were; Umuariaga, Umudike, Amaoba-Ime, Amawom and Umugbalu. The households and adults were randomly selected. Each respondent from the household selected were interviewed and a questionnaire was given to them to fill. A total of 440 adults were selected for this study. IV. DATA COLLECTION A well-structured and validated questionnaire was used to collect information on the socio-economic and demographic characteristics, the consumption of ultraprocessed foods and the dietary pattern of the respondents. 4.1 Weight Measurement The weight of the respondents were taken and recorded to the nearest 0.1 kilogram using a portable bathroom scale (Hansen Ireland Model). The scale was placed on a level ground and was regularly adjusted to zero for accuracy before the respondents stepped on it. The respondents were asked to remove any heavy items from their pockets and also any items of heavy clothing or apparel. 4.2 Height Measurement The heights of the respondents were measured using a constructed height meter which was placed on a level floor close to the wall. The respondents were asked to remove their shoes before taking the measurement for accurate reading. They were asked to stand with their back resting on the wall and looking forward to ensure that the back of their feet, claves, bottom, upper back and back of their head are in contact with the wall. The respondents stood directly underneath the measuring device, the device was lowered until it rests gently on top of the respondent’s head and then the measurements were recorded to the nearest 0.1 centimeters. 2 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 4.3 Dietary Assessment A structured food frequency questionnaire on dietary feeding was used to determine the dietary pattern of the adults. The food frequency questionnaire was used to determine how often the respondents consume ultraprocessed food. The food frequency questionnaire consisted of list of ultra-processed food products and drinks with response categories to indicate frequency of consumption over a period of time. V. DATA ANALYSIS The anthropometric data (weight and height) were used to obtain the body mass index of the respondents. The BMI was categorized using reference standard. Statistical analysis was performed using the statistical package for service solutions version 23.0. Descriptive statistics was used to determine the socio-economic and demographic characteristics, consumption of processed and ultra-processed foods and dietary pattern of the respondents. Chi-square analysis was used to assess the relationship between the consumption of ultra-processed foods, dietary pattern and the anthropometric status of the respondents. P value of 0.05 was considered statistically significant. VI. RESULTS Table 1 shows the socio-economic and demographic characteristics of the respondents. Majority of the respondents (67.0%) were male while about 33.0% were female. More than half of the respondents (62.3%) were between the ages of 26 and 32 years. About 19.5% of the respondents were between the ages of 19 and 25 years. Majority of the respondents (80.0%) were Christian, about 18.0% were traditionalist, while a few of the respondents (1.6%) were Muslims. More than half of the respondents (82.2%) were Igbo, 9.1% were Hausa and 7.3% were Yoruba. More than half of the respondents (63.6%) had tertiary education, about 19.3% had secondary school education and 11.1% had little or no education. About a quarter of the respondents (48.0%) were traders/business persons, 27.7% were civil/public servant, 8.2% were farmers and 2.5% were unemployed. About a quarter of the respondents (46.8%) earned less than ₦30,000 a month. One third of the respondents (30.5%) earned between ₦31,000-₦60000 a month, only a few of the respondents (3.4%) earned above ₦91,000 per month. Table 1. Socio-economic and demographic characteristics of the respondents Variable Age range (years) 19-25 26-32 33-39 40-49 Total Gender Frequency Percentage 86 274 72 8 440 19.5 62.3 16.4 1.8 100 ISBN: 978-93-5619-947-7 Male 295 Female 145 Total 440 Religion Christianity 352 Traditional 81 Islam 7 Total 440 Ethnic group Igbo 361 Hausa 40 Yoruba 32 Others 7 Total 440 Educational qualification Non formal 49 Secondary 85 Tertiary 280 Vocational education 26 Total 440 Income level Less than ₦30,000 206 ₦31,000-60,000 134 ₦61,000-90,000 85 ₦91,000 and above 15 Total 440 Occupation Civil/public servant 122 Farmer 36 Trader/business 211 person Student 23 Artisan/craft person 37 Unemployed 11 Total 440 67 33 100 80 18 1.6 100 82.2 9.1 7.3 1.6 100 11.1 19.3 63.6 5.9 100 46.8 30.5 19.3 3.4 100 27.7 8.2 48.0 5.2 8.4 2.5 100 Table 2 shows the consumption pattern of ultraprocessed foods and drinks by the respondents. A quarter of the respondents (40.9%) consumed sweets daily, while 27.7% of them consumed sweets weekly. One third of the respondents (34.1%) consumed candies daily, while about 28.9% consumed candies weekly. A quarter of the respondents (41.6%) consumed soft drinks daily, while about 28.0% consumed soft drinks weekly. About 20.0% of the respondent consumed cheese daily, 18.3% consumed cheese weekly while 50.9% rarely consumed cheese. About 10.5% consumed sardine daily, while about 33.1% of the respondents consumed sardine weekly. About 5.0% consumed canned meat daily, while 28.6% consumed canned meat weekly. About 26.4% consumed mayonnaise weekly, while 33.9% of the respondents rarely consumed mayonnaise. More than a third (30.9%) of the respondents consumed pizza daily while about 9.1 % consumed pizza weekly. About a third (30.1%) of the respondents consumed burger daily, while 14.3% consumed burger weekly. About 26.1% of the respondents consumed cake daily, while 26.0% consumed cake weekly. About 19.5% of the respondents consumed sausages daily, while 22.1% consumed sausages weekly. About 47.1% of the respondents consumed hot dogs weekly. About 7.3% of the respondents consumed ice cream daily, while 35.2% consumed ice cream weekly. 3 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 About 22.3% of the respondents consumed beer daily, while 24.1% consumed beer weekly. About 8.2% of the respondents consumed sharwama daily, while 30.6% consumed sharwama weekly. One third (31.1%) of the respondents consumed pasta daily, while 38.0% consumed pasta weekly. About a quarter (37.4%) and few (8.9%) of the respondents consumed canned fruits and vegetables daily, while less than half (40.0%) of the respondents consumed canned fruits and vegetables weekly. About 26.0% of the respondents consumed instant noodles daily. About a quarter of the adults (46.4%) consumed sweetened breakfast cereals daily. Table 2. Consumption pattern of ultra-processed foods and drinks of the respondents studied Variables Daily Once a week F % Sweets Candies Soft drinks Cheese Sardine Canned meat Mayonnaise Prawn cracker Pizza Burger Cakes Cookies Energy drink Sausages Hot dogs Sandwich Ice cream 180 155 183 88 46 10 36 10 48 147 115 108 84 50 15 32 19 Jam Beer Chocolates Sharwama Cheese ball Canned fish Pasta Flavored yoghurt Canned fruits Canned vegetables Sweetened juices Instant noodles Bread and buns Sweetened breakfast cereals 33 199 33 36 17 17 49 93 39 131 50 98 99 200 Rarely % 40.9 34.1 41.6 20.0 10.5 5.0 1.4 5.0 30.9 30.1 26.1 24.5 20.0 19.5 3.4 7.3 7.3 122 144 53 76 132 91 99 21 23 47 64 86 73 121 51 102 50 27.7 28.9 16.2 18.3 30.0 20.7 7.5 4.8 8.2 14.3 6.4 11.1 9.7 4.8 5.0 23.2 8.2 103 73 103 26 46 38 21 37 141 46 79 87 76 33 178 67 154 14.0 20.8 28.0 10.8 33.1 28.6 26.4 48.4 9.1 10.1 26.0 28.3 23.3 22.1 47.1 15.2 35.2 35 68 101 250 216 83 284 372 228 200 182 159 207 236 196 239 217 17.4 16.2 14.2 50.9 26.4 45.7 33.9 41.8 51.8 45.5 41.4 36.1 47.0 53.6 44.5 54.3 49.3 440 440 440 440 440 440 440 440 440 440 440 440 440 440 440 440 440 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100 23.5 22.3 10.0 8.2 3.9 3.1 31.1 21.1 8.9 37.4 8.2 26.0 25.5 46.4 30 93 158 44 34 144 37 76 53 158 101 80 66 114 22.7 24.1 35.2 30.6 10.6 20.0 8.4 17.3 40.0 26.2 18.6 15.5 14.2 26.0 129 33 206 200 195 190 267 173 99 110 96 72 67 74 20.6 7.5 24.1 24.8 49.3 47.0 38.0 32.3 17.5 27.0 21.8 18.1 13.0 16.8 248 115 43 160 194 89 87 98 249 41 193 190 208 52 33.2 46.1 30.7 36.2 26.6 30.2 22.6 29.3 33.6 9.3 51.3 40.3 47.3 10.7 440 440 440 440 440 440 440 440 440 440 440 440 440 440 100 100 100 100 100 100 100 100 100 100 100 100 100 100 The relationship between consumption of ultraprocessed foods and body mass index of the respondents. About 17.5% and 8.6% of the respondents who were overweight and obese respectively consumed sweets daily. The chi-square analysis showed there was no significant association (p=0.775) between the consumption of sweet F % Total F Table 3 shows the anthropometric status of the respondents. About 20.5% of the males had normal body mass index, while 21.8% of the females had normal body mass index. A total of 36.3% of the respondents were overweight, while 20% were obese. About 13.6% of the male respondents were overweight, while 22.7% of the female respondents were overweight. About 11.4% of the male respondents were obese, while 8.6% of the female respondents were obese. ISBN: 978-93-5619-947-7 2-3 times per week F % F % and BMI of the respondents. About 22% and 3.6% of the respondents who were overweight and obese respectively consumed soft drinks. The chi-square analysis showed there was no significant association between consumption of soft drinks and BMI of the respondents (p=0.639). About 9% and 8.46% of the respondents who were overweight and obese respectively consumed cake daily. The chi-square analysis showed that there was a significant association between consumption of cake and BMI of the respondents (p=0.000). About 5.9% and 6.3% of the respondents who were overweight and obese respectively consumed cookies daily. The chisquare analysis showed there was no significant association between consumption of cookies and BMI of the respondents (p=0.254). About 14.7% and 3.6% of the 4 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 respondents who were overweight and obese respectively consumed beer daily. The chi-square analysis showed there was no significant association between consumption of beer and BMI of the respondents (p=0.258). About 7.9% and 2.5% of the respondents who were overweight and obese respectively consumed instant noodles daily. The chi-square analysis showed there was no significant association between consumption of instant noodles and BMI of the respondents (p=0.239). About 9% and 8.46% of the respondents who were overweight and obese respectively consumed cake daily. About 6.3% and 3.1% of the respondents who were overweight and obese respectively consumed sweetened breakfast cereals daily. There was no significant association between consumption of sweetened breakfast cereals and BMI of the respondents (p=1.906). About 6.1% and 7% of the respondents who were overweight and obese respectively consumed pizza daily. There was a significant association between consumption of pizza and BMI of the respondents (p=0.000). About 5% and 3.1% of the respondents who were overweight and obese respectively consumed burger daily. There was a significant association between consumption of burger and BMI of the respondents (p=0.003). Table 4. Relationship between consumption of ultra-processed foods and body mass index Variables SWEETa Daily Once weekly 2-3times weekly Rarely Total SOFT DRINKSb Daily Once weekly 2-3times weekly Rarely Total CAKEc Daily Once weekly 2-3times weekly Rarely Total COOKIESd Daily Once weekly 2-3times weekly Rarely Total BEERe Daily Once weekly 2-3times weekly Rarely Total INSTANT NOODLESf Daily Once weekly 2-3times weekly Rarely Total SWEETENED BREAKFAST CEREALSg Daily Once weekly 2-3times weekly Rarely Total Underweight No % Normal No % Overweight No % Obese No % Total No % P-value 0 0 0 6 6 65 49 61 11 186 14.7 11.1 13.8 2.5 42.2 77 68 15 0 160 17.5 15.4 3.4 0.0 36.3 38 18 17 15 88 8.6 4.0 3.8 3.4 20 180 135 93 32 440 40.9 30.6 21.1 7.2 100 0.775 0.0 0.0 0.0 1.4 1.4 0 0 6 0 6 0.0 0.0 1.4 0.0 1.4 70 25 66 25 186 15.9 5.6 15 5.6 42.2 97 11 38 14 160 22.0 2.5 8.6 3.1 36.3 16 30 25 17 88 3.6 6.8 5.6 3.8 20 183 41.5 66 15 135 30.6 56 12.7 440 100 0.639 6 0 0 0 6 0.0 0.0 0.0 0.0 1.4 42 27 43 74 186 9.5 6.1 9.7 16.8 42.2 40 7 25 88 160 9.0 1.5 5.6 20 36.3 37 14 17 20 88 8.4 3.1 3.8 4.5 20 125 48 85 182 440 28.4 10.9 19.3 41.3 100 0.000 0 0 0 6 6 0.0 0.0 0.0 1.4 1.4 64 33 43 46 186 14.5 7.5 9.7 10.4 42.2 26 19 24 91 160 5.9 4.3 5.4 20.6 36.3 28 11 33 16 88 6.3 2.5 7.5 3.6 20 118 63 100 159 440 26.8 14.3 22.7 36.1 100 0.254 0 0 0 6 6 0.0 0.0 0.0 1.4 1.4 47 63 31 45 186 10.6 14.3 7 10.2 42.2 65 36 14 45 160 14.7 8.1 3.1 10.2 36.3 16 18 15 39 88 3.6 4 3.4 8.8 20 128 117 60 135 440 29 26.5 13.6 30.6 100 0.258 0 6 0 0 6 0.0 1.4 0.0 0.0 1.4 56 30 32 68 186 12.7 6.8 7.2 15.4 42.2 35 17 26 82 160 7.9 3.8 5.9 18.6 36.3 11 27 15 35 88 2.5 6.1 3.4 7.9 20 102 80 73 185 440 23.1 18.1 16.5 42 100 0.239 0 0 6 0 6 0.0 0.0 0.0 0.0 1.4 55 26 33 72 186 12.5 5.9 7.5 16.3 42.2 28 22 8 102 160 6.3 5 1.8 23.1 36.3 14 16 24 34 88 3.1 3.6 5.4 7.7 20 97 64 71 208 440 22 14.5 16.1 47.2 100 ISBN: 978-93-5619-947-7 1.906 5 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 PIZZAh Daily Once weekly 2-3times weekly Rarely Total 0 6 0 0 6 0.0 0.0 0.0 0.0 1.4 38 29 25 94 186 8.6 6.5 5.6 21.3 42.2 27 10 28 95 160 6.1 2.2 6.3 21.5 36.3 31 8 10 39 88 7.0 1.8 2.2 8.8 20 96 53 63 228 440 21.8 12 14.3 51.8 100 BURGERi Daily Once weekly 2-3times weekly Rarely Total 6 0 0 0 6 0.0 0.0 0.0 0.0 1.4 40 45 39 62 186 9 10.2 8.8 14 42.2 22 17 1 120 160 5 3.8 0.2 27.2 36.3 14 21 27 26 88 3.1 4.7 6.1 5.9 20 82 83 67 208 440 18.6 18.8 15.2 47.2 100 VII. DISCUSSIONS The socio-economic and demographic characteristics of the respondents studied, showed that majority of the respondents were male. The high population of male participants obtained in this study could be due to the fact that houses visited had more males than females. This is consistent with the report from National Bureau of Statistics (NBS, 2015), that men constitute 50.5 % and women 49.5 % of adult population in Nigeria. The respondents were mostly Igbos and Christians. This is in line with Ismene (2002) report, that South-East is mostly dominated by Igbos and Christians. More than half of the respondents studied were between the age 26 and 32 years. The study showed that majority of the respondents were traders/business persons, only few of them were civil/public servants. This could be as a result of the high level of unemployment in Nigeria which leaves many people with no choice but to engage in trading and other small scale businesses. The study showed that majority of the respondents were low income earners, about one third were middle income earners. Socio-economic and demographic characteristics is not a modifier for the consumption of ultra-processed foods although it may play an important role in diet quality variations (Baraldi et al. 2014). The study showed that most of the respondents consumed ultra-processed foods like sweetened breakfast cereals, pizza, burger, noodles, sweets and soft drinks daily. This could be because there were readily available and easy to prepare; this is in line with the report made by Monteiro (2013), that convenient food requires less time cooking and also, that eating out is much easier than preparing meals from the scratch. Cheese balls, sardine fish, prawn crackers, hot dogs, ice-creams and pastas were listed as the top weekly ultra-processed foods consumed by the respondents; this is in correlation with the findings of Norimah (2018). Most people crave and consume ultra-processed foods because they are convenient foods and they save time. One third of the respondents were overweight while about 20% were obese; this could be due to high consumption of ultra-processed foods and wrong food choices made by the respondents in the study area. The result of this study is similar to that reported by Louzada et al. (2015) that excessive consumption of ultra-processed food products ISBN: 978-93-5619-947-7 0.000 0.003 predisposes an individual to obesity which results from an imbalance between food intake and energy output leading to excessive fat accumulation. The study showed that females were more overweight than males. Obesity was slightly more among the male respondents than females. This result is in agreement with that reported by Louzada et al. (2015). The chi-square analysis showed that there was a significant association (p<0.000) between consumption of cake, pizza, burger and BMI of the respondents. Body mass index is regarded as an outcome of energy balance with particular reference to weight (Moubarac et al., 2013). VIII. CONCLUSION Majority of the respondents were male and more than half of the respondents studied were between the age 26 and 32 years. A greater percentage of the respondents consumed ultra-processed foods and drinks. The BMI status of the respondents showed that one third of the respondents were overweight, while about 20% were obese. Females were more overweight than males. Obesity was slightly more among the male respondents than females. There was a significant association (p<0.000) between consumption of cake, pizza, burger and BMI of the respondents. REFERENCES [1] [2] [3] [4] [5] [6] Allemandi L, Castronuovo L, Tiscornia M.V. Food advertising on Argentinean television: are ultra-processed foods in the lead? Public Health Nutrition, 2018. 21(1): 238 -246. Baker P, Friel S. Food systems transformations, ultra-processed food markets and the nutrition transition in Asia. Global Health, 2016. 12(1): 80. Baraldi, L.G., Martinez Steele, E., Canella, D.S., Monteiro, C.A. Consumption of ultra-processed foods and associated sociodemographic factors in the USA between 2007 and 2012: Evidence from a nationally representative cross-sectional study, 2014. Ismene, Zarifis. "Human Rights Brief: Rights of Religious Minorities in Nigeria".2002. Archived from the original on 200912-23. Retrieved 2009-09-12. Louzada, M.L., Baraldi, L.G. and Steele, E.M. Consumption of ultra-processed foods and obesity in Brazilian adolescents and adults. Preventive Medicine, 2015. 81:9 -15. Monteiro C.A, Levy R.B, Claro R.M. Increasing consumption of ultra-processed foods and likely impact on human health: evidence from Brazil, Public Health Nutrition, 2011. 14: 5–13. 6 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 [7] Monteiro CA, Cannon G, Moubarac J-C. Dietary guidelines to nourish humanity and the planet in the twenty-first century. A blueprint from Brazil. Public Health Nutrition, 2015. 18: 2311– 2322. [8] Monteiro CA, Moubarac JC, Cannon G. Ultra-processed products are becoming dominant in the global food system. Obesity Review, 2013. 14: 21-28. [9] Monteiro CA, Moubarac JC, Levy RB. Household availability of ultra-processed foods and obesity in nineteen European countries. Public Health Nutrition, 2018. 21(1): 18-26. [10] Moodie R, Stuckler D, Monteiro CA. Profits and pandemics: prevention of harmful effects of tobacco, alcohol, and ultraprocessed food and drink industries. Non-communicable Diseases Series 4. Lancet, 2013. 381: 670–679. [11] Moubarac JC, Martins AP, Claro RM, Levy RB, Cannon G, Monteiro CA. Consumption of ultra-processed foods and likely impact on human health. Evidence from Canada. Public Health Nutrition, 2013.16: 2240–2248. ISBN: 978-93-5619-947-7 [12] National Bureau of Statistics. Statistical New: Gender and socialeconomic data: the NBS publication, 2015 8: 196-203. [13] Norimah A.K, Safiah M, Jamal K, Haslinda S, Zuhaida H, Rohida S, Fatimah S, Norazlin S, Poh B.K, Kandiah M and Zalilah M.S. Food consumption patterns: findings from the Malaysian Adult Nutrition Survey (MANS). Malaysian Journal of Nutrition, 2018. 14(1): 25-39. [14] World Health Organization (WHO). Independent High Level Commission on NCDs. 2018. Available at:https://www.who. int/ncds/governance/high-level-commission/en/, Accessed on 11/11/2019. [15] World Health Organization (WHO). Pacific islanders pay heavy price for abandoning their traditional diets. Bulletin of the World Health Organization, 2010. 88(7): 484–485. http://doi.org/10.2471/BLT.10.010710. [16] Yamane, T. Statistics: an introductory analysis, 3rd edition. New York. 1973: Harper and Row. 7 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 MOTunAr Ontology: Creation and Axioms Impacts Degachi Haifa1, Yengui Ameni2, Neji Mahmoud3 1 Ph. D. Scholar, 2Instructor, 3Professor 1,2,3 University of Sfax, Tunisia Abstract: Due to its potential for supporting heterogeneous and various data, ontologies are used in serval domains, notably the archaeological one. In this paper, we want to present a multimedia ontology that designs the different entities involved in the Tunisian archaeological field. On another hand, the task of creating ontology is error-prone. The quality of ontology should be sequentially evaluated based on various criteria (e.g., coherence, consciences, interoperability, etc.). Axioms present the guarantor to satisfy high quality for a developed ontology. Therefore, we detail in this work a hybrid approach that guarantees the quality of the generated ontology. This approach combines the corrective method that defines the positive axioms, and the constructive method that defines all relevant axioms based on the elimination of model and integrity constraints. The generated ontology is evaluated with the Pellet reasoner and OOPS! Online service. Keywords: Axioms; Criteria; Evaluation; MOTunAr; Ontology. I. INTRODUCTION In the archaeological field, gathering information is an essential process. It presents the base for interpretation and analysis. The analysis aims to deduce semantic information based on the extracted data. Ontologies have a great capacity for providing obtained significant dynamism due to their great capacity for providing different approaches for maintaining, sharing, managing, retrieving, searching, and viewing knowledge[1]. Due to its important capacities, ontologies are used in serval domains. Our research is focused on developing a multimedia ontology of the Tunisian archaeological field (MOTunAr). This ontology enables the description of all the Tunisian archaeological sites. On another hand, the creation of ontology is based on various sources of knowledge, including unstructured sources (e.g., web pages), semi-structured sources (e.g., dictionaries), and structured sources (e.g., database). For this objective, we propose the two hypotheses to benefit from these various sources: The sources have different interests that should be taken into consideration during the development of ontology. Confidence related to such information increases when this one appears in serval sources. In order to take into account these two hypotheses we define two purposes: 1) each source have a score of interest that explains its relevance, dependent on this ISBN: 978-93-5619-947-7 score, a source of information is used to extracted data or it is rejected from the knowledge base of our ontology, 2) each extracted information have a score of confidence is intimately related to the origin of information (i.e., if the score of interest of this information is raising the score of confidence of information increase automatically.) as well as the presence of this information in many sources. Depending on the score of confidence extracted information is accepted or is rejected. Based on these hypotheses, we have defined a methodology to develop an ontology that consists of six steps[2]–[4]:1) filtering of data step, 2) Validation of the Classes step, 3) Subclasses step, 4) properties step, 5) axioms step, and 6) Population step. In addition, Despite the important progress in the methodology of creating ontology, most methods existing in the literature define only the positive axioms [5]–[7] . For MOTunAr ontology, we have defined a hybrid approach that combines the corrective method (i.e., defines the positive axioms) and the constructive method (i.e., defines all the relevant axioms) to guarantees a high quality of the MOTunAr ontology. The generated ontology is evaluated based on both the Pellet reasoner [8] from the protégé editor and OOPS! Online service[9]. MOTunAr shows a significant degree of coherence and consciences, due to the implementation of relevant axioms. The rest of this paper is organized as the following: In section 2, we present our approach to create the MOTunAr ontology and we detail the different steps especially the axioms steps. In section 3, we present the evaluation part that is based on the Pellet reasoner from the protégé editor and the OOPS! Online service. Finally, in section4, we conclude this paper, and we present an outlook for future work. II. MOTUNAR CREATION ONTOLOGY: STEPS OF MOTunAr ontology is a multimedia ontology oriented to the Tunisian archaeological field. This ontology aims to describe all the entities (i.e., classes, subclasses, properties, and axioms) related to the Tunisian cultural heritage field. Therefore, we have defined an approach that contains six steps in order to develop the MOTunAr ontology: 1) filtering of data step, 2) 8 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Validation of the Classes step, 3) Subclasses step, 4) properties step, 5) axioms step, and 6) Population step. 1.1 Filtering of the data step This step is based on automatic filtering of knowledge. We implement a set of modules that aid to restrict the domain of interest. The extraction task starts with the alignment between the implementation module and the existing sources and resources. As the first result of the extracted task, we obtain a list of candidate classes (concepts). Such a concept is conserved when it exists in the list of the terms aligned with the module. In another way, the extracted class would be rejected and would not be expanded to the final resources. For this purpose, we obtain a list of potential concepts related to the domain of interest. Indeed, these classes describe the various periods in Tunisian history (e.g., the Carthaginian period, the Islamic period, the Roman period, etc.). Based on the resulted list we deduce the relevant classes for the MOTunAr ontology. 1.2 Validation of the Classes Step Based on the Extraction-Terms algorithm, MOTunAr ontology defines two main classes: 1) T1-ArchaeologicalEntity that includes as subclasses: a) T11-Site, and b) T12-Monument. And 2) T2-Archaeological-Coordinates that includes as subclasses: a) T21-Appellation, b) T22Anthroponym, c) T23-People, d) T24-Temporal-Entity,e) T25-Spatial-Entity , f) T26-Physical-Object and, g) T27Conceptual-Object (fig.1). Algorithm 1: Extraction-Terms Input: S, /*S are the set of sources that we based on to extract our candidates terms*/ Output: Res /*Res is the variable that contains the candidates terms*/ For i: =1 to n do /*n is the number of sources that we have used*/ { Repeat If (cr1 & cr2 & cr3 & cr4) then /* cr1is the reputation of sources; cr2 is the freshness of sources; cr3 is the adequacy of sources; cr4 is the clarity of sources*/ Data-Recovery ←retrieves all data related to sources; Conceptual abstraction ←determines model for data; Exploration-Information ←defines common format of data; While (Common-Knowledge); If (Common-Knowledge) then { Repeat Res← Search pattern in ODP /* ODP Portal (Ontology Designed Patterns). This portal, as its name indicates, groups the designed patterns as well as the transformation patterns*/ ISBN: 978-93-5619-947-7 While (not ODP) or (exist); /* if we have tested all the existing ODP (noted) or we have found (exist) a model from ODP)*/ If (exist) then Res← Application-Of-Transformation; Else Res← Ad-Hoc-Transformation-Method; Res← Manual-Correction /* enables to retake the updated transformation to manually correct the various errors that can appear*/ If (Res= Alignment of the sources knowledge base) then /* the correspondences between the different pairs exists on the considered S are created*/ { CT← final generation of coordinates terms /* CT: Candidates Terms; the candidates of ontological elements or the relation are generated*/ CT←SC; /* SC: Score of Confidence; A confidence score is associated with each candidate*/ } If (SC>=2) then Res← CT; /* the variable Res receive the set of candidates terms*/}} 1.3 Subclasses Step In the previous step, we have defined the two main classes: The T1-Archaeological-Entity class aims to define the different archaeological entities involved in the Tunisian archaeological field. This class includes two subclasses a) T11-Site, and b) T12-Monument [2]. The T2-Archaeological-Coordinates class aims to design the various data that can be added to archaeological entities. For this class we have defined the following set of subclasses [3]. T21-Appellation: it describes the different designations that can be added to such archaeological entities. Three subclasses are added to the T21Appellation class: 1) T211-Identifier, 2) T212-OldName, and 3) T213-Current-Name. T22-Anthroponym: it defines persons which are related to the archaeological entities. Three subclasses are defined for this class: 1) T221-Hero, 2) T222Religious-Person, and 3) T223-Divinity. T23-People: it represents the different inhabitants of a mentioned place which are indicated in a historical document. T23-People class defines three subclasses: 1) T231-People-Appellation, 2) T232-Civilization, and 3) T233-Emperor. T24-Temporal-Entity: it designs the different time terms. We have added a hierarchy of subclasses to this class: 1) T241-Event that includes T2411-Event-ofmodification, T2412-Beginning-Of-Existence, and T2413-End-Of-Existence subclasses, and 2) T242Chronological Slice that includes T2421-AbsoluteDating, T2422-Periodization, and T2423-Century subclasses. 9 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 T25-Spatial-Entity: it describes the entities related to the location and space of the different archaeological entities. We have added a hierarchy of subclasses to this class: T251-Name-Place, T252-GeographicalCoordinates, T253-Municipality, T254-Surface, T255Delimitation, T256-Structure, and T257-Current Occupation. T26-Physical-Object: it describes all physical entities, and it defines three subclasses: 1) T261-ArchitecturalElement that includes the subclasses T2611Decoration, T2612-Architectural-Ornament, T2613Sculpture, and T2614-Architectural-Style, 2) T262Materials, and 3) T263-Legal-Statute. T27-Conceptual-Object: it includes the different no physical information that describes the archaeological entities. Two main subclasses are added to this class: 1) T271-Description-Of-Site, it includes as subclasses T2711Category, T2712-General-Data, T2713-State-ofConservation, T2714-State-Of-Research, T2715Number-Of-Monuments, and T2716-World-Heritage, and 2) T272-Documentation that includes the subclasses T2721-Document, and T2722-VisualElement. Fig.1: Hierarchy of classes This set of classes and subclasses are related to the different properties that will be described in the following subsection. 2.4 Properties step Three kinds of properties are implemented in the MOTunAr ontology[10]:1) Object properties, 2) Data properties, and 3)Annotation properties. Object Properties (Relations): The Object properties or Relations (R) in ontology represent a type of interaction between the concepts. For our ontology we have distinguished three kinds of relations [11]: 1) ISBN: 978-93-5619-947-7 Hierarchical relations (HR), 2) Associative relations (AR), and 3) Semantic relations (SR). Hierarchical relations: based on these relations we create the structure of the ontologies. In our approach we distinguish four hierarchical relations: 1) Subsumption (P10-is-a), 2) Generalization (P53-ismore-generic-than), 3) Specification (P54-is-morespecific-than), and 4) Part-of (P50-is- Part-of). To define the hierarchical relations we applied the hierarchical relation definition algorithm. Algorithm 2: Hierarchical Relation Definition Input: Training set O= {(C1, C2, R}, /* C1, C2 are the concepts for which we try to define a hierarchical relation; R is anonym relation among C1, C2 */ Output: HR Randomly initialize θ; While training is not terminated do Switch R Case Subsumption: HR← is-a; Is-a (C1, C2); Break; Case Generalization: HR← is-more-generic-than; Is-more-generic-than (C1, C2); Break; Case Specification: HR← is-more-specific-than; Is-more-specific-than (C1, C2); Break; Case Part: HR← is-part-of; Is-part-of (C1, C2); Break; Default: HR← Ө; Associative relations: Based on these relations we create the conceptual representations between terms. We benefit from the existing sources and resources that describe our interest field. Candidate relations are extracted and a score of confidence (SOC) is associated with each one of these relations. Depending on the SOC a candidate relation can be conserved or rejected. To define the associative relations we applied the associative relation definition algorithm. Algorithm 3: Associative Relation Definition Input: Training set O= {(C1, C2, R}, RES, S/* C1, C2 are the concepts for which we try to define an associative relation; R is anonym relation among C1, C2 */ /* resources RES and sources S*/ 10 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Output: AR, SOC /* AR is the associative relation which we want to extract; SOC is the score of confidence*/ Randomly initialize θ; While training is not terminated do If exit(R) ==true then/* exist is a function which search the candidate relation R on the resources RES and sources S*/ SOC++; /* score of confidence of the relation R increase when it exists in different documents*/ If SOC>=2 then AR← R; Else R is rejected; /*if the score of confidence is less than 2 the relation R is rejected from the list of relations candidates*/ Data Properties (Attributes): Data properties or Attributes (A) relate an instance to data values (e.g., XML Schema, RDF literal, Datatype value, etc.) [13]. For MOTunAr we have defined a set of Data Properties that added value to, especially entities. For each Data property, we defined the rdfs: domain and rdfs: range. Domain presents one of the existing classes or subclasses (e.g., T222-Religious-Person, T261Architectural-Element, T271-Description-Of-Site, etc.). And the ranges express the Datatype that can be defined by the data properties (e.g., XSD: string, RDF: XML literal, rdfs: literal, owl: real, etc.). Table 1. Examples of Data properties Data properties has-designation has-number Semantic relations: based on these relations we create the semantic representations between terms. The definition of semantic relations is carried out between each pair of concepts. A double-entry matrix is then produced [12]. This matrix contains in a row and a column all the different concepts already defined. Each cell of the matrix contains semantic relations which can link two concepts together. To define the semantic relations we applied the semantic relation definition algorithm. Algorithm 4: Semantic Relation Definition Input: Training set O= {(C1, C2,, Cn, R}, n, m/* C1, C2 are the concepts for which we try to define a hierarchical relation; R is anonym relation among C1, C2 */ /* n is the number of lines; m is the number of column*/ Output: SR, Randomly initialize θ; While training is not terminated do For i := 1 to n do For j:= 1 to m do If R (Ci, Cj) then SR←R; Has-origin has-birth-day has-death-day Domain T212-Old-Name T213-Currenr-Name T212-Old-Name T213-Currenr-Name T212-Old-Name T213-Currenr-Name T221-Hero T222-ReligiousPerson T233-Emperor T221-Hero T222-ReligiousPerson T233-Emperor Range xsd :string xsd :integer xsd :string xsd :date Time xsd :date Time Table 1 shows some data properties related to the MOTunAr ontology as well as their ranges and their domains. Data properties, as well as the Object properties, aim to relate the different entities and to transform data into knowledge. The annotation properties aim to add information to the different entities (i.e., concepts, relations, attributes)[10]. Annotation Properties: Annotation properties are used to more describe such entities and add metadata to the different declared objects [10]. Many formats of annotations are implemented into the MOTunAr ontology in order to add metadata to different Table 2. Positive Axioms Examples Designation Reflexive property Irreflexive property Symmetric property Asymmetric property Transitive property Inverse property Explication Class C is in relation R with the same class C. C can’t be in relation R with the same class C. C1 is in R with C2 and C2 is in R with C1. C1 is in R with C2and C2isn’t in R with C1. C1 is in R with C2 and C2 is in R with C3 then C1 is in R with C3. Each relation R can have an inverse relation. ISBN: 978-93-5619-947-7 Syntax I Protégé declaration examples (R ) -is reflexive Reflexive : P1-is-associated-with (RI) - is irreflexive Irreflexive :P 18-has-constructed I I - R = (R ) RI =(RI) Symmetric: P3-is-related-to Asymetric : P53-is-identified-by RI = (RI)+ Transitive :P10-is-a RI = (RI0)- P12-is-operated-by InverseOf P13-has-operated 11 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Functional Property Inverse Functional Domain/Domain Range/Range A relation R is declared functional when no more than one individual can be linked to it. The inverse relationship is declared functional. If an individual x is connected by R with some other individual, then x is an instance of C. if some individual is connected by R with an individual x, then x is an instance of C. RI is Functional I Functional: P53-is-identified-by (R ) - is Functional InverseFunctional: P54-hasidentified RI⊆CIi×△ID P1-is-associated-with Domain T2-Archaeological-Coordinates RI⊆△I × CIi P1-is-associated-with Range T1Archaeological-Entity Fig.2: (a) Pellet reasoner, (b) OOPS! service objects including in the MOTunAr ontology. Such as the rdfs: IsDefinedBy annotation that is used to give the definition for each object from MOTunAr ontology. Also, we have used rdfs: label in order to add the French name for each entity (i.e., the French version of MOTunAr is available when we use the option « render by label » from the view menu in the protégé editor). 2.5 Axioms Step Two approaches are combined in order to define the axioms of the MOTunAr ontology: Corrective approach: in order to guarantee the coherence and the excitability of ontology, in this step, we have defined a set of assertions that give meaning to the already defined entities and allow their good exploitation. Eventually, the different editors of ontology existing in the literature assure the definition of various axioms depending on their capacities. For MOTunAr we have based on Protégé editor due to its efficiency and simplicity of use [14]. Protégé editor defines especially the positive constraint, i.e. axioms define positive inferences (e.g., a hierarchy of classes, domains and co-domains of properties, etc.). Via protégé editor, we have added a set of positive axioms ISBN: 978-93-5619-947-7 to MOTunAr ontology. The definition of the axioms is depending on the entity that it describes. For MOTunAr three types of positive axioms are defined: 1) Class Expression Axioms, 2) Object Property Axioms, and 3) Cardinality Restrictions Axioms. Class Expression Axioms: In our work four axioms are declared [15] : Class declaration axioms: Declaration (Class (T223-Divinity)). SubClassOf axiom: SubClassOf (T212-Old-Name, T21-Appellation). Equivalent Classes axioms: T231-PeopleAppellation EquivalentTo T234-People-Name. Disjoint Classes axioms: T11Site DisjointWith T12-Monument. Object Property Axioms: it tends to determine the axioms that could be exploited to find relations between item property terms. Table 2 shows the same examples of the Object Property Axioms. Cardinality Restrictions Axioms: In the MOTunAr ontology we have added the following cardinality restrictions [16]: 1) SomeValues (e.g., P42-hastriggered some T241-Event), 2) AllValues (e.g.,P18has-starting-during only (T232-Civilization or T242Chronological-Slice)), 3) HasValues (e.g.,P15-has- 12 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 existed-during exactly 1 T232-Civilization), 4) MinCardinality (e.g.,P16-has-coincided-with min 1 T223-Divinity), and 5) MaxCardinality (e.g.,P15-hasexisted-during max 1 T232-Civilization). This approach allows to clearly defining the positive axioms but for the negative ones, it is limited to the separation constraints. We define in the following section the constructive approach that allows the definition of all relevant axioms that can be added to the MOTunAr ontology. 2.5.1 Constructive approach This approach is under development. On other hand, under this step, the axioms are generated by the elimination of models. The ontology resulting from the application of the corrective approach is considered as reference ontology. This ontology will be transformed into a set of models (i.e., class diagram). Two possible contexts are presented: Elimination of Model therefore a negative axiom is automatically generated. Conservation of model therefore OCL constraints are adopted. These constraints will be transformed to OWL axioms and added to the existing MOTunAr axioms. Once the implementation of declared axioms is achieved; we want to define the instance: the population step. 2.6 Population Step The population step is a future step for MOTunAr ontology. We want to define the instances (individuals) under this task. For our ontology, we will be based on the BOEMIE methodology to define the instance for classes and subclasses as well as for the properties. BOEMIE methodology offers such advantages in comparison to the existing methodology in literature [17] : The engine of extraction instances of concept/relation is not anticipated to extract instances of the composite classes. It is anticipated to extract just instances of the primitive classes. An evident benefit is a modification in the structure of the ontology becomes immune. The adaptation of the extraction engine is a necessity only when such \primitive" classes or relations related to primitive classes are modified. The ontology is applied to extract an instance of a \composite" class from an instance of populated \primitive" class of either of the populated relation instances. Two main advantages of this approach that are:1) the instances of the \composite" classes are constantly synchronized with the available formal definition added to the relevant classes, and 2) the generation of \composite" instances, depending on the constraints and the rules imposed by the implemented ISBN: 978-93-5619-947-7 ontology these rules ensure the consistency and efficiency of the ontology. The population step is the final step in our methodology. Thus, in order to verify the effectiveness of the developed ontology, the following section detail the evaluations applied to the MOTunAr based on different tools existing in the literature. III. EVALUATIONS ONTOLOGY OF MOTUNAR MOTunAr ontology has been developed based on a flexible approach, which allows the coherence, clarity, and consciences of each declared term. Despite this, the implementation of a pertinent methodology for developing ontologies does not promise to obtain ontologies free of errors. In addition, the task of developed ontologies is error-prone; some anomalies can appear on the developed ontology. Therefore, the evaluation of ontology is considered as a fundamental step to guarantee the quality of generated ontology and reduce future maintenance. For our study we have applied two tools to evaluate MOTunAr ontology: 1) Pellet reasoner from Protégé editor and [9] 2) OOPS! Service [10]. Pellet does expertness analysis of ontology. The service reasoning find by Pellet help to debug for incompatibility and incoherence that can be detected Fig.2.a. To assure the quality of MOTunAr ontology, we have applied the OOPS! Service with the Pellet reasoner OntOlogy Pitfall Scanner! (OOPS!), is a service available at, http://oops.linkeddata.es/response.jsp. It aims to aid the ontology designer during the ontology evaluation task. OOPS! Executed independently of the ontology creation platform, this service produces pitfalls (i.e., bad practices in the task of development of ontology) that describe the errors detected among the tested ontology Fig.2.b. Despite MOTunAr being under development, both, pellet reasoner, and OOPS! Service shows a good result for this ontology. The implementation of a constructive approach will be allowed: More conscience ontology by defining all relevant axioms and controlling redundant axioms. More coherent ontology by manipulating all contradictions provoke by axioms. More interoperability ontology by reusing and interacting axioms from other ontologies. IV. CONCLUSION AND FUTURE WORKS In this paper, we have presented a new approach to developing a multimedia ontology. This approach is realized among six steps: 1) filtering of data step, 2) Validation of the Classes step, 3) Subclasses step, 4) properties step, 5) axioms step, and 6) Population step. To verify the quality of the MOTunAr ontology, we have 13 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 based on the Pellet reasoner and OOPS! Online service. The result of the evaluation shows the effectiveness of the developed ontology. In addition, we benefited from the experience of a domain expert (i.e., Tunisian archaeologist) to have a correct sense for the different defined terms and to cover our studied domain (i.e., Clair ontology). The use of annotation properties, as well as the use of simple entities appellation (e.g., people, hero, event, was-associated-to, is-a, etc.), make the MOTunAr ontology understandable either by an expert or by a simple user (i.e., easy to use ontology). The definitions of the relevant axioms guarantee the satisfaction of coherence, conscience, and interoperability criteria of evaluation. Despite, the axioms step is under development, the achievement of this step will be added more effectiveness to the MOTunAr ontology due to the implementation of all pertinent axioms. To have a completed, coherent, and Clair multimedia ontology that defines all entities related to the Tunisian archaeological field. As ongoing steps we plan to apply the BOEMIE methodology to achieve the population step as well as the MOWL (Multimedia Ontology Web Language) to take into account the multimedia format of such entities. [6] [7] [8] [9] [10] [11] [12] REFERENCES [1] [2] [3] [4] [5] B. Ben Mahria, I. Chaker, and A. Zahi, “A novel approach for lesarning ontology from relational database : from the construction to the evaluation,” J. Big Data, 2021, doi: 10.1186/s40537-02100412-2. D. Haifa, Y. Ameni, and N. Mahmoud, “Accomplishment of multimedia ontology for the tunisian archaeology field,” in Advances in Intelligent Systems and Computing, vol. 1184, Springer Science and Business Media Deutschland GmbH, 2021, pp. 64–72. D. Haifa, Y. Ameni, and N. Mahmoud, “Multimedia Ontology of the Tunisian Archaeology Field,” in Advances in Intelligent Systems and Computing, Jul. 2020, vol. 1105 AISC, pp. 321–330, doi: 10.1007/978-3-030-36674-2_33. D. Haifa, Y. Ameni, and N. Mahmoud, “Towards a Multimedia Ontology for Tunisian Archaeology Field,” Dec. 2019, doi: 10.1109/ICTA49490.2019.9144900. S. Belabbes, S. Benferhat, and J. Chomicki, “Elect : Une méthode ISBN: 978-93-5619-947-7 [13] [14] [15] [16] [17] de gestion des incohérences dans des ontologies légères partiellement préordonnées *,” Jul. 2019, Accessed: Oct. 01, 2021. [Online]. Available: https://hal.archives-ouvertes.fr/hal-02301980. S. Salminawati, “ONTOLOGICAL BASIS OF SCIENCE CLASSIFICATION (Study on the Philosophy of Islamic Education),” Edukasi Islam. J. Pendidik. Islam, vol. 9, no. 02, pp. 683–700, Aug. 2020, doi: 10.30868/EI.V9I02.1581. M. Ben Salah, A. Yengui, M. Neji, and N. Mahmoud, “Construction of OTunAr : ontology of Tunisian archeology,” 2017. Accessed: Mar. 02, 2021. [Online]. Available: https://www.researchgate.net/publication/340922998. S. Gherbi and M. T. Khadir, “ONTMAT1: Ontology matching using a reasoner and property restriction,” Int. J. Web Eng. Technol., vol. 15, no. 2, pp. 119–139, 2020, doi: 10.1504/IJWET.2020.109728. A. Mathews, S. Chen, M. T. Bigham, and K. Mansel, “Oops: rapid Deterioration of the Transport Patient Admitted to the General Care Floor,” Pediatrics, vol. 141, no. 1 MeetingAbstract, pp. 728– 728, Jan. 2018, doi: 10.1542/PEDS.141.1_MEETINGABSTRACT.728. L. Olsina, “ThingFO v1.2’s Terms, Properties, Relationships and Axioms -- Foundational Ontology for Things,” Jul. 2021, Accessed: Jan. 30, 2022. [Online]. Available: http://arxiv.org/abs/2107.09129. C. Roche and M. Papadopoulou, “Terminologie et ontologie pour les humanités numériques : le cas des vêtements de la Grèce antiqueTerminology and Ontology for Digital Humanities: The Case of Ancient Greek Dress,” Humanit. numériques, no. 2, Jun. 2020, doi: 10.4000/revuehn.462. M. Rasmussen, M. Lefrançois, M. Bonduel, C. Hviid, and J. Karlshøj, “OPM: An ontology for describing properties that evolve over time,” Jun. 2018, Accessed: Oct. 01, 2021. [Online]. Available: https://hal.archives-ouvertes.fr/hal-01885248. H. J. Pandit, K. Fatema, D. O’Sullivan, and D. Lewis, GDPRtEXT - GDPR as a Linked Data Resource, vol. 10843 LNCS. 2018. M. Florrence, “MLGrafViz: Multilingual ontology visualization plug-in for protégé,” Comput. Sci. Inf. Technol., vol. 2, no. 1, pp. 43–48, Mar. 2021, doi: 10.11591/CSIT.V2I1.P43-48. F. Z. Smaili, X. Gao, and R. Hoehndorf, “Formal axioms in biomedical ontologies improve analysis and interpretation of associated data,” 2018, doi: 10.1093/bioinformatics/xxxxxx. F. Freitas and I. Varzinczak, “Cardinality Restrictions Within Description Logic Connection Calculi,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 11092 LNCS, pp. 65–80, Sep. 2018, doi: 10.1007/978-3-319-99906-7_5. F. Song and E. De La Clergerie, “Clustering-based Automatic Construction of Legal Entity Knowledge Base from Contracts,” Proc. - 2020 IEEE Int. Conf. Big Data, Big Data 2020, pp. 2149– 2152, Dec. 2020, doi: 10.1109/BIGDATA50022.2020.9378166. 14 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Determinants of Employee Job Satisfaction: An Analysis of Structural Equation Model Muhammad Alkirom Wildan Faculty of Economics and Business, Universitas Trunojoyo Madura, Bangkalan, Jawa Timur, 69162, Indonesia Abstract: Imbalances in an employee’s working life have become a major problem due to the many issues related to employee well-being, productivity levels and boredom at work. Work-Life balance has now become a vulnerable topic because it offers real benefits to the organization and its success, so the goal to be achieved in this study is to provide an explanation of the influence of charismatic leadership and Work-Life balance against organizational commitment through employee job satisfaction in the broadcasting industry. The study was conducted using a questionnaire distributed in November-December 2019 where respondents used as many as 190 employees in the broadcasting industry in Jawa Timur. The data was analyzed using the Structural Equation Model (SEM). The results of this study show that a good charismatic leadership will increase employee job satisfaction, a good Work-Life balance will increase employee job satisfaction, and good job satisfaction will increase commitment. Organizational employees, good charismatic leadership will increase employee organizational commitment and good Work-Life balance does not increase employee organizational commitment directly. Keywords: Charismatic Leadership; Work-Life Balance; Job Satisfaction; Organizational Commitment; Industry. I. INTRODUCTION Work-Life balance becomes an important element in maintaining and achieving a balance between an individual's life and work life. Although Work-Life balance has received widespread attention, there are still many organizations that have not implemented appropriate strategies to minimize work-life conflicts and achieve Work-Life balance (Dizaho et al. ., 2017). As in the current global scenario, changes in work culture are happening very quickly. These changes make it difficult for employees to strike a balance between their working life and personal lives. Work-Life balance is one of the problems for employees and organizations, because high competitive demands can lead to low productivity in the organization (Pandey & Khare, 2013). Work-Life balance is the right priority between professional life and personal life, but nevertheless organizational needs often ignore the personal needs of employees. Job demand is becoming excessive due to increased competition and globalization, so employees must work harder than ever to meet organizational requirements (Ashima, 2015). Parkes & Langford (2008) found that job satisfaction with Work-Life balance is positively associated with satisfaction with rewards and recognition. Pradhan et al. (2016) found a positive ISBN: 978-93-5619-947-7 relationship between Work-Life balance and organizational commitment. Work-Life balance has a positive relationship although not statistically significant with organizational commitment (Rasheed et al., 2017). Silva et al. (2015) also stated that there is a significant positive relationship between Work-Life balance and employee commitment to their organization. Job satisfaction is a determinant of organizational commitment, because job satisfaction is a variable that has an "affective" tone and is considered best associated with affective commitment (Meyer et al., 2002). But unfortunately, previous research on charismatic leadership, Work-Life balance, job satisfaction and organizational commitment has been widely done, but the thing that distinguishes this research from previous research has not been widely used charismatic leadership variables and Work-Life balance simultaneously in one study. Research on charismatic leadership conducted in the broadcasting industry has been under scrutiny for the past three years. Another difference that distinguishes this study from previous studies is the measurement of job satisfaction variables using dimensions from Weiss et al. (1967). Based on the above research objectives, the purpose of the research to be achieved is to provide an explanation of the influence of charismatic leadership and Work-Life balance on organizational commitment through satisfaction of employees in the broadcasting industry. II. LITERATURE REVIEW 2.1 Charismatic Leadership The concept of charisma was first used to describe the special gifts selected individuals have that give them the ability to do extraordinary things, so the beliefs and visions of these leaders help attract the best employees. (Zhang et al., 2011). Charismatic leadership differs from other leadership formations through the formulation of a shared and idealized vision of the future, inspiring articulation and dedicated to the organization's path to vision (Banks et al., 2017). The behavior of charismatic leaders directly results in feelings of respect, a sense of collective identity, and perceptions of group task performance (Conger et al., 2000). 2.2 Work-Life Balance Equal dedication to work and responsibility for life (Greenhaus et al., 2003). Furthermore, Dundas (2008) 15 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 asserts that Work-Life balance is about managing the pressure efficiently between paid work and all additional activities that are important to people such as family, community activities, volunteer work, individual growth and leisure and entertainment. Programs that facilitate psychological release such as leisure activities, workshops on time management and relaxation can help employees to minimize work-life conflicts and achieve Work-Life balance (Moreno-Jiménez, 2009). 2.3 Job Satisfaction Job satisfaction is a pleasurable emotional state resulting from an assessment of one's work (Brief &Weiss, 2002). Lund (2003) defines job satisfaction as the amount of communication observed between what a person demands from his or her job and what has been given to him by the job and the organization. On the other hand, Antoncic (2011) argues that job satisfaction refers to employee satisfaction with their work and the amount of interest in work-related activities. Job satisfaction is a kind of reaction to a particular job or work-related problem (Gunlu et al., 2010). 2.4 Organizational Commitment Organizational commitment is the alignment of individuals with the values and goals of organization, the willingness to task and display efforts for the organization (Meyer et al., 2002). Organizational commitment is the relative strength of identification and involvement in an organization, acceptance of an organization's goals and willingness to exert effort to remain within that organization (Dee. et al., 2006). Organizational commitment is described as an overall reaction to the organization (Gunlu et al. 2010) and is a key factor in determining organizational competitiveness that increases employee motivation and engagement (Azeem, 2010). Employees who have organizational commitments will be encouraged to do their utmost in carrying out their duties because they believe that with the organization's correctness in achieving their goals. It will benefit the employees (Amalia, 2019). Organizational commitment can lead to a variety of organizational outcomes such as lower turnover rates, increased motivation, improved organizational citizen behavior and organizational support. Sustainable (Kwon & Banks, 2004). On the other hand, Cichy et al. (2009) refers to organizational commitment as the degree to which one internalizes values, purpose, sense of obedience and compliance limited to the workplace. III. RESEARCH METHODS is the number of samples must have five times the number of statements that are analyzed (Hair et al., 2008). There are 38 statements on the questionnaire, so the minimum number of samples needed is 190 respondents. 3.2 Data Analysis Methods In this study there were two exogenous variables namely charismatic leadership and work-life balance, and two endogenous variables, namely job satisfaction and organizational commitment. The study used confirmatory factor analysis for validity tests by looking at kaiser-msyer-olkin measure of sampling (KMO) and measures of sampling adequacy (MSA). The analysis tool used is the Structural Equation Model (SEM). 3.3 Research Hypothesis The hypotheses in this study are: The Relationship between Charismatic Leadership and Job Satisfaction Charismatic leadership is very strong and positively associated with some important follower outcomes (Conger et al., 2000). Leader charisma is related Positive influences of followers found that followers of charismatic leaders are happier than those who follow non-charismatic leaders (Erez et al., 2008). On the other hand, Vlachos et al. (2013) with a background in research on the impact of corporate social responsibility (CSR) initiatives from three of the world's leading manufacturing organizations, building and testing multilevel frameworks Comprehensive and focuses on whether employees obtain job satisfaction from CSR programs. H1: Good Charismatic Leadership will improve Employee Job Satisfaction. Relationship between WorkLife balance and Job Satisfaction - Varatharaj & Vasantha (2016) has identified Work-Life balance as a source of job satisfaction in the services of sectors such as banking, education, and government organizations. They argue that employees who can maintain a balance between personal and professional lives, can achieve higher job satisfaction and contribute more to their lives. H2: A good work-life balance will increase employee job satisfaction. The Relationship between Job Satisfaction and Organizational Commitment - Job satisfaction affect the organizational commitment of employees because If the organization can provide salaries and workloads in accordance with the tasks given then the commitment of employees to the organization is increasing (Rojuaniah, 2019). Employee job satisfaction has a positive effect on organizational commitment (Nikpour, 2018). 3.1 Population and Sample In accordance with the analysis tool used, the Structural Equation Model (SEM), the determination of the minimum number of samples that are representative ISBN: 978-93-5619-947-7 H3: Good Job Satisfaction will increase employee's Organizational Commitment. The Relationship between Charismatic Leadership and Organizational Commitment Charismatic leaders, such as sensitivity to members' needs 16 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 and having a clear vision, are positively associated with affective organizational commitment (Rowden, 2000). Research Barling et al. (1996) demonstrates that charismatic leadership can increase employee affective commitment. Shastri et al. (2010) conducted research to advance the understanding of charismatic leadership relationships and organizational commitments in several organizations in eastern and northern India. H4: Good Charismatic Leadership will increase employee organizational commitment. Relationship between WorkLife balance and Organizational Commitment - The effect of Work-Life balance on organizational commitment and organizational citizenship behavior carried out. The manufacturing industry found a positive relationship between Work-Life balance and organizational commitment (Pradhan et al., 2016). Work-Life balance and organizational commitment have a positive relationship, because if employees have a good Work-Life balance, they are more committed to their organization. 4.2 Validity and Reliability Test (Construct) On the results of the construct validity measurement, all indicators on charismatic leadership variables, WorkLife balance, job satisfaction and organizational commitment can be accepted, because the value of factor loading has good match (> 0.50), and the value of t-value greater than t-table (1.96) at the significance level of 5%. Furthermore, the construct reliability test meets the reliability requirements with a CR value above 0.60 and a VE value above 0.50 (Hair et al., 2013). In cr values all qualify reliable i.e. values above 0.60, charismatic leadership (0.96), Work-Life balance (0.94), job satisfaction (0.86), and organizational commitment (0.93). At VE values all qualify reliable yes value above 0.50, for leadership charismatic (0.79), Work-Life balance (0.71), job satisfaction (0.54), and commit Organizational (0.72). 4.3 Structural Test Analysis H5: A good work-life balance will increase employee organizational commitment. From the description above, the research model can be described as follows: IV. RESEARCH METHODS Structural test analysis can be seen from the value of R². The R² value for each of them. It shows how far an independent variable is able to explain a dependent variable. 4.1 Analysis of Respondents' Demographic Differences 4.4 Analysis of the 10th Model An analysis of respondents' demographic differences (gender, age, last education, working period and work unit) was conducted to find out if there were significant differences in each of them. Charismatic leadership, work-life balance, job satisfaction and organizational commitment are needed. All the results of the respondent's ANOVA test showed that there was no difference so that the answer From the conformity test analysis all tests showed good matches including Chisquare, ECVI, AIC and CAIC, Fit Index, and Goodness of Fit. There are good fit results on RMSEA and close fit results on Critical N. From the results of the analysis above, it can be concluded that the match test throughout the model is qualified (good fit). (Results can be seen in appendix 8 of table 15). Furthermore, this study produced the following T- Value path diagram: Fig. 1: Research Framework Respondents are homogenous and the ANOVA test can be conducted on respondents' answers based on gender, age, final education, working period and work units to charismatic leadership variables, Work-Life balance, job satisfaction and Organizational commitment indicates sig homogenity> 0.05 and anova > 0.05 meaning there is no difference in homogenity. ISBN: 978-93-5619-947-7 Figure 2. T-Value Test Results Description: leadership 17 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Charismatic (CL), Work-Life balance (WLB), job satisfaction (JS), and organizational commitment (OCM). Based on the figure of 2 path diagrams T-Value is a hypothesis in this study, presented in the table of hypothesis as follows: Table 1. Results of hypothesis testing of research models Hypo thesis H1 H2 H3 H4 H5 Hypothetical statement Good Charismatic Leadership will increase Job Satisfaction employee A good work-life balance will increase Employee Job Satisfaction Good job satisfaction will increase organizational commitment. employee Good Charismatic Leadership will increase commitment. Organizational employees A good work-life balance will increase commitment. Organizational employees Value TValue 3,23 6,75 Information Data supports the hypothesis. Data supports the hypothesis. Data supports the hypothesis. 6,78 4,96 0,47 Data supports the hypothesis. The data does not support the hypothesis. Source: Sem Lisrel Data Analysis Results V. DISCUSSION OF RESEARCH RESULTS In this study there are results that show that good charismatic leadership can improve employee job satisfaction in the broadcasting industry. This means that good charismatic leadership can improve employee job satisfaction. When employees think that their managers have charismatic leadership qualities, they tend to attribute organizational motives to intrinsive values, which in turn are positively linked to job satisfaction. Leader charisma is positively associated with the positive influence of followers so that followers of charismatic leaders are happier than those who follow non-leaders. Charismatic. This is supported by the statement of Vlachos et al. (2013); (Erez et al., 2008); and (Conger et al. 2000) that charismatic leadership has an influence on employee job satisfaction. Furthermore, in this study there are results that show that a good Work-Life balance will increase employee job satisfaction in the broadcasting industry. This means that a good Work-Life balance can increase employee job satisfaction. Employees who can maintain a balance between personal and professional lives, can achieve higher job satisfaction and contribute more to the success ISBN: 978-93-5619-947-7 of the organization. In line with that, it is suggested that the manager's behavior towards employees determines the support or obstacles that are not experienced. Organizations position work-life balance strategies, particularly in relation to social responsibility and wellbeing. This is supported by the statement of Varatharaj & Vasantha (2016); Parkes & Langford (2008); Stefanovska et al. (2019); and (Rojuaniah, 2019) that Work-Life balance has an influence on employee job satisfaction. In this study there are also results that show that good job satisfaction will increase employee organizational commitment in the broadcasting industry. This means that good job satisfaction can increase employee organizational commitment. Higher job satisfaction will result in commitment too because employees are more committed to their organization whenever they feel satisfied with their work. Job satisfaction has a positive impact on organizational commitment. Employees are only quite satisfied with their work, because the greater the employee's job satisfaction, the more the employee is committed to his organization. This is supported by the statement of Aban & Perez (2019); Nikpour (2018); and Suma & Lesha (2013) that job satisfaction has an influence on employee organizational commitment. This research shows that good charismatic leadership will increase employees' organizational commitment to the broadcasting industry. This means that good charismatic leadership can increase employee organizational commitment. Charismatic leader behaviors, such as sensitivity to members' needs and having a clear vision, are positively linked to an affective organizational commitment so that charismatic leadership can increase commitment. Affective employees. The leader's sensitivity to members' needs is related to organizational commitments, having a clear vision and articulating it related to commitment, so managers must be clear about goals and objectives. This is supported by the statement Shastri et al. (2010); Barling et al. (1996); and (Rowden, 2000) that charismatic leadership has influence organizational commitment of employees. But in this study there are results that show that a good Work-Life balance does not necessarily increase the organizational commitment of employees to the broadcasting industry. This means that a good Work-Life balance cannot directly affect the level of employee commitment to the organization. These results contradict the hypothesis and do not correspond to the research of Pradhan et al. (2016); (Sakthivel & Jayakrishnan, 2012); Rasheed et al. (2017); and Gulbahar et al. (2014). WorkLife balance has no influence on organizational commitment to the industry analyzed by researchers, it may be because even employees who work in the industry do not. They have a good Work-Life balance, they have good job satisfaction to increase their commitment to the company. They are satisfied with the amount of salary provided, adequate workplace facilities, how to treat their 18 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 employees, to the provision of prestige if the employee performs an achievement of its performance. Good leadership factors also increase employee organizational commitment. Bosses who often express concern and show sensitivity to employee needs also affect employee organizational commitment. Coworkers who support, respect and trust each other Others for their respective responsibilities create performance that synergizes and can achieve the company's goals. When the company's goals are achieved, the success is appreciated and appreciated by the company so that organizational commitment increases. Basic skills possessed by an employee affect organizational commitment to the company because when the expertise of an employee has a uniqueness or exceeds the standards that are determined by the company, the employee earns a high organizational commitment. The Company provides facilities and advantages offered to employees by providing trainings and courses thus creating higher employee commitment. Organizational commitment is also derived from other factors such as self-concept and personal needs. Self-concept is an individual's view and attitude towards oneself. Self-view is related to physical dimensions, individual characteristics, and selfmotivation. The self-concept of employees influences employee attitudes towards organizational environment and the fulfillment of personal needs increases the morale so as to influence the commitment of employees to work in the company. This is supported by the statements of Azliyanti (2017) and Nirmalasari (2018) that Work-Life balance has no influence on employee organizational commitments. Although there are benefits felt by employees to the organization, not necessarily enough to make employees decide to stay in the organization. VI. CONCLUSION AND SUGGESTIONS 6.1 Conclusion The results that can be concluded from this study the first is that good charismatic leadership will increase employee job satisfaction, secondly, a good Work-Life balance will increase employee job satisfaction, Third, good job satisfaction will increase employee organizational commitment, fourth is good charismatic leadership will increase employee organizational commissal and fifth is work- A good life balance does not increase the organizational commitment of employees directly. 6.2 Limitations of Research Research limitations refer to some of the weaknesses in this study. Some of the limitations contained in this study are that this study only discusses the limitations of charismatic leadership variables, Work-Life balance, job satisfaction and organizational commitment. Then, there is the possibility that the respondents did not really fan or ISBN: 978-93-5619-947-7 just fill in based on the ideal conditions expected and not the actual conditions that are happening. 6.3 Advice for the Next Research Future research development could add other variables besides charismatic leadership and Work-Life balance that can improve job satisfaction and organizational commitment just as other variables can be suggested. It's a work motivation variable. Further research can expand its research not only in the Jawa Timur area but in the broadcasting industry throughout Indonesia or other industrial fields. 6.4 Managerial Implications This research aims to find out the role of charismatic leadership and Work-Life balance to organizational commitment through employee job satisfaction in the broadcasting industry. Like other companies, the standard broadcasting industry hours are 8 hours a day depending on shifts. There are even shifts to work early in the morning and home during the day. Working in the broadcasting industry must grapple with research and employees must be ready to coordinate with almost any division. Another issue that is endlessly discussed when it comes to this industry is the issue of salaries, although some broadcasting industries have applied enough wages, but not a few are still Provide wages that are not comparable to the hard work that employees do. This can sometimes be understood because the media industry in our country is not so advanced. Therefore, Managerial implications that can be proposed to increase organizational commitment through employee job satisfaction in the broadcasting industry are by looking at the charismatic leadership dimension and job satisfaction that used in this research. The first dimension of charismatic leadership that will increase an employee's organizational commitment is vision and articulation. In this case, the boss needs to motivate employees by rewarding employees who excel, recognizing the shortcomings and advantages that employees have to strengthen family relationships among employees. The second dimension of charismatic leadership that will increase employee organizational commitment is sensitivity to the environment. Employers must recognize constraints in the company's social environment and seize new opportunities to achieve goals. The third dimension of charismatic leadership that will increase employee organizational commitment is sensitivity to employee needs. Superior Express personal concern for employee needs and show sensitivity to the needs of employees within the company. Furthermore, judging from the dimensions of job satisfaction used in this study. The first dimension is satisfaction with the work environment. In this case, the 19 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 employee is satisfied. With the way his boss handles the work, feels satisfied with working conditions and feels satisfied with the salary and amount of work done. The second dimension is the satisfaction of conscience. Employees are given the opportunity to do different things over time and are given the opportunity to do something that takes advantage of the employee's abilities. The third dimension is the satisfaction of the will. In this case, the employee is given the freedom to use his or her own judgment, given the opportunity to try his own methods of doing the work. Employees are also given a prestay for what has been done so that the employee's organizational commitment increases and will think again if they decide to leave the organization. [17] [18] [19] [20] [21] REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] Aban, C. A. I., & Perez, V. E. B. (2019). The Relationship of Organizational Commitment, Job Satisfaction, and Perceived Organizational Support of Telecommuters in The National Capital Region, 8(4), 162–198. Adekola, B. (2012). The Impact of Organizational Commitment on Job Satisfaction: A Study of Employees at Nigerian Universities. International Journal of Human Resource Studies,2(2),1. Al Jenaibi, B. (2010). Job satisfaction: comparisons among diverse public organizations in the UAE. Management Science and Engineering, Vol. 4 No. 3, Pp. 60-79. Alianto, A., & Rina Anindita. (2018). Effect of Compensation and Work Life Balance on Job Satisfaction Mediated Work Stress. Esa Superior University. Amalia, L. (2019). Work Motivation Model and Organizational Commitment As a Consequence of the Involvement of Non-Pts Lecturer Employees in DKI Jakarta. Esa Superior University. Antoncic, J. A., & Antoncic, B. (2011). Employee satisfaction, entrepreneurship and firm growth: A model. Industrial Management and Data Systems, 111(4), 589–607. Ashima, J. (2015). A Study on Work Life Balance of Working Married Women Employed in Software Industry with Reference to Indore City. Advances In Management, 8(12), 12–16. Azeem, S. M. (2010). Job satisfaction and organizational commitment among employees in the Sultanate of Oman. Psychology, 1(04), 295. Aziri, B. (2011). Job Satisfaction: A Literature Review. Management Research and Practice, 3(4), 77-86. Banks, G.C., Engemann, K.N., Williams, C.E., Gooty, J., mccauley, K.D. and Medaugh, M. R. (2017). "A meta-analytic review and future research agenda of charismatic leadership." The Leadership Quarterly, Vol. 28 No. 4, Pp. 508-529. Barling, J., Weber, T., & Kelloway, K. (1996). Effects of transformational leadership training on attitudinal and financial outcomes: A field experiment. Journal of Applied Psychology, 81(6), 827–832. Brief, A. P., & Weiss, H.M. (2002). Organizational behavior: Affect in the workplace. Annual Review of Psychology, 53(1), 279–307. Cichy, R. F., Cha. J., & K. S. (2009).The relationship between organizational commitment and contextual performance among private club leaders. International Journal of Hospitalist Management, 28(1), 53–62. Connelly, S., Gaddis, B., & Helton- Fauth, W. (2002). A closer look at the role of emotions in charismatic and transformational leadership. In F. Yammarino & B. J. Avolio (Eds.). Transformational and Charismatic Leadership, 2: The Road Ahead. St. Louis, MO: Elsevier. Dee, J. R., Henkin, A. B., & Singleton, C. A. (2006). Organizational commitment of teachers in urban schools: Examining the effects of team structures. Urban Education, 41(6), 603–627. Dizaho, E. K., Salleh, R., & Abdullah, (2017). Achieving work life ISBN: 978-93-5619-947-7 [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] balance through flexible work schedules and arrangements. Global Business and Management: An International Journal, 9(1), 455– 466. Doll, W. J., Xia, W., and Torkzadeh, G. (1994). A Confirmatory Factor Analysis of the End-User Computing Satisfaction Instrument. MIS Quarterly, 18(4), 357-369. Dundas, K. (2008). Work-Life Balance: There is no 'one-size- fitsall' solution. K O'Rourke (Ed.), Managing Matters. Graduate College of Management, Southern Cross University, New South Wales, Vol. Summer (3), Pp. 7-8. Elfitra Azliyanti. (2017). Perception of Transformational Leadership as a Moderation of the Influence between Work-Life Balance on Employee Organizational Commitment. Economic Tower, ISSN: 2407-8565; E-ISSN: 2579-5295 Volume III No. 6. Elprida Sidabutar, Tantri Yanuar Rahmat Shah, R. A. (2020). The Impact of Compensation, Motivation, and Job Satisfaction on Employee Performance. Journal of Multidisciplinary Academic. Erdogan, E., Basar, D., & Zehir, C. (2011). The Relationship Among Charismatic Leadership, Ethical Climate, Job Satisfaction and Organizational Commitment in Companies. Journal of Global Strategic Management, 2(5), 49–49. Erez, A., Misangyi, V. F., Johnson, D. E., lepine, M. A., & Halverson, K. C. (2008). Stirring the Hearts of Followers: Charismatic Leadership as the Transferal of Affect. Journal of Applied Psychology, 93(3), 602–616. Fisher, G. G., Bulger, C. A., & Smith,C. S. (2009). Beyond work and family: A measure of work/ nonwork interference and enhancement. Journal of Occupational Health Psychology, 14(4), 441–456. Greenhaus, JH, Collins, KM and Shaw, J. (2003). "The relation between work-family balance and quality of life." Journal of Vocational Behavior, Vol. 63, Pp. 510-31. Gulbahar, Amjad, A., Kundi, G., Qureshi, Q., & Akhtar, R. (2014). Relationship between Work-Life Balance & Organizational Commitment. Research on Humanities and Social Sciences, 4(5), 1–7. Gunlu, E., Aksarayli, M., & Sahin Perçin, N. (2010). Job satisfaction and organizational commitment of hotel managers in Turkey. International Journal of Contemporary Hospitality Management, 22(5), 693–717. Hair, Anderson, Tatham, &B. (2008). Multivariate. Data Analysis Fifth Edition. USA: Prentice Hall International Inc. Hair, Anderson, Tatham, &B. (2013). Multivariate Data Analysis, Fifth Edition. USA: Prentice Hall International Inc. Hudson. (2005). "The Case for Work Life Balance: Closing the Gap between Policy and Practice." 8:20 p.m. Hudson Global Resources. Hur, W.-M., Han, S.-J., Yoo, J.-J. And Moon, T. W. (2015). "The moderating role of perceived organizational support on the relationship between emotional labor and job-related outcomes." Management Decision, Vol. 53 No. 3, Pp. 605-624. Intan Nirmalasari. (2018). Analysis of the Effect of Work Life Balance on Organizational Commitment through Job Satisfaction of Nurses as Mediators. University of March 1. Joshi Sethi, U. (2014). Influence of Work Life Balance on Organisational Commitment: A Comparative Study of Women Employees Working in Public and Private Sector Banks. European Journal of Business and management online), 6(34), 2222–2839. Judge, T. A., Woolf, E. F., Hurst, C., & Livingston, B. (2005). Charismaticand transformational leadership: A review and agenda for future research. ZeitschriftFu r Arbeits-Und Organizations psychologie, 50, 203–214. Kianto, A., Vanhala, M., Heilmann, P. (2016). The Impact of Knowledge Management on Job Satisfaction. Journal of Knowledge Management, 20(4), 621-636. Kwon, I. W. G., & Banks, D. W. (2004). Factors related to the organizational and professional commitment of internal auditors. Managerial Auditing Journal, 19(5), 606-622. Louise P Parkes, Peter H Langford. (2008). Work – life balance or work – life alignment, Journal of Management, Organization, 14(3), 267–284. Lowe, G. S. (2005). Control Over Time and Work-Life Balance: An Empirical Analysis. Lund, D.B. (2003). Organizational culture and job satisfaction. 20 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Journal of Business and Industrial Marketing, 18(3), 219–236. [39] Malhotra, N. K. (2010). Marketing Reseach: An Applied Orientation. Sixth Edition. Pearson Education. [40] Meyer, J. P., & Herscovitch, L. (2001). Commitment in the workplace: Toword a general model. Human Resuorce Management Review, 11(3), 299–326. [41] Meyer, J. P., Allen, N. J., & Smith, C. (1993a). Commitment to organizations and occupations: Extension and test of a threecomponent conceptualization. Journal of Applied Psychology, 78(4), 538–551. [42] Meyer, J. P., Allen, N. J., & Smith, C. (1993b). Commitment to organizations and occupations: Extension and test of a threecomponent conceptualization. Journal ofa Pplied Psychology, 78, 533-551. [43] Meyer, J. P., Stanley, D. J., Herscovitch,L.,& Topolnytsky, L. (2002). Affective, continuance, and normative commitment to the organization: A meta-analysis of antecedents, correlates, and consequences. Journal of Vocational Behavior, 61(1), 20–52. [44] Moreno-Jiménez, B. Et al. (2009). Effects of work–family conflict on employees' well-being: The moderating role of recovery strategies. Journal of Occupational Health Psychology, Vol. 14, No. 4, Pp. 427–440. Doi:10.1037/A0016739. [45] Nikpour, A. (2018). Psychological Empowerment and Organizational Innovation: Mediating Role of Job Satisfaction and Organizational Commitment. International Journal of Organizational Leadership, 7(2), 106–119. [46] Pandey, C., & Khare, R. (2013). The Impact of Work Life Balance Practices on Employee Performance of. Indian Journal of Health and Wellbeing. [47] Petrescu, A. I., Simmons, R. (2008). Human Resource Management Practices and Workers' Job Satisfaction. International Journal of Manpower, 29(7), 651-667. [48] Pradhan, R. K., Jena, L. K., & Kumari, I. G. (2016). Effect of Work–Life Balance on Organizational Citizenship Behaviour:Roleof Organizational Commitment. Global Business Review, 17(June), 15S-29S. [49] Rasheed Olawale, A. V, M. FAPOHUNDA, T., & Foluso Ilesnmi, J. V. (2017). Work-life Balance and Organisational Commitment: Perceptions of Working Postgraduate Students. BVIMSR Journal of Management Research, 9(2), 178–188. [50] Rojuaniah. (2019). The Impact of Work Life Balance, Role Conflict and Work Stress on Job Satisfaction in Women Doubles. Call for Papers FMI Samarinda. [51] Rojuaniah. (2019). Job Satisfaction as a Driver of Organizational Commitment Citizenship Behavior. Esa Superior University. [52] Rowden, R. W. (2000). The relationship between charismatic leadership behaviors and organizational commitment. Leadership & Organization Development Journal, 21(1), 30–35. [53] Sakthivel, D., & Jayakrishnan, J. (2012). Work life balance and Organizational commitment for Nurses. Asian Journal of ISBN: 978-93-5619-947-7 Business and Management Sciences, 2(5), 2047–2528. [54] Sharma, N. And Singh, V. K. (2016). "Effects of workplace incivility on job satisfaction and turnover intentions in India." South Asian Journal of Business Research, Vol. 5 No. 2, Pp. 234249. [55] Shastri, R. K., Shashi Mishra, K., & Sinha, A. (2010). 18 SSB, Selection Centre East, Carriappa Road. African Journal of Business Management, 4(10), 211001. Silva, R. C. Da, Dutra, J. S.,Veloso, E. F. R., Fischer, A. L., & Trevisan, L. N. (2015). Generational perceptions and their influences on organizational commitment. Management Research, 13(1), 5–30. [56] Sosik, J. A. (2005). The role of personal values in the charismatic leadership of corporate managers: A model and preliminary field study. Leadership Quarterly, 16(2), 221–244. [57] Stefanovska–Petkovska,M., Petrovska, I., Bojadziev, M., Schaeffer, I., & Tomovska- Misoska, A. (2019). The Effects of Organizational Culture and Dimensions on Job Satisfaction and Work-Life Balance. Montenegrin Journal of Economics, 15(1), 99–112. [58] Subramaniam. G, Ali. E, Overton. A. (2010). Are Malaysian women interested in flexible working arrangement at workplace? Business Studies Journal, Volume 2, Special Issue. [59] Suma, S., & Lesha, J. (2013). Job Satisfaction and Organizational Commitment: the Case of Shkodra Municipality. European Scientific Journal, 9(17), 41–51. [60] V.varatharaj, & S.Vasantha. (2016). An exploratory study on the development of women entrepreneurs: Indian cases. Journal of Research in Marketing and Entrepreneurship, 18(2), 232-247. [61] Vlachos, P. A., Panagopoulos, N. G., & Rapp, A. A. (2013). Feeling Good by Doing Good: EmployeeCSR-Induced Attributions, Job Satisfaction, and the Role of Charismatic Leadership. Journal of Business Ethics, 118(3), 577–588. [62] Wang, D., Hom, P. W., Allen, D. G. (2017). Coping with Newcomer "Hangover": How Socialization Tactics Affect Declining Job Satisfaction during Early Employment. Journal of Vocational Behavior, 100, 196-210. [63] Weiss, D. J., Dawis, R. V., England, G. W. (1967). Manual for the Minnesota Satisfaction Questionnaire. Minnesota Studies in Vocational Rehabilitation, 22, 120. [64] Wilderom, C. P.M., van den Berg, P. T., & Wiersma, U. A. (2012). A longitudinal study of the effects of charismatic leadership and organizational culture on objective and perceived corporate performance. The Leadership Quarterly, 23(5), 835–848. [65] Yucel, I., & Bektas, C. (2012). Job Satisfaction, Organizational Commitment and Demographic Characteristics Among Teachers in Turkey: Younger is Better? Procedia - Social and Behavioral Sciences, 46(December), 1598–1608. [66] Zhang, C. P., Liu, W. X., & Liao, J. Q. (2011). The affecting mechanism of charismatic leadership on employee’s creativity: it is enough to be with psychological safety? Management World (Monthly), 10, 94-107. 21 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 A Simple Optical Method for Determination of the Dielectric Constant of Salt (%) Water using Ultraviolet Light Prof. Samir A. Hamouda1, Maqboula Khamis Ibrahim2 1 Professor, 2M.Sc.Scholar Physics Department, University of Benghazi, Libya Abstract: Optical constants such as refractive index, absorption coefficient, extinction coefficient and the real (εr) and imaginary (εi) components of the dielectric constant for NaCl salt water (10-50%) were determined from the UV Optical transmission data. Results of UV transmission analysis in salt water have shown that in dilute solutions the dielectric constant (real & img) is linear. The addition of dissolved Na and Cl ions above (50%) to water results in a drop in dielectric constant. Keywords : Optical Transmission Method; Refractive Index (N); Extinction Coefficient (K); Salt Water; Dielectric Constant ultraviolet electromagnetic radiation source and visible light using spectrophotometer instrument. Spectrophotometer produces light from spectrum with certain wavelength and photometer is a measuring tool of light intensity transmitted or absorbed [2][3]. Infrared, visible, and ultraviolet radiation is widely used in scientific research, physics [4][5], astronomy [6][7], medicine [8], chemistry [9][10], biology [11][12], industry[13], and forensic science [14][15]. II. I. THEORY OF OPTICAL PROPERTIES INTRODUCTION Light is a part of electromagnetic spectrum, which comprises other regions of electromagnetic radiation such as radio, microwave, X rays, gamma-ray, and cosmic ray. The spectrum of visible light (see figure1), depending on the wavelength or frequency, consists mainly of infrared with wavelengths approximately (930nm -3200nm), visible (400-750 nm), and ultraviolet (300-400 nm) bands [1]. The most important description of the amount of radiation penetration into the material is the Linear Attenuation Coefficient, which is a quantity that depends on the energy of the incident photon and the atomic number of the material. This quantity represents a fraction of the energy lost from the incident photon for every 1cm penetrated through the material. The unit of linear absorption coefficient μ is cm-1. However, the fundamental mechanism of quantitative analysis in optical (absorption or transmission) methods is the Lambert Beer’s law. According to Lambert –Beer’s law [16-21], when a narrow photon beam of single energy hʋ0 and a flux density I0 (the number of photons per unit area and t time) falls on a homogeneous medium and penetrates it a distance (x), the flux density of the transmitted photon beam from this medium is I and is given as: I(x) = I0 e -µ X Fig.1: Shows a region of electromagnetic spectrum of experimental interest The basic idea of applying the optical methods or optical Spectroscopies is to study how matter interacts with or emits electromagnetic radiation. However, there have been many different types of optical spectroscopy, depending on the wavelength range that is being measured. Infrared spectroscopy uses the lower energy infrared part of the spectrum and ultraviolet spectroscopy uses the higher energy ultraviolet part of the spectrum. Such optical methods are used to determine the mechanical, chemical, and electrical properties of matter. UV-Vis spectroscopy is a spectroscopy analysis technique using ISBN: 978-93-5619-947-7 (1) Applying to liquids or solutions, Lambert-Beer’s law states that the amount of radiation of infrared, visible, and ultraviolet light, transmitted or absorbed by a solution is an exponent function of substance concentration and solution thickness [3]. Therefore, measurement of the amount absorption and transmission by a solution allows for the determination of electric constants, such as the absorption coefficient (α), the extinction coefficient (k), and the real and imaginary part of the dielectric constant (εʹ and εʹʹ ) of the solution. In this paper, we report the optical and electrical properties of salt water (%) from the UV Optical transmission data. The optical property of a transmitting medium are presented as the complex dielectric constant and is given as: 22 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 ε = εʹ + εʹʹ (2) Where εʹ is the real part and εʹʹ is the imaginary part of the dielectric constant of the medium. Both parameters are calculated by the flowing formulas [22]: εʹ = n2– k2 (3) εʹʹ = 2nk (4) (concentration %), one is faced with either instrumenting new spectrophotometric equipment or improving existing equipment. The method described in this paper is the result of the second consideration. In this UV spectroscopy method, the spectrometer consists of light source, UV filter, quartz cuvette, ammeter, power supply, and photocell. Figure2 shows the main units of the optical system. Distilled water was heated to boiling temperature in order to release dissolved gases. Where n is the refractive index, n is related to the velocity of propagation of an electromagnetic wave through the medium. K is the extinction coefficient which is related to the loss of wave energy of the incident electric field to the medium. Therefore, the optical properties of the medium are governed by the interaction of the electric field of the electromagnetic wave and the medium. The refractive index (n) is related to the transmittance (T) in the medium through the relation [23]: Fig.2: The experimental set-up n= + (5) Transmittance is defined as ( ), where I0 is intensity of light entering the sample and I is intensity of light emerging from the medium. The absorption coefficient (α) is defined as the ratio of the incident intensity of electromagnetic waves per unit length in the direction of wave propagation in the medium and is related to the absorbance (A) and the thickness of the medium (d) as [24]: α= Salt solutions were made from distilled water with salt concentration (gram/liter) from (10-50%). However, measurements of salt solutions were taken on two consecutive days in order to achieve solution equilibrium, and average results were taken. Measurements were taken at 160C. The transmission data was recorded with ammeter in the UV wavelength range of approx. 