Uploaded by Jelsteen J

AJK COLLEGE Proceedings - Volume 1

advertisement
16
INTERNATIONAL MULTIDISCIPLINARY CONFERENCE ON
INFORMATION SCIENCE,
MANAGEMENT RESEARCH AND
SOCIAL SCIENCES
(ICISMRSS – 2022)
18th & 19th April 2022
ITED WITH GRA
RED
D
C
AC
A+
E
An ISO Certified Institution - 21001 : 2018
An ISO 21001 : 2018 Certified Institution Palakkad Main Road,
Navakkarai Coimbatore
Affiliated to Bharathiar University, Coimbatore
Approved by Govt. of Tamil Nadu, Recognized by Tamil Nadu - 641 105
UGC, New Delhi Under Section 2(f) and 12(B)
/ajkcollege
/ajkinstitutions
www.ajkcas.com
Ph: 0422 - 3501700
in Association with
NAAC
PROCEEDINGS
Volume I
Department of Computer Applications
TED WITH GR
EDI
AD
CR
AC
A+
E
An ISO Certified Institution - 21001 : 2018
An ISO 21001 : 2018 Certified Institution Palakkad Main Road,
Navakkarai Coimbatore
Affiliated to Bharathiar University, Coimbatore
Approved by Govt. of Tamil Nadu, Recognized by Tamil Nadu - 641 105
UGC, New Delhi Under Section 2(f) and 12(B)
/ajkcollege
/ajkinstitutions
www.ajkcas.com
Ph: 0422 - 3501700
NAAC
ISBN: 978-93-5619-947-7
978-93-5619-947-7
ISBN:
Proceedings of the International Multidisciplinary Conference on
Information Science, Management Research and Social Sciences
(ICISMRSS – 2022)
Volume 1
© AJK College of Arts and Science, Coimbatore, April 2022. All rights reserved.
No part of the material protected by this Copyright notice may be reproduced or utilized in
any form or by any means, electronic or mechanical including photocopying, recording or by
any information storage and retrieval system, without prior written permission from the
copyright owner. Statement and options in this proceedings or those of the contributors and
the publisher assume no responsibility for them.
ISBN: 978-93-5619-947-7
EDITORIAL BOARD
Chief Patron
Dr. AJEET KUMAR LAL MOHAN
Patron
Mrs. BINDU AJEET
Principal
Dr. B. SATHEESHKUMAR
Chief Editor
Dr. ANEESHKUMAR A.S.
Editorial Board
Mrs. N. RAJESWARI
Mrs. A. MEENA
Mrs. ARCHANA KRISHNAN KALLINGAL
AJK College of Arts and Science
Palakkad Main Road, Navakkarai
Coimbatore - 641 105
Tamil Nadu, India
Website: https://ajkcas.com/
Mail-id: imc@ajkcas.com
MESSAGE FROM CHIEF PATRON
With immense pleasure, I congratulate the Departments of Computer Applications of
AJK College of Arts and Science for organizing International Multidisciplinary Conference on
Information Science, Management Research and Social Sciences on 18th & 19th April 2022.
The AJK College of Arts and Science (AJKCAS) has institutionalised community-service
approach to provide opportunities to the students hailing from rural areas, girl students, and
students from marginalized sections of society. It has marked its significant presence by attaining
A+ grade in NAAC and 115th rank amongst the Higher Educational Institutions in India with its
effective participation in the country’s rural development process through "Unnat Bharat
Abhiyan".
The college provides a high degree of personalized education and supports the
advancement and dissemination of knowledge through quality teaching, research and scholarly
activities. In addition to academic, vocational, and technical skills, AJKCAS facilitates the
students to gain knowledge and develop relevant values, attitudes, and skills for a fuller
participation in society through Life Skills.
The Quality research and effective presentation of the research work is the need of the
hour. I’m greatly delighted that this International Conference will draw in the participation of a
large number of eminent personalities, academicians, research scholars and industrialists who
willing be sharing their experiences and research results of Multi-disciplinary subjects which
would definitely have a meaningful impact on the participants.
My heartiest appreciations to the Principal, Convenor, Organizing Members for their
sincere efforts to make this event a success and for editing the proceedings to promote the spirit
of research development in AJKCAS.
Dr. AJEET KUMAR LAL MOHAN
Secretary
Professor and Research Guide
Department of Catering Science & Hotel Management
AJK College of Arts and Science
Coimbatore, India
International Multidisciplinary Conference on Information
Science, Management Research, and Social Sciences
Organized by the AJK College of Arts and Science, Coimbatore, India
in association with ISMASI, Azteca University, Mexico, North America
MESSAGE
An innovative application of scientific inventions to solve varieties of
problems of human beings in society leads to the development of
engineering and technology. It is believed that continuous research and
innovations in engineering and technology and managing them
systematically can only solve basic (human need based) problems,
comfortable (human wants based) problems, and desires (human dream
based) problems of society. The systematic management of 21st century
Engineering and Technologies includes identifying the potential
breakthrough technologies and developing them systematically to realize the dreams to take
the civilization to its supersaturated level with abilities such as ubiquitous, omnipotent, and
immortal superhuman beings. In this regard, the International Multidisciplinary Conference
on Information Science, Management Research and Social Science is being organized Today
(18th & 19th April 2022) by the AJK College of Arts and Science, (NAAC Accredited &
Bharathiar University affiliated), Coimbatore, India under the Convener-ship of Dr.
Aneeshkumar A. S., in association with the ISMASI, Azteca University, Mexico, North
America under the leadership of Prof. Ricardo Saavedra Hidalgo, to help young and
experienced researchers to exchange new ideas, concepts, and methods in Science,
Technology, Management, and Social Science. I wish all the best for all participants and
online paper presenters of the conference, which helps further research and contributions in
the field and future endeavour in society.
With Thanks to everyone,
Dr. P. S. Aithal
M.Sc.(Physics), M.Sc.(E-Business), M.I.T(I.T.), M.Tech.(I.T.), Ph.D.(Physics), Ph.D.(Business Management),
PostDoc.@PRL, Ahmedabad, PostDoc.@CREOL, UCF, USA.
Vice Chancellor
Srinivas University
Mangalore, Karnataka, India
Prof. Ricardo Saavedra Hidalgo
Director & Chair,
International Programs,
Azteca Iniversity, Mexico
The Conference aims to bring different ideologies under one roof and provide
opportunities to exchange ideas face to face, to establish research relations and to find global
partners for future collaboration.
The conferences and educational forums should uphold the quality of learning and
encourage research. I thank and congratulate the team of AJK College of Arts and Science for
the association with Azteca University. I am sure that the theme of the conference will provide
meaningful platform to researchers and all the participants to exchange their experiences and
ideas. The guidance given by eminent researchers will be an intellectual treat to the delegates.
I wish the International conference a Grand Success!!!
Prof. Ricardo Saavedra Hidalgo
Crown University Int'l Chartered Inc (CUICI)
International Centre for Curriculum & Research Development
Santa Cruz Campus, Argentina, South America
(URL: https://www.crownintl.education/)
Santa Cruz, Argentina ● California, USA ● Bong, Liberia ● Cotonou, Benin ● Worldwide Online Operations
UNESCO Laureate Prof. Sir Bashiru Aremu
Vice Chancellor, (CUICI) & President, (ICCRD)
From the Desk of Chief Mentor
This is an important juncture of all of us regarding this International Conference. Today (1804-2022) on this auspicious day I would like to congratulate and thanks Dr. A. S. Aneeshkumar,
the Convener and whole organizing committee and team of AJK College of Arts and Science
and Azteca University of this International Multidisciplinary Conference on Information
Science, Management Research and Social Science 2022. It is creditable to note that as ICCRD
is under the CUICI, Argentina (and worldwide on-campus and online operations) is actively
engaged for further promotion of research and development activities. Therefore all the
participants including paper presenters and whole knowledge community will get benefit from
the same.
With Thanks to everyone,
UNESCO Laureate Prof. Sir Bashiru Aremu
Vice Chancellor, (CUICI) & President, (ICCRD)
19-03-2021, Santa Cruz, Argentina, South America
International
Registration ●Approval ● Accreditation ● Association
Message from Keynote Speaker
It gives me great pleasure to extend my warm greetings to the International
Multidisciplinary Conference on Information Science, Management Research and Social
Sciences (ICISMRSS – 2022) hosted by the AJK College of Arts and Science.
In this Covid -19 situation, the entire world is affected. But I am happy to hear that the
Research and knowledge sharing is going to make through this Conference. The theme and
objective of the conference is to facilitate an International forum for worldwide researchers,
Academicians, Scientists and Industrialists to put forward their insights and research
contributions.
Dr. Sharif M. Abu Karsh
Associate Professor in Finance,
Faculty of Administrative and Financial Sciences,
Arab American University, Palestine.
Message from Keynote Speaker
It is gives me an immense pleasure to act as Keynote Speaker for this International ConferenceIMCISMRSS-2022. It is an important auspicious day for me since this International
Multidisciplinary Conference on Information Science, Management Research and Social
Science (IMCISMRSS-22) is multidisciplinary one. I am thankful to the organizing body i.e.
AJK College of Arts and Science, Coimbatore, TN, India which is a NAAC Accredited A+, &
Bhartihar University, TN, India affiliated institute located at Coimbatore, India for their interest
to hold an important event with the International School of Management, Applied Science and
Informatics (ISMASI), Azteca University. I rendering my sincere thanks and appreciation to the
whole organizersI offer my love and wish to remarkable 200 Paper presenters for their Paper
Publication also to make this Conference as a true and biggest knowledge event .
My sincere thanks to all of them who were involved with IMCISMRSS-2022 once again!
Dr. Randa Hariri
Associate Professor,
Dar Al Hekma University, Jeddah,
Kingdom of Saudi Arabia
Message from Keynote Speaker
Dr. Kenneth Okereafor
Deputy General Manager,
Department of Information and Communications Technology,
National Health Insurance Scheme (NHIS), Abuja
It is an immense pleasure for me that Department of Computer Applications, AJK
College of Arts and Science, India is going to organize the International Multidisciplinary
Conference on Information Science, Management Research and Social Sciences on 18 -19 April
2022 in association with the ISMASI, Azteca University, North America. I would like to
congratulate and thank Dr. Aneeshkumar, A.S., the Convener and whole organizing team and
other associated team members of this international conference. I am thankful to the AJK
College of Arts and Science and Azteca University for taking the initiative of gathering
international research scholars, academicians and professionals under this platform of acquiring
and dissemination of knowledge through research and development activities. I hope all the
valuable participants including paper presents, discussants, session chairs and the whole
research-based knowledge community will be benefitted from the conference.
I wish the success of the international conference.
Preface
The Departments of Computer Applications, AJK College of Arts and Science,
Coimbatore delighted to organize International Multidisciplinary Conference on Information
Science, Management Research and Social Sciences (ICISMRSS – 2022) in association with
Azteca University on 18th & 19th April 2022 and feel pleasure to presenting you the first
Volume of the Conference Proceedings. It is going to be the flagship publication regarding
various dimensions of research.
It is an ideal opportunity to present research experiences, latest developments,
innovations in different fields of research and multidisciplinary approaches. The objective of
this Multidisciplinary platform is to provide a common forum for a constructive dialogue on
theoretical concepts and practical ideas. It brings together Academicians, Research Scholars,
Scientists, Industrial Professionals and Students and share their ideas, research results and to
explore collaborations.
The information presented herein should help to open up new avenues for research
and provide growers to with new ideas to help them improve their technical as well as
research efficiency. I am very happy to say that we have received overwhelming number of
contributions and enthusiastic support for this Conference.
I take both pleasure and honour to extend my gratitude to the distinguished Chief
Guest, Keynote Speakers and Session Chairs for accepting my invitation and providing
wonderful talk over here.
I express our thanks to all those who succour us in various ways in making the
International Multidisciplinary Conference a splendid success. I express our gratitude to
Dr. Ajeet Kumar Lal Mohan, Secretary, AJK College of Arts and Science and Mrs. Bindu
Ajeet, Director, AJK College of Arts and Science for providing support and facilitation. I am
grateful to the Principal and Academic Dean of AJK College of Arts and Science for the
constant support and guidance. I am pleased to thank and express sincere appreciation to my
Colleagues who work as Organizing Committee. This is also the time to thank Student
volunteers for their support.
I would thank the Paper presenters for their willingness to share their latest research
and ideas. Without their efforts this Conference would not be possible. I expect your
participation in future events and express thanks for carrying this International Conference to
the Academic heights.
Dr. Aneeshkumar A.S.
Conference Convener
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
CONTENTS
S. No.
1
Title
Consumption of Ultra-Processed Foods and Anthropometric Status of
Adults in Ikwuano Local Government Area, Abia State Nigeria
Page No.
1-7
A.D. Oguizu, O.S. Nweze
2
MOTunAr Ontology: Creation and Axioms Impacts
8-14
Degachi Haifa, Yengui Ameni, Neji Mahmoud
3
Determinants of Employee Job Satisfaction: An Analysis of
Structural Equation Model
15-21
Muhammad Alkirom Wildan
4
A Simple Optical Method for Determination of the Dielectric
Constant of Salt (%) Water using Ultraviolet Light
22-25
Prof. Samir A. Hamouda, Maqboula Khamis Ibrahim
5
Growth Perspectives of Small Tea Growers –
A Study in Golaghat District of Assam
26-29
Anitabh Kakoty, Dr. Ratan Kaurinta
6
Effective Learning and Classification using Random forest Algorithm
30-33
Seema Rani, Dr. (Prof.)Mukesh Singla
7
Corruption in India: Challenges and Prospects
34-40
Dr. Showket Ahmad Dar, Feroz Ahmad Wani
8
The Challenges Managers Have to Face in Making Ethical Decisions
in Banking Industry
41-44
Dr. Manjit Kour
9
IoT Based Solutions for Monitoring of Landslides and Slope Failures
45-50
Dr Guntha Karthik
10
A Study on Machine Learning Methodologies for breast Carcinoma
Disease Prediction
51-57
K. VigneshKumar, Dr. N. Sumathi, Dr. S. Ragul
11
Analyze the MIS Support in Education System, Challenges Arising
Globalization and Liberalization
S.Kiruthiga, N.Beulah Jebaseeli, Dr.D.Umanandhini, Dr.S.Sridevi
ISBN: 978-93-5619-947-7
58-63
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
12
Security Based Home Automation using IoT Devices
64-67
Dr.J.Dhilipan, D.B.Shanmugam, Chiranjeevi .C
13
Empowerment of Self Help Groups Towards Women Microenterprise
Improvement in Tamilnadu
68-70
V.Sudha, Dr.S.Balamurugan
14
Social Science with Gender Issues, Equality and Empowerment of
Women and Girl Child
71-73
Dr. S. Kalaichelvi
15
AI based Drone Escort Ambulance Service System in Heavy Traffic
74 -76
S.Kiruthiga, N.Beulah Jebaseeli, Dr.D.Umanandhini, Dr.S.Sridevi
16
Mathematical Modelling on Vaccine Distribution for Prevention of
Covid
77-82
Dr.P. Jamuna Devi, D. Mahalakshmi
17
Recent Trends in Tithe Green Banking Products and Services in India
83-87
Dr. D. Murugan
18
Art Authentication through Digital Techniques
88-91
Dr. K. Hema Shankari
19
Investigation Study on Energy Efficient Routing Techniques in
Wireless Sensor Network
92-96
P.Arunkumar, Dr.K.K.Savitha
20
A Spatio – Temporal Analysis on Human Resource Management in
Fishing – Some Evidential Proofs
97-100
Dr. H. Sulaiman
21
Analysing Problems of Tiny Agricultural Farmers with Special
Reference to Selected Farmers Collectives in Kozhikode District,
Kerala
101-105
Dr. M.Dhanabhakyam, Monish P
22
Social Role of IOT and Impact Analysis of its Penetration and
Evolving into Society and Beneficiaries
106-109
P.Gayathridevi
23
Handwritten Digits Recognition using CNN Identifying the Regional
Based Writing Style
S.Sindhu, P M Kavitha, MD.Tafsil, Rajesh Rana, Akshay Kumar Rana
ISBN: 978-93-5619-947-7
110-113
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
24
114-116
Modelling and Forecasting of Stock Price Volatilty– An Analysis
K. Kannan, Dr. S. Balamurugan
25
Payment Transaction using Face-Recognition
117-120
P. M. Kavitha, D. B. Shanmugam, T. Akash, T. Karan Raj, A. Girish
Gowtham
26
Study Paper on E-Recruitment
121-123
Priyanka Shivaji Patil
27
Analyze the Health Anagement Information System and
Organizational Structure
124-130
Pushpa Rani, Dr. Brij Mohan Goel
28
A Study on Pradhan Mantri Jan Dhan Yojana in Public and Private
Sector Banks in India
131-134
Dr. M. Sumathy, Sneha Jayalakshmi
29
Function of Management Information
System in Education
135-140
Ms.Suman, Dr.( Prof ) MukeshSingla
30
Conceptual Insights of Smart Glasses
141-144
Ms.SaniaKukkar
31
Impact of Digitalization of Human Resource Functions in Private and
Public Sector Life Insurance Companies
145-149
Ausaf Ahmad Khan
32
DC-IDS: Distributed Collaborative Intrusion Detection Systems for
Vanets
150-154
C. Rajkumar, Dr. T. Sangeetha, P. Panneer Selvan
33
Voice Based Email for Visually Challenged
155-160
Dr.T.S.Suganya, M. Divya, V. Devi, Sunil S, Tamil Selvan T, Akshay Ashok
34
A Health Care System for Doctor’s Obtainability and Nearest Search
using K-Means Clustering
161-163
V.Devi, Dr.T. S. Suganya, Dr.S.Jayachandran, Illavarasan, Dilip Kumar
35
Security Improvement of Cloud Data using Hybrid Cryptography and
Steganography
D.B.Shanmugam, Dr.N.Vijayalakshmi, S. Andrew Sesubalan, D.Immanuel,
V.R.Shravan
ISBN: 978-93-5619-947-7
164-169
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
36
The Peace of old Life vs. the Craze of Social Media
170-172
Dhanalakshmi M
37
Survival Study on Energy Optimized Data Forwarding Techniques in
Wireless Sensor Network
P.Thirunavukarasu, Dr.K.K.Savitha
ISBN: 978-93-5619-947-7
173-178
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Consumption of Ultra-Processed Foods and
Anthropometric Status of Adults in Ikwuano Local
Government Area, Abia State Nigeria
A.D. Oguizu1, O.S. Nweze2
1
Senior Lecturer, 2Graduate Student
1,2
Department of Human Nutrition and Dietetics, Michael Okpara University of Agriculture,
Umudike, P.M.B. 7267, Umuahia, Abia State
Abstract:
Background:
Ultra-processed
foods
are
industrially formulated food products manufactured largely
by food companies packaged in such a way to make them
intensely palatable, have long shelf stability and eliminate
the need for culinary preparations. Objective: This study
assessed the consumption of ultra-processed foods and
anthropometric status of adults aged (20-49 years) in
Ikwuano Local Government Area Abia State, Nigeria.
Methods: The study was a cross sectional survey of 440
adults randomly selected for the study. A well-structured
and validated questionnaire was used to collect information
on the socio-economic and demographic characteristics, the
consumption of ultra-processed foods, the dietary pattern
and anthropometric status of the respondents. The
questionnaires were coded and entered into computer using
the statistical package for social sciences (SPSS) version 23.0.
The data were analyzed using descriptive statistics. Chisquare analysis was used to assess the relationship between
the
consumption
of
ultra-processed
foods
and
anthropometric status of the respondents. Results: More
than half of the respondents (67.0%) were males while
33.0% were females. Majority of the adults (62.3%) were
between the ages of 26 and 32 years. Majority of the
respondents (80.0%) were Christian, about 18.0% were
traditionalist, and more than half of the respondents (82.2%)
were Igbo. More than half of the respondents (63.6%) had
tertiary education. About a quarter of the respondents
(48.0%) were traders/business persons, 27.7% were
civil/public servant, 8.2% were farmers and 2.5% were
unemployed. About a quarter of the respondents (46.8%)
earned less than ₦30,000 a month. only a few of the
respondents (3.4%) earned above ₦91,000 per month. One
third of the respondents consumed sweets, candies, soft
drinks, pizza, burger, pasta, canned vegetables and
sweetened breakfast cereals daily. About half of the
respondents (53.0%) who were overweight consumed soft
drinks daily. A total of 36.3% of the respondents were
overweight, while 20% were obese. The chi-square analysis
showed there was a significant association (p<0.000) between
consumption of cake, pizza, burger and BMI of the
respondents. Obesity was higher amongst male adults than
female adults.
Conclusion: One third of the respondents were
overweight, while about 20% were obese. There is need to
focus on educating the community on the need to consume
home-made dishes from fresh indigenous foods.
Keywords: Ultra-Processed Foods; Adults; Anthropometric
Status; Abia State; Nigeria
ISBN: 978-93-5619-947-7
I. INTRODUCTION
The dietary patterns of the world population have
been on transition due to the high consumption of readyto-eat foods, which have increased levels of fat and sugar,
and lower intake of unprocessed foods, such as fruits,
vegetables, tubers, and cereals (Monteiro et al., 2011).
The potential cause of the pandemic of overweight,
obesity and rapid rise of related chronic diseases
especially in under developed countries is the
corresponding increase in the production, processing and
consumption of readily available ‘fast’ or ‘convenience’
ready-to-eat or ready-to-heat processed food and beverage
products (WHO, 2010). Ultra-processed foods are defined
within the NOVA classification system, which groups
foods according to the extent and purpose of industrial
processing. NOVA is a food classification system
developed by researchers at the university of Sao Paulo
Brazil (Monteiro et al., 2011).
A practical way to identify an ultra-processed
product is to check to see if its list of ingredients contains
at least one item characteristic of the NOVA ultraprocessed food group, which is to say, either food
substances never or rarely used in kitchens (Monteiro et
al., 2015). Ultra-processed fast foods and soft drinks are
the main business of transnational and big national
catering chains, whose outlets are also often open until
late at night, and whose products are designed to be
consumed also in the street, while working or driving, or
watching television (Allemandi, 2018).
The consumption of ultra-processed foods are
increasing rapidly, replacing use of traditional or
indigenous, culturally acceptable freshly cooked food
(Moodie et al., 2013). These Ultra-processed products are
characteristically formulated from ‘refined’ and ‘purified’
ingredients freed from the fibrous watery matrix of their
original raw materials.
They are formulated to be sensually appealing, hyperpalatable, and habit-forming, by the use of sophisticated
mixtures of cosmetic and other additives, and state of the
craft packaging and marketing (Baker and Friel, 2016).
1
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
The World Health Organization stated that sugary
drinks, energy dense snacks and 'fast food', all of which
are ultra-processed, are key drivers of obesity, diabetes,
cardiovascular diseases and certain cancers (WHO, 2018).
Most people crave and consume more of these ready to
eat or convenient foods not necessarily because they want
them but because they see these ultra-processed foods are
the fastest and easiest food to prepare or consume. Others
also consume them just to save time while others take
them as meal to meet up their daily dietary requirement.
There is a major concern on the increase in the prevalence
of non-communicable diseases like hypertension, diabetes
and stroke amongst adults, hence this study assessed the
consumption of ultra-processed foods, dietary pattern and
anthropometric status of adults aged (20-49 years) in
Ikwuano Local Government Area, Abia State.
II.
MATERIALS AND METHODS
A preliminary visit was made to the local government
chairman to obtain permission and approval for the
research. The study was made possible by the approval of
the members of the ethical committee of Ikwuano Local
Government Area, Abia State. The respondents were also
enlightened on the purpose of the study and their consent
was obtained before the study was carried out. There was
no monetary reward for participating in the study.
Study Area: The study was carried out in Ikwuano
Local Government Area, Abia State, Nigeria. Ikwuano is
one of the local government areas in Abia State. The
headquarters is in Isiala Oboro. Ikwuano local
government has an area of 281 km2 and a population of
137,993 at the 2006 census. It is made up of about 37
communities and 314 villages and is bounded by Ini local
government area of Akwa-Ibom State by the West and
Umuahia South to the North.
The occupations of the people are trading and small
scale farming. Ikwuano LGA is known for her agricultural
activities with much concentration of palm oil/kernel,
cocoa, cocoyam, maize, melon, cassava, yam and a
variety of vegetables. It is also known as the Food Basket
of Abia State because of its richness in agricultural
produce. Population of the Study: The population of the
study consists of both female and male adults (20-49
years) in Ikwuano Local Government Area, Abia State.
III. SAMPLE SIZE AND CALCULATIONS
The sample was determined using the Yamane’s
formula (Yamane, 1973) for sample size estimation.
Sample size (n) =
n = sample size
N = Total population in Ikwuano LGA (137,993)
1 = constant
e = Precision or sampling error (0.05)2
Substituting the values in the formula gives:
n=
ISBN: 978-93-5619-947-7
n=
n=
n =399.9 ≈ 400
Calculating drop out of 10%;
= 40
Sample size = 400 + 40 = 440
Sample size was rounded up to 440 to make up for drop
outs.
3.1 Sampling Procedure
A multi-stage sampling technique was used for this
study. Ikwuano comprises of 37 communities and four
wards. Two wards (Oboro and Ibere) were selected using
simple random sampling for the study. Five villages were
randomly selected from the two wards out of the four
wards in Ikwuano local government. The villages selected
were; Umuariaga, Umudike, Amaoba-Ime, Amawom and
Umugbalu.
The households and adults were randomly selected.
Each respondent from the household selected were
interviewed and a questionnaire was given to them to fill.
A total of 440 adults were selected for this study.
IV. DATA COLLECTION
A well-structured and validated questionnaire was
used to collect information on the socio-economic and
demographic characteristics, the consumption of ultraprocessed foods and the dietary pattern of the respondents.
4.1 Weight Measurement
The weight of the respondents were taken and
recorded to the nearest 0.1 kilogram using a portable
bathroom scale (Hansen Ireland Model). The scale was
placed on a level ground and was regularly adjusted to
zero for accuracy before the respondents stepped on it.
The respondents were asked to remove any heavy items
from their pockets and also any items of heavy clothing or
apparel.
4.2 Height Measurement
The heights of the respondents were measured using
a constructed height meter which was placed on a level
floor close to the wall. The respondents were asked to
remove their shoes before taking the measurement for
accurate reading. They were asked to stand with their
back resting on the wall and looking forward to ensure
that the back of their feet, claves, bottom, upper back and
back of their head are in contact with the wall. The
respondents stood directly underneath the measuring
device, the device was lowered until it rests gently on top
of the respondent’s head and then the measurements were
recorded to the nearest 0.1 centimeters.
2
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
4.3 Dietary Assessment
A structured food frequency questionnaire on dietary
feeding was used to determine the dietary pattern of the
adults. The food frequency questionnaire was used to
determine how often the respondents consume ultraprocessed food. The food frequency questionnaire
consisted of list of ultra-processed food products and
drinks with response categories to indicate frequency of
consumption over a period of time.
V.
DATA ANALYSIS
The anthropometric data (weight and height) were
used to obtain the body mass index of the respondents.
The BMI was categorized using reference standard.
Statistical analysis was performed using the statistical
package for service solutions version 23.0. Descriptive
statistics was used to determine the socio-economic and
demographic characteristics, consumption of processed
and ultra-processed foods and dietary pattern of the
respondents. Chi-square analysis was used to assess the
relationship between the consumption of ultra-processed
foods, dietary pattern and the anthropometric status of the
respondents. P value of
0.05 was considered
statistically significant.
VI. RESULTS
Table 1 shows the socio-economic and demographic
characteristics of the respondents. Majority of the
respondents (67.0%) were male while about 33.0% were
female. More than half of the respondents (62.3%) were
between the ages of 26 and 32 years. About 19.5% of the
respondents were between the ages of 19 and 25 years.
Majority of the respondents (80.0%) were Christian, about
18.0% were traditionalist, while a few of the respondents
(1.6%) were Muslims. More than half of the respondents
(82.2%) were Igbo, 9.1% were Hausa and 7.3% were
Yoruba. More than half of the respondents (63.6%) had
tertiary education, about 19.3% had secondary school
education and 11.1% had little or no education. About a
quarter of the respondents (48.0%) were traders/business
persons, 27.7% were civil/public servant, 8.2% were
farmers and 2.5% were unemployed. About a quarter of
the respondents (46.8%) earned less than ₦30,000 a
month. One third of the respondents (30.5%) earned
between ₦31,000-₦60000 a month, only a few of the
respondents (3.4%) earned above ₦91,000 per month.
Table 1. Socio-economic and demographic characteristics
of the respondents
Variable
Age range (years)
19-25
26-32
33-39
40-49
Total
Gender
Frequency
Percentage
86
274
72
8
440
19.5
62.3
16.4
1.8
100
ISBN: 978-93-5619-947-7
Male
295
Female
145
Total
440
Religion
Christianity
352
Traditional
81
Islam
7
Total
440
Ethnic group
Igbo
361
Hausa
40
Yoruba
32
Others
7
Total
440
Educational qualification
Non formal
49
Secondary
85
Tertiary
280
Vocational education
26
Total
440
Income level
Less than ₦30,000
206
₦31,000-60,000
134
₦61,000-90,000
85
₦91,000 and above
15
Total
440
Occupation
Civil/public servant
122
Farmer
36
Trader/business
211
person
Student
23
Artisan/craft person
37
Unemployed
11
Total
440
67
33
100
80
18
1.6
100
82.2
9.1
7.3
1.6
100
11.1
19.3
63.6
5.9
100
46.8
30.5
19.3
3.4
100
27.7
8.2
48.0
5.2
8.4
2.5
100
Table 2 shows the consumption pattern of ultraprocessed foods and drinks by the respondents. A quarter
of the respondents (40.9%) consumed sweets daily, while
27.7% of them consumed sweets weekly. One third of the
respondents (34.1%) consumed candies daily, while about
28.9% consumed candies weekly. A quarter of the
respondents (41.6%) consumed soft drinks daily, while
about 28.0% consumed soft drinks weekly. About 20.0%
of the respondent consumed cheese daily, 18.3%
consumed cheese weekly while 50.9% rarely consumed
cheese. About 10.5% consumed sardine daily, while about
33.1% of the respondents consumed sardine weekly.
About 5.0% consumed canned meat daily, while 28.6%
consumed canned meat weekly. About 26.4% consumed
mayonnaise weekly, while 33.9% of the respondents
rarely consumed mayonnaise. More than a third (30.9%)
of the respondents consumed pizza daily while about
9.1 % consumed pizza weekly. About a third (30.1%) of
the respondents consumed burger daily, while 14.3%
consumed burger weekly. About 26.1% of the
respondents consumed cake daily, while 26.0% consumed
cake weekly. About 19.5% of the respondents consumed
sausages daily, while 22.1% consumed sausages weekly.
About 47.1% of the respondents consumed hot dogs
weekly. About 7.3% of the respondents consumed ice
cream daily, while 35.2% consumed ice cream weekly.
3
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
About 22.3% of the respondents consumed beer daily,
while 24.1% consumed beer weekly. About 8.2% of the
respondents consumed sharwama daily, while 30.6%
consumed sharwama weekly. One third (31.1%) of the
respondents consumed pasta daily, while 38.0%
consumed pasta weekly. About a quarter (37.4%) and few
(8.9%) of the respondents consumed canned fruits and
vegetables daily, while less than half (40.0%) of the
respondents consumed canned fruits and vegetables
weekly. About 26.0% of the respondents consumed
instant noodles daily. About a quarter of the adults (46.4%)
consumed sweetened breakfast cereals daily.
Table 2. Consumption pattern of ultra-processed foods and drinks of the respondents studied
Variables
Daily
Once a week
F
%
Sweets
Candies
Soft drinks
Cheese
Sardine
Canned meat
Mayonnaise
Prawn cracker
Pizza
Burger
Cakes
Cookies
Energy drink
Sausages
Hot dogs
Sandwich
Ice cream
180
155
183
88
46
10
36
10
48
147
115
108
84
50
15
32
19
Jam
Beer
Chocolates
Sharwama
Cheese ball
Canned fish
Pasta
Flavored yoghurt
Canned fruits
Canned vegetables
Sweetened juices
Instant noodles
Bread and buns
Sweetened breakfast cereals
33
199
33
36
17
17
49
93
39
131
50
98
99
200
Rarely
%
40.9
34.1
41.6
20.0
10.5
5.0
1.4
5.0
30.9
30.1
26.1
24.5
20.0
19.5
3.4
7.3
7.3
122
144
53
76
132
91
99
21
23
47
64
86
73
121
51
102
50
27.7
28.9
16.2
18.3
30.0
20.7
7.5
4.8
8.2
14.3
6.4
11.1
9.7
4.8
5.0
23.2
8.2
103
73
103
26
46
38
21
37
141
46
79
87
76
33
178
67
154
14.0
20.8
28.0
10.8
33.1
28.6
26.4
48.4
9.1
10.1
26.0
28.3
23.3
22.1
47.1
15.2
35.2
35
68
101
250
216
83
284
372
228
200
182
159
207
236
196
239
217
17.4
16.2
14.2
50.9
26.4
45.7
33.9
41.8
51.8
45.5
41.4
36.1
47.0
53.6
44.5
54.3
49.3
440
440
440
440
440
440
440
440
440
440
440
440
440
440
440
440
440
100
100
100
100
100
100
100
100
100
100
100
100
100
100
100
100
100
23.5
22.3
10.0
8.2
3.9
3.1
31.1
21.1
8.9
37.4
8.2
26.0
25.5
46.4
30
93
158
44
34
144
37
76
53
158
101
80
66
114
22.7
24.1
35.2
30.6
10.6
20.0
8.4
17.3
40.0
26.2
18.6
15.5
14.2
26.0
129
33
206
200
195
190
267
173
99
110
96
72
67
74
20.6
7.5
24.1
24.8
49.3
47.0
38.0
32.3
17.5
27.0
21.8
18.1
13.0
16.8
248
115
43
160
194
89
87
98
249
41
193
190
208
52
33.2
46.1
30.7
36.2
26.6
30.2
22.6
29.3
33.6
9.3
51.3
40.3
47.3
10.7
440
440
440
440
440
440
440
440
440
440
440
440
440
440
100
100
100
100
100
100
100
100
100
100
100
100
100
100
The relationship between consumption of ultraprocessed foods and body mass index of the respondents.
About 17.5% and 8.6% of the respondents who were
overweight and obese respectively consumed sweets daily.
The chi-square analysis showed there was no significant
association (p=0.775) between the consumption of sweet
F
%
Total
F
Table 3 shows the anthropometric status of the
respondents. About 20.5% of the males had normal body
mass index, while 21.8% of the females had normal body
mass index. A total of 36.3% of the respondents
were overweight, while 20% were obese. About 13.6% of
the male respondents were overweight, while 22.7% of
the female respondents were overweight. About 11.4% of
the male respondents were obese, while 8.6% of the
female respondents were obese.
ISBN: 978-93-5619-947-7
2-3 times
per week
F
%
F
%
and BMI of the respondents. About 22% and 3.6% of the
respondents who were overweight and obese respectively
consumed soft drinks. The chi-square analysis showed
there was no significant association between consumption
of soft drinks and BMI of the respondents (p=0.639).
About 9% and 8.46% of the respondents who were
overweight and obese respectively consumed cake daily.
The chi-square analysis showed that there was a
significant association between consumption of cake and
BMI of the respondents (p=0.000). About 5.9% and 6.3%
of the respondents who were overweight and
obese respectively consumed cookies daily. The chisquare analysis showed there was no significant
association between consumption of cookies and BMI of
the respondents (p=0.254). About 14.7% and 3.6% of the
4
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
respondents who were overweight and obese respectively
consumed beer daily. The chi-square analysis showed
there was no significant association between consumption
of beer and BMI of the respondents (p=0.258). About
7.9% and 2.5% of the respondents who were overweight
and obese respectively consumed instant noodles daily.
The chi-square analysis showed there was no significant
association between consumption of instant noodles and
BMI of the respondents (p=0.239). About 9% and 8.46%
of the respondents who were overweight and obese
respectively consumed cake daily. About 6.3% and 3.1%
of the respondents who were overweight and obese
respectively consumed sweetened breakfast cereals daily.
There was no significant association between
consumption of sweetened breakfast cereals and BMI of
the respondents (p=1.906). About 6.1% and 7% of the
respondents who were overweight and obese respectively
consumed pizza daily. There was a significant association
between consumption of pizza and BMI of the
respondents (p=0.000). About 5% and 3.1% of the
respondents who were overweight and obese respectively
consumed burger daily. There was a significant
association between consumption of burger and BMI of
the respondents (p=0.003).
Table 4. Relationship between consumption of ultra-processed foods and body mass index
Variables
SWEETa
Daily
Once weekly
2-3times weekly
Rarely
Total
SOFT DRINKSb
Daily
Once weekly
2-3times weekly
Rarely
Total
CAKEc
Daily
Once weekly
2-3times weekly
Rarely
Total
COOKIESd
Daily
Once weekly
2-3times weekly
Rarely
Total
BEERe
Daily
Once weekly
2-3times weekly
Rarely
Total
INSTANT
NOODLESf
Daily
Once weekly
2-3times weekly
Rarely
Total
SWEETENED
BREAKFAST
CEREALSg
Daily
Once weekly
2-3times weekly
Rarely
Total
Underweight
No
%
Normal
No
%
Overweight
No
%
Obese
No %
Total
No %
P-value
0
0
0
6
6
65
49
61
11
186
14.7
11.1
13.8
2.5
42.2
77
68
15
0
160
17.5
15.4
3.4
0.0
36.3
38
18
17
15
88
8.6
4.0
3.8
3.4
20
180
135
93
32
440
40.9
30.6
21.1
7.2
100
0.775
0.0
0.0
0.0
1.4
1.4
0
0
6
0
6
0.0
0.0
1.4
0.0
1.4
70
25
66
25
186
15.9
5.6
15
5.6
42.2
97
11
38
14
160
22.0
2.5
8.6
3.1
36.3
16
30
25
17
88
3.6
6.8
5.6
3.8
20
183 41.5
66
15
135 30.6
56
12.7
440 100
0.639
6
0
0
0
6
0.0
0.0
0.0
0.0
1.4
42
27
43
74
186
9.5
6.1
9.7
16.8
42.2
40
7
25
88
160
9.0
1.5
5.6
20
36.3
37
14
17
20
88
8.4
3.1
3.8
4.5
20
125
48
85
182
440
28.4
10.9
19.3
41.3
100
0.000
0
0
0
6
6
0.0
0.0
0.0
1.4
1.4
64
33
43
46
186
14.5
7.5
9.7
10.4
42.2
26
19
24
91
160
5.9
4.3
5.4
20.6
36.3
28
11
33
16
88
6.3
2.5
7.5
3.6
20
118
63
100
159
440
26.8
14.3
22.7
36.1
100
0.254
0
0
0
6
6
0.0
0.0
0.0
1.4
1.4
47
63
31
45
186
10.6
14.3
7
10.2
42.2
65
36
14
45
160
14.7
8.1
3.1
10.2
36.3
16
18
15
39
88
3.6
4
3.4
8.8
20
128
117
60
135
440
29
26.5
13.6
30.6
100
0.258
0
6
0
0
6
0.0
1.4
0.0
0.0
1.4
56
30
32
68
186
12.7
6.8
7.2
15.4
42.2
35
17
26
82
160
7.9
3.8
5.9
18.6
36.3
11
27
15
35
88
2.5
6.1
3.4
7.9
20
102
80
73
185
440
23.1
18.1
16.5
42
100
0.239
0
0
6
0
6
0.0
0.0
0.0
0.0
1.4
55
26
33
72
186
12.5
5.9
7.5
16.3
42.2
28
22
8
102
160
6.3
5
1.8
23.1
36.3
14
16
24
34
88
3.1
3.6
5.4
7.7
20
97
64
71
208
440
22
14.5
16.1
47.2
100
ISBN: 978-93-5619-947-7
1.906
5
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
PIZZAh
Daily
Once weekly
2-3times weekly
Rarely
Total
0
6
0
0
6
0.0
0.0
0.0
0.0
1.4
38
29
25
94
186
8.6
6.5
5.6
21.3
42.2
27
10
28
95
160
6.1
2.2
6.3
21.5
36.3
31
8
10
39
88
7.0
1.8
2.2
8.8
20
96
53
63
228
440
21.8
12
14.3
51.8
100
BURGERi
Daily
Once weekly
2-3times weekly
Rarely
Total
6
0
0
0
6
0.0
0.0
0.0
0.0
1.4
40
45
39
62
186
9
10.2
8.8
14
42.2
22
17
1
120
160
5
3.8
0.2
27.2
36.3
14
21
27
26
88
3.1
4.7
6.1
5.9
20
82
83
67
208
440
18.6
18.8
15.2
47.2
100
VII. DISCUSSIONS
The socio-economic and demographic characteristics
of the respondents studied, showed that majority of the
respondents were male. The high population of male
participants obtained in this study could be due to the fact
that houses visited had more males than females.
This is consistent with the report from National
Bureau of Statistics (NBS, 2015), that men constitute
50.5 % and women 49.5 % of adult population in Nigeria.
The respondents were mostly Igbos and Christians. This is
in line with Ismene (2002) report, that South-East is
mostly dominated by Igbos and Christians. More than half
of the respondents studied were between the age 26 and
32 years. The study showed that majority of the
respondents were traders/business persons, only few of
them were civil/public servants. This could be as a result
of the high level of unemployment in Nigeria which
leaves many people with no choice but to engage in
trading and other small scale businesses. The study
showed that majority of the respondents were low income
earners, about one third were middle income earners.
Socio-economic and demographic characteristics is
not a modifier for the consumption of ultra-processed
foods although it may play an important role in diet
quality variations (Baraldi et al. 2014). The study showed
that most of the respondents consumed ultra-processed
foods like sweetened breakfast cereals, pizza, burger,
noodles, sweets and soft drinks daily. This could be
because there were readily available and easy to prepare;
this is in line with the report made by Monteiro (2013),
that convenient food requires less time cooking and also,
that eating out is much easier than preparing meals from
the scratch. Cheese balls, sardine fish, prawn crackers, hot
dogs, ice-creams and pastas were listed as the top weekly
ultra-processed foods consumed by the respondents; this
is in correlation with the findings of Norimah (2018).
Most people crave and consume ultra-processed foods
because they are convenient foods and they save time.
One third of the respondents were overweight while about
20% were obese; this could be due to high consumption
of ultra-processed foods and wrong food choices made by
the respondents in the study area. The result of this study
is similar to that reported by Louzada et al. (2015) that
excessive consumption of ultra-processed food products
ISBN: 978-93-5619-947-7
0.000
0.003
predisposes an individual to obesity which results from an
imbalance between food intake and energy output leading
to excessive fat accumulation.
The study showed that females were more
overweight than males. Obesity was slightly more among
the male respondents than females. This result is in
agreement with that reported by Louzada et al. (2015).
The chi-square analysis showed that there was a
significant association (p<0.000) between consumption of
cake, pizza, burger and BMI of the respondents. Body
mass index is regarded as an outcome of energy balance
with particular reference to weight (Moubarac et al.,
2013).
VIII. CONCLUSION
Majority of the respondents were male and more than
half of the respondents studied were between the age 26
and 32 years. A greater percentage of the respondents
consumed ultra-processed foods and drinks. The BMI
status of the respondents showed that one third of the
respondents were overweight, while about 20% were
obese. Females were more overweight than males.
Obesity was slightly more among the male respondents
than females. There was a significant association
(p<0.000) between consumption of cake, pizza, burger
and BMI of the respondents.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
Allemandi L, Castronuovo L, Tiscornia M.V. Food advertising on
Argentinean television: are ultra-processed foods in the lead?
Public Health Nutrition, 2018. 21(1): 238 -246.
Baker P, Friel S. Food systems transformations, ultra-processed
food markets and the nutrition transition in Asia. Global Health,
2016. 12(1): 80.
Baraldi, L.G., Martinez Steele, E., Canella, D.S., Monteiro, C.A.
Consumption of ultra-processed foods and associated sociodemographic factors in the USA between 2007 and 2012: Evidence
from a nationally representative cross-sectional study, 2014.
Ismene, Zarifis. "Human Rights Brief: Rights of Religious
Minorities in Nigeria".2002. Archived from the original on 200912-23. Retrieved 2009-09-12.
Louzada, M.L., Baraldi, L.G. and Steele, E.M. Consumption of
ultra-processed foods and obesity in Brazilian adolescents and
adults. Preventive Medicine, 2015. 81:9 -15.
Monteiro C.A, Levy R.B, Claro R.M. Increasing consumption of
ultra-processed foods and likely impact on human health: evidence
from Brazil, Public Health Nutrition, 2011. 14: 5–13.
6
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
[7]
Monteiro CA, Cannon G, Moubarac J-C. Dietary guidelines to
nourish humanity and the planet in the twenty-first century. A
blueprint from Brazil. Public Health Nutrition, 2015. 18: 2311–
2322.
[8] Monteiro CA, Moubarac JC, Cannon G. Ultra-processed products
are becoming dominant in the global food system. Obesity Review,
2013. 14: 21-28.
[9] Monteiro CA, Moubarac JC, Levy RB. Household availability of
ultra-processed foods and obesity in nineteen European countries.
Public Health Nutrition, 2018. 21(1): 18-26.
[10] Moodie R, Stuckler D, Monteiro CA. Profits and pandemics:
prevention of harmful effects of tobacco, alcohol, and ultraprocessed food and drink industries. Non-communicable Diseases
Series 4. Lancet, 2013. 381: 670–679.
[11] Moubarac JC, Martins AP, Claro RM, Levy RB, Cannon G,
Monteiro CA. Consumption of ultra-processed foods and likely
impact on human health. Evidence from Canada. Public Health
Nutrition, 2013.16: 2240–2248.
ISBN: 978-93-5619-947-7
[12] National Bureau of Statistics. Statistical New: Gender and socialeconomic data: the NBS publication, 2015 8: 196-203.
[13] Norimah A.K, Safiah M, Jamal K, Haslinda S, Zuhaida H, Rohida
S, Fatimah S, Norazlin S, Poh B.K, Kandiah M and Zalilah M.S.
Food consumption patterns: findings from the Malaysian Adult
Nutrition Survey (MANS). Malaysian Journal of Nutrition, 2018.
14(1): 25-39.
[14] World Health Organization (WHO). Independent High Level
Commission on NCDs. 2018. Available at:https://www.who.
int/ncds/governance/high-level-commission/en/, Accessed on
11/11/2019.
[15] World Health Organization (WHO). Pacific islanders pay heavy
price for abandoning their traditional diets. Bulletin of the World
Health
Organization,
2010.
88(7):
484–485.
http://doi.org/10.2471/BLT.10.010710.
[16] Yamane, T. Statistics: an introductory analysis, 3rd edition. New
York. 1973: Harper and Row.
7
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
MOTunAr Ontology: Creation and Axioms
Impacts
Degachi Haifa1, Yengui Ameni2, Neji Mahmoud3
1
Ph. D. Scholar, 2Instructor, 3Professor
1,2,3
University of Sfax, Tunisia
Abstract: Due to its potential for supporting heterogeneous
and various data, ontologies are used in serval domains,
notably the archaeological one. In this paper, we want to
present a multimedia ontology that designs the different
entities involved in the Tunisian archaeological field. On
another hand, the task of creating ontology is error-prone.
The quality of ontology should be sequentially evaluated
based on various criteria (e.g., coherence, consciences,
interoperability, etc.). Axioms present the guarantor to
satisfy high quality for a developed ontology. Therefore, we
detail in this work a hybrid approach that guarantees the
quality of the generated ontology. This approach combines
the corrective method that defines the positive axioms, and
the constructive method that defines all relevant axioms
based on the elimination of model and integrity constraints.
The generated ontology is evaluated with the Pellet reasoner
and OOPS! Online service.
Keywords: Axioms; Criteria; Evaluation; MOTunAr; Ontology.
I. INTRODUCTION
In the archaeological field, gathering information is
an essential process. It presents the base for interpretation
and analysis. The analysis aims to deduce semantic
information based on the extracted data. Ontologies have
a great capacity for providing obtained significant
dynamism due to their great capacity for providing
different approaches for maintaining, sharing, managing,
retrieving, searching, and viewing knowledge[1]. Due to
its important capacities, ontologies are used in serval
domains. Our research is focused on developing a
multimedia ontology of the Tunisian archaeological field
(MOTunAr). This ontology enables the description of all
the Tunisian archaeological sites. On another hand, the
creation of ontology is based on various sources of
knowledge, including unstructured sources (e.g., web
pages), semi-structured sources (e.g., dictionaries), and
structured sources (e.g., database). For this objective, we
propose the two hypotheses to benefit from these various
sources:
 The sources have different interests that should be
taken into consideration during the development of
ontology.
 Confidence related to such information increases when
this one appears in serval sources.
In order to take into account these two hypotheses we
define two purposes: 1) each source have a score of
interest that explains its relevance, dependent on this
ISBN: 978-93-5619-947-7
score, a source of information is used to extracted data or
it is rejected from the knowledge base of our ontology, 2)
each extracted information have a score of confidence is
intimately related to the origin of information (i.e., if the
score of interest of this information is raising the score of
confidence of information increase automatically.) as well
as the presence of this information in many sources.
Depending on the score of confidence extracted
information is accepted or is rejected.
Based on these hypotheses, we have defined a
methodology to develop an ontology that consists of six
steps[2]–[4]:1) filtering of data step, 2) Validation of the
Classes step, 3) Subclasses step, 4) properties step, 5)
axioms step, and 6) Population step. In addition, Despite
the important progress in the methodology of creating
ontology, most methods existing in the literature define
only the positive axioms [5]–[7] . For MOTunAr ontology,
we have defined a hybrid approach that combines the
corrective method (i.e., defines the positive axioms) and
the constructive method (i.e., defines all the relevant
axioms) to guarantees a high quality of the MOTunAr
ontology. The generated ontology is evaluated based on
both the Pellet reasoner [8] from the protégé editor and
OOPS! Online service[9]. MOTunAr shows a significant
degree of coherence and consciences, due to the
implementation of relevant axioms.
The rest of this paper is organized as the following:
In section 2, we present our approach to create the
MOTunAr ontology and we detail the different steps
especially the axioms steps. In section 3, we present the
evaluation part that is based on the Pellet reasoner from
the protégé editor and the OOPS! Online service. Finally,
in section4, we conclude this paper, and we present an
outlook for future work.
II. MOTUNAR
CREATION
ONTOLOGY:
STEPS
OF
MOTunAr ontology is a multimedia ontology
oriented to the Tunisian archaeological field. This
ontology aims to describe all the entities (i.e., classes,
subclasses, properties, and axioms) related to the Tunisian
cultural heritage field. Therefore, we have defined an
approach that contains six steps in order to develop the
MOTunAr ontology: 1) filtering of data step, 2)
8
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Validation of the Classes step, 3) Subclasses step, 4)
properties step, 5) axioms step, and 6) Population step.
1.1 Filtering of the data step
This step is based on automatic filtering of
knowledge. We implement a set of modules that aid to
restrict the domain of interest. The extraction task starts
with the alignment between the implementation module
and the existing sources and resources. As the first result
of the extracted task, we obtain a list of candidate classes
(concepts). Such a concept is conserved when it exists in
the list of the terms aligned with the module. In another
way, the extracted class would be rejected and would not
be expanded to the final resources. For this purpose, we
obtain a list of potential concepts related to the domain of
interest. Indeed, these classes describe the various periods
in Tunisian history (e.g., the Carthaginian period, the
Islamic period, the Roman period, etc.). Based on the
resulted list we deduce the relevant classes for the
MOTunAr ontology.
1.2 Validation of the Classes Step
Based on the Extraction-Terms algorithm, MOTunAr
ontology defines two main classes: 1) T1-ArchaeologicalEntity that includes as subclasses: a) T11-Site, and b)
T12-Monument. And 2) T2-Archaeological-Coordinates
that includes as subclasses: a) T21-Appellation, b) T22Anthroponym, c) T23-People, d) T24-Temporal-Entity,e)
T25-Spatial-Entity , f) T26-Physical-Object and, g) T27Conceptual-Object (fig.1).
Algorithm 1: Extraction-Terms
Input: S, /*S are the set of sources that we based on to
extract our candidates terms*/
Output: Res /*Res is the variable that contains the
candidates terms*/
For i: =1 to n do /*n is the number of sources that we
have used*/
{
Repeat
If (cr1 & cr2 & cr3 & cr4) then /* cr1is the reputation
of sources; cr2 is the freshness of sources; cr3 is the
adequacy of sources; cr4 is the clarity of sources*/
Data-Recovery ←retrieves all data related to sources;
Conceptual abstraction ←determines model for data;
Exploration-Information ←defines common format of
data;
While (Common-Knowledge);
If (Common-Knowledge) then
{
Repeat
Res← Search pattern in ODP /* ODP Portal
(Ontology Designed Patterns). This portal, as its name
indicates, groups the designed patterns as well as the
transformation patterns*/
ISBN: 978-93-5619-947-7
While (not ODP) or (exist); /* if we have tested all the
existing ODP (noted) or we have found (exist) a model
from ODP)*/
If (exist) then
Res← Application-Of-Transformation;
Else
Res← Ad-Hoc-Transformation-Method;
Res← Manual-Correction /* enables to retake the
updated transformation to manually correct the various
errors that can appear*/
If (Res= Alignment of the sources knowledge base)
then /* the correspondences between the different pairs
exists on the considered S are created*/
{
CT← final generation of coordinates terms /* CT:
Candidates Terms; the candidates of ontological elements
or the relation are generated*/
CT←SC; /* SC: Score of Confidence; A confidence
score is associated with each candidate*/
}
If (SC>=2) then
Res← CT; /* the variable Res receive the set of
candidates terms*/}}
1.3 Subclasses Step
In the previous step, we have defined the two main
classes: The T1-Archaeological-Entity class aims to
define the different archaeological entities involved in the
Tunisian archaeological field. This class includes two
subclasses a) T11-Site, and b) T12-Monument [2].
The T2-Archaeological-Coordinates class aims to
design the various data that can be added to
archaeological entities. For this class we have defined the
following set of subclasses [3].
 T21-Appellation:
it
describes
the
different
designations that can be added to such archaeological
entities. Three subclasses are added to the T21Appellation class: 1) T211-Identifier, 2) T212-OldName, and 3) T213-Current-Name.
 T22-Anthroponym: it defines persons which are
related to the archaeological entities. Three subclasses
are defined for this class: 1) T221-Hero, 2) T222Religious-Person, and 3) T223-Divinity.
 T23-People: it represents the different inhabitants of a
mentioned place which are indicated in a historical
document. T23-People class defines three subclasses:
1) T231-People-Appellation, 2) T232-Civilization, and
3) T233-Emperor.
 T24-Temporal-Entity: it designs the different time
terms. We have added a hierarchy of subclasses to this
class: 1) T241-Event that includes T2411-Event-ofmodification, T2412-Beginning-Of-Existence, and
T2413-End-Of-Existence subclasses, and 2) T242Chronological Slice that includes T2421-AbsoluteDating, T2422-Periodization, and T2423-Century
subclasses.
9
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
 T25-Spatial-Entity: it describes the entities related to
the location and space of the different archaeological
entities. We have added a hierarchy of subclasses to
this class: T251-Name-Place, T252-GeographicalCoordinates, T253-Municipality, T254-Surface, T255Delimitation, T256-Structure, and T257-Current
Occupation.
 T26-Physical-Object: it describes all physical entities,
and it defines three subclasses: 1) T261-ArchitecturalElement that includes the subclasses T2611Decoration, T2612-Architectural-Ornament, T2613Sculpture, and T2614-Architectural-Style, 2) T262Materials, and 3) T263-Legal-Statute.
 T27-Conceptual-Object: it includes the different no
physical information that describes the archaeological
entities. Two main subclasses are added to this class: 1)
T271-Description-Of-Site, it includes as subclasses
T2711Category, T2712-General-Data, T2713-State-ofConservation, T2714-State-Of-Research, T2715Number-Of-Monuments, and T2716-World-Heritage,
and 2) T272-Documentation that includes the
subclasses T2721-Document, and T2722-VisualElement.
Fig.1: Hierarchy of classes
This set of classes and subclasses are related to the
different properties that will be described in the following
subsection.
2.4 Properties step
Three kinds of properties are implemented in the
MOTunAr ontology[10]:1) Object properties, 2) Data
properties, and 3)Annotation properties.
 Object Properties (Relations): The Object properties
or Relations (R) in ontology represent a type of
interaction between the concepts. For our ontology we
have distinguished three kinds of relations [11]: 1)
ISBN: 978-93-5619-947-7
Hierarchical relations (HR), 2) Associative relations
(AR), and 3) Semantic relations (SR).
 Hierarchical relations: based on these relations we
create the structure of the ontologies. In our approach
we distinguish four hierarchical relations: 1)
Subsumption (P10-is-a), 2) Generalization (P53-ismore-generic-than), 3) Specification (P54-is-morespecific-than), and 4) Part-of (P50-is- Part-of). To
define the hierarchical relations we applied the
hierarchical relation definition algorithm.
Algorithm 2: Hierarchical Relation Definition
Input: Training set O= {(C1, C2, R}, /* C1, C2 are
the concepts for which we try to define a hierarchical
relation; R is anonym relation among C1, C2 */
Output: HR
Randomly initialize θ;
While training is not terminated do
Switch R
Case Subsumption:
HR← is-a;
Is-a (C1, C2);
Break;
Case Generalization:
HR← is-more-generic-than;
Is-more-generic-than (C1, C2);
Break;
Case Specification:
HR← is-more-specific-than;
Is-more-specific-than (C1, C2);
Break;
Case Part:
HR← is-part-of;
Is-part-of (C1, C2);
Break;
Default:
HR← Ө;
 Associative relations: Based on these relations we
create the conceptual representations between terms.
We benefit from the existing sources and resources
that describe our interest field. Candidate relations are
extracted and a score of confidence (SOC) is
associated with each one of these relations. Depending
on the SOC a candidate relation can be conserved or
rejected. To define the associative relations we applied
the associative relation definition algorithm.
Algorithm 3: Associative Relation Definition
Input: Training set O= {(C1, C2, R}, RES, S/* C1, C2
are the concepts for which we try to define an associative
relation; R is anonym relation among C1, C2 */
/* resources RES and sources S*/
10
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Output: AR, SOC /* AR is the associative relation which
we want to extract; SOC is the score of confidence*/
Randomly initialize θ;
While training is not terminated do
If exit(R) ==true then/* exist is a function which search
the candidate relation R on the resources RES and sources
S*/
SOC++; /* score of confidence of the relation R
increase when it exists in different documents*/
If SOC>=2 then
AR← R;
Else
R is rejected; /*if the score of confidence is less than 2
the relation R is rejected from the list of relations
candidates*/
 Data Properties (Attributes): Data properties or
Attributes (A) relate an instance to data values (e.g.,
XML Schema, RDF literal, Datatype value, etc.) [13].
For MOTunAr we have defined a set of Data
Properties that added value to, especially entities.
For each Data property, we defined the rdfs: domain
and rdfs: range. Domain presents one of the existing
classes or subclasses (e.g., T222-Religious-Person, T261Architectural-Element, T271-Description-Of-Site, etc.).
And the ranges express the Datatype that can be defined
by the data properties (e.g., XSD: string, RDF: XML
literal, rdfs: literal, owl: real, etc.).
Table 1. Examples of Data properties
Data properties
has-designation
has-number
 Semantic relations: based on these relations we create
the semantic representations between terms. The
definition of semantic relations is carried out between
each pair of concepts. A double-entry matrix is then
produced [12]. This matrix contains in a row and a
column all the different concepts already defined. Each
cell of the matrix contains semantic relations which can
link two concepts together. To define the semantic
relations we applied the semantic relation definition
algorithm.
Algorithm 4: Semantic Relation Definition
Input: Training set O= {(C1, C2,, Cn, R}, n, m/* C1, C2
are the concepts for which we try to define a hierarchical
relation; R is anonym relation among C1, C2 */
/* n is the number of lines; m is the number of column*/
Output: SR,
Randomly initialize θ;
While training is not terminated do
For i := 1 to n do
For j:= 1 to m do
If R (Ci, Cj) then
SR←R;
Has-origin
has-birth-day
has-death-day
Domain
T212-Old-Name
T213-Currenr-Name
T212-Old-Name
T213-Currenr-Name
T212-Old-Name
T213-Currenr-Name
T221-Hero
T222-ReligiousPerson
T233-Emperor
T221-Hero
T222-ReligiousPerson
T233-Emperor
Range
xsd :string
xsd :integer
xsd :string
xsd :date Time
xsd :date Time
Table 1 shows some data properties related to the
MOTunAr ontology as well as their ranges and their
domains. Data properties, as well as the Object properties,
aim to relate the different entities and to transform data
into knowledge. The annotation properties aim to add
information to the different entities (i.e., concepts,
relations, attributes)[10].
 Annotation Properties: Annotation properties are used
to more describe such entities and add metadata to the
different declared objects [10].
Many formats of annotations are implemented into
the MOTunAr ontology in order to add metadata to
different
Table 2. Positive Axioms Examples
Designation
Reflexive property
Irreflexive property
Symmetric property
Asymmetric property
Transitive property
Inverse property
Explication
Class C is in relation R with the same class
C.