300 nm to 400 nm and maximum transparency (366 nm). IV. RESULTS AND DISCUSSIONS (6) The absorbance (A) is proportional to concentration of absorbing medium compound and is given as [25]: A = - log T (7) It can be seen from the relation (6) that the amount of radiation of visible light that is absorbed by a medium (solution), is proportional to the concentration and inversely to the thickness of the medium. On the other hand, the absorption coefficient (α) is related to the extinction coefficient (K) and the wavelength (λ) of the incident photons through the relation [26]: α= (8) The relation (8) states that the absorption coefficient (α) also depends on solvent, the molecular structure, temperature and the incident wavelength. III. MATERIALS AND METHODS In considering optical methods for measurement of light absorption and transmission in NaCl salt water ISBN: 978-93-5619-947-7 Fig.3: Shows the refractive index of salt concentration (gram/litter) from (10-50%) in water for UV wavelength (366 nm) Figure 3 shows the refractive index of salt concentration (gram/litter) from (10-50%) in water for UV wavelength range of approx. 300 nm to 400 nm and maximum transparency (366 nm). It can be seen from figure3, that the refractive index of solution increases as the concentration of solutions increases. This increase is to a certain limit. Above 50% concentration no data was obtained. This is due to the fact that, as the concentration of solutions increases its density increases, there are more molecules for the UV light to hit when it penetrates through the solutions. As a result the penetration of UV in the solution is blocked. Figure 4 shows the real and imaginary parts of the dielectric constant of salt 23 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 concentration (gram/litter) from (10-50%) in water for UV wavelength range of approx. 300 nm to 400 nm and maximum transparency (366 nm). Calculations of the (real & img) parts of the dielectric constant were carried out with UV wavelength (366 nm). applications. Both (n, k) were determined from the transmission (T) of UV light through NaCl water solution. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] Fig.4: The effect of NaCl salt concentration on the real (a) and imaginary (b) parts of the dielectric constant for UV wavelength (366 nm) It can be seen from figure4; that in dilute solutions the dielectric constant real (a) and imaginary (b) are linear. The addition of dissolved Na and Cl ions to water results in a drop in dielectric constant of water (~80) due to the fact that the densities of solution reach a saturation level and the solution become an electrically conductive. The dielectric constant is an indicator of how easily an insulating material can be polarized as a result of an external electric field applied to it. The dielectric constant is an indicator of how easily an insulating material can be polarized as a result of an external electric field applied to it. The NaCl ions produce electric fields that polarize the water dipoles, which is opposite to electric components of the UV electromagnetic wave. V. CONCLUSION The study of dielectric constant of NaCl salt water (%) gives important information about the nature of molecules, ions and their physical mechanisms in the solution. The optical constants of NaCl salt water, such as refractive index (n), absorption coefficient (α), extinction coefficient (k) and the real (εr) and imaginary (εi) components of the dielectric constant are important factors for optical ISBN: 978-93-5619-947-7 [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] Samir A. Hamouda and Maqboula Khamis Ibrahim., “Knowledge and Experimental Techniques”, Engineering and Scientific International Journal (ESIJ), Volume 8, Issue 4, October – December 2021, pp. 156-159. Yang Sing Leong et. al., "UV-vis spectroscopy: A new approach for assessing the color index of transformer insulating oil." Sensors, Vol. 18, Issue no. 7, 2018, 6 July,, PP. 2175. Rahmi Dewi, et al., “Characterization of Optical Properties of Thin Film Ba1-xSrxTiO3 (x= 0,70; x= 0,75; and x=0,80) Using Ultraviolet Visible Spectroscopy”., The 8th National Physics Seminar, AIP Conference Proceedings vol. 2169, 2020, : 05 May, PP. 040001-1-040006. B L Diffey, “Ultraviolet radiation physics and the skin”, Phys. Med. Bio., V01. 25. No. 3, 1980, PP. 405-426. Hanns Moshammer, et. al. “UV-Radiation: From Physics to Impacts “, Int. J. Environ. Res. Public Health, vol. 14, Issue 2, 2017, 17 February, PP. 200. A Vidal-Madjar, et. al. “Galactic ultraviolet astronomy”, Rep. Prog. Phys, vol. 50, 1987, PP. 65-113. James Lequeux., “The Rise of Ultraviolet Astronomy in France”, Journal of Astronomical History and Heritage, vol. 24, issue 1, 2021, PP. 83‒97. Edwin C. McCullough., ” Optical Radiations In Medicine A Survey Of Uses, Measurement And Sources”., American Association of Physicists in Medicine. AAPM REPORT NO. 3, 1977. C. Bosch Ojeda and F. Sánchez Rojas, “Process Analytical Chemistry: Applications of Ultraviolet/Visible Spectrometry in Environmental Analysis: An Overview, vol.44, Issue 3, 2009, 2PP. 245-265. Robina Begum. et al., “Applications of UV/Vis Spectroscopy in Characterization and Catalytic Activity of Noble Metal Nanoparticles Fabricated in Responsive Polymer Microgels: A Review”, Critical Reviews in Analytical Chemistry, vol.48, Issue 6, 2018, PP. 503-516 Jessica Roberts, et.al. “The Use of UV-Vis Spectroscopy in Bioprocess and Fermentation Monitoring”, Fermentation, vol. 4, Issue 1, 2018, 13 March, PP. 18. Kwan-Hoong Ng.” Non-Ionizing Radiations–Sources, Biological Effects, Emissions and Exposures”., Proceedings of the International Conference on Non-Ionizing Radiation, 2017. Peter Swanson., “Advances in Light Curing Adhesives and Coatings Lead to Process and Quality Benefits in Electronics Manufacturing”., White Paper, Intertronics, 2017. Dzulkiflee Ismail, et. al.” Ultra-Violet and Visible (UV-VIS) Spectroscopy and Chemometrics Techniques for Forensic Analysis of Ballpoint Pen Inks: A Preliminary Study”, Malaysian Journal of Forensic Sciences, vol 5, Issue 1, 2014, January, Pp. 47-52. Mahmut Asirdizer et al., “Usage of Infrared-Based Technologies in Forensic Sciences”., Intech Open, 2016, 7 September. W. Heitler, “The Quantum Theory of Radiation”, (Oxford University Press, London), England, 1944, p. 49. R. D. Evans,, “The atomic nucleus”, McGraw Hill Book Company, Inc., New York.1955. C. M. Davisson and R. D. Evans, “Gamma-ray absorption coefficient‟. Rev. Mod. Phys, Vol.24, 1952, 79-103. Harvey Hall, “The theory of photoelectric absorpt ion for xrays and Gamma-rays”, Reviews of modern physics”, Vol 8, 1936, pp358377. J. Hubbel, “Photon mass Attenuat ion and Energy- Absorpt ion Coefficients from 1keV to 20keV”, Int. J. appl. radiat . isot , .vol 33 , 1982, pp1269-1290. Nat ional Bureau of Standarads “Photon Cross Sect ions, Attenuat ion Coefficient, and Energy Absorpt ion Coefficients from 10 keV to 100 GeV”, U.S. Department of Commerce, 1969. S. Singh, Et Al), “Investigation Of Optical Constants And Optical Band Gap For Amorphous Se40-Xte60agx Thin Films”., Chalcogenide Letters, Vol. 14, No. 4, 2017. 24 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 [23] R Swanepoel., “Determination of the thickness and optical constants of amorphous silicon”., J. Phys. E: Sci. Instrum,.16, 1983, pp. 1214. [24] Imen Ben Saad, et al., “Optical, UV-Vis spectroscopy studies, electrical and dielectric properties of transition metal-based of the novel organic–inorganic hybrid (C6h10n2) (Hg2cl5) 2.3h2o”, Journal Of Advanced Dielectrics., Vol. 9, No. 5, (2019). ISBN: 978-93-5619-947-7 [25] Martin Vejražka., “Optical Methods In Biochemistry”, Institute Of Medical Biochemistry, (2009). [26] S. Singh and S. Kumar. “Investigation of Optical Constants and Optical Band Gap for Amorphous Se40-Xte60agx Thin Films”, Chalcogenide Letters, Vol. 14, No. 4, April 2017, p. 139 – 146. [27] R Swanepoel., “Determination of the thickness and optical constants of amorphous silicon”, J. Phys. E: Sci. Instrum, vol. 16, 1983, p 1214. 25 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Growth Perspectives of Small Tea Growers – A Study in Golaghat District of Assam Anitabh Kakoty1, Dr. Ratan Kaurinta2 1 Research Scholar, Department of Commerce, Nagaland University, Kohima Campus, Meirima Associate Professor, Department of Commerce, Nagaland University, Kohima Campus, Meirima 2 Abstract: The growing prominence of small tea growers in the tea producing landscape has an overwhelming effect on the decision of its raw material or green tea leaf. The small tea growers also have an inclusive role to ignite the entrepreneurship in the people who were outside its orbit. The transition which is taking place due to growing numbers of small tea growers to the quality of life and overall day to day economic activity is immense. The role of the institutions and market scenario is also changing due to changes in overall organizational growth. However the study in intended to unveil the contribution of small tea growers in a multidimensional approach. Keywords: Small Tea Growers; Growth; Socio Economic Impact; Institutional Role; Market Scenario I. INTRODUCTION The cultivation of tea has been regarded as a profitable venture for the cultivations. Tea is grown in the region with presence of all favourable factors ranging from soil quality, adequate monsoon shower, availability of uplands and accessibility to the market with requisite demand and prevalence of a tea going culture. During the colonial period in India, Assam, West Bengal, Tamilnadu and Karnataka joined into the production of tea. Among the tea growing states Assam was the pioneer in production of tea. Till seventh plan period, the growth of tea in Assam in the large tea estate segment was significant. But it exhibited a reasonable decline after that period. Sarma, Atul (2012) et.al; has cited that the decay in the production growth of the tea is due to the fall in the yield potential which has become as common phenomenon for most of the tea growing states in India. Post 1990s or from the eighth plan period, a major shift in the production of tea took place in a new form of small holdings and the growers are most popularly known as the small tea growers or STGS which has an acreage of 10.12 hectare or below as per definition provided by the Tea Board of India. Small Tea growers do not possess processing units and they supply the raw materials which is green leaves only. The demand for Indian tea is highly tilted towards the domestic market and some percentage in the global market. The increase in the demand for tea in any of the market could not be matched by the supply of existing large estates till 1990s. Moreover the large estates has statutory and management problems to expand and due to this reason, any additional demand in tea needs to be ISBN: 978-93-5619-947-7 fulfilled by the small tea growers. Due to this reason, small tea growers had a significant growth during the period (Bhowmik K. Sharit 1991). The sall tea growers in Assam are the new segment of tea growers with entrepreneurial skills, motivation and resources which joined the supply chain for green leaves. The Golaghat district of Assam falls in the South Bank agro-climatic zones and has a sizeable number of small tea grower which is almost 13761 in number as per estimate of Tea Board of India, land coverage of 13900hectares and production of 224.58 Million Kgs green leaves in the year of 2020. II. ROLE OF SMALL TEA GROWERS IN TEA INDUSTRY Tea industry in India is becoming highly competitive due to the situation in world exports and in home market. India has a sizeable market in the domestic market with almost 70 percent of processed tea is consumed within the country. India is a populous country with a growing population which also adds new demand to the tea industry. In external market, Indian tea is facing shift competition from China, Kenya and Srilanka. Small tea growers with a trade-off arrangement with the large estates are steadily contributing its product to the processing units. As the large estates have been suffering due to falling productivity caused by old aged bush, restrictions due to statutory control, prevalence of labour acts, ecological issues and other management problems, they have to rely more on small tea growers for green leaves which is the main raw material for producing made Tea. This has resulted in the growth of small tea growers which is accompanied by other motivating factors such as profitable cash crop, conducive climatic and soil condition, and cultural proximity towards its cultivation, available labour pool and requirement of low investment. The small tea growers are multiplying rapidly in numbers in Golaghat district of Assam. It is contributing significantly to the socio-economic status, changes to the institutional role and scenario of overall market. The growth of STGs can be viewed in terms of its production level, productivity and acreage. The small tea holding of tea in south India is being managed and cultivated by household units as compared to the large corporate houses who indulged in large scale tea. Hayami, Yujiro (2004) 26 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 and Damodaran A. (2004).In Himachal Pradesh, the small tea growing business is identified as cottage industry as per study of Kumar, Ajay (1998). Hannan (2019) has cited that the small tea growing business is more of family farm and it is widely accepted in the North Bengal due to its less perishable property and permanent nature. III. LITERATURE REVIEW Small tea growers is bringing transition to the rural economy in the state of Assam. Sarma, Chandan (2017) et.al; has opined that small tea growers has generated the scope of self-employment, expansion of allied economic activities, ensuring a continuous source of income or as an additional source of income. Bora Kaberi (2015) and Das and Hazarika Kakali(2015) has indicated that commercial tea cultivation in small tea holdings were initiated in Golaghat district in 1978 which is due to the reason of people had knowledge of this form of cultivation, Proximity to the processing factory, skilled workers from the large estates and ready market for promotion. Das, Kalyan (2014) has revealed in his studies that an advantage of plantation crops over the other crops are cultivated in seasons has encouraged to adopt small tea plantation meant for small and marginal farmers. The land owning communities in the state has also considered the small holding tea cultivation as an economic activity. However, stagnancy in production of tea estates induced the tea growers to multiply. Renko et.al (2012) has expressed that perception shapes one’s mind by percolating into it to visualize a strategy for decision making. Aan Hardinyana (2015) has identified perception to be a collective force decides on continuity with the existing organisation and whether to give effort for an achievable goal. Market for agricultural products has involvement of all direct and indirect participants making a chain from production to consumption where institutional support largely effect the market, As per Petro, Putsentielo (20200 et.al; the development and efficient functioning of agricultural sector is linked to the development of its institutions and market transformation can be brought by institutional transformation. IV. Small tea growing has become a necessity for the tea growing region of Assam. It is due to this reason, a careful and thorough research should be conducted on STGs growth and perspectives related to the growth so that it can provide insight to the real situation connected to the growth of the STGs and any problems inherited by it. V. OBJECTIVES OF THE STUDY Small tea growers since its growth in Golaghat district of Assam have a strong impact on the development. A conscientious effort has been made to evaluate the development scenario of this region with the help of this study. The main objectives of this study are: To identify the changes in perception of socio economic status due to STGs in the region. To assess the perception on changes in institutional role. To evaluate the perception on market expansion due to STGs presence. VI. METHODOLOGY A descriptive is conducted by using multistage random sampling. Primary data for this study was collected by administering a structured questionnaire for 120 sample of respondents. Respondents are chosen from the STGs of eight development blocks of Golaghat district of Assam. Secondary data are referred from reports and publications for calculation of growth rate by using CAGR or compounding average growth rate method. Various resources are accessed from e-journals, books and research reports. For this study Likert Scale of five point scale is being utilized where 5=Strongly agreed,4=Agreed,3=No response,2=Disagree and 1=Strongly disagree. Cronbach’s Alpha was calculated for checking the consistency and reliability of the dimensions of the questions. Responses are tested by using Z-Test, variance and other descriptive. VII. SMALL TEA GROWERS IN GOLAGHAT DISTRICT SIGNIFICANCE OF THE STUDY Small tea growers are contributing to the tea production landscape along with its growth. The growth of STGs has provided employment to a number of individuals and households by elevating their financial position and bringing change to their quality of live. With the emergence of STGs, the cash flow situation of the cultivators is improving and they are visibly in a better financial stability. In a state like Assam where the employment opportunity is minimal with a dismal performance of Industry. The cultivation of tea in small holdings is contributing to the development of the state and especially to the people who are highly dependent on cash crop. ISBN: 978-93-5619-947-7 In Golaghat district, small tea growers are sizeable in numbers. According to estimates of Tea Board of India, the district has 13081 number of STGs are registered which covers a total acreage of 118.5 ha. STGs in Golaghat district gained momentum due to policy of the Government of Assam in 1978, motivation among the educated youth, nearness to the tea processing units, simultaneous growth of bought leaf factories, availability of uplands with favourable soil fertility, presence of labour pool with a tea growing culture, initial boost from large estates and rising in number of nuclear family with search for additional income source. In the year of 2012, the number of STGs was 1387 which increased to 13106 in 2019. The large tea estates in Golaghat district which are struggling with productivity is also dependent on STGs for 27 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 green tea leaves. The bought factories in the district is getting boost for easily available raw materials from STGs. Expansion of tea market is taking place due to additional processing capacity of bought leaf factories with 111930500 kgs of green leaves per year as per estimates of Tea Board. Small tea growers are also linked to the industries which provides agronomical inputs. It is estimated that total consumption demand for fertilizers and nutrients necessary for growth of tea plants has a high yearly demand of 16263000 Kgs which also creates opportunities of new business connected to the small tea growing industry. VIII. PROFILE OF GOLAGHAT DISTRICT Golaghat district of Assam comes under the South Bank agroclimatic region of the state. The district has all conducive factors for cultivation of tea. It has eight developmental blocks namely Gomari, Morongi, Kakodonga, Padumoni, Bokakhat, Dergaon, Sarupathar and Kathalguri which has an almost homogeneous number of small tea growers. Golaghat district has a total geographical area of 3502 Sq. Km. The total population of Golaghat district is 10,16,888 as per census of 2011 of which 5,43,161 are males and 5,23,727 are females. The average literacy of the Golaghat district is 77.43 percent. IX. MAJOR FINDINGS AND DISCUSSIONS concentration with business, salaried and as an additional source of income. The family size wise 70 percent in the above 3 family size category and rest of 30 percent is in the 1-3 category with a male dominated participation in this small tea growing. Table2. Growth Performance of STGs in Golaghat district (Period2011-2020) S. No. Items CAGR 1 Production level 12.6 2 Productivity 0.6* 3 Acreage 22.3 4 No. of STGs 28 Source: Tea Board of India Statistical Handbook of Assam Table 3. Reliability of perception of respondents on growth of STGs in Golaghat district during 2011-2020(N=120) S. No. Items 1 Better market access Administrative services are available Availability of better financial support Creating more skills through training 2 3 Table 1. Demographic Profile of the respondents Factors Classifications Age 25-40 40-50 50-60 Female Male Single Married Illiterate HSLC HSSLC(10+2) Graduate and above 1-3 3> Business Farming Salaried Addition to other source Gender Marital status Educatio nal qualificat ion Occupati on status No of respondents 30 60 30 108 12 30 90 12 12 48 48 36 84 36 60 12 12 Percenta ge 25 50 25 90 10 25 75 10 10 40 40 30 70 30 50 10 10 Source: Survey The survey was conducted based on a structured questionnaire administered on the small tea growers of Golaghat district. The demographic profile on the respondents is being assessed on the basis of the responses. Demographic composition of the respondents shows in case of age distribution to be more in middle aged section. The primary occupation as a farming has higher ISBN: 978-93-5619-947-7 4 Me an Standard deviation Z Sig 4.76 .42 44.33 .000 4.73 .48 38.55 .000 4.61 .48 36.74 .000 4.69 .46 64.05 .000 Source: Survey However ,different perspectives of growth can be evaluated with the help of parameters such as changes in socio economic status ,role of the institutions and changes in the market scenario which is crucial for the all round development of the region. The changes in socio economic status, role of the institutions and changes in market scenario has four dimensions. The Cronbach’s Alpha for the dimensions has score value as 0.748, 0.758 and 0.826 which shows higher consistency and reliability. Table 4. Changes in socioeconomic status of STGs (N=120) S. No. 1 2 3 4 Items Level of income Increase in saving potential Improvement in quality of life Social security status Me an 4.9 Standard Deviation .30 Z Sig 69.57 .000 4.8 .31 65.07 .000 4.7 .46 40.48 .000 4.71 .45 41.38 .000 Source: Survey 28 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 The STGs are changing the socio economic status of the Golaghat district of Assam. It has attracted a number of new cultivators to adopt their new form of cultivation as it is a perennial crash crop. The result shows that higher mean value in responses for level of income, increase in savings potential, improvement in quality of life and better social security status. Low standard deviation indicates a strong agreement in favour of improvement in socio economic status with a stability. The dispersion of responses is less as more responses are in agreement with socio economic status. Table 5. Role of Institutions (N=120) S. No. 1 2 3 4 Items Mean Z Sig 4.8 Standard deviation .38 More demand in the market Market is expanded Creating more opportunity Better price realization for the STGs product 51.88 .000 4.7 .44 42.32 .000 4.6 .48 36.51 .000 4.7 .46 39.76 .000 creates a difficult situation to understand the intended questions. XI. CONCLUSION The study has identified the different growth perspectives and its impact on life and livelihood of the small tea growers and the stakeholders in the Golaghat district of Assam. The cultivation of tea in the small tea holdings has uplifted the socio economic status of the people by streamlining a steady flow of income and ensuring social security. The market scenario is visibly changing with its expansion and opening up of different entrepreneurial ventures due to rise in demand of it. Role played by the institutions in this field is significant while a structured administrative support is present with training for skill formation. Informal financial support which is present in the market is fulfilling the need of the small tea growers. REFERENCES [1] [2] Source: Survey [3] As the standard deviation is slightly dispersed with higher mean value which shows a higher tilt towards a strong perception on better market access for the STGs product. The availability of the administrative services has a perception to be as per expectation. Perception on financial support which are being informally provided during contingency by bought leaf factories or by leaf collection agents is positive. The skill formation through participation in training is perceived to be positive among the STGs. The result shows a higher shift of responses towards in agreement with the dimensions of changes in market scenario and variation seen is low. With the entry of more number of STGs in Golaghat district and changes in production scene, more numbers of bought leaf factories are established. The opportunities in the market are increasing during the period with possibilities of setting up number of entrepreneurial ventures related to the industries. However price realization for STGs product has a positive perception in the sense that cultivators can continue with this existing price received against their product. X. LIMITATIONS OF THE STUDY The limitations of the study may be due to the time constraint in relation to the geographical area .It was difficult to include respondents at the remote places due to the infrastructural deficiency. The small tea growers are mostly marginal farmers with low literacy level which ISBN: 978-93-5619-947-7 [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] Bhowmik, Sharit.(2012).Labour Costs and Productivity. Economic and Political Weekly, Vol.47.No.18, pp.30-32 Bora, Kaberi., Hazarika, Kakali.,(2013).Small Tea Cultivation in the Process of Self Employment: A Study on the Indigenous People of Assam (India).International Journal of Latest Trends in Finance and Economic Sciences,Vol3, No.2. Das, Kalyan.(2014),The Tea Smallholdings of Assam Guwahati: DVS Publishers. Hannan, Abdul.,(2019).Farm Size and Trade Relations of Small Tea Growers(STGs) in Assam and North Bengal. Social Change and Development.Vol.16.No.2 Hardiyana, Aan.,Yusup, Maulana., Sidharta, Iwan, (2015). Work and Commitment on Employee Satisfaction. Study on Non– Ministerial Government Agencies in Bandung Indonesia. Retrieved from https://mpra.ub.unimuenchen.de/77075/1/MPRA_paper_ 77075.pdf on 21st of April, 2021. Hayami, Yujiro.,Nayar,Appukuttan Damodaran.,(2004). Towards an Alternative Agrarian Reform: Tea Plantations in South Africa. Economic and Political Weekly.39 (36) Kumar, Ajay. (1998). Financial Performance of Tea Co-operatives in Himachal Pradesh_ a case study of Kangra district [Doctoraal dissertation, Himachal Pradesh University]. Shodhganga : a reservoir of Indian theses @ INFLIBNET. https://shodhganga. inflibnet.ac.in/handle/10603/120654. Mishra, K, Deepak.,Upadhyay,Vandana., Sarma ,Atul., (2012), Unfolding Crisis in Assam’s Tea Plantation. New Delhi: Routledge Publishers. Petro, Putsentilo., Yuriy, Klapkiv., Vitali, Karpenko &I rina, Gvo Decka., (2020). Bulgarian Journal of Agricultural Science, Vol. 26(1), pp-23-33. Renko, M.,Shrader, & R.C., Simon, M., (2012).Perception of entrepreneurial opportunity :a general framework .Manage. Decis. 50.1233-12. Sarma , Kumar, Chandan and Baruah, Prarthana. (2017).’Small Tea Plantation and Its Impact on the Rural Landscape of Contemporary Assam. International Journal of Rural Management, Vol. 13(2), pp.140-161. Tea Board of India Reports, Retrieved from https://www.teaboard.gov.in/TEABOARDPAGE/ODA= on 21st of April, 2021. Statistical Handbook of Assam, Retrieved from https://des.assam.gov.in/documents-detail/statistical-hand-book on 21st of April, 2021. 29 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Effective Learning and Classification using Random forest Algorithm Seema Rani1, Dr. (Prof.)Mukesh Singla2 Research Scholar, Department of Computer Science, Baba Mastnath University,Asthal Bohar, Rohtak 2 Dept. of Computer Science, Baba Mastnath University, Asthal Bohar, Rohtak 1 Abstract: Randomization is provided in two ways: bootstrap samples are randomly sampled, and input attributes are randomly selected for each base decision tree. Random Forest's generalization error is heavily influenced by the strength and correlation of each decision tree's base trees. It is comparable to existing ensemble methods like bagging and boosting when it comes to accuracy. The collection of data is an important step in the development of an intelligent system. This research present 3-year student physical education data, which includes 3216 randomly chosen instances, includes 2000 positive samples and 1216 negative samples of data. Signatures derived from the dataset verified the classification accuracy of Naïve Bayes Algorithm, Random Tree and NN. Random tree based approaches obtained a classification accuracy of 99.88 percent. Keywords: Random forest (RF), decision tree (DT), Random tree based, Algorithm I. INTRODUCTION Random Forest (RF) is a supervised machine learning approach that uses an ensemble of individual models. Data mining is a field in which machine learning is used. In Breiman's Random Forest [Breiman 2001], a decision tree serves as the basis for classifying input data. Multiple decision trees are generated using Random Forest. First, bootstrap samples are generated via random sampling of data, and second, the input characteristics for each base decision trees are randomly selected. Individual decision trees and the connections between base trees have the most impact on Random Forest's generalization inaccuracy. It is comparable to current ensemble approaches like bagging and boosting in terms of accuracy. There is a lot of evidence to support Breiman's claim that Random Forest is effective in large databases because it can handle a large number of input variables without deleting any of them. Random Forest also provides estimates for important variables, as well as an internal unbiased estimate of generalisation error as the forest grows. An ensemble of unsupervised models is used in the Random Forest (RF) supervised machine learning approach. Data mining is a field in which machine learning is used. The decision tree serves as the foundation for Random Forest [Breiman 2001]. Using random sampling for bootstrap samples and selection of input attributes to generate individual base decision trees, both Bagging and Random Forest and countless decision trees employ random sampling and random selection. ISBN: 978-93-5619-947-7 Individual decision trees and the connections between base trees have the most impact on Random Forest's generalization inaccuracy. II. LITERATURE REVIEW QINGXIANG XU ET.AL (2021) With its tremendous influence on both people and societies, learning has been an important growing area for some decades now since it is a major determiner of global civilization and development. Increasing worldwide literacy rates may be attributed in large part to bettering the current educational programs and materials. Since it is the main mechanism by which students are assessed during their studies, assessment is one of the most important educational activities. When it comes to evaluating students' performance in physical education activities and grades, the administration of higher education must establish an intelligent varied teaching assessment model that pays attention to the development of students' personalities and potential. This study use factor analysis and an improved random forest method to condense the aspects of students' multimodal triumphs in physical education into a few common criteria that may be utilised to improve their performance. Students' achievements may be more accurately evaluated using the proposed technique. Research on student grade assessments is the first to use an improved random forest approach. Automated grade evaluation is based on students' grades across many disciplines and the number of factors that represent their performance. The proposed improved random forest approach was put to the test against the current machine learning models in a series of experiments. Researchers' tests found this model to be superior to the other machine learning models in terms of precision, recall and f1-score accuracy and precision. The physical education system is expected to benefit greatly from the introduction of the new system. Maria Elena Castiello Et.Al (2021) - Traditional archaeology questions, such as the study of settlement patterns, are combined with the most cutting-edge Machine Learning technologies in this study to demonstrate the value of combining these two approaches. Random Forest is an ensemble learning technique based on decision trees that we utilized in the canton of Zurich, Switzerland, to undertake archaeological predictive modelling (APM). This was 30 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 accomplished using information gleaned from a database of Roman archaeological sites. Decision-making and probabilistic reasoning tools relevant to the assessment of archaeological risk and protection of cultural treasures are provided by this system. Machine learning techniques may learn from data and generate predictions by modelling the hidden connections between a group of observations that represent the dependent variable and the independent variables. Assuming the information you've already gathered This investigation's major purpose is to ascertain whether or not Roman colonization occurred in the studied area. A probability map showing the possibility of discovering a Roman site in various areas was created, as were rankings of the geo-environmental factors that influence the likelihood that archaeological sites would be discovered. These are our findings: All these outputs are critical to evaluating the data's veracity, as well as inspiring specialists in a number of various ways. Furthermore, these findings aid in assessing the advantages and drawbacks of using such cutting-edge methods and, in the long run, aid in investigating how well machine learning-based models handle archaeological data. Matthias Schonlau Et.Al (2020) - There is a statistical or machine learning approach called random forests that may be used for prediction. Forest is a new command that we'll cover in this tutorial. The random forest method is introduced and shown with two examples: In the first example, a credit card user's likelihood of defaulting on his or her debt may be predicted using a classification issue. An online news article's number of shares may be predicted using a regression problem. We'll wrap things off with a quick recap of the main principles made clear by the examples. M.Sumathi Et.Al (2019) - When it comes to monitoring public cloud user data privacy, machine learning-based Data Privacy is becoming an increasingly essential aspect in the overall effectiveness of the public cloud. Currently, data owners are ready to safeguard their data from unwanted trainers and users while using machine learning algorithms to classify their data.. Data sources with multiple owners are not allowed to be classified using the present privacy-preserving classification approaches. As a result, the process of learning is dependent on knowledge that has a single owner. The current classification algorithm will not be able to rapidly and properly classify multi-owner data. As a result, a different method is needed to manage the categorization of many owners of data while yet protecting privacy in the storage system. There is no need for the trustworthy curator to be involved in the categorization of multi-owner data sources when using our privacy-preserving random forest technique. The random forest classification approach is ISBN: 978-93-5619-947-7 utilized for classification and the Advanced Encryption Standard (AES) technique is employed for the purpose of maintaining the privacy of statistical information between the sender and recipient. Student grade system analysis and classification is carried out in a different way, such a horizontal and vertical data division procedure, via the classification process. Vertical division is used when specific topic information are needed, but horizontal partition is used when an individual student's data is needed. The information of the user is then safeguarded using the AES encryption method. The proposed machine learning-based classification approach with AES gives improved privacy to user-sensitive data when compared to current classification and privacy preservation strategies. Yunchuan Kong Et.Al (2018) Using gene expression data in predictive modelling presents a unique set of challenges since the number of samples (n) is significantly fewer than the number of characteristics (n (p). "n p" properties have prohibited the use of deep learning approaches for gene expression data classification in other disciplines, such as picture classification, where "n > p" situations have proven successful. In addition, To do archaeological prediction modelling, the canton of Zurich, Switzerland, used Random Forest, an ensemble learning approach based on decision trees (APM). Information from a database of Roman archaeological sites was used to do this. This system offers decision-making and probabilistic reasoning capabilities related to archaeological risk assessment and cultural asset conservation. Modeling the hidden connections between a series of observations that reflect a dependent variable and the independent variables may be done using machine learning methods. Assuming you've previously gotten enough information. The primary goal of this inquiry is to determine whether or not Roman colonization happened in the investigated region. Two RNA-seq expression datasets are used to test the capabilities of fDNN in simulation and actual data analysis. Current prediction models may benefit from the technique, which has been shown to improve classification accuracy and select feature meaning when compared to standard random forests and deep neural networks . III. METHODOLOGY DATA SET COLLECTION AND CHARACTERIZATION Using gene expression data in predictive modelling presents a unique set of challenges since the number of samples (n) is significantly fewer than the number of characteristics (n (p). "n p" properties have prohibited the use of deep learning approaches for gene expression data classification in other disciplines, such as picture classification, where "n > p" situations have proven successful. In addition, the lack of useful characteristics 31 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 and Further complicating the task of classifying gene expression patterns is the absence of correlation structures. Forest Deep Neural Network. Table 1. Classification Feature Selection accuracy Techniques Genetic algorithm AIS AIS with PCA AIS + Fisher score feature selection Classification accuracy 98.65% 99.35% 99.54% 97.90% wide range of variable parameters, and making intuitive judgments about the relative relevance of those variables. Algorithms such as the RF algorithm have been proved to be more resilient and stable while maintaining a high level of efficiency in more and more algorithm competitions and practises. IV. RESULT PCA and the fisher score are used to determine which features should be included in the model. Table 3.1 displays the results of the categorization accuracy calculation. fDNN is a new classifier that combines a deep neural network's architecture with a supervised detection of forest attributes to address these problems. To avoid the problem of overfitting, a neural network may be used to process sparse feature representations and input them into the network. fDNN's simulation and real-world data processing skills are both put to the test using two RNAseq expression datasets. Current prediction models may benefit from the technique, which has been shown to improve classification accuracy and select feature meaning when compared to standard random forests and deep neural networks. 3.1 The Classification Models Used in this Study Classification is a common use of data mining and machine learning. The class label of each occurrence in the training set is known before training in a classification model, and this knowledge is used to design a learning algorithm. As a last step before putting, it to use, the test set allows us to see how well the classification model performed during training. Top-down and clear-cut decision tree classification is one of the most used ML classification methods. Deciduous trees are used to divide observation data into mutually exclusive subgroups until there is no statistical difference. As using PCA-based feature selection, the AIS with Fisher score-based feature selection enhanced accuracy by 0.7632 percent when compared to Genetic algorithm. This is shown in the figure 3.1. 3.2 The Proposed Random Forest Classification Algorithm 4.1 Feature Extraction using Random Forest Technique Many sub models make up the random forest (RF) method, which was introduced by Leo Breiman and Adele Cutler in 2010. The final output is generated by combining the results of all of the smaller sub models. It is a typical method in machine learning (ML) for classification, regression, or other sorts of learning. RF is an example. In order to categories data from the original dataset, the RF approach employs a bagging algorithm. Decision tree models are created for each group after training. To generate the final RF model, all of the decision data from the subsmall models is integrated and examined. The voting procedure determines the final prediction result of the RF algorithm, and the classification that receives the most votes is the algorithm's final output. For classification, RF method is more effective than other classification algorithms. It's capable of handling vast amounts of data, supporting a After the Dataset has been prepared, a correlation test is carried out among the various qualities or features. The Pearson correlation model was employed to analyze the data. Two or more random variables may be correlated using a correlation model, which generates values between +1 and -1 inclusive. A matrix of associated characteristics was generated as a consequence. Figure 3.2 depicts the relationship between several characteristics. There is a range of +1 to -1 for the correlation of attributes, with +1 indicating complete positive correlation, 0 representing no correlation, and 1 representing total negative correlation. ISBN: 978-93-5619-947-7 Fig.1: Feature Selection Graph In order to identify those qualities that are reliant on other factors, a correlation model of the dataset is required. The correlation model is used to identify the dependent aspects in the data. The random forest 32 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 approach is used for a second test of feature significance identification after the correlation test of the dataset. [8] [9] [10] [11] [12] [13] [14] Jehad Ali et.al “Random Forests and Decision Trees” Vol. 9, Issue 5, No 3, September 2012 Baoxun Xu et.al “An Improved Random Forest Classifier for Text Categorization” VOL. 7, NO. 12, DECEMBER 2012 Herold, T. et al. A 29-gene and cytogenetic score for the prediction of resistance to induction treatment in acute myeloid leukemia. Haematol. haeatol–2017 Classification algorithms - random forest Tutorialspoint [cited 2020Dec19] https://www.tutorialspoint.com/machine_learning_with_python/m achine_learning_with_py thon_classification_algorithms_random_forest.htm tojiljkovic M 2019 Linear regression in python Real python [cited 2020Nov19] https://realpython.com/linear-regression-inpython/#implementing-linear-regression-inpython Probst P, Boulesteix A L and Bischl B 2019 Tunability: Importance of hyperparameters of machine learning algorithms, Journal of Machine Learning Research 20 pp 1-32 Prasad R, Anjali P, Adil S and Deepa N 2019 Heart disease prediction using logistic regression algorithm using machine learning International Journal of Engineering and Advanced Technology 8 3S Fig.2: Correlation between each feature V. CONCLUSION It is possible to divide a collection of data into different classes using algorithms and classification models. Data mining methods, including as decision trees, nave Bayesian classifiers, NNs, and support vector machines, are becoming popular for classifying intrusions (SVM). Even though attack detection is tough and attackers frequently vary their assault techniques, many data mining systems should increase their classification accuracy. New data mining methods for distinguishing normal vs aberrant traffic are investigated and proposed in this study. We were able to extract UDP data streams from the KDD 99 dataset and turn them into a multiclass dataset that highlights the many types of UDP data stream infiltration concerns. Naive Bayes Algorithm, Random Tree, and NN were all tested using signatures retrieved from the dataset. The classification accuracy of random tree-based approaches was 99.88 percent. REFERENCE [1] [2] [3] [4] [5] [6] [7] Matthias SchonlauEt.Al “The Random Forest Algorithm For Statistical Learning” Https://Doi.Org/10.1177/1536867x20909688 Yunchuan Kong et.al “A Deep Neural Network Model using Random Forest to Extract Feature Representation for Gene Expression Data Classification”https://doi.org/10.1038/s41598018-34833-6 VedranGrgić et.al “Model for predicting heart failure using Random Forest and Logistic Regression algorithms” doi:10.1088/1757-899X/1208/1/012039 M.Sumathi et.al “Random Forest Based Classification of user Data and Access Protection” Volume-8, Issue-1, May 2019 Maria Elena Castiello et.al “An Explorative Application of Random Forest Algorithm for Archaeological Predictive Modeling. A Swiss Case Study” Journal of Computer Applications in Archaeology, 4(1), pp.110–125. DOI: http://doi.org/10.5334/jcaa.71 Qingxiang Xu et.al “Application of Random Forest Algorithm in Physical Education” Volume 2021, Article ID 1996904, 10 pages Vrushali Kulkarni et.al “Efficient learning of random forest classifier using disjoint partitioning approach”2013 ISBN: 978-93-5619-947-7 33 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Corruption in India: Challenges and Prospects Dr. Showket Ahmad Dar1, Feroz Ahmad Wani2 Assistant Professor, Department of Commerce, Govt. Degree College Tral, Jammu and Kashmir, India 2 Assistant Professor, Department of Education, Govt. Degree College Tral, Jammu and Kashmir, India 1 Abstract: Corruption is the most widespread endemic and a greatest threat to economic and political development of any nation. Given the high level of corruption in India, this phenomenon has turned into a cankerworm that has eaten deep into the fabrics of our system. In recent times, the issue is receiving attention of authorities, policy makers, businessmen and civil society organizations. In other words, fight against corruption has emerged as a key developmental issue. As such, this study is an attempt to delve into the current status of corruption in India with a focus on issues and challenges in combating corruption. During the discussion, the authors found that the major scams committed in India since 2009 are a direct result of deficit in governance. This paper also found that lack of competent leadership and management, inherent delays in criminal justice system, hostile witnesses marked with lack of values as key challenges in eliminating corruption. To ensure a corruption free society, the authors strongly suggest simplification of office processes and procedures, filling up of judicial vacancies, civil participation for necessary buy-in and inclusion of private sector under anti-corruption laws, besides strengthening and empowering anti-corruption agencies. To sum up, it is argued that good administration is possible only when corruption is eliminated from society. Individuals who are currently garnering the most attention, such as corrupt politicians, businesspeople, and judges, should be socially shunned and barred from serving in our holy, self-governing country. To accomplish these desired social changes, enacting strong legislation with severe penalties and its rigorous execution is the need of the hour. The study is expected to contribute to the ongoing debate on the link between corruption and anti-corruption campaign, as well as the formation of a broad political consensus on how to deal with it in the future. Keywords: Corruption; Issues; Challenges; Anti-Corruption Laws; Scams. I. INTRODUCTION In India, corruption is the most pervasive endemic. This sickness has infected every office in the public and commercial sectors. It is difficult to estimate how much the economy has suffered as a result of this disease. Even if most of us are concerned, we, the Indian people, must not be found wanting when the time comes to act. “Corruption not only destroys public trust, but also poses a threat to the integrity of markets. It also undermines rule of law besides distorting resource allocation” (G-20 Summit, Seoul). In many developing countries, public sector corruption is a key barrier in effective service delivery. By sweeping into all facets of life, from starting a new business to getting a passport or seeing a doctor, corruption can obstruct the equitable distribution of ISBN: 978-93-5619-947-7 commodities and services to its population. It can take various forms, from bureaucrats requesting bribes from citizens to do basic functions, to hospital personnel stealing drugs intended for the needy, to officials taking compensation for jobs that they perform poorly or do not complete. In recent years, India's fight against corruption has become a major developmental issue. A growing number of authorities, policy makers, businesses and civil society organizations are openly confronting the issue (Hanna et al., 2011). At the same time, public awareness of corruption has increased significantly. It was not uncommon until recently to hear someone talking about anti-corruption purely in terms of law enforcement. Most professionals working in the sector today, on the other hand, agree that public education and prevention are both critical. The field has also realised the importance of civil society in achieving effective and long-term reform (Abdul Raheem, 2009). Research studies reveal that high level of corruption is directly proportional to lower levels of investment. Entrepreneurs will allocate their scarce time and money on bribing rather than production as a result of corruption, which increases transaction costs and uncertainty. By distorting the rule of law and eroding the institutional framework on which economic growth is based, it stifles the development of a healthy marketplace and imbalances economic and social progress. Poor people who are the hardest hit by the economic downturn are most reliant on government services. They are least able to pay the additional costs associated with bribes, fraud, and the misappropriation of economic privilege. Broadly speaking, there are two forms of corruption, administrative corruption and political corruption. By definition, the former alters the implementation of policies, such as getting a license even if one does not qualify for it, while as the later influences the formulation of laws, regulations, and policies, such as revoking all licenses, and achieving the sole right to operate public utility. As elucidated by Warren (2004) “Bureaucratic corruption” involves the violation of first-order norms (the written rules and laws that are the product of politicians’ decision making), whereas “political corruption” is the use of powers by government officials or their known persons for illegitimate private gain. II. REVIEW OF LITERATURE The study of corruption has become "dispersed" and "multidisciplinary," spanning from theoretical modeling of 34 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 very basic conditions to specific details of a single corruption scandal. It has been investigated as a problem of political, economic, cultural, or moral underdevelopment (Amendson et al., 2001). In a similar context, in recent years, the body of theoretical and empirical research that objectively examines the issue of corruption has grown considerably (Elliot 1997, Gill 1998, Girling 1997, Mauro 1995, Paul and Guhan 1997, Shleiferand Vishnay 1998, Vittal 1999, World Bank 1997). While corruption in one form or other has always been with us, it has had manifested itself in different times at different places, with varying degrees of negative consequences (Bardhan, 1997). The early findings of corruption studies primarily focus on the national and institutional levels, analysing the specific impact of various facets of the economic, political, and cultural systems on corruption. However, whether or not these elements have a practical impact on corruption remains a point of contention. In a similar vein, from a medium-term perspective, system design and implementation of the degree of decentralisation between national agencies, as well as recruitment, appointment, compensation, and punishment, not only affect the bud of corruption, but also has a substantial impact on the spread of corruption (Liu, 2016). Given the vast amount of literature available on corruption related factors, the authors have elucidated several relevant and testable hypotheses from the growing literature on the determinants of corruption. For instance, Bardhan (1997) pointed out that corruption had a devastating effect on the economy, while it cannot be denied that corruption has a positive meaning in some areas. Farooq and Shahbaz et al. (2013) shows that corruption is an obstacle to economic growth by building a time series model. In a similar vein, Treisman (2000) found the causal relationship between the economic development and reciprocal causation of corruption through the study of the per capita GDP. Gupta and Davoodi et al. (1998) pointed out that corruption has increased the income inequality and increased poverty. In contrast, Tummala (2009) have found controversial relationship between inequality and corruption. Apart from the above, culture and politics werefound closely related to corruption. Previous studies have also looked into a variety of factors that contribute to the level of corruption in a country which are globalization (Badinger and Nindl, 2014), economic growth (Bai et al., 2013), freedom of press (Bhatacharya, 2008), size of government (Kotera et al., 2012) poverty (Justesen and Bjornskov, 2014) and transparency (Lindstedt and Naurin, 2010). In a simiar vein, as elucidated by Treisman (1998), the lack of trust and civic engagement may increase the supply of corrupt services by reducing the danger to officials of being exposed and punished. Parallel strides have been made in the understanding of corruption and ISBN: 978-93-5619-947-7 institutional reforms. Recent work has argued that education can better control the level of corruption and there is some evidence for the association subnationally in the United States (Glaeser and Saks 2006) and crossnationally (Persson et al. 2003). There is also evidence and a growing consensus among scholars that greater transparency, information and technology-based efforts have a significant impact on reducing corruption. But given preliminary analysis of the literature and a much better grasp of the extent to which corruption is a symptom of fundamental institutional weaknesses, corruption in India is regarded as a complicated phenomenon as the result of more deepseated problems of policy distortion, institutional incentives, and governance. Therefore, in an effort to capture the richness of the literature on corruption, the present paper elucidates the current scenario of corruption in India with special emphasis on the challenges India is facing to tackle this menace. III. OBJECTIVES OF THE STUDY To explore the current status of corruption in India with special reference to major scams committed over the last decade. To analyse issues and challenges that India is facing in combating corruption. IV. RESEARCH METHODOLOGY This paper attempts to construct facts through the scientific enquiry of the existing literature and analysing multiple discourses. The article captures multidimensional issues pertaining corruption. While doing rigorous search on various databases (Proquest, Google Scholar, Shoodhganga and Google search), the authors could find only 38 papers wherein corruption was studied from multi-dimensional perspectives. However, after winnowing, it was found that only 14 papers had subject matter related to issues of corruption at national level. Thus, the research articles/papers chosen in this paper cover a broad spectrum of corruption in wide range of areas like public, corporate, private etc. Our approach in this paper is primarily analytical in nature, given the inherent difficulties in collecting empirical data on the subject of corruption. V. CURRENT STATUS OF CORRUPTION IN INDIA N. Nittal, former Central Vigilance Commissioner (CVC) is of the opinion that nearly half of those who avail services of public departments had the first-hand experience of giving bribe directly or indirectly. He also asserted that two third of people view corruption as real in these offices. However, one third think corruption is more exaggerated. And yet, 80 per cent of people are passive and hardly 20 per cent had ever complained about such 35 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 corruption to any. It is interesting that while 50 per cent of people reported that they had bribed, only 20 per cent took the trouble of complaining. This also highlights the need for sensitizing the public about the danger of corruption.” According to the United Nations, every year, an estimated US$1 trillion is paid in bribes and US$2.6 trillion is stolen through corruption. Together, this sum represents 5% of annual global GDP. Further, in developing countries, funds lost to corruption are estimated to be ten times the amount of the overall Official Development Assistance (OECD, 2015). Loss of public finances due to misallocations or greater expenses, as well as lower quality goods, services, and works, are all direct consequences of corruption. In the case of public works procurement, those who pay the bribes try to recover their money by inflating prices, charging for work not completed, failing to satisfy contract specifications, lowering the quality of work, or using inferior materials. In a similar vein, Corruption affects a person even if he doesn’t come into direct contact with it. Moreover, it makes the business environment less attractive to foreign investment. Corruption is a major problem in India resulting in substantial risk for the businesses operating there. As per Corruption Perception Index 2020 (Table-1) published by Transparency International, India ranked 86 out of 180 countries/ territories. Table 1. Corruption Perception Index 2020 RANK 1 1 3 3 3 3 7 25 78 86 COUNTRY New Zeeland Denmark Finland Switzerland Singapore Sweden Norway USA China India Source: Corruption Perception Transparency International (TI). SCORE 88 88 85 85 85 85 84 67 42 40 Index, 2020 by As per the figures reflected in Table 1”, India dropped eight spots to No. 86, which it now shares with Morocco, Turkey, Timor-Leste and Trinadad and Tobaga, all of which received the same score of 40. The country has steadily slipped since ranking 72 out of 179 in 2007, when the report debuted. Several recent high-profile scandals have underscored the extent of this problem. For instance, looking at the list of major financial scams in Table B offers some hints about the quantum of money involved in these scams. The global corporate community was shocked and scandalized on 7th of January 2009, when the chairman of Satyam, Byrraju Ramalinga Raju, resigned and confessed that he had manipulated the accounts of Rs 7,000 crore in several forms. In 2010, The Commonwealth Games, which costing about eighteen times its budget estimate, were accused of massive misallocation of finances. In a similar vein, two top ISBN: 978-93-5619-947-7 Congress Party members and other government officials resigned after reports of contracts of substandard infrastructure and financial irregularities got highlighted. The total misappropriation of funds, according to the Central Vigilance Commission, is estimated to be around $1.8 billion (Kundu, 2015). During the second term of United Progressive Alliance another scandal called 2G scam rocked the political scene wherein, the Comptroller and Auditor General of India in a report quantified and pegged the scam loss to Rs. 1.76 lac crores. This scam outraged opposition resulting in massive protests in Delhi coupled with complete shutdown of parliament for three weeks. Likewise, Colgate scandal of 2012 amounting to $34 billion loss has received massive media reaction and public outrage. The deadlock resulted in Parliament functioning only seven of the twenty days of the session. The story did not end here. The country had been a witness to several national level scams by the public officials. In recent times, NiravModi and his uncle were declared as 'fugitive economic offenders' in December, 2019, and were accused of committing a Rs 14,000 crore scam by obtaining credit facilities fraudulently from the PNB (Central Vigilance Commission, 2021). Laconically, The Reserve Bank of India in its annual report for the year 2019-20 revealed that Bank frauds in value terms involving an amount of Rs 1 lakh and above, have more than doubled in 2019-20 to Rs 1.85 trillion from Rs 71,543 crore in 2018-19 witnessing an increase of 159 per cent. In volume terms, however, the total fraud cases have jumped 28 per cent to 8,707 in 2019-20 from 6,799 in 2018-19 (Reserve Bank of India, 2020). Other recent surveys also reveals that globally corruption has worsened in the last two years. The major scams that have been committed in last five decades seem to be a direct result of deficit in governance by our corrupt politicians and bureaucrats. Following is a list of recent financial scandals committed in India since 2009. As per the estimates of World Bank and RBI, the total monetary worth of scams committed since 1992 in India is estimated to be one lakh billion. There must have also taken place other scandals probably of smaller magnitude but have gone unnoticed. Table 2. Latest Financial Scams (INR in Crores) YEAR SCAM 2009 2009 2010 2010 2010 2010 2011 2012 2016 2018 Satyam Scam 2G Spectrum Scam Illegal Money in Swiss Bank Orissa Mine Scam IPL Scam Commonwealth Games Scam Reddy Brothers Illegal Mining Scam Colgate Scam Vijay Mallya NiravModi PNB Bank Fraud Quantum of Money Involved 14,000 1,76,000 71,00,000 7,000 1700 70, 000 16,085 1,86,000 9,000 11,400 Source: Compiled from different sources like CVC Annual Report 2021, dnaindia.com and finance.yahoo.com 36 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 VI. CORRUPTION: CHALLENGES ISSUES AND In recent times, the government has demonstrated a strong commitment to fight against corruption and a willingness to collaborate with the counterparts from other jurisdiction to combat the problem. In a similar context, India’s anti-corruption laws in recent times have undergone a significant shift, with the existing government taking a hard stance. In order to bring a sea change to anti-corruption landscape, several laws including the Lokpal and Lokayuta Act, 2013 have been enacted to investigate and prosecute cases of corruption against public officials. However, despite adequate laws to fight corruption in the public sector, it is still one of the biggest menaces Indian society must deal with. In its fight against corruption, the Indian criminal justice system has faced numerous problems and challenges, some of which are listed below 6.1 Lack of Competent Leadership and Management Departments are in disarray due to lack of skilled leadership and poor organisation. As a result, there is a lack of coordination and control between departments and organisational levels. Corruption is a result of this unrestrained and unmanaged government. The appointment of incompetent and incapable managers and executives at various levels of the hierarchy also contributes to mismanagement. As a result, the only cause of erroneous appointments is corruption, which promotes corruption. 6.2 Socio Economic Gap When comparing India and the countries surrounding it on the index to the top 10 (least corrupt) countries, it becomes clear that the former group contains countries with significant socio economic inequalities, while the latter group contains countries with a high degree of social and economic justice. In this regard, Singapore ranks in the top ten least corrupt countries among European and European-settler countries. To be more specific, corruption is proportional to a country's socio-economic divide. In a similar vein, as alluded by Khair (2019), cultural and historical variables also influence the socio economic gap, the higher the socio-economic differences, the greater the temptation to commit fraud. For instance, in a country where a bribe of Rs. 5000 is little to the wealthy, it is simple for the wealthy to provide such a bribe. However, if a poor man's monthly income in the same country is Rs.5000, it is difficult for him to resist a bribe of that amount. This results in a progressive loss of morality and ethics on both sides: some people find it simple to spend money to get things done, while others find it difficult to refuse that money. On both sides, there is a growing sense of disdain for the system and for one another. Because of such individual acts of corruption, the system is considered as fully corrupt. ISBN: 978-93-5619-947-7 6.3 Inherent Delays in the Criminal Justice System Certain government authorities in India work persistently to eliminate corruption. A number of anticorruption laws are also in place. Some personnel from these agencies fall prey to the lure of illegal commissions, allowing corrupt people to go unpunished. The criminal justice system has become unbearably slow, and punishments are not being administered promptly enough. The involved authorities frequently take a long time to provide authorisation for a prosecution after receiving reports from the investigating agency. Moreover, permission is denied on political or other reasons in some situations. 6.4 Lack of Values Corruption has become accepted in the social psychology and behaviour of modern India. Bribery, nepotism, and favouritism are examples of social evils that have become accepted in society. People frequently contact someone they know for favours that they are not legally entitled to. Jumping traffic lights or lines, or receiving benefits owing to no fault of one's own, has become part of the societal ethos. In Indian society, a person who has amassed fortune through unethical means is frequently granted the same, if not better, prestige as a person of brilliance. In the end, the corrupt politician or corrupt administrator is a public construct and a concrete representation of the mentally corrupt men on the street, whose approbation allows corruption to grow with impunity. It's no wonder, then, that corrupt political figures occasionally stride majestically to the court and welcome their fans as if they were receiving a prize for public service. 6.5 Hostile witnesses The prosecution must establish its case beyond a reasonable doubt in order to convict a corrupt public official. According to the Indian Evidence Act Amendment 2020, governing evidence in India, this is a stringent legal necessity. Even in circumstances of corruption, there is no exception to this rule. To prove its case beyond a reasonable doubt, the prosecution has to depend extensively on witness evidence. Witnesses, on the other hand, frequently refuse to support the prosecution case due to the other side's influence, allurement, and intimidation. There is no witness protection mechanism in place, and there are no measures for swift and efficient action against hostile witnesses. As a result, witnesses are frequently uncooperative, spoiling the prosecution's case. 6.6 Poor Economic Stability In India, the economic crises marked with high inflation rates are major causes of corruption resulting in 37 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 job losses and a shift in people's lifestyles. It instils a sense of insecurity in the minds of the public, particularly the impoverished. Most people are unable to cope with this dreadful condition, and in order to stay employed and maintain a respectable quality of living; they resort to illegal and immoral acts. They also refuse to work hard again and instead take a variety of irregular shortcuts to achieve their objectives. VII. TACKING THE MENACE OF CORRUPTION: THE WAY FORWARD Many people think that only government has responsibility for eliminating corruption and often blame government. Given the level of corruption and the existing framework in India, it is very clear that government alone cannot stop corruption. Corruption can never be removed or even decreased if the general public and civil society institutions remain apathetic and hopeless in their fight against it. As a result, it is the responsibility and duty of every Indian to fight against corruption and take steps to promote honesty and integrity. India's citizens must encourage excellence and educate their children the true meaning of success. People in the 21st century ought to use knowledge and established mechanisms to combat corruption. They should also use media and technology to reach millions of people in a matter of seconds. The following steps will go a long way in strengthening governance, reducing corruption and building confidence of ordinary people in the system. 7.1 Political Commitment Despite having elaborate and multi-layered apparatus to control corruption, India is hardly making any progress to curb corruption owing to the fact of lack of political commitment on the part of political leadership. The institutional measures which are put in place to combat corruption can be useful only if correctives come from the political class which is the final legislative and executive authority in a parliamentary democracy. Politicians must first address corruption inside their own ranks by establishing and implementing parliamentary code of conduct. Political parties have become a possible source of corruption in many systems, compromising the legitimacy and integrity of political parties' democracy. In a similar vein, Parliamentarians must also follow ethical guidelines, which include ethical frameworks that cover everything from conflicts of interest to voting. 7.2 Simplification of Processes and Procedures To reduce or curb corruption, it is necessary to eliminate delays. In this context, it is essential that office procedures and the procedure for disciplinary proceedings ISBN: 978-93-5619-947-7 needs much simplification. In the current system, official files are passed through numerous offices before a decision is made. Therefore, a transparent and straightforward decision-making pattern must be developed to ease office procedures. The mechanism for 'vigilance clearance' should be clearly specified in circumstances of promotion. To weed out the corrupt, the recent ruling issued by Jammu and Kashmir Civil Service Regulations under Regulation 226 (2) reading the Government to retire a Government servant at any time after he has completed 22 years of service or attained the age of 48 years in public interest. This power is exercised by the Govt. to remove such government servants, who are considered as deadwood, inefficient are of doubtful integrity and considered to be corrupt. Hence, the individuals whose performance is not up to par and who are involved in any act of nepotism, favouritism, or corruption can retire after 48 years should be applied in letter and spirit. Latest management techniques and methods need to be incorporated into the functioning of all public services and public sector projects so that their efficiency and productivity must be in synchronization with their social obligation. 7.3 Role of Judiciary When we consider how to improve democratic corruption control, we frequently focus on reforms in accountability institutions. The recent literature indicates that, at the current stage of reform and democratization around the globe, accountability institutions must undergo a strengthening process in order to improve economic performance, promote fiscal responsibility and fight corruption (SIAVELIS, 2000). In this context, the judiciary has a pivotal role in combating corruption. In order to ensure that political and administrative power is used only in accordance with the law, officers involved in wrong doing or misuse of authority should be held accountable. To be more specific, one of the ways that the judiciary can win in the fight against corruption is by showing impartiality, integrity equality, competence and diligence in the dispensation of justice. The judiciary must appear to be both independent and reliant. Judges should rule in accordance with the law in all matters before them. Judges should make decisions based on the evidence and the rule of law and being independent of their personal biases and other external factors. Examples of countries like Kenya and China where courts can impose the maximum allowable sentence and where people found guilty of corruption are described as “greedy” and “contemptuous of rules and laws” should be expeditiously followed while dealing with corruption cases in India. More importantly, to address this acute problem of corruption, judicial vacancies pilling since years need to be filled up urgently and appropriate premises and support staff must be provided to ensure undue delay in social justice. 38 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 7.4 Civil Participation 7.8 Watch Dog Agencies The Right to Information Act, 2005 permits Indian residents to request government information, which must be made available to the public unless it is a confidential piece of information. People will respond and extend their full participation in resolving this issue if they are convinced that there is a strong attempt to protest against corrupt politicians. Corruption no matter how deep-seated can be successfully uprooted through public participation and awareness. No doubt, individual actions can help to get rid of corruption; however, if the problem is to be tackled at its root, people's participation is essential. To address this issue, the central government must collaborate and work together with civil society and media to achieve a corruption-free India. When the political milieu is filled with honest individuals and civil personnel are free from governmental intervention, watchdog agencies like the Central Vigilance Commission (CVC) and the Central Bureau of Investigation (CBI) can thrive. Otherwise, organisations like the CVC will be of no service or will be misused for political benefit. To improve the CBI's efficacy, it should be separated from the police and constituted as a separate entity committed entirely to fighting corruption. The Indian Constitution should be modified to allow the CBI to probe corruption charges at the state level without the agreement of the state's chief minister. 7.5 Inclusion of private Sector under Anti-Corruption Laws As pointed out by Berkeley Busssell, that technology’s most important contribution has been granting citizens greater access to information. Therefore, in this regard, some combination of administrative reforms and local-level technology initiatives can be taken up to help bring corruption to light. For example, digital devices like CCTV cameras and e-recorders must be put at government offices where bribes are frequently taken and given. People may also take the initiative to use their phones to record any corrupt practises in their neighbourhood and the same needs to be shared with the local police station. In addition to the ongoing initiatives, the following steps can go a long way in strengthening governance and building corruption free society: Money stashed in the Swiss banks is enormous – of the size of USD 19 – 20 trillion. Not taking immediate steps to bring this money back into the country is unpardonable. If brought back, this money can be optimally utilised to uplift the poor Indian community and can also be put to use for infrastructure and other developmental works of the country. Corruption needs to be nailed at the bottom level every day. New leadership against corruption needs to be built. Experience with e-governance in the state of Bihar, which has helped achieve impressive improvements in the delivery of public services is a great example of how things can be done correctly. Education from early stages is needed to help people and society to unshackle them from the mind-set that accepts and feeds corruption. Similarly, Public education will be an integral part of any effort to deepen the rule of law, and to improve transparency and accountability. Government officials across the entire public service sector should be better paid to reduce the incidences of bribe taking. In India the Prevention of Corruption Act 1988 is the landmark law which deals with offences relating to corruption. The law was essentially enacted to take care of corruption cases in the public sector and by public servants which is only one part of the issue. However, bribery is also rampant in the private sector. To be more specific, the problem of corruption in the private sector is increasing at an alarming rate owing to its great expansion after the liberalisation of the economy in early 1990s. The Prevention of Bribery in Private Sector Bill 2018, which seeks to provide a legislative framework to resolve the issue of corruption in private sector needs to be implemented in letter and spirit. 7.6 Monitoring and Evaluation Without independent outsider’s monitoring, some international, regional and local anticorruption action plans can easily become as an additional paper work or a lip service and can hardly make any real differences. Monitoring and evaluation of the performance of anticorruption agencies are also one of important roles of anticorruption CSOs. To combat corruption and to yield positive results, the civil society organizations must take steps in formulating and implementing anti-corruption strategies. 7.7 System Based Policy Driven Governance In order to transform the entire ecosystem of public services through the use of information technology, a strong electronic ID system needs to be devised. The Digital India campaign aimed to streamline existing schemes should be expedisously implemented which would allow poor citizens to avoid intermediaries and receive aid directly through a bank account. In order to allow for greater transparency, everything ranging from land records to death certificate and from contract biding to grievance redressal mechanism needs to be digitalised. ISBN: 978-93-5619-947-7 7.9 Use of Technology VIII. RESULT AND DISCUSSION A plethora of literature has revealed that corruption is an obstacle to the development of democracies and the 39 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 rule of law, thereby affecting the political leadership and institutional legitimacy. It also erodes the fabric of society by generating environments that foster the violation of human rights. In a similar vein, corruption is a threat to good governance. The authors identified various obstacles while researching the issues and challenges that India faces in the battle against corruption. These encompass socio-economic disparities, intrinsic delays in the criminal justice system, hostile witnesses, weak economic stability, and so on. However, the key challenge confronting India is that of lack of competent leadership and management which appears to be a leading cause of corruption. Furthermore, inadequate economic stability, particularly in the setting of limited fiscal resources creates a sense of uneasiness in the minds of the public, encouraging them to engage in illegal and immoral behaviour, which breeds corruption. judiciary both independent and reliant. In other words, judiciary can fight against corruption by exhibiting impartiality, equality and diligence in the dispensation of the justice. Besides, central government need to collaborate and work together with civil society and media to combat corruption practices prevailing in government offices. Moreover, system based policy driven governance practices need to be devised to allow poor citizens to avoid intermediaries in terms of receiving benefits under different government schemes. REFERENCE [1] [2] [3] To ensure a corruption free society, corruption should not only be viewed as a principal-agent but also as a collective action problem. To this end, the government should strengthen and empower anti-corruption agencies as well as monitor and evaluate their performance to improve their efficacy in the fight against corruption. Moreover, corrupt individuals, corrupt politicians, corrupt executives, and corrupt judges, who are currently receiving the most attention should be socially boycotted and blacklisted. They should not be permitted to serve in our holy, self-governing nation. This will help in establishing good governance and as such, the general public will enjoy the taste of life, freedom, and independence and India will continue to flourish and transform into a developed nation. All these desired changes can be achieved by establishing strong legislation with serious penalties and enforcing it properly. Countries like Kenya and China can be seen as a watershed in the resolve of the international community to fight corruption. IX. CONCLUSION Corruption poses a great threat to the economic and political setup of any nation. This paper is an attempt to delve into the challenges faced by our country in the fight against corruption and suggests anti-corruption strategies to be devised and implemented by policy makers and civil society organisations to achieve a corruption free India. Among the key challenges faced by India are a lack of competent leadership and management, inherent delays in criminal justice system, hostile witnesses marked with lack of values, weak economic stability and so on. To fight against this menace, the authors suggest anticorruption measures in terms of simplifying office procedures for disciplinary proceedings and making ISBN: 978-93-5619-947-7 [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] Abdulraheem, A. (2009). Corruption in India: An Overview (causes, consequences and remedial measures). Social Action. 59(3). Anderson, C.W. (1979). The place of principles in policy analysis. The American political science review.73 (3): 711-723. Agarwal, O. P., & Somanathan, T. V. (2005). Public policy making in India: Issues and remedies. New Delhi, India. Centre for Policy Research occasional paper. Bullock, H., Mountford, J., & Stanley, R. (2001). Better policymaking. The centre for management and policy studies Landon. 179 Bhattacharya, M. (2013). New Horizons of Public Administration. New Delhi: Jawahar Publishers and Distributors. 1-416 Ernst & young Survey. (2013). Bribery and Corruption: ground reality in India. A survey by EY’s fraud investigation and dispute services practice. Central Vigilance Commission (2021). Annual Report on Corruption. Fischer, F. (1998). Beyond empiricism: policy enquiry in post positivist perspective. Policy studies journal. 26(1): 129-146. Handbook of Statistics on the Indian Economy, Reserve Bank of India. Time series publications. http://www.dbie. rbi.org.in/ DBIE/ dbie.rbi, 02 April 2022 Hjelt, M. et al. (2008). Major challenges for the governance of national research and innovation policies in small European countries. VISION ERA. 01-66. Kanukeri, U. (2015). Corruption in India. International Journal of Multidisciplinary Research. 01(05). Kundu, M. (2015). Some Aspects of Corruption in India. International Journal of Scientific and Research Publications. 05(12). Ministry of Finance (2012). White Paper on Black Money, Ministry of Finance, Government of India. Reserve Bank of India (2020). Annual Report of Reserve bank of India. Singh, B.K. (2008). The challenge of good governance in India: need for innovative approaches. Paper circulated at Second International conference of the global network of global innovators, Harva Universityity, Cambridge, Massachusetts, USA, March 31April 02. Sheng, Y. K., Carrillo-Rodriguez, J., Eun-Young, L., et al. (2007). Access to basic services for the poor: the importance of good governance. Environment and Urbanisation. 23(5): 22-34. Sundararajan, V. & Thakur, S. (1980). Public investment, crowding out and growth: a dynamic model applied to india and Korea. IMF staff papers. 27(4), 814-855. Tummala, K. K. (2009). Combating corruption: lessons out of India.International Public Management Review.10 (1). 40 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 The Challenges Managers Have to Face in Making Ethical Decisions in Banking Industry Dr. Manjit Kour Associate Professor,University school of Business,Chandigarh University, Gharuan, Punjab Abstract: Banks are considered very crucial in the development and growth of the economy of a country. In today’s highly competitive world every business faces competition and challenges; the banking sector is also not spared. Banks nowadays have to face various challenges due to globalization, digitization, dynamic economic policies, and cutthroat competition. It is also becoming challenging for banks to maintain an ethical culture. The present paper is a modest attempt to uncover the challenges faced by bank managers in making ethical decisions. A questionnaire was prepared and was administered to 240 managers working in public and private banks in Punjab, India. Main challenges are first identified and then their ranking of challenges faced by Managers is established by using the Friedman test. It was found that the main challenge managers face is the pressure they feel in the organization itself that makes it difficult for them to behave ethically. It can be said on basis of this study that bank managers resort to unethical practices mainly due to external factors of the work environment. decisions. In a broader viewpoint, an ethical bank must have a policy that takes into consideration all those issues that pose challenges to bank managers and make sure that they can handle ethical dilemmas and promote ethical decision making. This paper tries to highlight some of the major challenges faced by bank managers while making ethical decisions in daily operations. The current study is an attempt to answer mainly the following research questions: Keywords: Ethical challenges, Ethical dilemma, Work pressure. II. LITERATURE REVIEW I. INTRODUCTION Various unethical practices have been observed at the managerial level in banks. Ermongkonchai (2010) observed that in a managerial position, the employee feels various pressures to prove themselves as per job expectations, like meeting sales targets, working under a budget, completing tasks on time. The Banks are the main participants of the financial system in any country. Banks are the backbone of the economy of a country and the main factor for the growth and development of a country. They are one of the essential financial pillars of every economy and play a crucial role in its functioning (Borah & Barua, 2018). It is essential for the economic advancement of a country as it plays a pivotal role in financing supplies of trade; industry and agriculture with a higher degree of responsibility and commitment. Hence, the progress of a country is directly dependent on the development of banking (Hassan, at al., 2019). Economic development and financial stability have a precondition that there exists a culture of impartiality, ethical standards, and financial transparency in the banks globally. Banks have yet often been found indulging in unprofessional and unethical practices (Abbas, et al., 2019). In the context of the growing international and global challenges, the banking sector as well as the other sectors of the economy has to face an intensely competitive environment (Echchabi & Olaniyi, 2012). The challenges that the banking industry has to face are numerous and complex but in this paper, an attempt is made to explore challenges faced by managers while making ethical ISBN: 978-93-5619-947-7 RQ1. Is there any difference in the challenges faced by bank managers in making ethical decisions? RQ2. What are the main challenges faced by bank managers in making ethical decisions? The remaining of the paper is organized as follows: the second section covers literature review; the third section will discuss methodology, the fourth and fifth sections will discuss the analysis and conclusion, respectively. All these pressures may become a reason for the unethical behaviour of an employee. A study conducted by the Human Resource Institute (HRI) using 1121 managers and Human Resource experts as participants, discovered that the most important reason for unethical corporate behaviour was “pressure to meet unrealistic business objectives and deadlines.” The study found that job demands cause employees to adopt unethical behaviours that include covering up incidents, compromise on quality control, and lying to customers. Ignorance was found to be another major cause of unethical behaviours (Omolewu, 2008). Madrick (2002) stated that the rising corporate scandals are the direct upshot of greed. The professionals such as managers, lawyers, investment bankers lie to make more money. It‟s also observed about the banking industry by Mittal et al. (2014) that if a customer is financially sound, 41 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 maintains a good bank balance, that customer will always get a warm welcome and all the kind of services will be provided to him on his doorstep promptly, whereas if a customer is not financially sound, nobody will bother to look towards that customer and resolve his issues. It is supported with evidence that companies having good relationships with banks are less likely to pledge collateral and have to pay lower interest rates (Berger and Udell, 1995). Basu (2003) stated in his study that the fundamental reasons for the bank failures are extreme competition, noncompliance with the credit standard requirements, and absence of deposit insurance scheme. It has been observed that banks can be biased sometimes in granting loans to their customers. This biasness can be due to lobbying by customers, a long relationship with a customer, or any other reason. After going through the previous studies, it is noted that none of them has addressed the issue of challenges faced by managers in the banking sector. This study is an attempt to use the Friedman test to rank challenges faced by bank managers in the banking sector in India. Hence, the study makes the following hypothesis: Ho. There is no significant difference in the ranking of challenges faced by bank managers in India. questionnaire was made on a five-point Like rt scale. It was also discussed with other experts in the research field. The first weighted average score was used to rate challenges faced by managers in banking in making ethical decisions. The same was then confirmed by applying the Friedman test. IV. ANALYSIS Table 1 shows the demographic profile of respondents. It is observed that out of 240 respondents, 67% were male and 33% were females, which points that majority of managers in banks are males. As per Table 1, the age-wise distribution of respondents is somewhat evenly distributed. 52% of respondents were from the public sector and 48% respondents were from the private sector, so we can infer that both public and private sector were equally represented in the study. Table 1: Demographic profile of respondents Catego ries Frequency Percentage Male Female 160 80 67% 33% Less than 30 yrs 30-35 yrs 24 48 10% 20% 35-40 yrs 58 24% Gender III. RESEARCH METHODOLOGY Primary and secondary data both were utilized for this study. The secondary data was obtained from journals, newspapers, and magazines. For primary data, the universe of the study consisted of all public and private sector banks operating in Punjab. This study had been restricted to he managers working at middle and senior management levels only. A sample of 240 managers of public and private banking sectors was selected for this study by the random sampling method. To find the main challenges faced by bank managers in making ethical decisions a questionnaire was developed. As the researcher was not able to find any such previous study, so questionnaire was formed on basis of limited related literature available on the topic and the basis of personal interaction with bank managers. The Type 40-45 yrs 67 28% Age Above 45 yrs 41 17% Sector Public Private 125 115 52% 48% After literature review and interview with managers‟ five main challenges were found to be pain Weighted Average Scores (WAS) for each statement were calculated by allocating the weights 1, 2, 3, 4, 5 to the responses „strongly disagree‟, ‟disagree‟, „neutral‟, „agree‟ and „strongly agree‟ in that order. Responses with respect to simple frequencies, percentage values, and WAS are shown in table 2. Table 2: Weighted Average Scores for Challenges faced by Bank Managers Code EC1 EC2 EC3 Statements Do you feel pressure personally within your organization to engage in what you perceive to be unethical behavior? Do you feel pressure to compromise your organization‟s standard of ethical conduct? SD 8 (2.9%) D 100 (36.5%) N 58 (21.2%) A 104 (38.0%) SA 4 (1.5%) WAS 2.99 12 (4.4%) 135 (49.3%) 81 (29.6%) 44 (16.1%) 2 (0.7%) 2.59 Do you use your client information for targeting them for other products also? 2.6 (9.5%) 76 (27.7%) 80 (29.2%) 84 (30.7%) 8 (2.9%) 2.90 ISBN: 978-93-5619-947-7 42 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 EC4 Do you make undeliverable claims to your clients to increase sale of your products? 44 (16.1%) 100 (36.5%) 88 (32.1%) 42 (15.3%) 0 (0%) 2.47 EC5 While approving loans do you have to favor some clients over others due to their strong contacts 20 (7.3%) 81 (29.6%) 73 (26.6%) 100 (36.5%) 0 (0%) 2.92 As observed from Table 2 most of the respondents (39.5%) have shown agreement with the statement EC1' Do you feel pressure personally within your organization to engage in what you perceive to be unethical behavior?