C can’t be in relation R with the same class
C.
C1 is in R with C2 and C2 is in R with C1.
C1 is in R with C2and C2isn’t in R with C1.
C1 is in R with C2 and C2 is in R with C3
then C1 is in R with C3.
Each relation R can have an inverse
relation.
ISBN: 978-93-5619-947-7
Syntax
I
Protégé declaration examples
(R ) -is reflexive
Reflexive : P1-is-associated-with
(RI) - is irreflexive
Irreflexive :P 18-has-constructed
I
I -
R = (R )
RI =(RI)
Symmetric: P3-is-related-to
Asymetric : P53-is-identified-by
RI = (RI)+
Transitive :P10-is-a
RI = (RI0)-
P12-is-operated-by InverseOf
P13-has-operated
11
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Functional Property
Inverse Functional
Domain/Domain
Range/Range
A relation R is declared functional when no
more than one individual can be linked to it.
The inverse relationship is declared
functional.
If an individual x is connected by R with
some other individual, then x is an instance
of C.
if some individual is connected by R with
an individual x, then x is an instance of C.
RI is Functional
I
Functional: P53-is-identified-by
(R ) - is
Functional
InverseFunctional: P54-hasidentified
RI⊆CIi×△ID
P1-is-associated-with Domain
T2-Archaeological-Coordinates
RI⊆△I × CIi
P1-is-associated-with Range T1Archaeological-Entity
Fig.2: (a) Pellet reasoner, (b) OOPS! service
objects including in the MOTunAr ontology. Such as the
rdfs: IsDefinedBy annotation that is used to give the
definition for each object from MOTunAr ontology. Also,
we have used rdfs: label in order to add the French name
for each entity (i.e., the French version of MOTunAr is
available when we use the option « render by label » from
the view menu in the protégé editor).
2.5 Axioms Step
Two approaches are combined in order to define the
axioms of the MOTunAr ontology:
 Corrective approach: in order to guarantee the
coherence and the excitability of ontology, in this step,
we have defined a set of assertions that give meaning
to the already defined entities and allow their good
exploitation. Eventually, the different editors of
ontology existing in the literature assure the definition
of various axioms depending on their capacities. For
MOTunAr we have based on Protégé editor due to its
efficiency and simplicity of use [14]. Protégé editor
defines especially the positive constraint, i.e. axioms
define positive inferences (e.g., a hierarchy of classes,
domains and co-domains of properties, etc.). Via
protégé editor, we have added a set of positive axioms
ISBN: 978-93-5619-947-7
to MOTunAr ontology. The definition of the axioms is
depending on the entity that it describes. For
MOTunAr three types of positive axioms are defined:
1) Class Expression Axioms, 2) Object Property
Axioms, and 3) Cardinality Restrictions Axioms.
 Class Expression Axioms: In our work four axioms are
declared [15] :
 Class declaration axioms: Declaration (Class
(T223-Divinity)).
 SubClassOf axiom: SubClassOf (T212-Old-Name,
T21-Appellation).
 Equivalent
Classes
axioms:
T231-PeopleAppellation EquivalentTo T234-People-Name.
 Disjoint
Classes
axioms:
T11Site DisjointWith T12-Monument.
 Object Property Axioms: it tends to determine the
axioms that could be exploited to find relations
between item property terms. Table 2 shows the same
examples of the Object Property Axioms.
 Cardinality Restrictions Axioms: In the MOTunAr
ontology we have added the following cardinality
restrictions [16]: 1) SomeValues (e.g., P42-hastriggered some T241-Event), 2) AllValues (e.g.,P18has-starting-during only (T232-Civilization or T242Chronological-Slice)), 3) HasValues (e.g.,P15-has-
12
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
existed-during exactly 1 T232-Civilization), 4)
MinCardinality (e.g.,P16-has-coincided-with min 1
T223-Divinity), and 5) MaxCardinality (e.g.,P15-hasexisted-during max 1 T232-Civilization).
This approach allows to clearly defining the positive
axioms but for the negative ones, it is limited to the
separation constraints. We define in the following section
the constructive approach that allows the definition of all
relevant axioms that can be added to the MOTunAr
ontology.
2.5.1 Constructive approach
This approach is under development. On other hand,
under this step, the axioms are generated by the
elimination of models. The ontology resulting from the
application of the corrective approach is considered as
reference ontology. This ontology will be transformed
into a set of models (i.e., class diagram). Two possible
contexts are presented:
 Elimination of Model therefore a negative axiom is
automatically generated.
 Conservation of model therefore OCL constraints are
adopted. These constraints will be transformed to
OWL axioms and added to the existing MOTunAr
axioms.
Once the implementation of declared axioms is
achieved; we want to define the instance: the population
step.
2.6 Population Step
The population step is a future step for MOTunAr
ontology. We want to define the instances (individuals)
under this task. For our ontology, we will be based on the
BOEMIE methodology to define the instance for classes
and subclasses as well as for the properties. BOEMIE
methodology offers such advantages in comparison to the
existing methodology in literature [17] :
 The engine of extraction instances of concept/relation
is not anticipated to extract instances of the composite
classes. It is anticipated to extract just instances of the
primitive classes. An evident benefit is a modification
in the structure of the ontology becomes immune. The
adaptation of the extraction engine is a necessity only
when such \primitive" classes or relations related to
primitive classes are modified.
 The ontology is applied to extract an instance of a
\composite" class from an instance of populated
\primitive" class of either of the populated relation
instances. Two main advantages of this approach that
are:1) the instances of the \composite" classes are
constantly synchronized with the available formal
definition added to the relevant classes, and 2) the
generation of \composite" instances, depending on the
constraints and the rules imposed by the implemented
ISBN: 978-93-5619-947-7
ontology these rules ensure the consistency and
efficiency of the ontology.
The population step is the final step in our
methodology. Thus, in order to verify the effectiveness of
the developed ontology, the following section detail the
evaluations applied to the MOTunAr based on different
tools existing in the literature.
III.
EVALUATIONS
ONTOLOGY
OF
MOTUNAR
MOTunAr ontology has been developed based on a
flexible approach, which allows the coherence, clarity,
and consciences of each declared term. Despite this, the
implementation of a pertinent methodology for
developing ontologies does not promise to obtain
ontologies free of errors. In addition, the task of
developed ontologies is error-prone; some anomalies can
appear on the developed ontology. Therefore, the
evaluation of ontology is considered as a fundamental
step to guarantee the quality of generated ontology and
reduce future maintenance.
For our study we have applied two tools to evaluate
MOTunAr ontology: 1) Pellet reasoner from Protégé
editor and [9] 2) OOPS! Service [10].
Pellet does expertness analysis of ontology. The
service reasoning find by Pellet help to debug for
incompatibility and incoherence that can be detected
Fig.2.a. To assure the quality of MOTunAr ontology, we
have applied the OOPS! Service with the Pellet reasoner
OntOlogy Pitfall Scanner! (OOPS!), is a service available
at, http://oops.linkeddata.es/response.jsp. It aims to aid the
ontology designer during the ontology evaluation task.
OOPS! Executed independently of the ontology creation
platform, this service produces pitfalls (i.e., bad practices
in the task of development of ontology) that describe the
errors detected among the tested ontology Fig.2.b.
Despite MOTunAr being under development, both,
pellet reasoner, and OOPS! Service shows a good result
for this ontology. The implementation of a constructive
approach will be allowed:
 More conscience ontology by defining all relevant
axioms and controlling redundant axioms.
 More coherent ontology by manipulating all
contradictions provoke by axioms.
 More interoperability ontology by reusing and
interacting axioms from other ontologies.
IV.
CONCLUSION AND FUTURE WORKS
In this paper, we have presented a new approach to
developing a multimedia ontology. This approach is
realized among six steps: 1) filtering of data step, 2)
Validation of the Classes step, 3) Subclasses step, 4)
properties step, 5) axioms step, and 6) Population step. To
verify the quality of the MOTunAr ontology, we have
13
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
based on the Pellet reasoner and OOPS! Online service.
The result of the evaluation shows the effectiveness of the
developed ontology. In addition, we benefited from the
experience of a domain expert (i.e., Tunisian
archaeologist) to have a correct sense for the different
defined terms and to cover our studied domain (i.e., Clair
ontology). The use of annotation properties, as well as the
use of simple entities appellation (e.g., people, hero, event,
was-associated-to,
is-a, etc.), make the MOTunAr
ontology understandable either by an expert or by a
simple user (i.e., easy to use ontology). The definitions of
the relevant axioms guarantee the satisfaction of
coherence, conscience, and interoperability criteria of
evaluation. Despite, the axioms step is under development,
the achievement of this step will be added more
effectiveness to the MOTunAr ontology due to the
implementation of all pertinent axioms. To have a
completed, coherent, and Clair multimedia ontology that
defines all entities related to the Tunisian archaeological
field. As ongoing steps we plan to apply the BOEMIE
methodology to achieve the population step as well as the
MOWL (Multimedia Ontology Web Language) to take
into account the multimedia format of such entities.
[6]
[7]
[8]
[9]
[10]
[11]
[12]
REFERENCES
[1]
[2]
[3]
[4]
[5]
B. Ben Mahria, I. Chaker, and A. Zahi, “A novel approach for
lesarning ontology from relational database : from the construction
to the evaluation,” J. Big Data, 2021, doi: 10.1186/s40537-02100412-2.
D. Haifa, Y. Ameni, and N. Mahmoud, “Accomplishment of
multimedia ontology for the tunisian archaeology field,” in
Advances in Intelligent Systems and Computing, vol. 1184,
Springer Science and Business Media Deutschland GmbH, 2021,
pp. 64–72.
D. Haifa, Y. Ameni, and N. Mahmoud, “Multimedia Ontology of
the Tunisian Archaeology Field,” in Advances in Intelligent
Systems and Computing, Jul. 2020, vol. 1105 AISC, pp. 321–330,
doi: 10.1007/978-3-030-36674-2_33.
D. Haifa, Y. Ameni, and N. Mahmoud, “Towards a Multimedia
Ontology for Tunisian Archaeology Field,” Dec. 2019, doi:
10.1109/ICTA49490.2019.9144900.
S. Belabbes, S. Benferhat, and J. Chomicki, “Elect : Une méthode
ISBN: 978-93-5619-947-7
[13]
[14]
[15]
[16]
[17]
de gestion des incohérences dans des ontologies légères
partiellement préordonnées *,” Jul. 2019, Accessed: Oct. 01, 2021.
[Online]. Available: https://hal.archives-ouvertes.fr/hal-02301980.
S. Salminawati, “ONTOLOGICAL BASIS OF SCIENCE
CLASSIFICATION (Study on the Philosophy of Islamic
Education),” Edukasi Islam. J. Pendidik. Islam, vol. 9, no. 02, pp.
683–700, Aug. 2020, doi: 10.30868/EI.V9I02.1581.
M. Ben Salah, A. Yengui, M. Neji, and N. Mahmoud,
“Construction of OTunAr : ontology of Tunisian archeology,”
2017. Accessed: Mar. 02, 2021. [Online]. Available:
https://www.researchgate.net/publication/340922998.
S. Gherbi and M. T. Khadir, “ONTMAT1: Ontology matching
using a reasoner and property restriction,” Int. J. Web Eng.
Technol., vol. 15, no. 2, pp. 119–139, 2020, doi:
10.1504/IJWET.2020.109728.
A. Mathews, S. Chen, M. T. Bigham, and K. Mansel, “Oops: rapid
Deterioration of the Transport Patient Admitted to the General
Care Floor,” Pediatrics, vol. 141, no. 1 MeetingAbstract, pp. 728–
728,
Jan.
2018,
doi:
10.1542/PEDS.141.1_MEETINGABSTRACT.728.
L. Olsina, “ThingFO v1.2’s Terms, Properties, Relationships and
Axioms -- Foundational Ontology for Things,” Jul. 2021, Accessed:
Jan. 30, 2022. [Online]. Available: http://arxiv.org/abs/2107.09129.
C. Roche and M. Papadopoulou, “Terminologie et ontologie pour
les humanités numériques : le cas des vêtements de la Grèce
antiqueTerminology and Ontology for Digital Humanities: The
Case of Ancient Greek Dress,” Humanit. numériques, no. 2, Jun.
2020, doi: 10.4000/revuehn.462.
M. Rasmussen, M. Lefrançois, M. Bonduel, C. Hviid, and J.
Karlshøj, “OPM: An ontology for describing properties that evolve
over time,” Jun. 2018, Accessed: Oct. 01, 2021. [Online].
Available: https://hal.archives-ouvertes.fr/hal-01885248.
H. J. Pandit, K. Fatema, D. O’Sullivan, and D. Lewis, GDPRtEXT
- GDPR as a Linked Data Resource, vol. 10843 LNCS. 2018.
M. Florrence, “MLGrafViz: Multilingual ontology visualization
plug-in for protégé,” Comput. Sci. Inf. Technol., vol. 2, no. 1, pp.
43–48, Mar. 2021, doi: 10.11591/CSIT.V2I1.P43-48.
F. Z. Smaili, X. Gao, and R. Hoehndorf, “Formal axioms in
biomedical ontologies improve analysis and interpretation of
associated data,” 2018, doi: 10.1093/bioinformatics/xxxxxx.
F. Freitas and I. Varzinczak, “Cardinality Restrictions Within
Description Logic Connection Calculi,” Lect. Notes Comput. Sci.
(including Subser. Lect. Notes Artif. Intell. Lect. Notes
Bioinformatics), vol. 11092 LNCS, pp. 65–80, Sep. 2018, doi:
10.1007/978-3-319-99906-7_5.
F. Song and E. De La Clergerie, “Clustering-based Automatic
Construction of Legal Entity Knowledge Base from Contracts,”
Proc. - 2020 IEEE Int. Conf. Big Data, Big Data 2020, pp. 2149–
2152, Dec. 2020, doi: 10.1109/BIGDATA50022.2020.9378166.
14
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Determinants of Employee Job Satisfaction: An
Analysis of Structural Equation Model
Muhammad Alkirom Wildan
Faculty of Economics and Business, Universitas Trunojoyo Madura, Bangkalan, Jawa Timur, 69162, Indonesia
Abstract: Imbalances in an employee’s working life have
become a major problem due to the many issues related to
employee well-being, productivity levels and boredom at
work. Work-Life balance has now become a vulnerable topic
because it offers real benefits to the organization and its
success, so the goal to be achieved in this study is to provide
an explanation of the influence of charismatic leadership and
Work-Life balance against organizational commitment
through employee job satisfaction in the broadcasting
industry. The study was conducted using a questionnaire
distributed in November-December 2019 where respondents
used as many as 190 employees in the broadcasting industry
in Jawa Timur. The data was analyzed using the Structural
Equation Model (SEM). The results of this study show that a
good charismatic leadership will increase employee job
satisfaction, a good Work-Life balance will increase
employee job satisfaction, and good job satisfaction will
increase commitment. Organizational employees, good
charismatic leadership will increase employee organizational
commitment and good Work-Life balance does not increase
employee organizational commitment directly.
Keywords: Charismatic Leadership; Work-Life Balance; Job
Satisfaction; Organizational Commitment; Industry.
I. INTRODUCTION
Work-Life balance becomes an important element in
maintaining and achieving a balance between an
individual's life and work life. Although Work-Life
balance has received widespread attention, there are still
many organizations that have not implemented
appropriate strategies to minimize work-life conflicts and
achieve Work-Life balance (Dizaho et al. ., 2017). As in
the current global scenario, changes in work culture are
happening very quickly. These changes make it difficult
for employees to strike a balance between their working
life and personal lives. Work-Life balance is one of the
problems for employees and organizations, because high
competitive demands can lead to low productivity in the
organization (Pandey & Khare, 2013).
Work-Life balance is the right priority between
professional life and personal life, but nevertheless
organizational needs often ignore the personal needs of
employees. Job demand is becoming excessive due to
increased competition and globalization, so employees
must work harder than ever to meet organizational
requirements (Ashima, 2015). Parkes & Langford (2008)
found that job satisfaction with Work-Life balance is
positively associated with satisfaction with rewards and
recognition. Pradhan et al. (2016) found a positive
ISBN: 978-93-5619-947-7
relationship
between
Work-Life
balance
and
organizational commitment. Work-Life balance has a
positive relationship although not statistically significant
with organizational commitment (Rasheed et al., 2017).
Silva et al. (2015) also stated that there is a significant
positive relationship between Work-Life balance and
employee commitment to their organization. Job
satisfaction is a determinant of organizational
commitment, because job satisfaction is a variable that
has an "affective" tone and is considered best associated
with affective commitment (Meyer et al., 2002). But
unfortunately, previous research on charismatic
leadership, Work-Life balance, job satisfaction and
organizational commitment has been widely done, but the
thing that distinguishes this research from previous
research has not been widely used charismatic leadership
variables and Work-Life balance simultaneously in one
study. Research on charismatic leadership conducted in
the broadcasting industry has been under scrutiny for the
past three years. Another difference that distinguishes this
study from previous studies is the measurement of job
satisfaction variables using dimensions from Weiss et al.
(1967). Based on the above research objectives, the
purpose of the research to be achieved is to provide an
explanation of the influence of charismatic leadership and
Work-Life balance on organizational commitment
through satisfaction of employees in the broadcasting
industry.
II. LITERATURE REVIEW
2.1 Charismatic Leadership
The concept of charisma was first used to describe
the special gifts selected individuals have that give them
the ability to do extraordinary things, so the beliefs and
visions of these leaders help attract the best employees.
(Zhang et al., 2011). Charismatic leadership differs from
other leadership formations through the formulation of a
shared and idealized vision of the future, inspiring
articulation and dedicated to the organization's path to
vision (Banks et al., 2017). The behavior of charismatic
leaders directly results in feelings of respect, a sense of
collective identity, and perceptions of group task
performance (Conger et al., 2000).
2.2 Work-Life Balance
Equal dedication to work and responsibility for life
(Greenhaus et al., 2003). Furthermore, Dundas (2008)
15
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
asserts that Work-Life balance is about managing the
pressure efficiently between paid work and all additional
activities that are important to people such as family,
community activities, volunteer work, individual growth
and leisure and entertainment. Programs that facilitate
psychological release such as leisure activities, workshops
on time management and relaxation can help employees to
minimize work-life conflicts and achieve Work-Life
balance (Moreno-Jiménez, 2009).
2.3 Job Satisfaction
Job satisfaction is a pleasurable emotional state
resulting from an assessment of one's work (Brief
&Weiss, 2002). Lund (2003) defines job satisfaction as
the amount of communication observed between what a
person demands from his or her job and what has been
given to him by the job and the organization. On the
other hand, Antoncic (2011) argues that job satisfaction
refers to employee satisfaction with their work and the
amount of interest in work-related activities. Job
satisfaction is a kind of reaction to a particular job or
work-related problem (Gunlu et al., 2010).
2.4 Organizational Commitment
Organizational commitment is the alignment of
individuals with the values and goals of organization, the
willingness to task and display efforts for the organization
(Meyer et al., 2002). Organizational commitment is the
relative strength of identification and involvement in an
organization, acceptance of an organization's goals and
willingness to exert effort to remain within that
organization (Dee. et al., 2006). Organizational
commitment is described as an overall reaction to the
organization (Gunlu et al. 2010) and is a key factor in
determining organizational competitiveness that increases
employee motivation and engagement (Azeem, 2010).
Employees who have organizational commitments will be
encouraged to do their utmost in carrying out their duties
because they believe that with the organization's
correctness in achieving their goals. It will benefit the
employees (Amalia, 2019). Organizational commitment
can lead to a variety of organizational outcomes such as
lower turnover rates, increased motivation, improved
organizational citizen behavior and organizational
support. Sustainable (Kwon & Banks, 2004). On the other
hand, Cichy et al. (2009) refers to organizational
commitment as the degree to which one internalizes
values, purpose, sense of obedience and compliance
limited to the workplace.
III. RESEARCH METHODS
is the number of samples must have five times the
number of statements that are analyzed (Hair et al.,
2008). There are 38 statements on the questionnaire, so
the minimum number of samples needed is 190
respondents.
3.2 Data Analysis Methods
In this study there were two exogenous variables
namely charismatic leadership and work-life balance,
and two endogenous variables, namely job satisfaction
and organizational commitment. The study used
confirmatory factor analysis for validity tests by looking
at kaiser-msyer-olkin measure of sampling (KMO) and
measures of sampling adequacy (MSA). The analysis
tool used is the Structural Equation Model (SEM).
3.3 Research Hypothesis
The hypotheses in this study are: The Relationship
between Charismatic Leadership and Job Satisfaction Charismatic leadership is very strong and positively
associated with some important follower outcomes
(Conger et al., 2000). Leader charisma is related Positive
influences of followers found that followers of
charismatic leaders are happier than those who follow
non-charismatic leaders (Erez et al., 2008). On the other
hand, Vlachos et al. (2013) with a background in
research on the impact of corporate social responsibility
(CSR) initiatives from three of the world's leading
manufacturing organizations, building and testing
multilevel frameworks Comprehensive and focuses on
whether employees obtain job satisfaction from CSR
programs.
H1: Good Charismatic Leadership will improve
Employee Job Satisfaction. Relationship between WorkLife balance and Job Satisfaction - Varatharaj & Vasantha
(2016) has identified Work-Life balance as a source of job
satisfaction in the services of sectors such as banking,
education, and government organizations. They argue that
employees who can maintain a balance between personal
and professional lives, can achieve higher job satisfaction
and contribute more to their lives.
H2: A good work-life balance will increase employee job
satisfaction. The Relationship between Job Satisfaction
and Organizational Commitment - Job satisfaction affect
the organizational commitment of employees because If
the organization can provide salaries and workloads in
accordance with the tasks given then the commitment of
employees to the organization is increasing (Rojuaniah,
2019). Employee job satisfaction has a positive effect on
organizational commitment (Nikpour, 2018).
3.1 Population and Sample
In accordance with the analysis tool used, the
Structural Equation Model (SEM), the determination of
the minimum number of samples that are representative
ISBN: 978-93-5619-947-7
H3: Good Job Satisfaction will increase employee's
Organizational Commitment. The Relationship between
Charismatic Leadership and Organizational Commitment Charismatic leaders, such as sensitivity to members' needs
16
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
and having a clear vision, are positively associated with
affective organizational commitment (Rowden, 2000).
Research Barling et al. (1996) demonstrates that
charismatic leadership can increase employee affective
commitment. Shastri et al. (2010) conducted research to
advance the understanding of charismatic leadership
relationships and organizational commitments in several
organizations in eastern and northern India.
H4: Good Charismatic Leadership will increase employee
organizational commitment. Relationship between WorkLife balance and Organizational Commitment - The effect
of Work-Life balance on organizational commitment and
organizational citizenship behavior carried out. The
manufacturing industry found a positive relationship
between Work-Life balance and organizational
commitment (Pradhan et al., 2016). Work-Life balance
and organizational commitment have a positive
relationship, because if employees have a good Work-Life
balance, they are more committed to their organization.
4.2 Validity and Reliability Test (Construct)
On the results of the construct validity measurement,
all indicators on charismatic leadership variables, WorkLife balance, job satisfaction and organizational
commitment can be accepted, because the value of factor
loading has good match (> 0.50), and the value of t-value
greater than t-table (1.96) at the significance level of 5%.
Furthermore, the construct reliability test meets the
reliability requirements with a CR value above 0.60 and
a VE value above 0.50 (Hair et al., 2013). In cr values all
qualify reliable i.e. values above 0.60, charismatic
leadership (0.96),
Work-Life balance (0.94), job satisfaction (0.86),
and organizational commitment (0.93). At VE values all
qualify reliable yes value above 0.50, for leadership
charismatic (0.79), Work-Life balance (0.71), job
satisfaction (0.54), and commit Organizational (0.72).
4.3 Structural Test Analysis
H5: A good work-life balance will increase employee
organizational commitment. From the description above,
the research model can be described as follows:
IV.
RESEARCH METHODS
Structural test analysis can be seen from the value of
R². The R² value for each of them.
It shows how far an independent variable is able to
explain a dependent variable.
4.1 Analysis of Respondents' Demographic Differences
4.4 Analysis of the 10th Model
An analysis of respondents' demographic differences
(gender, age, last education, working period and work
unit) was conducted to find out if there were significant
differences in each of them. Charismatic leadership,
work-life balance, job satisfaction and organizational
commitment are needed. All the results of the
respondent's ANOVA test showed that there was no
difference so that the answer
From the conformity test analysis all tests showed
good matches including Chisquare, ECVI, AIC and CAIC,
Fit Index, and Goodness of Fit. There are good fit results
on RMSEA and close fit results on Critical N. From the
results of the analysis above, it can be concluded that the
match test throughout the model is qualified (good fit).
(Results can be seen in appendix 8 of table 15).
Furthermore, this study produced the following T- Value
path diagram:
Fig. 1: Research Framework
Respondents are homogenous and the ANOVA test
can be conducted on respondents' answers based on
gender, age, final education, working period and work
units to charismatic leadership variables, Work-Life
balance, job satisfaction and Organizational commitment
indicates sig homogenity> 0.05 and anova > 0.05 meaning
there is no difference in homogenity.
ISBN: 978-93-5619-947-7
Figure 2. T-Value Test Results Description: leadership
17
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Charismatic (CL), Work-Life balance (WLB), job
satisfaction (JS), and organizational commitment (OCM).
Based on the figure of 2 path diagrams T-Value is a
hypothesis in this study, presented in the table of
hypothesis as follows:
Table 1. Results of hypothesis testing of research models
Hypo
thesis
H1
H2
H3
H4
H5
Hypothetical statement
Good Charismatic
Leadership will
increase Job
Satisfaction
employee
A good work-life
balance will increase
Employee Job
Satisfaction
Good job satisfaction
will increase
organizational
commitment.
employee
Good Charismatic
Leadership will
increase commitment.
Organizational
employees
A good work-life
balance will increase
commitment.
Organizational
employees
Value
TValue
3,23
6,75
Information
Data
supports
the
hypothesis.
Data
supports
the
hypothesis.
Data supports
the hypothesis.
6,78
4,96
0,47
Data
supports
the
hypothesis.
The data
does not
support the
hypothesis.
Source: Sem Lisrel Data Analysis Results
V.
DISCUSSION OF RESEARCH RESULTS
In this study there are results that show that good
charismatic leadership can improve employee job
satisfaction in the broadcasting industry. This means that
good charismatic leadership can improve employee job
satisfaction. When employees think that their managers
have charismatic leadership qualities, they tend to
attribute organizational motives to intrinsive values, which
in turn are positively linked to job satisfaction. Leader
charisma is positively associated with the positive
influence of followers so that followers of charismatic
leaders are happier than those who follow non-leaders.
Charismatic. This is supported by the statement of
Vlachos et al. (2013); (Erez et al., 2008); and (Conger et
al. 2000) that charismatic leadership has an influence on
employee job satisfaction.
Furthermore, in this study there are results that show
that a good Work-Life balance will increase employee job
satisfaction in the broadcasting industry. This means that a
good Work-Life balance can increase employee job
satisfaction. Employees who can maintain a balance
between personal and professional lives, can achieve
higher job satisfaction and contribute more to the success
ISBN: 978-93-5619-947-7
of the organization. In line with that, it is suggested that
the manager's behavior towards employees determines the
support or obstacles that are not experienced.
Organizations position work-life balance strategies,
particularly in relation to social responsibility and wellbeing. This is supported by the statement of Varatharaj &
Vasantha (2016); Parkes & Langford (2008); Stefanovska
et al. (2019); and (Rojuaniah, 2019) that Work-Life
balance has an influence on employee job satisfaction.
In this study there are also results that show that good
job satisfaction will increase employee organizational
commitment in the broadcasting industry. This means that
good job satisfaction can increase employee
organizational commitment. Higher job satisfaction will
result in commitment too because employees are more
committed to their organization whenever they feel
satisfied with their work. Job satisfaction has a positive
impact on organizational commitment. Employees are
only quite satisfied with their work, because the greater
the employee's job satisfaction, the more the employee is
committed to his organization. This is supported by the
statement of Aban & Perez (2019); Nikpour (2018); and
Suma & Lesha (2013) that job satisfaction has an
influence on employee organizational commitment.
This research shows that good charismatic leadership
will increase employees' organizational commitment to
the broadcasting industry. This means that good
charismatic
leadership
can
increase
employee
organizational commitment. Charismatic leader behaviors,
such as sensitivity to members' needs and having a clear
vision, are positively linked to an affective organizational
commitment so that charismatic leadership can increase
commitment. Affective employees. The leader's
sensitivity to members' needs is related to organizational
commitments, having a clear vision and articulating it
related to commitment, so managers must be clear about
goals and objectives. This is supported by the statement
Shastri et al. (2010); Barling et al. (1996); and (Rowden,
2000) that charismatic leadership has influence
organizational commitment of employees.
But in this study there are results that show that a
good Work-Life balance does not necessarily increase the
organizational commitment of employees to the
broadcasting industry. This means that a good Work-Life
balance cannot directly affect the level of employee
commitment to the organization. These results contradict
the hypothesis and do not correspond to the research of
Pradhan et al. (2016); (Sakthivel & Jayakrishnan, 2012);
Rasheed et al. (2017); and Gulbahar et al. (2014). WorkLife balance has no influence on organizational
commitment to the industry analyzed by researchers, it
may be because even employees who work in the industry
do not. They have a good Work-Life balance, they have
good job satisfaction to increase their commitment to the
company. They are satisfied with the amount of salary
provided, adequate workplace facilities, how to treat their
18
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
employees, to the provision of prestige if the employee
performs an achievement of its performance. Good
leadership factors also increase employee organizational
commitment. Bosses who often express concern and show
sensitivity to employee needs also affect employee
organizational commitment. Coworkers who support,
respect and trust each other
Others for their respective responsibilities create
performance that synergizes and can achieve the
company's goals. When the company's goals are achieved,
the success is appreciated and appreciated by the company
so that organizational commitment increases. Basic skills
possessed by an employee affect organizational
commitment to the company because when the expertise
of an employee has a uniqueness or exceeds the standards
that are determined by the company, the employee earns a
high organizational commitment. The Company provides
facilities and advantages offered to employees by
providing trainings and courses thus creating higher
employee commitment. Organizational commitment is
also derived from other factors such as self-concept and
personal needs. Self-concept is an individual's view and
attitude towards oneself. Self-view is related to physical
dimensions, individual characteristics, and selfmotivation. The self-concept of employees influences
employee attitudes towards organizational environment
and the fulfillment of personal needs increases the morale
so as to influence the commitment of employees to work
in the company. This is supported by the statements of
Azliyanti (2017) and Nirmalasari (2018) that Work-Life
balance has no influence on employee organizational
commitments. Although there are benefits felt by
employees to the organization, not necessarily enough to
make employees decide to stay in the organization.