‟ (WAS-2.99). This has been followed by statement EC5 „While approving loans do you have to favor some clients over others due to their strong contacts‟ (WAS-2.92); statement EC3 „Do you use your client information for targeting them for other products also?‟ (WAS-2.90); statement EC2 „Do you feel pressure to compromise your organization‟s standard of ethical conduct?‟ (WAS2.59) and statement EC$ „Do you make undeliverable claims to your clients to increase the sale of your products?‟ (WAS-2.47). Table 3 shows the rank allotted to each challenge based on the responses of bank managers. Friedman's Test was applied to calculate the mean rank. The result found was that there was a statistically significant difference in the challenges faced by the respondents (χ2 = 763.65 , p = 0.012) The ranks were allotted to each challenge on the basis of the total Table 3: Rank Analysis of the Challenges faced by Bank Managers Challenges Mean SD Pressure personally felt by managers within organization to engage in what they perceive to be unethical behaviour. 4.78 Favouring of some clients over others due to their strong contacts while approving loans. Using client information for targeting them for other products also. Pressure to compromise their organization‟s standard of ethical conduct. Making undeliverable claims to clients to increase sale of products. Score which have been calculated by adding up all the score allotted to each challenge by all the respondents from 1 to 5. The above analysis reveals that the main challenges faced by managers in order of their importance, presented in this study are: Pressure is personally felt by managers within an organization to engage in what they perceive to be unethical behavior. Favoring of some clients over others due to their strong contacts while approving loans. Using client information for targeting them for other products also. Pressure to compromise their organization‟s standard of ethical conduct. Making undeliverable claims to clients to increase the sale of products. ISBN: 978-93-5619-947-7 .856 Mean rank 4.87 Importance rank 1 4.69 .744 4.66 2 4.66 .903 3.19 3 4.33 1.156 3.01 4 4.11 1.061 2.89 5 IV. CONCLUSION It is observed that the main challenge faced by managers in taking ethical decisions is the pressure they feel in the organization itself that makes it difficult for them to behave ethically. This pressure within the organization can be due to pressure to meet job expectations, to meet targets, to meet deadlines, to get more business, or to face competition. Similar results were observed by Ermong konchai (2010) where he discovered that the employee feels various pressures to meet job expectations, like performing correct budget expenditures, meeting sales targets, conducting activities on time. These pressures may become a reason for unethical conduct by an employee. Similar results were found by a study conducted by the Human Resource Institute where it was found that the 43 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 main cause of unethical corporate behaviour was pressure to meet impractical business objectives and deadlines. Another main challenge faced by managers in being ethical was that they have to favour some clients over others due to their strong contacts while approving loans. This highlights the rampant favouritism in the disbursement of loans in banks. The same was also highlighted by Berger and Udell (1995). The same fact has been highlighted by recent bank scams in India (e.g., Nirav Modi scam where lobbying was done to get big loans without a credit check or guarantee. The next challenge faced by managers in taking the ethical decision was when they have to use their customer database for selling other products also. It is one of the strategies of most businesses to use their customer base to sell new products. But it can be unethical also as it means using the trust and confidence of customers for increasing the sale of new products. It is unethical in the sense that it is also a form of manipulation of customers. The least factor they find challenging in making ethical decisions is that they have to make undeliverable claims to their customers. [4] Borah, N. and Barua, M., 2018. Antecedents of Engagement: Banking Sector. SCMS Journal of Indian Management, 15(2), pp.13-22. [5] Ermongkonchai, P. 2010. Understanding Reasons for Employee Unethical Conduct in Thai Organizations: A Qualitative Inquiry, Contemporary Management Research, 6(2), pp: 125-140. [6] Echchabi, A., and Olaniyi, O. N. 2012. Malaysian consumers' preferences for Islamic banking attributes, International Journal of Social Economics, 39(11), pp: 859 – 874 [7] Hassan, B. A., Hassan, H. A., Abosede, A. J., & Ogunkoya, O. A. (2019). CENTRALIZATION AND BUSINESS ETHICS IN NIGERIA DEPOSIT MONEY BANKS. Management & Marketing Journal, 17(2). [8] Madrick, J. 2002. Enron: Seduction and betrayal, The New York Review of Books, 21–24) [9] Mittal, S., Saxena, A., and Matta, M. G. 2014. Ethical Issues in Service Marketing (With special reference of banking industry), Global Journal of Finance and Management, 6(2), pp: 179-184. [10] Omolewu, G. 2008. Strategies for Improving Ethical Behaviors in Organizations, from website http://forumonpublicpolicy. com/archivespring08/omolewu.pdf assessed on 12/06/2015. The findings that the managers find this point to be least challenging throws light on the standard of ethics in banks. It means they don‟t feel much hesitation in making such claims to their customers and they feel it is part of doing business to do so. It can be said on basis of this study that bank managers resort to unethical practices mainly due to external factors of the work environment. V. IMPLICATIONS OF THE STUDY This study is of importance to the management of banks, policymakers, and the training department. Top management should set realistic goals for bank managers and deadlines should be set attainable. Undue pressure should not be put on managers as this will only lead to a surge of unethical practices in banks. Lobbying to get big loans without a proper credit check and guarantee should not be entertained in any way. Strict and punitive action should be taken against customers who resort to such practices. There should be proper training and counselling sessions designed to address such situations in banks and prepare managers to face such situations ethically. REFERENCES [1] [2] [3] Abbas, A., Nisar, Q.A., Mahmood, M.A.H., Chenini, A. and Zubair, A., 2019. The role of Islamic marketing ethics towards customer satisfaction. Journal of Islamic Marketing. Basu, S. 2010, Why do Banks Fail? , International Review of Applied Economics, 17(3), pp: 231-248. Berger, A., and Udell, G. 1995. Relationship lending and lines of credit in small firm finance, The Journal of Business, 68(3), pp: 351-81. ISBN: 978-93-5619-947-7 44 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 IoT Based Solutions for Monitoring of Landslides and Slope Failures Dr Guntha Karthik Associate Professor, ECE Department, Stanley College of Engineering and Technology for Women (Autonomous), Hyderabad, Telangana Abstract: Slope failure and Landslides result in several deaths and property losses. Natural disasters, such as landslides and slope failures, result in numerous fatalities and economic losses each year. This significant issue prompted the development of an early warning system to reduce accidents, failures, and financial losses. The majority of studies on real-time early warning systems have focused on forecasting unstable locations; however studies on predicting slope failure occurrence using real-time slope displacement monitoring systems are still lacking and require more investigation. A three-dimensional displacement sensor, a rain sensor, and a Soil Moisture sensor, as well as an Internet of Things (IoT), were coupled in this paper to monitor slope failure using cutting experiments on a real-scale model slope. The slope movement was monitored in real time in the lab using an integrated low-cost, efficient, and simple-to-use IoT system. The data was analyzed and the results were explained based on the collected displacement data. This work can be further extended by implementing in various fields and different industrial application where slope failures are the part of production process. The internet-based approach is the mines can remotely monitor the communications links and other systems within the mine. This paper focused on the application of IoT works dealing with the elimination of manual monitoring in the mining industry with the help of smart sensors. The IoT based systems can measure and record the different factors in mine, not only automatically making available the data but also alerting mine workers via email, telephone, text message, alarm, or pager. waste materials and their dumping have also commensurately become very high, thereby the risks of failure of the slope as well as dump, have increased massively[1,2].With more and more severe environmental damage control regimes and no availability of alternative lands for afforestation purposes, these risks have assumed very complex proportions. Under such situations with most production areas concentrated close to the excavation floor, there is a potential threat to cause catastrophic loss of human life and property. In order to overcome this, efficient and economically feasible measurement systems are needed. This paper is focused on the application of electronics and communication to eliminate the manual monitoring, and with the help of Wireless Network Infrastructure to replace the need for physical cables (Figure.1) Keywords: Slope Monitoring, Internet of Things, Ground Vibrations, Opencast mines. I. INTRODUCTION Surface mining is one of the most common and ancient ways of removing minerals from the Earth. It is the other way of underground mining, in which the overlying rock is left behind, and the required mineral deposits are removed through shafts or tunnels. Surface mining is basically employed when deposits of commercially viable minerals or rock are found closer to the surface; that is, where overstrain is relatively very less or the material of interest is structurally unsuitable for heavy handling or tunneling. Surface mines are naturally extended until either the valuable deposit is exhausted, or the cost of decresting larger volumes of overburden makes further mining an uneconomic option to shoulder. The fast increase in the production of various minerals may largely be attributed to a fast raise in opencast mining activities and intensified mechanization, which is resulting in a rapid increase in the depth of the opencast mines day by day. As an obvious and direct consequence, the production of ISBN: 978-93-5619-947-7 Fig.1: Geometry of opencast mine II. TDR BASED WIRELESS SYSTEM FOR SLOPE MONITORING Time Domain Reflectometry is a technology that has its roots back in the 1930s with the development of radar and later in the 1950s to locate cable faults in the telecommunication industry. In the 1970s, TDR began to be applied to the fields of geotechnical engineering and geology to detect earth and rock movement and locate where this movement was occurring .This is a technique used in the electrical power industry, by computer networks and the telecommunications industry for locating faults in inaccessible cables. The basic principal is to inject an electrical pulse into a cable and observe the reflected 45 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 echo. Knowing the pulse velocity and by measuring the time for the reflected signal to return it is possible to calculate the position of the reflecting surface (fault).Figure 2 shows the basic components and principle of TDR . The shape of the reflected pulse can also give information as to the type of fault, for example, short or open circuit. Similarly, light pulses can be used for the same purpose using an optical transmission system and optical fibers. The basic principle of TDR is similar to that of radar. In TDR, a cable tester sends a pulse voltage waveform down a cable grouted in a borehole. If the pulse encounters a change in the characteristic impedance of the cable, it is reflected [3,4]. This can be caused by a crimp, a kink, the presence of water, or a break in the cable. The cable tester compares the returned pulse with the emitted pulse and determines the RC of the cable at that point. monitoring data for the comparative analysis of the developed system and the conventional system. Fig.3: The method for the installation of the cables III. Fig.2: Basic components and principle of TDR TDR100 is connected to master node which is integrated in ground control laboratory. The generated real-time data of TDR100 is directly sent to mine office through RF module (master node). Three Locations for the monitoring system were selected, and coaxial cables were installed at that location. All the electronics were placed in a room which is specially constructed near to the cable locations, and power is also available at that location. The power backup was provided for the TDR using Universal Power Supply (UPS). Initially, TDR setup and wireless communication were established, and data were tested using laptop. Finally, laptop was removed with master node for continuous monitoring. Measurements were taken continuously and three no. of TDR monitoring cables that were grouted into drill holes to monitor precursor movement within the rock mass. The TDR measuring system was installed at the footwall benches of Mine, and started operation in August 2017. The permanent indication points for slope stability monitoring using conventional method are constructed at the site at different points(Figure.3). This will provide the slope stability ISBN: 978-93-5619-947-7 IOT BASED SYSTEM LANDSLIDE MONITORING The figure 4 shows the block diagram of the integrated system which we uses a displacement sensor to measure elevation measurements, rain sensor to detect the rain fall and soil moisture sensor to know the presence of water in ground. The data was presented in the Things Speak cloud platform. The recorded values were sent to the cloud through the ESP8266 Wireless Fidelity (Wi-Fi) module. The Hardware requirements are Power supply, Microcontroller (ARM based LPC2148), Displacement sensor, Rain sensor, Soil Moisture sensor, IoT Module and LCD (Liquid Crystal Display). The software requirements are Thing Speak and Keil Fig. 4: Block Diagram of Slope Monitoring System 46 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 3.1. Power supply A power supply is a component that provides power to at least one electrical load. It usually transfers one type of electric power to another, but it can also convert a different type of energy into electricity, such as solar, mechanical, or chemical energy. 3.2. ARM based LPC2148 This microcontroller has 32kB of static Random Access Memory (RAM), which is ideal for storing data or code. It's compatible with 8-bit, 16-bit, and 32-bit computers. P0 & P1 refer to the two input/output ports of the LPC2148 microcontroller. The LPC 2148/66/65/64 is capable of running at Central Processing Unit (CPU) rates of up to a hundred MHz 3.3. Displacement sensor (MEMS): A displacement sensor is a device that detects the quantity of displacement through a spread of elements and converts it into a distance between the sensor and an object. Displacement sensors assess how much a machine's spinning part moves away from its stationary housing. A probe tapped within the machine's frame, just above the surface of a rotating shift, is used in displacement sensors. The main working principle of an accelerometer is that it converts mechanical energy into electrical energy. When a mass is kept on the sensor which is actually just like a spring it starts moving down. Since it is moving down it starts experiencing the acceleration. That acceleration hen gets converted into an amount of electric signal which is used for the measurements of variation in the position of the device. 3.4. Rain sensor A rain sensor is a type of switching device that analyses rainfall to detect it. It functions as a switch, and the functioning rule of this sensor is that anytime it rains, the switch will be normally closed. This sensor is regarded as a water-saving technology, and it is frequently connected to an irrigation system to shut it down in the event of rain. The working of the rain sensor is to detect the presence of water drops on the surface of sensor and we defined it as wet and dry condition. Sensing pad with series of exposed copper traces, together acts as a variable resistor (just like a potentiometer) whose resistance varies according to the amount of water on its surface 3.5. Soil Moisture sensor A soil moisture sensor is a type of sensor that is used to determine the volumetric content of water in the soil. The working of this sensor is frequently accomplished by inserting it into the world, and the status of the water content within the soil is frequently provided in the form of a percentage. This sensor is ideal for experiments in ISBN: 978-93-5619-947-7 science classes such as ecology, agricultural science, biology, soil science, botany, and horticulture, among others. 3.6. IoT module The ESP8266 Wi-Fi Module is a self-contained system on chip (SOC) with an integrated Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack that provides access to your Wi-Fi network to any microcontroller. The ESP8266 may either host an application or offload all Wi-Fi networking functionality to a separate application processor. Each ESP8266 module is pre-programmed with AT command set firmware, which means you can just connect it to your microcontroller device and get nearly the same level of Wi-Fi-ability as a Wi-Fi Shield (right out of the box). The ESP8266 module is a very low-cost board with a large, and rapidly increasing, community. 3.7. LCD (Liquid Crystal Display) We use LCD Module to display interactive messaging. We take a look at a smart LCD display of lines, sixteen characters per line, which is frequently connected to controllers. The display protocol (handshaking) has been established. The data strains are D0 to D7th bit, the control pins are RS, RW, and EN, and the last pins are +5V, -5V, and GND to provide power. The Register Select pin is RS, the Read Write pin is RW, and the Enable pin is EN. 3.8. Speaker Speakers are devices that transform electricity into energy (motion). The energy compresses the air and transforms the motion into sound energy, or the degree of instantaneous Sound Pressure Level (SPL). A magnetic flux is created when an electrical current is sent through a coil of wire. A current is sent through the voice coil in speakers, creating an electrical field that interacts with the magnetic flux of the speaker's static magnet. 3.9. ThingSpeak It's an open-source Internet of Things (IoT) application called ThingSpeak. Using the Hypertext Transfer Protocol (HTTP) and Message Queuing Telemetry Transport (MQTT) protocols through the web or via a local area network, you can store and retrieve data from items. ThingSpeak is a cloud-based IoT analytics tool that allows you to gather, visualize, and analyses live data streams. ThingSpeak visualizes knowledge posted by your gadgets in real time. 3.10. Keil The keil 8051 development tools are meant to help embedded software developers address challenging challenges. This program is an integrated development 47 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 environment (IDE) that includes a text editor, a compiler, and the ability to convert ASCII text files to hex files. IV. METHODOLOGY The figure 5 depicts the methodology of the integrated system within the sort of the flowchart. The systematic steps to achieve our objectives are presented in the form of process flow as given below. In general, there is a tendency of slope failures in mountainous terrain and opencast mines in India. To provide some relief from the current difficulty, we devised a technique in which the accelerometer sensor is used to measure elevation data. The data was presented within the ThingSpeak program since the captured values were transferred to the cloud via the ESP01 Wi-Fi module. The literature survey related to the chosen areas was completed. The objectives are identified and methodology was proposed. Selected the required software and hardware modules for integration of system. Interfaced the rain sensor, soil moisture sensor, accelerometer, IoT module with controller to detect the displacement of sensors. Cloud based Graphical User Interface (GUI) was created to know the status of sensors. Cloud based GUI can be utilized for knowing real-time status of sensors and store the data on cloud. The integrated system was tested in laboratory and output data was observed. MEMS I2C, Rain sensor, and Soil moisture sensor then it continuously checks the MEMS I2C, Rain sensor, and Soil moisture sensor for the MEMS > Threshold value. If the value is yes, the speech IC is triggered, and the data is communicated to the IoT webpage and the data will be reviewed on a regular basis. If the answer is no, the process will be repeated. In case of Yes, the rain sensor and soil moisture sensor are equal to one. The voice IC will be turned on, and data will be sent to the cloud platform. It also checks the data on a regular basis. If the answer is no, the process will be repeated. Fig.6: Algorithm 4.2. Hardware Connection The Figure 7. Represents the Physical integration of sensors, communication modules, Controller and power supply. The soil moisture sensor was connected to, measures the water level whether it is high or low. It will also connect directly to the rain sensor, displacement sensor module, voice IC, and speaker on the microcontroller. Fig. 7: Hardware Physical Connections 4.1. Algorithm V. IOT BASED REAL TIME APPLICATION OF TILT SENSOR The Figure 6.Shows the Principle of integrated system in the form of algorithm. First step is to initialize that the A slope failure is an occurrence in which a slope collapses suddenly due to internal damaged self-retain Fig. 5: Process Flow ISBN: 978-93-5619-947-7 48 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 ability because of geological disturbance in earth crust. Because of this, the people who are working on the slopes are failing to escape before identifying failure. Though it is not achievable to stop the slope failures by this integrated design, this design can give the pre-warning for slope failures[8]. The project aims to capture the slope movements through the accelerometer sensor (Figure.8). The captured readings from the sensor are transferred to server through the integrated system which consists of Sensors, microcontroller (Arduino) and Wi-Fi module (ESP-01 module) which works as communication medium, and it was used to integrate the device to internet. The Received data from the installed integrated system are continuously plotted in an open-source Internet of Things (IoT) service provider displayed through the Thing Speak software. Real time monitoring of terrain surface is one of the challenging research areas. Hence, the paper discusses the development of system that the readings and the system plot about the elevation of the particular objects which is useful for landslide detection. This system uses the accelerometer sensor that senses the movement of the object, an ESP01 which is a Wi-Fi module used to send the recorded data to the cloud, and the ThingSpeak software which is used to visualize the data in the form of graphs and values [9, 10]. The integrated system is useful for the landslide detection and monitoring. The further upgradation of system can be done by installing the integrated system in two or three landslide prone areas. display high; otherwise, it will display low as shown in the table 1. Figure 9. Shows that the output of x and y axis values of the slope angle whether it is high or low is defined in the Graphical manner. Figure 10. Shows that the output of the x and y axis values of Soil Moisture whether it is dry or wet is defined in the Graphical manner. Table 1. Data measured by the Integrated System during Laboratory Investigations in the July & August 2021 event DATE 20/7/2021 22/7/2021 26/7/2021 28/7/2021 30/7/2021 1/8/2021 6/8/2021 SLOPE ANGLE 24.5 20.4 19.3 15.8 28.5 33.9 31.2 RAI N SENSOR Dry Wet Wet Dry Wet Wet Dry SOIL MOISTURE 236 258 269 240 282 296 239 Fig. 9 Graphical Representation of Slope Angle Fig. 8: Hardware connections of integrated system VI. RESULTS As per the Indian director general of mine safety guidelines the stable bench slope angle should maintain 45 degrees. The angle of slope is measured by the displacement sensor in four different ways: less than 45 degrees, more than 45 degrees, and less than 25 degrees, greater than 25 degrees, which is shown on the LCD screen and offers the voice of the angle slope. Rain sensor detects the presence of rain and displays "It's raining" on the LCD screen when it's raining. It also makes the voice seem like it’s raining. The required amount of water indicates the water level; if it is high, the LCD panel will ISBN: 978-93-5619-947-7 Fig. 10: Graphical Representation of Soil Moisture The Figure 11. Represents the status of integrated sensors in the cloud platform. The data and values of the 49 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 slope angle are stored for the displacement sensor by tilting the displacement sensor and two for soil moistures, which indicate if the water level is high or low. One is for the rain sensor, which records data about when it rains and displays the values of these sensors in a graphical manner. studies can be carried out by applying the soft computing techniques and data processing algorithms using signal processing tools like MATrix LABoratory (MATLAB), to forecasting the future failures. This work can be further extended by implementing in various fields and different industrial application where slope failures are the part of production process. The field experimental trial was conducted successfully with integrated TDR system in three locations of a typical opencast metal mine for the period of five months during 1st August 2017 to 27th December 2017. The conventional system of slope behavior monitoring during the above period using total station did not show any significant surface movements. Similarly, the TDR time series also indicated no significant change in initial RC values (0.25 to 0.28) during experimental trial indicating stability of slope and supporting the conventional system of slope behavior monitoring. However, the change in the RC value exceeding 0.332 (as established through laboratory model) can be considered as deformation of about 6 mm in the cable. REFERENCES [1] Fig. 11: Thing Speak output VII. CONCLUSION Slope monitoring is one of the challenging research area. In this paper, we designed the hardware prototype in order to detect the movement by using the accelerometer sensor. The factors effecting the slope failure includes the rain fall, slope movement and presents of water in the ground, the integrated system consists of three different sensors for monitoring the above parameters. The data that was generated by the sensor was successfully transmitted and synchronized with cloud for visualization and accessibility. The designed system was useful at the normal hilly areas and also at the mining areas. This system will also be helpful for the people living at the mountain areas in order to reduce the mortality. The future ISBN: 978-93-5619-947-7 Benson, Craig H, Peter J.B. Time-domain reflectometry (TDR) in geotechnics: a review. Nondestructive and automated testing for soil and rock properties. ASTM International. 1999; 1-10. [2] Brambilla, Davide, Laura L, Monica P. Field and Laboratory Testing of Time Domain Reflectometry Cables for Landslide Monitoring. International Multidisciplinary Scientific GeoConference: SGEM. Surveying Geology & mining Ecology Management. 2015; 2: 329. [3] Karthik, G., Sharma, G., & Jayanthu, S. (2020). IoT-Based RealTime Application of Tilt Sensor for the Pre-warning of Slope Failure—A Laboratory Test. In Energy Systems, Drives and Automations (pp. 339-347). Springer, Singapore. [4] Chang D. T. T, Guo L. L, Yang K. C, Tsai Y. S. Study of Wireless Sensor Network (WSN) using for slope stability monitoring. In Electric Technology and Civil Engineering (ICETCE). 2011; 68776880. [5] Prashanth, R., & Nimaje, D. S. (2019). Development of blastinduced ground vibration wireless monitoring system. [6] Karthik, Guntha, and Singam Jayanthu. "Review on low-cost wireless communication systems for slope stability monitoring in opencast mines." International Journal of Mining and Mineral Engineering 9.1 (2018): 21-31. [7] Jayanthu, S., Guntha Karthik, and P. M. G. Shohood A. "Development of Indigenous Wireless Tiltmeter for Slope Stability Monitoring in Opencast Mines." (2016). [8] Karthik, G., et al. "Utilisation of mobile communication in opencast mines." International Journal of Computer Science and Mobile Computing 3.7 (2014): 373-378. [9] Liu, Jen-Hao, et al. "Developed urban air quality monitoring system based on wireless sensor networks." 2011 Fifth International Conference on Sensing Technology. IEEE, 2011. [10] Postolache, Octavian A., JM Dias Pereira, and PMB Silva Girao. "Smart sensors network for air quality monitoring applications." IEEE Transactions on Instrumentation and Measurement 58.9 (2009): 3253-3262. [11] Guntha Karthik, A.Gopala Sharma, Singam Jayanthu ―IoT Based Real Time Application of Tilt Sensor for the Pre-warning of Slope Failure –A Laboratory Test‖ Published in The book series Lecture Notes in Electrical Engineering. [12] Devendra Kumar Yadava, Guntha Karthik, Singam Jayanthu, ―Studying Time Domain Reflectometry to Predict Slope Failure in Open-Cast Mines‖ Published in Journal of Mining Science, 2020, Vol. 56, No. 5, pp. 760–770. 50 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 A Study on Machine Learning Methodologies for breast Carcinoma Disease Prediction Mr. K. VigneshKumar1, Dr. N. Sumathi2, Dr. S. Ragul3 1 Research Scholar (PhD) / Department of Computer Science, Sri Ramakrishna College of Arts & Science, Coimbatore 2 Head / Department of Information Technology, Sri Ramakrishna College of Arts & Science, Coimbatore, 3 Ortho, Sparsh Hospital- Narayana Hrudhalaya, Bangalore Abstract: The second leading cause of death in women is melanoma. Women with breast cancer will have a better chance of surviving if they can be detected early. The use of machine learning and data mining in the early diagnosis identification of breast cancer has become standard. The goal of this study is to evaluate the influence of machine learning (ML) approaches in the identification and treatment of breast cancer. The majority of these studies used the WEKA tool to identify and predict breast cancer. The majority of the studies considered various classification algorithms for breast cancer prediction, including Decision Tree, Nave Bayes, and Artificial Neural Network. malignant tumour that grows rapidly and worsens with time, eventually causing death [1]. Although females are more likely to have breast cancer, males are less likely to develop it [1, 2]. A tumour might be benign (meaning it isn't harmful to your health) or malignant (meaning it has the potential to cause serious harm) [2]. Breast cancer risk can be increased by factors including age and a genetic history of the disease [2, 8]. Keywords: Breast Cancer, Machine Learning, Data Mining, Classification Algorithms, Clustering Algorithms. I. INTRODUCTION Breast cancer is the leading cause malignancy among women in both developed countries and developing countries. It is also the second leading cause of mortality from cancer in women [1,2]. According to a 2019 WHO report, "it is expected that over 608 000 women died worldwide cancer cases in 2019"[3]. With early detection, however, 98 percent of women might live for six years or longer [1, 2]. In the diagnosis of breast cancer, data and machine computing have been widely applied [4]. Furthermore, medical researchers can use data mining and data mining technologies to find correlations between factors and predict disease outcomes using historical information [4, 5]. Machine learning can be applied to improve breast cancer detection and diagnosis, as well as prevent overtreatment. Also, it could be assistance to accurate decision making [4-7]. Therefore, the aim of this research is to review the role of machine learning and data mining techniques in breast cancer detection and diagnosis. This research is organized as follows; Section II introduces a brief of breast cancer. Section III explains the algorithms and tools of data mining and machine learning used for breast cancer prediction. Section IV summarizes recent studies related to breast cancer diagnosis and prediction. Section V discusses the literature survey. Finally, Section VI concludes the research with a future scope. Figure 1. Breast Cancer [35] 2.2 Types and Stages of Breast Cancer Breast cancer therapy choices are determined by the stage and kind of cancer [9, 10]. Breast cancer is classified based on the state of specific receptors [10]. Figure 2. Stages of Breast Cancer Two types of tumors are identified [2, 10] • Benign: This tumour type is not harmful to the human body and only causes mortality in a small percentage of cases. This form of tumour only grows in one place of the body (spot) and has a restricted growth rate. • Malignant: Breast cancer is a type of tumour that is more deadly and causes human death. Whenever lymphocytes in the chest wall grow improperly, a cancer forms. The most common kinds of breast cancer are: II. BREAST CANCER 2.1 Breast Cancer Breast cancer can develop in the mammary gland, the fatty tissue, or the fibrous tissue. Breast cancer is a ISBN: 978-93-5619-947-7 Ductal Carcinoma in Situ (DCIS): is the earliest form of breast cancer and is curable. Invasive Ductal Carcinoma (IDC): begin in the milk duct and is the most common breast cancer. 51 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Surgery: Breast cancer surgery is divided into two categories. Breast conserving surgeries, often known as a lumpectomy, is the very first surgical procedure performed. The purpose of treatment is to prevent the cancerous area of the breast as well as some healthy tissue around it. The next type of procedure is a mastectomy, which involves the removal of the breast parenchyma. Radiotherapy: It kills cancer cells using gamma radiation Figure 3. Benign and Malignant Invasive Lobular Carcinoma (ILC): start in a lobule of the breast. It has the ability to spread fast to the lymph nodes and other areas of the body. The main stages of breast cancer [9-11] The grade of breast cancer describes the size of the tumour and indicates if it has spread. The following are the primary phases of breast cancer: Grade I: Basic cancer with a tiny tumour (two centimetres or less) that hasn't migrated to lymph nodes. Grade II: There are two stages in this stage: stage IIA and phase IIB. Grade IIA: The cancer has spread to lymph nodes beneath the arm (auxiliary lymph nodes) but is not greater than two cm. OR the cancer has gone to the lymph glands but is only two to five cm long. Grade IIB: The cancer has lead to infections under the arm and has a diameter of two to five centimetres. OR the cancer has developed into cancer under the arm but is not larger than five centimetres. Breast cancer in grades III and IV is referred to as 'Advanced Breast Cancer’. Grade III: The tumours have grown to a larger size. They could have spread to the lymph nodes and the breast tissue around them. Grade IV: Tumours have progressed to other regions of the body, such as the bone and lungs. 2.3 Treatment of breast cancer Patients can sometimes be cured with one or a variety of treatments, depending on the woman's age, type, and stage of the disease. The following are the most common breast pharmacological treatments: [2, 8,] Figure 4. Surgery [36] ISBN: 978-93-5619-947-7 Figure 5. Radiotherapy Chemotherapy: Chemo is a cancer therapy that involves the use of medication to destroy cancer cells. Chemotherapy drugs come in a variety of forms, but they all function in the same way. They block cancer cells from multiplying, preventing them from spreading throughout the body [7]. Figure 6. Chemotherapy [37] Hormone Therapy: Hormones like oestrogen and progesterone can affect certain forms of breast cancer. Breast cancer cells include receptors (proteins) that bind to oestrogen and progesterone, allowing them to proliferate. Hormonal or neuroendocrine therapy is a treatment that prevents hormones from binding to these receptors. Hormone therapy has the ability to reach cancer cells practically anywhere in the body, not just the breast. It's suggested for women who have hormone receptor-positive malignancies. It is ineffective for women whose tumours lack hormone receptors (these tumours are called hormone receptor-negative) [6]. Biological Therapy: Biological therapy is a type of treatment that aids the immune system in fighting cancer. Immunotherapy, Biological Response Modifier (BRM) treatment, and Biotherapy are all terms for the same thing. 52 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Your immune system tries to maintain your body safe from outside invaders like germs and viruses. The immune cells can also aid in the detection and elimination of cancerous cells [7]. algorithms are widely utilised for classification in various fields of research, such as medicine and health difficulties. There are several different types of decision tree algorithms, including ID3 and C4.5. J48, on the other hand, is the most often used decision tree algorithm. J48 is an upgrade of ID3 and is based on an upgraded version of C4.5 [13, 14]. Regression: Regression is a statistical technique that is commonly used to make numerical predictions. Regression analysis, multiple regression, regression models, and weighted regression are all examples of regression. For more intricate data gathering, there are numerous non-linear regression approaches to consider. For classification, any logistic regression, whether linear or nonlinear, can be employed. Figure 7. Hormone Therapy [38] The detection of regional trends based on a given data is also included in regression. Furthermore, regression frequently produces good results in practise. [13,14]. Figure 8. Biological Therapy III. DATA MINING AND MACHINE LEARNING 3.1 Data mining and machine learning Data mining is the method of identifying intriguing, relevant patterns in large data sets to represent knowledge [6, 7]. This knowledge can be used to improve illness decision support, prevention, detection, and treatment [2, 14]. Data mining, which can handle large amounts of data with various qualities, is known as formal technique for finding intriguing patterns in large amounts of data [15]. The goals of data mining include pattern identification, reduction of complexity, and processing time savings [15, 16]. Machine learning technique of improving a program's efficiency without requiring human intervention. [1, 2] Machine learning is divided into two categories: supervised learning and unsupervised learning (2). Choosing a machine learning method is largely determined by the types and structures of the data [17]. 3.2 Data Mining Algorithms There are many algorithms such as Decision Trees, Naïve Bayes, k-means, and Neural Network. They are used for analyzing a huge amount of data. Some popular data mining algorithms are discussed in the following: Decision Tree Algorithms: Successful deep learning classification methods include decision tree algorithms. They are supervised learning approaches that employ information that has been gathered and trimmed in order to enhance outcomes. Furthermore, decision tree ISBN: 978-93-5619-947-7 Multilayer Perception: A simple two neural network without any hidden layers is referred to as a multilayer perceptron. In actuality, a two-layer perceptron (without the input layer) is sufficient. A decision tree has the same substantial power as a multilayer perceptron. For the fundamental classification task, the convolution layer is an accurate predictor. Training a multilayer perceptron is, in fact, very similar to logistic regression. Multilayer perceptrons, on the other hand, have the advantage of being able to learn to disregard unnecessary qualities. On many actual datasets, recent research has shown that convolution layer can match with more current learning algorithms [13, 14]. Association Rules: Association rules are essentially if/then statements that aid in the discovery of connections between seemingly unrelated data. As a result, they can anticipate any of the traits, not only those belonging to a specific class. Indeed, frequent patterns provide association rules, and we can look for strong relationships between frequent patterns to use for categorization. In addition, association rules can be used to analyse and predict patterns of behaviour [13, 14]. Support Vector Machine (SVM): The Support Vector Machine, or SVM, is a popular Supervised Learning technique that may be used to solve both classification and regression issues. However, it is mostly employed in Learning Algorithms for Classification difficulties. [18] Artificial Neural Network (ANN): The Artificial Neural Network (ANN) is a logic model based on how the real brain functions [4, 5]. Over the last few decades, ANN has become a hot topic of research, with an increasing number of scholars using it. It is made up of input, hidden, and output layers that are all interrelated. The data is received by the neural network at the input nodes, which is subsequently processed by a hidden layer, 53 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 which ultimately provides the training effectiveness to the output nodes [4]. In the learning phase, the Network adjusts the weights in order to predict the proper classifier of the input [5]. It also has hundreds of mathematical functions to support multi-paradigm numerical calculations which make it suitable to the computing environment [25, 26]. IV. LITERATURE SURVEY Naïve Bayes (NB): It is a probabilistic classifier and among the most effective classification algorithms [9, 19]. It is based on Bayes' theorem and strong (nave) independent assumptions. Given the class variable, it is assumed that the quantity of the feature is independent of the number of any other features. Based on the most likely scenario. It determines whether a given tuple belongs to a specific class [19]. K-Nearest-Neighbours (KNN) Algorithm: In pattern recognition, it is a simple supervised learning algorithm. Because of its simplicity in design in the area of machine learning, it is among the most used neighbourhood classifiers [20]. The KNN method saves all cases and categorises new ones using similarity measures; it explores the pattern field for the k training dataset that are nearest to the unknown ones. The performance is determined by the appropriate number of neighbours (k), which varies from data set to data sample [21]. 3.3 Data Mining Tools Data mining methods give a representation of mining algorithms that is ready to use. The majority of them are open source platform software that is available for free. Some of them are WEKA: For Knowledge Learning, WEKA is a set of machine learning techniques and data pre-processing tools. Waikato Ecosystem for Knowledge Analysis (WEKA) is the acronym for Waikato Environment for Knowledge Analysis. It's a computer application that was created at New Zealand's University of Waikato. The program written in Java and may run on practically any machine. It's a data mining programme that's available for free. WEKA can help you evaluate, visualise, and prepare your input data. Different learning algorithms, such as classification, grouping, and regression, are also supported [7]. Tanagra: Tanagra is a free supervised learning software that can be used for academic and research purposes. Ricco Rakotomalala of the Lumière University Lyon 2 in France created it. Tanagra offers visualisation, descriptive analysis, regression, clustering, classification, and association rule learning, among other information extraction [22]. Orange: Orange is a Python-based tool for machine learning and data mining. Its visual programming interface is clean and easily understood. The orange may be more suited for novice researchers and small projects [23, 24]. Matlab: Matlab as a data mining tool has an interpreted language and graphical user interfaces (GUIs). ISBN: 978-93-5619-947-7 Several current research articles were examined in order to learn more about computational approaches for breast cancer prediction. Below are summaries of each of them. Chaurasia et al. [25] created breast cancer prediction models for both benign and malignant cancers. The data set for Wisconsin breast cancer was used. There were 699 occurrences in the dataset, class 2 (normal and cancerous), and nine integer-valued clinical variables like cell size uniformity. The 16 occurrences with missing values were eliminated from the data set, leaving a total of 683 instances. There were 458 benign (65.5%) and 241 malignant (34.5 percent). The Waikato Environment for Knowledge Analysis examined the trial (WEKA). Yue et al. [4] examined publications on the use of machine learning (ML) technologies in the diagnosis and prognosis of breast cancer. The researchers concentrated on artificial neural networks (ANNs) and support vector machines. Tools such as support vector machines (SVMs), decision trees (DTs), and k-nearest neighbours (k-NNs). They also made use of the Breast cancer database in Wisconsin. Machine learning has demonstrated a remarkable ability to improve. The accuracy of classification and prediction, the researchers presented a well-organized and easy-to-understand data set. Banu and Ponniah [6] developed a breast cancer prediction classifier approach. The study found that Bayes classifiers such as Tree Augmented Naive Bayes (TAN), Boosted Augmented Naive Bayes (BAN), and Bayes Belief Network (BBN) can be employed to achieve the best classification and accuracy results. Wisconsin Diagnostic Breast Cancer (WDBC) is the dataset used in this study, and it contains 569 instances with 32 variables. All classifiers are coupled with the Gradient Boosting (GB) approach to improve accuracy. The three classifiers have practically identical accuracy of 90.1 percent before using the GB method. Akinsola et al. [26] proposed a breast cancer prognosis system that can help doctors forecast the status of patients with breast cancer based on their clinical data (classes were a benign and malignant tumor). The Home dataset, which had over 1700 cases and was obtained from a State government hospital in Lagos, was used. Eleven criteria were chosen, including cell volume, cell shape, and anticipated class. To identify breast cancer data, three supervised training algorithms were applied. The WEKA toolbox was used to study C4.5, Multilayer Perceptron (MLP), and Nave Bayes. Mirajkar and Lakshmi [27] predicted the type of cancer using Naïve Bayes Classification algorithm of data mining. Proposed method 54 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 aimed to predict the risk of certain types of cancer. Based on the Naïve Bayes algorithm, symptoms of the cancer were classified to recognize the risk of cancer such as breast and ovarian. Oskouei et al. [14] conducted a comprehensive assessment of all research that used data mining techniques in the diagnosis, therapy, and prognosis of breast cancer. And highlighting the major issues which still remain in this field as a result of these investigations. There were 45 publications examined, which were presented as follows based on the principal purpose. The accuracy of employing several categorization algorithms to detect breast tumours was compared in twenty-one papers. A method to identify benign from malignant breast cancers was proposed in twelve articles. Regression Data Mining Methods were used in one of the articles to diagnose the early stages of breast cancer in carcinoma databases. The suggested technique, according to Mandal [28], tries to identify the lowest feature set that can ensure highly accurate categorization. Data cleaning, data dimensionality reduction, and data transformation were all done prior to classification. The WDBC cancer dataset was used in the study, and it was obtained from the UCI repository. The dataset includes 569 cases and 32 attributes, with 70 percent of the instances being used for training and 30 percent being used for testing. Three classification approaches were used to classify the testing data. Sumalatha & Archana [29] studied different data mining techniques for early diagnosis and prediction of breast cancer. The research work analyses the J48 and ZeroR algorithms to predict breast cancer. These two algorithms were applied using WEKA. Total instances of ZeroR analysis were 699. The three major steps used in this research, the collection of datasets, data preprocessing and classification. Devi et al. [30] investigated automated diagnosis of breast cancer based on a machine learning algorithm. The proposed approach was a three steps process. In the first step, the data were grouped into a number of clusters using the Farthest First clustering algorithm. Due to shrinking the size of the dataset, the computation time reduced greatly. Abed et al. [31] created a hybrid classification system that incorporates both the Genetic Technique (GA) and the k Nearest Neighbour algorithm (kNN). To aid breast cancer doctors in early detection and prediction. Data mining methods were employed to assist breast cancer doctors in making an early diagnosis of the disease. The GA algorithm's primary goal is to improve approaches; it was utilised for kNN by choosing the best features and optimising the value of k, whereas the kNN is being used for classification. Lavanya et al. [32] presented breast cancer prediction system based on a hybrid approach; ISBN: 978-93-5619-947-7 classification and regression trees (CART) classifier with feature selection and bagging technique for higher classification accuracy and improved diagnosis. They used the hybrid approach to enhance the classification accuracy of breast cancer and Feature Selection to remove irrelevant attributes that do not play any role in the classification task. The Bagging means Bootstrap aggregation was used to classify the data with good accuracy. Sivakami [33] proposed breast cancer Hybrid Model which integrates DT and SVM algorithms. This model was used to classify patients into two classes (Benign/Malignant). The dataset containing eleven attributes was obtained from Wisconsin Breast Cancer Dataset (WBCD) taken from UCI machine learning repository which contains 699 instances where 241 cases belong to the malignant class and 458 cases belong to the benign class. Sixteen instances of the dataset have missing values. Zand et al. [5] presented a comparative survey on data mining techniques in the diagnosis and prediction of breast cancer. And analysis of the prediction to find the most suitable technique for predicting cancer survival rate. Three classification techniques were used; Naïve Bayes, neural network, and C4.5 algorithms were investigated using WEKA toolkit. Joshi J. et al. [34] this research used four cluster algorithms to early diagnoses of breast cancer patients. The dataset was obtained from the UCI web data repository. Record set with 10 attributes (age, Menopause, Tumor-size, inv-nodes, Node-caps, etc.). Clustering techniques such as K-Means, Hierarchical Cluster Method (HCM), Expectation Maximization and Farthest First were applied. V. DISCUSSION This study outlines some of the most recent data mining studies in the field of breast cancer. Data mining methods can be used to "mine" necessary details from the massive amounts of data produced by health services. These experiments revealed that using many algorithms on a data collection produces better results than using a single method. In the majority of the studies, WEKA is used. Other popular data analysis tools include C++, Tanagra, Mat lab, and others. The combination of algorithms chosen with care and their accurate implementation on the data set result in an effective diagnosis and prognosis system for breast cancer. The necessary dataset is split into two parts: one for machine learning and the other for testing them. The majority of the studies compared various different classifiers on a dataset in order to correctly classify whether a patient has benign or aggressive breast cancer. Breast Cancer Treatment and Diagnosis Using Machine Learning and Data Mining technique: A Study has been used in various researches to predict breast cancer survival. The risk of breast cancer factor model is examined. Decision trees, Nave Bayes, Artificial Neural 55 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Networks, Association Rules, Support Vector Machines, and Regression are some of the most widely used classification approaches. VI. CONCLUSION Breast cancer is a leading cause cancer among women as well as the second leading cause of death from cancer. If the early indications of tumours are neglected, the patient's health may suffer severe effects, including death. When breast cancer is identified early, it is possible to keep it under control. Instead of investigating various residential data cleaning and pruning approaches that can compile and make a dataset acceptable for mining, many studies focus primarily on the implementation of classification algorithms to breast cancer prediction. A good dataset has been shown to deliver improved accuracy. The design of prediction systems will be aided by the selection of appropriate algorithms and a solid home dataset. These systems can help a patient with breast cancer choose the best therapy options. There are various treatments for a particular patient on their stage of breast cancer; data and machine intelligence can be very useful in determining the best course of treatment by knowledge extraction from appropriate databases. REFERENCES [1] World Health Organization. Cardiovascular diseases (CVDs). https://www.who.int/cardiovascular_diseases/en/. [Accessed 3rd January 2019]. [2] Mayo Clinic. Breast Cancer: Symptoms and causes - [Internet]. Mayo Clinic. 2016. Available from: https://www.mayoclinic. org/diseases.../ breast-cancer/symptoms-causes/syc-20352470 [Accessed 5th January 2019]. [3] World Health Orgaization. Breast cancer:prevention and control. WHO; report 2016. [4] Yue W, Wang Z, Chen H, Payne A, Liu X. “Machine learning with applications in breast cancer diagnosis and prognosis”. Designs. 2018; 2(2):13. [5] Zand HK. “A comparative survey on data mining techniques for breast cancer diagnosis and prediction”. Ind. J. Fundam. Appl. Life Sci. 2015; 5 (S1):4330-9. [6] https://www.cancer.org/cancer/breast-cancer/treatment/hormonetherapy-for-breast-cancer.html [7] https://www.cancer.org/cancer/breastcancer/treatment/chemotherapy-for-breast-cancer.html [8] NHS. Breast cancer in women: Treatment - NHS [Internet]. Available from: https://www.nhs.uk/conditions/breastcancer/treatment/ [Accessed 8th January 2019]. [9] Maughan KL, Lutterbie MA, Ham PS. Treatment of breast cancer. Am Fam Physician. 2010; 81(11):1339–46. DOI: 10.1002/10970142(19810501)47:9 [10] Roche. Breast cancer a guide for journalists on breast cancer and its treatment. p. 1–10. [11] Genentech. Types and Features of Breast Cancer. 2015; 1–2. [12] Anderson BO. G LOBAL B REAST C ANCER T RENDS UICC World Cancer Congress 2014 : Breast Heal Glob Initiat. 2014;1– 10. [13] Han J, Kamber M, Pei J. “Data mining: concepts and techniques”. (3rd Ed.)2012; San Francisco, CA, USA: Morgan Kaufmann Publishers. [14] Witten IH, Frank E, Hall MA, Pal CJ. “Data Mining: Practical machine learning tools and techniques”. (3rd Ed.)2011; San Francisco: Morgan Kaufmann. [15] Zand HK. “A comparative survey on Data Mining Techniques for Breast Cancer Diagnosis and Prediction”. Indian Journal of Fundamental and Applied Life Sciences. 2015; 5(S1):4330-4339. ISBN: 978-93-5619-947-7 [16] Chaurasia V, Pal S. “A Novel Approach for Breast Cancer Detection using Data Mining Techniques”. (IJIRCCE) International Journal of Innovative Research in Computer and Communication Engineering.2014; 2(1): 2456-65 [17] https://www.urmc.rochester.edu/encyclopedia/content. aspx?ContentTypeID=85&ContentID=P00566#:~:text=Biological %20therapy%20is%20medicine%20that,Biotherapy. [18] https://www.javatpoint.com/machine-learning-support-vectormachine-algorithm [19] Banu B, Thirumalaikolundusubramanian P.” Comparison of Bayes Classifiers for Breast Cancer Classification”. Asian Pacific journal of cancer prevention ( APJCP). 2018; 19(10):2917-20.DOI: 10.22034/APJCP.2018.19.10.2917 [20] Jabbar MA, Deekshatulu BL, Chandra P. “Classification of heart disease using k-nearest neighbor and genetic algorithm”. International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA).2013; 10:85-94. [21] Hassanat AB, Abbadi MA, Altarawneh GA, Alhasanat AA. “Solving the problem of the K parameter in the KNN classifier using an ensemble learning approach”. (IJCSIS) International Journal of Computer Science and Information Securit. 2014; 12(8):33-9 [22] Naik A, Samant L. “Correlation review of classification algorithm using data mining tool: WEKA, Rapidminer, Tanagra, Orange and Knime”. International Conference on Computational Modeling and Security (CMS 2016). 2016; 85:662-8. doi: 10.1016/j.procs.2016.05.251 [23] Jovic A, Brkic K, Bogunovic N. “An overview of free software tools for general data mining”. 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). 2014: 1112-7. [24] Slater S, Joksimović S, Kovanovic V, Baker RS, Gasevic D. “Tools for educational data mining: A review”. Journal of Educational and Behavioral Statistics. 2017; 42(1):85-106. [25] Chaurasia V, Pal S, Tiwari BB. “Prediction of benign and malignant breast cancer using data mining techniques”. Journal of Algorithms & Computational Technology. 2018; 12(2):119-26. DOI: 10.1177/1748301818756225 [26] Akinsola AF, Sokunbi MA, Onadokun IO. “Data Mining For Breast Cancer Classification”. International Journal of Engineering And Computer Science. 2017; 6(8): 22250-22258. DOI: 10.18535/ijecs/v6i8.06. [27] Mirajkar and Lakshmi [30] predicted the type of cancer using Naïve Bayes Classification algorithm of data mining. Proposed method aimed to predict the risk of certain types of cancer. Based on the Naïve Bayes algorithm, symptoms of the cancer were classified to recognize the risk of cancer such as breast and ovarian. [28] Mandal SK. “Performance analysis of data mining algorithms for breast cancer cell detection using Naïve Bayes, logistic regression and decision tree”. International Journal of Engineering and Computer Science. 2017; 6(2):20388-91. DOI: 10.18535/ijecs/v6i2.40 [29] Sumalatha G, Archana S. “A Study on Early Prevention and Detection of Breast Cancer using Data Mining Techniques”. International Journal of Innovative Research in Computer and Communication Engineering. 2017; 5(6):11045-11050. DOI: 10.15680/IJIRCCE.2017. [30] Devi RD, Devi MI. “Outlier detection algorithm combined with decision tree classifier for early diagnosis of breast cancer”. International Journal of Advanced Engineering Technology.2016; VII (II): 93-98 [31] Abed BM, et al. “A hybrid classification algorithm approach for breast cancer diagnosis”. In2016 IEEE Industrial Electronics and Applications Conference (IEACon). 2016: 269-274. [32] Lavanya D, Rani KU. “Ensemble Decision Tree Classifier for Breast Cancer Data”. International Journal of Information Technology Convergence and Services (IJITCS). 2016; 2(1):17-24. DOI: 10.5121/ijitcs.2012.2103 [33] Sivakami K. “Mining big data: Breast cancer prediction using DTSVM Hybrid model”. International Journal of Scientific Engineering and Applied Science (IJSEAS). 2015; [34] Joshi J, Doshi R, Patel J. “Diagnosis of Breast Cancer Using Clustering Data mining Approach”. International Journal of Computer Applications. 2014; 101(10):13-7. [35] https://www.google.com/url?sa=i&url=https%3A%2F 56 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 %2Fwww.emedicinehealth.com%2Fbreast_cancer%2Farticle_em.h tm&psig=AOvVaw1OL3dZnIfgVM7YbF01eQgi&ust=164711059 9310000&source=images&cd=vfe&ved=0CAsQjRxqFwoTCPCu4 KfbvvYCFQAAAAAdAAAAABAg [36] https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww. medicinenet.com%2Fbreast_cancer%2Ftreatment&psig=AOvVaw0 ceWkXg2FDN4Cu-e2g1W6-&ust=1647111248085000&source= images&cd=vfe&ved=0CAsQjRxqFwoTCNCg0NzdvvYCFQAAA AAdAAAAABAb [37] https://www.google.com/url?sa=i&url=https%3A%2F%2Fhea lthcare-in-europe.com%2Fen%2Fnews%2Fremote-24-hour monitoring- shows-promise-in-chemotherapy-patients.html& psig= AOvVaw3sQW - H0n5CIlko25i rIxjq&ust = 16471116121 ISBN: 978-93-5619-947-7 17000&source=images&cd=vfe&ved=0CAsQjRxqFwoTCJC62JLf vvYCFQAAAAAdAAAAABAf [38] https://www.google.com/url?sa=i&url=https%3A%2F% 2F www. hormones-australia.org.au%2Fthe-endocrine-system%2F &psig= AOvVaw1TK5f0K5Ccpigno Ld8oI3N&ust=1647111854329000& source=images&cd=vfe&ved=0CAsQjRxqFwoTCIi44frfvvYCFQ AAAAAdAAAAABAZ. [39] https://www.google. com/url?sa=i&url=https%3A% 2F% 2F gvhdhub.com%2Ftherapeutics%2Fbiological-therapy&psig = AOv Vaw2hTOOxFJDewaTR5_5v3D6A&ust=1647112083483000&sou rce=images&cd=vfe&ved=0CAsQjRxqFwoTCKCo3uvgvvYCFQA AAAAdAAAAABAl 57 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Analyze the MIS Support in Education System, Challenges Arising Globalization and Liberalization S.Kiruthiga1, N.Beulah Jebaseeli2,Dr.D.Umanandhini3, Dr.S.Sridevi4 1,2 Assistant Professor, 3 Associate Professor,4Professor Department of Computer Science & Engineering, School of Computing Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, India Abstract: Information, data, and the choice cycle are connected. Information in the wake of handling is changed into data and data is the base for dynamic interaction. It is vital to have pertinent data for right, opportune, and powerful choices to be made. Management Information System (MIS) has accepted incredible significance in this unique situation. The paper clarifies the idea of information, data, and MIS. The paper examines the significance of MIS, its fast development, and its most recent MIS patterns. The education area has an extraordinary spot in the plan of any administration because of its significance for the prosperity of the residents and the country in general. Education Management Information System (EMIS) assumes a significant part in creating fitting plans, techniques, and arrangements for further developing the education system. Keywords: Education Management Information System (EMIS), Information, Management Information System I. INTRODUCTION Innovation assumes a basic part in the day-by-day activities of most current business substances, associations, and establishments. Mechanical advancements and the arrangement of robotized gear prompted quicker, better, and more productive execution of undertakings, as well as facilitating information-related processes. Thusly, Information Systems (IS), have become key parts of an association's proficiency, data system portrays as a bunch of interrelated parts that gather, cycle, store, and disseminate data to help navigation and control in an association. MIS are interconnected instruments or gadgets that are utilized to assemble, process, break down, gather and disseminate data that is fundamental for management capacities, cycles, and independent direction. These cycles incorporate preparation, arranging, and controlling the product that is utilized to recover and store information in a helpfully available structure. Scholarly establishments have authoritative designs and societies that are not the same as that of organizations, business associations, and non-benefit associations. Scholarly establishments, like colleges, are intensely dependent on MIS systems for exercises, for example, understudy enlistment, library administrations, online classes, and online assessments. MIS is in this manner fundamental in ISBN: 978-93-5619-947-7 the regulatory management of colleges. MIS additionally incorporates components of Enterprise Resource Planning (ERP), which is an association-wide data system that coordinates and controls all the business processes in the whole association. Even though MIS practically works with institutional management, there is restricted empirical proof on the real worth MIS brings to scholastic associations. This study looked to assess the use of MIS at MEDIU, Called Campus Management System (CMS) as well as survey the effect of MIS on the hierarchical execution of the college. II. MANAGEMENT INFORMATION SYSTEM Right independent direction is conceivable with the proficient usage of data. Considering the huge information and data accessible to the chiefs, the dynamic cycle turns out to be undeniably challenging. Data expected for direction ought to be effectively accessible [2]. Assortment of information, its transformation to the data, appropriate capacity of data, recovery of data, and powerful use of data need Management Information System famously known as MIS Management Information System is a PC based system. It is an exceptionally solid instrument accessible to administrators for arranging, sorting out, executing, observing, controlling, and assessing their tasks proficiently. MIS Facilitates compelling correspondence. MIS comprises three fundamental parts: Management, Information, System coordinated utilization of these three parts empowers clearness in understanding the issues in question, the effect of every part on other free data sources yet interconnected with one another. The choices taken in this manner are fitting about the business prerequisites. MIS empowers to take on a multi-disciplinary management approach thinking about every one of the viewpoints connecting with functional, monetary, materials, conduct, authoritative practices and arrangements; and PC-related issues. The association works in an all-encompassing way with the assistance of MIS rather than in various sections. Choices in various portions without adopting a comprehensive strategy have more noteworthy 58 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 possibilities of disappointment. There is gigantic avoidable waste in the usage of authoritative assets. Table 1: Types of information, management levels, and types of decisions 2.1 MIS supports organizational systems Hierarchical design fundamentally can be separated into three layers of order: top management level, center management level, and lower management level (Fig. 2). Each level takes choices as per their jobs. 2.2 Objectives 1. 2. Fig. 1: Decision areas and management levels The lower-level directors are engaged with functional choices, center-level managers‟ center around the strategic choices, and high-level chiefs focus on essential choices. The vast majority of the standard exercises are arranged, executed, and overseen by lowerlevel supervisors for instance arranging, planning, and guaranteeing that every one of the plans is carried out as chosen. Center level chiefs invest generally less energy on the standard arranging exercises and spotlight more on strategic choices, for example, critical thinking, hole examination, execution evaluation, and publicizing. The job of top administrators is different than the lower level and center level supervisors. They generally focus on the essential issues like which item ought to be sent off on the lookout, which market ought to be tapped, how to make passage into the space of the contenders, how to set up for different assets, how to further develop the usefulness of the association, how to lessen cost, with whom to team up, whether to automate, how much computerization ought to be executed, how to prepare the labor to coordinate with innovative difficulties liable to be confronted and so on Table 1 show the degree of the management pecking order in an association, related dynamic jobs and the kind of data's expected by them. ISBN: 978-93-5619-947-7 To make information one of the main elements of the administration, management, and planning of education To manage research and plan education by integrating all the sources of information and providing synthesized reports to the users. 2.3 Method In an automated climate, the Management Information System of educational foundation (school) may involve a module-coordinated exchange handling system with information warehousing and information mining limits, connected with a social data set management system in appropriated data set mode. The system is intended to recover data of the inward tasks (of four utilitarian modules) from information bases that are refreshed by the exchange handling system. It might acquire information from outer sources, and cover the functional method of individuals engaged with its activity. 2.4 Organization Structure The MIS Model as introduced shows the coordinated exchange handling and management data-producing process at two levels - one, at the neighborhood institutional level and the other, at the bunched level. The grouped level might involve a bunch of foundations or a college schools consortium joined as one on a specific normal functional management plan for asset endlessly sharing normal framework, offices &amp; administrations for the economy and proficient management. A focal observing and handling focus might be worked to take care of the normal housekeeping works, combined information handling works, and age of standard and extraordinary report archives of management data for every one of the individuals from the group. 59 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 The model as introduced incorporates four utilitarian modules, specifically, Staff Management Module, Finance-Accounts &amp; General Module, Students' Management Module, and Library Management Module to cover all the repetitive natured authoritative exercises. The modules contain all-around arranged input interfaces that can be explored through GUI consistent menus connected with social tables in an organized structure, where the information is to be placed into the standardized dispersed data sets. The useful modules additionally contain some control menus to run application programs that create a few useful outcomes (eg. finance, and so on) and create repeating natured data set reports. A different menu named 'MIS' in the front-end point of interaction is worked to produce some clear cut, organized, repeating natured information base reports, delegated every day, week after week, month to month, and yearly planned reports. Modules. Various modules will contain various arrangements of info information - both expert and exchange information and will produce various arrangements of results - the two inquiries and data set reports. The DFD of the transaction processing system (in FA&amp;G Module) is shown in Figure 1 as an illustration of the workflow of TPS. 2.5 Overview of the Systems’ Workflow At the nearby level, all the part establishments will utilize a uniform automated office management system (UMOM) and will follow a typical information passage arrangement to run their neighborhood foundation's exchange handling system (TPS). The TPS will cover the information passage activities, information legitimacy, information capacity, and information digging work for the data age. The TPS will gather information through different GUI agreeable info section interfaces (structures) spread over in the system in its four useful modules. The standards of information overt repetitiveness and standardization will be followed at all levels. The entered information might go through system-characterized approval programs into very much organized standardized data set tables as records. Every one of the records so entered through TPS will have auto-produced foundation's code number and date/year, to distinguish its presence in the solidified information base of the entire group. Such information might even be placed through various menudriven connection points of different modules utilizing combo-boxes. A portion of the tables will contain long-lasting records and will be called Master Files, while some might contain the exchange records and be known as the Transaction Files. An exchange can be supposed to be finished if and provided that, every one of the related data sets that are impacted by this exchange is refreshed and every one of the updates is finished. The TPS will likewise contain tweaked program bundles to produce results through legitimate articulations and computations and create the final products as reports, after gathering various pieces of information from various experts and exchanging documents arranged under any of the ISBN: 978-93-5619-947-7 Fig. 1: DFD showing the general workflow of Transaction Processing (in F A & G Module) III. RESULT The personal dispersion of them (as far as 6 factors, viz., orientation, age, educational accomplishments, number of years in educational organization, number of years in the current position, and level in the association) has been introduced underneath followed by a conversation on the conveyance of the respondents regarding every one of those factors. Table 2: Respondents as per Gender Gender Total Male Female Frequen cy % Frequency % No. % 34 69.39 15 30.61 49 100 Source: Field Survey The male respondents comprise a seriously high level of them (69.39%), their female partners being almost 31% of the respondents. This sort of dissemination is entirely typical as far as female respondents, especially in a higher educational organization (HEI). 60 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Table 3. Existing information system is properly used for recruitment planning Response Alternatives Educational Attainments Graduation (%) PostGraduation 1 8 (%) 5.26 42.11 Above Post- (%) Graduation 0 00.00 2 40.00 Yes CannotSay 3 15 12.00 60.00 No 7 28.00 10 52.63 3 Total 25 100.00 19 100.00 5 A majority of the respondents who are graduates and post-graduates, i.e., 56% and 47.37%, respectively were not sure whether the existing information system is properly used for recruitment planning. 80% of the respondents who are above post-graduates did not think that the existing information system is properly used for recruitment planning. 24% and 10.53% of the respondents who were graduates and post-graduates respectively think that the existing information system is properly used for recruitment planning. None of the respondents who are above post-graduates thought that the existing information system is properly used for recruitment planning. 20% and 42.10% of the respondents who are graduates and postgraduates respectively did not think that the existing information system is properly used for recruitment planning. The findings clearly indicate that there are conflicting views, vis-a-vis the response alternatives ‘cannot say’ and ‘no’, between the graduates and post- graduates on the one hand and the above post-graduates on the other hand. A majority of the senior administrative officers, i.e., 60%, did not think that the existing information system Total (%) 4 25 08.16 51.02 60.00 20 40.82 100.00 49 100.00 is properly used for recruitment planning. a majority of the junior administrative officers, i.e., 50%, thought that theexisting information system is properly used for recruitment planning. 25% and 25% of the junior administrative officers respectively were not sure whether, and do not think that, the existing information system is properly used for recruitment planning. None of the senior administrative officers thought that that the existing informationsystem is properly used for recruitment planning. Interestingly, the middle-level administrative officers were equally divided amongst the three response alternatives. a majority of the senior superintendents, i.e., 64.29%, did not think that the existing information system is properly used for recruitment planning. a majority of the junior superintendents, i.e., 75%, were not sure whether the existing information system is properly used for recruitment planning. Only 7.14% and 15% of the senior and junior superintendents respectively thought that the existing information system is properly used for recruitment planning. Only 10% of the junior superintendents did not think that the existing information system is properly used for recruitment planning. Table 4. Existing information system is properly used for recruitment planning Response Alternatives Yes Cannot Say No Total Level in the Organization Sr. 0 2 3 5 Administrative Officer (%) Middle (%) Jr. 00 2 33.33 2 40 2 33.33 1 60 2 33.34 1 100 6 100 4 (%) 50 25 25 100 Sr. 1 4 9 14 Superintendent (%) Jr. 07.14 3 28.57 15 64.29 2 100 20 (%) 15.00 75.00 10.00 100 Total 8 24 17 49 (%) 16.33 48.98 34.69 100 Table 5. Data base relating to the teaching and non-teaching staff is adequate Response Alternatives Frequency % Yes Cannot Say 04 25 8.16 51.02 20 49 40.82 100.00 No Total Source: Field Survey ISBN: 978-93-5619-947-7 61 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 A good percentage of the respondents (i.e., nearly 41%) observed that the data base relating to the teaching and nonteaching staff is not adequate. Again, nearly 51% of them expressed neither a positive nor a negative view, indicating their lack of understanding and/or confusion regarding the adequacy of data base relating to the teaching and nonteaching staff. The indication is quite clear, i.e., there is definite need for improving the data base relating to the teaching and non-teaching staff. Table 6: Computation of the Kendall CoefficientofConcordance(W)basedontheRankingofSix(6)Statements(a, b,c, d,e, &f)by the Respondents Computation of the Kendall CoefficientofConcordance(W)basedontheRankingofSix(6)Statements(a, b,c, d,e, &f)by the Respondents Concerns(N) c d 243 194 Respondents(K) Total ∑Rj/6 Rj--∑Rj/6 a 100 b 294 -71.5 122.5 71.5 s=∑(Rj--∑Rj/6)² 5112.25 15006.25 5112.25 1/12k²*(N³--N) 42017.5 W=36267.5/42017.5 f 102 22.5 -75.5 -69.5 506.25 5700.25 4830.25 Total 50 71.5 67.5 0.152 Rank the statements given below in order of importance in a scale of 1—6 (1 stands for the most important and 6 stands for the least important). a) MIS is the key to proper administration in any organization. b) As development and implementation of MIS is an expensive affair, it may be ignored. c) The job of storing and maintaining relevant data required for an effective MIS in an organization should be outsourced/done by external agents to ensure transparency. d) Delay in recruitment and promotion is mainly due to inadequate and/or ineffective MIS in an organization. e) Top management’s commitment is a must to have a proper MIS in an organization. f) Inadequate database and ineffective MIS go hand in hand. III. RESULT It reflects the Indian Higher Education System, as of now, is confronting many difficulties emerging out of globalization and progression. The worldwide establishments of the twenty-first century are now advancing, who are bit by bit moving towards becoming virtual associations controlled by Information Communications Technology and Management Information System. A change in standpoint can likewise be seen where education has now turned into attractive assistance rather than social help. Also, the utilization of Information Technology in the field of education is killing the idea of the locale of a college, and making IT empowered offices like conveyed study halls. education area to worldwide contest, and will result into a danger to the presence and endurance of more vulnerable foundations. Another angle that draws huge consideration is the way that numerous feeble establishments, especially in rustic, semirural, and immature regions are confronting asset imperatives that incorporate deficiency of labor supply and personnel other than the foundation. The XIth Plan has pushed the development of group schools and colleges as a solution for the issue. IT-based apparatuses &amp; applications and IT empowered administrations through organized climate are relied upon to be sent by these groups for an ideal - 176-usage of assets, and give better 'just-in-time' administration to its end-users to battle worldwide contest. Such a model might be viewed as accommodating in simple access and trade of important data and information among the schools and establishments, subsequently helping the foundations and the universities in the group to work monetarily in more extensive regions and with better innovative and functional adequacy. Such an endeavor of a legitimate plan of a M I S, keeping in view the authoritative and management system of the organizations in West Bengal, support the present and the future day needs for an easy to understand Uniform Mechanized Office Maintenance System to run effectively in workplaces of a bunch of educational foundations of advanced education for functional productivity and economy in scale, and may subsequently be considered as a stage towards the improvement of an 'ERP for Indian Educational Sector'. REFERENCES [1] IV. CONCLUSION [2] These circumstances make rivalry for schools and colleges, especially sped up with the opening up of ISBN: 978-93-5619-947-7 e 96 Harsh, Stephen B., L. J. Connor, and G. D. Schwab, Managing the farm business. Prentice-Hall, Inc., Englewood Cliffs, New Jersey, 2015. Pedarpur, M; et al, „Management Information systems, functions, structure and its importance – In Manager‟s Decision Making‟, IJCRB, Vol. 4, No. 10, 2013, pp 901-997. 62 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] House, William C., „Decision support systems – a data-based, model-oriented user-developed discipline, Petrocelli Books, Inc. NY. 2016. Laudon, K & Laudon, J., „Management information systems: managing the digital firms‟, 9th ed, Prentice-Hall, 2015. Hinchliffe, J.K., Public Expenditure on Education in Nigeria: issues, estimates, and some implications, Washington, World Bank, 2017. Carrizo, L; et al, „Information tools for the preparation and monitoring of education plans‟, Education Policies and Strategies, UNESCO, Paris, 2018. Kaduna SMoE, Kaduna State, Education Strategic Plan (ESP) 2006 - 2015, (unpublished), Kaduna SMoE, Final Draft, 2019. Dawam, S. R., Ahmad, K. A., Jusoff, K., Tajuddian, T., Elias, S. J., &Mansor, S. W. (2009). The use of ICT in public and private institutions of higher learning, Malaysia. Computer and Information Science, 2 (4), 122–128. Fulmer, C. (2019). Maximizing the potential of information technology for management: Strategies for interfacing the technical core of education. In B. Barta, M. Telem, and Y. Gev (Eds.), Information Technology in Educational Management (pp. 1–8). London: Chapman and Hall. Hruskocy, C., Cennamo, K. S., Ertmer, P. A., & Johnson, T. (2020). Creating a community of technology users: students become technology experts for teachers and peers. Journal of Technology and Teacher Education, 8 (1), 69–84. Kirkman, C. (2015). A model for the effective management of information and communications technology development in schools is derived from six contrasting case studies. Journal of IT for Teacher Education, 9 (1), 37–52. Passey, D. (2017). ICT and school management - A review of selected literature. Unpublished Research Report: Lancaster University, Department of Educational Research Visscher, A. J., & Wild, P. (2019). The potential of information technology in support of teachers and educational managers managing their work environment. Education and Information Technologies, 2 (4), 263–274. Yee, D. L. (2018). Images of school principals’ information and communications technology leadership. Journal of Information Technology for Teacher Education, 9 (3), 287–302. ISBN: 978-93-5619-947-7 63 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Security Based Home Automation using IoT Devices Dr.J.Dhilipan1, D.B.Shanmugam2, Chiranjeevi .C3 Professor & Head, Department of Computer Applications, SRM IST, Ramapuram Campus, Chennai 2 Asst. Prof, Department of Computer Applications, SRM IST, Ramapuram Campus, Chennai 3 Final Year MCA, Department of Computer Applications, SRM IST, Ramapuram Campus, Chennai. 1 Abstract: The Internet of things, or IOT, is an arrangement of interrelated figuring gadgets, mechanical and advanced machines, items, creatures or individuals that are given remarkable identifiers and the capacity to move information over an organization without expecting human-to-human or human-to-PC association. One of these applications is home robotization which is utilized to control all electrical home machines naturally of by means of advanced mobile phones. This controls gadgets through a Boolean orders of valid and bogus to control to gadgets. These dampness levels for wet and dry conditions (cases) can be changed relying upon the plant necessities for plant development. This can be utilized to identify soil dampness when the dirt dampness shortage module plant watering gadget, so the plants in our nursery without individuals to make due. This aides in numerous ways like while are getting back to home and you need the AC to be on and be cooled before you happen to assuming that you neglect to turn of light or fan you want not again come to home and turn off them, rather than it you can handle with your advanced mobile phone when any place you are. This undertaking incorporates IFTTT, Blynk and Node MCU(ESP32) . At first the gadgets are associated with the Node MCU(ESP32) to the regarded ports then the sign from the Blynk application will give signs to the Node MCU(ESP32) then, at that point, the regarded port will give power supply to the gadget through Relay board and the gadget will turn on. The Blynk application is associated with google aide, through IFTTT. In IFTTT the google right hand and web hook is associated together to make this project achievement. Assuming the form in laud is given as a contribution to research aide then the gadget will turn on. Keywords: Internet of Things, Current Transformer, Wireless Fidelity, General Purpose Input/Output. I. INTRODUCTION Every day modern people expect an New device and new technology to simplify their day today life. The developers and researchers a real ways trying to find new things to provide comfort to the people. In the past 1990s, Internet usage increased rapidly in enterprise and consumer markets but was still limited in its use because of the low performance of the network interconnects. But in the 2000s Internet connectivity became a part for many applications to provide access to information. However, these devices require more human interaction and monitoring through apps and interface. The Internet of Things is a new era of intelligence computing and it’s providing a privilege to communicate around the world. Figure 1 describes the coupling of C’s and A’s. That ISBN: 978-93-5619-947-7 reveals people and things can be connected, ideally by using in Any path/network and any service. Resource usage (water conservation and energy consumption) Security and Comfort. This paper introduces an IoT agent which is the brain of this architecture and it controls the devices through the internet. At a very short period of time, the IoT agent receives the user data in the form of commands, which will be sent to control the systems through Google commands. This command will be received by Google assistant and control the devices. Home Automation is controlling and managing the basic operations in a household automatically. It is very inconvenient to have to do every single task manually so to make our lives a bit easier, the concept of home automation has been introduced. Home automation necessitate us to introduce computerized or automatic control to certain electrical and electronic systems either house or factory. These include wiring, lighting, plumber, air conditioner control, smoke indicators, etc. A microprocessor or micro-controller or FPGA based system is used to control the various appliances. These systems control the appliances according to configuration. For example they may be capable to turn on the lights at particular time, or they should quantify the humidity with help of hardware sensor and turn On/Off lights accordingly. Remote control is the most basic example of automation. It lets us control a particular device according to us by sitting within a specific range. The concept of the project is creating an interface that lets us control certain devices and also allows us to monitor several occurrences around the house. The interface created is on XAMP that has SQL and Apache which enables the user to do the programming related to the circuit. XAMP further transfer data to MATLAB which in turn sends the data to the Arduino and the device can be con-trolled according to the conditions. The project revolves around making a website that controls all the basic information related to the sensors and does all the necessary monitoring. II. SYSTEM DESIGN In IOT automated systems, the architecture has 2 level of its design, the first level is hardware architecture and the other level is software architecture. Hardware architecture is the most essential part of the system once it is 64 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 configured correctly then software application can easily integrate with hardware architecture because the purpose of software application is to invoke the request. The main output depends upon the hardware module. Both should be made sync with each other. 2.1 IOT Home Automation Architecture The architecture of IOT consists of software application that interacts with hardware board connected with home devices using internet. For every single home device one input output pin of hardware board is connected with every single relay module which works as a switch for the devices. The static IP is assigned to the hardware board through which we can access the board or execute its stored scripts with the help of software application. The sensors are used to process or generate the appropriate environmental data on real time needed for the systems and they have the most significant role in providing the energy efficiency in IOT systems [26]. The sensors like motion detection and temperature camera sensor etc. can also connect with the hardware board. They normally have separate input output pin in different hardware board but some board support the same input output pins which are used for smart home devices. Without the sensors used, systems can be implemented by it will not provide full support. The use of sensor technologies provides measurement and evaluation of environmental indicators, as the information shared over a sensor network. Fig.1. Concept-specific hardware trainers for Digital Fundamentals 2.2 Working As discuss above the home automation architecture, the working of the system is mainly based upon architecture. Software application is responsible to provide the user interface to the users. Users must need to login to the system and then he/she can control or monitor the status of devices. Software Application receives the request generated from the user and passed it to hardware board. Application by means of IP Address access hardware board remotely and perform its execution with respect to user's input request. The working of software application defines with the help of flow chart in Fig [1]. Scripts are written and stored for every input output pins of hardware board that are connected to every single device like light, fan etc. via single relay module which works as a switch between the device and the hardware board pin. Mostly scripts are written in python language. But the support of JavaScript is also available on many hardware boards depending upon on which Operating system it is using. Once the user click on the any device button from the software application, the application program invokes and run the respected script of board which execute the command in result the status of device changed with respect to user performed action. This same whole working functionality performs by all other input output pins of hardware board. ISBN: 978-93-5619-947-7 Fig.2. Internal working of the Home Automation System Fig. 2 shows the whole internal working of smart home automation. Application users can also control or monitor the smart home devices if he is not available within the specific domain or network. But it is mandatory for hardware board to contain a specific static IP through which hardware board can access remotely anywhere from the World. By this Application can then run any scripts stored in hardware board that correspond to users performed activity. But it requires authorized users to access otherwise it will be a thread for the system that may cause a harmful result. Some level of security support is needed for authentication. 65 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Fig.3. Basic setup for home automation There are four primary operating standards for home automation technology—Wi-Fi, Z-Wave, Zigbee, and Bluetooth Low Energy (BLE). Wi-Fi is the most commonly used standard where IoT devices are connected to a centralised controller/hub (either wired or wireless), which is connected to the router through an Ethernet link. The IoT devices can connect to a cloud network on the Internet using the controller/hub and the router. They can be controlled through the cloud network using a FOSS or a mobile app. The mobile app can be used to send and receive data through the cloud network to control and monitor the IoT devices installed in a house. Energy monitors. IoT energy monitors are digital energy meters that can monitor the power consumption of the house, also helping one monitor the overall power consumption remotely. Thermostats. IoT thermostats can be used to monitor the temperature of the house in real-time. Using such thermostat sensors can help monitor the temperature inside the house from anywhere using the Internet. Smart door locks. Smart door locks are IoT door locks that can be controlled using a home security system and IoT OSS/app over the Internet. One can lock and unlock them remotely via the app. Air-conditioners. Air-conditioning is a very important part of a house and controlling the air-conditioner remotely is a part of home automation. Surveillance cameras. IoT cameras can be used for the surveillance of the house and they can give live video footage of the house remotely. Both indoor and outdoor cameras can be used to monitor the indoor and outdoor environments. Such a surveillance system can have features like motion detection and can alert whenever there is a security breach. Apart from the above IoT devices, many other devices can be installed in a house to improve the convenience and automation. Many IoT-based home appliances like washing machines, water heaters, refrigerators, dish washers, robot floor cleaners, etc can also be installed additionally to make your house fully automated. IV. CONCULSION Fig.4: Basic setup for home automation III. IOT DEVICES FOR SECURING YOUR HOME There are various IoT devices and sensors that can be used for home automation and security. The basic ones are: Wall switches. IoT-based wall switches can be mounted on the wall of a house like regular wall switches, but can be controlled remotely. Such IoT switches can also be wireless and can be connected to an IoT hub or router wirelessly. Voltage sensors. IoT voltage sensors can monitor the supply voltage of the house and one can even monitor the same remotely using the Internet. ISBN: 978-93-5619-947-7 The home automation using the Internet of Things has been proven to work by connecting simple appliances to it and the appliances were successfully controlled through internet. The designed system processes according to the requirement, for example switching on the light when we give the command. This will help the user to get an overview of various parameters in the home anytime anywhere. Low cost and flexible home Automation system using Node MCU microcontroller is proposed and implemented. Overall, Node MCU is easy to understand & its coding is easy. By implementing this type of system, we can ensure that the energy conservation can be done. By help of this system we can increase, the efficiency of the appliances. We can have the complete control over the home appliances from a long distance. This will Increase the comfort ability of human being and it will reduce the Human efforts. REFERENCES [1] T. Sehgal and S. More, "Home Automation using IOT and Mobile App.," International Research Journal of Engineering and Technology (IRJET), vol. 04, no. 02, pp. 2395 - 0072, February 2017. [2] V. Yadav and S. Borate, "Smart Home Automation using Virtue of IoT," in International Conference for Convergence in Technology (I2CT), Mumbai, India, 2017. [3] K. Moser, J. Harder and S. G. M. Koo , "Internet of Things in Home Automation and Energy Efficient Smart Home Technologies," in 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC), San Diego, CA, USA, 2014. 66 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 [4] J. Thati, P. V. Kumari and Y. Narayana, "Controlling of home appliances through Internet," in 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), Chennai, India, 2017. [5] X. Hong, C. Yang and C. Rong, "Smart Home Security Monitor System," IEEE, 2016. [6] R. K. Kodali, V. Jain, S. Bose and L. Boppana, "IoT based smart security and home automation system," in 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, India, 1016. [7] P. Gupta and J. Chhabra, "IoT based Smart Home design using power and security management," in 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), Noida, India, 2016. [8] V. Chayapathy, G. S. Anitha and B. Sharath, "IOT BASED HOME AUTOMATION BY USING PERSONAL ASSISTANT," in International Conference On Smart Technologies For Smart Nation (SmartTechCon), Bangalore, India, 2017. ISBN: 978-93-5619-947-7 67 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Empowerment of Self Help Groups Towards Women Microenterprise Improvement in Tamilnadu 1 V.Sudha1, Dr.S.Balamurugan2 Ph.D.Rresearch Scholar, Department of management Studies, Periyar university, Salem 2 Assistant Professor, Department of Management Studies, Periyar University, Salem Abstract: Self-Help Group concept which is now almost two decade old. It is reported that the SHGs have a role in hastening country’s economic development. SHGs have now evolved as a movement. Mainly, members of the SHGs are women. Consequently, participation of women in the country’s economic development is increasing. They also play an important role in elevating the economic status of their families. This has led boost to the process of women’s empowerment. The origin of SHGs is from the brainchild of Grameen Bank of Bangladesh, which was founded by Mohammed Yunus. SHGs were started and formed in 1975. In India NABARD is initiated in 1986-87. But the real effort was taken after 1991-92 from the linkage of SHGs with the banks. A SHG is a small economically homogeneous affinity group of the rural poor voluntarily coming together to save small amount regularly, which are deposited in a common fund to meet members emergency needs and to provide collateral free loans decided by the group. (AbhaskumarJha 2000). Keywords– Empowerment; Self Microenterprise Entrepreneurship. Help Groups; I. INTRODUCTION Runnning a Self Help Group is not as easy as it seems. There must be sincere willingness to learn and then practice what is taught to make a difference. Effective support leaders and facilitators: Leader should be knowledgeable of group behaviors. Leaders/facilitators tend to have familiarity with or past experience as group leaders. It is very useful to understand how people behave in groups and how helpful they can be to one another in a group setting and possess a basic commitment to the selfhelp process. Leading an effective self-help group begins with a commitment to three basic assumptions: each member can make a contribution, each member is the ultimate authority on their needs and what will work for them, and communication must be open and honest to promote a positive group experience. Identified that the Women SHGs are not acting as much as the expectancies because of lack of knowledge at the role of a member and management related troubles. In this regard, the banks began penalizing through lowering the mortgage amounts and the governmental groups are decoupled from the responsibility of making sure to banks. In this situation many SHGs are closed and a number of them are restructured by way of Merging with other companies. Many research studies are centered on assessing the performance and models and the modus operandi, nature ISBN: 978-93-5619-947-7 of commercial enterprise and achievement of SHGs in the country. II. CONCEPT OF SELF HELP GROUP The concept of self help groups had its origin in the co-operative philosophy and the co-operators by and large, including the National Federations in the credit sector, could not think of any better SHG than a primary cooperative credit society itself.2 As SHG are small and economically homogenous affinity groups of rural poor, they are voluntarily coming together for achieving the following. To save small amount of money regularly. To mutually agree to contribute a common fund. To meet their emergency needs. To have collective decision making. To solve conflicts through collective leadership mutual discussion. Today, the self help group movement is increasingly accepted as an innovation in the field of rural credit in many developing countries including India to help the rural poor considered a vehicle to reach the disadvantaged and marginalized section, which in the normal course cannot avail of credit facility from the bank. Self help groups are small informal association of the poor created at the grass root level for the purpose of enabling members to reap economic benefits out of mutual help solitarily and joint responsibility. Self help groups are formed voluntarily by the rural and urban poor to save and contribute to a common fund to be lent to its members as per group decision and for working together for social and economic uplift of their families and community.Self assist businesses are important to overcome exploitation, create self assurance for the financial self-reliance of rural humans, particularly amongst girls who are primarily invisible inside the social shap. These organizations allow them to return together for commonplace objective and gain energy from each different to address exploitation, which they are going through in several bureaucracy. Groups become the basis for action and trade. It also allows homes of dating for mutual trust among the selling company and the agricultural bad via constant contact and proper efforts. The rural negative are in-capacitated because of various motives such as; most of them are socially backward, illiterate, with low motivation and 68 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 negative financial base. Individually, a poor is not weak in socio-economic term however also lacks get entry to the expertise and facts, that are the most important components of state-of-the-art improvement process. However, in a group, they may be empowered to conquer many of these weaknesses, consequently there are desires for SHGs which is specific terms are as under. To uplift the living conditions of the poor. To create a habit of savings, utilization of local resources. To mobilize individual skills for group's interst. To create awareness about right. To assist the members financial at the rime of need. Entrepreneurship development. To identify problems, analyzing and finding solutions in the groups. To act as a media for socio-economic development of village. To develop linkage with institution of NGOs. To organize training for skill development. To help in recovery of loans. 4.2 Group Meeting The group members meetings should be held once a week or fortnight / monthRegularly on a convenient day, place and time as decided by the group. The members should attend all the meetings in time without fail. The member who unable to attend the meeting for genuine reasons, the same has to be intimated to the group in person or through a messenger in advance or at least informed at the same meeting. If fails the member is liable to pay fine for the absence as decided by the group. V. IMPACTS OF SELF-HELP GROUP IN INDIA SAVING AND FINANCIAL DECISION MAKING One of the number one blessings of participation in a SHG is the possibility to keep regularly, access formal financial savings institutions and participate in the control of those savings. They shop frequently, have their own financial institution debts and make deposits into these bills. SHG is having an awesome impact on individuals, in their ability to save their difficult earned money. III. THE FEATURES OF SELF HELP GROUPS VI. ACCESS TO CREDIT According to D'souza5 the SHGs are basically Small casual corporations, characterized by voluntary memberships, a democratic and consultative structure of governance, monetary participation of contributors, autonomy, education and schooling and worries for the negative. Apart from several of factors, the members do as a collection, they pool their financial savings and lend within the institution to fulfill the credit score needs of the members. Creation of a common fund through everyday contribution of members and insurance of loan with minimal files and often with none security are, in fact, the important thing capabilities of SHGs. A corollary of participation in SHGs is an improvement in a women get entry to credit score. Since the project is possibly too early in its implementation to immediately improve women get right of entry to to credit. The financial mobility because of participation within the SHG has caused an development within the fine of lifestyles, consistent with some of the a hit organizations. Overall, many families had been capable of cope with their fundamental wishes better than before. Some of NGOs reviews have proven that the file on the compensation of loans by women changed into frequently better than that of men, and that women have been additionally much more likely to spend the earnings earned, on their households, leading to improved health and nutrition of the terrible populace and for enhancing the pleasant of their lives. Fund technology within the preliminary tiers may be substantially low in those companies. Such price range though meager, may be supplemented via external resources mainly, loans from banks or presents given via NGOs, which promote them. SHGs offer to contributors preliminary banking services characterized through value effectiveness, flexibility and freedom from defaults. Assessment of the credit score needs of individuals is executed periodically at group conferences. The claims for credit are settle in the institution via consensus. IV. RULES AND REGULATIONS OF SHGS 4.1 Memberships Only one responsible person from a family aged around 21-60 years can become member in the groups. The members/persons who are involved in any party politics activities or involved in any type of antisocial activities or the willful defaulters are not eligible for membership in the group. The size of the group shall be around 10 to 20 members. ISBN: 978-93-5619-947-7 6.1 Decision-making within the household The social impact of the SHG program increased involvement in Decision-making, recognition about various programs and companies, accelerated get right of entry to such companies, multiplied expenditure on Health and Marriage occasions, there's a Change in the attitude of male participants of the households, now they're convinced about the idea of SHG and encourage ladies to take part inside the meetings and girls said that they have savings in their name and it offers them confidence and elevated self-respect. Within own family the honor and status of women has extended. Children Education has advanced drastically. Especially woman education was very low but now SHG contributors are sending their children which include girls to high school. The Sanitation in members‟ families has progressed and it has brought about better fitness in participants‟ families. Now girls are 69 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 taking treatment from qualified docs, even though they ought to travel to close by towns. Members at the moment are confident enough to elevate social status. VII. CONCLUSION Women compared to men have continually been delicate and therefore they have got to face many problems while they come out of the residence to paintings with men. Women in developed economic system do no longer face the problems which can be faced by the Indian girls. Despite many achievements, girls get trifled by many problems. Some being commonplace for both male and omen and a few are the curse simplest to the ladies. There are many psycho-social factors which avert the course of ladies empowerment and her stepping towards entrepreneurship. Women have usually been criticized by way of the male dominant society for their out of domestic sports. Indian girls are faced with many such problems. Indians believe inside the philosophy that “Women need to in no way be left unbiased she should be under the manager of her father in early life, underneath the manipulate of her husband after marriage and under the manager of her son in old age”. Some of the foremost difficulties on this appreciate can be illustrated as below.SHGs may be cars for social and political movement as well as for economic intermediation. This flexibility and freedom additionally has its charge. Politicians are pushed by using their need for recognition and power, and bureaucrats through their need to obtain numerical targets. SHGs can offer both with a equippedmade vehicle. If their individuals can pick out and resist the disadvantages of being „used‟ by using outsiders, and might exploit them rather than be exploited, the movement may also in time play an crucial function in the discount or maybe the removal of India’s foremost claim to repute, its leadership in world poverty. If no longer, however, they will emerge as no greater than another milestone in the country’s long listing of failures. ISBN: 978-93-5619-947-7 REFERENCES [1] Aloysius P. Fernandez (2006), “History and spread of the self-help affinity group movement in India-The role played by IFAD”,Occasional Papers, Knowledge for development effectiveness, © 2006 by the IFAD [2] Dr. V. Balachandran and P Brintha (2016), “Empowering Rural Women Through Self Help Groups, International Journal of Advanced Research in Management and Social Sciences Volume 1,Issue 4 , October 2012 ISSN: 2278-6236 [3] Dr.A.Sundaram (2012), “Impact of Self-help Group in Socioeconomic development of India” IOSR Journal of Humanities and Social Science (JHSS) ISSN: 2279-0837, ISBN: 2279-0845. Volume 5, Issue 1, Page no 20-27 www.iosrjournals.org [4] Dr.A.Sundaram, “Role of Self-help Group in Socio-economic development of India”The International Journal‟s RJEBS, Volume 2, Issue 6, April-2013 ISSN 2251-1555 [5] Mr. T. Thileepan and Dr.K. Soundararajan, “Problems and Opportunities of Women SHG Entrepreneurship in India”, International Research Journal of Business and Management – IRJBM ISSN 2322-083X [6] Sanjay Kanti Das, “Ground Realities of Self Help Group –Bank Linkage Programme: An Empirical Analysis”, IJRSS Volume 2, Issue 2 May 2012,ISSN: 2249-2496. [7] Grisna Anggadwita, & Wawan Dhewanto. (2015). Women Entrepreneurial Intentions in Micro and Small Enterprises (MSME) in Indonesia: The Influence of Environmental Factors on Perceived Behavioral Control. International Conference on Multidisciplinary Trends in Academic Research” (GTAR- 2015), 1, 248-258. [8] Joseph Schumpeter. (1951). The Thoery of Economic Development. Harvard University Press, Cambridge, Massachusetts. 70 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Social Science with Gender Issues, Equality and Empowerment of Women and Girl Child Dr. S. Kalaichelvi Associate Professor, Department of Zoology, Sri G.V.G Visalakshi College for Women (Autonomous), Udamalpet Abstract: Social science research - refers to any scientific study of human action and interaction focusing on elements of thought and behavior that are in some sense social. This paper discussing about the women and girl child related issues like female infanticide, women education, sexual harassment, acid flash, dowry demands and murders, abuse in travel in bus and transport, cybersex crime, gender equality, domestic violence, female genital mutilation and empowerment. Keywords: Infanticide, sexual harassment, acid flash, dowry demands and murders, cybersex crime and female genital mutilation. I. INTRODUCTION with varied age group like teenage to old age of her own Apartment, teenage girls by school masters and boys in her own class, Women at work place by higher officials, Teenage girl Covid - 19 patient by ambulance driver, women passenger by Call taxi drivers, Breast Cancer patient in hospital by the technician and Dengue patient by the Doctor and ward boy etc. 1.4 Acid Flash Acid is flashed on the faces of teenage girls when they are refusing to love the proposing guys. The cases all over India and Tamil Nadu the girls died due to acid flash. The girls should not have her own desire to love. She will lose her confidence and cannot survive if she survives. In India strict legislation should punish the victims. Social science research - refers to any scientific study of human action and interaction focusing on elements of thought and behavior that are in some sense social. This paper discussing about the women and girl child related issues like female infanticide, women education, sexual harassment, acid flash, dowry demands and murders, abuse in travel in bus and transport, cybersex crime, gender equality, domestic violence, female genital mutilation and empowerment. 1.5 Dowry Demands and Murder 1.1 Female Infanticide 1.6 Abuse in Travel in bus and Transport In embryonic stage itself the girls are started to struggle for their survival. If the scan report gave report as female baby, then the baby will be get aborted. If the girl baby give birth in Usilampatti and Madurai region the baby will be fed with kalli pal (Poisonous plant milk) and killed. In the case of Nirbaya, when she was returning to her home with her boyfriend at night, she was brutally attacked and sexually harassed by the bus driver and cleaners. Her boyfriend also attacked and thrown away him from bus. Finally she died in the hospital after given her report to the police. 1.2 Women Education 1.7 Cybersex Crime Girl education is properly given only in the well to do family. But in middle class and poverty line the education is given with partiality with boys. As our Mahatma Gandhi told “If you educate a man you educate an individual, but if you educate a woman you educate an entire family”. As our Brigham young told “You educate a man; you educate a man. You educate a woman; you educate a generation”. Education given to a girl will educate the generations. The women and girls are threatened by the photo morphing and sexually harassed otherwise forced to commit suicide. 1.3 Sexual Harassment Sexual harassment during child hood like chennai school deaf and dumb girl harassed by the 11 securities ISBN: 978-93-5619-947-7 Kerala have more women dowry murder cases in recent days than other states and other country. Woman killed by her husband for getting married second time and getting dowry second time. He killed his wife by snake bite with a help of snake charmer who has given cobra for money. She killed by her husband in her mother’s house itself. This incident breaking our heart like anything. 1.8 Early Marriage The girls are in the age of 15 or 16 years before reaching age of 18 years they are forced into early marriage. They are getting married a man with more age like 30 or 40 years. Her life will be spoiled. Education and her future will be spoiled. 1.9 Gender Equality 71 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Gender equality is not only a fundamental human right, but necessary foundation for a peaceful, prosperous and sustainable world. Many challenges faced by women like discriminatory laws and social norms pervasive, women continue to be underrepresented at all levels. Women and girls between the ages of 15 and 49 report experiencing physical or sexual violence by intimate partner. 1.10 Domestic Violence The Covid - 19 pandemic has also led to a steep increase in violence against women and girls during lock down. Many women were trapped at home with their abusers, struggling to access services that are suffering from cuts and restrictions. Data shows that, since outbreak of the pandemic, domestic violence against women and girl child has been intensified. 1.11 Female Genital Mutilation Female genital mutilation (FGM) comprises all procedures that involve partial or total removal of the external female genitalia, or other injury to the female genital organs for non-medical reasons in Somalia and African countries. The practice is mostly carried out by traditional practitioners. In several settings, there is evidence suggesting greater involvement of health care providers in performing FGM due to the belief that the procedure is safer when medicalized. WHO strongly urges health care providers not to perform FGM. FGM is a violation of the human rights of girls and women. More than 200 million girls and women alive today have undergone FGM in 30 countries in Africa, the Middle East and Asia where FGM is practiced. FGM can cause severe bleeding and problems urinating, and later cysts, infections, as well as complications in childbirth and increased risk of newborn deaths. Sunday, 6 February, 2022 marks the International Day of Zero Tolerance for female genital mutilation (FGM). This year’s theme is "Accelerating Investment to End FGM" — calling for support for programmes to provide services and response for those affected and those at risk; in developing and enforcing laws, and fortifying institutional capacity to eliminate the practice. UN women has developed a rapid and targeted response to mitigate the impact of the covid - 19 crisis on women and girls and to ensure that long - term recovery benefits them, focused on five priorities: Gender - based violence, including domestic violence, is mitigated and reduced. Social protection and economic stimulus packages serve women and girls. People support and practise equal sharing of care work. ISBN: 978-93-5619-947-7 Women and girls lead and participate in Covid - 19 response planning and decision making. Data and coordination mechanisms include gender perspectives. Globally, 750 million women and girls were married before the age of 18 and at least 200 million women and girls in 30 countries have undergone FGM. The rates of girls between 15-19 who are subjected to FGM (female genital mutilation) in the 30 countries where the practice is concentrated have dropped from 1 in 2 girls in 2000 to 1 in 3 girls by 2017. In 18 countries, husbands can legally prevent their wives from working; in 39 countries, daughters and sons do not have equal inheritance rights; and 49 countries lack laws protecting women from domestic violence. One in five women and girls, including 19 per cent of women and girls aged 15 to 49, have experienced physical and/or sexual violence by an intimate partner within the last 12 months. Yet, 49 countries have no laws that specifically protect women from such violence. While women have made important inroads into political office across the world, their representation in national parliaments at 23.7 per cent is still far from parity. In 46 countries, women now hold more than 30 per cent of seats in national parliament in at least one chamber. Globally, women are just 13 per cent of agricultural land holders. Women in Northern Africa hold less than one in five paid jobs in the non-agricultural sector. The proportion of women in paid employment outside the agriculture sector has increased from 35 per cent in 1990 to 41 per cent in 2015. More than 100 countries have taken action to track budget allocations for gender equality. In Southern Asia, a girl’s risk of marrying in childhood has dropped by over 40per cent since 2000. Literally meaning 'Educate the Girl Child, Save the Girl Child' the Beti Padhao, Beti Bachao Scheme is an ambitious scheme of the Government of India which is intended to generate massive awareness, improvement of quality of welfare services for females and helping them (girls and women) access these services better. II. CONCLUSION From historic period to modern world the women were the target to men for revenge. Even though the Legislation are strict the man won’t change his attitude. He should understand, he gave birth into a boy only by a mother not by the father. He fed with milk by mother and grown up by his mother. He is having elder sister and younger sister and cousin.etc. But when he gets married with a woman and getting girl child he will become giant and treat them brutally. Positive revolutions 72 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 happen in his mind, then only women and girl child can lead a happy and gender equality life .It will leads to women empowerment. REFERENCE [1] https://www.who.int/news-room/fact-sheets/detail/female-genitalmutilation [2] https://wcd.nic.in/bbbp-schemes [3] https://www.census.gov/library/publications/1998 [4] https://blog.frontiersin.org/2017/12/27/frontiers-in-public-healthwomen-girl [5] https://lawrato.com/legal-help-center/family-law ISBN: 978-93-5619-947-7 73 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 AI based Drone Escort Ambulance Service System in Heavy Traffic S.Kiruthiga1, N.Beulah Jebaseeli2, Dr.D.Umanandhini3, Dr.S.Sridevi4 1,2 Assistant Professor, 3Associate Professor ,4Professor Department of Computer Science & Engineering, School of Computing Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, India Abstract: Every year 20% of emergency patient death is blamed on traffic jam delays. More than 50% of heart attack cases reach the hospital late. The major problem is that no one is responding until ambulance reaches them, it became a hard time for an ambulance to reach its destination. To avoid such situations, most of the European countries introduced “Police motorcycle Escorts” for clearing the way. To accomplish this, we propose Drones which are designed by neural network that travel through streets of city safely. It is designed as a fast residual network of eight layers, two outputs are produced by the drones for each single input image drone navigates using a steering angle while avoiding obstacles, and dangerous situations are recognized by a collision probability to let the UAV take action accordingly. Deployment in urban environments has so far been limited to certain extent. Keywords: Artificial Intelligence, Drones, Neural Network, Accident rescue System, UAV navigation. I. INTRODUCTION The lifesaving minutes after an occurrence of an accident is very critical and it is much needed to provide emergency care to prevent life of humans. Speeding up the emergency medical services is important to prevent deaths and screw up the recovery immediately. This is significantly true for drowning, heart failure, traumas and other respiratory issues. Lifesaving medical aids can be carried and services can be provided inspite of heavy traffic. Automation is about, using robots or materialistic components instead of human. We use artificial intelligence in these components or robots to work as like humans. Because of heavy traffic in urban areas, it’s impossible for ambulances to reach the destination in a short period. Most of the European countries use police escorts to clear the way for ambulance [4].Instead of using human energy or effort it’s better to use the technology. We use the technology in the form of drones with Artificial Intelligence. The main aim of our work is to make use of technology instead of human effort. Death rate due to ISBN: 978-93-5619-947-7 delay of ambulance can be decreased. Reducing the travelling time as much as by providing right (clear) way for the ambulance. Not only at the signals, throughout the way by which ambulance goes. Collecting the data accurately and efficiently can achieve in providing the service. This system can be used to avoid the obstacles and collisions. Being able to successfully navigate while avoiding obstacles, is indeed crucial to unlock many robotics applications.Alerting the vehicles is done using signals and voice commands. Death rate can be decreased which causes due to traffic delay. Drones can be used instead of Police escorts.Using AI for Drone controlling and avoid obstacles gives higher efficiency. Using AI technology more, reduces human effort. II. METHODOLOGY We arrange a set(3-4) of drones for an ambulance. Each drone has a different states(p1,p2,h,g,etc..) to work according the scenario in figure 1.P1- It alerts or indicates the vehicle to clear the way or to give space.P2- It finalize, whether the way is cleared in between P1 and ambulance as shown in fig 1. Else it informs or warns the vehicle to give the way ,if required it takes snaps of the vehicle plates. H- It halts the vehicles using red signal, where there are no signal points. It will wait for other drone to replaces its state or it can be used as a backup. Fig1. Drone Ambulance Path finding and Navigation UAV navigating through the streets successfully should be able to promptly react to dangerous situations as it follows the roadway as well . Therefore, we herein propose to use data collected from ground vehicles which are already integrated in environments as fore mentioned. 74 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Overall, this work makes the following contributions as shown in fig.2 LCD Display: The sensor values like airbag releasing , person status are displayed using this. Messaging Protocol—TWILIO: It is a cloud based communication system which uses (PaaS) platform as a Service in collision intelligent system. It serves from San Francisco, California. It allows techies toprogrammatically receive and make calls, text messages and communicate al functions using its web service API. Fig 2.a) Outdoor 1 b)outdoor 2 (c) Outdoor 3 Fig 3. (a)Model A b)Model B Fig.4: Block diagram 2.1 Description of Modules ATMEGA328 Microcontroller: AVR RISC-based microcontroller which 8-bit combines 32 KB ISP flash memory with-read –write capabilities. The above has the configuration 1KB EEPROM,32 general purpose registers, timers with compare nodes which are flexible. Internal and external interrupts.it operates between 1.8-5.5 volts. 2.2 Working The complete model of this accident detection and information passing method uses the above steps as shown in figure 4.GPS is used to detect the latitude and Longitude ,and a text message is sent to rescue team through GSM. Using EEPROM the message receiver number is pre-stored. It is also provided with an option to avoid false messages. Piezo an electronic device, generates voltage ,when it is deformed physically by vibration, mechanical strain and sound wave. It vibrates and creates a tone when a voltage passes across piezo, which is used to detect and play tones. Tracking and navigation is done by GPS .The vehicle is tracked without the intervention of the manual systems. Using this system on time emergency medical services can be provided to the accident victims who are injured, and their life can be saved. Particularly people living in Urban areas could not get immediate medical help due to heavy traffic, even if the patients are travelling in their own vehicle, so these drones can be used efficiently by employing artificial intelligence Technique to detect the exact location of accident spot and provide the medical services. Not only accidents this is also useful in case of emergency situations like Stroke Attack, Heart Attack, and other diseases where immediate treatment is needed. People can be saved in the Golden Hours with being much affected by the attacks. III. EXPERIMENTAL RESULTS GPS Module: GSM is abbreviated as Global System for Mobile Communication. For transmitting mobile and voice data services it is the digitalized cellular technology used. GPS is a specially designed unit for tracking the navigation of mobile objects and find its location. Vibration sensor: For measuring and analyzing the linear velocity, displacement and proximity and acceleration vibration sensors are used. PIR Sensor: It stands for passive infrared sensor (PIR sensor) which is an electronic sensor that measures infrared (IR) light that is radiating from objects in its field of view. It is mostly used in PIR-based motion detectors. ISBN: 978-93-5619-947-7 Fig.5: Location of occurrence of accident 75 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 IV. CONCLUSION In the proposed work ,when a vehicle meets with an accident, and after accident if there is no movement in the car or by the people in the car ,automatically the vehicle number and person details will be transferred to police control room and rescue team. So using GPS system the rescue team can easily locate the location where accident have occurred and send rescue assistance team immediately to the spot. GSM technology is employed to achieve wireless communication. The get more optimal results about the accident, sensors are used. This system can also be used in automatic traffic monitoring and estimation of traffic. Tracking of collision can be done intelligently and loss of life can be prevented well in advance. [15] Syed Ali Shahbaz,” Ambulance Drone Support System (ADSS), International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 4, Issue 3, May 2015. [16] Conor Mackle,” A Data-Driven Simulator for the Strategic Positioning of Aerial Ambulance Drones Reaching Out-of-Hospital Cardiac Arrests: A Genetic Algorithmic Approach” IEEE J Transl Eng Health Med. 2020; REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] Wang Wei, Fang Hanbo , Traffic accident automatic detection and remote alarm device, IEEE International Conference on Electric Information and Control Engineering, 2011. Mr.S.Iyyappan and Mr.V.Nandagopal ,Accident Detection and Ambulance Rescue with Intelligent Traffic Light System, International Journal of Advanced Technology and Engineering Research,2013. K.Athavan; S.Jagadeeshwaran, G.Balasubraminan, N.Dinesh, G.Abhilash, G.Gokul ,Automatic ambulance rescue System, 22nd IEEE International Conference on Tools with Artificial Intelligence, 2012. Amnesh Goel ,Sukanya Ray ,Nidhi Chandra, Intelligent Traffic Light System to Prioritized Emergency Purpose Vehicles based on Wireless Sensor Network , International Journal of Computer Applications , Volume 40 No.12, February 2012 . Mr.S.Iyyappan ,V.Nandagopal “Accident detection and ambulance rescue with intelligent traffic light system” International Journal of advanced Research in EEIE-2013. K.Sangeetha, P.Archana, M.Ramya , P.Ramya “Automatic Ambulance Rescue with Intelligent Traffic Light System” International organization of scientific Research journal of Engineering-2014 Mr. Sahil Gadroo, Mr. Pinkesh Jodhwani Mr. Gunveer Singh Mr. A. D. Londhe “Automatic accident detection and ambulance rescue system” International journal of scientific &engineering research,2015 Hrishikesh Murkut, Fazal Patil, Vishal Yadav, Meghana Deshpande “Automatic accident detection and rescue with ambulance”SSRG International journal of ECE-2015 . R. Kannan , R. Nammily, S. Manoj , A. Vishwa, ” Wireless Vehicular Accident Detection and Reporting System”, International Conference on Mechanical and Electrical Technology,2010. Vikram Singh Kushwaha , Deepa Yadav, Abuyeed Topinkatti, Amrita Kumari . “Car Accident Detection System using GPS And GSM”, 2015. Nimisha Chaturvedi, Pallika Srivastava . “Automatic Vehicle Accident Detection and Messaging System Using GSM and GPS Modem “,2018 C.Prabha, R.Sunitha, R.Anitha. “Automatic Vehicle Accident Detection and Messaging System Using GSM and GPS Modem”, 2014 Hoang Dat Pham, MichealDrieberg, Chi Cuong Nguyen, “Development of vehicle tracking system using GPS and GSM modem “,IEEE Conference on Open Systems (ICOS),2015 Lih-Jen Kau, Member, IEEE, and Chih-Sheng Chen, “A Smart Phone-Based Pockert Fall Accident Detection, Positioning And Rescue System”, 2013. ISBN: 978-93-5619-947-7 76 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Mathematical Modelling on Vaccine Distribution for Prevention of Covid Dr.P. Jamuna Devi,¹ D. Mahalakshmi² 1 Assistant professor, Department of Mathematics, A.D.M. College for women, Nagapattinam. Bharathidasan University. 2 PG Research Scholar, M.Sc Mathematics, A.D.M. College for women, Nagapattinam. Bharathidasan University. Abstract: Vaccines are a special kind of drug, the quality of which is highly sensitive to temperature and directly related to public health. Recently, numerous vaccine-related adversee events have occurred in the world, especially in developing countries, due to vaccines being exposed to inappropriate temperatures during their transportation. This paper consider the vaccine distribution for prevention of COVID. The number of people infected with COVID-19 virus in Brazil was about 529,405 the number of death in 30,046 the number of recovered is 211080, and the number is subject to increase. This is due to the delay by a number of countries in general, and Brazil in particular. In taking preventive and proactive measures to limit the spread of the COVID-19 pandemic. Optimizing COVID-19 vaccine distribution can help plan around the limited production and distribution of vaccination, particularly in early stages. One of the main criteria for equitable vaccine distribution is predicting the geographic distribution of active virus at the time of vaccination. The research developed sequencelearning model to predict the behavior of the COVID-19 pandemic. It is based on the previously reported information, we formulate and theoretically analyze a mathematical model of COVID-19 transmission mechanism incorporating vital dynamics of the disease and two key therapeutic measures-vaccination of susceptible individuals and recovery/treatment of infected individuals. Both the disease-free and endemic equilibrium are globally asymptotically stable when the effective reproduction number (V) is repectively, less or greater than unity. We propose to study an optimal control approach with delay in state and control variables in out mathematical model proposed by Kouidere et al. Considers seven stages of infection: susceptible(S), infectious(I), quarantined(Q), recovered(R), deaths(D), and vaccinated(V). Initally, a mathematical analysis is carried out to illustrate the nonnegativity, boundedness, and the basic reproduction number of the proposed model. Keywords: Mathematical modelling, Optimal control, vaccine distribution, SEIR Model. 1. INTRODUCTION On December 31, 2019, the chinese authorities announced a dangerous virus outbreak in the Chinese city of Wuhan. The virus was temporarily called the novel Coronavirus nCoV-19, then the International Virus Classification Committee named it (SARS-CoV-2) [19,20]. This virus belongs to Corona viruses COVID-19 that infect the human respiratory system from seasonal colds. The danger of the novel Coronavirus 2019 lies in the fact that the infected person does not show symptoms of the disease in the incubation period, which ranges from ISBN: 978-93-5619-947-7 two days to 14 days. The person then shows mild symptoms such as sneezing, a slight rise in temperature, then severe fatigue, a dangerous rise in temperature, difficulty breathing, and failure to breathe that leads to death. According to the World Health Organization, The novel Coronavirus COVID-19 belongs to the strains of Coronaviruses, which are transmitted from animals to humans and between humans. The most prominent of these is the SARS virus, which also appeared for the first time in China and infected about 8098 people and caused the death of 774 people. The source of this virus was bats. Comapared to the rest of the Coronaviruses, COVID-19 virus is considered the most dangerous and the fastest in spread. Up to June 02, 2020, this virus caused about 6,400,055 infected cases, 378,069 deaths and 2,930,682 recovered cases. Following this huge spread around the world. The WHO declared a state of emergency. In USA, about the infected individuals reached 1,859,772 and the deaths reached 106929. In Brazil, 529,405 people were infected and 30,046 died. In Russia, about 423,741 people were infected and 5037 died. According to the last states declared on June 02, 2020. The epidemic has moved from China to Europe and to USA and now to South America, which has become the main epidemic area according to the World Health Organization. On February 26, 2020, Brazilian authorities announed the first case of COVID-19, the first case recorded in South America, of a Brazilian national from Italy. The spread of the COVID-19 virus was initially stable. Then in recent weeks, where the spread of the virus has experienced tremendous acceleration, reaching in June 02, 2020, 3 months after the registration of the first case, approximately 529,405 infected, 30,046 deaths. Brazil has become the second country in the world in terms of infected, after the United States of America. Where he recorded in State of S ao Paulo about 109,698 infected, followed by State of Rio de Janeiro about 53,388 infected,and in State of Ceará about 48,489 infected, and in State of Ama-zonas about 41,378 infected.A large number of mathematical models have been developed to simulate, analyse and understand the Corona virus. In a related research work. They found that the model is locally asymptotically stable at disease free equilibrium Eo when Ro<1 and when Ro> 1, endemic equilibrium exists and becomes stable. In their research, 77 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 equilibriunm points are also globally asymptotically stable under certain conditions. Delay in applying precautionary and preventive measures, such as: The delay in schools closure in the affected countries. The delay in closing airports and ports in a timely manner. The delay in suspending air, land and navigation travels from and to the affected countries. The delay in applying precautionary, preventive and strict mea-sures when receiving travelers. The delay in diagnosis of the infected cases, given that symp-toms do not appear in the disease's incubation period. The tolerance of others in the passage of passengers through airports in some countries. The delay in diagnosis of infected cases, especially as symptoms does not appear in the disease's incubation period. The delay in imposing quarantine among patients increases the spread of the disease. Mathematical epidemic models based on the SIR model are widely used to study the spread of a disease in a population . Recently, several mathematical models have been developed to study the transmission dynamics of COVID-19 . However, these models suffer from various sources of uncertainties, due to the incomplete description of the biological processes governing the disease spread, and also due to some involved parameters being poorly known. One way to mitigate these uncertainties is to constrain epidemic forecasting models with available data. An extended SEIR model comprising of seven compartments-susceptible, exposed, infectious, quarantined, recovered, deaths, and vaccinated is then proposed. First, we conduct a mathematical analysis to illustrate the non-negativity, boundedness, epidemic equilibrium, existence, and uniqueness of the endemic equilibrium, and the basic reproduction number of the model. A Joint- COVID-19 is transmitted from human to human viadirect contact with contaminated surfaces and through respi-ratory droplets' inhalation from infected individuals. Presently, there is no vaccine or antiviral treatment approved for the prevention or management of COVID-19. To effectively reduce the spread of COVID-19, governments have been implementing various control measures such as imposing strict, mandatory lockdowns and encouraging (and in some cases strictly enforcing) other measures such as individuals maintaining a minimum distance between themselves (social distancing), avoiding crowded events, imposing a maximum number of individuals in any gather-ing (religious and social), and the use of face masks in public. To further help mitigate the spread of COVID-19, con-tact tracing of suspected infected cases has been stepped up in Several countries and detected cases (asymptomatic and symptomatic) are quickly placed in isolation for prompt treatment. Thailand has begun opening its borders to foreigners and with the ISBN: 978-93-5619-947-7 growing cases in the USA and Europe, there is a con-cern that COVID-19 cases in Thailand may rise soon. Hence, this study is aimed at (i) formulating a mathematical model to understand the dynamics of the COVID-19 pandemic in Bangkok, Thailand, (i) examining the impact of the control measures currently employed in Thailand, and (ii) deter-mining if these measures will be effective in preventing COVID-19 cases in Thailand. The remainder of this article is structured as follows. The proposed model is presented in Mathematical Model Formulation and Description. The mathematical analysis of the model is presented in Analysis of the Model. The results obtained from Mathematical modeling for prevention of COVID Finally, the conclusion drawn from this study is given in Conclusion. II. MATHEMATICAL MODEL FORMULATION AND DESCRIPTION We consider a mathematical model SIW ICHR of kouidere et al., that describes the of transmission of novel coronavirus “COVID-19”. We divide the population denoted by N into six compartments: susceptible population Brazil S, the infected without symptoms IW , the infected with symptoms I, the infected with complications C, the number of people who have been quarantined in hospitals H and recovered R. Hence, we present the COVID-2019 mathematical model is gov- erned by the following system of differential equation: = = S(t) - –( + + = + = I(t) – ( )C(t) = –( )H(t) = σH(t) −μR(t)dt + ) I(t) …….(1) where S(0) ≥ 0 , IW (0) ≥ 0 , I(0) ≥ 0 , C(0) ≥ 0 , H(0) ≥ 0 and R (0) ≥ 0 are the initial state. With : Denote the incidence of susceptible in Brazil. μ: natural mortality β1 : The rate of people who were infected with the virus by contact with the infected patients without symptoms The rate of people who were infected with the virus by communicating with the infected patients with symptoms. α2 : The rate of people have developed a rapid and dangerous development of the disease due to immunodeficiency, old age or children. - 78 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 α3 : The rate of people complications such as pulmonary failure. - have severe - - - - - +( ) S(t) 0 We obtain then dtd Integrating this inequality from 0 to t gives: ds ≥ 0 then t Sds ) . Similarly, we prove that IW (t ) ≥ 0 I (t ) ≥ 0 , C (t ) ≥ 0 , H (t ) ≥ 0 and R (t) > 0 . Fig. 1. Accumulated cases of COVID-19 in Brazil after 4 months θ1 : The rate of people with symptoms of mild virus who have been quarantined. θ2 : The rate of people with serious complications who have been quarantined. σ: The rate of people who recovered from the virus. δ1 : Mortality rate due to complications. δ2 : The rate of people who died under quarantine in hospi- tals. Fig. 1 shows that, if Brazil does not apply preventive precau- tions to reduce the spread of the COVID-19 pandemic, the number of COVID-19 infected cases is likely to reach millions. - Theorem 2: The disease free equilibrium point E 0 is locally asymp- totically stable if R 0 < 1 and unstable if R 0 > 1 . Proof. The Jacobian matrix of system at the disease free equilibrium point E 0 as follows: From the jacobian matrix J(E 0 ) we obtained a characteristic polynomial: p(λ) = (μ+ λ)(λ2 + aλ+ b) = 0 with a b − 2.1. Model Basic Properties Theorem 1: If S(0) ≥ 0 , IW (0) ≥ 0 , I(0) ≥ 0 , C(0) ≥ 0 , H(0) ≥ 0 and R (0) ≥ 0 , the solutions S(t ) , IW (t ), I (t ), C (t ), H (t We see that the charac- teristic equation p(λ) of J(E 0 ) has an eigenvalue λ1 = −μ is neg- ative. So, in order to determine the stability of the E 0 , we discuss the roots of the following equation λ2 + aλ+ b = 0 . ) and R (t) of system are positive for all t ≥ 0 . Proof. It follows from the first equation of system that dS(t) S(t) IW (t) S(t) I(t) ISBN: 978-93-5619-947-7 By Routh-Hurwitz criterion, system is locally stable if a > 0 and b > 0 . Obviously we see that a and b to be positive, (1 − R 0 ) must be positive, which leads to R 0 < 1. So E 0 is stable if R 0 < 1 and unstable if R 0 > 1. 79 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 In addition, for biological reasons, we assume, for ϕ ∈ [− τ, 0 ], that S ϕ , IW ϕ , I ϕ , C ϕ , H ϕ and R ϕ are nonnegative continuous func- tions and u ϕ = 0 , v ϕ = 0 , w ϕ = 0 and z ϕ = 0 . III. THE OPTIMAL CONTROL PROBLEM 3.1 Problem Statement As of today June 02, 2020, there is no cure or vaccine for the disease. So, we suggest the following strategies: there are four con- trols u (t) , v (t) , w (t) and z(t) for t ∈ [0 , T ], that represent consec- utively the awareness program through sensitization and preven- tion, quarantine and health monitoring, diagnosis, monitoring and the last is treatment and psychological support with follow-up at time t. In order to have a realistic and logic model, we need to take in consideration that the movement of controlled individuals from the compartment of Infected without symptoms ( IW ) to quar- antined in hospitals ( H), and transition by the contact between In- fected without symptoms (Respectively Infected with symptoms) with susceptible to susceptible, and the transition of Infected with symptoms (Respectively Infected with complications) to quaran- tined in hospitals, and the transition of quarantined in hospitals to rocovered is subject to a delay. Thus, the time delay is introduced into the system as follows: at the moment,Thus, the delay is intro- duced into the system as follows: in time, only a percentage of in- dividuals ( IW , C, I, H) that have been treated and controlled τi time unit ago, that is to say that at the time k −τi with i ∈ { 1 , 2 , 3 , 4 }, are removed to other compartments. So, the mathematical system with time delay in state and con- trol system of variables is given by the nonlinear retarded system of differential equations: = - - - + ) 3.2 Model Basic Properties 3.2.1 Boudedness of the Solutions Theorem: The set ( S, IW , I, C, H, R ) ∈ R 6+ / 0 ≤ S + IW + I + C is positively invariant under system with initial conditions, S(0) ≥ 0 , IW (0) ≥ 0 , I(0) ≥ 0 , C(0) ≥ 0 , H(0) ≥ 0 and R (0) ≥ 0 . Proof: By adding the equations of system we obtain = N(t) + N(0) If we take limit t → ∞ we have . It implies that the region is a postivily invariant set for the system. IV. EXTENDED SEIR MODEL We extend the SEIR model to seven compartments to simulate the epidemic of COVID19. Seven state variables are considered within a population, that is, S(t), E(t), I(t), Q(t), R(t), D(t), and V(t), denoting the number of susceptible, exposed (infected, but not yet infectious), infectious (not yet quarantined), quarantined (confirmed and infected), recovered, dead, and vaccinated cases, respectively. The disease transmission flow of the proposed model is sketched in Figure 1. The model is then governed by the following set of nonlinear ordinary differential equations: = + C - - ) = = (1 - u(t)) -( + (1 - u(t)) (t) – W(t) (t) I(t) – = I(t) – I(t) = = v(t)I(t) –(1-k)λQ(t)– kρQ(t) = + )C(t) – = (1-k) λ Q(t) – v(t)C(t) = )) w( ) – z(t)H(t) = = k ρ Q(t) )H(t) + H(t) - ISBN: 978-93-5619-947-7 )+C )) = with non-negative initial conditions S(0) = , E(0) = , I(0) = . The coefficients ρ represent the new births and new residents per unit of time, 80 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 transmission rate divided by N, vaccination rate natural death rate, average latent time, average quarantine time, mortality rate, average days until recovery, and average days until death, respectively. is the vaccine inefficacy (0 ≤ σ ≤ 1). So 1 − σ represents the vaccine efficacy. If σ = 0, the vaccine offers 100% protection against the disease. N = S + E + I + Q + R + D + V is the total population size. Finally, system (1) is solved using a fourth-order Runge– Kutta method. Fig.2: Disease transmission flow 4.1 Problem Definition The COVID-19 vaccine distribution problem is studied. The current distribution network does not have a defined pattern, and the strategy used shows political biases that benefit some states and leave others vaccinefree. In general, COVID-19 vaccines that come from international sources typically enter a country via airline and are initially stored in a central warehouse usually located in transported via intermediate cross-dock to states or DC. In most countries, the legacy medical supply chains typically have a four-tier arborescent structure for vaccine distribution. Although there might be one less or one more tier and the tiers might have different names. We can see that the largest number of vaccines available in Mexico as of June2021 is from Pfizer with 39.30%, followed by Sinovac with 20.40% and AstraZeneca with 19.73%. The least number of vaccines that has been received is CanSino and Sputnik V with 13.54% and 6.99%, respectively. Vaccines require storage and transport in a temperature-controlled environment. Therefore, the vaccination strategy has areas of opportunity and represents an interesting and difficult problem. V. RESULTS ANALYSIS The mathematical models used in the supply chain for vaccines and the performance measure used can be costs, as is traditionally done; however, there are other measures of interest such as response capacity, availability of vaccines, use of resources, or the number of lives that can be saved either in a number of people or years of life. In this work, the total cost of transporting the vaccines to the distribution centers that will be in charge of distributing the vaccines to the state health centers is used as a performance measure; however, due to the information ISBN: 978-93-5619-947-7 available from official authorities, this analysis will be done to compare the current distribution of vaccines against the results of the model; in this way, our analysis is based on showing which is the best way to use the resources for distribution of vaccines against COVID-19. The main interest of this work is to show the assignments to the state distribution centers and to show that there are better schemes for the use of resources. The Mexican Government has designed a set of airline and land routes to distribute vaccines to the 32 states; The case study results show a distribution proposal that can be taken into account for the redesign of the airline routes proposed by the Mexican Government. It is important to emphasize that our proposal does not consider the definition of distribution routes; it only indicates the sites where the cross-docks should be placed and shows which states could be supplied with vaccines to optimize the distribution network’s costs. The cross-docks that must be opened and operated to receive vaccines from authorized laboratories and the international supply are Mexico City, Queretaro, were proposed considering their capacity and infrastructure for international arrivals and geographic position to supply the rest of the Republic States. The distribution of Republic States that would be provided from the open cross-docking to minimize the fixed and operational costs of the distribution network and guarantee the supply of vaccines in the shortest possible time. The model presented guarantees the sources will supply all open cross-docks to have the entire vaccine portfolie to supply the total demand of the states. However, it is important to highlight that the model does not consider the shortages in deliveries or vaccines. The vaccine requirements to attend 83.5 million people in 2021 with at least one dose of the vaccines available in Mexico. where it can be seen that 52% of the vaccines are administrated by the Mexico City cross-dock, which is the main airport of the country. V. CONCLUSION A mathematical model SIwICHR of kouidere et al, that described the spread of COVID-19 virus in Brazil. We divided the population denoted by N into six compartments, susceptible population Brazil S, the infected without symptoms Iw, the infected with symptoms I, the infected with complications C, the number of people who have been quarantined in hospitals H and recovered R. We analyzed a mathematical model and the local and the global stability of COVID-19 free equilibrium and COVID-19 are obtained. We also studied the optimal control with delay which represents measuring the extent of interaction with the means of treatment or awareness campaigns. that if preventive and proactive measures are implemented, such as awarenessraising and quarantine campaigns in all overe Brazil, the spread of the COVID-19 epidemic will be reduced, thus the number of people infected with the virus and the number of deaths will be reduced. We applied the results of the control theory and we managed to obtain the 81 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 characterizations of the optimal controls. The paper presented an extended SEIR model with seven stages of infection, including vaccination, to simulate and predict the development of the novel COVID-19 Outbreak. [16] [17] Results also show that intensifying the vaccination campaign significantly decreases the number of Confirmed cases and deaths. The proposed model can serve as a tool for health authorities to plan, prepare, and take appropriate measures and decisions to control the pandemic. The equilibrium point relating to the formulated model was computed. Using the T next generation matrix approach, the basic reproduction number denoted as relating to the model was also computed. However, it will take a while before the vaccines are made readily available in all countries worldwide. Therefore, the use of face masks should be made compulsory till the vaccines are available for everyone. We propose that future researchers implement the model proposed in this study to the second wave of infected cases in to explore the efficiency to the current measures used to prevent COVID-19. [18] [19] [20] [21] [22] [23] [24] Manufacturing &Service Operations Management, 18(3), 332346. Degardin, K., Roggo, Y., & Margot, P. (2014). Understanding and fighting the medicine counterfeit market. Journal of Pharmaceutical & Biomedical Analysis, 87, 167-175. "Bangkok and five other provinces close malls and 25 other locations (with clip)," Thairath Online (in Thai), 2020, Retrieved March 29 2020. "Nearly 100,000 flock home on tour buses to flee COVID!(32] Transport Minister orders 7-step procedure," Khaosod (inThai), 2020, Retrieved March 29 2020. "PM declares state of emergency effective March 26 in response to COVID-19, maintains there is no curfew yetThe Standard (in Thai)Retrieved March 29 2020. "Curfew starts today," Bangkok Post, 2020, Retrieved April 3 2020. J. Kuhakan, Thai Trafic Back to Gridlock as Coronavirus MeaSures Ease, Reuters, 2020. J. Harmer, 39 Chinese Are Thailand's 1st Foreign Tourists in 7 Months, Associated Press, 2020, Retrieved October 21 2020. A. Wipatayotin and S. Chaolan, Infected Tourist on Samui, Bangkok Post, 2020, Retrieved October 26 2020. A. O. Egonmwan and D. Okuonghae, "Mathematical analysis of a tuberculosis model with imperfect vaccine," International Journal of Biomathematics, vol. 12, no. 7, article 1950073,2019. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] World Health Organization (WHO). Coronavirus Disease (COVID-19) Outbreak Situation. Available online: https://www.who.int/emergencies/diseases /novel-coronavirus2019 (accessed on 17 December 2020). Kermack, W.O.; McKendrick, A.G. A contribution to the mathematical theory of epidemics. Proc. R. Soc. Lond. 1927, 115, 700-721. Giraldo, J.O.; Palacio, D.H. Deterministic SIR (SusceptibleInfected-Removed) models applied to varicella outbreaks. Epidemiol. Infect. 2008, 136, 679-687. [CrossRef] [PubMed] Fung, LC.H. Cholera transmission dynamic models for public health practitioners. Emerg. Themes Epidemiol. 2014, 11, 1-11. Trawicki, M.B. Deterministic SEIRs epidemic model for modeling vital dynamics, vaccinations, and temporary immunity. Mathematics 2017, 5, 7. [CrossRef] Bjornstad, O.N.; Shea, K.; Brzezinski, M.; Altman, N.S. The SEIRS model for infectious disease dynamics. Nat. Methods 2020, 17, 557-558. [CrossRef] Kumar, S.; Ahmadian, A.; Kumar, R.; Kumar, D.; Singh, J.; Baleanu, D.; Salimi, M. An efficient numerical method for fractional SIR epidemic model of infectious disease by using Bernstein wavelets. Mathematics 2020, 8, 558. [CrossRef] Cooper, L; Mondal, A.; Antonopoulos, c.G. A SIR model assumption for the spread of COVID-19 in different communities. Chaos Solitons Fractals 2020, 139, 110057. [CrossRef] Bärwolff, G. Mathematical modeling and simulation of the COVID-19 pandemic. Systems 2020, 8, 24. [CrossRef] Ndairou, F; Area, I; Nieto, JJ; Torres, D.F. Mathematical modeling of COVID-19 transmission dynamics with a case study of Wuhan. Chaos Solitons Fractals 2020, 135, 109846. [CrossRef] Chick, S. E., Hasija, S., & Nasiry, J. (2017). Information elicitation and influenza vaccine production. Operations Research, 65(1), 75-96. Chick, S. E., Mamani, H., & Simchi-Levi, D. (2008). Supply chain coordination and influenza vaccination. Operations Research, 56(6), 1493-1506. Clements, C. J., Lawrence, G. L, & Macartney, K. K. (2017). Vaccine safety. Reference Module in Biomedical Sciences. Crawford, N. W., Clothier, H., Hodgson, K., Selvaraj, G., Easton, M. L, & Buttery, J. P. (2014). Active surveillance for adverse events following immunization. Expert Review of Vacines, 13(2), 265-276. Dal, 1., Cho, S., & Zhang. F. (2016). Contracting for on-time delivery in the U.S. influenza vaccine supply chain. ISBN: 978-93-5619-947-7 82 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Recent Trends in Tithe Green Banking Products and Services in India Dr. D. Murugan Department of B. Com (BM & CS), School of Business Studies, Hindustan College of Arts and Science, Padur, Chennai -603 103 Abstract: Green Banking is also called as the ethical banking which aims to protect the environment and reduce the carbon footprint from banking activities. It encourages banks to carry out environment-friendly investments by combining its operational improvements and technology know-how in banking business activities. Green Banking has started priority lending to those industries which are already green or putting its efforts to go green. The aim of going green is to increase the energy efficiency and to use the biodegradable products. The performance of banks largely depends upon the performance of its clients. The banks have to diligently check that the customer’s projects are meeting all the legal and environmental compliances as any failure can result in nonperforming assets for the banks. The concept of going green is new in India and has been adopted by the Indian banks in many forms. Banks have started providing services of online banking. Keywords: Green Banking, ATM, Green Mobile Banking, Green credit cards, Green Mortgage Loan, Online Banking and SWOC Analysis. I. INTRODUCTION The banking sector in India is the lifeline of the nation. It is the largest financial sector in India. Indian banks have the potential to become fifth largest in the world by 2020 and third largest by 2025. Banks have helped in country’s economic development and have transferred the hopes of people into the reality. In recent years Indian banks have witnessed the growing trend and have transformed its operational strategies to a large extent. The banking sector in India has gone through many challenges which include a shift in consumer behaviours, technological changes, regulatory changes, etc. It has faced various ups and downs and has become adaptive to the changing environment. Green Banking is different from traditional banking as it is the concept of promoting sustainable development in the country. Green Banking is the new phenomenon in the financial world which concentrates on environmental and socially responsible investing. In the era of Globalisation, global warming is becoming one of the major issues across the world. The effects of Global warming have found to be responsible for the destruction of the climate changes which have impacted the land, water and human resources of the world. As people of the society are becoming more concerned about the depletion of natural resources, organisations have started performing their corporate social responsibilities. They ISBN: 978-93-5619-947-7 have started modifying their working techniques to maximise the greenery and to reduce the impact of their activities on the environment. 1.1 Meaning and Concept of Green Banking In today’s society, climate change is a most complicated issue. Nowadays, people are more conversant with global warming and its inherent consequences on human life (Sharma, 2013). So, change is imminent in present scenario for the survival, and continuous efforts are made to the environmental management (Elkington, 1994) in a sustainable manner. It is the matter of concern for the government and the direct polluters and also for other stakeholders like financial institutions. This includes banks, which are playing a fundamental role in the development of the society. Although banking activities are not physically related to the environment, yet it is an external impact of the customers which is substantial for them. To reduce the carbon footprint from the environment substantially, it is required by banks to promote those products, process and technology which adhere to it. Therefore, banks are adopting green strategies into their buildings, operations, and investments and financing strategies. The banking industry in India witnessed many changes and introduced a lot of technical changes (Curry and Moutinho, 1993) that changed the definition of banking. Many functions were included in the process other than the core ones. However, in the twentieth century when everyone was hailing about sustainable development banking industry went into yet another revamp. Many studies undertaken back then proved that banks were a major source of environment degradation and increased the level of carbon footprint. As per the requirement, sustainable development was seen as the only option in order to reduce the factors giving birth to global warming (Elkington, 1994). Already much advancement has been undertaken by the banking industry and to support sustainable development; Green Banking was taken to be a common answer to all the environment related problems. With the widespread use of internet banking, mobile banking and cashless transactions, it is easy to implement the concept of Green Banking. In order to promote the use and implementation of Green Banking, a general campaign was launched by 83 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 NDTV under the name Greenathon. Inspired by this campaign many banks started to finance those projects which were eco-friendly and included provisions for providing energy efficiency. Green Mortgages. The importance of Green Banking is immense for the overall economy as it mitigates Credit Risk, Legal Risk and Reputation Risk involved in the banking sector. The increasing adoptable symbol of Ecoconsciousness in the world is green. According to Indian Banks Association (IBA, 2014) “Green Bank is like a normal bank, which considers all the social and environmental/ecological factors with an aim to protect the environment and conserve natural resources”. It is also known as an ethical bank or sustainable bank. The purpose of these banks is to perform banking activities alongside with taking care of earth’s environment, ecology and natural resources including biodiversity. The key reasons for going green are: Credit Risk: Customers affected by credit risks (Kiesel and Spohnholtz, 2017) due to lending are those whose businesses are affected by the pollution cost, changes in environmental regulations and new requirements on emissions levels. It is higher due to the probability of customer default arising due to uncalculated expenses for capital investment in production facilities, loss of market share and third party claims. Legal Risk: Banks are likely to face legal risk (Charlier, 2000) if they violate environmental regulation rules. They may also face risk of direct lender liability for cleanup costs or claims for damages in case they actually take possession of pollution causing assets. Reputational Risk: Banks are prone to loss of their reputations (Saleuddin, 2014) if they indulge in environmentally damaging projects. Increase in consumption and of energy Increase in energy prices Increase in demand for environmentally-friendly goods and services by consumers Higher expectations by the public on Ban’s environmental responsibilities The emergence of stricter regulatory and compliance requirements. The concept of Green Banking or Green initiatives taken by Banks is making technological improvements, operational improvements and changing client habits in the banking sector. It means promoting environmentalfriendly practices and reducing the carbon footprint of banking activities. Green Banking is not only a Corporate Social Responsibility (CSR) (Narwal, 2007) activity of an organisation, but also it is about making the society habitable without any considerable damage. For banking professionals, Green Banking involves the tenets of sustainability, ethical lending, conservation and energy efficiency. This comes in many forms: Increasing Use of online and reduce use of branch banking Performing online payments instead of using emails Opening online bank accounts, instead of large multibranch banks Finding that local bank in their vicinity which supports local green initiatives. The concept of Green Banking is mutually beneficial to the Consumers, banks, industries and the economy. For consumers, this shift towards Green Banking means that more deposit and loan products will be available through online and mobile banking. It also means better deposit rates on Green Deposits and Green savings accounts and lowers interest rates for Green Mortgages. For banks, adoption of Green Banking services leads to paperless banking, energy saving, etc. This is an effort by the banks to make the industries grow green through prudent use of ISBN: 978-93-5619-947-7 1.2 Commencement of Green Banking Initially, the banking industry was considered to be a most relaxing job. Employees would wind up their work by four in the evening and would also do the pending work the next day. Backdate entries were common as the ledger were posted manually. This gave an opportunity to the bankers to become lazy and also frauds became common. Another very major drawback of the traditional banking was that the cash timings were till two in the afternoon. After that, there was neither the facility of withdrawal or deposit. Moreover, if anyone required money in an emergency, then the person has to borrow it from relatives or friends. Moreover, in many cases, there were casualties as the required amount of money could not be arranged in order to treat the patient. It was also seen that there was extensive use of paper which in turn resulted in deforestation. Post new economic policy (Gorton, and Huang, 2002) the role of banking increased manifolds, and their participation in the economy became more and more significant. Apart from the core banking activities like accepting deposit and giving out loans, banks started many other activities as well. The other activities included insurance, debit card, credit card, message alert and insurance. Although the first ATM (Sharma, 2013) in India was launched in 1989 by HSBC, it was not popular among the clients as well as banks. Slowly after 1990, all banks started the process of launching ATMs and debit cards in order to reduce the workload in the branch as more and more people started using banking services. Even though the ATMs allowed cash withdrawal for 24*7 customers fear using them as it was a new technology, and they were unaware of its use. Hence, even after 84 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 having debit cards, customers rushed to the branches for withdrawing money. To solve this problem banks launched awareness campaigns in which the customers were taught how to use ATM and also its importance. Eventually, the clients started using ATMs when a new concept of internet banking was launched by ICICI bank. This facility allowed the clients to access all the functions of the bank by themselves using the internet. They had to register for the service and obtain an ID and password. Through this, they could access their account by visiting the site of the bank. Online transfer, bill payments, examination fee payment and online purchasing became much easy. Even though one could not withdraw or deposit money through internet banking but transfer entries made realising the payment to anybody much easy. This in turn led to an increase in the product range of the bank making banking transactions very simple. Adding to the innovations in banking industry Union Bank became the first ever bank to launch a talking ATM in 2012. These ATMs were specially designed for physically challenged and visually impaired people. After the first launch, SBI made it a point to launch real talking ATMs across India. Making it even easier for the clients to operate, ICICI Bank launched the concept of mobile ATM. This meant a van would carry an ATM from place to place and people could withdraw and deposit money as in any other ATM. Similar to ATMs the banks launched another machine for depositing cash into the account through the debit card itself. Through this step, RBI tried to reduce the movement of cash and customers for cash transactions so that employees could manage branches easily. It reduced the long queues in banks and also zeroed the time limitation on withdrawal and deposit of cash. during that period. With the closure of Alexander Company (Anitha and Rao,1998), The Bank of Hindustan failed as well in 1832. The new twist in the history of the banking sector of India came when the three Presidency States set up their respective banks in their domains, namely, The Bank of Bengal (1806), The Bank of Bombay (1840) and The Bank of Madras (1843). These banks were established by the East India Company in order to lend and safeguard money. These banks (Bonin, 2016) enacted all th e responsibilities of a central bank an d carried out the activities in their respected vicinity. The first proper commercial bank of India was established after the Joint Stock Companies Act was passed in 1850. Following the suit, Oudh Commercial Bank emerged on the horizon of Indian Banking industry in the year 1881 and further in 1894 Punjab National Bank was the next milestone. After that, the banking industry adhered to mushroom growth where banks sprang in every hook and cranny of the country owing to the absence of proper rules and regulations. This led the failure of these banks at the same speed with which they have been coming up in the competition . Looking into the matter more seriously the Indian government was compelled to pass the Indian Companies Act in 1913 after analysing the hardcore failure and crisis of different commercial banks. After that, the banking industry saw many changes two of them being the merger of three Presidency Banks into one single Imperial Bank (1920) and the establishment of an apex bank for controlling all the banks, i.e., Reserve Bank of India (1935). 1.3 Commencement of Commercial Banking 1.5 Green Banking Products and Services Commercial banking was unknown to the Indian economy in the ancient era. However, various accounts of the learned people and various travellers depict the existence of merchants and moneylenders (Dadabhoy, 2013). They were rich and used to run a type of unorganised banking sector, but in only for lending money. The other activities were absent. People used to preserve their wealth in the form of gold that could be easily stolen. Thus, the gold was kept safely in the temples. While in the Mughal period the moneylenders and rich merchants achieved a significant position for providing and facilitating the exchange of trading instruments. Finally, in the British period, these unorganised bankers were shifted to the role somewhat similar to commercial bankers. These bankers were made to collect, store and loan the money to the British government. Commercially the very first bank was established in India in Calcutta in the year 1770. The bank was started by a European agency M/s. Alexander &Co. It was named The Bank of Hindustan. The main purpose of establishing the bank was to facilitate the trading practices There is a greater scope of Green Banking in India as constant planning and efforts have been laid in the field. As per the Happy Planet Index, India is making steady progress towards reducing the carbon emissions. The index shows that while in 2006 India stood at the 90th position in the race of reducing carbon emissions. The same index in 2009 showed an improvement in the position of India, and it moved from the 90th to the 35th place. Continuing the progress India is aiming at reducing the carbon emission by 20-25% till 2020. Thus, it shows that the economy of the country especially the banking sector has been working in order to prevent further environmental loss by reducing carbon emissions. The banking sector has thoroughly built its strategy keeping in mind the six major factors i.e. the 3Cs and the 3Ps. On one hand where the 3Cs stands for Cost, Control and Customer Service, 3Ps stand for Profit, Planet, and People. ISBN: 978-93-5619-947-7 The 3Cs are the important part of banking operations, and with the help of Green Banking, it all can be achieved 85 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 by the companies. Green Banking promotes online transactions, and it is the best way to enhance better customer services. The customers can avail all the facilities just by sitting at their place. They can access important information through laptops or even through smart phones. It is also a part of better customer services, and cost can also minimise. Thus, Green Banking has huge advantages for the banks as well as for the society. Green Banking is having two folds; one is promoting environmental practices through the introduction of Green Banking Financial Products and Services and second is reducing carbon footprints from banking activities on the environment. 1.6 Green Banking Financial Products and Services Green Deposits: Banks offer higher rates on commercial deposits, money market accounts, checking accounts and savings account if customers opt to conduct their banking activities online. Green Mortgages and Loans: The green mortgage is a type of debt given to the customers for making their homes more energy efficient and eco-friendly. Banks offer a green mortgage with better rates or terms for energy efficient houses. The Ministry of Nonrenewable Resource in association with some nationalised and scheduled banks undertook an initiative to go green by paying low-interest loans to the customers who would like to construct houses or buildings with energy efficient designs and would like to install gadgets that are environmentally safe like solar equipment, energy-efficient windows, geothermal heating or water heaters (Rouf, 2012). The savings in monthly energy bills can offset the higher monthly mortgage payments and save money in the long run. Green Credit Cards: Green credit cards are helpful in reducing the personal carbon footprint of each and every client. The scheme is mainly launched in order to increase the use of plastic money (debit and credit cards) in place of currency notes. A green credit card facilitates cardholders to earn rewards/points through redeeming it for contributions to eco-friendly charitable organisations. These cards offer an excellent incentive for consumers to use them for their expensive purchases. As per a research if a person spends $1 from his/her green card then the carbon emissions would be reduced by two to four pounds. It means that if a person is spending $100 per week through green card then as per the calculations, it would be possible to stop 20,000 pounds of carbon emissions per year. Green Reward Checking Accounts: It is a bank product called reward checking accounts which pay a bonus to customers who are going green. This account helps the environment by utilising more online banking services (Roux, 2015) like online bill payment, debit cards, and online statements. Customers can earn higher checking account rates if ISBN: 978-93-5619-947-7 they meet monthly requirements that might include receiving electronic statements, paying bills online or using a debit or check card. Higher rates and ecofriendly living go hand-in-hand with this banking product. Mobile Banking: Mobile banking has the ability to check balances, transfer funds or pay bills from a mobile phone, which saves time and energy of the customers. It also helps in reducing the use of energy and paper of the bank. Most of the Indian banks have introduced this paperless facility. Online Banking: Online banking is the developing concept in young and corporate India. Online banking helps in additional conservation of energy and natural resources. Online Banking includes: o Paying bills online, o Remote deposit, o Online fund transfers, and o Online statements. It creates savings from less paper, less energy, and less expenditure of natural resources from banking activities. Customers save time by avoiding standing to queues and paying the bills from home online. Banking through ATMs: ATMs are becoming more powerful than before and banks are consciously driving its usages with the concept of branchless banking. A visit to an ATM helps customer accomplish myriad value-added transaction services like utility payments, pre-paid mobile re-charge, credit card payments, tax payments and much more. Carbon Footprint Reduction: Carbon footprint is a measure of the impact of activities on the environment. It relates to the amount of Green House Gases (GHG) (Gibbs and O’Neill, 2012) producing in day-to-day business while burning fossil fuels for electricity, heating, transportation, etc. Banks can reduce their carbon footprints by adopting the following measures: o Paperless Banking: Banks are switching their customers towards Online Banking and Mobile Banking to promote paperless banking. o Energy Consciousness: Banks save their energy consumption by developing energy consciousness, adopting effective office time management and automation solutions and using compact fluorescent lighting (CFL) which helps them considerably. In order to manage their offices and ATMs, banks are switching over to renewable energy (solar, wind etc.) resources. o Using Mass Transportation System: Banks are becoming fuel efficient organisation by providing common transport for a group of officials posted at one office. o Use of Solar and Wind Energy: To go green, usage of solar and wind energy is a preferable option. State Bank of India (SBI) has become the first bank in the country to venture into a generation of green power by installing windmills for captive use. As part of its Green Banking. 86 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 1.7 A SWOC Analysis: Green Banking are involved in those projects which are damaging the environment they are prone to loss of their reputations. 1.7.1 Strengths II. CONCLUSION Green Banking practice saves the time of customer as well as the bank. It reduces the cost of bank operation and cost to the customer too. The transaction can be done at any time and any place. By financing in solar energy and wind energy program, the bank is reducing the carbon footprint from the environment. 1.7.2 Weaknesses Lack of knowledge among the employees has been noticed. There are some geographical barriers for the implementation of Green Banking practices. All banks are not coming equally for the practice of Green Banking. Problem of security is always with Green Banking practices 1.7.3 Opportunities People are becoming more computer literate, so it is easy to start Green Banking practices and grape the customer toward the activities. Most of the customers are using ATM card only. So it is a time to start all the initiatives for Green Banking practices. Mobile banking and Internet banking is increasing day by day, so it is a time to spread Green Banking practices. 1.7.4 Challenges Startup face: Since it is a new concept, so the customer will take the time to adopt this. Higher operating cost: Green Banking requires talented, experienced staffs to provide proper services to customers and technology which costs highly. It requires renewable and recycling techniques, which is again costly. Diversification problems: Green banks restrict their business transactions to those business entities who qualify screening process done by green banks. With a limited number of customers, they will have a smaller base to support them. Credit Risk: Credit risks arise due to lending to those customers whose businesses are affected by the cost of pollution, changes in environmental regulations and new requirements on emissions levels. It is higher due to the probability of customer default as a result of uncalculated expenses for capital investment in production facilities, loss of market share and third party claims. Reputational Risk: If banks ISBN: 978-93-5619-947-7 Green Banking is the new phenomenon in the financial world which aims to protect the environment by promoting environmental-friendly practices through the introduction of Green Banking financial products and services and reduce the carbon footprint from banking activities. Wherein, Green Banking products and services include Online Banking, Mobile Banking, Banking trough ATMs, Green Credit Cards, Green Mortgages and Loans, Green Deposits and Green Rewards Checking Accounts. Carbon footprint is a measure of the impact of activities on the environment. It relates to the amount of Green House Gases (GHG) producing in day-to-day business while burning fossil fuels for electricity, heating, transportation, etc. Banks can reduce their carbon footprints by adopting the measures like Paperless Banking, Energy Consciousness, using Mass Transportation System, Use of Solar and Wind Energy. Green Banking offers various benefits over traditional banking which includes digitization of banking processes, 24*7 access facility, time effective and convenience. Green Banking is not only a Corporate Social Responsibility (CSR) activity of an organisation, but also it is about making the society habitable without any considerable damage. For banking professionals, Green Banking involves the tenets of sustainability, ethical lending, conservation and energy efficiency. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] Al-Tekreeti, S. M. and Beheiry, M. S. (2016). A Decision matrix approach to Green Project Management Processes. World Journal of Science, Technology and Sustainable development. Volume 13(3). Anitha, B. And Rao, S.P. (1998). Quality of Work Life in Commercial Banks. Discovery Publishing House. Bahl, Sarita. (2012). The Role of Green Banking in Sustainable Growth. International Journal of Marketing, Financial Services and Management Research. Ludhiana. 1(2), 27-35. Bonin, H. (2016). Colonial and Imperial Banking History. Routledge Publications. Dadabhoy, B. (2013). Barons of Banking. Random House India. Gibbs, D. and O’Neill, K. (2012). Green Entrepreneurship : Building a Green Economy? – Evidence from UK. Contemporary Issues in Entrepreneurship Research. Volume 2. Kiesel , F. and Spohnholtz, J. (2017). CDS spreads as an independent measure of Credit Risk. The Journal of Risk Finance. Volume 18(2). Roux, M. (2015). Finance Otherwise: The End of Banks? International Symposia in Economic Theory and Econometrics. Volume 24. Saleuddin, R. (2014). Reputation Risk Management in Financial Firms : protecting some small investors. Journal of Financial Regulation and Compliance. Volume 22(4). Sharma, K. (2013). Green Banking in India: A Roadmap to Success. IBMRD's Journal of Management and Research .Volume 2 (1). 87 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Art Authentication through Digital Techniques Dr. K. Hema Shankari Associate Professor, Department of Computer Applications, Women's Christian College, Chennai Abstract: This paper presented the digitalized authentication techniques to verify and certify the artworks. Artworks are complicated structures. And art forgeries are often difficult to identify when either the original artwork is missing or the forgers are highly talented to deceive the art experts. Apart from art forgery, various art crimes, such as art theft, have been increasing rapidly and known to be extremely difficult to track. This paper describe about various digital techniques used in authenticate of artworks to prevent such forgeries and thefts. Keywords: Artworks, Art authentication, multispectral imaging, reflectance transformation imaging, blockchain. amount of information about a painting such as dimension and size of the pigments’ grains. Due to the development of digital imaging techniques, various non-invasive techniques have been implemented to analyse artworks from which acquisition of samples for investigation is impossible. This development has led to more effective and non-destructive methods to obtain more information from an artwork. By comparing the data acquired from the analysis of a painting and its forged counterpart, the work of forgery that escapes the perusal of art experts can be unveiled easily. II. MULTISPECTRAL IMAGING I. INTRODUCTION Art crimes are one of the highest-grossing crimes happening around the world. Statistics reveal that around 50,000 pieces are being stolen every year around the world. The rate of fake and forged artworks that are being unveiled in museums is hiking up. Fortunately, the advancement in image processing and acquisition has enabled digitalization of artworks. More effective techniques have been handled by art experts in the analysis of art and detection of forgery. After the discovery of X-rays in 19th century, X-rays, InfraRed rays and IR reflectography were used to investigate the underdrawings and pentimenti of paintings. A manual authentication process involves the following steps: 1) Provenance research: This step involves investigation of the artwork’s history of ownership. 2) Visual analysis: It is the understanding of an artwork’s features which includes color, texture/surface, lines, shapes. 3) Photography & UV analysis: Reveals the natural varnishes and materials used by the artist to compose the painting.4) X-ray fluorescence analysis: Sheds light on the distribution of pigments in the painting. 