VI.
CONCLUSION AND SUGGESTIONS
6.1 Conclusion
The results that can be concluded from this study the
first is that good charismatic leadership will increase
employee job satisfaction, secondly, a good Work-Life
balance will increase employee job satisfaction, Third,
good job satisfaction will increase employee
organizational commitment, fourth is good charismatic
leadership will increase employee organizational
commissal and fifth is work- A good life balance does not
increase the organizational commitment of employees
directly.
6.2 Limitations of Research
Research limitations refer to some of the weaknesses
in this study. Some of the limitations contained in this
study are that this study only discusses the limitations of
charismatic leadership variables, Work-Life balance, job
satisfaction and organizational commitment. Then, there
is the possibility that the respondents did not really fan or
ISBN: 978-93-5619-947-7
just fill in based on the ideal conditions expected and not
the actual conditions that are happening.
6.3 Advice for the Next Research
Future research development could add other
variables besides charismatic leadership and Work-Life
balance that can improve job satisfaction and
organizational commitment just as other variables can be
suggested. It's a work motivation variable. Further
research can expand its research not only in the Jawa
Timur area but in the broadcasting industry throughout
Indonesia or other industrial fields.
6.4 Managerial Implications
This research aims to find out the role of
charismatic leadership and Work-Life balance to
organizational commitment through employee job
satisfaction in the broadcasting industry. Like other
companies, the standard broadcasting industry hours are
8 hours a day depending on shifts. There are even shifts
to work early in the morning and home during the day.
Working in the broadcasting industry must grapple with
research and employees must be ready to coordinate with
almost any division. Another issue that is endlessly
discussed when it comes to this industry is the issue of
salaries, although some broadcasting industries have
applied enough wages, but not a few are still Provide
wages that are not comparable to the hard work that
employees do. This can sometimes be understood
because the media industry in our country is not so
advanced. Therefore,
Managerial implications that can be proposed to
increase organizational commitment through employee job
satisfaction in the broadcasting industry are by looking at
the charismatic leadership dimension and job satisfaction
that used in this research. The first dimension of
charismatic leadership that will increase an employee's
organizational commitment is vision and articulation. In
this case, the boss needs to motivate employees by
rewarding employees who excel, recognizing the
shortcomings and advantages that employees have to
strengthen family relationships among employees. The
second dimension of charismatic leadership that will
increase employee organizational commitment is
sensitivity to the environment. Employers must recognize
constraints in the company's social environment and seize
new opportunities to achieve goals. The third dimension of
charismatic leadership that will increase employee
organizational commitment is sensitivity to employee
needs. Superior Express personal concern for employee
needs and show sensitivity to the needs of employees
within the company.
Furthermore, judging from the dimensions of job
satisfaction used in this study. The first dimension is
satisfaction with the work environment. In this case, the
19
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
employee is satisfied. With the way his boss handles the
work, feels satisfied with working conditions and feels
satisfied with the salary and amount of work done. The
second dimension is the satisfaction of conscience.
Employees are given the opportunity to do different things
over time and are given the opportunity to do something
that takes advantage of the employee's abilities. The third
dimension is the satisfaction of the will. In this case, the
employee is given the freedom to use his or her own
judgment, given the opportunity to try his own methods of
doing the work. Employees are also given a prestay for
what has been done so that the employee's organizational
commitment increases and will think again if they decide
to leave the organization.
[17]
[18]
[19]
[20]
[21]
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
Aban, C. A. I., & Perez, V. E. B. (2019). The Relationship of
Organizational Commitment, Job Satisfaction, and Perceived
Organizational Support of Telecommuters in The National
Capital Region, 8(4), 162–198.
Adekola, B. (2012). The Impact of Organizational Commitment
on Job Satisfaction: A Study of Employees at Nigerian
Universities. International Journal of Human Resource
Studies,2(2),1.
Al Jenaibi, B. (2010). Job satisfaction: comparisons among
diverse public organizations in the UAE. Management Science
and Engineering, Vol. 4 No. 3, Pp. 60-79.
Alianto, A., & Rina Anindita. (2018). Effect of Compensation and
Work Life Balance on Job Satisfaction Mediated Work Stress. Esa
Superior University.
Amalia, L. (2019). Work Motivation Model and Organizational
Commitment As a Consequence of the Involvement of Non-Pts
Lecturer Employees in DKI Jakarta. Esa Superior University.
Antoncic, J. A., & Antoncic, B. (2011). Employee satisfaction,
entrepreneurship and firm growth: A model. Industrial
Management and Data Systems, 111(4), 589–607.
Ashima, J. (2015). A Study on Work Life Balance of Working
Married Women Employed in Software Industry with Reference to
Indore City. Advances In Management, 8(12), 12–16.
Azeem, S. M. (2010). Job satisfaction and organizational
commitment among employees in the Sultanate of Oman.
Psychology, 1(04), 295.
Aziri, B. (2011). Job Satisfaction: A Literature Review.
Management Research and Practice, 3(4), 77-86.
Banks, G.C., Engemann, K.N., Williams, C.E., Gooty, J.,
mccauley, K.D. and Medaugh, M. R. (2017). "A meta-analytic
review and future research agenda of charismatic leadership." The
Leadership Quarterly, Vol. 28 No. 4, Pp. 508-529.
Barling, J., Weber, T., & Kelloway, K. (1996). Effects of
transformational leadership training on attitudinal and financial
outcomes: A field experiment. Journal of Applied Psychology,
81(6), 827–832.
Brief, A. P., & Weiss, H.M. (2002). Organizational behavior:
Affect in the workplace. Annual Review of Psychology, 53(1),
279–307.
Cichy, R. F., Cha. J., & K. S. (2009).The relationship between
organizational commitment and contextual performance among
private club leaders. International Journal of Hospitalist
Management, 28(1), 53–62.
Connelly, S., Gaddis, B., & Helton- Fauth, W. (2002). A closer
look at the role of emotions in charismatic and transformational
leadership. In F. Yammarino & B. J. Avolio (Eds.).
Transformational and Charismatic Leadership, 2: The Road Ahead.
St. Louis, MO: Elsevier.
Dee, J. R., Henkin, A. B., & Singleton, C. A. (2006).
Organizational commitment of teachers in urban schools:
Examining the effects of team structures. Urban Education, 41(6),
603–627.
Dizaho, E. K., Salleh, R., & Abdullah, (2017). Achieving work life
ISBN: 978-93-5619-947-7
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
balance through flexible work schedules and arrangements. Global
Business and Management: An International Journal, 9(1), 455–
466.
Doll, W. J., Xia, W., and Torkzadeh, G. (1994). A Confirmatory
Factor Analysis of the End-User Computing Satisfaction
Instrument. MIS Quarterly, 18(4), 357-369.
Dundas, K. (2008). Work-Life Balance: There is no 'one-size- fitsall' solution. K O'Rourke (Ed.), Managing Matters. Graduate
College of Management, Southern Cross University, New South
Wales, Vol. Summer (3), Pp. 7-8.
Elfitra Azliyanti. (2017). Perception of Transformational
Leadership as a Moderation of the Influence between Work-Life
Balance on Employee Organizational Commitment. Economic
Tower, ISSN: 2407-8565; E-ISSN: 2579-5295 Volume III No. 6.
Elprida Sidabutar, Tantri Yanuar Rahmat Shah, R. A. (2020). The
Impact of Compensation, Motivation, and Job Satisfaction on
Employee Performance. Journal of Multidisciplinary Academic.
Erdogan, E., Basar, D., & Zehir, C. (2011). The Relationship
Among Charismatic Leadership, Ethical Climate, Job Satisfaction
and Organizational Commitment in Companies. Journal of Global
Strategic Management, 2(5), 49–49.
Erez, A., Misangyi, V. F., Johnson, D. E., lepine, M. A., &
Halverson, K. C. (2008). Stirring the Hearts of Followers:
Charismatic Leadership as the Transferal of Affect. Journal of
Applied Psychology, 93(3), 602–616.
Fisher, G. G., Bulger, C. A., & Smith,C. S. (2009). Beyond work
and family: A measure of work/ nonwork interference and
enhancement. Journal of Occupational Health Psychology, 14(4),
441–456.
Greenhaus, JH, Collins, KM and Shaw, J. (2003). "The relation
between work-family balance and quality of life." Journal of
Vocational Behavior, Vol. 63, Pp. 510-31.
Gulbahar, Amjad, A., Kundi, G., Qureshi, Q., & Akhtar, R. (2014).
Relationship between Work-Life Balance & Organizational
Commitment. Research on Humanities and Social Sciences, 4(5),
1–7.
Gunlu, E., Aksarayli, M., & Sahin Perçin, N. (2010). Job
satisfaction and organizational commitment of hotel managers in
Turkey. International Journal of Contemporary Hospitality
Management, 22(5), 693–717.
Hair, Anderson, Tatham, &B. (2008). Multivariate. Data Analysis
Fifth Edition. USA: Prentice Hall International Inc.
Hair, Anderson, Tatham, &B. (2013). Multivariate Data Analysis,
Fifth Edition. USA: Prentice Hall International Inc.
Hudson. (2005). "The Case for Work Life Balance: Closing the
Gap between Policy and Practice." 8:20 p.m. Hudson Global
Resources.
Hur, W.-M., Han, S.-J., Yoo, J.-J. And Moon, T. W. (2015). "The
moderating role of perceived organizational support on the
relationship between emotional labor and job-related outcomes."
Management Decision, Vol. 53 No. 3, Pp. 605-624.
Intan Nirmalasari. (2018). Analysis of the Effect of Work Life
Balance on Organizational Commitment through Job Satisfaction
of Nurses as Mediators. University of March 1.
Joshi Sethi, U. (2014). Influence of Work Life Balance on
Organisational Commitment: A Comparative Study of Women
Employees Working in Public and Private Sector Banks. European
Journal of Business and management online), 6(34), 2222–2839.
Judge, T. A., Woolf, E. F., Hurst, C., & Livingston, B. (2005).
Charismaticand transformational leadership: A review and agenda
for future research. ZeitschriftFu r Arbeits-Und Organizations
psychologie, 50, 203–214.
Kianto, A., Vanhala, M., Heilmann, P. (2016). The Impact of
Knowledge Management on Job Satisfaction. Journal of
Knowledge Management, 20(4), 621-636.
Kwon, I. W. G., & Banks, D. W. (2004). Factors related to the
organizational and professional commitment of internal auditors.
Managerial Auditing Journal, 19(5), 606-622.
Louise P Parkes, Peter H Langford. (2008). Work – life balance or
work – life alignment, Journal of Management, Organization,
14(3), 267–284.
Lowe, G. S. (2005). Control Over Time and Work-Life Balance:
An Empirical Analysis.
Lund, D.B. (2003). Organizational culture and job satisfaction.
20
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Journal of Business and Industrial Marketing, 18(3), 219–236.
[39] Malhotra, N. K. (2010). Marketing Reseach: An Applied
Orientation. Sixth Edition. Pearson Education.
[40] Meyer, J. P., & Herscovitch, L. (2001). Commitment in the
workplace: Toword a general model. Human Resuorce
Management Review, 11(3), 299–326.
[41] Meyer, J. P., Allen, N. J., & Smith, C. (1993a). Commitment to
organizations and occupations: Extension and test of a threecomponent conceptualization. Journal of Applied Psychology,
78(4), 538–551.
[42] Meyer, J. P., Allen, N. J., & Smith, C. (1993b). Commitment to
organizations and occupations: Extension and test of a threecomponent conceptualization. Journal ofa Pplied Psychology, 78,
533-551.
[43] Meyer, J. P., Stanley, D. J., Herscovitch,L.,& Topolnytsky, L.
(2002). Affective, continuance, and normative commitment to the
organization: A meta-analysis of antecedents, correlates, and
consequences. Journal of Vocational Behavior, 61(1), 20–52.
[44] Moreno-Jiménez, B. Et al. (2009). Effects of work–family conflict
on employees' well-being: The moderating role of recovery
strategies. Journal of Occupational Health Psychology, Vol. 14, No.
4, Pp. 427–440. Doi:10.1037/A0016739.
[45] Nikpour, A. (2018). Psychological Empowerment and
Organizational Innovation: Mediating Role of Job Satisfaction and
Organizational
Commitment.
International
Journal
of
Organizational Leadership, 7(2), 106–119.
[46] Pandey, C., & Khare, R. (2013). The Impact of Work Life Balance
Practices on Employee Performance of. Indian Journal of Health
and Wellbeing.
[47] Petrescu, A. I., Simmons, R. (2008). Human Resource
Management Practices and Workers' Job Satisfaction.
International Journal of Manpower, 29(7), 651-667.
[48] Pradhan, R. K., Jena, L. K., & Kumari, I. G. (2016). Effect of
Work–Life
Balance
on
Organizational
Citizenship
Behaviour:Roleof Organizational Commitment. Global Business
Review, 17(June), 15S-29S.
[49] Rasheed Olawale, A. V, M. FAPOHUNDA, T., & Foluso Ilesnmi,
J. V. (2017). Work-life Balance and Organisational Commitment:
Perceptions of Working Postgraduate Students. BVIMSR Journal of
Management Research, 9(2), 178–188.
[50] Rojuaniah. (2019). The Impact of Work Life Balance, Role
Conflict and Work Stress on Job Satisfaction in Women Doubles.
Call for
Papers FMI Samarinda.
[51] Rojuaniah. (2019). Job Satisfaction as a Driver of Organizational
Commitment Citizenship Behavior. Esa Superior University.
[52] Rowden, R. W. (2000). The relationship between charismatic
leadership behaviors and organizational commitment. Leadership
& Organization Development Journal, 21(1), 30–35.
[53] Sakthivel, D., & Jayakrishnan, J. (2012). Work life balance and
Organizational commitment for Nurses. Asian Journal of
ISBN: 978-93-5619-947-7
Business and Management Sciences, 2(5), 2047–2528.
[54] Sharma, N. And Singh, V. K. (2016). "Effects of workplace
incivility on job satisfaction and turnover intentions in India."
South Asian Journal of Business Research, Vol. 5 No. 2, Pp. 234249.
[55] Shastri, R. K., Shashi Mishra, K., & Sinha, A. (2010). 18 SSB,
Selection Centre East, Carriappa Road. African Journal of
Business Management, 4(10), 211001. Silva, R. C. Da, Dutra, J.
S.,Veloso, E. F. R., Fischer, A. L., & Trevisan, L. N. (2015).
Generational perceptions and their influences on organizational
commitment. Management Research, 13(1), 5–30.
[56] Sosik, J. A. (2005). The role of personal values in the charismatic
leadership of corporate managers: A model and preliminary field
study. Leadership Quarterly, 16(2), 221–244.
[57] Stefanovska–Petkovska,M., Petrovska, I., Bojadziev, M.,
Schaeffer, I., & Tomovska- Misoska, A. (2019). The Effects of
Organizational Culture and Dimensions on Job Satisfaction and
Work-Life Balance. Montenegrin Journal of Economics, 15(1),
99–112.
[58] Subramaniam. G, Ali. E, Overton. A. (2010). Are Malaysian
women interested in flexible working arrangement at workplace?
Business Studies Journal, Volume 2, Special Issue.
[59] Suma, S., & Lesha, J. (2013). Job Satisfaction and Organizational
Commitment: the Case of Shkodra Municipality. European
Scientific Journal, 9(17), 41–51.
[60] V.varatharaj, & S.Vasantha. (2016). An exploratory study on the
development of women entrepreneurs: Indian cases. Journal of
Research in Marketing and Entrepreneurship, 18(2), 232-247.
[61] Vlachos, P. A., Panagopoulos, N. G., & Rapp, A. A. (2013).
Feeling Good by Doing Good: EmployeeCSR-Induced
Attributions, Job Satisfaction, and the Role of Charismatic
Leadership. Journal of Business Ethics, 118(3), 577–588.
[62] Wang, D., Hom, P. W., Allen, D. G. (2017). Coping with
Newcomer "Hangover": How Socialization Tactics Affect
Declining Job Satisfaction during Early Employment. Journal of
Vocational Behavior, 100, 196-210.
[63] Weiss, D. J., Dawis, R. V., England, G. W. (1967). Manual for the
Minnesota Satisfaction Questionnaire. Minnesota Studies in
Vocational Rehabilitation, 22, 120.
[64] Wilderom, C. P.M., van den Berg, P. T., & Wiersma, U. A. (2012).
A longitudinal study of the effects of charismatic leadership and
organizational culture on objective and perceived corporate
performance. The Leadership Quarterly, 23(5), 835–848.
[65] Yucel, I., & Bektas, C. (2012). Job Satisfaction, Organizational
Commitment and Demographic Characteristics Among Teachers in
Turkey: Younger is Better? Procedia - Social and Behavioral
Sciences, 46(December), 1598–1608.
[66] Zhang, C. P., Liu, W. X., & Liao, J. Q. (2011). The affecting
mechanism of charismatic leadership on employee’s creativity: it is
enough to be with psychological safety? Management World
(Monthly), 10, 94-107.
21
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
A Simple Optical Method for Determination of the
Dielectric Constant of Salt (%) Water using
Ultraviolet Light
Prof. Samir A. Hamouda1, Maqboula Khamis Ibrahim2
1
Professor, 2M.Sc.Scholar
Physics Department, University of Benghazi, Libya
Abstract: Optical constants such as refractive index,
absorption coefficient, extinction coefficient and the real (εr)
and imaginary (εi) components of the dielectric constant for
NaCl salt water (10-50%) were determined from the UV
Optical transmission data. Results of UV transmission
analysis in salt water have shown that in dilute solutions the
dielectric constant (real & img) is linear. The addition of
dissolved Na and Cl ions above (50%) to water results in a
drop in dielectric constant.
Keywords : Optical Transmission Method; Refractive Index (N);
Extinction Coefficient (K); Salt Water; Dielectric Constant
ultraviolet electromagnetic radiation source and visible
light using spectrophotometer instrument.
Spectrophotometer produces light from spectrum
with certain wavelength and photometer is a measuring
tool of light intensity transmitted or absorbed [2][3].
Infrared, visible, and ultraviolet radiation is widely used
in scientific research, physics [4][5], astronomy [6][7],
medicine [8], chemistry [9][10], biology [11][12],
industry[13], and forensic science [14][15].
II.
I.
THEORY OF OPTICAL PROPERTIES
INTRODUCTION
Light is a part of electromagnetic spectrum, which
comprises other regions of electromagnetic radiation such
as radio, microwave, X rays, gamma-ray, and cosmic ray.
The spectrum of visible light (see figure1), depending on
the wavelength or frequency, consists mainly of infrared
with wavelengths approximately (930nm -3200nm),
visible (400-750 nm), and ultraviolet (300-400 nm) bands
[1].
The most important description of the amount of
radiation penetration into the material is the Linear
Attenuation Coefficient, which is a quantity that depends
on the energy of the incident photon and the atomic
number of the material. This quantity represents a fraction
of the energy lost from the incident photon for every 1cm
penetrated through the material. The unit of linear
absorption coefficient μ is cm-1. However, the
fundamental mechanism of quantitative analysis in optical
(absorption or transmission) methods is the Lambert
Beer’s law. According to Lambert –Beer’s law [16-21],
when a narrow photon beam of single energy hʋ0 and a
flux density I0 (the number of photons per unit area and t
time) falls on a homogeneous medium and penetrates it a
distance (x), the flux density of the transmitted photon
beam from this medium is I and is given as:
I(x) = I0 e -µ X
Fig.1: Shows a region of electromagnetic spectrum of
experimental interest
The basic idea of applying the optical methods or
optical Spectroscopies is to study how matter interacts
with or emits electromagnetic radiation. However, there
have been many different types of optical spectroscopy,
depending on the wavelength range that is being measured.
Infrared spectroscopy uses the lower energy infrared part
of the spectrum and ultraviolet spectroscopy uses the
higher energy ultraviolet part of the spectrum. Such
optical methods are used to determine the mechanical,
chemical, and electrical properties of matter. UV-Vis
spectroscopy is a spectroscopy analysis technique using
ISBN: 978-93-5619-947-7
(1)
Applying to liquids or solutions, Lambert-Beer’s law
states that the amount of radiation of infrared, visible, and
ultraviolet light, transmitted or absorbed by a solution is
an exponent function of substance concentration and
solution thickness [3]. Therefore, measurement of the
amount absorption and transmission by a solution allows
for the determination of electric constants, such as the
absorption coefficient (α), the extinction coefficient (k),
and the real and imaginary part of the dielectric constant
(εʹ and εʹʹ ) of the solution. In this paper, we report the
optical and electrical properties of salt water (%) from the
UV Optical transmission data. The optical property of a
transmitting medium are presented as the complex
dielectric constant and is given as:
22
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
ε = εʹ + εʹʹ
(2)
Where εʹ is the real part and εʹʹ is the imaginary part
of the dielectric constant of the medium. Both parameters
are calculated by the flowing formulas [22]:
εʹ = n2– k2
(3)
εʹʹ = 2nk
(4)
(concentration %), one is faced with either instrumenting
new spectrophotometric equipment or improving existing
equipment. The method described in this paper is the
result of the second consideration. In this UV
spectroscopy method, the spectrometer consists of light
source, UV filter, quartz cuvette, ammeter, power supply,
and photocell. Figure2 shows the main units of the optical
system. Distilled water was heated to boiling temperature
in order to release dissolved gases.
Where n is the refractive index, n is related to the
velocity of propagation of an electromagnetic wave
through the medium. K is the extinction coefficient which
is related to the loss of wave energy of the incident
electric field to the medium. Therefore, the optical
properties of the medium are governed by the interaction
of the electric field of the electromagnetic wave and the
medium. The refractive index (n) is related to the
transmittance (T) in the medium through the relation [23]:
Fig.2: The experimental set-up
n=
+
(5)
Transmittance is defined as ( ), where I0 is intensity
of light entering the sample and I is intensity of light
emerging from the medium. The absorption coefficient (α)
is defined as the ratio of the incident intensity of
electromagnetic waves per unit length in the direction of
wave propagation in the medium and is related to the
absorbance (A) and the thickness of the medium (d) as
[24]:
α=
Salt solutions were made from distilled water with
salt concentration (gram/liter) from (10-50%). However,
measurements of salt solutions were taken on two
consecutive days in order to achieve solution equilibrium,
and average results were taken. Measurements were
taken at 160C. The transmission data was recorded with
ammeter in the UV wavelength range of approx. 300 nm
to 400 nm and maximum transparency (366 nm).
IV. RESULTS AND DISCUSSIONS
(6)
The absorbance (A) is proportional to concentration
of absorbing medium compound and is given as [25]:
A = - log T
(7)
It can be seen from the relation (6) that the amount of
radiation of visible light that is absorbed by a medium
(solution), is proportional to the concentration and
inversely to the thickness of the medium. On the other
hand, the absorption coefficient (α) is related to the
extinction coefficient (K) and the wavelength (λ) of the
incident photons through the relation [26]:
α=
(8)
The relation (8) states that the absorption coefficient
(α) also depends on solvent, the molecular structure,
temperature and the incident wavelength.
III. MATERIALS AND METHODS
In considering optical methods for measurement of
light absorption and transmission in NaCl salt water
ISBN: 978-93-5619-947-7
Fig.3: Shows the refractive index of salt concentration (gram/litter)
from (10-50%) in water for UV wavelength (366 nm)
Figure 3 shows the refractive index of salt
concentration (gram/litter) from (10-50%) in water for
UV wavelength range of approx. 300 nm to 400 nm and
maximum transparency (366 nm). It can be seen from
figure3, that the refractive index of solution increases as
the concentration of solutions increases. This increase is
to a certain limit. Above 50% concentration no data was
obtained. This is due to the fact that, as the concentration
of solutions increases its density increases, there are more
molecules for the UV light to hit when it penetrates
through the solutions. As a result the penetration of UV in
the solution is blocked. Figure 4 shows the real and
imaginary parts of the dielectric constant of salt
23
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
concentration (gram/litter) from (10-50%) in water for
UV wavelength range of approx. 300 nm to 400 nm and
maximum transparency (366 nm). Calculations of the
(real & img) parts of the dielectric constant were carried
out with UV wavelength (366 nm).
applications. Both (n, k) were determined from the
transmission (T) of UV light through NaCl water solution.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
Fig.4: The effect of NaCl salt concentration on the real (a) and
imaginary (b) parts of the dielectric constant for UV wavelength
(366 nm)
It can be seen from figure4; that in dilute solutions
the dielectric constant real (a) and imaginary (b) are linear.
The addition of dissolved Na and Cl ions to water results
in a drop in dielectric constant of water (~80) due to the
fact that the densities of solution reach a saturation level
and the solution become an electrically conductive. The
dielectric constant is an indicator of how easily an
insulating material can be polarized as a result of an
external electric field applied to it. The dielectric constant
is an indicator of how easily an insulating material can be
polarized as a result of an external electric field applied to
it. The NaCl ions produce electric fields that polarize the
water dipoles, which is opposite to electric components of
the UV electromagnetic wave.
V. CONCLUSION
The study of dielectric constant of NaCl salt water (%)
gives important information about the nature of molecules,
ions and their physical mechanisms in the solution. The
optical constants of NaCl salt water, such as refractive
index (n), absorption coefficient (α), extinction coefficient
(k) and the real (εr) and imaginary (εi) components of the
dielectric constant are important factors for optical
ISBN: 978-93-5619-947-7
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
Samir A. Hamouda and Maqboula Khamis Ibrahim., “Knowledge
and Experimental Techniques”, Engineering and Scientific
International Journal (ESIJ), Volume 8, Issue 4, October –
December 2021, pp. 156-159.
Yang Sing Leong et. al., "UV-vis spectroscopy: A new approach
for assessing the color index of transformer insulating oil." Sensors,
Vol. 18, Issue no. 7, 2018, 6 July,, PP. 2175.
Rahmi Dewi, et al., “Characterization of Optical Properties of
Thin Film Ba1-xSrxTiO3 (x= 0,70; x= 0,75; and x=0,80) Using
Ultraviolet Visible Spectroscopy”., The 8th National Physics
Seminar, AIP Conference Proceedings vol. 2169, 2020, : 05 May,
PP. 040001-1-040006.
B L Diffey, “Ultraviolet radiation physics and the skin”, Phys. Med. Bio.,
V01. 25. No. 3, 1980, PP. 405-426.
Hanns Moshammer, et. al. “UV-Radiation: From Physics to
Impacts “, Int. J. Environ. Res. Public Health, vol. 14, Issue 2,
2017, 17 February, PP. 200.
A Vidal-Madjar, et. al. “Galactic ultraviolet astronomy”, Rep.
Prog. Phys, vol. 50, 1987, PP. 65-113.
James Lequeux., “The Rise of Ultraviolet Astronomy in France”,
Journal of Astronomical History and Heritage, vol. 24, issue 1,
2021, PP. 83‒97.
Edwin C. McCullough., ” Optical Radiations In Medicine A
Survey Of Uses, Measurement And Sources”., American
Association of Physicists in Medicine. AAPM REPORT NO. 3,
1977.
C. Bosch Ojeda and F. Sánchez Rojas, “Process Analytical
Chemistry: Applications of Ultraviolet/Visible Spectrometry in
Environmental Analysis: An Overview, vol.44, Issue 3, 2009, 2PP.
245-265.
Robina Begum. et al., “Applications of UV/Vis Spectroscopy in
Characterization and Catalytic Activity of Noble Metal
Nanoparticles Fabricated in Responsive Polymer Microgels: A
Review”, Critical Reviews in Analytical Chemistry, vol.48, Issue
6, 2018, PP. 503-516
Jessica Roberts, et.al. “The Use of UV-Vis Spectroscopy in
Bioprocess and Fermentation Monitoring”, Fermentation, vol. 4,
Issue 1, 2018, 13 March, PP. 18.
Kwan-Hoong Ng.” Non-Ionizing Radiations–Sources, Biological
Effects, Emissions and Exposures”., Proceedings of the
International Conference on Non-Ionizing Radiation, 2017.
Peter Swanson., “Advances in Light Curing Adhesives and
Coatings Lead to Process and Quality Benefits in Electronics
Manufacturing”., White Paper, Intertronics, 2017.
Dzulkiflee Ismail, et. al.” Ultra-Violet and Visible (UV-VIS)
Spectroscopy and Chemometrics Techniques for Forensic Analysis
of Ballpoint Pen Inks: A Preliminary Study”, Malaysian Journal of
Forensic Sciences, vol 5, Issue 1, 2014, January, Pp. 47-52.
Mahmut Asirdizer et al., “Usage of Infrared-Based Technologies in
Forensic Sciences”., Intech Open, 2016, 7 September.
W. Heitler, “The Quantum Theory of Radiation”, (Oxford
University Press, London), England, 1944, p. 49.
R. D. Evans,, “The atomic nucleus”, McGraw Hill Book Company,
Inc., New York.1955.
C. M. Davisson and R. D. Evans, “Gamma-ray absorption
coefficient‟. Rev. Mod. Phys, Vol.24, 1952, 79-103.
Harvey Hall, “The theory of photoelectric absorpt ion for xrays and
Gamma-rays”, Reviews of modern physics”, Vol 8, 1936, pp358377.
J. Hubbel, “Photon mass Attenuat ion and Energy- Absorpt ion
Coefficients from 1keV to 20keV”, Int. J. appl. radiat . isot , .vol
33 , 1982, pp1269-1290.
Nat ional Bureau of Standarads “Photon Cross Sect ions, Attenuat
ion Coefficient, and Energy Absorpt ion Coefficients from 10 keV
to 100 GeV”, U.S. Department of Commerce, 1969.
S. Singh, Et Al), “Investigation Of Optical Constants And Optical
Band Gap For Amorphous Se40-Xte60agx Thin Films”.,
Chalcogenide Letters, Vol. 14, No. 4, 2017.
24
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
[23] R Swanepoel., “Determination of the thickness and optical
constants of amorphous silicon”., J. Phys. E: Sci. Instrum,.16, 1983,
pp. 1214.
[24] Imen Ben Saad, et al., “Optical, UV-Vis spectroscopy studies,
electrical and dielectric properties of transition metal-based of the
novel organic–inorganic hybrid (C6h10n2) (Hg2cl5) 2.3h2o”,
Journal Of Advanced Dielectrics., Vol. 9, No. 5, (2019).
ISBN: 978-93-5619-947-7
[25] Martin Vejražka., “Optical Methods In Biochemistry”, Institute Of
Medical Biochemistry, (2009).
[26] S. Singh and S. Kumar. “Investigation of Optical Constants and
Optical Band Gap for Amorphous Se40-Xte60agx Thin Films”,
Chalcogenide Letters, Vol. 14, No. 4, April 2017, p. 139 – 146.