5) Microscopy: involves extraction of samples of few millimetres from the painting and yields a substantial Color is an essential aspect in analysis of pigment measurement and archival of a painting. Colors are linked to the object and the light that illuminates it. Not all colours are visible to human eyes. There exist some colors that are not seen by naked eyes. Multispectral imaging produces a series of images obtained from a painting, within specific wavelength that ranges across electromagnetic spectrum. Multispectral imaging captures that additional information that human eyes fail to recognize. The painting to be analysed is irradiated by Ultraviolet rays, visible rays and Infra Red rays, and the reflecting radiation is captured by a camera. Once the images are calibrated, they are fed into a reflectance image cube which represents the pixels in X and Y axis and the wavelength of each pixels in Z axis. The results provide wider gamut information regarding the painting since it utilizes 3D scanning and photogrammetry. This provides accurate information on the pigmentation used in a painting. This is also helpful in identifying the discolorations and stains that are difficult to investigate by naked eyes. Fig.1: Multispectral imaging of The Crusaders Farewell ISBN: 978-93-5619-947-7 88 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Visible light (VIS): Regular image of the painting that serves as a reference for other images. Raking light(RAK): The light is irradiated on the painting from a shallow angle which makes the craquelure and texture of painting more distinguishable. Ultraviolet Fluorescence (UVF): The painting is irradiated by UV radiation and the resulting fluorescence is recorded. Ultraviolet Reflected (UVR): The painting is irradiated by UV radiation and the reflecting UV radiation is recorded which sheds light on varnishes. Infrared Radiation (IR): The painting is illuminated by IR radiation which distinguishes the behaviour of each pigment in the painting.Infrared False Color (IRFC): This is developed by integrating a regular picture and an infrared picture which makes it possible to observe various materials and retouches in the false color image. Infrared Fluorescence(IRF). The painting is irradiated by visible or infrared rays and the resulting fluorescence in the infrared region of the spectrum is recorded, which detects pigments such as cadmium yellow fluorescence in the IR region. Infrared Transmitted (IRTR). The painting is irradiated by IR radiation and the reflected radiation on the other side of the painting is recorded, which enables better visual representation. Infrared Reflectography (IRR): The painting is irradiated by IR radiation and the reflected radiation is recorded which makes the underdrawing more distinguishable . Fig.2: Virgin with the Child and a Saint, 14th century, unknown author, public library of Taormina (silicily) In the figure, the technique of false colors is applied using 12 spectra. The gray areas visible on the false-color IR image represent the areas that have been repainted III. Reflectance Transformation Imaging(RTI): The expansion of art database in recent years has called for classification of artworks based on the color and morphological features of artwork. Statistics proposed by Fine Arts Experts Institute (FAEI) claimed that about 50% of all artwork available in art market is forged. The works are either found to be fake, forged or misattributed. One of the best instances for art forgery is Han Van Meegeren, an Amsterdam painter who forged paintings attributed to Dutch artists including Pieter de Hooch and Johannes Vermeer. His forgery works were unveiled shortly after WWII and was sentenced to one year in prison. Reflectance Transformation Imaging, also known as Multi-Light Image Capture (MLIC), is a productive tool in detailed study of paintings such as surface geometry and materials used in the creation of the painting. This ISBN: 978-93-5619-947-7 information obtained from a single image or a series of images acquired from the painting are processed by machine learning algorithm which identifies the patterns that exist within the painting and various artworks of the same artist. This proves to be effective in detecting forged or misattributed works of the artist. In first stage, a camera is placed at a fixed position and as static LEDs are illuminated on the painting one-byone, photos are taken from various angles. This process produces a series of images with varying highlights and shadows, illuminating the surface details and revealing intricate details. In order to detect forgeries, the image datasets obtained from a set of painting attributed to a specific artist are applied to a machine learning algorithm which studies the patterns of brushstrokes. Brushstrokes are one of the attributes that explains about the artist’s style and reveals other information like texture, color, pattern and composition of elements used in the artwork. While these brushstrokes are not 89 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 clear in typical photographs, RTI produces highlighted image datasets with enhanced surface details. The algorithm recognizes the pattern in brushstrokes and compares it with the pattern in brushstrokes of various paintings and differentiates the artist’s authenticated paintings from forged or misattributed artworks. Fig.3: The Sennedjem Lintel from Hearst Museum of Anthropology, University of California, Berkeley III. BLOCKCHAIN TECHNOLOGY AUTHENTICATION IN ART Blockchain technology has been making tremendous reforms in art world. It provides novel form of physical and digital artwork authentication. Blockchain is an append-only digital ledger that not only allows easy access to information on artworks, for instance provenance, but also functions as a secured and trustworthy keeper of that information. It maintains a time-stamped record of information that organises the information into chained blocks connecting the first block and the last part of the previous one using alphanumeric code. These records are protected cryptographically by utilizing one-hash function. The hash function is a mathematical function that converts any variable-length input into a fixed-length output. It is called one-way hash function since it is extremely difficult to retrace it back to the inputs and to find inputs that would result in the same hash value. Hence the whole technology is referred to as append-only transaction record system. Provenance is an essential part of authentication. Provenance is a time-consuming process a museum carries out to trace an artwork to its creator. While blockchain has made it effortless to keep trace of an artwork’s history of provenance, some information stored on blockchain may be misinterpreted or inaccurate is a ISBN: 978-93-5619-947-7 non-negligible possibility. It requires experts’ investigation of an art piece to determine where the work is genuine or not. But the conclusion drew from the investigation such as the authenticity and provenance of the art piece. A living artist can authenticate their artwork through blockchain technology while the painting attributed to deceased artists can be analysed by art experts and updated into the system. This process involves placing a chip that contains a private code on the artwork. The corresponding public key is stored in the system. The system certifies the artwork and stores information related to the artwork. As the artwork is sold to different parties, the key is passed to the current owner and the system records the change in ownership. Once the artwork is established in the blockchain system, it prevents a forgery of that artwork being sold in the market. This paves an effective way in putting an end to art forgery or art theft. When a stolen or forged art is detected in the system, the provenance record prohibits the artwork being sold in the market. This blockchain technology is also influencing the art market by converting a physical artwork into digital tokens and passing it to potential buyers thereby expanding the scope of art market. This enables various owners from around the world to stake their claim on a specific piece of art while the artwork itself is stored in a museum. 90 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Fig.4: 14 Small Electric Chairs of Andy Warhol, first art to be tokenized and sold on blockchain IV. CONCLUSION This paper examined the emerging technologies that can be used to authenticate artworks effectively and to substantially reduce the art crimes occurring around the globe. Techniques such as Multispectral Imaging, Reflectance Transformation Imaging and blockchain technology were examined. REFERENCES [1] [2] [3] [4] [5] [6] Lyu, S., Rockmore, D. and Farid, H. (2004) A digital technique for art authentication. Cornelis, B., Dooms, A., Cornelis, J., Leen, F. and Schelkens, P. (2011) Digital Painting Analysis, At The Cross Section Of Engineering, Mathematics And Culture. Arora, R.S. and Elgammal, A. (2012) Towards Automated Classification of Fine-art Painting Style: a Comparative Study . Giachetti, A., Ciortan, I., Daffara, C., Pintus, R. and Gobbetti, E. (2017) Multispectral RTI analysis of heterogeneous artworks. Giachetti, A., Daffara, C., Reghelin, C., Gobbetti, E. and Pintus, R. (2015) Light calibration and quality assessment methods for Reflectance Transformation Imaging applied to artworks' analysis. Whitaker, A., Bracegirdle, A., De Menil, S., Gitlitz, M.A. and Saltos, L. (2020) Art, antiquities, and blockchain: new approaches to the restitution of cultural heritage. ISBN: 978-93-5619-947-7 91 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Investigation Study on Energy Efficient Routing Techniques in Wireless Sensor Network P.Arunkumar1, Dr.K.K.Savitha2 Research scholar, Bharathiar University PG Extension and Research Centre, Erode 2 Assistant Professor, Department of MCA, Bharathiar University PG Extension and Research Centre, Erode 1 Abstract: Wireless sensor networks (WSN) are infra-structure less network where sensor nodes are densely deployed with limited power, computational capacity and memory. WSN collects the information from sensed node. Routing in WSN is a demandingone in recent years for identifying the path across networks to perform data transmission in WSN. Routing is a higher-level decision making that transmits the network packets from source node to destination node through intermediate sensor nodes. Researchers carried out their work on energy efficient routing techniques in WSN with help of clustering techniques. But, the packet delivery ratio was not improved and energy consumptionnot reduced. In order to address these problems, the existing routing techniques are reviewed in this paper. Keywords: Wireless sensor network, sensor nodes, sink node, source node, destination, routing, higher-level decision making I. INTRODUCTION WSN comprises many sensor nodes organized in adistributed area. WSN examine specific event occurrence and determine the parameter like temperature, pressure, or humidity. Sensor nodes sense the data and transmit to the base station. Every sensor node included the battery with required energy which is not rechargeable or replaceable. The sensor nodes are densely organized within the sink with restricted power, computational capacity and memory. Consequently, energy consumption is an essential demand in wireless networks during routing process. This paper is organized as follows: Section II explains the review on different energy efficient data packet routing techniques in WSN, Section III portrays the study and analysis of existing energy efficientdata packet routing techniques, Section IV describes the possible comparison between them. In Section V, the limitations of existing techniques are studied and Section VI concludes the paper. II. LITERATURE REVIEW Clustering Fixed Parameter Tractable (CFPT) approximation algorithm was designed in [1] with approximation factor for LBCP. An energy-efficient and energy-balanced routing algorithm performed routing process between cluster head and sink node. Though energy consumption was minimized, clustering accuracy was not enhanced. A energy efficient tree clustering (EETC) was ISBN: 978-93-5619-947-7 designed in [2] for solving multi-hop data forwarding problem with lesser energy consumption and enhanced network lifetime while preserving tour delay. Though energy consumption and delay was minimized, computational cost was not minimized using EETC. A multi-hop graph-based approach for energy-efficient routing (MH-GEER) protocol was designed in [3] to deal out energy consumption between clusters. But, routing overhead was not minimized using multi-hop graph-based approach. Two-Tier Distributed Fuzzy Logic Based Protocol (TTDFP) was designed in [4] to enhance the multihop WSN lifetime with efficiency of clustering and routing phases. TTDFP was distribution adaptive protocol that balanced for sensor network applications. However, packet delivery ratio was not enhanced by TTDFP. An improved chain-based clustering hierarchical routing (ICCHR) algorithm was designed in [5] on LEACH algorithm with features of orchard planting in rows and shade by sparse random features. But, delay time was not minimized using ICCHR algorithm. A similarity-aware data aggregation was performed by fuzzy c-means approach in [6] through considering data aware clustering and detection of anomalous occurrences. But, the data aggregation time was not minimized by similarity-aware data aggregation. 2.1 Related Works: A cluster-based data aggregation algorithm was designed in to increase the WSN lifetime. However, the data aggregation accuracy was not enhanced by clusterbased data aggregation algorithm. Two distributed aggregation algorithm were designed in where aggregation tree and conflict-free schedule utilized the active time slots from all neighbors. The aggregation latency and utilization ratio of accessible time slots were improved. But, energy consumption was not minimized by distributed aggregation algorithm. A firefly algorithm was designed in [9] for data aggregation in WSN. Though energy consumption was minimized, the data aggregation accuracy was not improved. A new Cluster-Tree routing scheme for gathering data (CTRS-DG) was introduced in [10] for routing and aggregation. But, the delay was not minimized using CTRS-DG. A selective-path priority table energybalanced (EB) and energy-efficient (EE) clustering based routing protocol was designed in [11] with mobile sink. The priority table was generated through prioritizing shortest 92 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 paths to CH by efficient rules. But, packet delivery ratio was not enhanced. A scalable and load-balanced scheme was designed in [12] for mobile agents-based data aggregation. However, packet delivery ratio was not enhanced using scalable and load-balanced scheme. Directional forwarding performed geographic routing process in [13]. The number of sensor nodes was clustered to execute the data aggregation process. But, time consumption for routing was not reduced. III. ENERGYEFFICIENT ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORK WSNs are the communication infrastructures with number of spatially distributed sensor nodes. Sensors are employed to sense the data from particular region for gathering and processing. Many data aggregation and routingmethodsidentifiedefficient route paths in WSN through energy constraints of sensor nodes. Clustering is an essential process where network is dividedinto many clusters. Every cluster includes Cluster Head (CH) that collects the data from their cluster members and sends to the sink node. 3.1 A routing algorithm for wireless sensor networks based on clustering and an fpt-approximation algorithm Sensor node clustering is an efficient process for routing the data packets in WSNs to increase the network lifetime. The load minimization of CHs was key issue termed as Load Balanced Clustering Problem (LBCP). Fixed Parameter Tractable (FPT) approximation algorithm was introduced with approximation factor for LBCP. The running time complexity was computed for diverse WSNs. An energy-efficient and energy-balanced routing algorithm was designed for data packet routing between CHs and sink. LBCP was addressed with better approximation factor resulted in sensor node load balancing among CHs. In addition, energy consumption gets balanced among CHs. The designed routing algorithm distributed overhead among all nodes for balancing the energy consumption of network. The cluster based routing algorithms minimized the network energy consumption and enhanced network lifetime. Clustering FPT-algorithm comprised of four phases. The first three phases were processed only once. The fourth phase functioned periodically. The first phase of CFPT algorithm was network-bootstrapping phase where the information about nodes and their neighbors were gathered and transmitted to the sink. The second phase was clustering. The sink addressed LBCP by FPTapproximation algorithm to find which gateway sensor node gets allocated. The sink transmitted clustering algorithm performance to the nodes in network. Every sensor node identified their gateway for allocation. The third phase was routing among the CHs. In third phase, next-hop relay node ISBN: 978-93-5619-947-7 of every gateway was determined for data transmission to the sink node. Data-gathering was fourth phase where data collected from sensor nodes and transmitted to the sink. The data-gathering phase was partitioned into rounds. In every round, each sensor node analyzed the data from neighboring area and transmitted to equivalent gateway. The gateway grouped the data. After that, the collected data were transmitted to sink on the path comprising other gateways. After initiating fourth phase, Re-Clustering process was employed for gateway handling process. The process functioned inside every gateway and computed the node energy level. When energy level of gateway was lesser than threshold, it not functioned as CH. 3.2 A multi hop graph based approach for an energy efficient routing protocol in wireless sensor networks MH-GEER protocol was introduced in WSN to distribute energy consumption between clusters at balanced rate with higher network lifetime. MH-GEER protocol carried out node clustering and inter-cluster multi-hop routing selection process. The clustering phase was constructed upon centralized formation of clusters and distributed selection of cluster heads. The routing phase constructed dynamic multi-hop path between CH and base station. The designed strategy was constructed for exploring the energy levels in network to choose the next hop in probabilistic manner. MH-GEER algorithm improved data routing approach performance in LEACH protocol depending on direct transmission from CH to BS. A distant CH with large energy consumption died earlier than other CHs which reduced network lifetime, coverage, stability and load balancing between all clusters. The designed protocol used probabilistic multi-hop approach for transmitting the data packets to BS. 3.3 EETC: Energy Efficient Tree Clustering in Delay Constrained Wireless Sensor Network A new tree-clustering scheme termed energy efficient tree clustering (EETC) was introduced to reduce the network energy consumption and to increase the network lifetime while preserving the pre-bound tour delay of mobile sink. EETC employed Optimal Generation of Clusters (OGENCL) in clustering phase. The number of relay hops between cluster member node and CH balanced the network load. An upper bound on cluster size was employed for balancing the network load. OGENCL issue was considered as Mixed Integer Linear Programming (MILP) Problem. EETC was employed to identify the optimal selection of cluster heads in every round depending on residual energy of sensor nodes and distance of sensor nodes from BS. The network energy consumption gets reduced and network lifetime gets increased while maintaining tour-delay constraint of MS. EETC problem was NP-hard. OGENCL chosen the optimal CHs in every 93 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 round where cluster size and relay hops between the sensor node and associated CH were considered limitations. IV. COMPARISON OF ROUTING TECHNIQUES IN WSN& SUGGESTIONS In order to compare therouting techniques in WSN, number of data packets and number of sensor nodes is taken to perform the experiment. Various parameters are used for enhancing routing performance in WSN. 4.1 Analysis on Packet Delivery Ratio Packet delivery ratio is defined as the ratio of number of data packets correctly delivered to the total number of data packets. It is measured in terms of percentage (%). It is calculated as, (1) From (1), the packet delivery ratio is determined. The method is more efficient when packet delivery ratio is higher. Table 1 Tabulation for Packet Delivery Ratio Number of Data packets Packet Delivery Ratio (%) CFPT algorithm EETC Scheme 10 81 75 MHGEER protocol 67 20 83 77 69 30 87 79 71 40 85 76 68 50 84 74 65 60 82 72 63 70 83 75 66 80 86 77 69 90 100 89 92 80 82 71 73 Table 1 explains the packet delivery ratio with respect to number of data packets ranging from 10 to 100. Packet delivery ratio comparison takes place on existing CFPT algorithm, EETC scheme and MH-GEER protocol. The graphical illustration of packet delivery ratio is given in figure 1. ISBN: 978-93-5619-947-7 Fig.1: Measurement of Packet Delivery Ratio From the figure 1, packet delivery ratio of three existing methods for different number of data packets is described. It is observed that the packet delivery ratio using CFPT algorithm is higher when compared to EETC scheme and MH-GEER protocol. This is due to the application of energy-efficient and energy-balanced routing algorithm for data packets routing between CH and sink. CFPT with better approximation factor resulted in sensor node load balancing among CHs. The designed routing algorithm distributed routing overhead among all nodes for improving the packet delivery ratio performance of entire network. Research in CFPT algorithm has 11% higher packet delivery ratio than EETC scheme and 25% higher packet delivery ratio than MH-GEER protocol. 4.2 Analysis on Energy Consumption Energy consumption is defined as the amount of energy consumed for performing the data aggregation and routing in WSN. It is the product of the number of sensor nodes and energy consumed by one sensor node. It is measured in terms of joules (J). It is calculated by, (2) From (2), energy consumption is calculated. „ ‟ denotes number of sensor nodes. When the energy consumption is lesser, the method is said to be more efficient. Table 2 Tabulation for Energy Consumption Number of Sensor nodes 10 20 30 40 Energy Consumption (Joules) CFPT algorithm 35 38 40 39 EETC Scheme 24 27 30 28 MH-GEER protocol 46 48 51 49 94 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 50 60 70 80 90 100 38 36 34 37 40 43 26 24 21 23 27 40 47 45 43 46 48 50 Table 2 illustrates the energy consumption with respect to number of sensor nodes ranging from 10 to 100. Energy consumption comparison takes place on existing CFPTalgorithm, EETC scheme and MH-GEERprotocol. The graphical representation of energy consumption is described in figure 2. clustering time is lesser, the method is said to be more efficient. Table 3 Tabulation for Clustering Time Number of data packets 10 20 30 40 50 60 70 80 90 100 Clustering Time (ms) CFPT algorithm 34 37 38 40 42 44 47 50 52 55 EETC Scheme 25 27 29 32 35 37 38 40 42 44 MH-GEER protocol 19 21 23 25 27 30 32 35 37 39 Table 3 depicts the clustering time with respect to number of data packets ranging from 10 to 100. Clustering time comparison takes place on existing CFPT algorithm, EETC scheme and MH-GEER protocol. The graphical analysis of clustering is. Fig. 2: Measurement of Energy Consumption From figure 2, energy consumption of three techniques for different number of sensor nodes is explained. It is clear that the energy consumption using EETC scheme is lesser when compared to CFPT algorithmand MH-GEER protocol. This is due to the application of heuristic clustering algorithm in clustering phase. The number of relay hops between cluster member node and CH was limited to balance network load. An upper bound on cluster size was designed for balancing the network load. The network energy consumption gets minimized to improve the network lifetime while preserving the tour-delay constraint of MS. Research in EETC scheme consumed 32% lesser energy than CFPT algorithm and 46% lesser energy than MH-GEER protocol. 4.3 Analysis on Clustering Time Clustering accuracy is defined as the amount of time consumed for performing the clustering process. It is the difference of ending time and starting time of clustering during routingprocess. It is measured in terms of milliseconds (ms).It is measured as, (3) From (3), the clustering time is calculated. When the ISBN: 978-93-5619-947-7 Fig. 3: Measurement of Clustering Time Figure 3 describes the clustering time of three techniques for different number of data packets. It is observed that the clustering time using MH-GEER protocol is lesser when compared to CFPTalgorithmand EETC scheme. This is due to the application of node clustering and inter-cluster multi-hop routing selection process. The routing phase identified the dynamic multi-hop path between cluster head and base station for determining the energy levels in network to select the next hop in probabilistic way. Research in EETC scheme consumed 35% lesser clustering time than CFPT algorithm and 18% lesser clustering time than MH-GEER protocol. 95 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 [2] V. LIMITATION ON DATA AGGREGTAION AND ROUTING TECHNIQUES IN WSN Clustering Fixed Parameter Tractable (CFPT) approximation algorithmwas balanced and enhanced the network performance. The running time complexity of CFPT approximation algorithm was minimized. But, the energy consumption was not minimized and clustering accuracy was not improved.MH-GEER protocol was designed to distribute the energy consumption between the clusters at balanced rate for increasing the network lifetime. The energy depletion in remote clusters was reduced by MH-GEER protocol. MH-GEER protocol guaranteed the load balancing process in network. The network lifetime was enhancedby MH-GEER protocol. MH-GEER maintained the coverage area of distant nodes at longer time intervals. However, the routing overhead was not minimized using multi-hop graph-based approach.EETC was introduced for multi-hop data forwarding to address the energy consumption problem while preserving the tour delay. Number of relay hops between cluster member node and CH were limited to balance network load.By using EETC, the energy consumption and delay was reduced to increase the network lifetime. However, the computational cost was not reduced using EETC. [3] [4] [5] [6] [7] [8] [9] [10] 5.1 Future Direction The future direction of the work is to perform energy efficient routing in WSN by using machine learning and ensemble learning techniques with higher packet delivery ratio and lesser energy consumption. [11] [12] VI. CONCLUSION [13] A comparison of different techniques for energy efficient routing is carried out. From the survival study,the energy consumption was not minimized and clustering accuracy was not improved by CFPT approximation algorithm.In addition, the routing overhead was not minimized using multi-hop graph-based approach. The computational cost was not reduced by using EETC scheme. The wide range of experiments on existing techniques compares the results of various energy efficient routing techniques and discusses its limitations. Finally from the result, the research work can be carried out using machine learning and ensemble learning techniques with minimal energy consumption and higher packet delivery ratio. Srijit Chowdhury and ChandanGiri, “EETC: Energy Efficient TreeClustering in Delay Constrained Wireless Sensor Network”, Wireless Personal Communications, Springer, May 2019, Pages 1–22 Hana Rhim, KarimTamine, RymaAbassi, Damien Sauveron and SihemGuemara, “A multihop graph‑based approach for an energy‑efficient routing protocol in wireless sensor networks”,Human-centric Computing and Information Sciences, Springer, Volume 8, Issue 30, December 2018, Pages 1-21 SeyyitAlperSert, Abdullah Alchihabi and Adnan Yazici, “A TwoTier Distributed Fuzzy Logic Based Protocol for Efficient Data Aggregation in Multi-Hop Wireless Sensor Networks”, IEEE Transactions on Fuzzy Systems, Volume 26, Issue 6, December 2018, Pages 3615 – 3629 Huarui Wu, Huaji Zhu, Lihong Zhang, Yuling Song, “Energy Efficient Chain Based Routing Protocol for Orchard Wireless Sensor Network”, J. of Electrical Eng. & Tech., Springer, June 2019, P. 1–10 Runze Wan, NaixueXiong, Qinghui Hu, Haijun Wang and Jun Shang, “Similarity-aware data aggregation using fuzzy c-means approach for wireless sensor networks”,EURASIP Journal on Wireless Communications and Networking, Springer, Volume 59, 2019, Pages 1-11 Hanady M. Abdulsalam, Bader A. Ali and EmanAlRoumi, “Usage of mobile elements in internet of things environment for data aggregation in wireless sensor networks”,Computers and Electrical Engineering, Elsevier, Volume 72, November 2018, Pages 789-807 Quan Chen, Hong Gao, ZhipengCai, Lianglun Cheng and Jianzhong Li, “Distributed Low-Latency Data Aggregation for Duty-Cycle Wireless Sensor Networks”, IEEE/ACM Transactions on Networking, Volume 26, Issue 5, October 2018, Pages 2347 – 2360 Islam Mosavvar and Ali Ghaffari, “Data Aggregation in Wireless Sensor Networks using Firefly Algorithm”, Wireless Personal Communications, Springer, V104, I. 1, September 2018, Pages 1-18 WalidOsamy, Ahmed M. Khedr, Ahmed Aziz and Ahmed A. ElSawy, “Cluster-Tree Routing Based Entropy Scheme for Data Gathering in Wireless Sensor Networks”,IEEE Access, Volume 6, December 2018, Pages 77372 – 77387 Olayinka O. Ogundile, Muyiwa B. Balogun, Owoicho E. Ijiga and Elijah O. Falayi, “Energy-balanced and energy-efficient clustering routing protocol for wireless sensor networks”, IET Communications, Volume 13, Issue 10, 2019, Pages 1449 – 1457 Govind P. Gupta, ManojMisra, and KumkumGarg, “Towards scalable and load-balanced mobile agents-based data aggregation for wireless sensor networks”,Computers & Electrical Engineering, Elsevier, Volume 64, November 2017, Pages 262-276 KhaledHadi, “Analysis of Exploiting Geographic Routing for Data Aggregation in Wireless Sensor Networks”,Procedia Computer Science, Elsevier, Volume 151, 2019, Pages 439-446 REFERENCES [1] RaminYarinezhad and SeyedNaserHashemi, “A routing algorithm for wireless sensor networks based on clustering and an fptapproximation algorithm”,Journal of Systems and Software, Elsevier, Volume 155, September 2019, Pages 145-161 ISBN: 978-93-5619-947-7 96 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 A Spatio – Temporal Analysis on Human Resource Management in Fishing – Some Evidential Proofs Dr. H. Sulaiman Assistant Professor in Commerce, PG & Research Dept of Commerce, Khadir Mohideen College, East Coast Rd, Adirampattinam, Thanjavur(Dt), Tamilnadu – 614701 Abstract: Human Resource Management in agriculture is a very complex phenomenon influenced more by social factors than by economic factors. The study of changing ocean structure, fishers and fishers’ relations in India has developed into one of the most important themes of social sciences research. Several research studies have been carried out on this theme during the last three decades. It is thought appropriate to present a brief review of the research studies undertaken on some of the aspects of human resource management in fishing. This paper broadly analyses the role of Human Resource Management in increasing fishing productivity in the context of Fishing Economy like us. Keywords: HR, Temporal Analysis, Fisher Productivity, Labour Relations, Fishing. I. INTRODUCTION India is the third largest fish producing country and the second largest aquaculture fish producer in the world. India contributes about 7% to the global fish production. The country is also home to more than 10% of the global fish biodiversity and is one of the 17-mega biodiversity rich countries. Around 14 million people are engaged in fisheries and its allied activities. Andhra Pradesh is the largest fish producer in the country followed by West Bengal and Gujarat. The total fish production during 201718 is estimated to be 12.60 million metric tonnes, of which nearly 70% is from inland sector and about 50% of the total production is from culture fisheries. More than 50 different types of fish and shellfish products are being exported to 75 countries around the world. Fish and fish products have presently emerged as the largest group in agricultural exports from India, with 13.77 lakh tonnes in terms of quantity and Rs. 45,106.89 crore in value. This accounts for around 10% of the total exports and nearly 20% of the agricultural exports, and contribute to about 0.91% of the GDP and 5.23% to the Agricultural GVA of the country. II. CONTRIBUTION OF HUMAN RESOURCES IN INDIAN AGRICULTURE In general, the immediate returns for investments in HRD are not always obvious. Accordingly, development institutions, governments and donor agencies tend to give a relatively low priority to HRD, even though most nations consider HRD as a priority area for development of the ISBN: 978-93-5619-947-7 sector. For example, a recent Network of Aquaculture Centres in Asia-Pacific (NACA)/Food and Agriculture Organization of the United Nations (FAO) survey in Asia revealed that 93% of the countries considered HRD as a major problem facing aquaculture, and 71% of the nations noted that a lack of skilled personnel was a major impediment to further development(NACA/FAO, 1996). A recent review on aquaculture development in Africa identified eight strategies as pivotal to the development of the sector, and not surprisingly, five of these involved HRD, particularly in relation to small-scale farmers and extension workers. (Machena and Moehl, 2001). On the issue of HRD, it is also important to recognize the specific needs of nations and regions. Past experience in the aquaculture sector and elsewhere has shown that mere transfer of technologies is not always effective and can even be counterproductive. Obviously, training needs vary significantly amongst regions and are related to the degree of development of the sector, thus the gross needs of Africa may be significantly different from those of Asia (Machena and Moehl, 2001). III. BACKGROUND OF THE STUDY Fish has been the most important and sustaining factor for people around the world. It is particularly true in case of the coastal communities, as fish constitutes the most important part of their diet and also the main source of their livelihood. Fish is a major industry for the coastal people. It is a main raw material for many industries – the manufacture of fishmeal for the poultry and the production of oils of various kinds. India is endowed with rich marine resources with a 7,517 km. coastline. There is a vast potential for fishing development and it is emerging as one of the growing item of India’s exports. While India has so far concentrated mainly on the vast potential of ships, deep sea fishing for other rich varieties, for instance, has a tremendous scope for exploitation, given the right types of inputs and facilities. IV. REVIEW OF LITERATURE Ostroff (1995) identied that when human resource professionals perceive a higher quality of human resource practices; these rms have higher business results. Studies have shown that relationship between progressive human 97 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 resource practices and rm performance in manufacturing rms. Barbosa (2002) in his study “Fishing for a High Living” states that the mechanized fishing in Goa is done without any proper regulations. There is no license system for trawlers in the state. Once a trawler owner registers his trawler, he need not approach any government department again. The state of Goa has 1128 registered trawlers and this is far above the saturation point. He suggests that there is a need to regulate the number of trawlers that go in the sea and their expedition schedule. The author strongly feels that there is a need to redraft the laws and to control the mesh size. Nirmale vivek H.; Sontakki Bharat S, Birodar R. S.; Metar Santosh Y. –(2003)- Central Institute of fisheries education- Mumbai – Assessment of Indigenous knowledge of coastal fisher folk of greater Mumbai and Sindhudurg district of Maharashtra – 10 June 2003- The conclusion of this study is the indigenous knowledge of coastal fisher folk on various fisheries management aspects like choice of materials and methods for fishing and fish processing, their perceptions on the effect of water color, wind direction, lunar cycles, tidal fluctuations on fish catch is by and large based on scientific rationality efficacy and use of local resources as judged by the fisheries experts, Hence such indigenous knowledge can be gainfully blended with the modern scientific and technical wisdom to evolve a package of fisheries management that enjoys ready acceptance by the fishermen and enhances efficacy. Sustainable use of local resources without Adversely affecting the environment. Rajasenan D. (2001) in his paper “Technology and labour process in marine fishery: The Kerala experience”, believes that the amount of fish that can be harvested per unit of time depends primarily on the level of technology, which in turn depends upon the size of investment and the number of fishermen that participate in fishing operations. Mechanization has resulted in higher production and productivity. The new labour process in mechanized fishing due to capital intrusion has brought a change in the theory of labour process. It also resulted in outboard motorization. management of inputs used for fishing. Tiwari P. C. (2005) in his paper “Natural Resources Information System for Wasteland Development in Uttaranchal: A Planning Support System for Sustainable Watershed Management in Uttaranchal Himalaya” concludes that the sustainable development of wasteland development strategy is community and people oriented, and the local people are willing to adopt the practice of sustainable resource development and utilization. Kumar Suresh P. (2001) in “New Technology and Artisanal Fishermen in Kerala” makes an attempt to discuss the emergence of motorization and the marginalization of the traditional fishermen. The study reveals that modernization of fishing industry has led to marginalization of artisan fishermen. V. STATEMENT OF THE PROBLEM During the course of the Rural Labour Enquiries (RLE) data on various socio-economic aspects viz, Employment & Unemployment, Consumption Expenditure, Wages & Earnings and Indebtedness of rural and agricultural labourers are collected. The RLE is also aimed at throwing up data on household consumption expenditure of the rural/fishermen for drawing weighting diagrams for updating the series of the Consumer Price Index Numbers for fishers. Under these enquiries, the data are collected and analysed for fishers as a whole. However, in order to enable comparison with the previous enquiries as also to understand problems of this segment which constitutes bulk of the rural fishers, the analysis is presented for fishers separately. The usefulness of the data thrown up by the Rural Labour Enquiries has been acknowledged by various Committees and Commissions from time to time. The National fisheries development board has recommended that the periodic surveys undertaken by the Government to understand the rural situation should be continued and intensified. Hence the present study elaborately deals on the Human Resource Management in Indian fishing and its temporal analysis in the selected areas. VI. SCOPE OF THE STUDY: Sehara D. B.S. et.al (2000) studied “Economic Evaluation of Different Types of Fishing Methods along Indian Cost.” They indicated that the studies on the craft and gear combination should be conducted on macro level in different maritime states for effective future planning in maritime fisheries sector. Non-mechanized motorized and mechanized sector should be given equal priorities while undertaking cost and earning studies. There has to be also a stress on employment potential, marketing problems, financial needs of various types of units and proper ISBN: 978-93-5619-947-7 The present study is an immense importance in the sense of analyzing the role and contribution of Human Resources in increasing Indian fisheries and other related issues in the study area. There were many more macro level studies have been already carried out but no attempt has been made in the micro analysis and analyzing the significance of the contribution of HRM in our fishing and tries to solve and answer the research gaps and unanswered research questions. In this juncture this research is 98 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 considered most relevant and having vast scope for further productive efficiency in the particular angle. The Enquiry relates to all rural fishers households. However, provision has been made in the tabulation plan to get separate estimates for fishers households. VII. OBJECTIVES The main objectives of the enquiry are: To study the role and contribution of human resources in Fishing yield in the study area. To deals the matters pertaining to the Spatio and Temporal analysis of Human Resources in India over the study years. To project actual and real picture of the Human Resources and their utilization of fishers force in increasing fishing productivity through modern methods of production. To analyse the problems and woes of fishermen inn receiving their share of wages and livelihood problems encountered in this area. To provide upto date serial data on demographic structure, extent of employment & unemployment, wages and earnings, household consumption expenditure, indebtedness, etc. for building up of reliable estimates of important socio-economic characteristics of rural fisher in general and fishermen in particular. To provide data relating to consumption expenditure for derivation of weighting diagram for updating the series of CPI numbers for fishing and rural fishers. To suggest certain policy recommendations for improving the productivity of fishermen force. VIII. HYPOTHESES Having the broad objectives in the mind the researcher formulated the following major hypotheses for undertaking the present work. There is a close and perfect positive relationship between technological diffusion in Indian marine and managing fishers. There is a high degree of concentration of the labour force on fishing (Primary sector) than allied sectors in this area over the study years. There is a significant association between the improvement of modern methods of fishing production and labour productivity. There is no significant relationship between managing Human resource practices and intra group fishermen. IX. GEOGRAPHICAL COVERAGE The survey covered the whole of the Indian Union. ISBN: 978-93-5619-947-7 9.1 Sample Design A stratified multistage sampling design was adopted for selection of the sample units for the survey. The first stage units (FSU) were the census villages (panchayat wards for the selected area). The ultimate stage units (USU) were the households. Stratification of the first stage units : From the list of villages of each State/Union Territory (U.T.), initially, two special strata were formed by considering villages (a) with very small population and (b) with very high population as stated below:Stratum 1: all FSUs with population between 1 to 100. Stratum 2: FSUs with population more than 10,000 The above two strata were spread across a given State and were not confined to any particular administrative division within the State. Each of the above two strata was formed if at least 50 such FSUs were there in the respective frames. Otherwise, these villages were included in the general strata. While forming general strata, efforts were made to treat each district with population less than 2 million as a separate stratum. If limitation of sample size did not allow forming so many strata, smaller districts within a particular NSS region were merged to form a stratum. Each district with rural population of 2 million or more as per 1991 Census (1.8 million or more as per 1981 Census in case of Jammu & Kashmir) was as usual split into a number of strata. Allocation of first stage units: At the all-India level, a total number of 10,384 FSUs (6208 villages and 4176 urban blocks) was selected for survey in the central sample in the 55th round. The actual State/UT level allocation of FSUs in the rural sector is given in Statement- I. State/UT level rural sample size was allocated among the rural strata in proportion of population. Sample size for the whole round for each State/UT was allocated equally among the 4 sub-rounds. Stratum level allocation for both rural and urban areas of a sub-round was made in even numbers in order to facilitate selection of FSUs in the form of 2 independent sub-samples. Sub-sample numbers were 1 and 2 for subround 1; 3 & 4 for sub-round 2; 5 & 6 for sub-round 3; and 7 & 8 for sub-round 4. One salient feature of the 55th round was the rotation sampling scheme which was adopted for the first time in the NSS for the purpose of collection of employment-unemployment data from central sample only. Under this scheme, 1 sub-sample of the sampled first stage units (FSUs) of each sub-round was revisited in the subsequent sub-round. From each such FSU, sample households visited in the previous sub-round for collecting data on employment-unemployment were revisited in the subsequent sub-round for collecting employmentunemployment details. 99 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Selection of FSUs: For each sub-round, sample first stage units from each stratum were selected in the form of 2 independent sub-samples by following circular systematic sampling with (a) probability proportional to population for all rural strata other than stratum 1, and (b) equal probability for rural stratum 1. X. MAJOR FINDINGS OF THE STUDY The vast majority of workers in India are in informal jobs. Although there has been a shift out of fishing, construction has absorbed more workers than other sectors in recent years. What is more concerning is that, most of the new jobs being created in the formal sector are actually informal because the workers do not have access to employment benefits or social security. In addition, notable disparities in the labour force participation rates of men and women persist. The share of agriculture in India’s GDP has steadily declined since 1950, which used to be little over 52% and now stands close to 16–17%. In comparison the % of other two sectors in GDP (Industry and Services) now stands close to 20+% and 55+% respectively. In 1950, the GDP of India was around 40 Bn USD (2004-05 series, 2016 Exchange rate) which reached to roughly 900 Bn USD (2004-05 series, 2016 Exchange rate) in 2015. So, Agricultural sectors increased from 20.5 Bn USD to 150+ Bn USD between 1950 and 2016. India's economy has returned to high rates of growth, according to the latest figures. In 2015-16 the GDP growth rate reached 7.6 per cent, up from 5.6 per cent in 2012-13. The challenge continues to be to ensure that economic growth translates into better labour market conditions. 10.1 Recent economic trends: Growth recovers and inflation stabilizes India" initiative, manufacturing has grown rapidly, at 9.3 per cent in 2015-16. XI. CONCLUSION About two-third of the total labour force in the country lives in rural areas. Wage paid employment is the main source of their livelihood. It has been the endeavour of the Government of India to alleviate the poverty, particularly in the rural areas, by formulating and implementing various target oriented anti-poverty rural development programmes. Sound data base is of utmost importance for formulating such action programmes. With this end in view, the first Agricultural Labour Enquiry (ALE) was conducted in 1950-51, followed by the second in 1956-57. The scope of the subsequent enquiries was enlarged to cover all rural labour households instead of fishers households alone covered in the first two enquiries. REFERENCES [1] Comin, Diego (2006): "Total Factor Productivity", New York University and NBER [2] J. Hawks, University of Kansas, and N. Lyons, Pennsylvania State University, personal communication[s]) [3] Hochachka, P. W. 1990. Scope for survival: a conceptual “mirror” to Fry’s scope for activity. Transactions of the American Fisheries Society 119:622–628. [4] Murphy, B. R., and D. W. Willis, editors. 1996. Fisheries techniques, 2nd edition. American Fisheries Society, Bethesda, Maryland. [5] P. L. Fuller, L. G. Nico, and J. D. William. 1999. Nonindigenous fishes introduced into inland waters of the United States. American Fisheries Society, Special Publication 27, Bethesda, Maryland. [6] Kapuscinski, A. R., and L. D. Jacobson. 1987. Genetic guidelines for fisheries management. University of Minnesota, Minnesota Sea Grant College Program, Sea Grant Research Report 17, Duluth. [7] Vladykov, V. D., and E. Kott. 1982. Comment on Reeve M. Bailey’s view of lamprey systematics: Comment. Canadian Journal of Fisheries and Aquatic Sciences 39:1215–1217. Bailey, R. M. 1982. Comment on Reeve M. Bailey’s view of lamprey systematics: Reply. Canadian Journal of Fisheries and Aquatic Sciences 39:1217–1220. Fishing and aquaculture made up over 1.4 trillion Indian rupees in gross valued added to agriculture across India in fiscal year 2019. The GVA increased consistently since fiscal year 2012 from this sector. GDP growth reached 4.0 per cent during 2019-20 years 2019-20 and 2018-19 stands at Rs 145.69 trillion and Rs 140.03 trillion, respectively, showing a growth of and 6.5 per cent during 2018-19. It also reveals that real gross value added (GVA) reveal that the return of these higher growth rates has been spurred by strong industrial growth. The GVA in India's economy shrank 6.2% in 2020-21, compared to a 4.1% rise in the previous year. Only two sectors bucked the trend of negative GVA growth Agriculture, Forestry and Fishing (which rose 3.6%) In line with the aims of the Government of India's "Make in ISBN: 978-93-5619-947-7 100 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Analysing Problems of Tiny Agricultural Farmers with Special Reference to Selected Farmers Collectives in Kozhikode District, Kerala Dr. M.Dhanabhakyam1, Monish P2 Professor and Dean, Department Of Commerce, Bharathiar University, Coimbatore 2 PhD Full time Research Scholar, UGC Junior Research Fellow (JRF), Department Of Commerce, Bharathiar University, Coimbatore. 1 . Abstract: India is an agriculture oriented country. Agricultural sector contributes more than 16% in GDP and more than 10% of the total export. In recent days, many farmers left their farming job and went to seeking other job opportunities. Also, some of the farmers committed suicide and the reason is that their crops are failed due to various reasons. The major problem faced by tiny agricultural farmers is lack of good infrastructural facilities and lack of sufficient knowledge base. Some of the farmers are conducted experiments and implementing innovative technics in their farming. But they lack knowledge regarding how to apply these technics in long term farming and practical implications of the same. Government of Kerala initiated an agricultural contingency plan for each district to support the farmers. Hence the researcher made an attempt to study the major problems faced by tiny agricultural farmers, analyse perception of farmers on various problems and measure the impact of such problems on quality of life of farmers in Kozhikode district, Kerala. The study also analyses various grievances filed by farmers in farmer’s collectives, Kozhikode district. Keywords: Agricultural Development, Problems and Prospects, Farmers Collectives, Grievances, Quality of Life. I. INTRODUCTION In terms of growth, agricultural sector have been occupied a great position in Indian economy. Majority of Indian population is clustered to the rural area, and they are depending agriculture for source of income. Here the question is that whether these farmers earn sufficient profit or not? Previous researchers proved that they didn’t get sufficient income from farming. Farmers facing many problems like lack of availability of modern equipment’s, poor irrigation facilities, negotiation between local traders and middle man, lack of storage facilities, unavailability of productive seeds. India has been ranked as the second largest irrigated land in the world, but still farmers faced various problems related with irrigation. Most of the farmers are depends monsoon rain for irrigation. Due to the absence of effective market areas, farmers are not able to their products at fair profit. Hence they approach middleman or merchants for business. These middleman or merchants exploiting farmers and they not offer good ISBN: 978-93-5619-947-7 price. Another problem is related with lack of proper storage and maintenance facilities. Small farmers are forced to sell their crops to consumers and middleman at whatever price is offered by them, due to perishable nature of crops. Another problem is lack of availability of productive seeds for small farmers. Sellers charged higher price for productive seeds, which are used by farmers for their basic farming. Agricultural marketing is also in a bad stage. Government of Kerala take various initiatives and projects to support tiny agricultural farmers. Recently government started a farmers call centre and agricultural information hub for effective communication and grievance redressal. Government also initiates various schemes for awareness, consultation and facilitation among farmers. Government provide a special focus on women farmers and agro based entrepreneurship. Kerala government conducted various training and orientation programs to support tiny agricultural farmers. Finance minister K.N.Balagopal announced a package of 5650 crore to assist small scale traders and farmers in Kerala. On the light of these aspects the researcher conducted this study to analyse problems and prospects of tiny agricultural farmers in Kozhikode district, Kerala. II. OBJECTIVES OF THE STUDY To know the association between type of farming and awareness on various initiatives of government. To analyze perception of tiny agricultural farmers on various challenges faced by them. To explore major challenges faced by tiny agricultural farmers in Kozhikode district, Kerala. To understand the relationship between various initiatives taken by government and quality of life of tiny agricultural farmers.To measure the effectiveness of grievance redressal mechanism in farmers collectives in Kozhikode district, Kerala. III. RESEARCH METHODOLOGY The study follows the descriptive and empirical research methods. Both primary and secondary data are used in the study to fulfill the objectives of the study. The primary data was collected through questionnaire distributed among respondents from 5 farmer’s collectives in Kozhikode district, Kerala. Secondary data was collected from academic journals and websites. The 101 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 sample size taken for the purpose of the study is 290 farmers. Simple random sampling is used as sampling technique and the study is conducted at Kerala state, India. Independent sample t test, correlation, multiple regression and exploratory factor analysis were used for data analysis. All the tests are carried out with the help of SPSS and AMOS software’s. IV. REVIEW OF LITERATURE S. K. Goyal, Prabha, Jai P. Rai and Shree Ram Singh (2016) made a study on Indian agriculture and farmers problems and reforms. The study is conceptual in nature and focused on various problems faced by farmers in India. Predominance of food grains, limited intensive agriculture, lower status, land tenancy, traditional bound were considered as major problems faced by farmers. It is also founded that Problems related to irrigation infrastructure, market infrastructure and transport infrastructure add significant cost to farmers' in rural areas. Thangamani (2016) studied Indian agriculture performance and challenges. The researcher tries to analyse the importance of agriculture in the Indian economy in the planning period and find out the factors responsible for the poor performance of agriculture sector. Primary data was collected from the selected households of tribal area in Thalaimalai village. The study concluded that Reduction in public investment on irrigation and seeds, technology and extension has greatly affected yield, Changing cropping pattern has diverted the crop from low priced food grains to high priced commercial crops were the challenges identified and made a negative impact on growth of agricultural sector. V. ANALYSIS AND INTERPRETATION 5.1 Chi-Square Test Chi- square test of association is a statistical tool used to test the relations between the two categorical variables. It tests the significance between the observed frequencies with the expected frequency. H01: There is no association between type of farming and awareness on various initiatives of government Table 1. showing association between type of farming and awareness on various initiatives of government Awareness on various initiatives taken by government Type of farming Chi- square Significance. 11.421 .018 Source: primary data Above table states the chi-square association between type of farming and awareness on various initiatives of government. It is inferred from the table type of farming and awareness on various initiatives of government has significant association with chi square value 11.421 with P value .018. 5.2 Independent Sample T Test H02: There is no significant difference in the perception of farmers on challenges faced by them based on their gender Table 2. showing significant difference in the perception of farmers on challenges faced by them based on their gender Particulars Challenges faced by tiny agricultural farmers Label t Significance 3.235 0.038 Male Female Source: primary data. Above table states the perception of farmers on challenges faced by them based on their gender. The P value is 0.038, which is less than 0.05, which indicates that the null hypothesis is rejected. Thus there is significant difference in the perception of farmers on ISBN: 978-93-5619-947-7 challenges faced by them based on their gender. Correspondence analysis proves that female farmers facing problems of marketing and distribution than male farmers. 102 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 5.3 Exploratory Factor Analysis Table 3. Challenges faced by tiny agricultural farmers Factor and Variance Rotated Factor Components Explained Loadings Unavailability of Water and soil testing labs .967 Electricity supply is not enough for farming .954 Labour is not easily available .889 Commission agent system is exploiting farmers .878 Storage facilities are not sufficient .845 Less imitation from government agencies for purchasing crops .746 Subsidies are not reached at farmers fairly .735 Lack of cooperative societies in rural areas .721 Farmers needed special packages in worst situations .713 Serious diseases like cancer, due to use of pesticides .640 Infrastructure Marketing and distribution Government assistance Use of pesticides and health Values and chemical effects of pesticides not determined .635 clearly issues Pesticides are not provided on subsidy basis .618 Source: primary data The above table shows the factor extraction from the loaded items. 12 statements were loaded to extract 4 major challenges faced by tiny agricultural farmers of selected locality using principal component method. The identified challenges are named after thorough review of literature. The first major challenge is identified as ‘infrastructure’, second challenge ‘marketing and distribution’, third challenge ‘government assistance’ and fourth challenge named as ‘use of pesticides and health issues’. 5.4 Correlation Analysis H03: There is no significant relationship between assistance provided by government and quality of life of tiny agricultural farmers. Table 4. Showing significant relationship between assistance provided by government and quality of life of tiny agricultural farmers Dependent variable Independent variable Agricultural system Quality of life of tiny agricultural farmers information Community drip irrigation Rain shelter cultivation Decentralization of nurseries management Pearson correlation Significance .654 .000 .764 .634 .678 .000 .000 .000 Source: (Primary Data) Above table portrays the correlation between the dependent variable quality of life of tiny agricultural farmers and independent variables Agricultural information management system, Community drip ISBN: 978-93-5619-947-7 irrigation, Rain shelter cultivation, and Decentralization of nurseries . Community drip irrigation has shown highest significant relation with P value .000 and correlation value .764. Hence the null hypothesis is 103 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 rejected and concluded that there is strong relationship between assistance provided by government and quality of life of tiny agricultural farmers. 5.5 Multiple Regression Analysis H04: There is no significant impact between grievance redressed mechanisms of farmer’s collectives on quality of life of tiny agricultural farmers. Table 5. Significant Impact of grievance redressal mechanism of farmer’s collectives on quality of life of tiny agricultural farmers. Model Impact of grievance redressal mechanism of farmer’s collectives on quality of life of tiny agricultural farmers R square Adjusted R square 0.823 0.828 Predictors: Timeliness of Grievance Redressal, Problem Solving Attitude of Farmers Collectives, Satisfaction on grievance resolution Dependent variable: quality of life Government should Mapping clusters of tiny agricultural farmers and provide special assistance for The above table shows the impact of grievance them. redressal mechanism of farmer’s collectives on quality of Government should made more investment for life of tiny agricultural farmers. The R-Square value establishing labs and research institutions in rural shows that any change in the chosen predictors will yield areas. 82.3% changes in the dependent variable that is the quality Policy makers should clearly defining rain fed of life of tiny agricultural farmers. Hence the null agriculture, micro irrigation, and group farming. hypothesis is rejected and concluded that there is a Farmer’s collectives can use grip boxes and suggestion significant impact of grievance redressal mechanism of boxes for grievance redressal. farmer’s collectives on quality of life of tiny agricultural Government should collect feedback from farmers farmers. The adjusted r-square value shows the change in related with various government initiatives and reframe the r-square value when a predictor is added or deleted policies related with community irrigation and rain from the existing regression model. shelter cultivation. Special attention should be provided for redressing VI. FINDINGS AND SUGGESTIONS grievances related with marketing and distribution, infrastructure and government assistance. Chi square test revealed that there is a strong association between type of farming and farmers VII. CONCLUSION awareness on various government initiatives. Results of independent sample t test showed that there The study concluded that the government should is significant difference in the perception of farmers on increase the awareness of farmers regarding various various challenges faced by them based on their initiatives taken by government for support tiny gender. Further correspondence analysis proved that agricultural farmers. Farmer’s collectives should take female farmers facing more problems related with initiative on the same. Most of the farmers are dissatisfied marketing and distribution of their agricultural with existing infrastructural facilities and marketing products than male farmers. facilities in rural areas. It is also founded that existing Exploratory factor analysis identified major challenges grievance redressal mechanism in selected farmer’s faced by tiny agricultural farmers in rural areas and collectives has some limitations. Most of the strategies named as infrastructure, marketing and distribution, used for grievance redressal were outdated. Hence government assistance, and use of pesticides and health farmer’s collectives should reframe their existing issues. grievance management policy and adopt some innovative Correlation analysis concluded that there is strong technics for grievance identification and redressal. relationship between various assistance provided by government for farmers and quality of life of tiny REFERENCES agricultural farmers. [1] Rao C H (2003). WTO and Viability of Indian Agriculture. It is also noted that Community drip irrigation has Economic and Political Weekly, 36 (36), 3453-3457. shown highest significant relation with P value .000 [2] Dhanabhakyam, M., & Monish, P. A Study of Employees and correlation value .764. Perception on Grievance Redressal Mechanism in Non Banking Regression analysis proved that there is 82% impact of Financial Institutions in Kozhikode City. [3] Thangamani (2016). Indian agriculture performance and grievance redressal mechanism of farmers collectives challenges.-a case study. Shanlax International Journal of Arts, on quality of life of tiny agricultural farmers in Science & Humanities, 3(3), 134-141. Kozhikode district, Kerala. ISBN: 978-93-5619-947-7 104 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 [4] Monish, P., & Dhanabhakyam, M. (2021). Sustainability Strategies for Developing SMEs and Entrepreneurship. In Handbook of Research on Sustaining SMEs and Entrepreneurial Innovation in the Post-COVID-19 Era (pp. 527-547). IGI Global. [5] Kumari, M., Meena, L.K. and Singh, R.G. (2015). Problems and prospects of maize crop in eastern zone of Bihar. International journal of agricultural science, 5 (2), 138-146. [6] Dhanabhakyam, M., & Monish, P. (2021). Impact of Employee Grievance Identification Strategies on Job Performance with Special Reference to Info Park and Techno Park, Kerala. Asian Journal of Managerial Science, 10(1), 33-35. [7] Vadivelu A. and Kiran B.R. (2013). Problems and Prospects of Agricultural Marketing in India: An Overview. International Journal of Agricultural and Food Science. 3 (3), 108-118. [8] Monish, P., & Dhanabhakyam, M. Demystifying Employee Grievance Management and Exploring the Workplace Justice and Job Commitment Nexus. [9] Gurudas Nulkar. (2014). SMEs and environmental performance- a framework for green business strategies. Procedia-social and behavioural sciences, 133, 130-140. [10] Gupta, S.P. and Rathore N.S. (1999). Disposal pattern and constraints in vegetable market: A case study of Raipur District of Madhya Pradesh. Agricultural Marketing. 42 (1), 53-59. [11] Dhanabhakyam, M., & Monish, P. (2019). Impact Of Employee Grievance Management On Job Commitment In Cyber Park Kozhikode. ISBN: 978-93-5619-947-7 105 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Social Role of IOT and Impact Analysis of its Penetration and Evolving into Society and Beneficiaries P.Gayathridevi Assistant Professor, PG-Department of Computer Science, Sengunthar Arts and Science College, Tiruchengode-637205 Abstract: Intelligent and IoT-based technologies have allowed for a wide range of technological advances across multiple aspects of life due to the rapid development and implementation of smart IoT (Internet of Things) technologies. The primary objective of IoT technologies is to simplify processes in different fields, to make better performance and efficiency of systems and finally to improve life quality in a smart way. IoT now emerging on many professions like engineering, industries, research environment, educational sector and living system. IoT makes their environment more smatter. The impact of IoT on the society is it will be able to improve the quality of life and reduce healthcare costs for individuals, businesses, and governments, as well as increase access to education and safer transportation for those remote and underserved. Keywords: Mechanisms, IoT, Blockchains, Heterogeneous. I. INTRODUCTION The Internet of Things(IoT) is an emerging technology representing of the system of connected people, devices, and services. There are numerous devices and objects that comprise the World Wide Web - each of which provides valuable information and innovative services through a number of standard communication protocols and each of which has its own unique addressing scheme. Future networks are expected to connect the physical world data with digital content and efficient services via billions of objects which will play a key role in integrating the physical and digital worlds. We can call this emerging networking paradigm the Internet of Things (IoT),will provide a uppermost set of opportunities trousers, manufacturers, and service providers with a wide applicability in many productive sectors. These include environmental monitoring, health care, inventory and product management, smart home and workplace, security and surveillance, and many others. The result is that today we have a novel approach to build applications that are enhanced and services that involve communication among objects on the Internet of services of people. The inspiration to develop more IoT objects has, therefore, evolved in recent years and outstands as succeeding research area that will unsurprisingly continue ISBN: 978-93-5619-947-7 over the coming years with the beginning of innovative enabling technologies .For example, the arrival of the latest concepts, like big data, informatics centric networking, cloud computing and social networking. These technologies have by now to some extent impacted and are playing important role in evolving the IoT idea and many new ultramodern paradigms are already in the sphere of progress. This paper is a review to motivate by the above considerations and aims at providing a vigilant analysis of the technologies that have contributed to the birth of the IoT and to its growth over the time. And also how necessary is the need of smart objects for the social use [1]. Smart objects are only the first step of an evolutionary process that is affecting modern communication devices and has been triggered by the advent of IoT in the telecommunication scenario. We are currently observing a generational leap from objects with a certain degree of smartness to objects with an actual social consciousness. One primary goal behind such smart integration of devices is to simplify people‟s lives by having technology work for them seamlessly [1]. The IoT as a term and concept is itself a metaphor that suggests an imaginary of things that connect seamlessly with and through the Internet as part of a dense network of objects. Objects in the IoT universe are characterized in anthropomorphic terms as “intelligent,” “smart,” “sociable,” and “communicative”: in some cases, possessing capabilities beyond those of human intelligence and interactions . Terminology employing the “smart” metaphor is frequently used interchangeably with the IoT. Concepts such as “smart cities,” “smart environments,” “smart factories,” “smart healthcare,” “smart agriculture,” “smart transport,” “smart workplaces,” “smart schools,” “smart hospitals,” “smart grids,” “smart buildings,” and “smart homes” include reference to the IoT. Computer scientists and informatics researchers have often made bold claims relating to the futures of the IoT: for example, that they can operate by “putting intelligence into everyday objects,” thereby working to “form a system where the real and 106 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 digital worlds meet and are continuously in symbiotic interaction”[2] standard and rules for communication, so it becomes a major problem in IOT.[4] II. CHALLENGES IN IOT 2.5 Scalability As IOT has come up with many new opportunities and applications in various fields, but it faces some challenges as well. Some of them are: Given the huge number of devices requiring simultaneous connectivity, scalability in IoT systems has become a concern. In IoT, there are mainly two types of scalability issues: vertical scalability, which refers to the addition or removal of computing resources of an IoT node; and horizontal scalability, which refers to the addition or removal of an IoT node. Given its importance, IoT scalability has been extensively addressed in the literature, with the proposal of cloud computing or cloud-based architectures. However, despite these efforts, challenges still remain, such as IoT nodes needing to provide an increased number of services, such as functional scalability, access control, data storage, fault tolerance, and privacy and security, to name a few.[1][3]. 2.1 Security Security is one of the biggest challenges in IOT. As the IOT devices such as sensors, actuators and they are directly accessible, so they are prone to various security attacks such as spoofing, denial of service, altering attack. So there is need to deploy against these attacks. 2.2 Data Storage As the amount of data is increasing with a very high pace, so the storage of data becomes a major problem. Data storage also effects data protection. As the stored data crash, it is difficult to backup all the stored data. So it is also major problem in IOT. Massive volume and heterogeneous data are the challenges in IoT data storage. A properly designed IoT middleware is required to handle the issues. This paper presents a framework consists of Internet Gateway Device (IGD) function, a Web service, NoSQL database, and IoT Application. The framework efficiently handles the structured and unstructured of sensors data. To verify the framework, we evaluated it using functional and non-functional testing. From the functional testing, this framework can deliver and store data with heterogeneous data and volume. From the non-functional testing, this framework can receive 443 data per second from an IGD, can deliver 173 data per second to IoT Apps, and response times are acceptable which is under 1 seconds. 2.6 Security and Privacy The lack of privacy standards and end-to-end security solutions has been an ongoing concern for conventional IoT deployment, and wireless IoT faces more challenges in terms of these aspects. Several technologies are aiming to solve privacy and security issues from both a hardware and software perspective.A hardware security system that utilizes RFID and localized network protocols is a key component in addressing security problems.By taking advantage of the zero-trust network feature of Key Management Systems (KMS) and blockchain technology, they address the privacy and trust threats with enhanced security features.A major challenge for IoT devices involves the interdependence of security, privacy, and trust for IoT ecosystems, thanks to newer communication protocols, KMSs, and blockchains. In order to achieve optimal integrity and performance, the challenge should always be regarded as holistic. 2.3 Standard and interoperability challenge 2.7 Energy Efficiency Set of standard has a huge impact on IOT. Each sort of objects in Internet of Things has diverse data, preparing and correspondence abilities. Diverse objects would likewise be subjected to various conditions, for example, the vitality accessibility and the correspondences data transfer capacity necessities. To encourage correspondence and participation of these items, basic benchmarks are required.[4] 2.4 Architecture challenge IOT consist of couple of devices connected, sensors and many more. Different device uses different set of protocols and standards to communicate. And there is no well defined ISBN: 978-93-5619-947-7 Researchers have used several approaches to address the problem of designing energy efficient IoT networks: (a) developing energy-efficient routing protocols to reduce the number of hops, optimizing communication link status, adopting wake sleep strategies based on network traffic, and data reduction via controlling the network topology. (b) incorporating renewable energy devices in the network alongside adopting load-balancing strategies.(c) exploiting wireless charging mechanisms to solve the fundamental issue of power management, especially for large-scale heterogeneous IoT networks. However, from hardware perspective there is a significant need to develop net-zeroenergy sensor nodes, since the current trend is to pack an 107 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 energy constrained node with more and more functionality, which could lead to a possible compromise between fidelity and power efficiency.[3]. 2.8 Self-Organization There is an ongoing paradigm shift from Internet-ofThings to Internet-of-Everything due to the proliferation of IoT nodes which demands new approaches to autonomic management to make the network proactive rather than reactive. The main idea behind self-organization in IoT systems is to actively respond to the changing environments in an automatic and coordinated fashion through the use of one or more control loops that reconfigures the system behavior on-demand to keep it within desired bounds .[3] In these systems, advanced algorithms are used in conjunction with high-level human goal and policy definitions to selfmanage proactively when the environment changes. The ability to organize self-tively and autonomously will be crucial for the survival and robustness of a dense IoT network in the future, which has sparked a great deal of research. However, there are many open challenges in this space and some notable research directions for the future include dealing with the heterogeneous interoperability of the system, designing of optimal self-organizing protocols and routing strategies for large-scale distributed heterogeneous IoT networks, and cross-platform behavior optimization.[3] III. IMPACT OF IOT IN OUR SOCIETY 3.1 IoT Based Parking System Parking is a major difficult in most of the place nowadays. Daily traveler have to spend a significant amount of time, fuel and energy to find a parking area. This situation gets worse during the peak hours. Internet of Things (IoT) has the potential to change this. In fact, startups have already implemented technology to solve this problem in many parts of the world. An up-to-date map of all the legal parking spots in a neighborhood can be accessed through these startups. through this the user can able to identify the availability of the parking place from their location. also they book their exact spot to park. They can make payments via e-payments. Consequently, travellers do not need to navigate the parking lot several times before finding a parking spot and can save time searching for parking. the buses arrive, there are chances that they will be full, and hence passengers are not able to board them. This problem is being solved by startups that are using the Internet of Things (IoT). They can communicate with commuter and provide them real-time information about the location of the bus and the availability of seats in them. They also provide information about the route and suggest alternative means of transport. 3.3 IoT- Home Automation System(Smart Home) Home automation system we can also call as smart home is a biggest welcoming field in IoT technology. it has several advantages. it is really a amazing thing to Imagine being able to set the lighting and temperature of your room without even moving out of your chair. The lights and temperature could be set according to the temperature and weather all the time if these settings could be stored. Also, imagine if you could remotely trigger your appliances so that your clothes can be washed at a specific time or your brewed coffee can be ready just when you reach home! it all being as a magic. the IoT technology make it all possible in our day to day life. but it seems very expensive nowadays. As a result, these technologies are only being utilized in the residences of the wealthy! In time, however, this technology will become cheaper, and everyone will have access to this comfort. Experts often say that Internet of Things (IoT) is the new electricity! Another major benefit of the Internet of Things (IoT) is that it cuts the utility bills of the house. Hence, even though the equipment may be expensive, it prevents wastage of electricity and brings down the bill. 3.4 Benefits of Social internet of Things 3.2 IoT Based Public Transport Systems The general effect that IoT can have on social media is enormous and spurring. In the context of social media, IOT will be able to distribute some of the most important benefits, including tracking the behavior of consumers in real-time and increasing awareness on the situation. This can be very useful for businesses who relies on deep insights into consumer behavior to deliver the desired services. Smart phones, which have turned into a fundamental part of our lives, are a standout amongst the most normally utilized gadgets. These smart phones can actually be seen as the control panels for IoT. Public transport system is really a biggest problem for everyone who is all using public transport system. There is no previous information about the bus and when the arrival. passengers ideally have to wait for the vehicles. at the time This can be the ideal “battle-room” for all interconnected IOT gadgets. According to the tech experts today, connected gadgets have exceptionally affected the way we relate and connect with others. Indeed, even most ISBN: 978-93-5619-947-7 108 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 organizations trust that their shoppers are investing a considerable measure of their energy in informal communities, for example, Facebook, WhatsApp, Instagram, and others. Comm., vol. 52, no. 1, 2014, pp. 97–105. [11] J. Lu, T. Sookoor, V. Srinivasan, G. Gao, B. Holben J. Stankovic, E. Field, and K. Whitehouse, “The Smart Thermostat: Using Occupancy Sensors to Save Energy in Homes,” ACM SenSys, 2010 IV. CONCLUSION Just like a magic, the IoT Penetrate in our society, we adopt the benefits of IoT successfully, in this review paper, we have discussed and analyzed about the current technological benefits of IoT. The success and growth of the IoT is unquestionable. In this review paper, we have analyzed and discussed the previous and current approaches.[1] In relation to connecting people with IoT systems, we presented several reference scenarios. In our proposal, we propose to reduce the complexity inherent in the IoT by having people interact with smart objects using their smart phones, thereby enabling the evolution of the IoP.[1]People have used the term "Internet" before, but usually to describe traditional Web systems designed only for humans to use. Here, it is used as a means of bringing the Internet of Things (IoT) closer to people, so they can easily get involved in it and fully benefit from it. REFERENCES Ayesha Bhandralia1, Kanika Chuchra2, Richa Vasuja3 1,2,3 Assistant Professor, Dept. of Computer Science, Chandigarh University, Punjab, India, Role of Internet of Things(IoT)to Overcome Social Challenges. [2] A Review of IOT Architecture, Challenges, Applications, Future Trends Davinder Kaur, Assistant Professor, Department of Computer Applications, CGC Landran davinder.3771@cgc.edu.inInderpreet KaurAssistant Professor, Department of Computer Applications, CGC Landran cecm.bca.ik@gmail.com [3] How Internet of Things Influences Human Behavior Building Social Web of Services via Agent-Based Approach Article in Foundations of Computing and Decision Sciences · September 2016. [4] Grand Challenges in IoT and Sensor Networks Muhammad Ali Imran*, Ahmed Zoha, Lei Zhang and Qammer H. Abbasi James Watt School of Engineering, University of Glasgow, Glasgow, United Kingdom. [5] Trends, benefits, risks, and challenges of IoT implementation in residential and commercial buildings Kehinde Lawal a , Hamed Nabizadeh Rafsanjani b , a School of Electrical and Computer Engineering, University of Georgia, Athens, GA 30602, USA b School ofEnvironmental, Civil, Agricultural, and Mechanical Engineering, University of Georgia, Athens, GA 30602, USA [6] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, “Context aware computing for the internet of things: A survey,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 414–454, 2014. [7] Luigi Atzori, Davide Carboni, Antonio Iera, “Smart Things in the Loop: Paradigms, Technologies, and Potentials”, in Ad Hoc Networks Journal, March 2013. [8] F. Akyildiz and J. M. Jornet, “The internet of nano- things,” IEEE Wireless Communications, vol. 17, no. 6, pp. 58–63, December 2010. [9] J. M. Jorne t and I. F. Akyildiz, “The internet of multimedia nanothings,” Nano Communication Networks, vol. 3, no. 4, pp. 242– 251, 2012 [10] L. Atzori, A. Iera, and G. Morabito, “From „Smart Objects‟ to „Social Objects‟: The Next Evolutionary Step of the Internet of Things,” IEEE [1] ISBN: 978-93-5619-947-7 109 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Handwritten Digits Recognition using CNN Identifying the Regional Based Writing Style Mrs.S.Sindhu1, Mrs. P M Kavitha2, Mr.MD.Tafsil3, Mr.Rajesh Rana4, Mr. Akshay Kumar Rana5 1,2 Assistant professor, SRM Institute Of Science and Technology, Chennai , India 3,4,5 Student, SRM Institute Of Science and Technology, Chennai , India Abstract: Humans' reliance on technology has never been higher, to the point that deep learning and machine learning algorithms can conduct everything from object detection in images to adding sound to silent movies. Similarly, handwritten text recognition is a major area of research and development with a plethora of possibilities. Handwriting recognition (HWR), also known as Handwriting Text Recognition (HTR), is a computer's capacity to recognize and interpret comprehensible handwritten input from sources such as paper documents, pictures, touch displays, and other devices. It appears that this paper used Support Convolution Neural Network (CNN) models to accomplish handwritten digit recognition using MNIST datasets. Our major goal is to compare the accuracy of the above models with their execution times in order to find the optimum digit recognition model. Keywords: Deep Learning, Machine Learning, Handwritten Digit Recognition, MNIST datasets, and Convolution Neural Network (CNN). I INTRODUCTION Handwritten digit recognition. Because handwritten digits are not flawless and can be generated with a variety of tastes, it is a difficult assignment for the machine. The solution to this problem is handwritten digit recognition, which uses an image of a digit to recognize the digit present in the image. A computer that can recognize human handwritten numbers from a variety of sources, such as photographs, papers, and touch displays, and classify them into ten different categories (0-9). Numerous applications exist for digit recognition, including number plate identification, postal mail sorting, and bank check processing. Handwritten digit recognition refers to a computer's capacity to recognize human handwritten digits from various sources such as photographs, papers, and touch screens. This has been a topic of boundless-research in the field of deep learning. There are numerous applications for digit recognition, including number plate identification, postal mail sorting, and bank check processing [2]. Because handwritten digit recognition is not an optical character recognition, we encounter numerous obstacles due to the various styles of writing used by different people. This study compares and contrasts various machine learning and deep learning methods for handwritten digit recognition. We employed Support Vector Machines, Multilayer Perceptron’s, and Convolutional Neural Networks to achieve this. The algorithms are compared based on their accuracy, mistakes, and testing-training time, which are supported ISBN: 978-93-5619-947-7 by plots and charts created with matplotlib for visualisation. II RELATED WORK With the humanization of machines, a significant amount of research and development activity has sparked interest in deep learning, machine learning, and artificial intelligence. Machines are becoming increasingly smart throughout time, and they have made our lives more secure and manageable, from fundamental math to retina recognition. Similarly, deep learning and machine learning are useful for recognising handwritten text. to evaluate the core machine learning algorithms on many criteria such as performance rate, execution time, complexity, and so on [3]. The Multilayer Perceptron classifier produced the most accurate results with the lowest error rate, followed by Support Vector Machine, Random Forest Algorithm, Bayes Net, and Random Tree, respectively. A comparison of SVM, CNN, KNN, and RFC was presented, with the highest accuracy of 98.72 percent using CNN (which took the longest to execute) and the lowest accuracy using RFC. did a detailed study-comparison of SVM, KNN, and MLP models to classify handwritten text and found that KNN and SVM correctly predict all the classes of dataset with 99.26 percent accuracy, but the process gets a little complicated with MLP when it had trouble classifying number 9, for which the authors suggested using CNN with Keras to improve the classification. Diagnostic characteristics. While has focused on comparing deep learning methods with machine learning methods and comparing their characteristics to see which is better for classifying meditational lymph node metastasis of non-small cell lung cancer from 18 F-FDG PET/CT images and also to compare the discriminative power of the recently popular PET/CT texture features with the widely used diagnostic features to see which is better. It was established that CNN's performance in classifying mediastinal lymph node metastasis of NSCLC from PET/CT images is comparable to that of the best traditional methods and human clinicians. CNN, on the other hand, does not use the import diagnostic features, which have been shown to be more discriminative than texture features when it comes to categorising tiny lymph nodes. As a result, putting diagnostic features into CNN is an exciting prospect. As a result, adding diagnostic 110 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 features into CNN is a promising future research direction. III MOTIVATION FOR PROPOSED WORK Machine learning and deep learning approaches are being used by developers to make machines more intelligent. A person learns how to accomplish a task by practising and repeating it over and again until it memorises the steps. The neurons in his brain then fire automatically, allowing them to do the task they've learnt rapidly. This is also quite similar to deep learning. It employs a variety of neural network topologies to solve various issues. Object identification, image and sound classification, object detection, image segmentation, and so on are examples. IV FEASIBILITY STUDY The first step in the project feasibility assessment is to sketch out your strategy. This offers you a sense of what your project's purpose is and where your analysis should focus. Using the MNIST dataset, we'll create a handwritten digit recognition software. Convolutional Neural Networks are a sort of deep neural network that we will use. Finally, we'll create a user interface that allows you to draw a digit and instantly recognise it. V ARCHITECTURE OF THE PROPOSED WORK Fig 1:- Architecture of the Proposed System The major goal is to apply machine learning approaches to discover the rules that should be employed in the AHDR for document images. The goal of this research is to recognize corrupted handwritten digits, improve the reliability of the recognition process' results, and reduce the time it takes to collect training and test data from handwritten digit strings. Preprocessing, segmentation, classification, and eventually recognition of supplied input data make up the total recognition process. In order to classify and detect the digits, the suggested model has four stages: A. Pre-processing B. Segmentation C. Feature Extraction D. Recognition and Classification Pre-Processing: The first step in processing the training set photos is to threshold them into a binary image in order to reduce the data. ISBN: 978-93-5619-947-7 Fig 2:- Sample images taken from MNIST database Segmentation: After the input photos have been preprocessed, the sequence of images is divided into subimages of individual digits. Individual digits are assigned a number and pre-processed digit images are divided into a sub-image of individual digits. Each digit gets resized into pixels on its own. An edge detection is performed in this stage. Feature Extraction: After the pre-processing and segmentation stages are completed, the pre-processed images are represented in the form of a matrix that contains pixels from very large images. In this approach, representing the digits in the photos that carry the necessary information would be beneficial. Feature extraction is the term for this activity. Redundancy in the data is removed during the feature extraction stage. Classification and Recognition: The retrieved feature vectors are used as individual inputs to each of the following classifiers in the classification and recognition stage. To demonstrate the working system model, the extracted characteristics are integrated and described using the three classifiers shown below: Random Forest Classifier Support Vector Machine K-Nearest Neighbor Fig 3:- Block Diagram of proposed model 111 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 5.1 K-Nearest Neighbour KNN is an instance based learning algorithm. There are two main benefits of using KNN algorithm, that is, it is robust to noisy training data and it is very efficient if the data is very large in size. To perform admirably, this algorithm requires a set of training datasets which includes perfectly labelled data points. KNN is also a nonparametric classifier. The algorithm considers new data point as its input and performs classification by calculating distance between new and labelled data points using the Euclidean or Hamming distance formulas. The Euclidean distance is calculated using the following formula: The SVM algorithm recognises the digit. The confusion matrix is presented using a matrix in which each row represents instances from a predicted class and each column represents examples from a real class. 5.2 Random Forest Classifier RFC is a method of supervised learning. It implies that there is a direct relationship between the total number of trees and the outcome: the more trees there are, the more precise the result will be. This classifier can be used for both classification and regression. If there are enough trees in the RFC algorithm, the classifier will not overfit the model, instead avoiding overfitting concerns. The missing quantities are handled by this classifier. Following the training, predictions are obtained from each individual tree, and the average is determined Fig 3:- Digit Recognized by SVM algorithm 5.3 Support Vector Machine SVM is a supervised learning technique as well. It can also be used for classification and regression. There are data elements in this type of method that are treated as points in an n-dimensional space. By completing classifications between the two classes, this classifier discovers the hyper plane. One of the most important features of this method is that it includes a regularisation parameter that prevents overfitting. All of the preceding processes are depicted in the block diagram displayed in Figure 3. VI RESULTS The following figures show the sequence of steps to be carried out to obtain the required output. The output generated by running the KNN algorithm. Fig 4: Output generated by CNN VII CONCULSION Handwritten Digit Recognition using Deep Learning Methods has been implemented in this research. To obtain a comparison of the classifiers, the most extensively used Machine learning algorithms, KNN, SVM, RFC, and CNN, were trained and tested on the same data. A great level of accuracy can be achieved with these deep learning approaches. In comparison to other research approaches, this strategy focuses on which classifier performs best by enhancing classification model accuracy by above 99 percent. A CNN model with Keras as the backend and Tensorflow as the software can achieve 98.72 percent accuracy. In this first trial, CNN achieves a 98.72 percent accuracy, KNN achieves a 96.67 percent accuracy, and RFC and SVM do not do well. REFERENCES [1] [2] [3] https://pythonprogramming.net/tensorflow-deep-neural-networkmachine-learning-tutorial/?completed=/tensorflow-introductionmachine-learning-tutorial/ Https://En.Wikipedia.Org/Wiki/Rectifier_(Neural_Networks) https://projectworlds.in/artificial-intelligence-project-handwrittendigits-recognition/ Fig 2:-.Output generated by KNN ISBN: 978-93-5619-947-7 112 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] S. Ioffe and C. Szegedy, "Batch normalization: Accelerating deep network training by reducing internalcovariate shift", CoRR, February 2015. J. Y.-H. Ng, M. Hausknecht, S. Vijayanarasimhan, O. Vinyals, R. Monga and G. Toderici, "Beyond shortsnippets: Deep networks for video classification", CoRR, March 2015. Karpathy and L. Fei-Fei, "Deep visual-semantic alignments for generating image descriptions", CoRR, 2014. F. Schroff, D. Kalenichenko and J. Philbin, "Facenet: A unified embedding for face recognition and clustering", CoRR, Marchs 2015. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, et al., "Going deeper with convolutions", CoRR, 2014. M. Bishop, Pattern Recognition and Machine Learning, Springer, 2006. C.-C. Chang and C.-J. Lin, "Libsvm: A library for support vector machines", ACM Trans. Intell. Syst. Technol, vol. 2, no. 3, pp. 27:1C27:27, 2011. DE Rumelhart, GE Hinton, RJ Williams et al., "Learning representations-by back-propagating errors", Cognitive modeling, vol. 5, no. 3, pp. 1, 1988. H Jaeger, "Controlling recurrent neural networks by conceptors", arXiv preprint 573arXiv, vol. 1403, no. 3369, 2014. Hu Yuhuang, M S Ishwarya and Kiong Loo Chu, "Classify Images with Conceptor Network", cs.CV arXiv, 2015. .S H Chen, S H Hwang and Y R Wang, "An RNN-based prosodic information synthesizer for Mandarin text-to-speech[J]", IEEE Transactions on Speech Audio Processing, vol. 6, no. 3, pp. 226239, 1998. Mantas, "A Practical Guide to Applying Echo State Networks[M]" in Neural Networks: Tricks of the Trade, Springer Berlin Heidelberg, pp. 659-686, 2012. Herbert Jaeger, "Using Conceptors to Manage Neural Long-Term Memoriesfor Temporal Patterns", Journal of Machine Learning Research, vol. 18, no. 13, pp. 1-43, 2017. ISBN: 978-93-5619-947-7 113 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Modelling and Forecasting of Stock Price Volatilty– An Analysis K. Kannan1, Dr. S. Balamurugan2 Research Scholar, Department of Management Studies, Periyar University, Salem, Tamil Nadu, India 2 Assistant Professor, Department of Management Studies, Periyar University, Salem, Tamil Nadu, India 1 Abstract: The present study attempts to use the GARCH family models for modelling and forecasting the price volatility of the NIFTY 50 companies listed under the Indian stock market, using the daily adjusted closing price for the period from 1/04/2011 to 31/03/2021. The research design used for the study is analytical research design. The sampling design used for the study is purposive sampling method in which the researcher selects one important sector from the NIFTY 50 index listed on 31/03/2021. The major sector like Financial Services sector were selected based on the sector weightage. In this study the researcher used different combination of ARCH and GARCH lags and the high-order models were generally tested to select the most suitable model. The models of forecasting like Generalized Autoregressive Conditional Heteroskedasticity- symmetric GARCH (2,1), asymmetric GARCH models like Exponential GARCH- EGARCH (2,1) and Threshold GARCH – TGARCH (2,1) were considered for the study. In order to see the ARCH effect, Heteroskedasticity Test like - The Lagrange Multiplier (LM) test for ARCH were used to see the presence of Heteroskedasticity in residual of the return series. Because if ARCH effect is present, we can use ARCH/GARCH models. The stationarity test like Augmented Dicky-Fuller test were conducted to see whether the return series are stationary. The test of normality like Jarque-Bera test were used to see whether the return series were normally distributed. The performance of these GARCH models were evaluated by using the two error statistics like Root Mean Square Error and Mean Absolute Error. Based on these evaluation TGARCH were outperformed well and it helps to capture the leverage effect, volatility clustering, accuracy in forecasting and to differentiate the asymmetric effect between good news and bad news. Keywords: Price Volatility, Modelling and Forecasting, NIFTY 50, GARCH family Models. I. INTRODUCTION Investment in the stock market is always predicted to be risky because they are more volatile. In the stock market, there is volatility when the stock markets are influenced by the macro-economic variables. The volatility is the extent to which the security price, market or commodity increases or decreases for a particular time. The volatility relates to the quantity of uncertainty regarding the scale of adjustments in the value of a security. In securities markets, volatility implies peaks and troughs which might lead for either loss or gain. The term volatility is the quantitative measure of the fluctuations of the price or rate of return of the percentage price ISBN: 978-93-5619-947-7 adjustment. Volatility is a challenge and a major problem for those concerned with cash or trading in the stock exchange or some other financial instrument. For financial professionals, market participants, institutional investors, regulators and analysts, the issues of volatility were becoming extremely important in recent years. Volatility is calculated by the average value of variance or by the standard deviation of stock returns. The stock returns are taken instead of stock values when calculating the volatility so mean must be constant at the distinct time when calculating the dispersion around an average value. The modelling and forecasting of asset return volatility is critical in different financial market-related applications, such as derivative valuation and the management of risk. To take an investment decision in the stock market, the consideration of volatility is mandatory. Numerous studies to test the volatility are being carried out in the developing countries. Different variables such as market rate, trading process, dividend distribution and data arrival have been selected as various factors to calculate volatility. Since the stock market volatility is an inevitable problem, it is necessary for the developing countries to re-examine the issues related to the stock market volatility .The present study attempts to use the GARCH family models for modelling and forecasting the price volatility of the NIFTY 50 companies listed under the Indian stock market, using the daily adjusted closing price for the period from 1/04/2011 to 31/03/2021 in a quantitative term. The financial services sector was purposefully selected by the researcher based on the sectors weightage. The stock price volatility modelling and forecasting of the selected sectors indexed under NIFTY 50 and listed under the National Stock Exchange of India has been evaluated by using the GARCH family models. The study is based on the adjusted closing price of the selected 10 companies under the financial services sector. Because to give the investors a more current and accurate idea about the stock price adjusted closing price of each selected companies were taken into consideration. The structure of this paper are as follows: Section 2 shows the related review of literature. Section 3 explains the research methodology. Section 4 provides empirical results. Section 5 presents the conclusion. II. REVIEW OF LITERATURE Earlier studies such as Abdalla and Winker (2012), Babatunde (2013) were examined the modelling and 114 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 forecasting of the stock market by using the GARCH family models. Their studies revealed that the GARCH models were better and considered as the best fitted models for forecasting the stock price volatility. Godfrey (2020) were studied the stock market volatility modelling for the accuracy in forecasting by using symmetric and asymmetric GARCH type models. Fauzia (2018), Dohyunchun (2019) and Huthaifa (2020) were analysed the volatility of the stock prices by using non-linear GARCH type models and they made a comparison between them and their findings revealed that which model is better for capturing the leverage effect, volatility clustering, conditional variance, leptokurtosis and skewness. Hussainy and Khanh (2009), Narayan and Reddy (2020) were examined how the macroeconomic variables affect the performance of the stock market through an empirical analysis and they found the relationship between the stock market development and returns by considering various macro-economic factors. Liu (2010) examined the time series studies i.e. the leverage effect (asymmetric). It may happen when the stock returns have adverse correlation with the changes in volatility. i.e. because of the bad news the volatility is expected to increase and the volatility decreases as a response to the good news. Phich and Henghan (2011), Dana (2016), were used the ARCH/ GARCH models for modelling and forecasting the stock price volatility and their findings revealed which model is better for volatility forecasting. Their findings revealed different models like GARCH, GJR GARCH, E GARCH, M GARCH and T GARCH were better for forecasting the volatility of the stock market at different time periods. Jelilov et.al (2020), Mazur et.al (2020) analysed how COVID-19 pandemic and the march 2020 market crash affect the stock market by conducting an analytical study and they provide an empirical result. The outcome of their study shows that the performance of the stock market was affected during the COVID-19 period, particularly the investment in the automobile sectors and other major sectors were affected adversely during this period. accurate idea about the stock price. The primary objective is to identify the suitable GARCH family models for forecasting the stock price volatility among the selected NIFTY 50 companies in India. The statistical tools like Descriptive analysis, Test of Normality, Augmented DickeyFuller Test, Heteroskedasticity Test, GARCH family models like Generalised Autoregressive Conditional Heteroskedasticity (GARCH), Exponential GARCH (EGARCH) & Threshold GARCH (T-GARCH) were used to analyse the data. IV. EMPIRICAL RESULTS The descriptive statistics of the financial services sector shows that all the selected companies mean values are positive which indicates the fact that price has increased over the period. The standard deviation of return series revealed that the selected companies are relatively volatile. If the skewness is normal, it should be zero. If the skewness values are positive or long right tailed it has the higher chance of getting positive returns. Similarly, if the value of skewness is negative or long left-tailed it has the higher chance of getting negative returns. For all the selected companies the value of kurtosis is greater than 3. It indicates that the return series are fat tailed and were not normally distributed. Table 1. Test of Normality S.No. Name 1 HDFC Bank 2 HDFC 3 ICICI Bank 4 KOTAK Bank 5 AXIS Bank 6 SBI 7 Bajaj Finance 8 Bajaj Finserv 9 IndusInd Bank 10 SBI Source: Computed from Eviews J-B 5413.60 5719.20 2322.63 2101.72 13210.33 6151.02 10360.48 13646.25 15610.21 16140.13 Probability 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 III. RESEARCH METHODOLOGY Research is the “acquisition of new knowledge or the creative use of existing knowledge to produce new ideas, approaches, and conceptions”. The Analytical Research Design were used for the study and the sampling method used is “Purposive Sampling”. The sampling unit used for this study is 10 Companies under one major sector like financial services and which is listed in the National Stock Exchange of India and indexed under NIFTY 50 as on 31/03/2021. The list of companies in the financial services sector were selected based on the sector weightage. The daily adjusted closing price of these companies were taken from the financial information provided by the National Stock Exchange of India (Source: Yahoo! Finance). Because the adjusted closing price provides investor more current and ISBN: 978-93-5619-947-7 Jarque-Bera test helps to see whether the return series were normally distributed. The test statistic P-value falls between 0 and 1. The null hypothesis were rejected at 1% significance level, which indicates the fact that the return series were distributed normally were rejected and it may have concluded that all the return series were not normally distributed which is leptokurtic distribution with positive peaked curve. To check the stationarity of the return series ADF test were used. It helps to check whether the time series has a unit root. The (t-statistic) values of the ADF test are more negative than the test critical values, therefore the null hypothesis which indicates the return series has a unit root i.e. (the return series are non-stationery) is rejected at 1% significant level at the level difference itself. Hence, it is concluded that the return series of all the selected companies are stationary. 115 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Before applying the ARCH/ GARCH model it is mandatory to test the ARCH effect in the re4turn series. Hence, Lagrange Multiplier (LM) method were used, and the P-Value of the test is almost zero. The critical value of the chi-square (1) at 1% is 6.645. Therefore, the null hypothesis is rejected at 1% significance level for all the selected companies. This shows the presence of ARCH effect in the return series. Hence, GARCH family models can be applied. The result of GARCH (2,1), EGARCH (2,1) and TGARCH (2,1) model for the financial services sector reveals that the GARCH (2,1) model shows the coefficient estimation for all the selected companies. The (β1) value clearly shows the maximum information were comes from the past. The new information has a less impact (α1). The long run average variance is near to zero. Since GARCH (2,1) model does not capture the effect of asymmetric volatility. EGARCH (2,1) model were used for the volatility estimation of stock returns. The condition of stationarity is both the ARCH and GARCH term should be less than 1. Therefore, the stationarity condition was not met for the selected companies using the return series under EGARCH model. Since the Gamma value is non-zero it shows that there is an existence of asymmetry in the volatility, but this model does not provide valuable information whether the good or bad news affects the volatility. Therefore, TGARCH model were used. The TGARCH model shows that the bad news increases the volatility substantially and the stock return volatility is asymmetric. To obtain the best forecasting model, the statistics from that volatility model is used with the: Lowest Akaike Information Criterion (AIC), Lowest Schwartz Information Criterion (SIC), Lowest Root Mean Square Error (RMSE), Lowest Mean Absolute Error (MAE). For all the selected companies, it is observed that the RMSE and MAE values are lowest under TGARCH (2,1) model. Therefore, it indicates that the TGARCH (2,1) model outperforms all the other models and provides a more accurate forecast in terms of RMSE and MAE. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] Abdalla, S., Z., & Winker, P. (2012). Modelling Stock Market Volatility Using Univariate GARCH Models: Evidence from Sudan and Egypt. International Journal of Economics and Finance, 4(6), 161 – 176. Babatunde, O. A. (2013). Stock Market Volatility and Economic Growth in Nigeria. International Review of Management and Business Research, 2(1), 201 – 209. Dana AL- Najjar. (2016). Modelling and Estimation of Volatility using ARCH/ GARCH Models in Jordan’s Stock Market. Asian Journal of Finance and Accounting, 8(1), 152-167. Dohyunchun, Hooncho, & Doojin Ryu. (2019, January). Forecasting the Korea Composite Stock Price Index 200 Spot Volatility Measures. Statistical Mechanics and its Applications Journal, 514, 156-166. Fauzia Mubarik, & Attiya Yasmin Javid. (2018). The Impact of Macroeconomic Volatility on Stock Return Volatility: Evidence from Pakistan Stock Market. Pakistan Business Review, 826 – 842. Godfrey Joseph, & Ismail. (2020). Modelling Volatility in the Stock Market for Accuracy in Forecasting. International Journal of Recent Technology and Engineering, 8(5). Hussainey, K., & Khanh Ngoc, L. (2009). The impact of macroeconomic indicators on Vietnamese stock prices. Journal of Risk Finance, 10(4), 321-332. Huthaifa, Alaa, & Ahmad. (2020). Modelling and Forecasting the Volatility of Cryptocurrencies: A Comparison of Non- Linear GARCH type Models. International Journal of Financial Research, 11(4), 346-356. Jelilov, Paul, & Usman. (2020). Testing the nexus between stock market returns and inflation in Nigeria: Does the effect of COVID‐ 19 pandemic matter?. Journal of Public Affairs an international journal. Liu, H.C., & Hung J.C. (2010). Forecasting S&P-100 stock index volatility: The role of volatility asymmetry and distributional assumption in GARCH models. Expert Systems with Applications, 37, 4928-4934. Mazur, Dang, & Miguel. (2020). COVID-19 and the march 2020 stock market crash. Evidence from S&P1500. Finance Research Letters, 10(4). Narayan, & Reddy. (2020). The Dynamics of Macroeconomic Variables in Indian Stock Market: A Bai- Perron Approach. Journal of Macroeconomics and Finance in Emerging Market Economics, 13(1). PhichHang Ou, & Hengshan Wang. (2011, July). Modeling and Forecasting Stock Market Volatility by Gaussian Processes based on GARCH, EGARCH and GJR Models. Paper Presented at International Conference of Applied and Engineering Mathematics, Proceedings of World Congress of Engineering, London, U.K. 6-8. V. CONCLUSION The detailed analysis shows that the forecasting ability, prediction, and estimation of the stock market volatility for the return series of the selected NIFTY 50 companies under financial services sector for the period of 1/04/2011 to 31.03/3021. The TGARCH model outperforms, and it is considered as the best-fitted model based on the evaluation of the forecasting performance by using two different error statistics like Root Mean Square Error and Mean Absolute Error. Hence, TGARCH (2,1) model helps to capture the leverage effect, accuracy in forecasting and to differentiate the asymmetric effect between good news and bad news. ISBN: 978-93-5619-947-7 116 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Payment Transaction using Face-Recognition P. M. Kavitha1, D. B. Shanmugam2, T. Akash3, T. Karan Raj4, A. Girish Gowtham5 Assistant Professor, Department of Computer Applications, SRM IST, Ramapuram Campus, Chennai. 2 Assistant Professor, Department of Computer Applications, SRM IST, Ramapuram Campus, Chennai. 3,4,5 BCA Final Year Students, Department of Computer Applications (BCA), SRM IST, Ramapuram Campus, Chennai 1 Abstract: The new progressions in innovation have prompted a flood in online exchanges using web-based shopping, web banking, installment entryways, and so on Security is the most predominant issue during these exchanges. Because of such issues, individuals are reluctant to utilize online exchanges, so we propose our framework which gets online exchanges utilizing two-venture confirmation. The initial step is OTP confirmation followed by facial acknowledgment. The framework involves an internet-based interface to communicate with a client. The point of interaction is utilized to get card subtleties from the client. After the OTP confirmation, the client is validated utilizing facial acknowledgment. The framework involves an MTCNN to confirm the client by contrasting the ongoing caught picture of the client against the pictures related to the client's account. Key words: MTCNN, online payment, security, image verification, face recognition, credit card. I. INTRODUCTION In the current universe of cutting edge innovation, it is simple for programmers to get individual subtleties of clients due to which certain individuals are reluctant to utilize online exchanges. This makes security a significant variable at the hour of making computerized installments. Subsequently, we propose a framework to improve the security of online exchanges by giving a 2venture check process: OTP confirmation followed by Facial Recognition. The framework, which we will propose, will attempt to decrease the quantity of assaults at the hour of making computerized installments. Online exchanges become helpless due to lost or taken cards, account takeover, fake cards, false application, various engraving, and tricky shippers. On account of record takeover, a card holder unwittingly gives his financial subtleties to a fraudster and the fraudster then makes a copy card with those subtleties. Likewise, in fake, a client's card is cloned and afterward utilized by the fraudster. Numerous engravings happen when a similar solitary exchange is recorded on various occasions. In deceitful traders, representatives of the shipper work with the fraudsters. The proposed framework prevails with regards to decreasing this large number of cheats by catching and confirming an ongoing picture of the card holders. are unique finger impression, hand math, iris, face and palm. In this paper, we are involving face acknowledgment as it's the most well-known, effectively usable and generally OK [8]. Under facial acknowledgment, there are different methods utilized like, SVM[2], PCA [2], LDA [3], CNN and MTCNN. This paper involves MTCNN for facial acknowledgment as it has been on depicted better outcomes under facial acknowledgment. Likewise, it is viable with all working frameworks and a wide range of programs. The client (card holder) should basically have a have a camera associated with the gadget to catch an ongoing picture, and a decent web association with access the (UI), as the framework has a web UI. II. RELATED WORK 2.1 Strategies for getting on the web exchanges The current strategies for getting on the web exchanges are account related secret phrase, card check esteem (CVV) and once secret key (OTP). OTP is a mix of letter sets and numbers which is shipped off the record holders' enlisted telephone number through SMS or by means of email. Any card holder who doesn't have any of the 2 referenced above can not totally finish the internet based exchange. It is for the most part accepted that OTP is secure and safe. In any case, it isn't powerful to assaults like pantomime, phishing, and malware-based replay assaults. 2.2 Procedures for bio-metrics Biometric innovation is utilized for verification of a card holder. The different biometric methods are utilizing voice, face, palm and fingerprints. Voice acknowledgment estimates a client's voice designs, talking style and pitch, finger impression ID utilizes examples of the rides and valleys present in fingerprints checked in advance, palm recognizable proof uses palm prints and other actual attributes for remarkable ID of client's palm, and face acknowledgment catches and stores the facial highlights of an individual and stores them for ID process. 2.3 Biometric genuineness is acquiring a great deal of consideration because of its uniqueness for each person. A portion of the different biometric verifications ISBN: 978-93-5619-947-7 Methods for face acknowledgment The various strategies utilized in facial acknowledgment incorporate PCA[2], SVM[2], LDA[3], 117 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 CNN and MTCNN. Standard part investigation (PCA) is utilized to diminish the dimensionality of information to lessen the quantity of boundaries in pictures, which are high layered corresponded information. It depends on Eigen values and Eigen vectors. Support Vector Machine (SVM) is utilized for twofold arrangement. A SVM based classifier is utilized in facial acknowledgment to anticipate the comparability and divergence between two images[2]. Convolutional Neural Network is a profound brain network engineering which is utilized to remove highlights from pictures. CNNs can be utilized as classifiers or as component extraction. Perform various tasks fell convolutional brain network is a calculation comprising of 3 phases, which recognizes the bouncing boxes of appearances in a picture alongside their 5-Point Face Landmarks. III. LITERATURE SURVEY 3.1 FaceNet (2015 IEEE): A Unified Embedding fo Face Recognition and Clustering In this paper is introduced a framework, called FaceNet [1]. FaceNet figures out how to straightforwardly plan face pictures to a minimized Euclidean space. The distances between the produced vectors give the closeness between the countenances. The made space can be utilized for various undertakings like face acknowledgment, check and bunching involving standard methods with FaceNet embeddings as component vectors. We stretch out this idea to apply it to get online exchanges. 3.4 An Efficient Scheme for Face Detection (2015 IEEE) This work [6] depends on skin tone, shape attracting and include extraction to give a productive and straightforward method for recognizing human countenances in pictures. The highlights viable are mouth, eyes, and nose. The outcomes are with great exactness, extraordinary speed and straightforward calculations. 3.5 Gender and Age Classification of Human Faces (2017 IEEE) This paper [10] acquaints a methodology with characterize orientation and age from pictures of human faces which is a fundamental piece of our technique for independent recognition of strange human conduct. This paper is a constant report from past examination on heterogeneous information in which pictures as supporting proof is utilized. A technique for picture grouping in view of a pre-prepared profound model for highlight extraction and portrayal followed by a Support Vector Machine classifier is introduced. We use CNN instead of SVM. 3.6 Credit Card Transaction Using Face Recognition 3.2 When Face Recognition Meets with Deep Learning (2015 IEEE) The paper [4] intends to give a shared belief to all understudies and scientists the same by directing an assessment of effectively reproducible face acknowledgment frameworks in view of CNNs. It utilizes public information base LFW (Labeled Faces in the Wild) to prepare CNNs rather than an individual data set. It proposes three CNN designs which are the principal detailed models prepared utilizing LFW information. We utilize the LFW dataset to prepare our organization as well as an individual data set to test it. 3.3 Building Recognition System Based on Deep Learning (2016 IEEE) Profound learning designs utilize a various convolution layers and initiation capacities which are fell. The main perspective is the arrangement the quantity of layers and the quantity of neurons in each layer, the determination of initiation capacities and improvement calculation. It [5] utilizes GPU execution of CNN. The CNN is prepared in a directed manner to accomplish awesome outcomes. We We stretch out this framework to involve it for the protected internet based exchanges. ISBN: 978-93-5619-947-7 Fig.1: Enrolment Module in Credit Card IV. METHODOLOGY Perform multiple tasks Cascaded Convolutional Neural Network is being utilized for facial acknowledgment and verification of the client. MTCNN is a profound learning calculation and is viewed as proficient in breaking down pictures since they utilize moderately little pre-handling contrasted with other picture arrangement calculations [4]. The organization utilizes a course structure with three organizations; first the picture is rescaled to a scope of various sizes (called a picture pyramid), then, at that point, the primary model (Proposal Network or P-Net) proposes competitor facial locales, the subsequent model (Refine Network or R-Net) channels the jumping boxes, and the third model (Output Network or O-Net) proposes facial tourist spots. [7] 118 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 information. We used the Teachable machine for getting ready, testing and for making a module. Fig.2: Face Detection Fig.3: Face Detection Cycle MTCNN is a calculation with 3 phases, which recognizes the bouncing boxes of countenances in a picture alongside their 5 Point Face Landmarks. Each stage step by step further develops the discovery results by going its contributions through a CNN, which returns applicant bouncing boxes with their scores, trailed by non max concealment. In stage 1 the information picture is downsized on various occasions to fabricate a picture pyramid and each scaled form of the picture is gone through its CNN. In stage 2 and 3 we remove picture patches for each bouncing box and resize them (24x24 in stage 2 and 48x48 in stage 3) and forward them through the CNN of that stage. Other than jumping boxes and scores, stage 3 furthermore figures 5 face milestones focuses for each bouncing box. Subsequent to messing with some MTCNN executions, it just so happens, you can really get very exact identification results at much lower surmising times contrasted with CNN, even by running induction on the CPU. 5.2 Android application Our App empowers sending and getting cash, yet dissimilar to other computerized wallets, the installments can be gotten straightforwardly into the financial balances. So the whole worry of getting cash in wallets and afterward moving into the ledger has been killed. Curiously, an individual doesn't need to be on the application to get installments. Our application improves on the course of cash move with facial acknowledgment and 2-venture verification. Though the essential capacity of the application is to permit straightforward cash with high security. To make a purchase, a client taps their mobile phone on a retail store terminal or chooses to pay in your convenient application. Our application responds with the client's tokenized card and a cryptogram which goes probably as a one-time-utilize secret key and facial affirmation. We involved Adobe XD for making the easy to use interface and for the strike work we worked with android studio. V. MODULES 5.1 Face Recognition Facial affirmation is a way to deal with recognizing or asserting a particular's character using their face. Facial affirmation structures can be used to recognize people in photos, accounts, or ceaselessly. Facial affirmation is a class of biometric security. Various kinds of biometric programming consolidate voice affirmation, finger impression affirmation, and eye retina or iris affirmation. The advancement is generally used for security and guideline necessities, but there is extending interest in various areas of usage. Various phones, including the most recent iPhones, use face affirmation to open the device. The development offers a solid strategy for protecting individual data and ensures that delicate data stays inaccessible expecting the phone is taken. Apple ensures that the chance of an erratic face opening your phone is around one out of 1 million. Facial assertion utilizes PC conveyed channels to change face pictures into mathematical appearances that can think about pick their comparability. These channels are generally conveyed by utilizing huge "understanding," which utilizations counterfeit brain relationship to oversee ISBN: 978-93-5619-947-7 Fig4. Flow Chat in Android Application 5.3 Two-step verification With 2-Step Verification (regardless of called twofactor certification), you add a layer of safety to your record if your secret articulation is taken. After you set up 2-Step Verification, you'll sign in to your record in two stages utilizing: Something you know, similar to your secret articulation. Something you have, similar to your telephone. For our situation, we utilized facial acknowledgment and OTP login for two-stage confirmation. Two-adventure check is now and again confused with two-factor affirmation (2FA), which moreover incorporates two for the most part sequential methods used for check. Regardless, curiously, with 2FA 119 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 cycles, the methodologies in two-adventure check can have a spot with a comparative grouping of affirmation factors, and the procedures used for 2FA aren't exactly progressive. Besides, affirmation and approval are not the same. The affirmation can be fundamental for a genuine cycle - - giving a driver's license as proof of character, for example. Approval is considered to be a change of check processes planned to shield electronic and online systems. Regardless, various two-adventure affirmation things and organizations are furthermore occasions of two-factor approval. Google's 2-Step Verification organization, for example, incorporates the standard mystery word (something the client knows) and a code delivered off the client's contraption (something the client has). Most other current internet-based client approval structures depicted as two-adventure check moreover qualifies as two-factor confirmation. Fig.4: Two-step verification VI. RESULTS This highlight essentially further develops security rate and execution soundness contrasted and a standardbased arrangement. The created arrangement, in light of a high-level brain network-based innovation and stage, expanded the security rate from 85% to 90 percent. Recognition Meets with Deep Learning: an Evaluation of Convolutional Neural Networks for Face Recognition, IEEE International Conference on Computer Vision Workshop, 2015. [5] Pavol Bezak, “Building Recognition System Based on Deep Learning”, IEEE, vol. 6, no. 1, pp. 212-217, 2016. [6] Mohamed Heshmat, Moheb Girgis,et al, “An Efficient Scheme for Face Detection Based on Contours and Feature Skin Recognition”, IEEE, 2015. [7] Kaipeng Zhang1 Zhanpeng Zhang2 Zhifeng Li1 Yu Qiao1, “Joint Face Detection and Alignment Using Multitask Cascaded Convolutional Networks.”, IEEE Signal Processing Letters (SPL), vol. 23, no. 10, pp. 1499-1503, 2016 [8] Gittipat Jetsiktat, Sasipa Panthuwadeethorn, Suphakant Phimoltares, “Enhancing User Authentication of Online Credit Card Payment using Face Image Comparison with MPEG7-Edge Histogram Descriptor”, International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS), IEEE, 2015. [7] Adrian Rhesa Septian Siswanto, Anto Satriyo Nugroho, Maulahikmah Galinium, “Implementation of Face Recognition Algorithm for Biometrics Based Time Attendance System”, International Conference on ICT for Smart Society (ICISS), IEEE, 2014. [8] Xiaofeng Wang, Azliza Mohd Ali, Plamen Angelov, “Gender and Age Classification of Human Faces for Automatic Detection of Anomalous Human Behaviour”, IEEE, 2017. [9] W. Mohamed and M. Heshmat, M. Girgis, S. Elaw, A new method for face recognition using variance estimation and feature extraction, International Journal of Emerging Trends and Technology in Computer Science (IJETTCS), vol. 2, no. 2, pp. 134-141, 2013. [10] R.S. Choras, “Facial feature detection for face authentication”, in the Proceeding of IEEE Conference on Cybernetics and Intelligent Systems., 2013, pp.112 116, 2015. [11] K I. Aldasouqi and M. Hassan, Smart human face detection system, International Journal of Computers, vol. 5, no. 2, pp. 210216, 2015. [12] A K. Jain, P.Flynn, A. A. Ross, Handbook of Biometrics, New York: Springer, 201 VII. CONCLUSION The framework improves the security of online exchanges by effectively perceiving and confirming approved clients. The framework can be utilized as an installment entryway for any application which requires online installments. These incorporate online business sites, web and portable banking. The framework can be gotten to on any working framework utilizing any internet browser. For future work, iris recognizable proof can be added to the framework for additional improving the security of the exchanges. REFERENCES [1] [2] [3] [4] Florian Schroff, Dmitry Kalenichenko,and James Philbin, “FaceNet: A Unified Embedding for Face Recognition and Clustering”, IEEE, 2015. Muzammil Abdulrahman, Alaa Eleyan, “Facial expression recognition using Support Vector Machines”, 23nd Signal Processing and Communications Applications Conference (SIU), IEEE, 2015. Yuan Wei, “Face Recognition Method Based on Improved LDA”, 9th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), IEEE, vol. 2, pp. 456 - 459, 2017. Guosheng Hu, Yongxin Yang, Dong Yi,et. al.,When Face ISBN: 978-93-5619-947-7 120 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Study Paper on E-Recruitment Priyanka ShivajiPatil Research Scholar, ChhatrapatiShahu Institute of Business Education and Research, Kolhapur Abstract: E-enrollment is generally called internet based enlistment or electronic enlistment. By and by a day the traditional enlistment procedure has been annoyed with the surge of web. On the web enrollment has gained a few astounding headway since its starting point. It is the latest example in enlistment process besides it has been taken on by huge and little - estimated affiliations. The significance of web can be considered to be searching for best suitable occupation is just a tick away. Individual to individual correspondence, association destinations, etc. E enrollment is landing position searchers and exquisite scouts because of its advantages to the proficient and cost and quality, etc E enlistment insinuates posting open doors on the corporate locales or a web based email electronic course of action. Most of the affiliations already using e enlistment to post positions and recognize resumes on the messages. The E enrollment procedures and structure have helped with recognizing the overall thought of e enlistment. Enrollment has turned into a huge cycle in the uncommonly vicious work market. The essential accomplishment factors of e enlistment are the fast communication, sufficiency, and cost. The audit researches off the parts of e enlistment, continuous examples of e enrollment and benefits of e enrollment are inspected. E enlistment importance and hardships are in like manner inspected. Keywords: E organization. recruitment, online recruitment, I. INTRODUCTION E-Recruitment is also known as digital recruitment, that is refer to use of web technology to the source, catch/attract, access, select candidate and on boarding candidate for vacant position. E-recruitment originated in the form of independed job site called bulletin board system in the 1980s. The united started global trend of E-recruitment when Taylor launched Monster.com in 1994 with 20 clients and 201 job openings. E recruitment has ended up being very helpful for the both organization and occupation candidates. A few times it will be neglect to the assortment of the gig candidates in view of organization issues. The reason for e recruitment is to make the cycle in question more effective just as costly. It can arrive at a huge pool of likely representatives and it makes conceivable to the determination cycle. E enlistment has ended up being very helpful for the both organization and occupation candidates. A few times it will be neglect to the assortment of the gig candidates in view of organization issues. The reason for e recruitment is to make the cycle in question more effective just as costly. ISBN: 978-93-5619-947-7 1.1 Meaning of E recruitment: E recruitment is the utilization of innovation and electronic assets for the most common way of drawing in choosing and dealing with the recruitment in an organization. It include preparing did by the association utilizing innovation to distinguish plausible workers. It is otherwise called internet based enlistment as web correspondence is imperative to the interaction. Anyway it has specific impediments, for example, being as well unoriginal, high volume of reactions and countenances specific innovation issues. Quite a bit of e recruitment focuses a round significant places of work which classes open situations by area, industry and position. E-enrollment components are as following: Candidate following Business' site Work entries Internet testing Online media Now days, due to pandemic situation of covid-19 it is not possible to attend physical interview for vacant recruitment. The digitalization is growing day by day and it is easy to access the required vacant position to the job seeker. There is lots of awareness to the jobseekers from various companies’ vacant position by various portals. Erecruitment is becoming the backbone of HRM in company. II. OBJECTIVES To know the constituent of E enrollment. To know the new examples of E enrollment. To understand the upsides of E enlistment. III. METHODOLOGY This is a calculated investigation of the auxiliary information source. The optional information is utilized to high light the calculated investigation and audit of writing. Notwithstanding those books, articles, diaries these submitted to colleges were additionally alluded. The web additionally been widely made use with the end goal of study. IV. ELEMENTS OF E RECRUITMENT 4.1 Applicant tracking system (ATS) A candidate global positioning framework (ATS) is an item application that enables the electronic dealing with that of e enlistment needs. An ATS can be done or 121 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 gotten to online on an endeavors or private endeavor level, dependent upon the prerequisites of the association and there is similarly free and open source ATS programming available. An ATS is fundamentally equivalent to customer relationship the board (CRM) structure, yet are gotten ready for selection following purposes. When in doubt they channel applications thus subject to given standards like watch words, capacities, past supervisors, extended lengths of association and schools participated. critical part in glancing through a normal contenders. Another social locales are open to connect with work upand-comers and attracting them towards affiliations. Web diaries are similarly getting renowned now a days. Moreover proceed with scanner helps associations with screening and shortlist the resume as indicated by candidates, capacities and experience, uncommon capacities and pay nuances and is given by critical passages in India. These new examples are very use full in the e enlistment, these new examples are by and large relying upon the advancement. A couple of progressing designs are there in e enrollment. They are given under: Mobile Application Job Portals Company Websites Long range informal communication These are late patterns in e recruitment. There are liberal proof which demonstrate that associations are progressively involving web innovation just as the internet a stage for selecting up-and-comers. Fig.1: Elements of E Recruitment 4.2. Employee Websites A laborer destinations can build up the association between supervisors by making them feel that they are essential for a neighborhood. It can likewise serve to acquaint new staff with the organization, give existing workers with refreshes organization data and can fill in as a web-based local area for associating among laborers. 4.3. Job board A job board is a sites that posts occupations provided by workers, though pursuit of employment motors scour the web and total work postings from work sheets and businesses sites. With work sheets affiliations have explicitly recorded their unfilled position and reliably perceive requests for business straightforwardly through the gig board. 4.4. Online Testing The terms suggest the electronic stepping or assessing of a test. E making is a controller driven development immovably associated with other appraisal works out, for instance, e testing, or e acknowledging which are understudy driven. V. LATE PATTERNS OF E RECRUITMENT Late examples in e enlistment is usage of convenient applications enemy work reason or looking beyond question, monster, naukri are one of the rule work doors in India who have started compact applications for work competitors. Association locales furthermore accepts a ISBN: 978-93-5619-947-7 The fundamental justification behind E recruitment use further develop web corporate pictures, limits recruiting cost, lessens paper work and managerial weight, capacity to organize progressed web devices for the recruitment group. ● Web presence and utilizing web work on corporate picture ● Capacity to foster progressed web devices for the recruitment group ● Paper work and managerial weight ● Limits enlistment cost high to low The representative should figure out how to arrive at a specific employment competitors by making benefits via web-based media organizations, as for sure, linkedin, Facebook, and can likewise promote work opening with the e recruitment offices to strengthen the ability chase. VI. ADVANTAGES OF E RECRUITMENT? Lower expenses for the association. Likewise, posting occupations online is less expensive than promoting in the papers. No go-betweens. Decrease in the ideal opportunity for enlistment (more than 65% of the recruiting time). Works with the enlistment of right kind of individuals with the necessary abilities. Further developed proficiency of enlistment process. Gives a 24 X 7 admittance to a web-based assortment of resumes. VII. DIFFICULTIES OF E RECRUITMENT: Conventional enlistment strategy have been supplanted by the web-based recruitment or e recruitment with the section of web. The greater part of the little and 122 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 enormous scope associations are embracing to the e recruitment process. In any case, in this cycle the e recruitment face many difficulties in the association way. selection process. It is thoroughly relying on the turn of events or affiliation or web. REFERENCES 7.1 Administrative Difficulties Any innovation would stay unused without client acknowledgment. It is vital that employing and selecting supervisors are proficient and agreeable with regards to the utilization of web based enlisting techniques. Associations should thus lead an extensive preparing program for HR directors to assist them with utilizing the e recruitment instrument with next to no trouble [1] R. Ganesan. (2017). Benefits And Trends of E-Recruitment. International Journal of Business and Administration Research Review, 1(20), 117-122. [2] Dr. P. Subba Rao, International Human Resource Management [3] https://www.scribd.com/doc/35533485/Recruitment [4] Yas A. Alsultanny, Mona F. Alotaibi (2015) “Evaluating The Factors Affecting On Intension To Use Of E-Recruitment” American Journal Of Information Science And Computer Engineering, Vol- 1, No. 5,2015,Pp. 324-331 6. The utilization e recruitment technique has not put a finish of the utilization of other enlistment strategies, for example, workers references, papers, advertisements etc. given the restricted monetary assets, viewing as the ideal blend of different recruitment techniques is really difficult for human asset administrators. 7.2 Hierarchical Difficulties Most qualified candidates are regularly uninvolved work searchers, who are by and by utilized however might be intrigued by new position potential open doors. A technique to perceive detached work searchers and spur them to apply should be created. Business process overhaul is required across the entire course of human asset the executives to understand the web-based enlistment benefits (taylor, 2005) 7.3 Specialized Difficulties Absence of privacy and security of data puts the posting of employment forms down by work searchers. While security is probably the greatest test with work candidates, top most organizations don't indicate it unequivocally on the profession sites. Joining the interaction online recruitment with cycle of regular recruitment is basic due to restricted accessibility of programming assets. Paper based resume should be changed over into a digitized structure and put away in the information base. VIII. CONCLUSION E-enlistment is electronic enlistment. It is unbelievably useful to the different affiliations. The spot of this survey was restricted to parts of e selection and late instances of e enlistment and advantages of e enlistment. It has been said that enlistment isn't just about using the best rather it's the solicitation to enlist the right up-and-comer in the association. E enlistment it appreciates many advantages for both work searchers and selection master like expense saving advantages and useful, adroitness, yet it can't be reasonable for each work and profile. It is advancing plan in choice cycle many little and huge size of affiliations is taken on to the e ISBN: 978-93-5619-947-7 123 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Analyze the Health Anagement Information System and Organizational Structure Ms. Pushpa Rani, Dr. Brij Mohan Goel Research Scholar, BMU Rohtak Deptt. of Computer Science & Engineering, BMU Rohtak Abstract: “Healthcare data frameworks (HISs) are frequently executed to upgrade the quality and patient-centeredness of care, as well as to work on the effectiveness and security of the administrations. Notwithstanding, the results of HISs executions in both essential care and clinic settings have not lived up to assumptions. Research reports demonstrate that there is a need to concentrate on HISs execution process and its hierarchical outcomes. The point of this paper has been to sort out the information acquired in qualitative examinations acted in relationship to HIS executions and to utilize this information to layout a refreshed design for execution arranging. We observed that the primary activity suggestion that could be drawn from the meta-analysis was that simply executing a HIS won't consequently expand the authoritative productivity. We utilized a multi-disciplinary group for the examinations to cover however many parts of the essential investigations as could be allowed. All things considered, our outcomes ought to be deciphered as a high-request conspires, and not a prescient hypothesis and the activity suggestion should be researched in imminent examinations”. informatics in recent years. No matter how it is done, the results of qualitative studies are typically decoded in isolation, without taking use of relevant linkages to previous research. The authors of McCormick (2003) draw attention to the fact that, despite the fact that qualitative examinations are discussed separately in writing surveys in health informatics, much qualitative exploration is not optimally examined and coordinated, resulting in the exploration's maximum capacity for information advancement and hypothesis building not being fully exploited. The purpose of this study is to bring together the information gathered from qualitative studies conducted in connection to the execution of HISs, and to use the coordinated knowledge to develop a new design for the organising of execution. The information association is accomplished through the use of qualitative meta-analysis methodologies‖. Keywords: HISs, Adoption, I . INTRODUCTION ―A variety of healthcare information systems (HISs), such as the electronic doctor request section (CPOE) and personal computer-based patient records (CPRs), have been implemented to improve the quality and patientcenteredness of care while also increasing administration's productivity and security of information. In any event, the outcomes of HIS implementations in both the essential care and clinic settings have fallen short of expectations. Various research studies indicate unanticipated outcomes, while also demonstrating that project execution failures harm the arrival of projects in general. So as a consequence, clinic administrators have come to realise that they may overlook interactions between the HIS and hierarchical presentation, and more precisely individual users' requirements, difficulties, and demands, if they blindly rely on the promises provided by vendors. This situation shows that it is vital to make the best possible use of the logical knowledge available regarding HIS execution processes and the authoritative outcomes that result from those processes. Beginning with a number of significant research in the 1990s, qualitative inquiry has gradually gained popularity among scientists in the field of health ISBN: 978-93-5619-947-7 II. PRIMARY HEALTH CARE INFORMATION SYSTEM ―Health data is developed and used by multiple establishments including the Ministry of Health, National Statistics Office, the commercial sector, common society organizations, donors, and the National Health Insurance Agency. A solid health data framework should create‖. ―Important and quality information to help health mediations and future arranging Health information combination in essential care is a test, as it has a few capacities for keeping up with the offices, doctor, attendants, and other staff which are troubled by tedious managerial assignments, an assortment applications, and reports. As of now, there are a few applications executed in PHC for quite some time programs, for example, TB application and HIV application, which are divided. In light of the Ministry of Health Regulation, Primary Health Care Information System (PHCIS) comprises of information sources and data concerning all clinical administrations like primitive, preventive, corrective, and rehabilitative endeavors which are acted locally. 124 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 requirements, for example, offices or framework and individual variables in the rustic regions in light of the bleeding edge perspective. It is important to investigate the obstructions in taking on HIS in a metropolitan region, and survey the execution interaction from the essential level and from the functional level or health the executives point of view, and to give a superior answer for keeping up with the framework as a solitary data substance with practical administrations. Fig. 1 : Current management of data through collecting and reporting the system of health programs in a primary healthcare organization PHCIS was used to record personalized healthcare, while a paperbased record was applied for community healthcare documentation As found in Fig. 1, every one of the functioning gatherings (for example fundamental local area healthcare or UKME, trivial local area healthcare or UKMP, and individual health care or UKP) presents their reports through the PHC the executives to the District Health Office consistently utilizing manual structures. Subsequent to examining the PHC report, the District Health Office sends their reports to the Provincial Health Office. In the wake of investigating and gathering the information from all regions, the Provincial Health Office sends a yearly report to the Ministry of Health. Each of the cycles should be all around overseen by a PHCIS. The PHCIS ought to likewise have the option to work with references in which the essential doctor and experts in the reference clinic could impart for organizing care of the patient. Be that as it may, current PHCIS in India can yet oblige the requirement for cooperative care, since accounts of short term center exercises are restricted‖. III. PRIMARY HEALTH CARE INFORMATION SYSTEM ADOPTION A few specialists have inspected healthcare frameworks utilizing different strategies concerning the obstructions and difficulties during PHCIS execution in agricultural nations. Notwithstanding, a portion of these investigations were more centered around the specialized ISBN: 978-93-5619-947-7 ―Past examinations in India have effectively portrayed the obstructions of embracing data frameworks in a medical clinic setting, wherein the institutional changes are a fundamental test of HIS execution. However, it is vital to get the hindrances in various care settings, for example, in essential care, to give illustrations to be figured out how to planning of HIS adoption, and to upgrade HIS execution in PHCs. A few territories, for example, Banten were focusing on IT execution for 80% of the PHCs to work on the nature of the health administration during the year 2012 until 2017 However, at present the execution of HIS in PHCs is moving gradually, as just half of PHCs in the Province are now associated with the Internet and have carried out HIS inside their administration. Thus, our examination was led in a metropolitan area of Banten Province, and the India District was chosen as it has been proclaimed as a Smart City which has a solid obligation to take on HIS, as confirmed by deciding to put resources into health data innovation for the absolute of 29 public PHCs, to further develop general health administrations. In view of past review, there are three phases of the adoption interaction, specifically the choice to contribute, the execution stage, and institutional use after choosing to put resources into health IT by sending PHCIS in 2013, the execution work in Haryana ought to be assessed to address the hindrances at various degree of association. As of now, the Haryana District Health Office carries out a PHCIS, specifically SIMPUS, which was created by the Agency for the Assessment and Application of Technology (BPPT)‖. IV. HMIS IN INDIA The need for a good data framework to aid in the numerous formative processes occurring in the Indian health sector was recognised as early as the Bhore panel report, which was published not long after the country's independence and was issued shortly after the country's independence. As stated in the Indian public health strategy effective independent direction and programmer arranging in the health and related fields is unimaginable unless there is the establishment of a strong health data framework. It also states that a cross-country administrative structure should be established in order to acquire fundamental health 125 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 data that will aid in the local administration of health care and the successful decentralization of activity should be established. On a national and worldwide scale, health information systems contribute to the design of territorial and global healthcare arrangements by providing inputs into decision-making processes. An international conference on National Health Information Systems was held in Costa Rica as early as 1979 in response to an international call for action to further develop the data framework. The meeting was organized by the World Health Organization's Division of Data Support and was intended to help countries develop their own national health information systems (now known as the Division of Data Support). Fig.2: Field Survey Units Diagram V. ORGANIZATIONAL ARRANGEMENTS FOR THE HMIS IN INDIA ―His organizational arrangement of HMIS and the agencies responsible for it is discussed in the three levels namely central, state and district‖. Central level -At the central level there are four major agencies dealing with the HMIS. VI. CENTRAL BUREAU INTELLIGENCE OF HEALTH ―Need to rely upon National Informatics Center (NIC) (Govt. of India processing wing) for programming help. This typically postpones the improvement interaction and they continue to work with the old programming. The human asset improvement is exceptionally negligible in the CBHI. The preparation contributions to the advancement of most recent abilities are not many. The staff are barely are ship off outer preparation phases on registering and information base advances‖. 6.1 Evaluation of the Existing HMIS in India ―Focal Bureau of Health Intelligence (CBHI) is the health insight wing of the Directorate General of Health Services. At the public level it is the principle association which manages the assortment, assemblage, analysis and spread of the data on the health conditions in the nation covering different parts of health including the health status, health assets, and use of health offices and so on‖.CBHI is a reduced association with insignificant staff. Fundamental issues concerning them are the insufficient registering offices. As of now it is moved in a space in Delhi where a few times power supply falls flat for a really long time together. The old PCs can't run the most recent programming and bundles. They don't have software engineers and Table 1. Fact sheet Source: Fact Sheet List ISBN: 978-93-5619-947-7 ―Regardless of many expected to be not kidding endeavors through various joint efforts, the territory of HMIS in India is week. The absence of mindfulness by health strategy producers and program supervisors of the essential significance and viable helpfulness of health data for arranging and the executives brings about a low interest for data; (WHO rules). India's formative organization is organized in manner Key social regions like Health and essential training get low need. Health and Family government assistance service is considered as most reduced in the pecking order of particular posting for the top officials (generalists). The propensity to rapidly move to different postings is high. This implies that posting in the Health and Family government assistance for senior officials is just a change. This combined with the inordinate centralization of abilities in the secretariat arrangement of administration has made the preparation, checking as a focal action. The directorates staffed by subject specialists are simple monetary wards. In India, the overall organization is for the most part amassed at an area level. Yet, Health and Family Welfare organization has been incorporated at state and local levels‖. ―Region Health and Family Welfare the board: A normal Indian region in size and populace is greater than 60 to 70 nations on the planet. It gives different areas various degrees of advancement, geological spread and populace blend. The locale the board is especially 126 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 adhoc and the majority of the District Medical officials need the executives preparing and approach. They are seldom considered as key individual in the chain of program the executives and not many times applied with inputs in human asset improvement. The outcome is reliant locale the executives for each drive and week program execution. Except if a more prominent measure of refinement in arranging and the executives is applied in program the board with nearby drives, neighborhood choices, the program results will be especially deficient as they are today‖. acknowledgment of another item or development, as per the segment and mental qualities of characterized adopter gatherings. The course of adoption over the long run is regularly delineated as an old style ordinary dissemination or "chime bend." The model shows that the primary gathering to utilize another item is designated "pioneers," trailed by "early adopters." Next come the early and late greater part, and the last gathering to ultimately embrace an item are classified "slouches." India has been putting millions in to Health and Family Welfare sector through different projects and undertakings. Yet, the course of speculation arranging through a few mediations is extremely brought together and doesn't represent the ground real factors, connect with the perplexing social, monetary and segment markers. It is put together commonly with respect to the judgment of the couple of specialists; adhocly directed studies and politically spurred libertarian pressures. The preparation and strategy making process stayed very week without true information and information culture. This brought about issues of estimation. (Commonly estimation is just formal even with the strain from Controller and Auditor General or outside offices and so on,) Ultimately the program efficiencies stayed the most reduced. A significant number of the projects don't accomplish even half effectiveness/targets or results. The way that half of the cash put resources into that projects is gone waste is neglected. More than the actual speculations that count for a nation like India, the time has come time lost in trails or broadened pilot executions and insufficient projects and approaches - 50 years is too enormous a sitting tight for the everyday person in India-a holding up of a day to day existence time. The public-claimed HISs that was arranged to further develop health care was remembered for the review. The recognized frameworks were assessed to get the job of ICTs in supporting the healthcare framework, and whether such frameworks helped in further developing PHC. 6.2 Organizational structure in HIS ―The Hospital Information System is overseen by various PC experts, however totally relies upon the size of the clinic and applications or various modules. The incontrol for the IT division that is answerable for the upkeep and manageability of the said framework should be a Database Administrator or IT Manager. At the point when, any emergency clinic goes for the execution of the Hospital Information System, whether it is by the product merchant or by the free exertion of the Hospital by recruiting not many PC experts, it anyway expects to assemble an IT division‖. 6.3 Technology Adoption Lifecycle in an Organization As indicated by Rogers' chime bends: The innovation adoption lifecycle model portrays the adoption or ISBN: 978-93-5619-947-7 VII. RESEARCH METHODOLOGY ―An investigating search was continued audits of HIS utilized in the public sector in India from PubMed, Scopus, Medline and Google Scholar. The inquiry was restricted uniquely to concentrates on distributed after the year 2000. Our hunt watchwords included Health Information Systems AND IndiaIncorporated Disease Surveillance Project AND India NIKSHAY AND IndiaMother and Child Tracking System AND India and Key Management Information System and IndiaRegion Health Information System AND Indiain Title/Abstract and restricted to the clinical field. In the wake of eliminating the copies from different inquiries, we recognized 900 articles with the above watchwords. Keeping the importance with the point of the review, we found just 16 articles appropriate for our review.The HISs that were utilized at the essential health place, local area health focuses (CHC) and region emergency clinic (DH) from four states/association domains (UTs) included Chandigarh, Punjab, Haryana and Himachal Pradesh. To survey the progression of data under different public health programs utilizing HIS, the State TB Cell, State AIDS Control Society, State National Health Mission Office and Regional National Informatics Center in Chandigarh were visited‖. ―Inside and out meetings of purposively chosen key sources were led by the examiner to gather the qualitative information on client experience on the execution and working of ICT frameworks at the state level. At the hour of the meeting, just specialist and particular member were available to guarantee security and secrecy at the hour of information assortment. Program chiefs and investigators at the National Health Mission (NHM) office of Punjab and UT Chandigarh and the program coordinator at the State TB Cell, State AIDS Control Society and Regional National Informatics Center at UT Chandigarh were evaluated. The data was likewise gathered from the specialists, health staff and information passage administrators working at different 127 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 degrees of health care (essential health community, CHC and DH). Before the beginning of the inside and out interview, an outline was inspired first by the questioners on more extensive points being referred to‖. VIII. ANALYSIS ―The notes produced using the inside and out interviews were qualitatively dissected utilizing inductive applied topical coding. In light of the web research, perceptions, interviews and qualitative analysis, the short outline accounts of every framework were created, dissected and deciphered with an attention on the job of ICTs and what it has meant for PHC. The HIS assessment depended on standards utilized in arranging commission, Government of India report[10] and HIS assessment measures created by Hanmer.[11] The moral endorsement for the review was taken from the Institutional Ethics Committee of PGIMER, Chandigarh vide their letter no. INT/IEC/2017/195 dated 23/08/2017‖. ―We had the option to distinguish five significant HISs, including National Health Mission Health Management Information System (NHM-HMIS), Integrated Disease Surveillance Program (IDSP), NIKSHAY, Mother and Child Tracking System (MCTS), Strategic Information Management System (SIMS) and District Health Information System 2 (DHIS2), which were utilized by the states for data age under different National Health Programs in India. The discoveries are introduced in two sections, in particular, elements of HIS and examination of HIS‖. 8.1 Features of Health Information Systems ―The main features related to these systems are summarized in Table 1 and their characteristics are presented below‖. Table 2. T-based HISs in India Source: Iit-Based Hiss ISBN: 978-93-5619-947-7 National Health Mission Health Management Information System (NHM-HMIS) - ―The National HMIS entrance was sent off in 2008 as a piece of the public change process. At first, it was arranged as an archive to gather locale level total coordinated reports, however steadily over the long run, it has gone directly down to the sub-area level, and today around 1, 80,000 health offices in the nation are answering to this portal. notwithstanding the total reports, there is a level of individual information including line arrangements of passing. The program chiefs and experts brought up that, at first the gateway was inadequate in much fundamental usefulness however these have been steadily upgraded after some time. For fortifying analysis, the functionalities were given to move the information into exclusive programming (SAS programming) and the focal observing and assessment division under NHM conducts analysis and puts writes about the entrance to be downloaded by the states. Also for spatial analysis, outsider restrictive programming (ArcGIS) is utilized. The essential analysis of information isn't done by the region or office level staff. With respect to utility of HIS information, a respondent expressed all the time there is a mismatch in the HMIS information and it is hard to depend upon the accessible information for making a ground appraisal of health condition and use it for asset assignment‖. 8.1 District Health Information System (DHIS2) ―DHIS2 is a free and open-source stage that has as of now formed into a worldwide true worldwide norm for building HISs in low-and center pay nations (LMICs)‖. ―The venture co-facilitator from the HISs Program (HISP), India informed that DHIS2 has been in activity in India beginning around 2006 and is by and by being utilized in nine states as a state information distribution center, where states enter all their office based information into the DHIS2, and from that point the reports are additionally submitted to the public HMIS gateway in the necessary configuration. Further, the framework is utilized to direct a state-level analysis of information and give criticism to fringe units to help activity. Many states have additionally done explicit customizations for example, for certify social health extremist (ASHA) observing, steady oversight and others. One of the respondents expressed,far beyond the data accessible from Government Portals, DHIS2 gives adaptability to examine information according to the neighborhood health needs and create pointers for nearby direction‖. Mother and Child Tracking System The Union Ministry of Health and Family Welfare submitted the MCTS framework in 2009, which was largely driven by the premise of working on the accuracy of information. It includes modules for enrolling pregnant women and 128 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 following them through their antenatal care (ANC) appointments, as well as modules for enrolling children throughout the immunisation cycle. An individual responding to a question about the varied features in MCTS stated that 'the information is dissected at the focal observing and assessment and SMS are sent out to every one of the states constantly based on the number of enrollments completed.' However, over time, the framework was able to develop follow-up reports and a work plan for the health-care workers. The periphery healthcare providers who are utilising the framework have raised concern about the framework's practicality, citing delays in the enlistment of information that is transmitted up to the public level, where work plans are prepared and then returned to them. The information section is created at the essential health place/block level by an information passage administrator, for which assistant medical attendant birthing specialists (ANMs) from subfocuses must make a weekly visit to the essential health community/block office in order to have their sub-focus information entered into the information section of the essential health place/block. ―In this study, it was discovered that this framework was more concerned with watching health-care workers than it was with assessing maternal and child health indicators. This framework put a great deal of responsibility on the shoulders of the medical professionals, who were responsible for entering name-based information into the framework while also entering total numbers into the HMIS portal. Later, it was realized that a significant portion of reproductive and child health care falls beyond the scope of this framework as a result the decision was made to convert to a Reproductive and Child Health (RCH) gateway and terminate the MCTS‖. The health worker using the work-plans generated from MCTS stated, ―The delays in getting the workplans generated from MCTS make them useless as by the time the workplans are received they already have their due visits completed‖. NIKSHAY: Tuberculosis case tracking and surveillance. A new electronic tuberculosis (TB) reconnaissance framework, known as NIKSHAY, was sent out by India in May 2012, following the presentation of an arrangement for required notification of tuberculosis s (TB) cases. [14] This application was developed for the purpose of total administration revealing and, in addition, for the following of tuberculosis patients, including those who are multi-drug resistant (MDR) and broadly drug-safe (XDR). ―He said that the framework sends daily SMS warnings to local and state TB officials about patients registered in the Revised ISBN: 978-93-5619-947-7 National Tuberculosis Control Program, according to the programmeco-ordinator at the State TB cell (RNTCP). In the event that a patient relocates to a different location, the patient's information can be successfully transferred to that location to avoid a catastrophe in following up. Building components for warnings and updates for both the patient and the straightforwardly noticed treatment (DOTS) provider are being included to the framework to make it more persistent in the event that the patient forgets to take his or her prescription. A representative from the programmer coordinator stated during the meeting that, the application does not provide disconnected information section functionalities, which is frequently a requirement in fringe regions and continues to be a significant disadvantage of the application‖. Initially, information is recorded physically in registers and patient cards at the most granular level, such as the assigned microscopy location. This information is then entered into the framework by information section administrators at the essential health community/block level. 'The application does not uphold the planned age of pointers, and information should be carried out into accounting sheet in order to make the marker,' stated the respondent as another limitation of the framework. An acronym for the Integrated Disease Surveillance Program. The IDSP entrance was completed and delivered in November 2004. Information section, survey of reports, flare-up detailing, information analysis and preparation modules, as well as assets associated with sickness surveillance are all located in the entryway's first floor. [15] The IDSP gateway is under the management of the National Center for Disease Control (NCDC), Ministry of Health and Family Welfare, which is also supported by the Centers for Disease Control and Prevention (CDC) in the United States. As indicated by the current data stream, those providing health-care services from the most fringe unit (for example, sub-concentrations and essential health communities/medical clinics) top off three arrangements of structures (S, P, and L-syndromic), send them physically to the sub-areas/location where online passages are completed, and then send them to the research centre. The L structure provides a line-by-line breakdown of affirmative cases, whereas the other structures deal with totals of cases. IX. RESULTS According to the responder, "in order to obtain access to their own data, state authorities must submit a request to the IDSP office at the national level, which frequently results in lengthy delays at a time when time is of the utmost in disease monitoring." The outputs are mediocre, and they 129 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 do not elicit a significant response or action. Some of the illnesses that are being reported on are also being reported by other systems, creating confusion for decision makers about which data to utilise. such as duration of the interaction and the preconditions that invigorate the usual meaning of the new HIS, as well as the significance of the variables that have been identified as critical to guaranteeing a fruitful execution. Strategic Information Management System is an acronym that stands for Strategic Information Management System (SIMS) - It was developed as an upgrade to the present computerised management information system, which is used by the National AIDS Control Organization (NACO) (NACO). It was formally delivered to the recipient in August 2010. NACO's programme components have been brought together in a single framework thanks to an online focused application. It was discovered that the merchant who has developed this framework is the same one who has established the public HMIS entryway, and many of the same design restrictions that were seen in the HMIS were also present in this gateway, as well. REFERENCE [1] [2] [3] [4] [5] [6] The framework sustains information sections at many levels, including detailing units (RU), regional and state levels, and at the national level. The information acquired is primarily of a general character; nevertheless, there is a strong desire for case-based information, particularly for HIV-positive cases, in order to further the growth of the field. The programme generates yield reports by employing externally derived insights from third-party instruments (SAS, GIS). More than 30,000 clients' programme checking information is captured by SIMS on a month-to-month basis. X. CONCLUSION It is proposed in this research that there are several areas where concerns might have unexpected consequences during the implementation of HISs. A significant number of these effects, both favorable and bad, are unpredictable and cannot be predicted at the framework construction phase. Furthermore, the findings emphasize the need of domesticating and integrating the new HIS into the association's day-to-day working practices. The usage of ways that expedite the taming of innovation and, as a result, the inclusion of HIS into individuals' everyday work routines should be emphasised during the execution cycle, in order to achieve the desired results. The majority of the financial benefits from presenting data innovation in business over the past 40 years appear to have come through successful re-designing cycles, according to the evidence. [7] [8] [9] [10] [11] [12] [13] [14] [15] Rahimi, B., and Vimarlund, V.,(2015) Methods to evaluate health information systems in healthcare settings: A literature review. J. Med. Syst. 31:397–432, 2007. Kaplan, B., Culture counts: How institutional values affect computer use. M. D. Comput. 17:23–26, 2000. Van Der Meijden, M. J., Tange, H. J., Troost, J., and Hasman, (2016) A., Determinants of success of inpatient clinical information systems: A literature review. J. Am. Med. Inform. Assoc. 10:235– 243, 2014. Adi, A., Healthcare information systems: challenges of the new millennium. Hershey, PA, USA: Idea Group Publishing, 2015. Paré, G., and Elam, J. J., Introducing information technology in the clinical setting, International Int J Technol Assess Health Care. 14:331-343, 2018. Fullerton C, Aponte P, Hopkins R, Bragg D, Ballard DJ., Lessons learned from pilot site implementation of an ambulatory electronic health record, Proc (Bayl Univ Med Cent). 19:303-10, 2016. Harrison, M.I., Koppel, R., and Bar-Lev, SH., Unintended Consequences of Information Technologies in Health Care—An Interactive Sociotechnical Analysis. J Am Med Inform Assoc. 14: 542-549, 2017. Lippeveld T, Sauerborn R, Bodart C. Geneva: (2019) World Health Organization; 2000. Design and Implementation of Health Information Systems; pp. 15–32. [Google Scholar] Geneva: World Health Organization; 2008. [Last accessed on 2018 Nov 10]. Health Metrics Network. Framework and standards for country health information systems. Nabyonga-Orem J. Monitoring sustainable development goal 3: How ready are the health information systems in low-income and middle-income countries.? BMJ Glob Health. 2017;2:e000433. ICT for Primary Health Care: A Report. Media lab Asia, Department of Information Technology, Ministry of Communications and Information Technology, India. 2005. [ Krishnan A, Nongkynrih B, Yadav K, Singh S, Gupta V.(2019) Evaluation of computerized health management information system for primary health care in rural India. Balasubramaniam P, Hira S, Reddy K.(2018) Operational Pathways for Integrating National Disease Control Programmes for Universal Health Coverage. [Last accessed on 2018 Nov 07]; 2014 Available from http://dx.doi.org/10.2139/ssrn. 2821364 . [Google Scholar] Narayana G, Auxila P. Management information Systems in Health and Family Welfare in India. Hyderbad, Administrative Staff College of India, 1989. Rajesh Kumar, Streamlined records benefit maternal and child health care, World Health Forum, Vol.14, 2016. In healthcare, we need methods and designs that may be used to avoid mismatches between HISs, authoritative characteristics, and the internal and external joining of associations, among other things. Prospective investigations should focus on the factors that animate the training of HIS, ISBN: 978-93-5619-947-7 130 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 A Study on Pradhan Mantri Jan Dhan Yojana in Public and Private Sector Banks in India Dr. M. Sumathy1, Sneha Jayalakshmi2 Professor and Head, Department of Commerce, Bharathiar University, Coimbatore-641046 2 Research Scholar, Department of Commerce, Bharathiar University, Coimbatore-641046 1 Abstract: The vision of the Jan Dhan Yojana is to bring all the citizens of our nations into the basic banking so that they can avail the financial services at an ease. In addition to that the leakages as well as the pilferages in the social welfare schemes can be reduced by enabling the Direct Benefit Transfer facility and added to that it plays a significant role to eradicate the financial problems. To meet the objectives of the study the following details like the number of people who have benefited, amount deposited by the beneficiaries and number of RuPay cards which was issued to the beneficiary in both the private and the public sector banks were taken into consideration and the secondary data was collected and the interpretations, tables and charts were framed on this basis. This study aims to understand about the objectives and vision of Jan Dhan Yojana which is a national mission and which encompasses the integrated approach moreover it also aims to reach out to the younger generation to participate in this mission. This paper aims to study about the trends and the growth of the Jan Dhan Yojana in the both the private bank and the public sectors banks. India to Digital India mainly due to the efforts taken by the central government of our nation. The initiatives like Make in India, Jan DhanYojana, Swachh Bharat, Demonetization of currency has contributed to the growth of the Indian economy. ThangarajRavikumar (2018), in his study evaluates that the financial inclusion is a process of providing access and usage of financial services like the savings, insurance, credit and payment facility financially excluded people. It also examines that the PradhanMantri Jan-DhanYojana scheme critically and its difference with a previous similar scheme. MuhammedShafi.M.K, Dr.M.Ravindar Reddy (2021), inhisstudy examined that the PMJDY aim is to reach out economic activity around poor to bring them back to the banking channel. As the part of it, 20.63 crore bank accounts have been opened and Rs 31399.67 crore has been deposited (as on 3rd Feb, 2016) and it aims to investigate various measures and initiatives of banks as well as the governments. Keywords: Jan Dhan Yojana; Financial Problems; RuPay cards. Research Objective: To study the trend and growth of the Jan Dhan Yojana in Public sector and Private sector banks. I. INTRODUCTION Pradhan Mantri Jan-Dhan Yojana was started with the objective to assure that the different financial services are available to the weaker section of the society. It is a national mission which comprises of the integrated approach. It envisions the universal access to the services provided by the banking sector so that each household owns one basic banking account, insurance, financial literacy, insurance and access to credit. The RuPay debit card which provides an insurance cover of Rs 1 lakh benefit is available to the beneficiary. This plan also aims to sort out the problem which arises due to the technology problems like poor connection and on-line transactions. An attempt is being made so that it reaches to the younger generation of the nation could also take a part in this. II. LITERATURE REVIEW SS Chowhan, JC pande (2014), in the study examined that inspite of the huge growth in the Indian banking sector a larger section of population in India remained unbanked. To bring an end to this, Prime Minister Narendra Modi announced this new scheme on 15Th August 2014. eha Sharma, RuchiGoyal (2017), in the study investigated that the PMJDY is major financial plan with the aim of covering all the households in the nation with the banking services along with inbuilt insurance. T mary Jones, S Divyasri, G Bavani ( 2017), in the study investigated that the Indians are changing from the rural ISBN: 978-93-5619-947-7 III. RESEARCH METHODOLOGY AND DATA ANALYSIS It is analytical in nature and the secondary data is collected through means of the websites, articles, annual reports and research papers. The data is collected for duration of 12 months from February 2021 to February 2022. This table shows the number of people who are benefitted by the Jan Dhan Yojana in the public sector banks along with the trend and the growth. Table 1. People who are benefitted by the Jan Dhan Yojan in the public sector banks Month Feb-21 Mar-21 Apr-21 May-21 Jun-21 Jul-21 Aug-21 Sep-21 Oct-21 Nov-21 Dec-21 Jan-22 Feb-22 Public sector Trend Forecast Growth banks-Total Forecast beneficiaries 330814446 329854005.1 329964113.2 332100015 331580983.2 331640944 334049692 333307961.2 333326296.3 335222466 335034939.2 335020213.2 335769594 336761917.3 336722738.4 337089188 338488895.3 338433915.6 338914876 340215873.3 340153788.7 341300971 341942851.3 341882402 343880756 343669829.4 343619799.8 345681872 345396807.4 345366026.9 347134461 347123785.4 347121128 349542745 348850763.4 348885148.4 351305271 350577741.5 350658133.2 Source: Jan Dhan Yojana and the tabulations are computed with the help of the excel 131 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 People who are benefitted by the Jan Dhan Yojana in the public sector banks along with the trend and the growth. issued to the beneficiaries of the public sector banks under the Jan Dhan Yojana with the trend and the growth. Table 3. Number of RuPay debit cards issued to the beneficiaries Month Fig. 1: People who are benefitted by the Jan Dhan Yojan The trends shows that the number of beneficiaries have been increasing during the study period. This table shows the amount deposited by the beneficiaries’ in the Jan Dhan Yojana in the public sector banks along with the trend and the growth. Table 2. Amount deposited by the beneficiaries’ in Jan Dhan Yojana Month Feb-21 Mar-21 Apr-21 May-21 Jun-21 Jul-21 Aug-21 Sep-21 Oct-21 Nov-21 Dec-21 Jan-22 Feb-22 Public sector banks Deposits in Total Rs 10729292.66 10859692.33 11354774.91 11188177.06 11253127.94 11199245.15 11158018.43 11248701.7 11333570.23 11617538.92 11431537.34 12056251.55 12121239.27 Trend Forecast Growth Forecast 10818003.47 10906684.53 10995365.58 11084046.64 11172727.69 11261408.75 11350089.81 11438770.86 11527451.92 11616132.97 11704814.03 11793495.09 11882176.14 10827389.64 10911783.44 10996835.04 11082549.58 11168932.21 11255988.15 11343722.65 11432140.99 11521248.51 11611050.57 11701552.6 11792760.03 11884678.39 Source: Jan Dhan Yojana and the tabulations are computed with the help of the excel Amount deposited by the beneficiaries’ in the Jan Dhan Yojana in the public sector banks along with the trend and the growth. Feb-21 Mar-21 Apr-21 May-21 Jun-21 Jul-21 Aug-21 Sep-21 Oct-21 Nov-21 Dec-21 Jan-22 Feb-22 Number of RuPay debit cards issued to the beneficiaries of the public sector banks 261928734 263079398 263572904 264187037 264548817 265600195 266968915 268481917 270717908 271939364 265999676 267719558 268940817 Trend Forecast Growth Forecast 262696976.6 263320368.2 263943759.8 264567151.4 265190543 265813934.6 266437326.2 267060717.8 267684109.4 268307501 268930892.5 269554284.1 270177675.7 262703776.9 263319764.9 263937197.2 264556077.3 265176408.6 265798194.4 266421438.2 267046143.3 267672313.3 268299951.5 268929061.4 269559646.4 270191710.1 Number of RuPay debit cards issued to the beneficiaries of the public sector banks under the Jan Dhan Yojana with the trend and the growth. Fig. 3: Number of RuPay debit cards issued to the beneficiaries The curve shows an increasing trend till October 2021 and it starts to slope downwards after the period of October 2021 and again some increase in the number of Rupay debit cards issued to the beneficiaries could be noticed during the study period. This table shows the number of people who are benefitted by the Jan Dhan Yojana in the private sector banks along with the trend and the growth. Table 4. Number of people who are benefitted by the Jan Dhan Yojana in the private sector banks Private sector Month banks- Number Trend Growth of beneficiaries Forecast Forecast Fig. 2: Amount deposited by the beneficiaries’ in Jan Dhan Yojana The curve is fluctuated which represents that the amount deposited by the people varies during the study period. This table shows the number of RuPay debit cards ISBN: 978-93-5619-947-7 Feb-21 Mar-21 Apr-21 May-21 Jun-21 Jul-21 Aug-21 Sep-21 Oct-21 12485826 12514494 12537535 12546156 12549631 12592782 12631641 12664400 12685586 12451080.46 12484688.65 12518296.85 12551905.04 12585513.23 12619121.42 12652729.62 12686337.81 12719946 12452416.45 12485472.49 12518616.28 12551848.06 12585168.05 12618576.49 12652073.62 12685659.67 12719334.88 132 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Nov-21 Dec-21 Jan-22 Feb-22 12731050 12785928 12850401 12910055 12753554.19 12787162.38 12820770.58 12854378.77 12753099.48 12786953.71 12820897.81 12854932.02 Source: Jan Dhan Yojana and the tabulations are computed with the help of the excel Number of people who are benefitted by the Jan Dhan Yojana in the private sector banks along with the trend and the growth. Fig.5: Amount deposited by the beneficiaries The trend shows that the amount deposited by the beneficiaries’ in the Jan Dhan Yojana in the Private sector banks have been increasing during the study period. This table shows the number of RuPay debit cards issued to the beneficiaries of the private sector banks under the Jan Dhan Yojana with the trend and the growth. Table 6. Number of RuPay debit cards issued to the beneficiaries of the private sector banks Month Fig.4: Number of people who are benefitted by the Jan Dhan Yojana in the private sector banks The trends shows that the beneficiaries have been raising till May 2021 and after it saw some decline and again the number of beneficiaries started to increase during the study period. This table shows the amount deposited by the beneficiaries’ in the Jan Dhan Yojana in the Private sector banks along with the trend and the growth. Table 5. Amount deposited by the beneficiaries Month Feb-21 Mar-21 Apr-21 May-21 Jun-21 Jul-21 Aug-21 Sep-21 Oct-21 Nov-21 Dec-21 Jan-22 Feb-22 Amount Deposited by the beneficiaries in the Private Sector Banks 421119.47 421548.59 430902.2 445510.1 445144.34 437869.84 434448.89 432482.7 436200.11 459182.98 457991.85 468911.75 472156.36 Trend Forecast Growth Forecast Feb-21 Mar-21 Apr-21 May-21 Jun-21 Jul-21 Aug-21 Sep-21 Oct-21 Nov-21 Dec-21 Jan-22 Feb-22 public sector banks Total Number of beneficiaries 11254804 11224838 11199870 11147066 11109643 11112368 11120801 11117973 11124010 11128440 11119859 11020872 11018711 Trend Forecast Growth Forecast 11222293.38 11207029.81 11191766.23 11176502.65 11161239.08 11145975.5 11130711.92 11115448.35 11100184.77 11084921.19 11069657.62 11054394.04 11039130.46 11222449.91 11207075.95 11191723.05 11176391.19 11161080.32 11145790.44 11130521.5 11115273.47 11100046.34 11084840.07 11069654.62 11054489.98 11039346.12 Source: Jan DhanYojana and the tabulations are computed with the help of the excel 421284.2629 424960.8496 428637.4363 432314.023 435990.6097 439667.1964 443343.7831 447020.3698 450696.9565 454373.5432 458050.1299 461726.7166 465403.3033 421673.6379 425164.1547 428683.5653 432232.1088 435810.0262 439417.5609 443054.9579 446722.4644 450420.3297 454148.805 457908.1438 461698.6016 465520.4359 Number of RuPay debit cards issued to the beneficiaries of the private sector banks under the Jan Dhan Yojana with the trend and the growth. Source: Jan DhanYojana and the tabulations are computed with the help of the excel Amount deposited by the beneficiaries’ in the Jan Dhan Yojana in the Private sector banks along with the trend and the growth. ISBN: 978-93-5619-947-7 Fig. 6. Number of RuPay debit cards issued to the beneficiaries of the private sector banks 133 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 The trend shows that the number of RuPay debit cards issued to the beneficiaries have been declined during the study period. IV. CONCLUSION The Jan Dhan Yojana envisages to bring all the citizens of our nations into the basic banking so that they can avail the financial services at an ease. Moreover this mission plays a major role to eradicate the financial problems and at the same time it also wants to in calculate the habit of saving the income among the people. In addition to that the leakages as well as the pilferages in the social welfare schemes can be reduced by enabling the Direct Benefit Transfer facility. [4] management and social sciences, Vol 6, Issue 3, PP no: 461-466. [5] Thangaraj Ravikumar (2018), “Pradhan Mantri Jan-Dhan Yojana: An Evaluation”, Ushus Journal of Business Management, Vol 17, Issue 3, PP no: 9-13. [6] Muhammed Shafi.M.K, Dr.M.Ravindar Reddy (2021), “ Financial Inclusion Growth in India: A study with Reference to Pradhan Mantri Jan- Dhan Yojana( PMJDY), International Journal of Economics and Management science, Vol 2, Issue 1, PP no: 33-41. REFERENCES [1] SS Chowhan, JC pande (2014), “ Pradhan Mantri Jan Dhan Yojana: A giant leap towards financial inclusion”, International Journal of research in management and Business studies, Vol 1, Issue 4, PP no: 19-22. [2] Neha Sharma, Ruchi Goyal (2017), “Pradhan Mantri Jan Dhan Yojana (pmjdy) - a conceptual study”, International Journal of research- Granthaalaya, PP no: 143-152. [3] T mary Jones, S Divyasri, G Bavani ( 2017), “ A study on the Implications of Pradhan Manthri Jan Dhan Yojana on the growth of Indian Economy”,International Journal of ISBN: 978-93-5619-947-7 134 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Function of Management Information System in Education Ms.Suman1, Dr.