[27] R Swanepoel., “Determination of the thickness and optical
constants of amorphous silicon”, J. Phys. E: Sci. Instrum, vol. 16,
1983, p 1214.
25
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Growth Perspectives of Small Tea Growers –
A Study in Golaghat District of Assam
Anitabh Kakoty1, Dr. Ratan Kaurinta2
1
Research Scholar, Department of Commerce, Nagaland University, Kohima Campus, Meirima
Associate Professor, Department of Commerce, Nagaland University, Kohima Campus, Meirima
2
Abstract: The growing prominence of small tea growers in
the tea producing landscape has an overwhelming effect on
the decision of its raw material or green tea leaf. The small
tea growers also have an inclusive role to ignite the
entrepreneurship in the people who were outside its orbit.
The transition which is taking place due to growing numbers
of small tea growers to the quality of life and overall day to
day economic activity is immense. The role of the institutions
and market scenario is also changing due to changes in
overall organizational growth. However the study in intended
to unveil the contribution of small tea growers in a
multidimensional approach.
Keywords: Small Tea Growers; Growth; Socio Economic Impact;
Institutional Role; Market Scenario
I. INTRODUCTION
The cultivation of tea has been regarded as a
profitable venture for the cultivations. Tea is grown in the
region with presence of all favourable factors ranging
from soil quality, adequate monsoon shower, availability
of uplands and accessibility to the market with requisite
demand and prevalence of a tea going culture. During the
colonial period in India, Assam, West Bengal, Tamilnadu
and Karnataka joined into the production of tea. Among
the tea growing states Assam was the pioneer in
production of tea.
Till seventh plan period, the growth of tea in Assam
in the large tea estate segment was significant. But it
exhibited a reasonable decline after that period. Sarma,
Atul (2012) et.al; has cited that the decay in the production
growth of the tea is due to the fall in the yield potential
which has become as common phenomenon for most of
the tea growing states in India. Post 1990s or from the
eighth plan period, a major shift in the production of tea
took place in a new form of small holdings and the
growers are most popularly known as the small tea
growers or STGS which has an acreage of 10.12 hectare
or below as per definition provided by the Tea Board of
India. Small Tea growers do not possess processing units
and they supply the raw materials which is green leaves
only. The demand for Indian tea is highly tilted towards
the domestic market and some percentage in the global
market. The increase in the demand for tea in any of the
market could not be matched by the supply of existing
large estates till 1990s. Moreover the large estates has
statutory and management problems to expand and due to
this reason, any additional demand in tea needs to be
ISBN: 978-93-5619-947-7
fulfilled by the small tea growers. Due to this reason,
small tea growers had a significant growth during the
period (Bhowmik K. Sharit 1991).
The sall tea growers in Assam are the new segment of
tea growers with entrepreneurial skills, motivation and
resources which joined the supply chain for green leaves.
The Golaghat district of Assam falls in the South Bank
agro-climatic zones and has a sizeable number of small tea
grower which is almost 13761 in number as per estimate
of Tea Board of India, land coverage of 13900hectares and
production of 224.58 Million Kgs green leaves in the year
of 2020.
II. ROLE OF SMALL TEA GROWERS IN TEA
INDUSTRY
Tea industry in India is becoming highly competitive
due to the situation in world exports and in home market.
India has a sizeable market in the domestic market with
almost 70 percent of processed tea is consumed within the
country. India is a populous country with a growing
population which also adds new demand to the tea
industry. In external market, Indian tea is facing shift
competition from China, Kenya and Srilanka.
Small tea growers with a trade-off arrangement with
the large estates are steadily contributing its product to the
processing units. As the large estates have been suffering
due to falling productivity caused by old aged bush,
restrictions due to statutory control, prevalence of labour
acts, ecological issues and other management problems,
they have to rely more on small tea growers for green
leaves which is the main raw material for producing made
Tea. This has resulted in the growth of small tea growers
which is accompanied by other motivating factors such as
profitable cash crop, conducive climatic and soil condition,
and cultural proximity towards its cultivation, available
labour pool and requirement of low investment.
The small tea growers are multiplying rapidly in
numbers in Golaghat district of Assam. It is contributing
significantly to the socio-economic status, changes to the
institutional role and scenario of overall market. The
growth of STGs can be viewed in terms of its production
level, productivity and acreage. The small tea holding of
tea in south India is being managed and cultivated by
household units as compared to the large corporate houses
who indulged in large scale tea. Hayami, Yujiro (2004)
26
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
and
Damodaran A. (2004).In Himachal Pradesh, the
small tea growing business is identified as cottage industry
as per study of Kumar, Ajay (1998). Hannan (2019) has
cited that the small tea growing business is more of family
farm and it is widely accepted in the North Bengal due to
its less perishable property and permanent nature.
III.
LITERATURE REVIEW
Small tea growers is bringing transition to the rural
economy in the state of Assam. Sarma, Chandan (2017)
et.al; has opined that small tea growers has generated the
scope of self-employment, expansion of allied economic
activities, ensuring a continuous source of income or as an
additional source of income. Bora Kaberi (2015) and Das
and Hazarika Kakali(2015) has indicated that commercial
tea cultivation in small tea holdings were initiated in
Golaghat district in 1978 which is due to the reason of
people had knowledge of this form of cultivation,
Proximity to the processing factory, skilled workers from
the large estates and ready market for promotion. Das, 
Kalyan (2014) has revealed in his studies that an
advantage of plantation crops over the other crops are
cultivated in seasons has encouraged to adopt small tea
plantation meant for small and marginal farmers. The land
owning communities in the state has also considered the
small holding tea cultivation as an economic activity.
However, stagnancy in production of tea estates induced
the tea growers to multiply. Renko et.al (2012) has
expressed that perception shapes one’s mind by
percolating into it to visualize a strategy for decision
making. Aan Hardinyana (2015) has identified perception
to be a collective force decides on continuity with the
existing organisation and whether to give effort for an
achievable goal. Market for agricultural products has
involvement of all direct and indirect participants making
a chain from production to consumption where
institutional support largely effect the market, As per Petro,
Putsentielo (20200 et.al; the development and efficient
functioning of agricultural sector is linked to the
development of its institutions and market transformation
can be brought by institutional transformation.
IV.
Small tea growing has become a necessity for the tea
growing region of Assam. It is due to this reason, a careful
and thorough research should be conducted on STGs
growth and perspectives related to the growth so that it
can provide insight to the real situation connected to the
growth of the STGs and any problems inherited by it.
V.
OBJECTIVES OF THE STUDY
Small tea growers since its growth in Golaghat district
of Assam have a strong impact on the development. A
conscientious effort has been made to evaluate the
development scenario of this region with the help of this
study. The main objectives of this study are:
 To identify the changes in perception of socio
economic status due to STGs in the region.
 To assess the perception on changes in institutional
role.
 To evaluate the perception on market expansion due
to STGs presence.
VI. METHODOLOGY
A descriptive is conducted by using multistage
random sampling. Primary data for this study was
collected by administering a structured questionnaire for
120 sample of respondents. Respondents are chosen from
the STGs of eight development blocks of Golaghat district
of Assam. Secondary data are referred from reports and
publications for calculation of growth rate by using CAGR
or compounding average growth rate method. Various
resources are accessed from e-journals, books and
research reports.
For this study Likert Scale of five point scale is being
utilized where 5=Strongly agreed,4=Agreed,3=No
response,2=Disagree and 1=Strongly disagree. Cronbach’s
Alpha was calculated for checking the consistency and
reliability of the dimensions of the questions. Responses
are tested by using Z-Test, variance and other descriptive.
VII. SMALL TEA GROWERS IN GOLAGHAT
DISTRICT
SIGNIFICANCE OF THE STUDY
Small tea growers are contributing to the tea
production landscape along with its growth. The growth of
STGs has provided employment to a number of
individuals and households by elevating their financial
position and bringing change to their quality of live. With
the emergence of STGs, the cash flow situation of the
cultivators is improving and they are visibly in a better
financial stability.
In a state like Assam where the employment
opportunity is minimal with a dismal performance of
Industry. The cultivation of tea in small holdings is
contributing to the development of the state and especially
to the people who are highly dependent on cash crop.
ISBN: 978-93-5619-947-7
In Golaghat district, small tea growers are sizeable in
numbers. According to estimates of Tea Board of India,
the district has 13081 number of STGs are registered
which covers a total acreage of 118.5 ha. STGs in
Golaghat district gained momentum due to policy of the
Government of Assam in 1978, motivation among the
educated youth, nearness to the tea processing units,
simultaneous growth of bought leaf factories, availability
of uplands with favourable soil fertility, presence of labour
pool with a tea growing culture, initial boost from large
estates and rising in number of nuclear family with search
for additional income source. In the year of 2012, the
number of STGs was 1387 which increased to 13106 in
2019. The large tea estates in Golaghat district which are
struggling with productivity is also dependent on STGs for
27
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
green tea leaves. The bought factories in the district is
getting boost for easily available raw materials from STGs.
Expansion of tea market is taking place due to additional
processing capacity of bought leaf factories with
111930500 kgs of green leaves per year as per estimates
of Tea Board. Small tea growers are also linked to the
industries which provides agronomical inputs. It is
estimated that total consumption demand for fertilizers
and nutrients necessary for growth of tea plants has a high
yearly demand of 16263000 Kgs which also creates
opportunities of new business connected to the small tea
growing industry.
VIII. PROFILE OF GOLAGHAT DISTRICT
Golaghat district of Assam comes under the South
Bank agroclimatic region of the state. The district has all
conducive factors for cultivation of tea. It has eight
developmental blocks namely Gomari, Morongi,
Kakodonga, Padumoni, Bokakhat, Dergaon, Sarupathar
and Kathalguri which has an almost homogeneous number
of small tea growers. Golaghat district has a total
geographical area of 3502 Sq. Km. The total population of
Golaghat district is 10,16,888 as per census of 2011 of
which 5,43,161 are males and 5,23,727 are females. The
average literacy of the Golaghat district is 77.43 percent.
IX. MAJOR FINDINGS AND DISCUSSIONS
concentration with business, salaried and as an additional
source of income. The family size wise 70 percent in the
above 3 family size category and rest of 30 percent is in
the 1-3 category with a male dominated participation in
this small tea growing.
Table2. Growth Performance of STGs in Golaghat district (Period2011-2020)
S. No.
Items
CAGR
1
Production level
12.6
2
Productivity
0.6*
3
Acreage
22.3
4
No. of STGs
28
Source: Tea Board of India Statistical Handbook of
Assam
Table 3. Reliability of perception of respondents on growth of STGs
in Golaghat district during 2011-2020(N=120)
S.
No.
Items
1
Better market
access
Administrative
services are
available
Availability of
better financial
support
Creating more
skills through
training
2
3
Table 1. Demographic Profile of the respondents
Factors
Classifications
Age
25-40
40-50
50-60
Female
Male
Single
Married
Illiterate
HSLC
HSSLC(10+2)
Graduate and above
1-3
3>
Business
Farming
Salaried
Addition to other
source
Gender
Marital
status
Educatio
nal
qualificat
ion
Occupati
on status
No of
respondents
30
60
30
108
12
30
90
12
12
48
48
36
84
36
60
12
12
Percenta
ge
25
50
25
90
10
25
75
10
10
40
40
30
70
30
50
10
10
Source: Survey
The survey was conducted based on a structured
questionnaire administered on the small tea growers of
Golaghat district. The demographic profile on the
respondents is being assessed on the basis of the responses.
Demographic composition of the respondents shows in
case of age distribution to be more in middle aged section.
The primary occupation as a farming has higher
ISBN: 978-93-5619-947-7
4
Me
an
Standard
deviation
Z
Sig
4.76
.42
44.33
.000
4.73
.48
38.55
.000
4.61
.48
36.74
.000
4.69
.46
64.05
.000
Source: Survey
However ,different perspectives of growth can be
evaluated with the help of parameters such as changes in
socio economic status ,role of the institutions and changes
in the market scenario which is crucial for the all round
development of the region. The changes in socio economic
status, role of the institutions and changes in market
scenario has four dimensions. The Cronbach’s Alpha for
the dimensions has score value as 0.748, 0.758 and 0.826
which shows higher consistency and reliability.
Table 4. Changes in socioeconomic status of STGs (N=120)
S.
No.
1
2
3
4
Items
Level of
income
Increase in
saving
potential
Improvement
in quality of
life
Social security
status
Me
an
4.9
Standard
Deviation
.30
Z
Sig
69.57
.000
4.8
.31
65.07
.000
4.7
.46
40.48
.000
4.71
.45
41.38
.000
Source: Survey
28
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
The STGs are changing the socio economic status of
the Golaghat district of Assam. It has attracted a number
of new cultivators to adopt their new form of cultivation
as it is a perennial crash crop. The result shows that higher
mean value in responses for level of income, increase in
savings potential, improvement in quality of life and better
social security status. Low standard deviation indicates a
strong agreement in favour of improvement in socio
economic status with a stability. The dispersion of
responses is less as more responses are in agreement with
socio economic status.
Table 5. Role of Institutions (N=120)
S.
No.
1
2
3
4
Items
Mean
Z
Sig
4.8
Standard
deviation
.38
More demand in
the market
Market is
expanded
Creating more
opportunity
Better price
realization for the
STGs product
51.88
.000
4.7
.44
42.32
.000
4.6
.48
36.51
.000
4.7
.46
39.76
.000
creates a difficult situation to understand the intended
questions.
XI. CONCLUSION
The study has identified the different growth
perspectives and its impact on life and livelihood of the
small tea growers and the stakeholders in the Golaghat
district of Assam. The cultivation of tea in the small tea
holdings has uplifted the socio economic status of the
people by streamlining a steady flow of income and
ensuring social security. The market scenario is visibly
changing with its expansion and opening up of different
entrepreneurial ventures due to rise in demand of it. Role
played by the institutions in this field is significant while a
structured administrative support is present with training
for skill formation. Informal financial support which is
present in the market is fulfilling the need of the small tea
growers.
REFERENCES
[1]
[2]
Source: Survey
[3]
As the standard deviation is slightly dispersed with
higher mean value which shows a higher tilt towards a
strong perception on better market access for the STGs
product. The availability of the administrative services has
a perception to be as per expectation. Perception on
financial support which are being informally provided
during contingency by bought leaf factories or by leaf
collection agents is positive. The skill formation through
participation in training is perceived to be positive among
the STGs.
The result shows a higher shift of responses towards
in agreement with the dimensions of changes in market
scenario and variation seen is low. With the entry of more
number of STGs in Golaghat district and changes in
production scene, more numbers of bought leaf factories
are established. The opportunities in the market are
increasing during the period with possibilities of setting
up number of entrepreneurial ventures related to the
industries. However price realization for STGs product
has a positive perception in the sense that cultivators can
continue with this existing price received against their
product.
X.
LIMITATIONS OF THE STUDY
The limitations of the study may be due to the time
constraint in relation to the geographical area .It was
difficult to include respondents at the remote places due to
the infrastructural deficiency. The small tea growers are
mostly marginal farmers with low literacy level which
ISBN: 978-93-5619-947-7
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
Bhowmik, Sharit.(2012).Labour Costs and Productivity. Economic
and Political Weekly, Vol.47.No.18, pp.30-32
Bora, Kaberi., Hazarika, Kakali.,(2013).Small Tea Cultivation in
the Process of Self Employment: A Study on the Indigenous People
of Assam (India).International Journal of Latest Trends in Finance
and Economic Sciences,Vol3, No.2.
Das, Kalyan.(2014),The Tea Smallholdings of Assam Guwahati:
DVS Publishers.
Hannan, Abdul.,(2019).Farm Size and Trade Relations of Small
Tea Growers(STGs) in Assam and North Bengal. Social Change
and Development.Vol.16.No.2
Hardiyana, Aan.,Yusup, Maulana., Sidharta, Iwan, (2015). Work
and Commitment on Employee
Satisfaction. Study on Non–
Ministerial Government Agencies in Bandung Indonesia. Retrieved
from
https://mpra.ub.unimuenchen.de/77075/1/MPRA_paper_
77075.pdf on 21st of April, 2021.
Hayami, Yujiro.,Nayar,Appukuttan Damodaran.,(2004). Towards
an Alternative Agrarian Reform: Tea Plantations in South Africa.
Economic and Political Weekly.39 (36)
Kumar, Ajay. (1998). Financial Performance of Tea Co-operatives
in Himachal Pradesh_ a case study of Kangra district [Doctoraal
dissertation, Himachal Pradesh University]. Shodhganga : a
reservoir of Indian theses @ INFLIBNET. https://shodhganga.
inflibnet.ac.in/handle/10603/120654.
Mishra, K, Deepak.,Upadhyay,Vandana., Sarma ,Atul., (2012),
Unfolding Crisis in Assam’s Tea Plantation. New Delhi: Routledge
Publishers.
Petro, Putsentilo., Yuriy, Klapkiv., Vitali, Karpenko &I rina, Gvo
Decka., (2020). Bulgarian Journal of Agricultural Science, Vol.
26(1), pp-23-33.
Renko, M.,Shrader, & R.C., Simon, M., (2012).Perception of
entrepreneurial opportunity :a general framework .Manage. Decis.
50.1233-12.
Sarma , Kumar, Chandan and Baruah, Prarthana. (2017).’Small
Tea Plantation and Its Impact on the Rural Landscape of
Contemporary Assam. International Journal of Rural Management,
Vol. 13(2), pp.140-161.
Tea
Board
of
India
Reports,
Retrieved
from
https://www.teaboard.gov.in/TEABOARDPAGE/ODA= on 21st of
April, 2021.
Statistical
Handbook
of
Assam,
Retrieved
from
https://des.assam.gov.in/documents-detail/statistical-hand-book on
21st of April, 2021.
29
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Effective Learning and Classification using
Random forest Algorithm
Seema Rani1, Dr. (Prof.)Mukesh Singla2
Research Scholar, Department of Computer Science, Baba Mastnath University,Asthal Bohar, Rohtak
2
Dept. of Computer Science, Baba Mastnath University, Asthal Bohar, Rohtak
1
Abstract:
Randomization is provided in two ways:
bootstrap samples are randomly sampled, and input
attributes are randomly selected for each base decision tree.
Random Forest's generalization error is heavily influenced
by the strength and correlation of each decision tree's base
trees. It is comparable to existing ensemble methods like
bagging and boosting when it comes to accuracy. The
collection of data is an important step in the development of
an intelligent system. This research present 3-year student
physical education data, which includes 3216 randomly
chosen instances, includes 2000 positive samples and 1216
negative samples of data. Signatures derived from the
dataset verified the classification accuracy of Naïve Bayes
Algorithm, Random Tree and NN. Random tree based
approaches obtained a classification accuracy of 99.88
percent.
Keywords: Random forest (RF), decision tree (DT), Random
tree based, Algorithm
I. INTRODUCTION
Random Forest (RF) is a supervised machine
learning approach that uses an ensemble of individual
models. Data mining is a field in which machine learning
is used. In Breiman's Random Forest [Breiman 2001], a
decision tree serves as the basis for classifying input data.
Multiple decision trees are generated using Random
Forest. First, bootstrap samples are generated via random
sampling of data, and second, the input characteristics for
each base decision trees are randomly selected. Individual
decision trees and the connections between base trees
have the most impact on Random Forest's generalization
inaccuracy. It is comparable to current ensemble
approaches like bagging and boosting in terms of
accuracy.
There is a lot of evidence to support Breiman's claim
that Random Forest is effective in large databases
because it can handle a large number of input variables
without deleting any of them. Random Forest also
provides estimates for important variables, as well as an
internal unbiased estimate of generalisation error as the
forest grows. An ensemble of unsupervised models is
used in the Random Forest (RF) supervised machine
learning approach. Data mining is a field in which
machine learning is used. The decision tree serves as the
foundation for Random Forest [Breiman 2001]. Using
random sampling for bootstrap samples and selection of
input attributes to generate individual base decision trees,
both Bagging and Random Forest and countless decision
trees employ random sampling and random selection.
ISBN: 978-93-5619-947-7
Individual decision trees and the connections between
base trees have the most impact on Random Forest's
generalization inaccuracy.
II. LITERATURE REVIEW
QINGXIANG XU ET.AL (2021) With its
tremendous influence on both people and societies,
learning has been an important growing area for some
decades now since it is a major determiner of global
civilization and development. Increasing worldwide
literacy rates may be attributed in large part to bettering
the current educational programs and materials. Since it is
the main mechanism by which students are assessed
during their studies, assessment is one of the most
important educational activities. When it comes to
evaluating students' performance in physical education
activities and grades, the administration of higher
education must establish an intelligent varied teaching
assessment model that pays attention to the development
of students' personalities and potential.
This study use factor analysis and an improved
random forest method to condense the aspects of students'
multimodal triumphs in physical education into a few
common criteria that may be utilised to improve their
performance. Students' achievements may be more
accurately evaluated using the proposed technique.
Research on student grade assessments is the first to use
an improved random forest approach. Automated grade
evaluation is based on students' grades across many
disciplines and the number of factors that represent their
performance. The proposed improved random forest
approach was put to the test against the current machine
learning models in a series of experiments. Researchers'
tests found this model to be superior to the other machine
learning models in terms of precision, recall and f1-score
accuracy and precision. The physical education system is
expected to benefit greatly from the introduction of the
new system.
Maria Elena Castiello Et.Al (2021) - Traditional
archaeology questions, such as the study of settlement
patterns, are combined with the most cutting-edge
Machine Learning technologies in this study to
demonstrate the value of combining these two
approaches. Random Forest is an ensemble learning
technique based on decision trees that we utilized in the
canton of Zurich, Switzerland, to undertake
archaeological predictive modelling (APM). This was
30
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
accomplished using information gleaned from a database
of Roman archaeological sites. Decision-making and
probabilistic reasoning tools relevant to the assessment of
archaeological risk and protection of cultural treasures are
provided by this system. Machine learning techniques
may learn from data and generate predictions by
modelling the hidden connections between a group of
observations that represent the dependent variable and the
independent variables. Assuming the information you've
already gathered This investigation's major purpose is to
ascertain whether or not Roman colonization occurred in
the studied area. A probability map showing the
possibility of discovering a Roman site in various areas
was created, as were rankings of the geo-environmental
factors that influence the likelihood that archaeological
sites would be discovered. These are our findings:
All these outputs are critical to evaluating the data's
veracity, as well as inspiring specialists in a number of
various ways. Furthermore, these findings aid in assessing
the advantages and drawbacks of using such cutting-edge
methods and, in the long run, aid in investigating how
well
machine
learning-based
models
handle
archaeological data.
Matthias Schonlau Et.Al (2020) - There is a
statistical or machine learning approach called random
forests that may be used for prediction. Forest is a new
command that we'll cover in this tutorial. The random
forest method is introduced and shown with two
examples: In the first example, a credit card user's
likelihood of defaulting on his or her debt may be
predicted using a classification issue. An online news
article's number of shares may be predicted using a
regression problem. We'll wrap things off with a quick
recap of the main principles made clear by the examples.
M.Sumathi Et.Al (2019) - When it comes to
monitoring public cloud user data privacy, machine
learning-based Data Privacy is becoming an increasingly
essential aspect in the overall effectiveness of the public
cloud. Currently, data owners are ready to safeguard their
data from unwanted trainers and users while using
machine learning algorithms to classify their data.. Data
sources with multiple owners are not allowed to be
classified using the present privacy-preserving
classification approaches.
As a result, the process of learning is dependent on
knowledge that has a single owner. The current
classification algorithm will not be able to rapidly and
properly classify multi-owner data. As a result, a different
method is needed to manage the categorization of many
owners of data while yet protecting privacy in the storage
system.
There is no need for the trustworthy curator to be
involved in the categorization of multi-owner data
sources when using our privacy-preserving random forest
technique. The random forest classification approach is
ISBN: 978-93-5619-947-7
utilized for classification and the Advanced Encryption
Standard (AES) technique is employed for the purpose of
maintaining the privacy of statistical information between
the sender and recipient. Student grade system analysis
and classification is carried out in a different way, such a
horizontal and vertical data division procedure, via the
classification process. Vertical division is used when
specific topic information are needed, but horizontal
partition is used when an individual student's data is
needed.
The information of the user is then safeguarded
using the AES encryption method. The proposed machine
learning-based classification approach with AES gives
improved privacy to user-sensitive data when compared
to current classification and privacy preservation
strategies.
Yunchuan Kong Et.Al (2018) Using gene
expression data in predictive modelling presents a unique
set of challenges since the number of samples (n) is
significantly fewer than the number of characteristics (n
(p). "n p" properties have prohibited the use of deep
learning approaches for gene expression data
classification in other disciplines, such as picture
classification, where "n > p" situations have proven
successful. In addition, To do archaeological prediction
modelling, the canton of Zurich, Switzerland, used
Random Forest, an ensemble learning approach based on
decision trees (APM). Information from a database of
Roman archaeological sites was used to do this. This
system offers decision-making and probabilistic
reasoning capabilities related to archaeological risk
assessment and cultural asset conservation.
Modeling the hidden connections between a series
of observations that reflect a dependent variable and the
independent variables may be done using machine
learning methods. Assuming you've previously gotten
enough information. The primary goal of this inquiry is to
determine whether or not Roman colonization happened
in the investigated region. Two RNA-seq expression
datasets are used to test the capabilities of fDNN in
simulation and actual data analysis. Current prediction
models may benefit from the technique, which has been
shown to improve classification accuracy and select
feature meaning when compared to standard random
forests and deep neural networks
.
III. METHODOLOGY DATA SET COLLECTION
AND CHARACTERIZATION
Using gene expression data in predictive modelling
presents a unique set of challenges since the number of
samples (n) is significantly fewer than the number of
characteristics (n (p). "n p" properties have prohibited the
use of deep learning approaches for gene expression data
classification in other disciplines, such as picture
classification, where "n > p" situations have proven
successful. In addition, the lack of useful characteristics
31
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
and Further complicating the task of classifying gene
expression patterns is the absence of correlation
structures. Forest Deep Neural Network.
Table 1. Classification Feature Selection accuracy
Techniques
Genetic algorithm
AIS
AIS with PCA
AIS + Fisher score feature
selection
Classification accuracy
98.65%
99.35%
99.54%
97.90%
wide range of variable parameters, and making intuitive
judgments about the relative relevance of those variables.
Algorithms such as the RF algorithm have been proved to
be more resilient and stable while maintaining a high
level of efficiency in more and more algorithm
competitions and practises.
IV. RESULT
PCA and the fisher score are used to determine
which features should be included in the model. Table 3.1
displays the results of the categorization accuracy
calculation.
fDNN is a new classifier that combines a deep
neural network's architecture with a supervised detection
of forest attributes to address these problems. To avoid
the problem of overfitting, a neural network may be used
to process sparse feature representations and input them
into the network. fDNN's simulation and real-world data
processing skills are both put to the test using two RNAseq expression datasets. Current prediction models may
benefit from the technique, which has been shown to
improve classification accuracy and select feature
meaning when compared to standard random forests and
deep neural networks.
3.1 The Classification Models Used in this Study
Classification is a common use of data mining and
machine learning. The class label of each occurrence in
the training set is known before training in a classification
model, and this knowledge is used to design a learning
algorithm. As a last step before putting, it to use, the test
set allows us to see how well the classification model
performed during training. Top-down and clear-cut
decision tree classification is one of the most used ML
classification methods. Deciduous trees are used to divide
observation data into mutually exclusive subgroups until
there is no statistical difference.
As using PCA-based feature selection, the AIS with
Fisher score-based feature selection enhanced accuracy
by 0.7632 percent when compared to Genetic algorithm.
This is shown in the figure 3.1.
3.2 The Proposed Random Forest Classification
Algorithm
4.1 Feature Extraction using Random Forest
Technique
Many sub models make up the random forest (RF)
method, which was introduced by Leo Breiman and
Adele Cutler in 2010. The final output is generated by
combining the results of all of the smaller sub models. It
is a typical method in machine learning (ML) for
classification, regression, or other sorts of learning. RF is
an example. In order to categories data from the original
dataset, the RF approach employs a bagging algorithm.
Decision tree models are created for each group after
training. To generate the final RF model, all of the
decision data from the subsmall models is integrated and
examined. The voting procedure determines the final
prediction result of the RF algorithm, and the
classification that receives the most votes is the
algorithm's final output. For classification, RF method is
more effective than other classification algorithms. It's
capable of handling vast amounts of data, supporting a
After the Dataset has been prepared, a correlation
test is carried out among the various qualities or features.
The Pearson correlation model was employed to analyze
the data. Two or more random variables may be
correlated using a correlation model, which generates
values between +1 and -1 inclusive. A matrix of
associated characteristics was generated as a
consequence. Figure 3.2 depicts the relationship between
several characteristics. There is a range of +1 to -1 for the
correlation of attributes, with +1 indicating complete
positive correlation, 0 representing no correlation, and 1
representing total negative correlation.
ISBN: 978-93-5619-947-7
Fig.1: Feature Selection Graph
In order to identify those qualities that are reliant on
other factors, a correlation model of the dataset is
required. The correlation model is used to identify the
dependent aspects in the data. The random forest
32
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
approach is used for a second test of feature significance
identification after the correlation test of the dataset.
[8]
[9]
[10]
[11]
[12]
[13]
[14]
Jehad Ali et.al “Random Forests and Decision Trees” Vol. 9, Issue
5, No 3, September 2012
Baoxun Xu et.al “An Improved Random Forest Classifier for Text
Categorization” VOL. 7, NO. 12, DECEMBER 2012
Herold, T. et al. A 29-gene and cytogenetic score for the
prediction of resistance to induction treatment in acute myeloid
leukemia. Haematol. haeatol–2017
Classification algorithms - random forest Tutorialspoint [cited
2020Dec19]
https://www.tutorialspoint.com/machine_learning_with_python/m
achine_learning_with_py
thon_classification_algorithms_random_forest.htm
tojiljkovic M 2019 Linear regression in python Real python [cited
2020Nov19]
https://realpython.com/linear-regression-inpython/#implementing-linear-regression-inpython
Probst P, Boulesteix A L and Bischl B 2019 Tunability:
Importance of hyperparameters of machine learning algorithms,
Journal of Machine Learning Research 20 pp 1-32
Prasad R, Anjali P, Adil S and Deepa N 2019 Heart disease
prediction using logistic regression algorithm using machine
learning International Journal of Engineering and Advanced
Technology 8 3S
Fig.2: Correlation between each feature
V. CONCLUSION
It is possible to divide a collection of data into
different classes using algorithms and classification
models. Data mining methods, including as decision
trees, nave Bayesian classifiers, NNs, and support vector
machines, are becoming popular for classifying intrusions
(SVM). Even though attack detection is tough and
attackers frequently vary their assault techniques, many
data mining systems should increase their classification
accuracy. New data mining methods for distinguishing
normal vs aberrant traffic are investigated and proposed
in this study. We were able to extract UDP data streams
from the KDD 99 dataset and turn them into a multiclass
dataset that highlights the many types of UDP data stream
infiltration concerns. Naive Bayes Algorithm, Random
Tree, and NN were all tested using signatures retrieved
from the dataset. The classification accuracy of random
tree-based approaches was 99.88 percent.