( Prof. ) MukeshSingla2 Research Scholar, Computer Science Department, Baba Mastnath University, Rohtak. 2 Research Supervisor, Computer Science Department, Baba Mastnath University, Rohtak 1 Abstract: Its effectiveness and suitability for educational administration have resulted in a rapid expansion of the use of information technology in educational administration. The executive's information systems (MIS) were used mostly for the purpose of evaluating the success of school office exercises during the early stages of the event's unfolding course of events. It was used to hold information on understudies and staff members. The ability of a school to keep up with itself internally and to adapt to a changing and dynamic environment is critical to its overall effectiveness. The information section and examination were the areas of most concern, rather than the movement or inquiry of information. A suitable partnership exists between the historical context of education policy and the advancement of educational administration. Starting information-gathering efforts aided in the development of the country's public education policy, which was later refined. Despite all of the progress that has been made in the improvement of educational administration, most educational institutions continue to face a variety of challenges, notably in the area of information and communications technology. In the areas of leadership, decision-making, responsibility, human resource management, the board of directors, communication and obligation, MIS has transformed the way CEOs conduct their business. These methods may assist the school management in determining the strengths and weaknesses of the school, developing critical game plans, allocating resources, and evaluating staff execution as well as organisational accomplishment, among other things. Keywords: Management; Information; System; Education Policy I. INTRODUCTION The majority of educational institutions in many developing countries have come to recognise the need of speedy and effective data processing, and they have been proven correct in their assumptions. Among other things, the growth of information, communication, and technology (ICT) as well as the widespread usage of internet-based applications has heightened this expectation in the twenty-first century. Since the beginning of time, there has been a relationship between efficient data processing and faster decision making. With the introduction of information technology, it has become clear that the relationship should be strengthened and the ISBN: 978-93-5619-947-7 benefits harnessed in order to ensure progress in all educational establishments. The field of management information systems (MIS) has seen a lot of alterations in the course of its comparatively short history. It first appeared as a combination of operations research and decision sciences in the late 1950s, and it has continued to flourish ever since. Within a few decades, it declared its independence and established itself as a separate field from the rest of science. When we look back over the course of its meteoric rise since the 1970s, we can see that it has gone through a number of twists and turns that have pushed it further and further away from systems thinking in some aspects, while maintaining the idea of systems at its foundation in others, all while maintaining the idea of systems at its foundation in others. Administrators at educational institutions have been slow to embrace computer-assisted data processing. Its possible that they did understand information systems, or that system planning was not taken into account at all throughout the process. It has lately been tried to link decentralisation policies at all levels of education with the collection and analysis of educational data in an effort to bring the two together, with mixed results. MIS are being used to aid in the establishment of operational plans as well as the development of budgets for their implementation as part of this process. In the context of educational management it is anticipated that the implementation of Management Information Systems will play a significant role in the decentralisation process by assisting in the improvement of the efficiency and responsiveness of education provision to local needs by providing reliable and accurate data. A key distinction between management information systems and regular information systems is that management information systems are used to examine other information systems that are utilised in the organizations operational operations whereas regular information systems are used to perform routine tasks. Management Information Systems (MIS) are also assisting in the advancement of other aspects of the education system, notably in non-formal education and higher education (MIS). Non-formal education is one of the paths via which Ghana might make progress toward achieving the Millennium Development Goals (MDGs) (MDG). A consequence of these developments, the Non-Formal Education Division (NFED) has meticulously constructed protocols and procedures to assist in the monitoring of progress toward established objectives, and in the rewarding of providers who achieve those goals. National 135 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Council for Tertiary Education (NCTE) data on universities and polytechnics is also collected, collated, and analysed. The information gathered and analysed is then used to determine funding levels for the sector as a whole (UNESCO, 2003). More specifically, the purpose of this research is to examine the unique function that management information systems (MIS) play in education management, with a particular emphasis on tertiary institutions and the role they play in preparing students for life after graduation, as well as the role that MIS plays in preparing students for life after graduation. materials management as well as organizational practices and policies, computer-related challenges, and other considerations. Organizations that use management information systems (MIS) may work in a more holistic manner rather than in discrete divisions. The likelihood of failure increases when choices are made in discrete pieces without taking the whole picture into consideration. In terms of the use of organisational resources, there is a substantial amount of waste that may be eliminated. 1.1 Objectives In most cases, organisational structure may be divided into three levels of hierarchy: the top management level, the middle management level, and the lower management level (Figure 1). Each level makes decisions in line with the responsibilities assigned to them. To identify the information technology facilities available in the schools. To identify the software used by schools for the management information system. III. MIS SUPPORTS ORGANIZATIONAL SYSTEMS II. MANAGEMENT INFORMATION SYSTEM It is possible to make appropriate judgments in the near term if one makes efficient use of the information available. When managers are presented with a substantial quantity of data and information, the decision-making process becomes very difficult. Easy access to the information required for decision-making should be a goal of all organisations. For information management to be effective and efficient, it must include the collection of data as well as its conversion into information, efficient storage of information as well as retrieval and optimum use of information. MIS is an abbreviation for management information system, which is a kind of information system that gathers and organises data. IT (Information Technology) is a computer-based system that handles data and information. In addition to being one of the most powerful management tools on the market, the application assists managers in the planning, organisation, and execution of their operations while also providing them with tools for monitoring, controlling, and assessing them. The use of management information systems (MIS) makes it simpler to communicate successfully. Organizational management information systems (MIS) are made of three core components: management information systems, information systems, and system information systems. The integrated use of these three components allows for greater clarity in comprehending the problems at hand, as well as the influence of each component on other seemingly unrelated inputs that are interconnected with one another and with the issues themselves, thanks to the integration of these three components. When taken into consideration in the context of business requirements, the findings made in this way are appropriate. Utilizing management information systems (MIS) allows organisations to implement a multidisciplinary management strategy that considers all of the components relevant to operational, financial, and ISBN: 978-93-5619-947-7 Fig. 1: Decision areas and management levels Managers at lower levels are concerned with operational decisions, while managers at the middle and upper levels are concerned with tactical decisions, and managers at the highest levels are concerned with strategic decisions. A large number of routine activities are planned, carried out, and supervised by lower-level managers, such as organising meetings and ensuring that all plans are performed in the way that has been agreed upon. Middle-level managers commit a disproportionately lesser amount of time to routine planning duties and a disproportionately higher amount of time to tactical decisions such as problem resolution, gap analysis, performance assessment, and advertising, as compared to upper level managers. A higher-level manager's job is substantially different from the jobs of people who operate at the lower and middle levels of an organisation. They are primarily concerned with long-term strategic issues such as which product should be launched into the marketplace, which market should be tapped, how to gain entry into the domain of competitors, how to organise various resources, how to improve productivity of the organisation, how to reduce costs, with whom to collaborate, whether or not computerization should be implemented, to what extent computerization should be implemented, and how to train the workforce to m. Table 1 displays the levels of management hierarchy in a corporation, as well as the decision-making tasks that are connected with each level and the kinds of information that they need to do their jobs effectively. 136 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Table 1: Types of information, management levels and types of decisions IV. METHODOLOGY Several advantages of the quantitative approach were considered by the researchers while collecting data for this study, including the capacity to investigate correlations between variables and illustrate cause and effect in precisely controlled circumstances. This method also has the advantage of simplifying and re-structuring complex issues into a small number of variables. 4.1 Methods There were two (2) basic sampling techniques utilised in this study: the stratified sampling approach and the purposive sample technique. The stratified sampling approach and the purposive sample technique were both used. To split the sample size into two major groups, stratified sampling was used to divide the sample size into two primary groups. These were the categories of administrative personnel and management. These classifications will make it feasible to collect and assess the data that will be required from each stratum when the classifications are refined. As a result, data on respondents from the institutions were collected by using a purposive sampling technique. In this study, the researcher employed two sampling strategies because they enabled him or her to collect data that was relevant to the study while also lowering the number of errors that happened throughout the data processing process. A random sample of 100 respondents was chosen in order to guarantee that all respondents had continuous access to data inside the institution throughout the survey. It was decided that three (3) Department of Admissions, Student Records, and Examinations heads as well as their respective division heads and administrative assistant were included in the sample size. The sample size was divided as follows: Admissions, Student Records, and Examinations heads; Division heads; and Administrative assistants. There were five (3) members of staff from the Central Accounts Department in attendance, three (3) members of staff from the Audit Department in attendance, and three (3) members of staff from the Students Accounts Department in attendance as well. It was decided who would be the heads of the Human Resources and General Administration, Planning and Development, and Planning, Development, and Planning and Development Departments, as well as the sectional heads, secretaries, and clerks in each department. The participants in this research were chosen from among ISBN: 978-93-5619-947-7 around 20 people from each of the three (3) faculties. They included deans, administrative officers at the schools where they worked, accounting officers, and department heads. Four (4) members of the management team, as well as their respective sectional heads and clerks, were selected for this position. Examining officials from the faculties and departments were also probed since they are ultimately accountable for the results of exams in their respective departments. 4.2 Data Source The key results were compiled using information gathered from the study's participant group. The managerial and administrative personnel of the Govt Polytechnic College in Satna were included in the study's subject population, which included them as well as other college employees. Persons who are directly engaged in the day-to-day activities of the institution make up this category of people. The administrative team is comprised of the rector, vice-rector, registrar, and chief financial officer, among others. It is the responsibility of an administrative staff member to ensure that information is continually flowing, either from management to workers or from employees back to management. V. DATA ANALYSIS AND RESULTS 5.1 Educational or Professional Qualification of Respondents When it comes to educational and professional qualifications, just one responder has a qualification that is less than a diploma level of education. Considering that undergraduates and postgraduates respondents alone account for 64.1 percent of all respondents, it is possible that the majority of respondents are well-informed individuals who form the core of the study”. Fig. 2: Education / Professional Qualification VI. DEPARTMENTS RESEARCH COVERED BY THE Because of the high percentage of data acquired from numerous departments, people from the tests, student 137 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 records, central accounts, and other departments were very involved in the research, as shown by their cumulative percentage of 89.2 percent. Most of the others are personnel from the General Administration Department and departments inside the different schools of the universities who are constantly processing data. So that the research project may be completed, larger parts of the administrative personnel who are responsible for the continuous processing of data are fully represented in the execution of the project. Table 2: Departments covered by the research Fig. 3: Manual Data Processing The previous distributions demonstrate that the great majority of the administrative employees selected has an adequate grasp of management information systems (MIS) in terms of the degree of skill they possess. An aggregate percentage of 89.1 percent of individuals who have ordinary to comprehensive knowledge of management information systems and their relevance in school administration are aware of management information systems and their significance in school management. 6.1 Length of Service with Polytechnic When the respondents were asked how long they had been employed by the institution, the findings indicated that the vast majority (66.2 percent) had been employed there for more than two years on average. In other words, they are up to speed on the procedures and processes inside the institution, and they will be able to provide information on their existing work practises as well as the influence they anticipate the MIS will have on their place of business. 6.2 Level of Computer Literacy VIII. INTRODUCTION OF MIS IN EDUCATIONAL MANAGEMENT If you take a look at the level of interest expressed by the sampled respondents, it is clear that the vast majority of administrative staff, with a cumulative percentage of 97.5 percent, are extremely interested in the implementation of a Management Information System to ensure the safe, secure, and reliable flow of data within the institution. This evident excitement on the part of the institution's staff members might be a favourable portent for the success of the MIS project's implementation at the institution. In light of the study's findings, it is clear that the vast majority of respondents are computer literate, as seen by their cumulative percentage of 90.1 percent. This suggests that the vast majority of the administrative personnel at the school is computer savvy and has the potential to boost their productivity if given the proper tools. VII. MANUAL DATA PROCESSING The replies of the respondents reveal indisputably that manual data processing inside the institution takes a longer period of time, with a cumulative percentage of 75%. Because of a shortage of computers, about 75% of all processes will take an excessive amount of time to complete, which will have a negative impact on job performance and output levels. The pie chart depicting the distribution of the results is displayed in the image to the right of this section. ISBN: 978-93-5619-947-7 Fig.4: Introducing of MIS in Educational Management IX. DISCUSSION It is important to understand the function of management information systems (mis) in improving educational management. education administration relies 138 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 on management information systems (mis) to execute important functions, including the management of student personal data, the assignment of index numbers, and the distribution of programmes, among other things. in light of the fact that 75% of respondents agreed that the introduction of management information systems will have a significant impact on effective decision-making within the polytechnic, it has been determined that management information systems contribute significantly to the efficiency of educational management generally. When decisions can be made correctly and rapidly, the overall development of the organisation in terms of both numerical and financial growth will be enhanced. Furthermore, as information technology (it) simplifies data flows inside and between departments, it becomes easier for all employees to have access to the information they need in order to make educated choices about their jobs. The importance of management information systems (mis) in increasing the capacity for data processing, storage, and analysis, as well as the timely conveyance of information to management and employee. The goal of using mis in school administration is to make data storage and processing more convenient for everyone involved. most likely, the slow pace at which information is gathered and retrieved inside organisations is due to the use of manual data processing, which has been present for many decades. It takes substantially longer to transmit data when information is distributed via the usage of paper for memos and reports. consequently, it should come as no surprise that more than eighty percent (80 percent) of respondents feel that the installation of mis will result in the preservation of effective data storage. furthermore, the overwhelming majority of respondents (89.1 percent) believe that employing management information systems (mis) would speed the implementation of decisions made within a department's hierarchical structure. when questioned about departmental coordination a second time, more than ninety-seven percent (97 percent) of respondents said that the implementation of mis would boost departmental coordination and ensure efficiency in performance. The importance of management information systems (mis) in the planning, coordination, and implementation of educational activities. Education activities must be properly supported and promoted, and it is vital that the necessary management practises be in place to ensure that this occurs. it has been predicted for a very long time, according to the majority of respondents, that management information systems (mis) would be implemented at govt polytechnic college satna so that it might assist in educational planning and coordination. alternatively, the expenses involved with the system's acquisition, deployment and administration have always acted as a deterrent to purchase and maintain it. according to the data ISBN: 978-93-5619-947-7 gathered, 46.2 percent of respondents believe that the issue of cost is the key cause for the institution's inability to complete the mis project on a timely basis. another 28.6 percent say that the problem originates from a lack of knowledge on the part of management, which has failed to recognise the enormous impact that mis has made in other educational contexts, including higher education. the shortage of skilled individuals to operate the system, however, is seen as a major obstacle to its adoption by some respondents (37 percent). according to other persons who have shared their ideas on this topic, workers who were apprehensive about change and employees who were computer illiterate were among those who expressed their opinions on this problem. Through the use of management information systems, it is possible to reduce or remove duplications and to fill information gaps (mis). Efficiencies in information transportation throughout an organisation are crucial for supporting swift and efficient decision-making at all levels. in light of the results, it has become evident that data duplication is one of the most critical challenges that workers face on a daily basis in their jobs. According to the survey results, 82.6 percent of respondents feel that they repeat data on a regular basis at work, which results in a large rise in the amount of money they spend on stationery and other supplies. a further 91.3 percent feel that when data is supplied manually, there are numerous information gaps as a consequence of the fact that errors in data gathering and editing have an influence on the overall outcome. certain information is lost as a consequence of the fact that some files may not be discovered at all or may not be retrieved in time for some critical decisions to be taken, resulting in the loss of some information. 93 percent of those who responded believe that, if the proper system is in place, important decisions can be made quickly and specific plans can be put in place to ensure the institution's progress. This is because the information gathered from meetings is used in decisionmaking and, ultimately, educational planning. X. CONCLUSION Generally speaking, the importance of Management Information Systems in educational management is not usually considered in most tertiary institutions. This is because it is assumed that by putting in place the appropriate Information and Communication Technologies, all of the problems associated with information flow will be resolved. However, according to the findings of this study, information technology (IT) management (MIS) is more than just the installation of computer systems, their relevant computer software, and accessories; it is also the willingness of management to purchase the appropriate systems and computer software, the acceptance of administrators to use the system, and the availability of qualified ICT personnel to provide system support. 139 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 REFERENCE [1] Bloch, D., Hedberg, J.G. & Harper, B. (2012). Managing informationsystemsintheschool.InternationalJournalofInformation Management,14(6),443-464. [2] Bumsted, Aee r.(2013)“The Concept of Systems Management in Educational Data Processing” [3] Cambridge Education (February,2016),“Education Management Information System”:ashort case study of Ghana,(aworkingpaper) [4] Cambridge Education (February,2014), “Education Management Information System”:ashort case study of Nigeria,(aworkingpaper) [5] Charles C.Villanueva(2003),“Education management information system(EMIS)and the formulation of education for all(EFA)” [6] Kowizt, Geraldetal(2014),“Information for School Administration [7] Lewis, David, Alfred (2015) “Inception , Design, and Implementation o fa Management Information System”. Dissertation. [8] Mason ,Richardo and Mitroffiani (2016), “A Program for Research on Management Information Systems ”Management Science”. [9] Mccain, k., Ntuen, c.a. & Park, e.h. (2014). “Software Useability as a Foundation for Human- computer Interaction Designs.Inc.a.Ntuen & e.h. Park (eds.), Human Interaction with Complex Systems: “Conceptual Principles and Design Practice (pp. 73-87). Norwell, ma, USA: Kluwer academic. [10] Mellor, Warren (December,2014),“Management Information System”, Educational Management ReviewSeriesNumbe r25.O’brien, J(1999).“Management Information Systems. ISBN: 978-93-5619-947-7 140 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Conceptual Insights of Smart Glasses Ms.SaniaKukkar Assistant Professor, TIAS Abstract: The growing field of wearable computing aims to interweave computing devices into everyday life. This report emphases on smart glasses, one of the categories of wearable computing devices which is very extant in the media and expected to be a big market in the next years. It analyses the variations from smart glasses to other smart devices, introduces many possible applications for different goal audiences and gives an outline of the different smart glasses which are presented now or should be available in the next few years. Interesting technological sorts of the smart glasses are highlighted and explained. with those virtual objects is a way of communicating with the figuring devices. Keywords: Smart Glasses, Media Evolution, Virtual Reality, AR, Wearable’s Technology, Internet of things. Fig. 1: Reality is augmented with a virtual object [7] I. INTRODUCTION Smart glasses are computing devices shabby in front of the eyes. Evidently their displays move with the user’s head, which leads to the handlers seeing the display individually of his or her position and orientation. Therefore smart glasses or lenses are the only devices which can alter or enhance the wearer’s image no stuff where he/she is physically located and where he/she looks. The Internet of things (IOT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to attach, collect and exchange data, creating opportunities for more direct integration of the physical ecosphere into computer-based systems, resulting in efficiency progresses, economic benefits, and reduced human exertions. There are three different models of how to alter the visual information a wearer identifies. Those three are introduced here. II. VIRTUAL REALITY The goal is to create a fully cybernetic world for the user to see, interact with and immerse into. The user sees this virtual world only, any other nimble sources are not affecting the eye. One ample difference to a simple screen is that the actions of the user affect the virtual world. In example movement upsets what virtual content the user sees. A famous unreal example of a device creating a practical world is the Holodeck from StarTrek. III. AUGMENTED REALITY The world is enriched or augmented by virtual stuffs as seen in figure 1. The user can see the real world but also perceives virtual content created by a totalling device and displayed by an additional light source which doesn’t forbid the acuity of the real world. Interaction ISBN: 978-93-5619-947-7 IV. DIMINISHED REALITY Objects are subtracted from scenes by riddling the light imitated or emitted by those objects towards the eye. This is most often used in balance with augmented reality to replace the shrank objects by some virtual objects. Like other smart devices, smart glasses will often also have a camera. Significant differences to other camera procedures are that the pictures or videos are taken from the users point of view, there is no need for the user to hold the device in his hands and the vision of the user is not impenetrable. This camera can see what the wearer sees at any time. In combination with eye tracing technology the devices can decide exactly what the wearer is looking at. This allows the device to get crucial information about the users interests, activities, surroundings and profession. Those fundamental differences to other computing devices are what make smart glasses unique and exciting. They enable new solicitations which couldn’t be as easily grasped with other devices. V. OUTLINES All the applications in the world are useless without the right hardware to run on. That is why an overview of different smart glasses which have been unconstrained freshly or should be released in the next few years is provided. Those glasses are developed by different companies and often trying to achieve different goals and appeal to altered consumer markets. Therefore they do not all stand in direct scrap and should not be compared as such. Devices with one display there are smart glasses with a single display which is hired in the peripheral vision of the user. Those displays can be used to display material to the user. Unfortunately, they cannot be used to create a slim or virtual reality because sight on one eye is not affected. They also cannot be used to create an 141 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 banding augmented reality because virtual objects can one be seen in peripheral vision. focus on displaying info but rather try to create an exciting visual experience. VI. GOOGLE GLASS One example of smart glasses with one display is Google Glass which runs the Android operating system. Its specifications are the following • Weight: 50g. Processing: 1.2 GHz Dual-core ARM Cortex-A9 CPU, Power VR SGX540 GPU, 32GB storage, 682MB RAM. That’s coarsely equivalent to the hardware of an IPhone4 Camera: 7MP still (2528x1856 pixels) or 720p video. There is no flashy Display: It is a color prism projector with a doggedness of 640x360 pixels. See figure3. Sensors: microphone, accelerometer, gyroscope and extent. Interaction: There is a long an narrow touch pad which supports swipe and tap motions. The camera can be started by a button. Audio: There is a bone passage transducer for audio. Sound spreads the inner ear in form of vibrations on the scull. Note that this technology is audible by the hearing diminished as well as persons with normal hearing. Communication: It has no cellular modem which means it can not variety phone calls on its own. It does have Bluetooth and WLAN 802.11b/g Google Glass is fictional to be used in mixture with a smartphone and one of its main uses is to display notifications in a fitting and quick way. It is pretend to be priced similarly to a high end smartphone but there are no official declarations concerning the exact price or release date. VII. DEVICES WITH TWO DISPLAYS Fig. 2: Google Glass Smart glasses with two displays can distress all the wearer sees and could display 3 dimensional content. This makes it possible to form a virtual, augmented or diminished reality. Both systems with two shows presented in this slice need to be connected to a PC with a cable by which the virtual objects are twisted. In the future related devices could be wireless and worn outside. Those devices are curious because they do not ISBN: 978-93-5619-947-7 VIII. APPLICATIONS In this section different likely applications that we can categorize as documentation, productivity, universal remote control, medical, education, acting, commerce and sports. The goal is to display how useful smart glasses could be. It is normal that hardware to realize the applications will exist in the future. Fig. 3: Google Glass display Fig.4: Oculus Rift Crystal cove prototype[10] Documentation Pictures and videos taken by smart bifocals are reserved from the point of view of the user and can be taken hands-free without occluded sight. This is ideal to detention personal experiences of the wearer. In addition to pictures taken manually a device could also take pictures automatically. It could realize when the user is wild or excited and take more pictures or even videos in those times automatically. All the pictures could be uploaded to create a certification of the person’s life.[4] This documentation could be used positively in many different ways. It could be used as a memory aid, to rise safety by forming visual evidence of crimes, as proof in court or simply for personal use. If many people used such a device for certification, information of ruins and other major events would spread even faster due to the increase of pictures and videos taken in states where the user might not have time to manually take pictures like an earthquake. Productivity although there are now many solutions used for navigation, smart glasses could be used to create a better practice. In cars they could be used to highlight the way and offer a speed for the driver. In granaries they could be used to cross employees to the objects they need to transport highlighting those with some colour. Video streams could be used to ask experts or care questions while doing work. Imagine having to do a difficult care task once a year. This could be done while 142 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 being connected to an professional from that products company seeing exactly what you do, giving advice and in case something goes erroneous maybe even being liable for damages. This is a lot cheaper than having an proficient travel to once location. Smart glasses could be used to way eye movement of employees. Analysing this data could help govern when a employee is trite and needs a break or when a employee runs out of work and starts working leisurelier. Another possible application would be to augment construction sites with architectural policies helping in finding errors made in the planning phase and also preventing accidents like drilling done a water pipe. Universal remote control Smart glasses could be used as universal remote control. The user could issue an augmented control of any compatible device at any time and uses this to interact with the device through shrugs. Examples would be an augmented television remote, tune, heat, light, oven and security system or camera control. It would also be possible to remote governor any computing device with a virtual display and a near or physical keyboard and mouse or touch interface. This could be realized by spilling video to the glasses and control material to the device. If the device which should be controlled has little computational rule or the bandwidth is limited it would also be possible to only send the information to be shown to the glasses and let the glasses create the picturing. Of course this would not be as fitting as using an actual desktop PC but it would enable the user to use the PC from remote place and use computing devices which do not have a screen or any physical interfaces. [1,2]. IX. HEALTH At first the use of smart glasses for blind or visually lessened people might seem pointless. But they could be very useful in assisting those people as a seeing companion. Many blind people use a stick to get information about their surroundings. This method only gives information about items under the waist which doesn’t prevent collisions with objects placed higher like tree branches. Smart glasses could advise blind people from such collisions. They could also be used for navigation by generous them information about the distance to predefined landmarks.[3] Another possible application would be to use the smart glasses as a seeing aid to create night vision or show objects in a distance. Virtual reality has been used in physical cure. Studies prove that the subjective ache sensation of patients during exercises can be reduced by distracting them with a virtual reality set up. It would also be probable to have subtitles for deaf people. Speech recognition would have to swell and the glasses would have to be able to distinguish different voices. It would though be relatively easy to only recognize certain sounds like a vehicle horn, somebody screaming: Watch out! or simple commands like crack around or come to me. Education Virtual reality glasses could be used to teach history by tolerating the students to view historical places not only through textbooks but in a virtual 3D world in which they could move aboutfreely. ISBN: 978-93-5619-947-7 Those glasses could also be used to create replications for training. Examples would be driving simulations, flight simulations, military training or surgery training. It is beneficial to be skilled in those events in a safe environment where nobody can be hurt until the skills required to perform are well-read. Entertainment In 3D cinemas users wear glasses. By replacing those glasses with smart glasses the cinema practise could be improved. Personal titles could be introduced in the language of choice. Smart glasses could also be used for a virtual reality cinema practise. The users could govern what they see accountable on their head position. The environment might be familiar according to the conditions in the movie. For example when it is windy in a scene there could be a ventilator in the cinema creating similar conditions. Such a system would be very hard to reinvent for someone at home therefore adventurer copies would not create a similar experience to acinema. This could help the industry in creating a lot more income. Another big market would be virtual and augmented reality games. Especially augmented reality games could reach a wide audience than the people who play games today because they can be played outdoor and be based on interaction with other people in count to augmented virtual objects. One example of such a game would be tennis with a virtual ball. Commerce Commercial billboards and advertisement posters could be superior with video. A movie billboard for example could be enhanced with a promo of the movie if the user is wearing a compatible smart glass. Smart glasses with facial recognition software could help employees spot customers and display information about them. Customers in stocks could be given smart glasses to display information about products and to help them direct through the stores quicker. At the same time the glasses could track their eyes assembly data about where they look. This data could be used to limit the value of advertising space. This data would then be used to sell the space at a more appropriate and maybe greater price. Sports During most sports one does not have a lot of time to devote to a guessing device and it is impossible to use one’s hands to interact with the device. These limitations make use of smart phones during sports very unfeasible. This is even true for strength sports where you would have the cerebral capacity to interact with a smart device. Smart glasses are perfect for exposing evidence during a sport activity. The evidence that is useful for a person doing sports would be performance measurement, performance comparison, and maybe navigation, notifications about weather or messages and so forth. The information can be exposed to the wearer in his peripheral vision without alarming the sports activity.[5] The smart glasses could also be used to take pictures or video during sports started by a speech command. Custom software and sometimes hardware for each sport would be necessary as smart glasses for surfers would diverge a lot from smart glasses for snow sports. 143 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 X. CONCLUSION There is a lot of fascinating applications which can only or a lot easier be implemented with smart glasses than with old-style computing devices. It is feasible that there will be large heaps into research and development of smart glasses because the entertainment industry, military and businesses can value from smart glasses and there might be a high buyer demand for them soon. The hardware that will be offered in the near future still has its pitfalls and will perhaps need a few years and rehearsals to be fixed. Nevertheless the prototypes available to day are very hopeful and it might happen that smart glasses will be a part of our future everyday life. Be it in cinemas, at the workplace, in our acting systems or as always connected companion device. REFERENCE [1] Andrea Colaco et al. Mime: compact, low power 3D gesture sensing for interaction with head mounted displays. In Proceedings of the 26th annual ACM symposium on User interface software ISBN: 978-93-5619-947-7 and technology (UIST ’13),2013. [2] ValentinHeun et al. Smarter objects: using AR technology to program physical objects and their interactions. In CHI ’13 Extended Abstracts on Human Factors in Computing Systems (CHI EA ’13),2013. [3] Roberto Manduchi, James Coughlan. (Computer) vision without sight. ACM Communications, Volume 55, Issue 1, Pages 96-104, January2012 [4] Steve Mann. Continuous lifelong capture of personal experience with EyeTap. In Proceedings of the the 1st ACM workshop on Continuous archival and retrieval of personal experiences, (CAPRE),2004. [5] Gabor S ´ or¨ os, Florian Daiber, and Tomer Weller. ¨ Cyclo: a personal bike coach through the glass. Proceedings of SIGGRAPH Asia 2013 Symposium on Mobile Graphics and Interactive Applications, 2013. [6] Feng Zhou et al. Trends in augmented reality tracking, interaction and display: A review of ten years of ISMAR. In Proceedings of the 7th IEEE/ACM International Symposium on Mixed and Augmented Reality,2008. [7] http://media.smashingmagazine.com/wp-content/ uploads/ 2012/ 11/MISCh05-028.jpg [8] http://www.catwig.com/ google-glass-teardown/ teardown/glassclearshade-isometric.jpg [9] http://www.dailymail.co.uk/sciencetech/ article-2306382/ 10.https://3.imimg.com/data3/ER/XI/MY-3459895/oculus-riftvirtual-reality-500x500.jpg 144 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Impact of Digitalization of Human Resource Functions in Private and Public Sector Life Insurance Companies Ausaf Ahmad Khan Ph. D. Scholar, Department of Commerce and Business Management, Integral University Lucknow Abstract: Private as well as public organizations have been using digital tools in recent years. Functions of HRM also had got impacted by Digitalization. Digitalization has become very important for the functions of HR to make their work simple, economical, and fast. Factors such as technological people and organizational tools are necessary for successfully implementing new digital tools in the functions of HRM in an organization. The term "Insurtech" is used to define new technologies that have the potential to be innovative in the insurance industry as well as have the potential to influence regulatory practices in the market of insurance. The key driver of change in the insurance sector is the innovation through digital tools, and it has also led to infinite efficiency gains, even though all such transformations can have uncertainty and doubts. Digitalization can be noticed in almost every sector, and the insurance sector is no exception to such development and has the possibility of new methods and greater opportunities. A sample of190 people from Life Insurance Company was surveyed to know how a Digitalization of Human resource function is beneficial for life insurance companies of the private and public sector.The study concludes thatthere is a significant difference between the level of implementation of Digitalization between public and private sector life insurance companies. Keywords: e-HRM, insurance companies, digitalization HRM, Digital transformation. I. INTRODUCTION With the advancement in technologies, society has undergone a rapid and intellectual transformation in recent decades. Technology advancement has spread into almost every sector. Because of this technological transformation, the current period is known as the "digital era." In present times, the challenges that are being brought by Digitalization have needed some changes in the model of human resource management (HRM). How human resource interacts with data and information has changed by implementing new technologies. By using digital technologies, many processes and functions of human resources like the process of recruiting and selecting, performance management, and planning, and changed profoundly and reformed as well as improved the services that are offered to the stakeholders. In the past, the relevant information was kept in a paper document by human resources, but with the advancement of digital technology and the human resource information system, the work of human resource functions have been simplified, and the technology has simplified the management of data and has saved a lot of time of Human ISBN: 978-93-5619-947-7 resource system giving them more time to plan their HR activities. Strohmeier and Parry (2014). The HR activities are obviously impacted by the digital technologies and have changed the role played by the HR managers to dynamic and strategic from static. The digital skills gap will be filled by the new HR strategies, develop loyalty and engagement, management of diversity, enable integration between work and personal life as well as retain talented employees. The new HR managers would have to act primarily as strategic to fulfill the new HR role, they need to know the context of the business and how to impose the external elements, and they would have to work as change agents as well as technological proponents who know how to access, assess, examine and to share of the information and the application of new technologies in their work. The managers of Human resources themselves have to understand and acquire digital skills and improve their digital knowledge Chytiri ( 2019). In the 21st century, digital transformation or Digitalization has become a major trend in the market. Transformation of the society at various levels has been brought by Digitalization, and it also has various implications for the managers of human resource management as well as on the organization. To remain competitive, organizations must be ready to adopt new technologies. Digitalization has become important for organizations, and it has become a required transformation by which organizations cannot escape Das &Suresh Krishna ( 2019). Leverage has been provided by the Information and Communication Technology (ICT) to reconfigure the fundamental services that are being provided by the human resource functions, not just with regards to the range of activities that are automated but also in the pointof-access for the internal stakeholders. Many dynamic organizations are well-equipped with various latest instruments that help them in the delivery of human resource services. It is known that applying tools of eHRM at a different level of growth and application of all the tools are not fully utilized. To get the maximum benefit from e-HRM, there is a need for the organizations to implant tools that are relevant for them and, along with that, give information, awareness, as well as training to the employees who do not have any digital knowledge or do not have trust to use these instruments. At the corporate 145 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 level, in many of the organizations, these tools are very functional. However, the application is very limited at a certain level. In the same way, applying all such tools is limited to the employees of a certain level or to those who are higher in the spectrum, and there is a scarcity of the collateral effect. The facts are available that organizations in the public sector are stragglers in applying various tools of e-HRM as compared to the organizations of the private sector and there is a need for these organizations to take more initiatives to harness the advantages of e-HRM. Awareness programs need to be conducted by the HR personnel and more workshops along with seminars for their staff members and line managers to make e-HRM successful. One of the biggest encouragement for the employees to adopt e-HRM tools would be by providing them a link to select and track their path of career Sinha & Mishra ( 2014). II. LITERATURE REVIEW Prakash, Krishna & Mores (2019) stated that the automation of computers in the present time had pushed all the chief organizations to make all departments more digitalized. All sectors worldwide have started adopting Digitalization for the craziest disposal of their services. The HR department must urgently need to link up with the Digitalization for instant solutions of their problems. As there is e-HRM available, there is a requirement to refer ICT by the recruiters in an organization. The system of eHRM refines the system of e-recruitment and e-learning Milon (2019) explained that the application of e-HRM in the life insurance companies is not up to the level of satisfaction as it has some limitations like absenteeism of employees, turnover rate, training facilities are inadequate, poor tools of motivation, poor welfare facilities, unavailability of a performance rating system, etc. There is a need for the organizations to arrange good facilities of training for their employees. It would have life insurance companies have positive motivation, leadership, good facilities related to welfare for human resources. Pushpalatha & Pandian (2021) stated that in an era of digital transformation, the areas of human resource planning, management of rewards, performance management, training and developments, safety and health of employees, and relations with the employees have totally transformed. Now HR managers have to play a more active role and give their contribution towards the era of Digitalization to ensure that the human capital is skilled as well as educated in order to meet the demand of Digitalization. To ensure the strategies of Digitalization, all HR operations must be aligned properly. Human resource data systems have tremendously changed the services of Human resources that are being managed and delivered by the organization. Raghavendra, Priyanka & Chaithanya (2018) revealed that the system of e-recruitment is very convenient and helpful for many of the organizations who ISBN: 978-93-5619-947-7 have already adopted the technology. The purpose of this study was to identify the benefits of e-recruitment. The study found that recruitment is not about just hiring people. It is about hiring the right candidate for the right organization. The E-recruitment system has many benefits for those who are looking for a job as well as for the recruiter also. E-recruitment is cost-saving, time-saving, and the quickest way to hire candidates for the organization. In the present time, many large as well as small organizations have adopted the technology and are enjoying its benefits. It is dependent upon technology and internet connection. Bala (2015) revealed that in present times, the transformations begin and end on the basis of the demand and dominance of Digitalization. Overall, it is fine to say that the transformations have led to the present time to be called as "digital age." These changes brought by Digitalization have made a huge impact on the lives of Human Resource Management as well as on the lives of employees. Talking about digital technologies, all these transformations required attention. Looking at the role played by the HR managers and professionals, the study found that there is an element of communication. The transformation in technology plays an essential role in the changes in the way of communication. The HR technologies need to enhance in order to survive in this digital age. Samson &Agrawal (2020)explained that attracting better talents from the market by HR professionals is enabled by Digitalization, it also helps them in keeping a close track of the performances of the employees, anticipating their training requirements, and Digitalization also helps in encouraging them to be engaged by finding out their potentials and acknowledging them. Digitalization has increased the global reach of organizations, and that is considered an achievement for the company. The goal of the Digitalization of the company is to enhance its performance. In order to be excellent, the HR professionals must have to be more strategic and proactive and should gain expertise in the future social as well as technical trends. Okoronkwo (2021) stated that the Digitalization of the HRM has transformed the traditional style of the business model. The functions of Human resource management have changed totally by the increased usage of software related to employees, IT-enabled human resource functions, social networking, and mobile solutions. The Digital approach has been infused by organizations to handle their human resources. There is a requirement to constantly develop and innovate new and strategic human resource practices to remain competitive in the market and business. Upgrading the HR services is important to deliver the best results. Mohammed (2019) revealed that it is human capital on which the success of an organization depends, and recruitment that is done by the department of human 146 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 resources is very important to generate human capital for the organization. The traditional method of recruiting people that was paper-based has now been reacquired to some level through e-recruitment system in the majority of the companies by the application of technology and the internet. The success of an organization is dependent upon the skills, talents, experience, and intellectual capital of their employees, along with the effective recruitment that is being done by the human resource department giving rise to the generation of the intellectual capital of the organization. In an e-recruitment system, the resumes of candidates are scanned through the technology, and it is favorable for the HR department in the process of hiring as well as for the job seekers. E-recruitment helps job seekers in submitting their resume to different recruiters from various locations as well as allow them to store information. Organizations adopting e-recruitment increases the connectivity between organizations, managers, and the outcome in a transformation of the organization. Rani, Raman, & Kumar (2019) stated that this study was conducted to identify the practices of HRM in both public as well as in life insurance companies of the private sector. Five factors of HRM practices are being found in the study is Recruiting and Selecting, Compensating and Rewarding, Performance appraisals, Training& Development, and Teamwork. In a study, it is found that public insurance companies have good HRM practices in comparison to private life insurance companies. The research work found that most of the workers are happy with the functions of the HRM department in public insurance companies. The work observed significant differences in HRM practices of public and private insurance companies on the dimensions like Recruiting and Selecting, Compensating and Rewarding, Performance appraisals, Training & Development, and Teamwork. Nivlouei (2014) found that implementing e-HRM is an opportunity for the delegation of data entry of employees. E-HRM simplifies the usage of the human resource marketplace and also offers more self-services to its employees. Business solutions get advanced by e-HRM that gives a complete online platform for the management activities, processes, information, and data needed by the HRM in any modern organization. Digital HRM provides easy, efficient, and reliable instruments to use and is accessible by a huge number of people. Swaroop (2012) stated that in organizations in the present time, web-based applications are introduced frequently for HRM purposes and are called e-HRM systems. The rapid development of the internet has boosted the implementation as well as application of Digitalization in HRM activities. It is suggested by the Human Resource Management surveys that both public and private organizations have started implementing Digitalization in their organizations. Islam (2016) stated that nowadays, human resources have big prospects and ISBN: 978-93-5619-947-7 are very important for organizations. Technology and systems are great instruments that help to enable life easy and assist in managing people in the organization. At this age of global transformation from manual into technology, the functions of human resource management is a vital key for the success of the organization and need to be addressed for the adoption of technology. The study found a significant difference between the private and public companies, and it is found that private organizations are in a better position. E-HRM is the latest and interesting topic to study and for organizations to adopt. In comparison to private companies, public companies need to take more initiative and adopt the technology for the betterment of their human resource management department. III. OBJECTIVE OF THE STUDY To know how Digitalization of Human resource functions is beneficial for life insurance companies of private and public sector. To know the difference in Level of Implementation of Digitalization of Human Resource Function in public and private sector life insurance companies. IV. HYPOTHESES OF THE STUDY Ho - There is no difference between Private and Public Life Insurance Companies with Respect to the implementation of Digital HRM. Ha -There is a significant difference between Private and Public Life Insurance Companies with Respect to the implementation of Digital HRM. V. RESEARCH METHODOLOGY A sample of 190 people from Life Insurance Company was surveyed to know how Digitalization of Human resource functions is beneficial for life insurance companies of private and public sector. The study is comparative in nature and the primary data for the study is collected through random sampling with the help of a questionnaire particularly designed for the present study. A comparative mean and independent sample t-test was applied to analyze the data and get the appropriate results. VI. RESULT AND DISCUSSION Table 1 is demonstrating general profile of the respondents which show that total 190 people were surveyed in which 54.2% are male and 45.8% are female. Among them 41.6% are from the age group of 34-40 yrs, 42.6% from 40-45 yrs and rest 15.8% are above 45 yrs of age group. 50% of the respondents are from private life insurance company and 50% are from life insurance Company of the public sector. 33.2% of the respondents are working as HR Directors, 37.4% as Recruiting managers and rest 29.5% are working as HR information specialist in Human Resource department of their respective companies. 147 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Table 1. General profile of the respondents Variables Gender Males Females Total Age 34-40 yrs 40-45 yrs Above 45 yrs Total Type of company Private Public Total Designation HR Director Recruiting Manager HR information specialist Total Respondents %age 103 87 190 54.2 45.8 100 79 81 30 190 41.6 42.6 15.8 100 95 95 190 50.0 50.0 100 63 71 56 190 33.2 37.4 29.5 100 Table 2 compares the mean values for the level of implementation of Digitalization of Human Resource Function in life insurance companies of private and public sector. It is observed that the implementation of Digitalization is more in private sector companies as it reduces paperwork of organization with mean value 4.79 as compared to Public Sector Company with mean value 3.71. Similar results are shown by private sector which says that Digitalization reduces manual efforts in companies showing higher mean value 4.65 as compared to the public sector (3.49). Digitalization helps HRM to provide more effective training to employees for their sales practices showing mean values 4.53 and 3.97 in private and public companies, respectively. The private companies say that Digitalization helps HR to make their work simple and fast with mean value of 4.39 as compared to public (3.60). The private company shows higher mean value as they say that Digitalization keep the client’s information safe for longer time (4.31) as compared to public (3.24) and Digitalization increases the connectivity between organizations, their employees and clients with mean value 4.32 and 3.11 for private and public sector companies. Higher mean values are shown by the company of private sector as they accept that Digitalization makes the process of hiring and talent recognition smooth 4.27 as compared to public sector 3.29 and similar results are shown by private sector for Digitalization helps in managing the records of the clients in much organized way 4.23 and public sector companies 3.23. Further Independent Sample t-test was applied to know the difference Level of Implementation of Digitalization of Human Resource Function in public and private sector life insurance companies. Table 3. Independent Sample t-test SI. No. 1. 2. Table 2. Digitalization of Human Resource Function Sr. NO 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Digitalization of Human Resource Function Digitalization helps HR to make their work simple and fast Digitalization reduces manual efforts in companies Digitalization reduces paperwork of organization Digitalization keep the client’s information safe for longer time Digitalization manages all the functions of human resource more effectively and efficiently Digitalization makes the process of hiring and talent recognition smooth Digitalization helps in managing the records of the clients in much organized way Digitalization increases the connectivity between organizations, their employees and clients Digitalization helps HRM to provide more effective training to employees for their sales practices Digital platform increases the relevance of the business models of insurance companies ISBN: 978-93-5619-947-7 Life Insurance Companies Private Public 3. 4. 4.39 3.60 4.65 3.49 4.79 3.71 4.31 3.24 6. 3.69 3.11 7. 4.27 3.29 4.23 3.23 4.32 3.11 5. 8. 4.53 9. 3.97 10. 4.11 3.66 Implementation of Digitalization of Human Resource Function Digitalization helps HR to make their work simple and fast Digitalization reduces manual efforts in companies Digitalization reduces paperwork of organization Digitalization keep the client’s information safe for longer time Digitalization manages all the functions of human resource more effectively and efficiently Digitalization makes the process of hiring and talent recognition smooth Digitalization helps in managing the records of the clients in much organized way Digitalization increases the connectivity between organizations, their employees and clients Digitalization helps HRM to provide more effective training to employees for their sales practices Digital platform increases the relevance of the business models of insurance companies df t value Sig. 188 3.63 0.00 188 5.35 0.00 188 4.85 0.00 188 5.40 0.00 188 2.77 0.01 188 4.94 0.00 188 4.56 0.00 188 5.20 0.00 188 2.49 0.01 188 2.83 0.00 148 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Table 3 is showing independent sample t-test to know the difference in Level of Implementation of Digitalization of Human Resource Function in public and private sector life insurance companies. It was from the table that the value in the significance column for all the statements is significant (below 0.05). Hence, there is a significant difference between the level of implementation of Digitalization between public and private sector life insurance companies. VII. SUGGESTIONS The outcome of the study shows that the adoption of technology and the Digitalization of Human resource functions are proved to be beneficial for the organization as it manages all the functions of human resources more effectively and efficiently, such as hiring, rewards, and recognition. Compensation, issues of employees etc. are handled more effectively after the Digitalization. Implementing Digitalization helps in making the organization successful as Digitalization make the work easy, simple and fast, it also reduces manual efforts. Digitalization reduces paper work and keeps the information safe for a longer time. Digitalization of the human resource functions is totally dependent upon the internet and network. T-test has been done to find out the outcome of the research, all the statements are found to be significant as the significant values for all statements is less than 0.05. X. FUTURE DIRECTION This study extends the existing research on the subject. Although interest in the HRM digitalization function has grown considerably in recent times but there is still no clear definition of what the causes and consequences of the success of the digital transformation process can be; this study intends to represents a step in this direction and to answer the following research question: "What are the factors that determine the success of the digitalization of human resource management function in context of Indian Life Insurance Industry?” In this context, HR people should rethink their role, from a service provider to a solution facilitator and a promoter of a healthy organizational culture. REFERENCES [1] [2] [3] [4] [5] VIII. CONCLUSION The study concludes that the implementation of Digitalization of Human Resource Function is more in Life Insurance Companies of the private sector as it helps HR to make their work simple and fast, reduces manual efforts in companies, reduces paperwork of organization, helps HRM to provide more effective training to employees for their sales practices and makes the process of hiring and talent recognition smooth. It is also found that there is a significant difference between the level of implementation of Digitalization between public and private sector life insurance companies. IX. RECOMMENDATION Looking at the complete study, it is observed that there is less Digitalization in the Public Life insurance companies. Therefore, Public life insurance companies must learn and implement Digitalization in Human Resource functions to remain competitive in the market in urban and later on in the rural branches. Further, they can do outsource the Digitalization of their branches and can also partnership with public-private agencies. More investments need to be done to for the improvement of the HRM functions and to convert them into digitalized mode. Initiatives need to be taken by the government side as well to promote the Digitalization of the HRM functions, particularly in the public sector organizations. ISBN: 978-93-5619-947-7 [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] Bala, I. (2015). HRM in the Digital Age – Digital Changes and Challenges of the HR Profession, International Journal of Business Management, 2(2), 1259-1266. Chytiri, A.P. (2019). Human Resource Managers’ Role in the Digital Era, Journal of Economics and Business, 69(1-2), 62-72. Das, S. & Sureshkrishna, G. (2019) Challenges of Digitalization for HR Professionals: An Exploratory Study, International Journal of Innovative Research in Technology, 6(1), 1014 - 1018. Islam, M.S. (2016). Evaluating the Practices of Electronic Human Resources Management (E-HRM) as a Key Tool of TechnologyDriven Human Resources Management Function in OrganizationsA Comparative Study in Public Sector and Private Sector Enterprises of Bangladesh, Journal of Business and Management, 18(11), 1-8. Milon, M. (2019). Present Scenario of Human Resource Management (HRM) Practices in the Life Insurance Companies: Bangladesh Perspective, Canadian Journal of Business and Information Studies, 1(6), 17-27. Mohammed, S. (2019). The Introduction and Use of Electronic Recruitment (E-recruitment) On the Recruitment Process in Organizations: Benefits of This Technology for Recruiting Organizations, Global Journal of Human Resource Management, 7(5), 45-59. Nivlouei, F.B. (2014). Electronic Human Resource Management System: The Main Element in Capacitating Globalization Paradigm, International Journal of Business and Social Science, 5(2), 147-159. Okoronkwo, G.I. (2021). Digitization of Human Resource Practices: The Realities in the New Normal, International Journal of Business Systems and Economics, 13(4), 243 – 261. Prakash, N.B., Krishna, G. & Mores, S. (2019). Digitalization of HRM Practice in the Present Scenario, International Journal of Research in Management Studies, 4(1), 1-5. Pushpalatha, S.&Pandian, R. (2021). Digitalized Human Resource and its Perseverance in HR Operations, International Journal of Science Technology and Management, 10(2), 12-27. Raghavendra, B., Priyanka, C. &Chaithanya, G. (2018). A study on E-recruitment, International Journal of Advanced Research in Science and Engineering, 7(3), 843-852. Rani, L., Raman, G.P., & Kumar, V. (2019). A Study On HRM Practices In Select Public And Private Sector Life Insurance Companies In Chennai City, The International Journal of analytical and experimental modal analysis, 11(10), 2129-2142. Samson, H. &Agrawal, V. (2020). Effectiveness of Digitalization in HRM: An Emerging Trend, J. of Critical Reviews, 7(4), 4082-4088. Sinha, B.C.& Mishra, M. (2014). E-HRM Tools: An Empirical Study in Select Indian Organizations, International Journal of Business and Management Invention, 3(9), 71-83. Swaroop, K. R. (2012) E-HRM and how IT well Reduce the cost in the organization, Journal of Marketing & Management Review, 1 (4), 133-139. 149 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 DC-IDS: Distributed Collaborative Intrusion Detection Systems for Vanets C. Rajkumar1, Dr. T. Sangeetha2, P. Panneer Selvan3 Ph.D. Research Scholar, Department of Computer Science, Kongu Arts and Science College, Erode 2 Associate Professor, Department of Computer Science, Kongu Arts and Science College, Erode 3 Assistant Professor, Department of Computer Science, Kaamadhenu Arts and Science College, Sathyamangalam 1 Abstract: The privacy-preserving technique for distributed collaborative-based learning is critical for accomplishing private cooperation; numerous threats are possible, ranging from passive eavesdropping to active interference. Intrusion detection systems (IDSs) are critical devices that identify malicious activities and help to minimize attacks. Otherwise, distributed machine learning causes training data privacy breaches. The flow of data between nodes creates a fundamental obstacle to collaborative learning. A rogue node may gain sensitive information from other nodes by inferring from observed data. Machine learning-based Distributed collaborative IDS (DC-IDS) for VANETs that respect privacy. To identify intrusions in VANETs, the proposed technique applies the alternating direction method of multipliers (ADMM) to a class of empirical risk minimization (ERM) problems and trains a classifier. We employ differential privacy to capture the DC-privacy IDS' notation and present a dual variable approach to achieve dynamic differential privacy. We suggested a Distributed collaborative intrusion detection system based on machine learning that protects user privacy (DC-IDS). To decentralize the empirical risk minimization (ERM) issue, the alternating direction multipliers (ADMM) strategy is applied. Keywords: VANET, IDS, DC-IDS, ERM, ADMM, Collaborative IDS. I. INTRODUCTION The vehicular ad hoc network (VANET) is a verbal communication device that provides the distribution of safety-related information, site visitor management, navigation, and street services [1]. However, it is well understood that VANETs are vulnerable to assaults ranging from passive eavesdropping to active interference. An attacker, for example, may eavesdrop on and record the communications of other cars, then replay them to get access to specific assets such as toll services [2]. An attacker may tamper with a particular vehicle, spoof its identity, and issue false warnings, causing toll road traffic to be disrupted [3]. Intrusion detection is critical in minimizing the danger of VANETs by using signature-based and anomaly-based methodologies to identify hostile actions. Among the numerous IDS designs suggested, Distributed collaborative IDSs (DCIDSs) have been proposed to enable the sharing of detection information about known and new attacks and improve detection accuracy [4]. Learning methods on distributed computing devices offer a fantastic foundation for DCIDSs to characterize adversarial behaviors using local datasets and ISBN: 978-93-5619-947-7 exchange expertise to increase detection accuracy [7]. Network- level intrusion assaults on computer devices make use of the distributed collaborative nature of VANETs and design a system structure of a distributed machine-learning-based DCIDS that operates entirely inside a VANET [8]. Fig. 1: VANET Communication Architecture The DCIDS enables each vehicle to use the knowledge of the labelled coaching statistics of other cars, increasing each vehicle's coaching data measurement without taxing each vehicle's storage capacity. Furthermore, the time-consuming process of gathering labeled information may be distributed among all cars in a VANET, reducing the stress on each vehicle. Furthermore, the DCIDS enables the motors to communicate knowledge about each other rather than directly replacing the training data [9]. Furthermore, the DCIDS increases the scalability of education records processing and enhances decisionmaking pleasure while cutting computational costs. The alternate direction method of multipliers (ADMM) is suited for decentralizing the computer learning issue across a network by allowing nodes to communicate their classification results and yield the best classifier achieved via centralized learning. Regardless of the distributed nature of the learning algorithm, data communications between distinct vehicles can cause serious privacy concerns about the coaching statistics in each vehicle when an adversary can examine the outcome of the learning and extract the sensitive facts of each vehicle's education data. The adversary might be either a VANET vehicle that watches its neighbors or a hostile outsider examining learning outputs [10]. Intrusion detection systems (IDSs) are critical devices for mitigating risks by identifying malicious actions, and cooperation among vehicles in VANETs may increase detection accuracy by transmitting their experiences across nodes. In the Distributed collaborative learning of the DCIDS for a VANET, the DVP is proved to ensure 150 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 dynamic differential privacy [11]. A design method for determining the ideal value of the privacy parameter via the solution of an optimization problem to manage the trade-off between security and privacy in a VANET Distributed machine learning is an appropriate platform for developing scalable and deployable Distributed collaborative detection algorithms across VANETs. A distributed collaborative intrusion detection system based on machine learning respects privacy (DC-IDS). To decentralize the empirical risk minimization (ERM) issue that represents Distributed collaborative learning, the alternate direction method of multipliers (ADMM) methodology is applied. II. BACKGROUND STUDY The authors, S. H. Mahin et al. [1], suggested an anomaly-based technique for detecting and intercepting Black Hole Attacks. The purpose of this article was to offer a useful method for detecting and intercepting this attack using the Dynamic MANET on-demand (DYMO) routing protocol. This job entails three modules: planting, detection, and, finally, interception against the black hole assault. MATLAB software is used to introduce an IDS to the concept of machine learning. Relative examination of IDS based on classifiers such as K-Nearest Neighbor, Support Vector Machine, Decision tree, and neural network is also performed to verify that the best practicable classifier is chosen for administering the IDS. The job is then analyzed using several metrics such as packet loss rate, average transmission latency, Packet Delivery Ratio, and throughput. J. Chen and C. Chen [2] presented event processingbased IDS to tackle the real-time IDS challenge in VANET. They created the IDS architecture using this technique based on the Event Processing Model (EPM). It is a rule-based intrusion detection system (IDS) in which rules are stored in a Rule Pattern Repository and use Epser's SQL and EPL as a reference. According to the results, this technique used more CPU resources, less memory, and took less time to process than standard IDS. A rule-based intrusion detection system framework for VANET was suggested by A. H. Farooqi et al. [3]. This method is divided into three stages. The first step is the local auditing phase, which checks packets to ensure they come from a legitimate adjacent node. The second step is the rule application phase, which operates in promiscuous mode. The third step is the intrusion detection phase, which identifies routing attempts by evaluating data obtained from the content suppression unit. This security measure may detect only routing attacks. The author, C. B. Dutta and U. Biswas [4], investigates the wormhole attack's impact on Optimized Link State Routing (OLSR), a common proactive routing strategy for VANET. In this article, a modified variant of the wormhole assault termed camouflaging wormhole attack is devised, and a matching specification-based IDS is constructed to detect and block this attack. Finally, the ISBN: 978-93-5619-947-7 suggested algorithm's performance is evaluated using Network Simulator (NS2). The following experimental findings demonstrate the efficacy of the suggested strategy. C. Cervantes et al. [5] suggested INTI, a sinkhole detection system for VANET, implemented in the simulator. The suggested system is divided into four parts. The first module is the Cluster configuration module, which categorizes nodes such as members, leaders, and affiliated nodes based on their network roles. The second is routing module monitoring, in which the observer node counts the number of transmissions done. The final module is the sinkhole attacking node detection module. The fourth module is the attacker isolation module, which separates the malicious node from the cluster while raising an alert to notify its adjacent nodes. The simulation results reveal that a detection rate of 92 percent is attained. This method only identifies sinkhole attacks; hence, work may be improved by detecting other forms of attacks. SVELTE is a real-time intrusion detection system in IoT proposed by S. Raza et al. [6]. SVELTE is the sole IDS accessible in VANET, and Contiki OS uses it. In this architecture, the 6LoWPAN Border Router has three major centralized pieces. This method can only identify internal network spoofing, sinkhole, and selective forwarding attacks III. SYSTEM MODEL The ADMM technique is utilized to decentralize a centralized ERM issue in the VANET that simulates Distributed collaborative learning. We also define dynamic differential privacy and explore the privacy challenges related to ADMM-based Distributed collaborative learning. The local detection engine then analyses the pre-processed system data using classification algorithms. The P-CML engine is launched if the vehicle user requests that the current classifier be upgraded. The local detection engine uses the newly retained classifier to examine system data. Otherwise, the current classifier is utilized to categorize incursions. The alert is sounded whenever any incursion is categorized. The privacy-preserving mechanism is based on the concept of dynamic differential privacy: Dual Variable Perturbation (DVP), and it describes the mathematical models of all three P-CML components: the PP mechanism, the DLL, and the CC engine. By introducing adequate noise into the deterministic algorithms, DVP is DDP. The ADMM technique then decentralizes a centralized regularised empirical risk minimization (ERM) issue. The privacy problems are discussed, and dynamic differential privacy is defined. Vehicles and infrastructures are considered identically in our paradigm, except that infrastructures are static and have higher data processing capability. Distributed collaborative learning should be disseminated via a VANET without direct data exchange in our paradigm. 151 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 The alternating direction multipliers (ADMM) technique is a good choice for our model. We concentrate on a class of distributed ADMM-based empirical risk minimization (ERM) as the supervised learning algorithm employed in Distributed collaborative learning in this paper. (ERM) issue. The privacy problems are discussed, and dynamic differential privacy is defined. Vehicles and infrastructures are considered identically in our paradigm, except that infrastructures are static and have higher data processing capability. 3.1 Network Design Distributed collaborative learning should be disseminated via a VANET without direct data exchange in our paradigm. The alternating direction multipliers (ADMM) technique is a good choice for our model. We concentrate on a class of distributed ADMM-based empirical risk minimization (ERM) as the supervised learning algorithm employed in Distributed collaborative learning in this paper. Privacy protection mechanisms often obstruct information exchange and disincentivize nodes from cooperating. As a result, a privacy-preserving method is required to maintain the privacy of training data throughout the network and create a successful DCIDS. Differential privacy is a well-defined notion that may give a strong privacy assurance by ensuring that a modification to any one item in the dataset only marginally changes the distribution of the dataset's answers. The network-level intrusion targets computer systems, and the system architecture of a distributed machine-learning-based DCIDS over a VANET takes use of the distributed collaborative nature of the VANETs. The DCIDS allows each car to use the knowledge of other vehicles' labeled training data, increasing the training data amount for each vehicle without really burdening the storage capacity of each vehicle. Furthermore, the time-consuming process of gathering tagged data may be dispersed among all cars in a VANET, lowering each vehicle's effort. Furthermore, the DCIDS allows the cars to communicate information about one another without explicitly sharing training data. Furthermore, the DCIDS enables the scalability of training data processing and increases decision-making quality while lowering computing costs. 3.2 DC-IDS Model Onboard units (OBU), application units (AU), and roadside units (RSU) comprise a generic VANET (RSU). Communication between OBUs (vehicle to vehicle) or between an OBU and an RSU (vehicle to infrastructure) is based on in-car wireless access (WAVE). The RSUs may also link to other infrastructures, such as other RSUs and traffic management centers, and communicate with one another (infrastructure to infrastructure) via other wireless technologies. Each vehicle is outfitted with an OBU and one or more AUs. It also features a collection of sensors to gather data and utilize the OBU to communicate with other OBUs or RSUs. Appendix A contains information on the three primary components of the VANET architecture for interested readers. A pre-processing engine, a local detection engine, and a privacy-preserving Distributed collaborative machine learning (P-CML) engine comprise the Distributed collaborative system. Algorithms depict the logical flow of a DC-IDS. The preprocessing engine collects and pre-processes real-time VANET system data that defines the system actions. 3.3 Distributed private collaborative learning The ADMM technique decentralizes machine learning using a centralized regularised empirical risk minimization ISBN: 978-93-5619-947-7 3.4 Private Collaboration Dynamic differential privacy is a notation for data privacy in the Distributed collaborative learning over a VANET, an approach for the privacy-preserving mechanism based on the definition of dynamic differential privacy: Dual Variable Perturbation (DVP), and describes the mathematical models of all three components of the PCML, namely, the PP mechanism, the DLL, and the CC engine. By introducing adequate noise into the deterministic algorithms, DVP is DDP IV. RESULTS AND DISCUSSION It usually refers to the consequences and facts generated by the gadget for many end-users. The output is the important reason for creating the device and the foundation on which they evaluate the usefulness of the application The results of the simulation are positive concerning performance. The Proposed system has used the NS2 simulator to evaluate the AODV protocol. The results are compared with the method of CIDS and DC-IDS methods. Fig. 2: Throughput Comparison for CIDS and DC-IDS Protocol In Figure 2 x-axis denotes the total no of nodes, and the y-axis denotes the throughput. 152 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Figure 5 illustrates the energy comparison for the existing and proposed methods. In x-axis denotes the Node density, and the y-axis denotes the Energy. Fig.3: Packet drop Comparison chart Figure 3 illustrates the packet drop comparison chart for the existing and proposed system. In x-axis denotes the no of slots, and the y-axis denotes the packet drop frequency. Fig.6: Packet delivery ratio Figure 6 illustrates the packet delivery ratio comparison for the existing and proposed system. The Xaxis denotes the delivery speed in milliseconds, and the yaxis denotes the PDR. V. CONCLUSION Fig. 4: Average Delay Comparison chart Figure 4 illustrates the average delay comparison for the existing and proposed methods. In x-axis denotes the packet speed in milliseconds. And y-axis denotes the Average Delay in seconds. The distributed machine learning process inherently causes training data privacy leaks—a distributed collaborative intrusion detection system based on machine learning that respects privacy (DC-IDS). The alternate direction method of multipliers (ADMM) methodology is used to decentralize the empirical risk minimization (ERM) issue, which models Distributed collaborative learning into the distributed ERM that is well-suited to the nature of the VANET system. The design concept for determining the ideal value of the privacy parameter issues solves an optimization problem that optimizes both security and privacy. The tests also looked at the effects of varying VANET sizes and modifying VANET architecture during Distributed collaborative learning. REFERENCES [1] [2] [3] [4] [5] Fig.5: Energy comparison ISBN: 978-93-5619-947-7 S. H. Mahin, F. Taranum, L. N. Fatima, and K. U. R. Khan, ―Detection and interception of black hole attack with justification using anomaly based intrusion detection system in MANETs,‖ Int. J. Recent Technol. Eng., vol. 8, no. 2 Special Issue 11, pp. 2392– 2398, 2019. J. Chen and C. Chen, ―Design of complex event-processing IDS in internet of things,‖ Proc. - 2014 6th Int. Conf. Meas. Technol. Mechatronics Autom. ICMTMA 2014, pp. 226–229, 2014. A. H. Farooqi, F. A. Khan, J. Wang, and S. Lee, ―A novel intrusion detection framework for wireless sensor networks,‖ Pers. Ubiquitous Comput., vol. 17, no. 5, pp. 907–919, 2013. C. B. Dutta and U. Biswas, ―Specification based IDS for Camouflaging Wormhole Attack in OLSR,‖ 23rd Mediterr. Conf. Control Autom., pp. 960–966, 2015. C. Cervantes, D. Poplade, M. Nogueira, and A. Santos, ―Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things,‖ Proc. 2015 IFIP/IEEE Int. Symp. Integr. Netw. Manag. IM 2015, pp. 606–611, 2015. 