REFERENCE
[1]
[2]
[3]
[4]
[5]
[6]
[7]
Matthias SchonlauEt.Al “The Random Forest Algorithm For
Statistical Learning” Https://Doi.Org/10.1177/1536867x20909688
Yunchuan Kong et.al “A Deep Neural Network Model using
Random Forest to Extract Feature Representation for Gene
Expression Data Classification”https://doi.org/10.1038/s41598018-34833-6
VedranGrgić et.al “Model for predicting heart failure using
Random Forest and Logistic Regression algorithms”
doi:10.1088/1757-899X/1208/1/012039
M.Sumathi et.al “Random Forest Based Classification of user Data
and Access Protection” Volume-8, Issue-1, May 2019
Maria Elena Castiello et.al “An Explorative Application of
Random Forest Algorithm for Archaeological Predictive
Modeling. A Swiss Case Study” Journal of Computer Applications
in
Archaeology,
4(1),
pp.110–125.
DOI:
http://doi.org/10.5334/jcaa.71
Qingxiang Xu et.al “Application of Random Forest Algorithm in
Physical Education” Volume 2021, Article ID 1996904, 10 pages
Vrushali Kulkarni et.al “Efficient learning of random forest
classifier using disjoint partitioning approach”2013
ISBN: 978-93-5619-947-7
33
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Corruption in India: Challenges and Prospects
Dr. Showket Ahmad Dar1, Feroz Ahmad Wani2
Assistant Professor, Department of Commerce, Govt. Degree College Tral, Jammu and Kashmir, India
2
Assistant Professor, Department of Education, Govt. Degree College Tral, Jammu and Kashmir, India
1
Abstract: Corruption is the most widespread endemic and a
greatest threat to economic and political development of any
nation. Given the high level of corruption in India, this
phenomenon has turned into a cankerworm that has eaten
deep into the fabrics of our system. In recent times, the issue
is receiving attention of authorities, policy makers,
businessmen and civil society organizations. In other words,
fight against corruption has emerged as a key developmental
issue. As such, this study is an attempt to delve into the
current status of corruption in India with a focus on issues
and challenges in combating corruption. During the
discussion, the authors found that the major scams
committed in India since 2009 are a direct result of deficit in
governance. This paper also found that lack of competent
leadership and management, inherent delays in criminal
justice system, hostile witnesses marked with lack of values
as key challenges in eliminating corruption. To ensure a
corruption free society, the authors strongly suggest
simplification of office processes and procedures, filling up of
judicial vacancies, civil participation for necessary buy-in
and inclusion of private sector under anti-corruption laws,
besides strengthening and empowering anti-corruption
agencies. To sum up, it is argued that good administration is
possible only when corruption is eliminated from society.
Individuals who are currently garnering the most attention,
such as corrupt politicians, businesspeople, and judges,
should be socially shunned and barred from serving in our
holy, self-governing country. To accomplish these desired
social changes, enacting strong legislation with severe
penalties and its rigorous execution is the need of the hour.
The study is expected to contribute to the ongoing debate on
the link between corruption and anti-corruption campaign,
as well as the formation of a broad political consensus on
how to deal with it in the future.
Keywords: Corruption; Issues; Challenges; Anti-Corruption
Laws; Scams.
I. INTRODUCTION
In India, corruption is the most pervasive endemic.
This sickness has infected every office in the public and
commercial sectors. It is difficult to estimate how much
the economy has suffered as a result of this disease. Even
if most of us are concerned, we, the Indian people, must
not be found wanting when the time comes to act.
“Corruption not only destroys public trust, but also poses a
threat to the integrity of markets. It also undermines rule
of law besides distorting resource allocation” (G-20
Summit, Seoul).
In many developing countries, public sector
corruption is a key barrier in effective service delivery. By
sweeping into all facets of life, from starting a new
business to getting a passport or seeing a doctor,
corruption can obstruct the equitable distribution of
ISBN: 978-93-5619-947-7
commodities and services to its population. It can take
various forms, from bureaucrats requesting bribes from
citizens to do basic functions, to hospital personnel
stealing drugs intended for the needy, to officials taking
compensation for jobs that they perform poorly or do not
complete.
In recent years, India's fight against corruption has
become a major developmental issue. A growing number
of authorities, policy makers, businesses and civil society
organizations are openly confronting the issue (Hanna et
al., 2011). At the same time, public awareness of
corruption has increased significantly. It was not
uncommon until recently to hear someone talking about
anti-corruption purely in terms of law enforcement. Most
professionals working in the sector today, on the other
hand, agree that public education and prevention are both
critical. The field has also realised the importance of civil
society in achieving effective and long-term reform
(Abdul Raheem, 2009).
Research studies reveal that high level of corruption is
directly proportional to lower levels of investment.
Entrepreneurs will allocate their scarce time and money on
bribing rather than production as a result of corruption,
which increases transaction costs and uncertainty. By
distorting the rule of law and eroding the institutional
framework on which economic growth is based, it stifles
the development of a healthy marketplace and imbalances
economic and social progress. Poor people who are the
hardest hit by the economic downturn are most reliant on
government services. They are least able to pay the
additional costs associated with bribes, fraud, and the
misappropriation of economic privilege. Broadly
speaking, there are two forms of corruption, administrative
corruption and political corruption. By definition, the
former alters the implementation of policies, such as
getting a license even if one does not qualify for it, while
as the later influences the formulation of laws, regulations,
and policies, such as revoking all licenses, and achieving
the sole right to operate public utility. As elucidated by
Warren (2004) “Bureaucratic corruption” involves the
violation of first-order norms (the written rules and laws
that are the product of politicians’ decision making),
whereas “political corruption” is the use of powers by
government officials or their known persons for
illegitimate private gain.
II. REVIEW OF LITERATURE
The study of corruption has become "dispersed" and
"multidisciplinary," spanning from theoretical modeling of
34
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
very basic conditions to specific details of a single
corruption scandal. It has been investigated as a problem
of
political,
economic,
cultural,
or
moral
underdevelopment (Amendson et al., 2001). In a similar
context, in recent years, the body of theoretical and
empirical research that objectively examines the issue of
corruption has grown considerably (Elliot 1997, Gill 1998,
Girling 1997, Mauro 1995, Paul and Guhan 1997,
Shleiferand Vishnay 1998, Vittal 1999, World Bank
1997).
While corruption in one form or other has always
been with us, it has had manifested itself in different times
at different places, with varying degrees of negative
consequences (Bardhan, 1997). The early findings of
corruption studies primarily focus on the national and
institutional levels, analysing the specific impact of
various facets of the economic, political, and cultural
systems on corruption. However, whether or not these
elements have a practical impact on corruption remains a
point of contention. In a similar vein, from a medium-term
perspective, system design and implementation of the
degree of decentralisation between national agencies, as
well as recruitment, appointment, compensation, and
punishment, not only affect the bud of corruption, but also
has a substantial impact on the spread of corruption (Liu,
2016).
Given the vast amount of literature available on
corruption related factors, the authors have elucidated
several relevant and testable hypotheses from the growing
literature on the determinants of corruption. For instance,
Bardhan (1997) pointed out that corruption had a
devastating effect on the economy, while it cannot be
denied that corruption has a positive meaning in some
areas. Farooq and Shahbaz et al. (2013) shows that
corruption is an obstacle to economic growth by building a
time series model. In a similar vein, Treisman (2000)
found the causal relationship between the economic
development and reciprocal causation of corruption
through the study of the per capita GDP.
Gupta and Davoodi et al. (1998) pointed out that
corruption has increased the income inequality and
increased poverty. In contrast, Tummala (2009) have
found controversial relationship between inequality and
corruption. Apart from the above, culture and politics
werefound closely related to corruption. Previous studies
have also looked into a variety of factors that contribute to
the level of corruption in a country which are globalization
(Badinger and Nindl, 2014), economic growth (Bai et al.,
2013), freedom of press (Bhatacharya, 2008), size of
government (Kotera et al., 2012) poverty (Justesen and
Bjornskov, 2014) and transparency (Lindstedt and Naurin,
2010). In a simiar vein, as elucidated by Treisman (1998),
the lack of trust and civic engagement may increase the
supply of corrupt services by reducing the danger to
officials of being exposed and punished. Parallel strides
have been made in the understanding of corruption and
ISBN: 978-93-5619-947-7
institutional reforms. Recent work has argued that
education can better control the level of corruption and
there is some evidence for the association subnationally in
the United States (Glaeser and Saks 2006) and crossnationally (Persson et al. 2003).
There is also evidence and a growing consensus
among scholars that greater transparency, information and
technology-based efforts have a significant impact on
reducing corruption. But given preliminary analysis of the
literature and a much better grasp of the extent to which
corruption is a symptom of fundamental institutional
weaknesses, corruption in India is regarded as a
complicated phenomenon as the result of more deepseated problems of policy distortion, institutional
incentives, and governance. Therefore, in an effort to
capture the richness of the literature on corruption, the
present paper elucidates the current scenario of corruption
in India with special emphasis on the challenges India is
facing to tackle this menace.
III. OBJECTIVES OF THE STUDY
 To explore the current status of corruption in India
with special reference to major scams committed over
the last decade.
 To analyse issues and challenges that India is facing in
combating corruption.
IV. RESEARCH METHODOLOGY
This paper attempts to construct facts through the
scientific enquiry of the existing literature and analysing
multiple discourses. The article captures multidimensional issues pertaining corruption. While doing
rigorous search on various databases (Proquest, Google
Scholar, Shoodhganga and Google search), the authors
could find only 38 papers wherein corruption was studied
from multi-dimensional perspectives. However, after
winnowing, it was found that only 14 papers had subject
matter related to issues of corruption at national level.
Thus, the research articles/papers chosen in this paper
cover a broad spectrum of corruption in wide range of
areas like public, corporate, private etc. Our approach in
this paper is primarily analytical in nature, given the
inherent difficulties in collecting empirical data on the
subject of corruption.
V. CURRENT STATUS OF CORRUPTION IN
INDIA
N. Nittal, former Central Vigilance Commissioner
(CVC) is of the opinion that nearly half of those who avail
services of public departments had the first-hand
experience of giving bribe directly or indirectly. He also
asserted that two third of people view corruption as real in
these offices. However, one third think corruption is more
exaggerated. And yet, 80 per cent of people are passive
and hardly 20 per cent had ever complained about such
35
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
corruption to any. It is interesting that while 50 per cent of
people reported that they had bribed, only 20 per cent took
the trouble of complaining. This also highlights the need
for sensitizing the public about the danger of corruption.”
According to the United Nations, every year, an estimated
US$1 trillion is paid in bribes and US$2.6 trillion is stolen
through corruption. Together, this sum represents 5% of
annual global GDP. Further, in developing countries,
funds lost to corruption are estimated to be ten times the
amount of the overall Official Development Assistance
(OECD, 2015). Loss of public finances due to
misallocations or greater expenses, as well as lower
quality goods, services, and works, are all direct
consequences of corruption. In the case of public works
procurement, those who pay the bribes try to recover their
money by inflating prices, charging for work not
completed, failing to satisfy contract specifications,
lowering the quality of work, or using inferior materials.
In a similar vein, Corruption affects a person even if he
doesn’t come into direct contact with it. Moreover, it
makes the business environment less attractive to foreign
investment. Corruption is a major problem in India
resulting in substantial risk for the businesses operating
there. As per Corruption Perception Index 2020 (Table-1)
published by Transparency International, India ranked 86
out of 180 countries/ territories.
Table 1. Corruption Perception Index 2020
RANK
1
1
3
3
3
3
7
25
78
86
COUNTRY
New Zeeland
Denmark
Finland
Switzerland
Singapore
Sweden
Norway
USA
China
India
Source: Corruption Perception
Transparency International (TI).
SCORE
88
88
85
85
85
85
84
67
42
40
Index,
2020
by
As per the figures reflected in Table 1”, India dropped
eight spots to No. 86, which it now shares with Morocco,
Turkey, Timor-Leste and Trinadad and Tobaga, all of
which received the same score of 40. The country has
steadily slipped since ranking 72 out of 179 in 2007, when
the report debuted. Several recent high-profile scandals
have underscored the extent of this problem. For instance,
looking at the list of major financial scams in Table B
offers some hints about the quantum of money involved in
these scams. The global corporate community was
shocked and scandalized on 7th of January 2009, when the
chairman of Satyam, Byrraju Ramalinga Raju, resigned
and confessed that he had manipulated the accounts
of Rs 7,000 crore in several forms.
In 2010, The
Commonwealth Games, which costing about eighteen
times its budget estimate, were accused of massive
misallocation of finances. In a similar vein, two top
ISBN: 978-93-5619-947-7
Congress Party members and other government officials
resigned after reports of contracts of substandard
infrastructure and financial irregularities got highlighted.
The total misappropriation of funds, according to the
Central Vigilance Commission, is estimated to be around
$1.8 billion (Kundu, 2015). During the second term of
United Progressive Alliance another scandal called 2G
scam rocked the political scene wherein, the Comptroller
and Auditor General of India in a report quantified and
pegged the scam loss to Rs. 1.76 lac crores. This scam
outraged opposition resulting in massive protests in Delhi
coupled with complete shutdown of parliament for three
weeks. Likewise, Colgate scandal of 2012 amounting to
$34 billion loss has received massive media reaction and
public outrage. The deadlock resulted in Parliament
functioning only seven of the twenty days of the session.
The story did not end here. The country had been a
witness to several national level scams by the public
officials. In recent times, NiravModi and his uncle were
declared as 'fugitive economic offenders' in December,
2019, and were accused of committing a Rs 14,000 crore
scam by obtaining credit facilities fraudulently from the
PNB (Central Vigilance Commission, 2021). Laconically,
The Reserve Bank of India in its annual report for the year
2019-20 revealed that Bank frauds in value terms
involving an amount of Rs 1 lakh and above, have more
than doubled in 2019-20 to Rs 1.85 trillion from Rs
71,543 crore in 2018-19 witnessing an increase of 159 per
cent. In volume terms, however, the total fraud cases have
jumped 28 per cent to 8,707 in 2019-20 from 6,799 in
2018-19 (Reserve Bank of India, 2020). Other recent
surveys also reveals that globally corruption has worsened
in the last two years. The major scams that have been
committed in last five decades seem to be a direct result of
deficit in governance by our corrupt politicians and
bureaucrats. Following is a list of recent financial scandals
committed in India since 2009. As per the estimates of
World Bank and RBI, the total monetary worth of scams
committed since 1992 in India is estimated to be one lakh
billion. There must have also taken place other scandals
probably of smaller magnitude but have gone unnoticed.
Table 2. Latest Financial Scams (INR in Crores)
YEAR
SCAM
2009
2009
2010
2010
2010
2010
2011
2012
2016
2018
Satyam Scam
2G Spectrum Scam
Illegal Money in Swiss Bank
Orissa Mine Scam
IPL Scam
Commonwealth Games Scam
Reddy Brothers Illegal Mining Scam
Colgate Scam
Vijay Mallya
NiravModi PNB Bank Fraud
Quantum
of Money
Involved
14,000
1,76,000
71,00,000
7,000
1700
70, 000
16,085
1,86,000
9,000
11,400
Source: Compiled from different sources like CVC Annual
Report 2021, dnaindia.com and finance.yahoo.com
36
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
VI.
CORRUPTION:
CHALLENGES
ISSUES
AND
In recent times, the government has demonstrated a
strong commitment to fight against corruption and a
willingness to collaborate with the counterparts from other
jurisdiction to combat the problem. In a similar context,
India’s anti-corruption laws in recent times have
undergone a significant shift, with the existing
government taking a hard stance. In order to bring a sea
change to anti-corruption landscape, several laws
including the Lokpal and Lokayuta Act, 2013 have been
enacted to investigate and prosecute cases of corruption
against public officials. However, despite adequate laws to
fight corruption in the public sector, it is still one of the
biggest menaces Indian society must deal with. In its fight
against corruption, the Indian criminal justice system has
faced numerous problems and challenges, some of which
are listed below
6.1 Lack of Competent Leadership and Management
Departments are in disarray due to lack of skilled
leadership and poor organisation. As a result, there is a
lack of coordination and control between departments and
organisational levels. Corruption is a result of this
unrestrained
and unmanaged government.
The
appointment of incompetent and incapable managers and
executives at various levels of the hierarchy also
contributes to mismanagement. As a result, the only cause
of erroneous appointments is corruption, which promotes
corruption.
6.2 Socio Economic Gap
When comparing India and the countries surrounding
it on the index to the top 10 (least corrupt) countries, it
becomes clear that the former group contains countries
with significant socio economic inequalities, while the
latter group contains countries with a high degree of social
and economic justice. In this regard, Singapore ranks in
the top ten least corrupt countries among European and
European-settler countries. To be more specific,
corruption is proportional to a country's socio-economic
divide. In a similar vein, as alluded by Khair (2019),
cultural and historical variables also influence the socio
economic gap, the higher the socio-economic differences,
the greater the temptation to commit fraud. For instance,
in a country where a bribe of Rs. 5000 is little to the
wealthy, it is simple for the wealthy to provide such a
bribe. However, if a poor man's monthly income in the
same country is Rs.5000, it is difficult for him to resist a
bribe of that amount. This results in a progressive loss of
morality and ethics on both sides: some people find it
simple to spend money to get things done, while others
find it difficult to refuse that money. On both sides, there
is a growing sense of disdain for the system and for one
another. Because of such individual acts of corruption, the
system is considered as fully corrupt.
ISBN: 978-93-5619-947-7
6.3 Inherent Delays in the Criminal Justice System
Certain government authorities in India work
persistently to eliminate corruption. A number of anticorruption laws are also in place. Some personnel from
these agencies fall prey to the lure of illegal commissions,
allowing corrupt people to go unpunished. The criminal
justice system has become unbearably slow, and
punishments are not being administered promptly enough.
The involved authorities frequently take a long time to
provide authorisation for a prosecution after receiving
reports from the investigating agency. Moreover,
permission is denied on political or other reasons in some
situations.
6.4 Lack of Values
Corruption has become accepted in the social
psychology and behaviour of modern India. Bribery,
nepotism, and favouritism are examples of social evils that
have become accepted in society. People frequently
contact someone they know for favours that they are not
legally entitled to. Jumping traffic lights or lines, or
receiving benefits owing to no fault of one's own, has
become part of the societal ethos. In Indian society, a
person who has amassed fortune through unethical means
is frequently granted the same, if not better, prestige as a
person of brilliance. In the end, the corrupt politician or
corrupt administrator is a public construct and a concrete
representation of the mentally corrupt men on the street,
whose approbation allows corruption to grow with
impunity. It's no wonder, then, that corrupt political
figures occasionally stride majestically to the court and
welcome their fans as if they were receiving a prize for
public service.
6.5 Hostile witnesses
The prosecution must establish its case beyond a
reasonable doubt in order to convict a corrupt public
official. According to the Indian Evidence Act
Amendment 2020, governing evidence in India, this is a
stringent legal necessity.
Even in circumstances of corruption, there is no
exception to this rule. To prove its case beyond a
reasonable doubt, the prosecution has to depend
extensively on witness evidence. Witnesses, on the other
hand, frequently refuse to support the prosecution case due
to the other side's influence, allurement, and intimidation.
There is no witness protection mechanism in place, and
there are no measures for swift and efficient action against
hostile witnesses. As a result, witnesses are frequently
uncooperative, spoiling the prosecution's case.
6.6 Poor Economic Stability
In India, the economic crises marked with high
inflation rates are major causes of corruption resulting in
37
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
job losses and a shift in people's lifestyles. It instils a sense
of insecurity in the minds of the public, particularly the
impoverished.
Most people are unable to cope with this dreadful
condition, and in order to stay employed and maintain a
respectable quality of living; they resort to illegal and
immoral acts. They also refuse to work hard again and
instead take a variety of irregular shortcuts to achieve their
objectives.
VII. TACKING THE MENACE OF CORRUPTION:
THE WAY FORWARD
Many people think that only government has
responsibility for eliminating corruption and often blame
government. Given the level of corruption and the existing
framework in India, it is very clear that government alone
cannot stop corruption. Corruption can never be removed
or even decreased if the general public and civil society
institutions remain apathetic and hopeless in their fight
against it. As a result, it is the responsibility and duty of
every Indian to fight against corruption and take steps to
promote honesty and integrity. India's citizens must
encourage excellence and educate their children the true
meaning of success. People in the 21st century ought to use
knowledge and established mechanisms to combat
corruption. They should also use media and technology to
reach millions of people in a matter of seconds. The
following steps will go a long way in strengthening
governance, reducing corruption and building confidence
of ordinary people in the system.
7.1 Political Commitment
Despite having elaborate and multi-layered apparatus
to control corruption, India is hardly making any progress
to curb corruption owing to the fact of lack of political
commitment on the part of political leadership. The
institutional measures which are put in place to combat
corruption can be useful only if correctives come from the
political class which is the final legislative and executive
authority in a parliamentary democracy.
Politicians must first address corruption inside their
own ranks by establishing and implementing
parliamentary code of conduct. Political parties have
become a possible source of corruption in many systems,
compromising the legitimacy and integrity of political
parties' democracy. In a similar vein, Parliamentarians
must also follow ethical guidelines, which include ethical
frameworks that cover everything from conflicts of
interest to voting.
7.2 Simplification of Processes and Procedures
To reduce or curb corruption, it is necessary to
eliminate delays. In this context, it is essential that office
procedures and the procedure for disciplinary proceedings
ISBN: 978-93-5619-947-7
needs much simplification. In the current system, official
files are passed through numerous offices before a
decision is made. Therefore, a transparent and
straightforward decision-making pattern must be
developed to ease office procedures.
The mechanism for 'vigilance clearance' should be
clearly specified in circumstances of promotion. To weed
out the corrupt, the recent ruling issued by Jammu and
Kashmir Civil Service Regulations under Regulation 226
(2) reading the Government to retire a Government
servant at any time after he has completed 22 years of
service or attained the age of 48 years in public interest.
This power is exercised by the Govt. to remove such
government servants, who are considered as deadwood,
inefficient are of doubtful integrity and considered to be
corrupt. Hence, the individuals whose performance is not
up to par and who are involved in any act of nepotism,
favouritism, or corruption can retire after 48 years should
be applied in letter and spirit. Latest management
techniques and methods need to be incorporated into the
functioning of all public services and public sector
projects so that their efficiency and productivity must be
in synchronization with their social obligation.
7.3 Role of Judiciary
When we consider how to improve democratic
corruption control, we frequently focus on reforms in
accountability institutions. The recent literature indicates
that, at the current stage of reform and democratization
around the globe, accountability institutions must undergo
a strengthening process in order to improve economic
performance, promote fiscal responsibility and fight
corruption (SIAVELIS, 2000).
In this context, the judiciary has a pivotal role in
combating corruption. In order to ensure that political and
administrative power is used only in accordance with the
law, officers involved in wrong doing or misuse of
authority should be held accountable. To be more
specific, one of the ways that the judiciary can win in the
fight against corruption is by showing impartiality,
integrity equality, competence and diligence in the
dispensation of justice. The judiciary must appear to be
both independent and reliant. Judges should rule in
accordance with the law in all matters before them. Judges
should make decisions based on the evidence and the rule
of law and being independent of their personal biases and
other external factors. Examples of countries like Kenya
and China where courts can impose the maximum
allowable sentence and where people found guilty of
corruption are described as “greedy” and “contemptuous
of rules and laws” should be expeditiously followed while
dealing with corruption cases in India. More importantly,
to address this acute problem of corruption, judicial
vacancies pilling since years need to be filled up urgently
and appropriate premises and support staff must be
provided to ensure undue delay in social justice.
38
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
7.4 Civil Participation
7.8 Watch Dog Agencies
The Right to Information Act, 2005 permits Indian
residents to request government information, which must
be made available to the public unless it is a confidential
piece of information. People will respond and extend their
full participation in resolving this issue if they are
convinced that there is a strong attempt to protest against
corrupt politicians. Corruption no matter how deep-seated
can be successfully uprooted through public participation
and awareness. No doubt, individual actions can help to
get rid of corruption; however, if the problem is to be
tackled at its root, people's participation is essential. To
address this issue, the central government must collaborate
and work together with civil society and media to achieve
a corruption-free India.
When the political milieu is filled with honest
individuals and civil personnel are free from governmental
intervention, watchdog agencies like the Central Vigilance
Commission (CVC) and the Central Bureau of
Investigation (CBI) can thrive. Otherwise, organisations
like the CVC will be of no service or will be misused for
political benefit. To improve the CBI's efficacy, it should
be separated from the police and constituted as a separate
entity committed entirely to fighting corruption. The
Indian Constitution should be modified to allow the CBI
to probe corruption charges at the state level without the
agreement of the state's chief minister.
7.5 Inclusion of private Sector under Anti-Corruption
Laws
As pointed out by Berkeley Busssell, that
technology’s most important contribution has been
granting citizens greater access to information. Therefore,
in this regard, some combination of administrative reforms
and local-level technology initiatives can be taken up to
help bring corruption to light. For example, digital devices
like CCTV cameras and e-recorders must be put at
government offices where bribes are frequently taken and
given. People may also take the initiative to use their
phones to record any corrupt practises in their
neighbourhood and the same needs to be shared with the
local police station.
In addition to the ongoing initiatives, the following steps
can go a long way in strengthening governance and
building corruption free society:
 Money stashed in the Swiss banks is enormous – of the
size of USD 19 – 20 trillion. Not taking immediate
steps to bring this money back into the country is
unpardonable. If brought back, this money can be
optimally utilised to uplift the poor Indian community
and can also be put to use for infrastructure and other
developmental works of the country.
 Corruption needs to be nailed at the bottom level every
day. New leadership against corruption needs to be
built. Experience with e-governance in the state of
Bihar, which has helped achieve impressive
improvements in the delivery of public services is a
great example of how things can be done correctly.
 Education from early stages is needed to help people
and society to unshackle them from the mind-set that
accepts and feeds corruption. Similarly, Public
education will be an integral part of any effort to
deepen the rule of law, and to improve transparency
and accountability.
 Government officials across the entire public service
sector should be better paid to reduce the incidences of
bribe taking.
In India the Prevention of Corruption Act 1988 is the
landmark law which deals with offences relating to
corruption. The law was essentially enacted to take care of
corruption cases in the public sector and by public
servants which is only one part of the issue. However,
bribery is also rampant in the private sector. To be more
specific, the problem of corruption in the private sector is
increasing at an alarming rate owing to its great expansion
after the liberalisation of the economy in early 1990s. The
Prevention of Bribery in Private Sector Bill 2018, which
seeks to provide a legislative framework to resolve the
issue of corruption in private sector needs to be
implemented in letter and spirit.
7.6 Monitoring and Evaluation
Without independent outsider’s monitoring, some
international, regional and local anticorruption action
plans can easily become as an additional paper work or a
lip service and can hardly make any real differences.
Monitoring and evaluation of the performance of anticorruption agencies are also one of important roles of
anticorruption CSOs. To combat corruption and to yield
positive results, the civil society organizations must take
steps in formulating and implementing anti-corruption
strategies.
7.7 System Based Policy Driven Governance
In order to transform the entire ecosystem of public
services through the use of information technology, a
strong electronic ID system needs to be devised. The
Digital India campaign aimed to streamline existing
schemes should be expedisously implemented which
would allow poor citizens to avoid intermediaries and
receive aid directly through a bank account. In order to
allow for greater transparency, everything ranging from
land records to death certificate and from contract biding
to grievance redressal mechanism needs to be digitalised.
ISBN: 978-93-5619-947-7
7.9 Use of Technology
VIII. RESULT AND DISCUSSION
A plethora of literature has revealed that corruption is
an obstacle to the development of democracies and the
39
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
rule of law, thereby affecting the political leadership and
institutional legitimacy. It also erodes the fabric of society
by generating environments that foster the violation of
human rights. In a similar vein, corruption is a threat to
good governance. The authors identified various obstacles
while researching the issues and challenges that India
faces in the battle against corruption. These encompass
socio-economic disparities, intrinsic delays in the criminal
justice system, hostile witnesses, weak economic stability,
and so on. However, the key challenge confronting India
is that of lack of competent leadership and management
which appears to be a leading cause of corruption.
Furthermore, inadequate economic stability, particularly in
the setting of limited fiscal resources creates a sense of
uneasiness in the minds of the public, encouraging them to
engage in illegal and immoral behaviour, which breeds
corruption.
judiciary both independent and reliant. In other words,
judiciary can fight against corruption by exhibiting
impartiality, equality and diligence in the dispensation of
the justice. Besides, central government need to
collaborate and work together with civil society and media
to combat corruption practices prevailing in government
offices. Moreover, system based policy driven governance
practices need to be devised to allow poor citizens to
avoid intermediaries in terms of receiving benefits under
different government schemes.
REFERENCE
[1]
[2]
[3]
To ensure a corruption free society, corruption should
not only be viewed as a principal-agent but also as a
collective action problem. To this end, the government
should strengthen and empower anti-corruption agencies
as well as monitor and evaluate their performance to
improve their efficacy in the fight against corruption.
Moreover, corrupt individuals, corrupt politicians, corrupt
executives, and corrupt judges, who are currently
receiving the most attention should be socially boycotted
and blacklisted. They should not be permitted to serve in
our holy, self-governing nation. This will help in
establishing good governance and as such, the general
public will enjoy the taste of life, freedom, and
independence and India will continue to flourish and
transform into a developed nation. All these desired
changes can be achieved by establishing strong legislation
with serious penalties and enforcing it properly. Countries
like Kenya and China can be seen as a watershed in the
resolve of the international community to fight corruption.
IX. CONCLUSION
Corruption poses a great threat to the economic and
political setup of any nation. This paper is an attempt to
delve into the challenges faced by our country in the fight
against corruption and suggests anti-corruption strategies
to be devised and implemented by policy makers and civil
society organisations to achieve a corruption free India.
Among the key challenges faced by India are a lack of
competent leadership and management, inherent delays in
criminal justice system, hostile witnesses marked with
lack of values, weak economic stability and so on. To
fight against this menace, the authors suggest anticorruption measures in terms of simplifying office
procedures for disciplinary proceedings and making
ISBN: 978-93-5619-947-7
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
Abdulraheem, A. (2009). Corruption in India: An Overview
(causes, consequences and remedial measures). Social Action.
59(3).
Anderson, C.W. (1979). The place of principles in policy analysis.
The American political science review.73 (3): 711-723.