153 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 S. Raza, L. Wallgren, and T. Voigt, ―SVELTE: Real-time intrusion detection in the Internet of Things,‖ Ad Hoc Networks, vol. 11, no. 8, pp. 2661–2674, 2013. [7] S. Rehman, M. A. Khan, T. A. Zia, and L. Zheng, ―Vehicular AdHoc Networks ( VANETs ) - An Overview and Challenges,‖ J. Wirel. Netw. Commun., no. May 2013, pp. 29–38, 2013. [8] M. Kaur, S. Kaur, and G. Singh, ―VEHICULAR AD HOC NETWORKS,‖ J. Glob. Res. Comput. Sci., vol. 3, no. 3, pp. 2010– 2013, 2012. [9] G. S. Chirayil and A. Thomas, ―A Study on Cost Effectiveness and Security of VANET Technologies for Future Enhancement,‖ Procedia Technol., vol. 25, no. Raerest, pp. 356–363, 2016. [10] V. H. La and A. Cavalli, ―S ECURITY ATTACKS AND SOLUTIONS IN V EHICULAR A D HOC N ETWORKS : A S URVEY,‖ Int. J. AdHoc Netw. Syst., vol. 4, no. 2, pp. 1–20, 2014. [11] M. Ali et al., ―Classification of Security Attacks in VANET : A Review of Requirements and Perspectives,‖ Int. J. Innov. Res. Comput. Commun. Eng., vol. 3, no. 3, March 2015, pp. 2339–2346, 2015. [6] ISBN: 978-93-5619-947-7 154 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Voice Based Email for Visually Challenged Dr.T.S.Suganya1, Mrs. M. Divya2, Mrs. V. Devi3, Sunil S4, Tamil Selvan T5, Akshay Ashok6 1,2,3 Assist.Professor, 4,5,6Student SRM Institute of Science and Technology. Chennai Abstract: The Internet has become one of the most common things that people use on a day-to-day basis. Also with the growth of the internet, communication has also started to play a vital role for sending and receiving important information. Though there have been many advancements in internet communication, No normal or naive visually challenged person will be confident enough to use the generic email system on their own. This is mainly due to the fact that using them visual perception (ability to see). This research aims at developing an Email System that will help even the visually challenged to use the Email system without any previous training or additional assistance.The system will not let the user make use of any physical inputs and instead will solely use Interactive Voice Response along with Text-toSpeech and Speech-to-Text Conversion. This System will also be helpful for not just visually Challenge but other differently abled people and people who cannot read. Keywords: Visually Challenged, Interactive Voice Response, Text-to-Speech, Speech-to-Text. I. INTRODUCTION Today the world is running on the basis of the Internet. The Internet plays a vital role in the world of Communication. Without the Internet no work can be easily done today. E-mail is one of the main fields with the use of the Internet. Among them Electronic mail (E-mail) is one of the most dependable and reliable means of communication. But there are people who are visually challenged who can’t see things and can't use the generic email system. Among 7.9 Billion people as of now (2022) there are around 2.2 Million people are Visually Challenged. The only way which will help them to use the email system is by Speech Recognition and screen readers, so we came up with our Project called Voice Based Email System for Visually Challenged. In this system the usage of keyboard and mouse is completely avoided. All the Interactions between the system and the user is done through IVR (Interactive Voice Response). Our architecture will help them to operate the system easily and efficiently. Our System can also be used by the Handicapped People. II. INTERACTIVE VOICE RESPONSE Interactive voice response (IVR) is a technology that allows a computer to interact with humans through the use of voice and DTMF tones input via a keypad. In telecommunications, IVR allows customers to interact with a company’s host system via a telephone keypad or by speech recognition, after which services can be inquired about through the IVR dialogue. IVR systems can respond with pre-recorded or dynamically generated audio ISBN: 978-93-5619-947-7 to further direct users on how to proceed. IVR systems deployed in the network are sized to handle large call volumes and also used for outbound calling, as IVR systems are more intelligent than many predictive dialer systems. IVR systems can be used for mobile purchases, banking payments and services, retail orders, utilities, travel information and weather conditions. A common misconception refers to an automated attendant as an IVR. The terms are distinct and mean different things to traditional telecommunications professionals—the purpose of an IVR is to take input, process it, and return a result, whereas that of an automated attendant is to route calls. The term voice response unit (VRU) is sometimes used as well. DTMF decoding and speech recognition are used to interpret the caller's response to voice prompts. DTMF tones are entered via the telephone keypad. Other technologies include using text-to-speech (TTS) to speak complex and dynamic information, such as e-mails, news reports or weather information. IVR technology is also being introduced into automobile systems for hands-free operation. TTS is computer generated synthesized speech that is no longer the robotic voice traditionally associated with computers. Real voices create the speech in fragments that are spliced together (concatenated) and smoothed before being played to the caller. Another technology which can be used is using text to speech to talk to advanced and dynamic data, such as e-mails, reports and news and data about weather. IVR is used in automobile systems for easy operations too. Text To Speech is a system originated synthesized speech that’s not the robotic voice historically related to computers. Original voices produce the speech in portions that are joined together and rounded before played to the caller. III. SPEECH RECOGNITION Speech recognition is the interdisciplinary sub-field of computational linguistics that develops methodologies and technologies that enables the recognition and translation of spoken language into text by computers. It is also known as "automatic speech recognition" (ASR), "computer speech recognition", or just "speech to text" (STT). It incorporates knowledge and research in the linguistics, computer science, and electrical engineering fields. Some speech recognition systems require "training" (also called "enrollment") where an individual speaker reads text or isolated vocabulary into the system. The system analyses the person's specific voice and uses it to fine-tune the recognition of that person's speech, resulting in increased accuracy. Systems that do not use training are called "speaker independent" systems. Systems that use training 155 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 are called "speaker dependent". Speech recognition applications include voice user interfaces such as voice dialing (e.g. "Call home"), call routing (e.g. "I would like to make a collect call"), domestic appliance control, search (e.g. find a podcast where particular words were spoken), simple data entry (e.g., entering a credit card number), preparation of structured documents (e.g. a radiology report), speech-to-text processing (e.g., word processors or emails), and aircraft (usually termed Direct Voice Input). The term voice recognition or speaker identification refers to identifying the speaker, rather than what they are saying. Recognizing the speaker can simplify the task of translating speech in systems that have been trained on a specific person's voice or it can be used to authenticate or verify the identity of a speaker as part of a security process. From the technology perspective, speech recognition has a long history with several waves of major innovations. Most recently, the field has benefited from advances in deep learning and big data. The advances are evidenced not only by the surge of academic papers published in the field, but more importantly by the worldwide industry adoption of a variety of deep learning methods in designing and deploying speech recognition systems. Speech recognition works using algorithms through acoustic and language modelling. Acoustic modelling represents the relationship between linguistic units of speech and audio signals; language modelling matches sounds with word sequences to help distinguish between words that sound similar. Often, hidden Markov models are used as well to recognize temporal patterns in speech to improve accuracy within the system. The most frequent applications of speech recognition within the enterprise include call routing, speech-to-text processing, and voice dialing and voice search. While convenient, speech recognition technology still has a few issues to work through, as it is continuously developed. The pros of speech recognition software are it is easy to use and readily available. Speech recognition software is now frequently installed in computers and mobile devices, allowing for easy access. The downside of speech recognition includes its inability to capture words due to variations of pronunciation, its lack of support for most languages outside of English and its inability to sort through background noise. These factors can lead to inaccuracies. Speech recognition performance is measured by accuracy and speed. Accuracy is measured with word error rate. WER works at the word level and identifies inaccuracies in transcription, although it cannot identify how the error occurred. Speed is measured with the realtime factor. A variety of factors can affect computer speech recognition performance, including pronunciation, accent, pitch, and volume and background noise. It is important to note the terms speech recognition and voice recognition are sometimes used interchangeably. However, the two terms mean different things. Speech ISBN: 978-93-5619-947-7 recognition is used to identify words in spoken language. Voice recognition is a biometric technology used to identify a particular individual's voice or for speaker identification. IV. SPEECH RECOGNITION IN PYTHON The improvement and accessibility alone in the field of speech recognition are worth considerable. It allows the physically and the elderly and visually challenged people to collaborate with state of the art products and services quickly and naturally no graphical user interface is needed. If you want to use speech recognition or simply convert speech to text in your python it is very easy to use. Working of speech recognition. Packages available in PyPI. How to install and how to use speech recognition packages using python library. A handful of packages for speech recognition exist on PyPI. A few of them include: Google-cloud-speech Watson-developer-cloud Pocket sphinx Wit Apiai Speech Recognition Speech Recognition is a library that acts as a wrapper for many popular speech APIs and is thus very flexible to use. One of these is the Google Web Speech API which supports a default API key that is hard coded into the Speech Recognition library. The elasticity and easy to use features of the Speech Recognition package in python make it a very good choice for developers who are working on any python project. It does not guarantee to support every feature that is wrapped with this API. You will have to dispense some time searching for the easily available options to find out if Speech Recognition is going to work in your particular case. Speech Recognition will work very well if you need to work with existing audio files. The audio package comes in play when you need to capture microphone input. The main class which is used in this package is Recognizer class. The use of the recognizer instance is obviously to recognize the speech. Every instance of this class comes with various settings and functionality for recognizing speech from the speaker. Fig.1: Recognizing speech from the speaker 156 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 The Microphone class used in this python program will let the user use the default microphone of their system instead of using some audio files as a source. If the system of the user doesn’t have the default microphone or in case they want to use some other microphone then they will need to specify which one to use by giving a device index. The list can be seen by calling list_microphone_names() which is a static method of the Microphone class. Every instance of Recognizer class has seven methods for recognizing speech from speaker source using various APIs: recognize_bing(): Used in ―Microsoft Bing Speech‖ recognize_google(): Used in ―Google Web Speech API‖ recognize_google_cloud():Used in ―Google Cloud Speech‖ - requires installation of the google-cloudspeech package recognize_houndify(): Used in ―Houndify by SoundHound‖ recognize_ibm(): Used in ―IBM Speech to Text‖ recognize_sphinx():Used in CMU Sphinx requires installing PocketSphinx recognize_wit(): Used in ―Wit.ai‖ listen () - It is another function used for capturing microphone input. It works just like the AudioFile class while Microphone is a context manager. Input can be captured from the microphone using the listen() method of the Recognizer class.The first argument taken by this method is an audio source and it will keep on detecting the audio input until the silence is detected by it. The audio input is generally mixed with ambient noises which can be handled by using the in-built method of recognizer class adjust_for_ambient_noise(). You need to wait for a second or two to adjust_for_ambient() to perform its task and then try speaking ―Whatever you want‖ in your microphone and wait for some time before returning it to recognize the speech again. It only recognizes the speech for one second and it also gives you the option to set the duration for wait time. V. VOICE BASED EMAIL In this proposed system, the user can send and receive email and also listen to either of these processes with the help of IVR (Interactive Voice Response) and Voice commands. In this Email System, the application makes use of the SMTP protocol for sending emails and POP3 protocol for receiving emails. SMTP (Simple Mail Transfer Protocol) is the reliable protocol to send emails and it works in a very simple way that the SMTP server passes on the email messages quickly. POP3 (Post Office Protocol) is used to receive emails. The POP3 server stores the email and on request the emails are displayed. The same is implemented in our application, that on the request by the user the emails are downloaded. ISBN: 978-93-5619-947-7 Fig.2: Overview of Proposed System VI. LITERATURE SURVEY Currently, there is no feasible way in which the visually impaired or visually challenged people can use the generic email system without any assistance. The existing system requires visual perception for any users to achieve its limits and make full use of it. Also, the existing system uses a very simple speech to text and text to speech recognition along with few to many keyboard and mouse inputs depending upon the application and the action, which will be difficult for a visually challenged person to keep track of and remember them. To use the existing generic systems, the user also needs to know where the mouse pointer is at all times which is not feasible nor practical and second, that user should be very well versed with all the keyboard and mouse inputs. Therefore a new user cannot use this service as it becomes a very hectic and strenuous task for them. However, even the most common mail services like Gmail that we use in our day-to-day life cannot be used by visually challenged people. This is mainly because they do not have any option that is specifically designed to address this issue. As the visually challenged cannot visualize what is there on the screen they cannot properly figure out what to do in order to perform desired operation. In some places, Even screen readers are used to read the Content on the screen which reads everything that is there on the screen without any filters or punctuations. For this purpose, Few Researches conducted a survey from many Institutes for Visually Impaired throughout India and gathered information about what was exactly needed for them. They highly accentuated on using a completely autonomous voice based system without having to move the cursor or giving any physical inputs. There are few solutions available now, but none of them provide the proper solution desired by the visually challenged people and help them without any limitations. So the best Solution that could be provided to them would be a System that is completely voice based with the help of IVR. IVR lets the user use the email system without any 157 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 physical input and could be useful for people with other disabilities too. Hence, for addressing this issue and providing a solution for this we propose a system that does require any sort of physical interaction or inputs. It is totally voice based and it utilizes IVR technology and important libraries like Pyaudio and Speech Recognition. As a result, based on the voice commands and prompts the user will be guided throughout the desired action. VII. DISADVANTAGES SYSTEM OF THE EXISTING There is no voice command or sound system, Still the visually impaired person has to use the keyboard, It needs a lot of practice for them to use, Third person is sending mails behalf of them, There is no STT (speech to text), TTS (text to speech), or IVR (Interactive voice Response). VIII. PROPOSED SYSTEM We now know and have established that even with the latest advancements in the field of communications, even now visually challenged people find it difficult to utilize these technologies because using them requires you to be able to see and figure out things visually. However we easily tend to forget that there are still people who are not as fortunate as most of us and are visually impaired. They cannot easily figure out what's on the screen. This makes the whole concept of the internet a completely inert and useless technology for visually challenged and even illiterate people in some cases. In our proposed system, we mainly use three types of technology, they are: STT (Speech-to-text): Here whatever we speak is converted to text. Based on a certain user command, his/her speech will be converted to text format, which the people could see and read also.In this STT process the speech is given as the input using the microphone. The Output will be in the form of a Text. In this process to convert a Speech to a text there are various Libraries in python such as Google Cloud speech, WIT, pyaudio, Speech Recognition. Here the user gives the speech as an input, which the system recognizes and converts it into a text. If everything is done from the user side then the user can send the mail to the selected participant by declaring the appropriate command. TTS (text-to-speech): This method is the complete opposite of Speech-to-text. Here, the text format of the emails to synthesized speech. In this TTS Process the Text is given/taken as an input and the Speech will be the output. In our project the system will read the messages for visually challenged people, although it is a difficult task this can be implemented by using the specific commands. This mechanism will be much more helpful for the visually challenged people for communications. ISBN: 978-93-5619-947-7 IVR (Interactive voice response): IVR is an advanced technology that describes the interaction between the user and the system in the way of responding by using physical input for the respective voice messages. IVR allows users to interact with an email host system via a system commands, after that the users can easily service their own queries by listening to the IVR prompt. IVR systems generally respond with pre-recorded audio messages to further assist users on how to proceed. This is the most important option provided by the mail services. The functionality of the Compose mail option in our email system Is completely different from the existing mail system. Since our system is for visually challenged people therefore the keyboard operations and mouse operations are completely avoided, the composing mail would be done through the Voice Input method (Speech Recognition). The user can hear the system and compose the mail they want to send, once the mail is composed the mail will be ready to send for a selected participant. IX. PROPOSED SYSTEM The disabilities of visually impaired people are thrashed. This system makes the disabled people feel like a normal user. They can hear the recently received mails to the inbox, as well as the IVR technology proves very effective for them in terms of guidance. The visually impaired people do not ―necessarily‖ require any assistance technically. This presumably has far more implications than just email systems in the future. The main benefit of this system is that the use of the keyboard is completely eliminated, the user will have to respond through voice commands only. Therefore, the user does not need to worry about the location of the mouse pointer nor the physical keyboard keys at all. This proposed system will be easily accessible to nearly all types of users as it is just based on interactive voice recognition and speech conversion; there is absolutely no need to locate the mouse pointer on the screen. Also because of this, the people who are unable to read and write need not worry as they can hear the prompting done by the system and perform respective actions. Also, the idea focuses on providing basic functionalities like compose, send, receive, check inbox and along with advanced features like Voice based operation, Search Mail, provision for voice as well as text. Every basic functionality will be provided. This implementation has a lot of potential in the future, with a lot of enhancements; perhaps it was a system that, in any language, had the functions of email access and spam emails. In addition, this system can be upgraded to send an attachment, and it is also very useful for people with poor eyesight. It can be made available to 158 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 all the region's people, which is quite popular and will continue to be available in multiple languages; the system is simple and easy to access. Furthermore, the system employs sign language and can be integrated into it to make it more scalable, reliable and Robust. The research will also be benefited with implementations like, associating or combining vibration technologies (vibrators) and haptics (haptic motors) that are embedded in devices from recent times with the application so that the user gets a seamless experience with actual physical feedback. Also in future, we attempt to make the system autonomous. So, it's easy for the visually impaired people to access the services. The system developed now is working only on desktops. As use of mobile phones is emerging as a trend today, there is a scope to incorporate this facility as an application in mobile phones also. Also, security measures to be implemented during the login phase can be revised to make the system safer. (b) X. METHODOLOGIES User Registration: Here, we get the details such as name, contact details, dob and security questions from the user. Setting Up Credentials: Like in the process of User Registration, here we get the USER ID and PASSWORD. Service Selection: We select the process and service that the user wants to perform. Output Process: Based on the task or process chosen, the respective functions are performed and the required result of the process is received. Logout or Signout: Finally, after the user has completed his/her desired task, the user is prompted or suggested to Logout/Sign-out. (c) Fig.3: (a), (b), (c) Flow diagram of the proposed method XI. SENT MAIL The use of the sent mail option is to keep track of all the mails which had been sent by the user. If the user wants to access these mails this option will help the user by providing the details the user needs. In order to access the sent mails the user needs to perform certain actions provided by the system. If the user accessed the particular mail the system will provide the information as who the receiver was and what is the subject of the mail. This will help them in efficiently understanding the process and extracting the required mail. XII. CONCLUSION (a) ISBN: 978-93-5619-947-7 On successful completion of this research will help not only the visually challenged but also other people who face problems accessing the email for communication. This will completely erase all the hurdles faced by the visually impaired as it relies on IVR (Interactive Voice Response) and Voice commands. Here, we eliminate all 159 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 sorts of physical input, as a result the user can send or receive email without any hassle and need not get the help of any third person. Since the system uses only voice response, even a naive user or user without any previous experience can use this with ease. The system developed by us now works only on desktops. As use of mobile phones is emerging as a trend today, there is a scope to incorporate this facility as an application in mobile phones also. Also, security measures to be implemented during the login phase can be revised to make the system safer and reliable. REFERENCES [1] [2] [3] [4] [5] [6] Pranjal Ingle, HarshadaKanade, ArtiLanke ―Voice based Email System for Blinds‖ in International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 3, Issue 1, 2016. MahamImtiaz, Samina Khalid, SaleemaKhadam, SumairaArshad, Ali Raza, Tehmina Khalil ―Blind Electronic Mail System‖ Published by Canadian Centre of Science and Education. Rijwan Khan, Pawan Kumar Sharma, Sumit Raj, Sushil Kr. Verma, SparshKatiyar, ―Voice Based EMail System using Artificial Intelligence‖,in International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249-8958 (Online), Volume-9 Issue-3, February 2020. MullapudiHarshasri, ManyamDurgaBhavani, and MisraRavikanth ―Voice Based Email for Blind‖, International Journal of Innovative Research in Computer Science & Technology (IJIRCST), ISSN: 2347-5552, Volume-9, Issue-4, July 2021, https://doi.org/10.21276/ijircst.2021.9.4.2, Article ID : IRP1185, Pages 10-13, www.ijircst.org T.Shabana, A.Anam, A.Rafiya, K.Aisha ―Voice based email system for blinds‖, in International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue 1, January 2015. JagtapNilesh, Pawan Alai, ChavhanSwapnil and Bendre M.R ―Voice Based System in Desktop and Mobile Devices for BlindPeople‖. In International Journal of Emerging Technology andAdvanced Engineering (IJETAE), 2014 on Pages 404407(Volume 4, issue2). ISBN: 978-93-5619-947-7 [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] UmmuhaniSifa U, NizarBanu P K , ―Voice Based Search Engine and Web page Reader‖. In International Journal of Computational Engineering Research (IJCER). Pages 1-5. The WHO website. [Online]. Available: http://www.who.int/mediacentre/factsheets/fs282/en/ Saurav Mishra, AshwaniPanwar ―VOICE BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED‖, https://pdfcoffee.com/voice-based-email-system-for-visuallyimpaired-p df-free.html C. Kang, H. Jo and B. Kim, ―A Machine-to-Machine based Intelligent Walking Assistance System for Visually Impaired Person‖,The Journal of KICS, vol. 36, no. 3, (2011), pp. 195-304. K. Jayachandran, P. Anbumani ―Voice Based Email for Blind People‖ from International Journal of Advanced Research, ideas and Innovations in Technology. Available online at www.ijariit.com Aishwarya Belekar, ShivaniSunka, NehaBhawar, SudhirBagade, ‖Voice based Email for the Visually Impaired‖ in International Journal of Computer Applications (0975 – 8887), Volume 175– No. 16, September 2020. K. Venkatesh, P. Santhosh Kumar, A. Sivanesh Kumar ―Voice Based EMail System For Visionless People And Object Detection Using Optimization Technique‖ in International Journal Of Scientific & Technology Research VOLUME 9, Issue 02, FEBRUARY 2020 ISSN 2277-8616. Prof. Umesh A. Patil, Pranouti B. Patil, Teja P. Magdum, Shweta K. Goud and Latika R. Bhosale, "A Survey on Voice Based Mail System for Physically Impaired Peoples". International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE) -Volume 4, Issue 1, January 2016, pp. 1002-1006. BishalKalita and Santosh Kumar Mahto, "Voice Based Email for Blind People". International Journal of Engineering Science and Computing (IJESC) - Volume 9, Issue 10, October-2019, pp. 23789-23799. SaurabhSawant, AmankumarWani, SangharshSagar, RuchaVanjari and M R Dhage, "Speech Based Email System for Blind and Illiterate People''. International Research Journal of Engineering and Technology (IRJET) Volume 05, Issue 04, April-2018, pp. 2398-2400. G. Shoba, G. Anusha, V. Jeevitha, R. Shanmathi. ―AN Interactive Email for Visually Impaired‖.In International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), 2014 on Pages 5089-5092. 160 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 A Health Care System for Doctor’s Obtainability and Nearest Search using K-Means Clustering Mrs.V.Devi1, Dr.T. S. Suganya2, Dr.S.Jayachandran3, Illavarasan4, Dilip Kumar5 Assistant Professor, SRM Institute of Science and Technology, Ramapuram Campus, Chennai, Tamil Nadu, India 4,5 Final Year BCA Students, SRM Institute of Science and Technology, Ramapuram Campus, Chennai, Tamil Nadu ,India 1,2,3 Abstract: The main aim of this project is to improve medical services, In this project, Doctor-patient portals are online healthcare portals that enable patients to interact and connect with their medical providers, such as doctors and medical organizations, if doctor is not available in the particular hospital and search the nearest hospital doctor availability is checked, it is web application for secure storage of patients medical history. These portal services 24/7 day and night as well as in case of any emergency. To book a doctor's appointment and access other services of the website, patients must first register on the portal. The website lists a variety of professionals, including gastroenterologists, neurologists, dermatologists, and others. This application stores the doctor information in the database server and for nearest domain search we are providing Global Positioning System (GPS) Tracking, In the search option providing doctors detail as per there specialization so that patients can take appointment. When a patient makes an appointment, his or her medical records are saved in a database so that the patient can review them the next time he or she visits the hospital, can refer to them for future treatment and test results. This web application mainly focuses on nearest search doctors, doctor login, Patient appointment etc. so it becomes more convenient to the patient. Keywords: Nearest Search, Healthcare, GPS. I. INTRODUCTION The scope of this project is to create a platform where patients and doctors can access or interact efficiently with each other and provide ease and comfort to the patients. It also aims to resolve the problems that patients have to face while taking appointments and keeping medical files. A Cloudlet based healthcare system is presented, where the privacy of user’s physiological data and the efficiency of data transmission are our main concern. We use NTRU (Number Theory Research Unit) for data protection during data transmission to the cloudlet. In order to share data in the cloudlet, we use users similarity and reputation to build up trust model. Based on the measured users trust level, the system determines whether data sharing is performed. We divide data in remote cloud into different kinds and utilize encryption mechanism to protect them. We propose collaborative IDS (Intrusion Detection System) based on cloudlet mesh to protect the whole healthcare system against malicious attacks. 1.2 Web Technology Web Technology has become a highly important aspect in today's globe because to advanced terminologies. ISBN: 978-93-5619-947-7 It describes both design and code methodologies, therefore we'll employ both basic and advanced web abilities in this project. APIs will become increasingly crucial as all technologies move toward an API-centric approach. Nowadays, RESTful Web service frameworks are now available for every major programming language. The REST architecture style is a networked hypermedia application architecture. We're utilising the Bootstrap framework for the front end and a SQL database for the back end. The project is dynamic because it is run using the Java programming language. Here rating facility is also available i.e. every patient authorized patient can give rating to the doctor in terms of stars so it will become easy to choose best doctor for patient. II. SYSTEM ANALYSIS 2.1 Existing System Existing system focuses on health information exchange but suffers from many security issues. In a present systems, issues such as risks of privacy exposure, Scalability in key management, flexible access and efficient user revocation have remained the most impartment challenges. The main concern is about whether the patients could actually control the sharing of their sensitive personal health information. 2.2 Proposed System Patient details cannot be accessed efficiently. Lack of security for records and database. There is no facility for searching organs and blood. The proposed system that will helps doctor s in their work and will also help patients to book doctor appointments and view medical Progress. In the proposed system different Modules are added for efficient doctor-patient communication. Step1: Users login into portal and send a request through browser. Which is then processed by web server. Step2: User request is accepted by web server by authenticating the user through the data available in the database. Step3: According to the request type it identifies the request sender, example: Admin, Patient or Doctor. Step4: The identified request is then further proceeds by Admin according to the modules, our system includes 3 modules that work on the basis of the of the request send to it. 161 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Step 5: According to the request send by the user data is fetched from database. Step 6: After that response is send to the browser through which the request is coming. III. PROPOSED SYSTEM ARCHITECTURE The main objective of the project is to provide quality medical care to the patients by bringing all medical practitioners of the city to a single platform so that everybody can easily access them and make appointments. The second objective is to replace the current manual file keeping system with an online medical patient database system 3.1 System Execution This is a web application that makes advantage of web services provided by IIS, such as http. We create web sites that use such web protocols to retrieve data. We designed web pages statically at the start of the implementation, which means the content of the page remained identical while it was loading. We used to execute it dynamically once we finished the entire implementation, which implies the page content changes frequently. For static execution of each module, a local Tomcat apache 8.0 server is utilised; nevertheless, the project is managed remotely via the internet, which keeps the material fresh. 3.2 Components of the system Patient - In this system, there are n numbers of patient are present. Patient should register before doing some operations. And register user details are stored in user module. After registration successful he has to login by using authorized user name and password. Login successful he will do some operations like Send Appointment Request, Access Request, Receive Prescription Fig.1: Architecture design Add Dr Send Appoinment Login View Dr Register View Patient Information Patient View Request and Choose Dr CloudLe 1,2,3 View Introduer Info Login View Patient Request Send Access Request to Cloudlet 1 or 2 or 3 View patient records Update patient health records like ecg,Send prescription details to user CloudLet: In this module, the CloudLet has to login by using valid name and password. After login successful he can do some operations such as Add Doctor, View all Doctor Information, view Patient, and view the Intruder Detection Details. Access Request View Patient Request Dr Send Access Request to CloudLet Doctor Send Prescription Logout Fig.2: Use case diagram Cloud CloudLet 1,2,3 Dr Patient 1 : Add Dr() Intruder Login View patient records means it is showing only encrypted format Try to modify data means alert mail send to patient or cloud let. 2 : View All Dr() 3.3 Dataset 3 : Login() 4 : Register() 5 : Send Appoinment() 6 : Request for CloudLet() 7 : Send Prescription() 8 : View All Parient() 9 : View Intruder Details() Fig.3: Sequence diagram ISBN: 978-93-5619-947-7 Dataset Training, which includes data storage, processing, and service, is an excellent support model for the application. The filtered dataset, which is uniformly formatted, helps end users in accessing this data and extracting value from it. The patient's date of birth, blood group, last treatment date, medical history, reports, mobile number, address with city and state, and email id are the most important aspects and information are stored in database. It enables advanced search criteria for the list and retrieval of data based on hospital. Name, education, location, and ratings are some of the information and critical features of a doctor. 162 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 3.4 Algorithm V. CONCLUSION This project is live project is run dynamically on internet so there are measure algorithms used they are as follows • Nearest Search : We're using k-means clustering to help us find what we're looking for. If we need to locate a nearby hospital or medical institution, the referring location will be used to locate a nearby domain. After that, it separates the data into numerous clusters and selects the k cluster that is closest to it. • Security : For security aspect we are using MD5 algorithm it provides best web based security ,it is an algorithm that are used to verify data integrity through the creation of 128- bit . In this paper, we should employ Restful web services to create a web application that allows doctors and patients to communicate more quickly. IV. SCREENSHOTS CLOUD HOME PAGE VI. FUTURE ENHANCEMENT Nowadays smartphones play a great role in humans life cycle. Smartphones collect the details like current location like GPS. Like this smartwatch, we provide to track the health details by using sensor. In future, it can be developed to app with several features and extensions. That can be used easily and fluently in their daily life style. Wearable devices like reputable ring that measures the PPG signal from which SpO2 and heat rate can be extracted and sends them to the host computer via RF transmitter. REFERENCES ADD DOCTOR Fig.4: Application screenshot VIEW DOCTOR VIEW PATIENT [1] Zaheer Merchant (2019, April) , “Health department of northern state exposed data of 12.5 million pregnant women.”, [Online].Available: https://www.medianama.com/2019/04/223health-departmentindian-state-pregnant-women-data-leak/ [2] Aimee O’Driscoll (2019, July), “The biggest medical data breaches in history”, [Online].Available: https://www.comparitech.com/ blog/vpnprivacy/biggest-medical-data-breaches/ [3] HIPAA JOURNAL (2018,March) , “Healthcare Data Breach Statistics.”, [Online]. Available: b.https://www.hipaajournal.com/ healthcare-data-breachstatistics/ [4] G.Magyar,Blockchain: Solving the privacy and research availability tradeoff for EHR data: A new disruptive technology in health data management, Budapest, Hungary,24-25 Nov. 2017. [5] Privacy-Preserving Patient-Centric Clinical Decision Support System on Na¨ıve Bayesian Classification by Ximeng Liu, Student Member, IEEE, Rongxing Lu, Member, IEEE, Jianfeng Ma, Member, IEEE, Le Chen. [6] paper 1- Domain Specific Search Of Nearest Hospital And Health care Management System by RashmiA.Nimbalkar, R.A. Fadnavis.06-08 march 2014. [7] Paper 5- Big Data, Big Knowledge, Big Data for Personalized Healthcare Marco Viceconti, Peter Hunter, and Rod Hose. May14. [8] Design and Implementation of a WebService-Based public-Oriented Personalized Health Care Platform by PengWei Wang, ZhiJun Ding, ChangJun Jiang, and MengChu Zhou. [9] K.T. Win. A review of security of electronic health records. Electronic Health Records: security, safety and archiving, 34, 2005 Fig.5: Dataset diagram ISBN: 978-93-5619-947-7 163 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Security Improvement of Cloud Data using Hybrid Cryptography and Steganography D.B.Shanmugam1, Dr.N.Vijayalakshmi2, S. Andrew Sesubalan3 ,D.Immanuel4, V.R.Shravan5 Assistant Professor, Department of Computer Applications, SRM IST, Ramapuram Campus, Chennai. dbshanmugam@gmail.com 2 Assistant Professor, Department of Computer Applications, SRM IST, Ramapuram Campus, Chennai. vijinatarajan23@gmail.com 3,4,5 BCA Final Year Students, Department of Computer Applications(BCA), SRM IST, Ramapuram Campus, Chennai 1 Abstract: One of the critical headways in data innovation is Cloud registering; however, the security issue of information stockpiling is a major issue in the cloud climate. For that reason, a framework is proposed in this paper for working on the security of cloud information utilizing encryption, data camouflage, and hashing capacities. In the information encryption stage, we executed cross-breed encryption utilizing the calculation of AES symmetric encryption and the calculation of RSA hilter kilter encryption. Then, the encoded information will be concealed in a picture utilizing LSB calculation. In the information approval stage, we utilize the SHA hashing calculation. Likewise, in our idea, we pack the information involving the LZW calculation prior to concealing it in the picture. In this manner, it permits stowing away however much information as could reasonably be expected. By utilizing data covering innovation and blended encryption, we can accomplish solid information security. In this paper, PSNR and SSIM values were determined not withstanding the diagram to assess the picture covering execution when applying the pressure cycle. The outcomes showed that PSNR upsides of stego-picture are better for compacted information contrasted with information before pressure. In spite of the many advantages that distributed computing offers, the most significant are putting away, recovering and moving information through the cloud rapidly and without any problem. Thusly, the issue of information security is a significant test since information is put away at an outsider and dangers are most noteworthy when clients store their information in a reasonable structure. Keywords : RSA, AES Symmetric Encryption, Cryptography. I. INTRODUCTION Through its services in recent years in most organizations, government departments, banks, etc., information technology has witnessed a significant revolution which is mainly attributed to cloud computing [1]. The cloud computing is categorized based on the services it provides to three layers: infrastructure as a service (IaaS), software as a service (SaaS) and platform as a service (PaaS) [2]. IaaS provides users with virtual machines and storage so they can build their infrastructure on them. Further, SaaS provides platforms to develop cloud-hosted applications for users in order to use them in building, developing, testing and managing their applications. In contrast, PaaS provides ISBN: 978-93-5619-947-7 services and applications to users anytime, anywhere through a web browser. Despite the many benefits that cloud computing offers, the most important are storing, retrieving and transferring data through the cloud quickly and easily. Therefore, the problem of data security is a major challenge because data is stored at a third party and threats are greatest when users store their data in a clear form [3]. Typically, there are two techniques used to protect sensitive data: cryptography and steganography. Cryptography is defined as converting data into unreadable codes [4]. Encryption algorithm typically uses a specific parameter or key for the data conversion procedure. Some encryption algorithms require one key to encrypt and decrypt called symmetric encryption. However, other encryption algorithms need two keys: for encryption, they need a public key and a private key for decryption. Decryption is often categorized alongside encryption on the contrary—decryption results from the encrypted data of the original data. Steganography is another technique for protecting data through hiding confidential data in a cover object such as image, voice, and text [5]. The strength of the steganography system depends on the ability to integrate and indistinctness data into the cover object. Consequently, the confidential information is not recognized or retrieved by the unauthorized user. Digital files such as image and sound are more suitable as a cover object in steganography due to the characteristics of higher redundancy of digital files [6]. Thus, it obtains an effective way to hide data. In this paper, a new way is proposed to protect the data stored in the cloud by combining the techniques of cryptography and steganography. This proposed method encrypts secret data in a hybrid way using the symmetric encryption algorithm AES256 and the asymmetric encryption algorithm RSA. Then, the encrypted data is compressed and sent to the LSB algorithm to be hidden. Hash functions are used without the need for a third party to confirm the impartiality of the data quickly after retrieval [7]. The performance of a steganography technique is evaluated and compared based on some criteria to check the quality of the stego-image {Formatting Citation}. In this paper, PSNR and SSIM are used, in addition to the 164 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 histogram. This paper is divided as follows: Section II highlights the relevant works. Section III tackles the proposed work; while in section IV, the outcomes of the work will be discussed. Finally, section V states the conclusions of this study. II. LITERATURE SURVEY In paper author proposes a model using data hashed message authentication codes (HMAC) and index building for determining the errors and raises the efficiency. Performance of Encryption algorithms based on confidentiality, integrity and availability are also assessed. Various algorithms are discussed in this paper along with their and disadvantages. Author also discusses a technique by the use of Rivest Shamir Adleman (RSA) algorithm and MD5 to construct a protected atmosphere for cloud computing. Authors provide more trustworthy, precious and harmless atmosphere for cloud computing with use of combination of blowfish symmetric and RSA algorithm. The usage of above mentioned technique was able to reduce or overcome the issues of data security and primary issues in cloud. [1] Author proposed the notion of attributebased encryption (ABE). In subsequent works, they focused on policies across multiple authorities and the issue of what expressions they could achieve. Author also proposed the generic KEM/DEM construction for hybrid encryption which can encrypt messages of arbitrary length. Based on their ingenious work, a one-time MAC were combined with symmetric encryption to develop the KEM/DEM model for hybrid encryption. [2] The proposed framework given an original image and the secret data to be hidden, our purpose is to generate an intermediate image whose channel compressed version is exactly the same as the stego-image. To this end, we first obtain the stego-image by data embedding on the channel compressed original image using any of the existing JPEG steganographic schemes. Then, we propose a coefficient adjustment scheme to produce the intermediate image based on the stego-image and the original image. This scheme ensures that the channel compressed version of the intermediate image is exactly the same as the stego-image. [3] In 2011, Ling Zheng et al. [9] contrasting private cloud and open cloud , records contrasts in the middle of them and advances a building design of private distributed computing to bolster savvy brace, explains structure of every layer, and shows idea of private distributed computing working framework and system virtualization. It gives the hypothetical reference to assemble the private distributed computing, in this way advances the development of the keen network. In 2011, Ming Li et al. [10] displayed a contextual ISBN: 978-93-5619-947-7 analysis utilizing online Personal Health Record (PHR), they first demonstrate the need of pursuit ability approval that lessens the security presentation coming about because of the list items, and set up a versatile structure for Authorized Private Keyword Search (APKS) over scrambled cloud information. They then propose two novel answers for APKS in light of a late cryptographic primitive, Hierarchical Predicate Encryption (HPE). Their answers empower proficient multi-dimensional catchphrase seeks with reach inquiry; permit designation and renouncement of pursuit abilities. They upgrade the inquiry protection which shrouds clients' question catchphrases against the server. In 2011, Yanjiang Yang et al. [11] propose that Storageas-an administration is a crucial part of the distributed computing framework. Database outsourcing is a run of the mill use situation of the distributed storage administrations, wherein information encryption is a decent approach empowering the information proprietor to hold its control over the outsourced information. Searchable encryption is a cryptographic primitive taking into consideration private watchword based pursuit over the scrambled database. The setting of big business outsourcing database to the cloud requires multi-client searchable encryption, while for all intents and purposes every single existing plan consider the single-client setting. To connect this crevice, they propose a down to earth multi-client searchable encryption plan, which has various points of interest over the known methodologies. In 2011, Wang et al. [12] proposed that distributed computing has been imagined as the cutting edge building design of IT Enterprise. It moves the application programming and databases to the concentrated extensive server farms, where the administration of the information and administrations may not be completely dependable. A creator concentrates on the issue of guaranteeing the respectability of information stockpiling in Cloud Computing. Specifically, they consider the assignment of permitting an outsider inspector (TPA), for the benefit of the cloud customer, to check the trustworthiness of the dynamic information put away in the cloud. The presentation of TPA kills the association of the customer through the evaluating of whether his information put away in the cloud is for sure in place, which can be essential in accomplishing economies of scale for Cloud Computing. In 2012, Syed Naqvi et al. [13] present a formal method for testing the effect of adaptability and heterogeneity on the united Cloud security administrations. Their expects to build up a mean of measuring the effect on security capacities under different working conditions and parameters of unified Cloud arrangements. Their aftereffects of this work will assist organizations with identifying the best security structural planning that will fit their Cloud architectures and execution prerequisites. In 2012, Huaglory Tianfield et al. [14] present an exhaustive study on the difficulties and issues of security 165 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 in distributed computing. They first investigate the effects of the unmistakable attributes of distributed computing, to be specific, multi-tenure, versatility and outsider control, upon the security prerequisites. At that point, they dissect the cloud security necessities regarding the principal issues, i.e., privacy, respectability, accessibility, trust, and review and consistence. They talk about the scientific categorization for security issues in distributed computing. They outline the security issues in distributed computing by cloud security building design. In 2012, Abdullah Abuhussein et al. [15] recommend Healthcare, training, business, and numerous different areas take a gander at distributed computing as a try to comprehend the ceaseless deficiency in volume, foundation, availability, and observing strength. On the other hand, moving information to the cloud suggests moving control of the client's information to the cloud administration supplier inconclusively. Thus, the security and protection of the client's data turns into an essential issue. Surveying and looking at among potential distributed computing administrations, represents an issue for learner clients intrigued to move their work to the cloud to pick security choices that are adequate and hearty in the meantime. They endeavors to recognize and classify a rundown of characteristics which mirror the different parts of cloud security and protection. These credits can be utilized to survey and analyze distributed computing administrations with the goal that customers can settle on accomplished decisions. Cloud administration suppliers can utilize them to fabricate and/or offer better cloud arrangements. In 2012, Wentao Liu et al. [16] propose that the security issue of distributed computing is vital and it can keep the fast improvement of distributed computing. It presents some distributed computing frameworks and breaks down distributed computing security issue and its procedure as indicated by the distributed computing ideas and characters. The information protection and administration accessibility in distributed computing are the key security issue. Single security technique can't tackle the distributed computing security issue and numerous conventional and new advances and methodologies must be utilized together to protect the aggregate distributed computing framework. In 2014, Nikhilesh Pant et al. [17] present the procedures for cloud appropriation and cloud security appraisal to investigate potential security and consistence suggestions in cloud environment. They talks about in subtle element on how an association may continue for security and consistence appraisal amid the cloud calculation. Their methodology and ideas point by point in this paper would be valuable for associations that are included in the cloud reception process. ISBN: 978-93-5619-947-7 In 2015, Liu X. [18] talks about distributed computing information security issues, including tile security of information transmission, stockpiling, security and administration of security. Concentrate on all inclusive information administration influence cloud security examination, and pointed out that a leap forward in the advancement of this distributed computing, attempt to list the comparing methodologies and long haul improvement heading. In 2016, Gupta et al. [19] has been envisioned as a cutting edge structural planning of IT Industries. Security and protection is the significant obstacle in the cloud environment as a result of its transparent construction modeling. They investigates the cloud security dangers furthermore talks about the current security ways to deal with secure the cloud environment .They additionally proposed a novel Trisystem for cloud security against information break which give all around security to the cloud structural planning. III. ANALYSIS 3.1 Drawbacks of Previous Work Encryption algorithm typically uses a specific parameter or key for the data conversion procedure. Some encryption algorithms require one key to encrypt and decrypt called symmetric encryption. The strength of the steganography system depends on the ability to integrate and indistinctness data into the cover object. Consequently, the confidential information is not recognized or retrieved by the unauthorized user. 3.2 Work Proposal This proposed method encrypts secret data in a hybrid way using the symmetric encryption algorithm AES256 and the asymmetric encryption algorithm RSA. Then, the encrypted data is compressed and sent to the LSB algorithm to be hidden. Hash functions are used without the need for a third party to confirm the impartiality of the data quickly after retrieval. IV. IMPLEMENTATION WORK This section presents the design of a new system for providing complete security of sensitive data in the public cloud model. The public cloud has been chosen as an example of cloud types. This is because it is available to anyone who wants to use it. This means that the proposed system works with hybrid, private, or community cloud 166 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 deployment models. The flowchart of the proposed system is explained in Fig. 1. The following processes are included: Encryption: The secret data upload to the cloud will be encrypted using a hybrid encryption system. and the public key. c. Finally, the key is sent to the second party in securely way. The hybrid encryption of the secret data is also mentioned in Algorithm I. Compression: Encrypted data will be compressed to reduce its size and allow more data to be hidden using steganography techniques. In this work, the LempelZivWelch (LZW) compression algorithm was used, which proved to be effective in reducing the data size and speed, as will be shown in the results in the next section. Embedding: Here, we will hide data that has been compressed into a cover image using the Least Significant Bit (LSB) embedding algorithm that will create a stegoimage as an output. Fig.2: Algorithm I- Hybrid RSA&AES256 In the LSB algorithm, every bit of the data to be hidden is written to the last bit of a byte of the data that creates the cover image. In the proposal, 24-bit images were used, as three bits of information were included in each pixel, one in each layer of the RGB colours of the cover image, as explained in Fig. 3. Fig.1: Diagram of Proposed Cloud Security System In our work, hybrid encryption consists of the AES-256 and RSA algorithms, where both RSA and AES are effective algorithms used in the cloud environment [17]. The hybrid encryption depends on dividing secret data into odd and evendata based on location in the data array. Odd-data is encrypted using the AES algorithm with 256 key sizes that generate by a random number generator (RNG). The RNG generates a sequence of numbers that cannot be predicted correctly and are proved the randomize by NIST randomness tests [18]. While even-data is encrypted using RSA algorithm. Where AES key distribution used for encryption is carried out securely. The key is generated by random number generators (RNGs), which are available in many computer software libraries. b. It is encrypted using the RSA algorithm ISBN: 978-93-5619-947-7 Fig. 3: Embedding Secret Data in RGB Image In this way, it allows reducing the cloud storage used and providing protection for transferred data. When the data owner decides to share his data with the other party, he only needs to send the stego hash value and the AES key that is encrypted. Then, the next steps are performed by the receiver to retrieve confidential data: 4.1 Calculate Hashing In this step, we will calculate the hash value of the stego image to confirm the data integrity when retrieved from the 167 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 cloud. Moreover, integrity was implemented using the SHA256 algorithm in this work. Then, the data owner uploads the stego image to the cloud storage. (SSIM) matrix of the stego-image is also calculated using ―(3)‖ where SSIM refers to the symmetry between the cover image and the misleading image of the information steganography technology. 4.2 Checking Hash In this step, the data integrity is checked after downloading stego-image from the cloud by calculate hashing for it and comparing the value with the stored hash value. Where max C indicates the maximum value holds in the image 4.3 Recovery Here, the stego-image data is extracted by the receiver by applying the LSB algorithm and then extracting the merged bits from the cover image will be possible. Where C is the cover image, and S is the stego-image. m, n are number of rows and columns of the cover image and the stego-image. 4.4 Decompression After the data is retrieved from the cover image, it is decompressed and retrieved in its original size by using the LZW algorithm. 4.5 DecryptionIn this step, the extracted data will be decrypted by the hybrid algorithm. The hybrid decryption is implementing based on Algorithm 2. Where µ is average values of x, y Vx and Vy are the standard deviation, and Vxy is the cross-covariance for the image. A secret message with size 1KB is hidden in each of the cover images. The result of the PSNR value analysis for each stego-image before and after compression, as shown in Table I. Table 1. Comparison Of Psnr Values For Stego-Image Fig.4:AglorithmII:HybridRSA&AES256 V. RESULT DISCUSSION For evaluating the proposed system’s performance, several RGB images are used as cover images and hide a message containing a different number of characters in each cover image. Then, the evaluation is performed through the calculation of the signal-to-noise ratio (PSNR) as a parameter. ―(1)‖ is used to calculate the value of PSNR, but first, the value of Mean Square Error (MSE) is needed to be calculated according to ―(2)‖. The structural similarity index ISBN: 978-93-5619-947-7 The results show that the PSNR values for RGB stegoimages of the proposed system with data compression have better performance for all the tested images. This shows the difficulty of noticing the difference between the cover image and stego-image. In other words, the higher the PSNR value, the harder it becomes for visual attackers to recognize the stego-image. The second measurement to measure stegoimage quality is SSIM. The result shows a similarity between the cover image and the stego-image where the SSIM value is closer to 1 (SSIM for all images tested is 0.999), which means that the stego-image is of outstanding quality. Figure 3 shows the cover image histogram and the stegoimage, and the results show that the histogram is similar when observed with the naked eye. This entails that the amount of distortion of the stego-image is very small. The 168 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 last stage of evaluation of the proposed system is figuring the time for both the process of hybrid encryption, steganography and compression as well as the calculation of the total time. The results show that the time taken is very little for the system proposed, which reflects the efficiency of the proposed system, as shown in TABLE II. Table 2. Proposed System Performance [3] [4] [5] [6] [7] [8] [9] [10] VI. CONCLUSION This study successfully combined two of the security techniques: cryptography and steganography to provide double security for stored data in the cloud environment. We have presented hybrid encryption where symmetric algorithm AES combine with asymmetric algorithm RSA is used to secure stored data in the cloud. This technique helps in achieving higher efficiency and better security due to the use of multiple algorithms for the encryption/decryption process. Added work on this paper, the use of 3-DES algorithm has been done for the encryption purpose for getting suitable results and achieving higher security for the transmitted data. High level security of data is required in banking and private sectors where the proposed system can be used. The results of the encryption of secret data are then hidden in the image using the LSB algorithm after encrypted compression data. In this proposal, the amount of data hidden in the image increases while the distortion on the image is reduced compared to the results of data concealment without compression using the LSB algorithm. This system is more powerful and efficient for securing the data in the cloud environment. Besides, it is more powerful to verify the integrity of data after retrieval from the cloud. Therefore, it can be said in this paper that security objectives have been achieved. The experimental results showed that the stegoimage quality after hiding 1 KB data with the average PSNR value of 72.254 for all tested image. [11] [12] [13] [14] [15] [16] [17] [18] S. C. Sukumaran and M. Misbahuddin, ―DNA Cryptography for Secure Data Storage in Cloud.,‖ IJ Netw. Secur., vol. 20, no. 3, pp. 447–454, 2018. S. William, Computer security: Principles and practice. Pearson Education India, 2008. L.-C. Huang, L.-Y. Tseng, and M.-S. Hwang, ―A reversible data hiding method by histogram shifting in high quality medical images,‖ J. Syst. Softw., vol. 86, no. 3, pp. 716–727, 2013. R. Shanthakumari and S. Malliga, ―Dual-layer security of image steganography based on IDEA and LSBG algorithm in the cloud environment,‖ Sādhanā, vol. 44, no. 5, p. 119, 2019. Y. Zhang, C. Xu, H. Li, and X. Liang, ―Cryptographic public verification of data integrity for cloud storage systems,‖ IEEE Cloud Comput., vol. 3, no. 5, pp. 44–52, 2016. A. A. Abdulla, ―Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography.‖ University of Buckingham, 2015. A. A. Abdulla, H. Sellahewa, and S. A. Jassim, ―Stego quality enhancement by message size reduction and Fibonacci bit-plane mapping,‖ in International Conference on Research in Security Standardisation, 2014, pp. 151–166. N. Garg and K. Kaur, ―Hybrid information security model for cloud storage systems using hybrid data security scheme,‖ Int. Res. J. Eng. Technol., vol. 3, no. 4, pp. 2194–2196, 2016. M. O. Rahman, M. K. Hossen, M. G. Morsad, and A. Chandra, ―An Approach for Enhancing Security of Cloud Data using Cryptography and Steganography with E-LSB Encoding,‖ IJCSNS, vol. 18, no. 9, p. 85, 2018. S. Shanthi, R. J. Kannan, and S. Santhi, ―Efficient secure system of data in the cloud using steganography based cryptosystem with FSN,‖ Mater. Today Proc., vol. 5, no. 1, pp. 1967–1973, 2018. A. A. Abdullah, Z. A. Abod, and M. S. Abbas, ―An Improvement Steganography System Based on Quantum One Time Pad Encryption,‖ Int. J. Pure Appl. Math., vol. 119, no. 15, pp. 263–280, 2018. G. S. Mahmood, D. J. Huang, and B. A. Jaleel, ―Achieving an Effective, Confidentiality and Integrity of Data in Cloud Computing.,‖ IJ Netw. Secur., vol. 21, no. 2, pp. 326–332, 2019. O. Hosam and M. H. Ahmad, ―Hybrid design for cloud data security using combination of AES, ECC and LSB steganography,‖ Int. J. Comput. Sci. Eng., vol. 19, no. 2, pp. 153–161, 2019. D. Suneetha and R. K. Kumar, ―Enhancement of Security for Cloud Data Using Partition-Based Steganography,‖ in Proceedings of the 2nd International Conference on Data Engineering and Communication Technology, 2019, pp. 201–209. P. Semwal and M. K. Sharma, ―Comparative study of different cryptographic algorithms for data security in cloud computing,‖ in 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA)(Fall), 2017, pp. 1–7. A. Rukhin, J. Soto, J. Nechvatal, M. Smid, and E. Barker, ―A statistical test suite for random and pseudorandom number generators for cryptographic applications,‖ Booz-Allen and Hamilton Inc Mclean Va, 2001. REFERENCES [1] [2] S. E. Elgazzar, A. A. Saleh, and H. M. El-Bakry, ―Overview of using private cloud model with GIS,‖ Int. J. Electron. Inf. Eng., vol. 7, no. 2, pp. 68–78, 2017. E. F. Coutinho, F. R. de Carvalho Sousa, P. A. L. Rego, D. G. Gomes, and J. N. de Souza, ―Elasticity in cloud computing: a survey,‖ Ann. Telecommun. des télécommunications, vol. 70, no. 7–8, pp. 289–309, 2015. ISBN: 978-93-5619-947-7 169 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 The Peace of old Life vs. the Craze of Social Media Dhanalakshmi M Ii M.A English Language And Literature, P.K.R. Arts College For Women, Gobi Abstract: Social media is an internet – based form of communication. It plays a very major role in android life; it facilitates to share the ideas and thoughts from a person to other virtually. So, the social being can defend their time in a fruitful way. The people can extricate themselves directly by sending a message to someone in a fraction of seconds. Social media shows the path for beings even they are an illiterate. It plugs every nook and corner of places and an old generation feels astonished for this particular rapid enhancement. It becomes second wife to all the husbands, sibling to every child, grandchildto all old aged citizens. The single touch makes everyone please; this is one of the specialities of smart phones. It teaches to all in an easy way. It seizes everyone’s brain; grasps the power of mind and it consumes the wisdom of every single soul. Social media gives merits and demerits parallelly. This can provide more information which is trending in dayto-day life. Social media will definitely form a good platform for the people, if they use it in a good path. Keywords: Communication, technologies, applications. I. INTRODUCTION neighbours personally or for an institution officially. In a professional level, one can use social media in order to broaden the ideas and information which will obviously give the right growth in industry field. Users can use the social media to explore their views like creating blogs, podcasts, videos and gamming sites. This relationship between humans and technologies is the focus of new emerging field of technological self – studies. The social media also outlets traditional applications like radio broadcasting. Every information is there in an android phone in the form of applications. Everyday the people should update themselves especially news plays a pivotal role for everyone. So, they can know every news from nook and corner. Social media helps those people to receive more information. The users should analyse before using the applications and that should be certified in play store (app store). At the same time, it makes the people idle and they lack to utilize their own thoughts. They are depending on the system and unknowingly people are wasting their own time. Probably in every family, android and social media takes place. But they should be aware by using those media. II. AN EARLY FORM OF COMMUNICATION Fig.1: Social media types Social media is neither boon nor bane; the information it gives should be judge but should not believe blindly. Billons and billons of people connecting gradually in social media, but it should be only for the basis for the person’s wisdom rather undesirable information should be avoided. Social media can avail all the languages in the world. It is one of the merits so that an illiterate can follow without any obstacles. Social media is an essential to share for both personal and impersonal information. Using this media for every hour, every minute and every second gives hazardous for mind and physic. Without social media or any other applications, the information will get delay to reach ISBN: 978-93-5619-947-7 Fig.2: Early form of Communications The people in early days are blessed with healthy life than the contemporary life. They prefer only lively environment and they refuse to give importance to an artificial belonging. The people in old days follow only the simplest way of communication. The percentage of literate people is less during those days but then they try to communicate from one place to even far places only through the letters. The letters play a major role; the receiver will receive the letter only after the two days from the date of 170 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 posting the letter. Writing the letter will enhance the vocabulary skill and it is one of the good ways to share all the ideas and feelings in the written format. Reading the letter which is especially in written form will provide good essence of the letter and can visualize the true feelings of the person who has written the letter. The true aspect of reading a letter is the reader can reflect the sensitivity of the letter. Moreover, the reader can sense the image of a person who has written the letter. Letter communication builds the right way for the people by developing the correct sequence of sharing ideas and thoughts. In this contemporary society, the communication is only through the social medias like Instagram, WhatsApp, Facebook, Twitter, etc… But it never builds the strong communication, the people should try to share their views only through target language, rather they should avoid to share in their native language. Sharing the views definitely helps to enhance the second language. The communication should deliver in a proper way and there should not be any diversion. Imperfection occurs in due course of time. The world is changing in day-to-day life. So, social media is essential in all the fields like education, industrial fields, science, society, professional work, engineering, accounts, banking etc. Even though every individual has all the applications which are related to their life, it never gives the sense of real things. For example, for education, there are so many applications like BYJU’S &Vedantu etc… but it never ever gives the essence of real time classrooms by having eye to eye contact. These applications should be a part of education but not depend blindly. Using these technologies will definitely hits the person mentally. Using these applications for long time will surely provide the effect in olden days. Conscious is very necessary for online mode of education.Teaching the class with real life examples long last for many years. This is the right way for better teaching experience. But an online teaching replaces the real-life teaching. III. THE HYPER USE OF SOCIAL MEDIA FigNo3. Social Media Hype Use ISBN: 978-93-5619-947-7 FigNo4. Digital world Argumented Reality and Virtual Reality form a very good experience in social media. The former deals with the objects which are enhanced by computer system and achieved through the use of digital visual elements. This enhances both virtual and real world while the later deals with virtual and enhances a fictional reality. An argumented reality is used in medical, navigation and it is very expensive in usage. These realities are used in cinematic industry in order to promote the movie. The world is changing day by day parallelly there will be the development of social media because, it becomes the major tool for the people. They fail to create new things by using their own style and become dependent on social media is from the development of computer rather it is not the right way to follow those medias without analysing it. IV. CAUSES AND EFFECTS Using social media without utilising the self-thoughts will definitely lead to failure. The thinking capacity will become less, there will be no more innovation and exploring ideas. Social media users will fix the particular thought and they will not follow their own style of writing and stick into the social media. They fail to manipulate their own ideas in their career. Social media is necessary but it should not be like a full – time job rather it should be like the part, not as a whole. Social media will lead the person to indulge in medication, it will affect badly both physically and psychologically. It makes the people slave and never give happy for the people. Using these medias will lead to the stress environment for the users. Social media will make addiction like an alcohol. The more consumption will lead to dangerous similarly having a dense attachment with social media will provide mental disorder and it eventually provide craze on social media. 171 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 V. CONCLUSION The contemporary society is moving towards the technological method, ready to face the difficulties and the people are good enough to find the solution. The more development in social medias will definitely swifts the minds of the people into the new world. Generation will get change and the people never know the value of themselves and the books by their previous generation. This reveals the modernity in the society; people fail to read the books by their grand family. The people never follow the footprint of elders, religious faith become an interrogative statement, only due to the effect of social media. Obviously, the world changes but the people should never ever give up their old styles and techniques of all the fields. REFERNCES [1] [2] [3] https://www.epa.gov/sites/default/files/201403/documents/socialmedia.pdf https://www.epa.gov/sites/default/files/201403/documents/socialmedia.pdf https://www.researchgate.net/publication/303216233_The_history_of _social_media_and_its_impact_on_business ISBN: 978-93-5619-947-7 172 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 Survival Study on Energy Optimized Data Forwarding Techniques in Wireless Sensor Network P.Thirunavukarasu1, Dr.K.K.Savitha2 Research scholar, Bharathiar University PG Extension and Research Centre, Erode 2 Assistant Professor, Department of MCA, Bharathiar University PG Extension and Research Centre, Erode 1 Abstract: Wireless sensor networks (WSN) are attractive one for engineering practice. WSN has spatially distributed selfgoverning sensors to observe the physical conditions. The sensor has taken global decision for performing the data forwarding process. In WSN, key aim of sensor node is to sense and forward collected data to the base station in multi hop environment. Data forwarding in WSN is a challenging process because of nature and sensor node. Data forwarding is the method of sending the data packets in finest path to the sink node for further processing. Many researchers are carried out for performing energy optimized data forwarding in WSN. But, the time consumption and data packet delivery ratio performance was not improved. In order to solve these problems, existing energy optimized data forwarding techniques are reviewed in this paper. Keywords: Wireless sensor networks, spatially distributed, data forwarding, multihop environment, sink node I. INTRODUCTION Wireless sensor networks (WSNs) are the interrelated sensor nodes that interact wirelessly to gather the data in surrounding environment. Sensor nodes are limited power and distributed one. The sensor nodes are physically organized near the event. The collected data transmitted back to the base station through the route paths constructed with help of sensor nodes. The randomly distributed sensors cooperate with the additional sensors within the range for monitoring or examining the target scene to communicate with base station. The cooperation included the route path identification to transmit the data packets to exact destination. Energy conservation is a main problem in WSN because the sensor has limited non-rechargeable power source. It is difficult to restore the nodes for improving the network lifetime. Energy optimized routing process is essential one to reduce the power resource utilization for extending the network lifetime while performing the data transmission. This paper is organized as follows: Section II portrays the review on different energy optimized data forwarding techniques in WSN, Section III explains the study and analysis of existing data forwarding techniques, Section IV depicts the possible comparison between them. In Section V, the limitations of existing techniques are discussed and Section VI concludes the paper. ISBN: 978-93-5619-947-7 II. LITERATURE SURVEY A metaheuristic search was performed in [1] using genetic algorithm with mutation operator for finding the dynamic topology. Tabu search was performed with forwarding reliable route packets (FRRPs) for optimal route selection. The search improved reliability and energy limitations by identifying number of optimized paths. But, the delay time was not minimized through metaheuristic search. Advanced threshold-sensitive energy efficient sensor network (A-TEEN) routing protocol was designed in for improving the routing performance with stable spectrum.But, the data forwarding time was not reduced using TEEN routing protocol. A new routing algorithm was designed in with help of ant colony algorithm to find out optimal path for data transmission process in WSNs. An optimal path from source node to destination node was carried out using improved heuristic function. But, the packet delivery ratio was not improved. The energy-aware routing was performed in using multi-objective fractional particle lion (MOFPL) algorithm. MOFPL algorithm identified an optimal cluster head from many cluster head nodes in WSN. However, the computational complexity was not minimized by MOFPL algorithm. A two fold-sink mechanism was presented in with mobile and static sink node. The sink nodes gathered the information regarding boundary sensor nodes to distribute the energy consumption across network. The designed mechanism minimized the transmission load on intermediate nodes between static sink node and network sensing nodes. However, the data collection accuracy was not enhanced by twofold-sink mechanism. A data-aware energy conservation technique was designed in to reduce the data transmission where inherent correlation between sensor node and similarity used. However, the data collection time was not minimized by data-aware energy conservation technique. 2.1 Related Works Contact-Aware ETX (CA-ETX) was introduced in to regulate packet transmission delay through packet retransmission and recurrent connectivity. But, the energy 173 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 consumption remained unaddressed using CA-ETX. Steering geometry Interaction system was used in to manage the surface transition. The designed structure was employed for magnetic wall-climbing robot to minimize the magnetic force between perpendicular magnetic surfaces. However, target tracking time was not minimized through steering geometry Interaction system. A new positioning system was designed in for tracking people in dynamic industrial environments. The designed system performed crossmodality training to track environmental changes through occlusion maps. But, the energy consumption was not minimized by positioning system. An improved adaptive head and improved prediction-based adaptive head were designed in to enhance the clustering performance. The algorithm employed clustering process to achieve the impressive tracking quality through selecting the cluster head. However, the tracking accuracy was not improved. A data suppression approach was designed in to detect the moving target by mobile sink. But, network lifetime was not enhanced by data suppression approach. III. ENERGY OPTIMIZED DATA FORWARDING TECHNIQUES IN WIRELESS SENSOR NETWORKS Wireless sensor networks (WSN) comprised large number of sensor nodes in physical and digital world. The sensor nodes get distributed in the sensor field. Every scattered sensor nodes included the ability to gatherthe data and transmitted the data packets to the sink node and end users. WSN is employed in applications like military surveillance, environmental monitoring, medical and health care. WSN has dynamic topology because of node mobility. Energy consumption is a key problem to determine the network lifetime as the sensor nodes are functioned by battery. 3.1 Optimized routing in wireless sensor networks by establishing dynamic topologies based on genetic algorithm Adhoc-topologies were established based on genetic algorithm. A metaheuristic search was carried out by genetic algorithm with mutation operator to find out the dynamic topology. Tabu search was depending on FRRPs for optimal route selection to enhance the quality of service parameters such as reliability and energy limitations throughfinding out multiple optimized paths. FRRP packets included parameters like path delay, node energy and node frequency to act as router for taking the routing decisions. Genetic algorithm introduced energy efficient topology inWSN. The designed algorithm initiated through cluster formation with regular nodes and sensor nodes. Each cluster was allocated with cluster head (CH) specified by genetic algorithm. For efficient energy consumption, base station ISBN: 978-93-5619-947-7 (BS) makes sensor nodes active when residual energy was higher than average energy. The mutation operator was used for every sensor node of CHs chromosome based on the probability. The probability of mutation identified the bits which mutate. Off spring chromosomes generated in previous step were sorted in ascending order depending on objective function values. CH chromosomes with lesser objective function values were chosen to form population pool for the next generation. Depending on the stopping criteria with predetermined iteration count, deployment gets stopped. Tabu search was meta heuristic search method that avoided cycling back to previously used paths through short-term memories termed tabu list containing information like neighborhood nodes energy level, ID, status etc. Tabu search avoided particular moves being reinstantiated for certain time period by recency-based memory.Tabu list comprised the active paths available with their respective energy level. The data packets selected best route among multiple paths from source to sink. 3.2 Optimization on TEEN routing protocol in cognitive wireless sensor network Threshold-sensitive energy efficient sensor network (TEEN) routing protocol was introduced to enhance the energy efficiency of cognitive wireless sensor network (CWSN). TEEN routing protocol combined the idle channel detection process in each round. With limited HT and ST, TEEN minimized unnecessary data transmission for many times. Advanced threshold-sensitive energy efficient sensor network (A-TEEN) routing protocol was employed to formulate the stable routing. A-TEEN optimized the cluster head (CH) election method of TEEN for creating the routing link more stable and reliable. The channel detection at early stage of every round adapted tospectrum unpredictability of CWSN. A-TEEN employed vacant channels as weight in probability of every node turn into a cluster head. The node which sensed more idle channels has bigger opportunity to become CH. CH sensed the existing channel to find out the communication routes with many cluster members. In ATEEN, cluster members sent the data to CH for minimizing the waiting time. A-TEEN enhanced the energy efficiency and improved network lifetime. 3.3 An Improved Routing Algorithm Based on Ant Colony Optimization in Wireless Sensor Networks A new routing algorithm was introduced with ant colony algorithm depending on the position information and search direction. An optimal path from source node to destination node was identified with help of improved heuristic function through considering node communication transmission distance, transmission direction and residual energy. The algorithm provided the participation scale of ant in the searching process. In addition, designed algorithm employed the route evaluation index to enhance the 174 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 pheromone updating process. A new route updating rule was designed with average and minimal value of residual energy. The designed algorithm minimized node energy consumption efficiently to improve the network lifetime and to recognize the energy-saving routing of wireless sensor network in communication process. IV. energy efficient sensor network (A-TEEN) routing protocol and New routing algorithm. Data forwarding time is computed with respect to number of data packets in WSN. For experimental purpose, number of data packets is varied from 10 to 100. The graphical representation of data forwarding time results for three different methods is illustrated in figure 1. PERFORMANCE ANALYSIS OF ENERGY OPTIMIZED DATA FORWARDING TECHNIQUES IN WIRELESS SENSOR NETWORKS In order to compare the data forwarding techniques in WSN, number of data packets and number of sensor nodes is considered as an input values for conducting the experiment. Various parameters are employed for enhancing energy optimized data forwarding results in WSN. 4.1 Impact on Data Forwarding Time Data forwarding time (DFT) is defined as the amount of time taken to perform the data forwarding process in WSN. It is the difference of ending time and starting time of data forwarding. It is measured in terms of milliseconds (ms). It is given by, Fig.1: Measure of Data Forwarding Time (1) From (1), the data forwarding time is calculated. Data forwarding time is lesser, method is said to be more efficient. Table 1. Tabulation for Data Forwarding Time Number of Data packets (Number) 10 20 30 40 50 60 70 80 90 100 Data Forwarding Time (ms) Metaheuristic Search Genetic Algorithm 16 18 21 23 26 28 31 32 35 37 ATEEN routing protocol 22 25 27 29 31 33 36 38 41 44 New routing algorithm 35 37 39 42 44 46 47 49 51 53 Table 1 explains the performance analysis of data forwarding timefor different methods namely Metaheuristic Search Genetic Algorithm, Advanced threshold-sensitive ISBN: 978-93-5619-947-7 Figure 1explains the graphical analysis of data forwarding time versus number of data packets in WSN. From the figure, it is clear thatdata forwarding time using Metaheuristic Search Genetic Algorithm is lesser than ATEEN routing protocol and new routing algorithm.This is because of designing thegenetic algorithm with mutation operator to identify the dynamic topology. Tabu search was performed for optimal route selection to improvethe quality of service.The data packets chosen best route among multiple paths from source to sink node. This in turn helps to reduce the data forwarding time. Consequently, data forwarding time of Metaheuristic Search Genetic Algorithm gets reduced by 19% and 41% when compared to A-TEEN routing protocol and new routing algorithm respectively. 4.2 Impact on Energy Consumption Energy consumption is defined as the amount of energy consumed for performing the data forwarding process. It is defined as the product of number of sensor nodes and energy consumed by one sensor node. It is measured in terms of joules (J). It is formulated as, (2) From (2), energy consumption is calculated. „ ‟ denotes the number of sensor nodes and „ ‟ symbolizes the energy consumption of one sensor node. Energy 175 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 consumption is lesser, more efficient the method is said to be. Table 2 Tabulation for Energy Consumption Number of Sensor nodes (Number) 10 20 30 40 50 60 70 80 90 100 From (3), the packet delivery ratio is calculated. „ ‟ denotes the number of packets correctly delivered. Data packet delivery ratio is higher, more efficient the method is said to be. Energy Consumption (J) Metaheuristic ATEEN New Search Genetic routing routing Algorithm protocol algorithm 54 33 45 57 35 48 59 38 50 56 36 47 53 34 45 51 32 41 54 35 43 57 37 46 60 41 49 63 44 52 Table 2 describes the performance analysis of energy consumption for different methods namely Metaheuristic Search Genetic Algorithm, Advanced threshold-sensitive energy efficient sensor network (A-TEEN) routing protocol and New routing algorithm. Energy consumption is computed with respect to number of sensor nodes in WSN. For experimental purpose, number of sensor nodes is varied from 10 to 100. The graphical representation of energy consumption results is described in figure 2 Figure 2 describes the graphical analysis of energy consumption versus number of sensor nodes in WSN. From above figure, it is observed that energy consumption using A-TEEN routing protocol is lesser than Metaheuristic Search Genetic Algorithm and new routing algorithm. This is due to the application of cluster head (CH) election method for more stable and reliable routing link detection. CH sensed the channel to identify the communication routes with many cluster members the cluster members transmitted the data packets to the CH for reducing the waiting time. This in turn helps to enhance the energy efficiency and improved network lifetime. Therefore, the energy consumption of Metaheuristic Search Genetic Algorithm gets reduced by 35% and 22% when compared to A-TEEN routing protocol and new routing algorithm respectively. 4.3 Impact on Packet Delivery Ratio Packet delivery ratio (PDR) is defined as ratio of number of data packets correctly delivered to the sink node from total number of data packets forwarded. It is measured in terms of percentage (%). It is calculated as, (3) ISBN: 978-93-5619-947-7 Fig. 2: Measure of Energy Consumption Table 3. Tabulation for Packet Delivery Ratio Number of Data packets (Number) 10 20 30 40 50 60 70 80 90 100 Packet Delivery Ratio (%) Metaheuristic ATEEN New Search routing routing Genetic protocol algorithm Algorithm 75 81 90 78 83 92 76 80 89 75 78 87 78 82 90 81 85 93 79 82 91 77 80 88 80 83 92 82 86 94 Table 3 explains the performance value of packet delivery ratio for three different methods namely Metaheuristic Search Genetic Algorithm, Advanced threshold-sensitive energy efficient sensor network (ATEEN) routing protocol and New routing algorithm. Packet delivery ratio is determined with respect to number of data packets in WSN. The graphical representation of results is described in figure 3. 176 Proceedings of International Multidisciplinary Conference on Information Science, Management Research and Social Sciences 18th &19th April 2022 machine learning techniques with higher packet delivery ratio and lesser energy consumption. VI. CONCLUSION . Fig. 3: Measurement of Packet Delivery Ratio Figure 3 describes the graphical analysis of packet delivery ratio versus number of data packets in WSN. From the figure, it is clear that packet delivery ratio using new routing algorithm is lesser than Metaheuristic Search Genetic Algorithm and A-TEEN routing protocol. This is because of using new route updating rule based on ant colony algorithm. The designed algorithm presented the participation scale of ant during the searching process. In addition, the route evaluation index is employed to improve the pheromone updating process. Therefore, the packet delivery ratio of new routing algorithm gets improved by 16% and 11% when compared to A-TEEN Metaheuristic Search Genetic Algorithm and A-TEEN routing protocol respectively. IV. DISCUSSION AND LIMITATIONS Metaheuristic search enhanced the quality of service parameters such as reliability and energy constraints through identifying the multiple optimized paths. The tabu search performed through forwarding reliable route packets for finding the best route selection path. Tabu search process avoided data redundancy of sensor nodes. But, delay time was not minimized using metaheuristic search.A-TEEN routing protocol enhanced the energy consumption performance of cognitive wireless sensor network. A-TEEN used CH election method of TEEN for performing the routing link as stable and reliable one. The lifetime of CWSN was improved using A-TEEN routing protocol. Routing stability was improved by A-TEEN routing protocol. However, data forwarding time was not minimized using A-TEEN routing protocol.Routing algorithm called ant colony algorithm was introduced to identify the optimal path of data transmission in WSNs. However, the network lifetime was not enhanced by routing algorithm. 5.1 Future Direction The future direction of the work is to introduce energy optimized data forwarding techniques in WSN by using ISBN: 978-93-5619-947-7 An investigation analysis of different energy optimized data forwarding techniques is carried out. From study, the delay time consumption was not reduced by metaheuristic search .In addition, energy consumption was not reduced which resulted in minimizing the network lifetime by routing algorithm. The data forwarding performance was not improved by using EETC scheme. The wide range of experiments on existing techniques compares the results of different energy optimized data forwarding techniques and discusses its limitations. Finally from result, the research work can be carried out using machine learning for energy optimized data forwarding with minimal energy consumption and higher packet delivery ratio. REFERENCES P. SrinivasaRagavan and K. Ramasamy, “Optimized routing in wireless sensor networks by establishing dynamic topologies based on genetic algorithm”, Cluster Computing, Springer, January 2018, Pages 1–7 [2] YanhongGe, Shubin Wang and Jinyu Ma, “Optimization on TEEN routing protocol in cognitive wireless sensor network”, EURASIP Journal on Wireless Communications and Networking, Springer, Volume 2, December 2018, Pages 1-9 [3] Yongjun Sun, Wenxin Dong and Yahuan Chen, “An Improved Routing Algorithm Based on Ant Colony Optimization in Wireless Sensor Networks”, IEEE Communications Letters, Volume 21, Issue 6, June 2017, Pages 1317 – 1320 [4] ReetaBhardwaj and Dinesh Kumar, “MOFPL: Multi-objective fractional particle lion algorithm for the energy aware routing in the WSN”, Pervasive and Mobile Computing, June 2019, Pages 1-34 [5] SajjadHussainChauhdary, Ali Hassan, Mohammed A. Alqarni, Abdullah Alamri, Ali Kashif Bashir, “A twofold sink-based data collection in wireless sensor network for sustainable cities”, Sustainable Cities and Society, Elsevier, Volume 45, 2019, Pages 1–7 [6] S. Diwakaran, B. Perumal and K. Vimala Devi, “A cluster prediction model-based data collection for energy efficient wireless sensor network”, The Journal of Supercomputing, Springer, Volume 75, Issue 6, June 2019, Pages 3302–3316 [7] Shusen Yang, UsmanAdeel, YadTahir and Julie A. McCann, “Practical Opportunistic Data Collection in Wireless Sensor Networks with Mobile Sinks”, IEEE Transactions on Mobile Computing, Volume 16, Issue 5, May 2017, Pages 1420 – 1433 [8] JerwinPrabu A and Abhinav Tiwari “Optimization approach for a climbing robot with target tracking in WSNs”, Journal of Ocean Engineering and Science, Elsevier, Volume 3, 2018, Pages 282–287 [9] Savvas Papaioannou, Andrew Markham and NikiTrigoni, “Tracking People in Highly Dynamic Industrial Environments”, IEEE Transactions on Mobile Computing, Volume 16, Issue 8, August 2017, Pages 2351 – 2365 [10] Khalid A. Darabkh, Wijdan Y. Albtoush and Iyad F. Jafar, “Improved clustering algorithms for target tracking in wireless sensor networks”, The Journal of Supercomputing, Springer, Volume 73, Issue 5, May 2017, Pages 1952–1977 [11] BartłomiejPlaczek, “Decision-aware data suppression in wireless sensor networks for target tracking applications”, Frontiers of Computer Science, Springer, Volume 11, Issue 6, December 2017, Pages 1050–1060 [1] 177