Agarwal, O. P., & Somanathan, T. V. (2005). Public policy making
in India: Issues and remedies. New Delhi, India. Centre for Policy
Research occasional paper.
Bullock, H., Mountford, J., & Stanley, R. (2001). Better policymaking. The centre for management and policy studies Landon. 179
Bhattacharya, M. (2013). New Horizons of Public Administration.
New Delhi: Jawahar Publishers and Distributors. 1-416
Ernst & young Survey. (2013). Bribery and Corruption: ground
reality in India. A survey by EY’s fraud investigation and dispute
services practice.
Central Vigilance Commission (2021). Annual Report on
Corruption.
Fischer, F. (1998). Beyond empiricism: policy enquiry in post
positivist perspective. Policy studies journal. 26(1): 129-146.
Handbook of Statistics on the Indian Economy, Reserve Bank of
India. Time series publications. http://www.dbie. rbi.org.in/ DBIE/
dbie.rbi, 02 April 2022
Hjelt, M. et al. (2008). Major challenges for the governance of
national research and innovation policies in small European
countries. VISION ERA. 01-66.
Kanukeri, U. (2015). Corruption in India. International Journal of
Multidisciplinary Research. 01(05).
Kundu, M. (2015). Some Aspects of Corruption in India.
International Journal of Scientific and Research Publications.
05(12).
Ministry of Finance (2012). White Paper on Black Money, Ministry
of Finance, Government of India.
Reserve Bank of India (2020). Annual Report of Reserve bank of
India.
Singh, B.K. (2008). The challenge of good governance in India:
need for innovative approaches. Paper circulated at Second
International conference of the global network of global innovators,
Harva Universityity, Cambridge, Massachusetts, USA, March 31April 02.
Sheng, Y. K., Carrillo-Rodriguez, J., Eun-Young, L., et al. (2007).
Access to basic services for the poor: the importance of good
governance. Environment and Urbanisation. 23(5): 22-34.
Sundararajan, V. & Thakur, S. (1980). Public investment, crowding
out and growth: a dynamic model applied to india and Korea. IMF
staff papers. 27(4), 814-855.
Tummala, K. K. (2009). Combating corruption: lessons out of
India.International Public Management Review.10 (1).
40
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
The Challenges Managers Have to Face in Making
Ethical Decisions in Banking Industry
Dr. Manjit Kour
Associate Professor,University school of Business,Chandigarh University,
Gharuan, Punjab
Abstract: Banks are considered very crucial in the
development and growth of the economy of a country. In
today’s highly competitive world every business faces
competition and challenges; the banking sector is also not
spared. Banks nowadays have to face various challenges due to
globalization, digitization, dynamic economic policies, and
cutthroat competition. It is also becoming challenging for
banks to maintain an ethical culture. The present paper is a
modest attempt to uncover the challenges faced by bank
managers in making ethical decisions. A questionnaire was
prepared and was administered to 240 managers working in
public and private banks in Punjab, India. Main challenges are
first identified and then their ranking of challenges faced by
Managers is established by using the Friedman test. It was
found that the main challenge managers face is the pressure
they feel in the organization itself that makes it difficult for
them to behave ethically. It can be said on basis of this study
that bank managers resort to unethical practices mainly due to
external factors of the work environment.
decisions. In a broader viewpoint, an ethical bank must have
a policy that takes into consideration all those issues that
pose challenges to bank managers and make sure that they
can handle ethical dilemmas and promote ethical decision
making. This paper tries to highlight some of the major
challenges faced by bank managers while making ethical
decisions in daily operations. The current study is an
attempt to answer mainly the following research questions:
Keywords: Ethical challenges, Ethical dilemma, Work pressure.
II. LITERATURE REVIEW
I. INTRODUCTION
Various unethical practices have been observed at the
managerial level in banks. Ermongkonchai (2010) observed
that in a managerial position, the employee feels various
pressures to prove themselves as per job expectations, like
meeting sales targets, working under a budget, completing
tasks on time.
The Banks are the main participants of the financial
system in any country. Banks are the backbone of the
economy of a country and the main factor for the growth
and development of a country. They are one of the essential
financial pillars of every economy and play a crucial role in
its functioning (Borah & Barua, 2018). It is essential for the
economic advancement of a country as it plays a pivotal
role in financing supplies of trade; industry and agriculture
with a higher degree of responsibility and commitment.
Hence, the progress of a country is directly dependent on
the development of banking (Hassan, at al., 2019).
Economic development and financial stability have a
precondition that there exists a culture of impartiality,
ethical standards, and financial transparency in the banks
globally. Banks have yet often been found indulging in
unprofessional and unethical practices (Abbas, et al., 2019).
In the context of the growing international and global
challenges, the banking sector as well as the other sectors of
the economy has to face an intensely competitive
environment (Echchabi & Olaniyi, 2012). The challenges
that the banking industry has to face are numerous and
complex but in this paper, an attempt is made to explore
challenges faced by managers while making ethical
ISBN: 978-93-5619-947-7
RQ1. Is there any difference in the challenges faced by
bank managers in making ethical decisions? RQ2. What are
the main challenges faced by bank managers in making
ethical decisions? The remaining of the paper is organized
as follows: the second section covers literature review; the
third section will discuss methodology, the fourth and fifth
sections will discuss the analysis and conclusion,
respectively.
All these pressures may become a reason for the
unethical behaviour of an employee. A study conducted by
the Human Resource Institute (HRI) using 1121 managers
and Human Resource experts as participants, discovered
that the most important reason for unethical corporate
behaviour was “pressure to meet unrealistic business
objectives and deadlines.”
The study found that job demands cause employees to
adopt unethical behaviours that include covering up
incidents, compromise on quality control, and lying to
customers. Ignorance was found to be another major cause
of unethical behaviours (Omolewu, 2008). Madrick (2002)
stated that the rising corporate scandals are the direct upshot
of greed. The professionals such as managers, lawyers,
investment bankers lie to make more money.
It‟s also observed about the banking industry by Mittal
et al. (2014) that if a customer is financially sound,
41
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
maintains a good bank balance, that customer will always
get a warm welcome and all the kind of services will be
provided to him on his doorstep promptly, whereas if a
customer is not financially sound, nobody will bother to
look towards that customer and resolve his issues. It is
supported with evidence that companies having good
relationships with banks are less likely to pledge collateral
and have to pay lower interest rates (Berger and Udell,
1995). Basu (2003) stated in his study that the fundamental
reasons for the bank failures are extreme competition, noncompliance with the credit standard requirements, and
absence of deposit insurance scheme. It has been observed
that banks can be biased sometimes in granting loans to
their customers. This biasness can be due to lobbying by
customers, a long relationship with a customer, or any other
reason. After going through the previous studies, it is noted
that none of them has addressed the issue of challenges
faced by managers in the banking sector. This study is an
attempt to use the Friedman test to rank challenges faced by
bank managers in the banking sector in India. Hence, the
study makes the following hypothesis:
Ho. There is no significant difference in the ranking of
challenges faced by bank managers in India.
questionnaire was made on a five-point Like rt scale. It was
also discussed with other experts in the research field. The
first weighted average score was used to rate challenges
faced by managers in banking in making ethical decisions.
The same was then confirmed by applying the Friedman
test.
IV. ANALYSIS
Table 1 shows the demographic profile of respondents.
It is observed that out of 240 respondents, 67% were male
and 33% were females, which points that majority of
managers in banks are males. As per Table 1, the age-wise
distribution of respondents is somewhat evenly distributed.
52% of respondents were from the public sector and 48%
respondents were from the private sector, so we can infer
that both public and private sector were equally represented
in the study.
Table 1: Demographic profile of respondents
Catego
ries
Frequency
Percentage
Male
Female
160
80
67%
33%
Less than 30 yrs
30-35 yrs
24
48
10%
20%
35-40 yrs
58
24%
Gender
III. RESEARCH METHODOLOGY
Primary and secondary data both were utilized for this
study. The secondary data was obtained from journals,
newspapers, and magazines. For primary data, the universe
of the study consisted of all public and private sector banks
operating in Punjab. This study had been restricted to
he managers working at middle and senior management
levels only. A sample of 240 managers of public and private
banking sectors was selected for this study by the random
sampling method. To find the main challenges faced by
bank managers in making ethical decisions a questionnaire
was developed. As the researcher was not able to find any
such previous study, so questionnaire was formed on basis
of limited related literature available on the topic and the
basis of personal interaction with bank managers. The
Type
40-45 yrs
67
28%
Age
Above 45 yrs
41
17%
Sector
Public
Private
125
115
52%
48%
After literature review and interview with managers‟
five main challenges were found to be pain Weighted
Average Scores (WAS) for each statement were calculated
by allocating the weights 1, 2, 3, 4, 5 to the responses
„strongly disagree‟, ‟disagree‟, „neutral‟, „agree‟ and
„strongly agree‟ in that order. Responses with respect to
simple frequencies, percentage values, and WAS are shown
in table 2.
Table 2: Weighted Average Scores for Challenges faced by Bank Managers
Code
EC1
EC2
EC3
Statements
Do you feel pressure personally within your
organization to engage in what you perceive to
be unethical behavior?
Do you feel pressure to compromise your
organization‟s standard of ethical conduct?
SD
8
(2.9%)
D
100
(36.5%)
N
58
(21.2%)
A
104
(38.0%)
SA
4
(1.5%)
WAS
2.99
12
(4.4%)
135
(49.3%)
81
(29.6%)
44
(16.1%)
2
(0.7%)
2.59
Do you use your client information for targeting
them for other products also?
2.6
(9.5%)
76
(27.7%)
80
(29.2%)
84
(30.7%)
8
(2.9%)
2.90
ISBN: 978-93-5619-947-7
42
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
EC4
Do you make undeliverable claims to your
clients to increase sale of your products?
44
(16.1%)
100
(36.5%)
88
(32.1%)
42
(15.3%)
0 (0%)
2.47
EC5
While approving loans do you have to favor
some clients over others due to their strong
contacts
20
(7.3%)
81
(29.6%)
73
(26.6%)
100
(36.5%)
0 (0%)
2.92
As observed from Table 2 most of the respondents
(39.5%) have shown agreement with the statement EC1'
Do you feel pressure personally within your organization
to engage in what you perceive to be unethical behavior?‟
(WAS-2.99). This has been followed by statement EC5
„While approving loans do you have to favor some clients
over others due to their strong contacts‟ (WAS-2.92);
statement EC3 „Do you use your client information for
targeting them for other products also?‟ (WAS-2.90);
statement EC2 „Do you feel pressure to compromise
your organization‟s standard of ethical conduct?‟ (WAS2.59) and statement EC$ „Do you make undeliverable
claims to your clients to increase the sale of your
products?‟ (WAS-2.47). Table 3 shows the rank allotted to
each challenge based on the responses of bank managers.
Friedman's Test was applied to calculate the mean rank.
The result found was that there was a statistically
significant difference in the challenges faced by the
respondents (χ2 = 763.65 , p = 0.012) The ranks were
allotted to each challenge on the basis of the total
Table 3: Rank Analysis of the Challenges faced by Bank Managers
Challenges
Mean
SD
Pressure personally felt by managers within organization to
engage in what they perceive to be unethical behaviour.
4.78
Favouring of some clients over others due to their strong
contacts while approving loans.
Using client information for targeting them for other
products also.
Pressure to compromise their organization‟s standard of
ethical conduct.
Making undeliverable claims to clients to increase sale of
products.
Score which have been calculated by adding up all the
score allotted to each challenge by all the respondents
from 1 to 5. The above analysis reveals that the main
challenges faced by managers in order of their importance,
presented in this study are:
 Pressure is personally felt by managers within an
organization to engage in what they perceive to be
unethical behavior.
 Favoring of some clients over others due to their strong
contacts while approving loans.
 Using client information for targeting them for other
products also.
 Pressure to compromise their organization‟s standard
of ethical conduct.
 Making undeliverable claims to clients to increase the
sale of products.
ISBN: 978-93-5619-947-7
.856
Mean
rank
4.87
Importance
rank
1
4.69
.744
4.66
2
4.66
.903
3.19
3
4.33
1.156
3.01
4
4.11
1.061
2.89
5
IV. CONCLUSION
It is observed that the main challenge faced by
managers in taking ethical decisions is the pressure they
feel in the organization itself that makes it difficult for
them to behave ethically. This pressure within the
organization can be due to pressure to meet job
expectations, to meet targets, to meet deadlines, to get
more business, or to face competition.
Similar results were observed by Ermong konchai
(2010) where he discovered that the employee feels
various pressures to meet job expectations, like
performing correct budget expenditures, meeting sales
targets, conducting activities on time. These pressures may
become a reason for unethical conduct by an employee.
Similar results were found by a study conducted by the
Human Resource Institute where it was found that the
43
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
main cause of unethical corporate behaviour was pressure
to meet impractical business objectives and deadlines.
Another main challenge faced by managers in being
ethical was that they have to favour some clients over
others due to their strong contacts while approving loans.
This highlights the rampant favouritism in the
disbursement of loans in banks. The same was also
highlighted by Berger and Udell (1995). The same fact
has been highlighted by recent bank scams in India (e.g.,
Nirav Modi scam where lobbying was done to get big
loans without a credit check or guarantee. The next
challenge faced by managers in taking the ethical decision
was when they have to use their customer database for
selling other products also. It is one of the strategies of
most businesses to use their customer base to sell new
products. But it can be unethical also as it means using the
trust and confidence of customers for increasing the sale
of new products. It is unethical in the sense that it is also a
form of manipulation of customers. The least factor they
find challenging in making ethical decisions is that they
have to make undeliverable claims to their customers.
[4]
Borah, N. and Barua, M., 2018. Antecedents of Engagement:
Banking Sector. SCMS Journal of Indian Management, 15(2),
pp.13-22.
[5] Ermongkonchai, P. 2010. Understanding Reasons for Employee
Unethical Conduct in Thai Organizations: A Qualitative Inquiry,
Contemporary Management Research, 6(2), pp: 125-140.
[6] Echchabi, A., and Olaniyi, O. N. 2012. Malaysian consumers'
preferences for Islamic banking attributes, International Journal of
Social Economics, 39(11), pp: 859 – 874
[7] Hassan, B. A., Hassan, H. A., Abosede, A. J., & Ogunkoya, O. A.
(2019). CENTRALIZATION AND BUSINESS ETHICS IN
NIGERIA DEPOSIT MONEY BANKS. Management & Marketing
Journal, 17(2).
[8] Madrick, J. 2002. Enron: Seduction and betrayal, The New York
Review of Books, 21–24)
[9] Mittal, S., Saxena, A., and Matta, M. G. 2014. Ethical Issues in
Service Marketing (With special reference of banking industry),
Global Journal of Finance and Management, 6(2), pp: 179-184.
[10] Omolewu, G. 2008. Strategies for Improving Ethical Behaviors in
Organizations,
from
website
http://forumonpublicpolicy.
com/archivespring08/omolewu.pdf assessed on 12/06/2015.
The findings that the managers find this point to be
least challenging throws light on the standard of ethics in
banks. It means they don‟t feel much hesitation in making
such claims to their customers and they feel it is part of
doing business to do so. It can be said on basis of this
study that bank managers resort to unethical practices
mainly due to external factors of the work environment.
V. IMPLICATIONS OF THE STUDY
This study is of importance to the management of
banks, policymakers, and the training department. Top
management should set realistic goals for bank managers
and deadlines should be set attainable. Undue pressure
should not be put on managers as this will only lead to a
surge of unethical practices in banks. Lobbying to get big
loans without a proper credit check and guarantee should
not be entertained in any way. Strict and punitive action
should be taken against customers who resort to such
practices.
There should be proper training and counselling
sessions designed to address such situations in banks and
prepare managers to face such situations ethically.
REFERENCES
[1]
[2]
[3]
Abbas, A., Nisar, Q.A., Mahmood, M.A.H., Chenini, A. and
Zubair, A., 2019. The role of Islamic marketing ethics towards
customer satisfaction. Journal of Islamic Marketing.
Basu, S. 2010, Why do Banks Fail? , International Review of
Applied Economics, 17(3), pp: 231-248.
Berger, A., and Udell, G. 1995. Relationship lending and lines of
credit in small firm finance, The Journal of Business, 68(3), pp:
351-81.
ISBN: 978-93-5619-947-7
44
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
IoT Based Solutions for Monitoring of
Landslides and Slope Failures
Dr Guntha Karthik
Associate Professor, ECE Department,
Stanley College of Engineering and Technology for Women (Autonomous), Hyderabad, Telangana
Abstract: Slope failure and Landslides result in several
deaths and property losses. Natural disasters, such as
landslides and slope failures, result in numerous fatalities
and economic losses each year. This significant issue
prompted the development of an early warning system to
reduce accidents, failures, and financial losses. The majority
of studies on real-time early warning systems have focused
on forecasting unstable locations; however studies on
predicting slope failure occurrence using real-time slope
displacement monitoring systems are still lacking and
require
more
investigation.
A
three-dimensional
displacement sensor, a rain sensor, and a Soil Moisture
sensor, as well as an Internet of Things (IoT), were coupled
in this paper to monitor slope failure using cutting
experiments on a real-scale model slope. The slope
movement was monitored in real time in the lab using an
integrated low-cost, efficient, and simple-to-use IoT system.
The data was analyzed and the results were explained based
on the collected displacement data. This work can be further
extended by implementing in various fields and different
industrial application where slope failures are the part of
production process. The internet-based approach is the
mines can remotely monitor the communications links and
other systems within the mine. This paper focused on the
application of IoT works dealing with the elimination of
manual monitoring in the mining industry with the help of
smart sensors. The IoT based systems can measure and
record the different factors in mine, not only automatically
making available the data but also alerting mine workers via
email, telephone, text message, alarm, or pager.
waste materials and their dumping have also
commensurately become very high, thereby the risks of
failure of the slope as well as dump, have increased
massively[1,2].With more and more severe environmental
damage control regimes and no availability of alternative
lands for afforestation purposes, these risks have assumed
very complex proportions. Under such situations with
most production areas concentrated close to the excavation
floor, there is a potential threat to cause catastrophic loss
of human life and property. In order to overcome this,
efficient and economically feasible measurement systems
are needed. This paper is focused on the application of
electronics and communication to eliminate the manual
monitoring, and with the help of Wireless Network
Infrastructure to replace the need for physical cables
(Figure.1)
Keywords: Slope Monitoring, Internet of Things, Ground
Vibrations, Opencast mines.
I. INTRODUCTION
Surface mining is one of the most common and
ancient ways of removing minerals from the Earth. It is the
other way of underground mining, in which the overlying
rock is left behind, and the required mineral deposits are
removed through shafts or tunnels. Surface mining is
basically employed when deposits of commercially viable
minerals or rock are found closer to the surface; that is,
where overstrain is relatively very less or the material of
interest is structurally unsuitable for heavy handling or
tunneling. Surface mines are naturally extended until
either the valuable deposit is exhausted, or the cost of decresting larger volumes of overburden makes further
mining an uneconomic option to shoulder. The fast
increase in the production of various minerals may largely
be attributed to a fast raise in opencast mining activities
and intensified mechanization, which is resulting in a rapid
increase in the depth of the opencast mines day by day. As
an obvious and direct consequence, the production of
ISBN: 978-93-5619-947-7
Fig.1: Geometry of opencast mine
II. TDR BASED WIRELESS SYSTEM FOR SLOPE
MONITORING
Time Domain Reflectometry is a technology that has
its roots back in the 1930s with the development of radar
and later in the 1950s to locate cable faults in the
telecommunication industry. In the 1970s, TDR began to
be applied to the fields of geotechnical engineering and
geology to detect earth and rock movement and locate
where this movement was occurring .This is a technique
used in the electrical power industry, by computer
networks and the telecommunications industry for locating
faults in inaccessible cables. The basic principal is to inject
an electrical pulse into a cable and observe the reflected
45
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
echo. Knowing the pulse velocity and by measuring the
time for the reflected signal to return it is possible to
calculate the position of the reflecting surface
(fault).Figure 2 shows the basic components and principle
of TDR . The shape of the reflected pulse can also give
information as to the type of fault, for example, short or
open circuit. Similarly, light pulses can be used for the
same purpose using an optical transmission system and
optical fibers. The basic principle of TDR is similar to that
of radar. In TDR, a cable tester sends a pulse voltage
waveform down a cable grouted in a borehole. If the pulse
encounters a change in the characteristic impedance of the
cable, it is reflected [3,4]. This can be caused by a crimp, a
kink, the presence of water, or a break in the cable. The
cable tester compares the returned pulse with the emitted
pulse and determines the RC of the cable at that point.
monitoring data for the comparative analysis of the
developed system and the conventional system.
Fig.3: The method for the installation of the cables
III.
Fig.2: Basic components and principle of TDR
TDR100 is connected to master node which is
integrated in ground control laboratory. The generated
real-time data of TDR100 is directly sent to mine office
through RF module (master node). Three Locations for the
monitoring system were selected, and coaxial cables were
installed at that location. All the electronics were placed in
a room which is specially constructed near to the cable
locations, and power is also available at that location. The
power backup was provided for the TDR using Universal
Power Supply (UPS). Initially, TDR setup and wireless
communication were established, and data were tested
using laptop. Finally, laptop was removed with master
node for continuous monitoring. Measurements were taken
continuously and three no. of TDR monitoring cables that
were grouted into drill holes to monitor precursor
movement within the rock mass. The TDR measuring
system was installed at the footwall benches of Mine, and
started operation in August 2017. The permanent
indication points for slope stability monitoring using
conventional method are constructed at the site at different
points(Figure.3). This will provide the slope stability
ISBN: 978-93-5619-947-7
IOT BASED
SYSTEM
LANDSLIDE
MONITORING
The figure 4 shows the block diagram of the
integrated system which we uses a displacement sensor to
measure elevation measurements, rain sensor to detect the
rain fall and soil moisture sensor to know the presence of
water in ground. The data was presented in the Things
Speak cloud platform. The recorded values were sent to
the cloud through the ESP8266 Wireless Fidelity (Wi-Fi)
module. The Hardware requirements are Power supply,
Microcontroller (ARM based LPC2148), Displacement
sensor, Rain sensor, Soil Moisture sensor, IoT Module and
LCD (Liquid Crystal Display). The software requirements
are Thing Speak and Keil
Fig. 4: Block Diagram of Slope Monitoring System
46
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
3.1. Power supply
A power supply is a component that provides power
to at least one electrical load. It usually transfers one type
of electric power to another, but it can also convert a
different type of energy into electricity, such as solar,
mechanical, or chemical energy.
3.2. ARM based LPC2148
This microcontroller has 32kB of static Random
Access Memory (RAM), which is ideal for storing data or
code. It's compatible with 8-bit, 16-bit, and 32-bit
computers. P0 & P1 refer to the two input/output ports of
the LPC2148 microcontroller. The LPC 2148/66/65/64 is
capable of running at Central Processing Unit (CPU) rates
of up to a hundred MHz
3.3. Displacement sensor (MEMS):
A displacement sensor is a device that detects the
quantity of displacement through a spread of elements and
converts it into a distance between the sensor and an
object. Displacement sensors assess how much a machine's
spinning part moves away from its stationary housing. A
probe tapped within the machine's frame, just above the
surface of a rotating shift, is used in displacement sensors.
The main working principle of an accelerometer is
that it converts mechanical energy into electrical energy.
When a mass is kept on the sensor which is actually just
like a spring it starts moving down. Since it is moving
down it starts experiencing the acceleration. That
acceleration hen gets converted into an amount of electric
signal which is used for the measurements of variation in
the position of the device.
3.4. Rain sensor
A rain sensor is a type of switching device that
analyses rainfall to detect it. It functions as a switch, and
the functioning rule of this sensor is that anytime it rains,
the switch will be normally closed. This sensor is regarded
as a water-saving technology, and it is frequently
connected to an irrigation system to shut it down in the
event of rain.
The working of the rain sensor is to detect the presence
of water drops on the surface of sensor and we defined it
as wet and dry condition. Sensing pad with series of
exposed copper traces, together acts as a variable resistor
(just like a potentiometer) whose resistance varies
according to the amount of water on its surface
3.5. Soil Moisture sensor
A soil moisture sensor is a type of sensor that is used to
determine the volumetric content of water in the soil. The
working of this sensor is frequently accomplished by
inserting it into the world, and the status of the water
content within the soil is frequently provided in the form
of a percentage. This sensor is ideal for experiments in
ISBN: 978-93-5619-947-7
science classes such as ecology, agricultural science,
biology, soil science, botany, and horticulture, among
others.
3.6. IoT module
The ESP8266 Wi-Fi Module is a self-contained system
on chip (SOC) with an integrated Transmission Control
Protocol/Internet Protocol (TCP/IP) protocol stack that
provides access to your Wi-Fi network to any
microcontroller. The ESP8266 may either host an
application or offload all Wi-Fi networking functionality
to a separate application processor. Each ESP8266 module
is pre-programmed with AT command set firmware, which
means you can just connect it to your microcontroller
device and get nearly the same level of Wi-Fi-ability as a
Wi-Fi Shield (right out of the box). The ESP8266 module
is a very low-cost board with a large, and rapidly
increasing, community.
3.7. LCD (Liquid Crystal Display)
We use LCD Module to display interactive
messaging. We take a look at a smart LCD display of
lines, sixteen characters per line, which is frequently
connected to controllers. The display protocol
(handshaking) has been established. The data strains are
D0 to D7th bit, the control pins are RS, RW, and EN, and
the last pins are +5V, -5V, and GND to provide power.
The Register Select pin is RS, the Read Write pin is RW,
and the Enable pin is EN.
3.8. Speaker
Speakers are devices that transform electricity into
energy (motion). The energy compresses the air and
transforms the motion into sound energy, or the degree of
instantaneous Sound Pressure Level (SPL). A magnetic
flux is created when an electrical current is sent through a
coil of wire. A current is sent through the voice coil in
speakers, creating an electrical field that interacts with the
magnetic flux of the speaker's static magnet.
3.9. ThingSpeak
It's an open-source Internet of Things (IoT)
application called ThingSpeak. Using the Hypertext
Transfer Protocol (HTTP) and Message Queuing
Telemetry Transport (MQTT) protocols through the web
or via a local area network, you can store and retrieve data
from items. ThingSpeak is a cloud-based IoT analytics tool
that allows you to gather, visualize, and analyses live data
streams. ThingSpeak visualizes knowledge posted by your
gadgets in real time.
3.10. Keil
The keil 8051 development tools are meant to help
embedded software developers address challenging
challenges. This program is an integrated development
47
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
environment (IDE) that includes a text editor, a compiler,
and the ability to convert ASCII text files to hex files.
IV. METHODOLOGY
The figure 5 depicts the methodology of the integrated
system within the sort of the flowchart. The systematic
steps to achieve our objectives are presented in the form of
process flow as given below. In general, there is a
tendency of slope failures in mountainous terrain and
opencast mines in India. To provide some relief from the
current difficulty, we devised a technique in which the
accelerometer sensor is used to measure elevation data.
The data was presented within the ThingSpeak program
since the captured values were transferred to the cloud via
the ESP01 Wi-Fi module. The literature survey related to
the chosen areas was completed. The objectives are
identified and methodology was proposed. Selected the
required software and hardware modules for integration of
system. Interfaced the rain sensor, soil moisture sensor,
accelerometer, IoT module with controller to detect the
displacement of sensors. Cloud based Graphical User
Interface (GUI) was created to know the status of sensors.
Cloud based GUI can be utilized for knowing real-time
status of sensors and store the data on cloud. The
integrated system was tested in laboratory and output data
was observed.
MEMS I2C, Rain sensor, and Soil moisture sensor then it
continuously checks the MEMS I2C, Rain sensor, and Soil
moisture sensor for the MEMS > Threshold value. If the
value is yes, the speech IC is triggered, and the data is
communicated to the IoT webpage and the data will be
reviewed on a regular basis. If the answer is no, the
process will be repeated. In case of Yes, the rain sensor
and soil moisture sensor are equal to one. The voice IC
will be turned on, and data will be sent to the cloud
platform. It also checks the data on a regular basis. If the
answer is no, the process will be repeated.
Fig.6: Algorithm
4.2. Hardware Connection
The Figure 7. Represents the Physical integration of
sensors, communication modules, Controller and power
supply. The soil moisture sensor was connected to,
measures the water level whether it is high or low. It will
also connect directly to the rain sensor, displacement
sensor module, voice IC, and speaker on the
microcontroller.
Fig. 7: Hardware Physical Connections
4.1. Algorithm
V. IOT BASED REAL TIME APPLICATION OF
TILT SENSOR
The Figure 6.Shows the Principle of integrated system
in the form of algorithm. First step is to initialize that the
A slope failure is an occurrence in which a slope
collapses suddenly due to internal damaged self-retain
Fig. 5: Process Flow
ISBN: 978-93-5619-947-7
48
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
ability because of geological disturbance in earth crust.
Because of this, the people who are working on the slopes
are failing to escape before identifying failure. Though it is
not achievable to stop the slope failures by this integrated
design, this design can give the pre-warning for slope
failures[8]. The project aims to capture the slope
movements through the accelerometer sensor (Figure.8).
The captured readings from the sensor are transferred to
server through the integrated system which consists of
Sensors, microcontroller (Arduino) and Wi-Fi module
(ESP-01 module) which works as communication
medium, and it was used to integrate the device to internet.
The Received data from the installed integrated system are
continuously plotted in an open-source Internet of Things
(IoT) service provider displayed through the Thing Speak
software. Real time monitoring of terrain surface is one of
the challenging research areas. Hence, the paper discusses
the development of system that the readings and the
system plot about the elevation of the particular objects
which is useful for landslide detection. This system uses
the accelerometer sensor that senses the movement of the
object, an ESP01 which is a Wi-Fi module used to send
the recorded data to the cloud, and the ThingSpeak
software which is used to visualize the data in the form of
graphs and values [9, 10]. The integrated system is useful
for the landslide detection and monitoring. The further upgradation of system can be done by installing the
integrated system in two or three landslide prone areas.
display high; otherwise, it will display low as shown in the
table 1. Figure 9. Shows that the output of x and y axis
values of the slope angle whether it is high or low is
defined in the Graphical manner. Figure 10. Shows that the
output of the x and y axis values of Soil Moisture whether
it is dry or wet is defined in the Graphical manner.
Table 1. Data measured by the Integrated System during
Laboratory Investigations in the July & August 2021 event
DATE
20/7/2021
22/7/2021
26/7/2021
28/7/2021
30/7/2021
1/8/2021
6/8/2021
SLOPE
ANGLE
24.5
20.4
19.3
15.8
28.5
33.9
31.2
RAI
N
SENSOR
Dry
Wet
Wet
Dry
Wet
Wet
Dry
SOIL
MOISTURE
236
258
269
240
282
296
239
Fig. 9 Graphical Representation of Slope Angle
Fig. 8: Hardware connections of integrated system
VI. RESULTS
As per the Indian director general of mine safety
guidelines the stable bench slope angle should maintain 45
degrees. The angle of slope is measured by the
displacement sensor in four different ways: less than 45
degrees, more than 45 degrees, and less than 25 degrees,
greater than 25 degrees, which is shown on the LCD
screen and offers the voice of the angle slope. Rain sensor
detects the presence of rain and displays "It's raining" on
the LCD screen when it's raining. It also makes the voice
seem like it’s raining. The required amount of water
indicates the water level; if it is high, the LCD panel will
ISBN: 978-93-5619-947-7
Fig. 10: Graphical Representation of Soil Moisture
The Figure 11. Represents the status of integrated
sensors in the cloud platform. The data and values of the
49
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
slope angle are stored for the displacement sensor by
tilting the displacement sensor and two for soil moistures,
which indicate if the water level is high or low. One is for
the rain sensor, which records data about when it rains and
displays the values of these sensors in a graphical manner.
studies can be carried out by applying the soft computing
techniques and data processing algorithms using signal
processing tools like MATrix LABoratory (MATLAB), to
forecasting the future failures. This work can be further
extended by implementing in various fields and different
industrial application where slope failures are the part of
production process. The field experimental trial was
conducted successfully with integrated TDR system in
three locations of a typical opencast metal mine for the
period of five months during 1st August 2017 to 27th
December 2017. The conventional system of slope
behavior monitoring during the above period using total
station did not show any significant surface movements.
Similarly, the TDR time series also indicated no
significant change in initial RC values (0.25 to 0.28)
during experimental trial indicating stability of slope and
supporting the conventional system of slope behavior
monitoring. However, the change in the RC value
exceeding 0.332 (as established through laboratory model)
can be considered as deformation of about 6 mm in the
cable.
REFERENCES
[1]
Fig. 11: Thing Speak output
VII. CONCLUSION
Slope monitoring is one of the challenging research
area. In this paper, we designed the hardware prototype in
order to detect the movement by using the accelerometer
sensor. The factors effecting the slope failure includes the
rain fall, slope movement and presents of water in the
ground, the integrated system consists of three different
sensors for monitoring the above parameters. The data that
was generated by the sensor was successfully transmitted
and synchronized with cloud for visualization and
accessibility. The designed system was useful at the
normal hilly areas and also at the mining areas. This
system will also be helpful for the people living at the
mountain areas in order to reduce the mortality. The future
ISBN: 978-93-5619-947-7
Benson, Craig H, Peter J.B. Time-domain reflectometry (TDR) in
geotechnics: a review. Nondestructive and automated testing for
soil and rock properties. ASTM International. 1999; 1-10.
[2] Brambilla, Davide, Laura L, Monica P. Field and Laboratory
Testing of Time Domain Reflectometry Cables for Landslide
Monitoring.
International
Multidisciplinary
Scientific
GeoConference: SGEM. Surveying Geology & mining Ecology
Management. 2015; 2: 329.
[3] Karthik, G., Sharma, G., & Jayanthu, S. (2020). IoT-Based RealTime Application of Tilt Sensor for the Pre-warning of Slope
Failure—A Laboratory Test. In Energy Systems, Drives and
Automations (pp. 339-347). Springer, Singapore.
[4] Chang D. T. T, Guo L. L, Yang K. C, Tsai Y. S. Study of Wireless
Sensor Network (WSN) using for slope stability monitoring. In
Electric Technology and Civil Engineering (ICETCE). 2011; 68776880.
[5] Prashanth, R., & Nimaje, D. S. (2019). Development of blastinduced ground vibration wireless monitoring system.
[6] Karthik, Guntha, and Singam Jayanthu. "Review on low-cost
wireless communication systems
for slope stability monitoring
in opencast mines." International Journal of Mining and Mineral
Engineering 9.1 (2018): 21-31.
[7] Jayanthu, S., Guntha Karthik, and P. M. G. Shohood A.
"Development of Indigenous Wireless Tiltmeter for Slope Stability
Monitoring in Opencast Mines." (2016).
[8] Karthik, G., et al. "Utilisation of mobile communication in
opencast mines." International Journal of Computer Science and
Mobile Computing 3.7 (2014): 373-378.
[9] Liu, Jen-Hao, et al. "Developed urban air quality monitoring
system based on wireless sensor networks." 2011 Fifth
International Conference on Sensing Technology. IEEE, 2011.
[10] Postolache, Octavian A., JM Dias Pereira, and PMB Silva Girao.
"Smart sensors network for air quality monitoring applications."
IEEE Transactions on Instrumentation and Measurement 58.9
(2009): 3253-3262.
[11] Guntha Karthik, A.Gopala Sharma, Singam Jayanthu ―IoT Based
Real Time Application of Tilt Sensor for the Pre-warning of Slope
Failure –A Laboratory Test‖ Published in The book series Lecture
Notes in Electrical Engineering.
[12] Devendra Kumar Yadava, Guntha Karthik, Singam Jayanthu,
―Studying Time Domain Reflectometry to Predict Slope Failure in
Open-Cast Mines‖ Published in Journal of Mining Science, 2020,
Vol. 56, No. 5, pp. 760–770.
50
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
A Study on Machine Learning Methodologies for
breast Carcinoma Disease Prediction
Mr. K. VigneshKumar1, Dr. N. Sumathi2, Dr. S. Ragul3
1
Research Scholar (PhD) / Department of Computer Science,
Sri Ramakrishna College of Arts & Science, Coimbatore
2
Head / Department of Information Technology, Sri Ramakrishna College of Arts & Science, Coimbatore,
3
Ortho, Sparsh Hospital- Narayana Hrudhalaya, Bangalore
Abstract: The second leading cause of death in women is
melanoma. Women with breast cancer will have a better
chance of surviving if they can be detected early. The use of
machine learning and data mining in the early diagnosis
identification of breast cancer has become standard. The goal
of this study is to evaluate the influence of machine learning
(ML) approaches in the identification and treatment of
breast cancer. The majority of these studies used the WEKA
tool to identify and predict breast cancer. The majority of the
studies considered various classification algorithms for
breast cancer prediction, including Decision Tree, Nave
Bayes, and Artificial Neural Network.
malignant tumour that grows rapidly and worsens with
time, eventually causing death [1]. Although females are
more likely to have breast cancer, males are less likely to
develop it [1, 2]. A tumour might be benign (meaning it
isn't harmful to your health) or malignant (meaning it has
the potential to cause serious harm) [2]. Breast cancer risk
can be increased by factors including age and a genetic
history of the disease [2, 8].
Keywords: Breast Cancer, Machine Learning, Data Mining,
Classification Algorithms, Clustering Algorithms.
I. INTRODUCTION
Breast cancer is the leading cause malignancy among
women in both developed countries and developing
countries. It is also the second leading cause of mortality
from cancer in women [1,2]. According to a 2019 WHO
report, "it is expected that over 608 000 women died
worldwide cancer cases in 2019"[3]. With early detection,
however, 98 percent of women might live for six years or
longer [1, 2]. In the diagnosis of breast cancer, data and
machine computing have been widely applied [4].
Furthermore, medical researchers can use data mining and
data mining technologies to find correlations between
factors and predict disease outcomes using historical
information [4, 5].
Machine learning can be applied to improve breast
cancer detection and diagnosis, as well as prevent
overtreatment. Also, it could be assistance to accurate
decision making [4-7]. Therefore, the aim of this research
is to review the role of machine learning and data mining
techniques in breast cancer detection and diagnosis. This
research is organized as follows; Section II introduces a
brief of breast cancer. Section III explains the algorithms
and tools of data mining and machine learning used for
breast cancer prediction. Section IV summarizes recent
studies related to breast cancer diagnosis and prediction.
Section V discusses the literature survey. Finally, Section
VI concludes the research with a future scope.
Figure 1. Breast Cancer [35]
2.2 Types and Stages of Breast Cancer
Breast cancer therapy choices are determined by the
stage and kind of cancer [9, 10]. Breast cancer is classified
based on the state of specific receptors [10].
Figure 2. Stages of Breast Cancer
Two types of tumors are identified [2, 10]
• Benign: This tumour type is not harmful to the human
body and only causes mortality in a small percentage of
cases. This form of tumour only grows in one place of the
body (spot) and has a restricted growth rate.
• Malignant: Breast cancer is a type of tumour that is
more deadly and causes human death. Whenever
lymphocytes in the chest wall grow improperly, a cancer
forms. The most common kinds of breast cancer are:
II. BREAST CANCER
2.1 Breast Cancer
Breast cancer can develop in the mammary gland, the
fatty tissue, or the fibrous tissue. Breast cancer is a
ISBN: 978-93-5619-947-7
Ductal Carcinoma in Situ (DCIS): is the earliest form of
breast cancer and is curable.
Invasive Ductal Carcinoma (IDC): begin in the milk
duct and is the most common breast cancer.
51
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Surgery: Breast cancer surgery is divided into two
categories. Breast conserving surgeries, often known as a
lumpectomy, is the very first surgical procedure
performed. The purpose of treatment is to prevent the
cancerous area of the breast as well as some healthy tissue
around it. The next type of procedure is a mastectomy,
which involves the removal of the breast parenchyma.
Radiotherapy: It kills cancer cells using gamma radiation
Figure 3. Benign and Malignant
Invasive Lobular Carcinoma (ILC): start in a lobule of
the breast. It has the ability to spread fast to the lymph
nodes and other areas of the body.
The main stages of breast cancer [9-11]
The grade of breast cancer describes the size of the
tumour and indicates if it has spread. The following are
the primary phases of breast cancer:
Grade I: Basic cancer with a tiny tumour (two centimetres
or less) that hasn't migrated to lymph nodes.
Grade II: There are two stages in this stage: stage IIA and
phase IIB.
Grade IIA: The cancer has spread to lymph nodes beneath
the arm (auxiliary lymph nodes) but is not greater than two
cm. OR the cancer has gone to the lymph glands but is
only two to five cm long.
Grade IIB: The cancer has lead to infections under the
arm and has a diameter of two to five centimetres.
OR the cancer has developed into cancer under the arm
but is not larger than five centimetres.
Breast cancer in grades III and IV is referred to as
'Advanced Breast Cancer’.
Grade III: The tumours have grown to a larger size. They
could have spread to the lymph nodes and the breast tissue
around them.
Grade IV: Tumours have progressed to other regions of
the body, such as the bone and lungs.
2.3 Treatment of breast cancer
Patients can sometimes be cured with one or a variety
of treatments, depending on the woman's age, type, and
stage of the disease. The following are the most common
breast pharmacological treatments: [2, 8,]
Figure 4. Surgery [36]
ISBN: 978-93-5619-947-7
Figure 5. Radiotherapy
Chemotherapy: Chemo is a cancer therapy that
involves the use of medication to destroy cancer cells.
Chemotherapy drugs come in a variety of forms, but they
all function in the same way. They block cancer cells from
multiplying, preventing them from spreading throughout
the body [7].
Figure 6. Chemotherapy [37]
Hormone Therapy: Hormones like oestrogen and
progesterone can affect certain forms of breast cancer.
Breast cancer cells include receptors (proteins) that bind to
oestrogen and progesterone, allowing them to proliferate.
Hormonal or neuroendocrine therapy is a treatment that
prevents hormones from binding to these receptors.
Hormone therapy has the ability to reach cancer cells
practically anywhere in the body, not just the breast. It's
suggested for women who have hormone receptor-positive
malignancies. It is ineffective for women whose tumours
lack hormone receptors (these tumours are called hormone
receptor-negative) [6].
Biological Therapy: Biological therapy is a type of
treatment that aids the immune system in fighting cancer.
Immunotherapy, Biological Response Modifier (BRM)
treatment, and Biotherapy are all terms for the same thing.
52
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Your immune system tries to maintain your body safe
from outside invaders like germs and viruses. The immune
cells can also aid in the detection and elimination of
cancerous cells [7].
algorithms are widely utilised for classification in various
fields of research, such as medicine and health difficulties.
There are several different types of decision tree
algorithms, including ID3 and C4.5. J48, on the other
hand, is the most often used decision tree algorithm. J48 is
an upgrade of ID3 and is based on an upgraded version of
C4.5 [13, 14].
Regression: Regression is a statistical technique that
is commonly used to make numerical predictions.
Regression analysis, multiple regression, regression
models, and weighted regression are all examples of
regression. For more intricate data gathering, there are
numerous non-linear regression approaches to consider.
For classification, any logistic regression, whether linear
or nonlinear, can be employed.
Figure 7. Hormone Therapy [38]
The detection of regional trends based on a given data
is also included in regression. Furthermore, regression
frequently produces good results in practise. [13,14].
Figure 8. Biological Therapy
III. DATA MINING AND MACHINE LEARNING
3.1 Data mining and machine learning
Data mining is the method of identifying intriguing,
relevant patterns in large data sets to represent knowledge
[6, 7]. This knowledge can be used to improve illness
decision support, prevention, detection, and treatment [2,
14]. Data mining, which can handle large amounts of data
with various qualities, is known as formal technique for
finding intriguing patterns in large amounts of data [15].
The goals of data mining include pattern identification,
reduction of complexity, and processing time savings [15,
16]. Machine learning technique of improving a program's
efficiency without requiring human intervention. [1, 2]
Machine learning is divided into two categories:
supervised learning and unsupervised learning (2).
Choosing a machine learning method is largely
determined by the types and structures of the data [17].
3.2 Data Mining Algorithms
There are many algorithms such as Decision Trees,
Naïve Bayes, k-means, and Neural Network. They are
used for analyzing a huge amount of data. Some popular
data mining algorithms are discussed in the following:
Decision Tree Algorithms: Successful deep learning
classification methods include decision tree algorithms.
They are supervised learning approaches that employ
information that has been gathered and trimmed in order
to enhance outcomes. Furthermore, decision tree
ISBN: 978-93-5619-947-7
Multilayer Perception: A simple two neural network
without any hidden layers is referred to as a multilayer
perceptron. In actuality, a two-layer perceptron (without
the input layer) is sufficient. A decision tree has the same
substantial power as a multilayer perceptron. For the
fundamental classification task, the convolution layer is an
accurate predictor. Training a multilayer perceptron is, in
fact, very similar to logistic regression. Multilayer
perceptrons, on the other hand, have the advantage of
being able to learn to disregard unnecessary qualities. On
many actual datasets, recent research has shown that
convolution layer can match with more current learning
algorithms [13, 14].
Association Rules: Association rules are essentially
if/then statements that aid in the discovery of connections
between seemingly unrelated data. As a result, they can
anticipate any of the traits, not only those belonging to a
specific class. Indeed, frequent patterns provide
association rules, and we can look for strong relationships
between frequent patterns to use for categorization. In
addition, association rules can be used to analyse and
predict patterns of behaviour [13, 14].
Support Vector Machine (SVM): The Support
Vector Machine, or SVM, is a popular Supervised
Learning technique that may be used to solve both
classification and regression issues. However, it is mostly
employed in Learning Algorithms for Classification
difficulties. [18]
Artificial Neural Network (ANN): The Artificial
Neural Network (ANN) is a logic model based on how the
real brain functions [4, 5]. Over the last few decades,
ANN has become a hot topic of research, with an
increasing number of scholars using it. It is made up of
input, hidden, and output layers that are all interrelated.
The data is received by the neural network at the input
nodes, which is subsequently processed by a hidden layer,
53
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
which ultimately provides the training effectiveness to the
output nodes [4]. In the learning phase, the Network
adjusts the weights in order to predict the proper classifier
of the input [5].
It also has hundreds of mathematical functions to support
multi-paradigm numerical calculations which make it
suitable to the computing environment [25, 26].
IV. LITERATURE SURVEY
Naïve Bayes (NB): It is a probabilistic classifier and
among the most effective classification algorithms [9, 19].
It is based on Bayes' theorem and strong (nave)
independent assumptions. Given the class variable, it is
assumed that the quantity of the feature is independent of
the number of any other features. Based on the most likely
scenario. It determines whether a given tuple belongs to a
specific class [19].
K-Nearest-Neighbours (KNN) Algorithm: In
pattern recognition, it is a simple supervised learning
algorithm. Because of its simplicity in design in the area
of machine learning, it is among the most used
neighbourhood classifiers [20]. The KNN method saves all
cases and categorises new ones using similarity measures;
it explores the pattern field for the k training dataset that
are nearest to the unknown ones. The performance is
determined by the appropriate number of neighbours (k),
which varies from data set to data sample [21].
3.3 Data Mining Tools
Data mining methods give a representation of
mining algorithms that is ready to use. The majority of
them are open source platform software that is available
for free. Some of them are
WEKA: For Knowledge Learning, WEKA is a set of
machine learning techniques and data pre-processing
tools. Waikato Ecosystem for Knowledge Analysis
(WEKA) is the acronym for Waikato Environment for
Knowledge Analysis. It's a computer application that was
created at New Zealand's University of Waikato. The
program written in Java and may run on practically any
machine. It's a data mining programme that's available for
free. WEKA can help you evaluate, visualise, and prepare
your input data. Different learning algorithms, such as
classification, grouping, and regression, are also supported
[7].
Tanagra: Tanagra is a free supervised learning
software that can be used for academic and research
purposes. Ricco Rakotomalala of the Lumière University
Lyon 2 in France created it. Tanagra offers visualisation,
descriptive analysis, regression, clustering, classification,
and association rule learning, among other information
extraction [22].
Orange: Orange is a Python-based tool for machine
learning and data mining. Its visual programming interface
is clean and easily understood. The orange may be more
suited for novice researchers and small projects [23, 24].
Matlab: Matlab as a data mining tool has an
interpreted language and graphical user interfaces (GUIs).
ISBN: 978-93-5619-947-7
Several current research articles were examined in
order to learn more about computational approaches for
breast cancer prediction. Below are summaries of each of
them.
Chaurasia et al. [25] created breast cancer prediction
models for both benign and malignant cancers. The data
set for Wisconsin breast cancer was used. There were 699
occurrences in the dataset, class 2 (normal and cancerous),
and nine integer-valued clinical variables like cell size
uniformity. The 16 occurrences with missing values were
eliminated from the data set, leaving a total of 683
instances. There were 458 benign (65.5%) and 241
malignant (34.5 percent). The Waikato Environment for
Knowledge Analysis examined the trial (WEKA).
Yue et al. [4] examined publications on the use of
machine learning (ML) technologies in the diagnosis and
prognosis of breast cancer. The researchers concentrated
on artificial neural networks (ANNs) and support vector
machines. Tools such as support vector machines (SVMs),
decision trees (DTs), and k-nearest neighbours (k-NNs).
They also made use of the Breast cancer database in
Wisconsin. Machine learning has demonstrated a
remarkable ability to improve. The accuracy of
classification and prediction, the researchers presented a
well-organized and easy-to-understand data set.
Banu and Ponniah [6] developed a breast cancer
prediction classifier approach. The study found that Bayes
classifiers such as Tree Augmented Naive Bayes (TAN),
Boosted Augmented Naive Bayes (BAN), and Bayes
Belief Network (BBN) can be employed to achieve the
best classification and accuracy results. Wisconsin
Diagnostic Breast Cancer (WDBC) is the dataset used in
this study, and it contains 569 instances with 32 variables.
All classifiers are coupled with the Gradient Boosting
(GB) approach to improve accuracy. The three classifiers
have practically identical accuracy of 90.1 percent before
using the GB method.
Akinsola et al. [26] proposed a breast cancer
prognosis system that can help doctors forecast the status
of patients with breast cancer based on their clinical data
(classes were a benign and malignant tumor). The Home
dataset, which had over 1700 cases and was obtained from
a State government hospital in Lagos, was used. Eleven
criteria were chosen, including cell volume, cell shape,
and anticipated class. To identify breast cancer data, three
supervised training algorithms were applied. The WEKA
toolbox was used to study C4.5, Multilayer Perceptron
(MLP), and Nave Bayes. Mirajkar and Lakshmi [27]
predicted the type of cancer using Naïve Bayes
Classification algorithm of data mining. Proposed method
54
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
aimed to predict the risk of certain types of cancer. Based
on the Naïve Bayes algorithm, symptoms of the cancer
were classified to recognize the risk of cancer such as
breast and ovarian.
Oskouei et al. [14] conducted a comprehensive
assessment of all research that used data mining
techniques in the diagnosis, therapy, and prognosis of
breast cancer. And highlighting the major issues which
still remain in this field as a result of these investigations.
There were 45 publications examined, which were
presented as follows based on the principal purpose. The
accuracy of employing several categorization algorithms
to detect breast tumours was compared in twenty-one
papers. A method to identify benign from malignant breast
cancers was proposed in twelve articles. Regression Data
Mining Methods were used in one of the articles to
diagnose the early stages of breast cancer in carcinoma
databases.
The suggested technique, according to Mandal [28],
tries to identify the lowest feature set that can ensure
highly accurate categorization. Data cleaning, data
dimensionality reduction, and data transformation were all
done prior to classification. The WDBC cancer dataset
was used in the study, and it was obtained from the UCI
repository. The dataset includes 569 cases and 32
attributes, with 70 percent of the instances being used for
training and 30 percent being used for testing. Three
classification approaches were used to classify the testing
data.
Sumalatha & Archana [29] studied different data
mining techniques for early diagnosis and prediction of
breast cancer. The research work analyses the J48 and
ZeroR algorithms to predict breast cancer. These two
algorithms were applied using WEKA. Total instances of
ZeroR analysis were 699. The three major steps used in
this research, the collection of datasets, data preprocessing
and classification.
Devi et al. [30] investigated automated diagnosis of
breast cancer based on a machine learning algorithm. The
proposed approach was a three steps process. In the first
step, the data were grouped into a number of clusters using
the Farthest First clustering algorithm. Due to shrinking
the size of the dataset, the computation time reduced
greatly.
Abed et al. [31] created a hybrid classification system
that incorporates both the Genetic Technique (GA) and the
k Nearest Neighbour algorithm (kNN). To aid breast
cancer doctors in early detection and prediction. Data
mining methods were employed to assist breast cancer
doctors in making an early diagnosis of the disease. The
GA algorithm's primary goal is to improve approaches; it
was utilised for kNN by choosing the best features and
optimising the value of k, whereas the kNN is being used
for classification. Lavanya et al. [32] presented breast
cancer prediction system based on a hybrid approach;
ISBN: 978-93-5619-947-7
classification and regression trees (CART) classifier with
feature selection and bagging technique for higher
classification accuracy and improved diagnosis. They used
the hybrid approach to enhance the classification accuracy
of breast cancer and Feature Selection to remove irrelevant
attributes that do not play any role in the classification
task. The Bagging means Bootstrap aggregation was used
to classify the data with good accuracy.
Sivakami [33] proposed breast cancer Hybrid Model
which integrates DT and SVM algorithms. This model
was used to classify patients into two classes
(Benign/Malignant). The dataset containing eleven
attributes was obtained from Wisconsin Breast Cancer
Dataset (WBCD) taken from UCI machine learning
repository which contains 699 instances where 241 cases
belong to the malignant class and 458 cases belong to the
benign class. Sixteen instances of the dataset have missing
values.
Zand et al. [5] presented a comparative survey on data
mining techniques in the diagnosis and prediction of breast
cancer. And analysis of the prediction to find the most
suitable technique for predicting cancer survival rate.
Three classification techniques were used; Naïve Bayes,
neural network, and C4.5 algorithms were investigated
using WEKA toolkit.
Joshi J. et al. [34] this research used four cluster
algorithms to early diagnoses of breast cancer patients.
The dataset was obtained from the UCI web data
repository. Record set with 10 attributes (age, Menopause,
Tumor-size, inv-nodes, Node-caps, etc.). Clustering
techniques such as K-Means, Hierarchical Cluster Method
(HCM), Expectation Maximization and Farthest First were
applied.
V. DISCUSSION
This study outlines some of the most recent data
mining studies in the field of breast cancer. Data mining
methods can be used to "mine" necessary details from the
massive amounts of data produced by health services.
These experiments revealed that using many algorithms on
a data collection produces better results than using a single
method. In the majority of the studies, WEKA is used.
Other popular data analysis tools include C++, Tanagra,
Mat lab, and others. The combination of algorithms
chosen with care and their accurate implementation on the
data set result in an effective diagnosis and prognosis
system for breast cancer. The necessary dataset is split into
two parts: one for machine learning and the other for
testing them. The majority of the studies compared various
different classifiers on a dataset in order to correctly
classify whether a patient has benign or aggressive breast
cancer. Breast Cancer Treatment and Diagnosis Using
Machine Learning and Data Mining technique: A Study
has been used in various researches to predict breast
cancer survival. The risk of breast cancer factor model is
examined. Decision trees, Nave Bayes, Artificial Neural
55
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Networks, Association Rules, Support Vector Machines,
and Regression are some of the most widely used
classification approaches.
VI. CONCLUSION
Breast cancer is a leading cause cancer among women
as well as the second leading cause of death from cancer.
If the early indications of tumours are neglected, the
patient's health may suffer severe effects, including death.
When breast cancer is identified early, it is possible to
keep it under control. Instead of investigating various
residential data cleaning and pruning approaches that can
compile and make a dataset acceptable for mining, many
studies focus primarily on the implementation of
classification algorithms to breast cancer prediction. A
good dataset has been shown to deliver improved
accuracy. The design of prediction systems will be aided
by the selection of appropriate algorithms and a solid
home dataset. These systems can help a patient with breast
cancer choose the best therapy options. There are various
treatments for a particular patient on their stage of breast
cancer; data and machine intelligence can be very useful
in determining the best course of treatment by knowledge
extraction from appropriate databases.
REFERENCES
[1] World Health Organization. Cardiovascular diseases (CVDs).
https://www.who.int/cardiovascular_diseases/en/. [Accessed 3rd
January 2019].
[2] Mayo Clinic. Breast Cancer: Symptoms and causes - [Internet].
Mayo Clinic. 2016. Available from: https://www.mayoclinic.
org/diseases.../
breast-cancer/symptoms-causes/syc-20352470
[Accessed 5th January 2019].
[3] World Health Orgaization. Breast cancer:prevention and control.
WHO; report 2016.
[4] Yue W, Wang Z, Chen H, Payne A, Liu X. “Machine learning with
applications in breast cancer diagnosis and prognosis”. Designs.
2018; 2(2):13.
[5] Zand HK. “A comparative survey on data mining techniques for
breast cancer diagnosis and prediction”. Ind. J. Fundam. Appl. Life
Sci. 2015; 5 (S1):4330-9.
[6] https://www.cancer.org/cancer/breast-cancer/treatment/hormonetherapy-for-breast-cancer.html
[7] https://www.cancer.org/cancer/breastcancer/treatment/chemotherapy-for-breast-cancer.html
[8] NHS. Breast cancer in women: Treatment - NHS [Internet].
Available
from:
https://www.nhs.uk/conditions/breastcancer/treatment/ [Accessed 8th January 2019].
[9] Maughan KL, Lutterbie MA, Ham PS. Treatment of breast cancer.
Am Fam Physician. 2010; 81(11):1339–46. DOI: 10.1002/10970142(19810501)47:9
[10] Roche. Breast cancer a guide for journalists on breast cancer and its
treatment. p. 1–10.
[11] Genentech. Types and Features of Breast Cancer. 2015; 1–2.
[12] Anderson BO. G LOBAL B REAST C ANCER T RENDS UICC
World Cancer Congress 2014 : Breast Heal Glob Initiat. 2014;1–
10.
[13] Han J, Kamber M, Pei J. “Data mining: concepts and techniques”.
(3rd Ed.)2012; San Francisco, CA, USA: Morgan Kaufmann
Publishers.
[14] Witten IH, Frank E, Hall MA, Pal CJ. “Data Mining: Practical
machine learning tools and techniques”. (3rd Ed.)2011; San
Francisco: Morgan Kaufmann.
[15] Zand HK. “A comparative survey on Data Mining Techniques for
Breast Cancer Diagnosis and Prediction”. Indian Journal of
Fundamental and Applied Life Sciences. 2015; 5(S1):4330-4339.
ISBN: 978-93-5619-947-7
[16] Chaurasia V, Pal S. “A Novel Approach for Breast Cancer
Detection using Data Mining Techniques”. (IJIRCCE) International
Journal of Innovative Research in Computer and Communication
Engineering.2014; 2(1): 2456-65
[17] https://www.urmc.rochester.edu/encyclopedia/content.
aspx?ContentTypeID=85&ContentID=P00566#:~:text=Biological
%20therapy%20is%20medicine%20that,Biotherapy.
[18] https://www.javatpoint.com/machine-learning-support-vectormachine-algorithm
[19] Banu B, Thirumalaikolundusubramanian P.” Comparison of Bayes
Classifiers for Breast Cancer Classification”. Asian Pacific journal
of cancer prevention ( APJCP). 2018; 19(10):2917-20.DOI:
10.22034/APJCP.2018.19.10.2917
[20] Jabbar MA, Deekshatulu BL, Chandra P. “Classification of heart
disease using k-nearest neighbor and genetic algorithm”.
International Conference on Computational Intelligence: Modeling
Techniques and Applications (CIMTA).2013; 10:85-94.
[21] Hassanat AB, Abbadi MA, Altarawneh GA, Alhasanat AA.
“Solving the problem of the K parameter in the KNN classifier
using an ensemble learning approach”. (IJCSIS) International
Journal of Computer Science and Information Securit. 2014;
12(8):33-9
[22] Naik A, Samant L. “Correlation review of classification algorithm
using data mining tool: WEKA, Rapidminer, Tanagra, Orange and
Knime”. International Conference on Computational Modeling and
Security
(CMS
2016).
2016;
85:662-8.
doi:
10.1016/j.procs.2016.05.251
[23] Jovic A, Brkic K, Bogunovic N. “An overview of free software tools
for general data mining”. 37th International Convention on
Information and Communication Technology, Electronics and
Microelectronics (MIPRO). 2014: 1112-7.
[24] Slater S, Joksimović S, Kovanovic V, Baker RS, Gasevic D. “Tools
for educational data mining: A review”. Journal of Educational and
Behavioral Statistics. 2017; 42(1):85-106.
[25] Chaurasia V, Pal S, Tiwari BB. “Prediction of benign and
malignant breast cancer using data mining techniques”. Journal of
Algorithms & Computational Technology. 2018; 12(2):119-26.
DOI: 10.1177/1748301818756225
[26] Akinsola AF, Sokunbi MA, Onadokun IO. “Data Mining For Breast
Cancer Classification”. International Journal of Engineering And
Computer
Science.
2017;
6(8):
22250-22258.
DOI:
10.18535/ijecs/v6i8.06.
[27] Mirajkar and Lakshmi [30] predicted the type of cancer using Naïve
Bayes Classification algorithm of data mining. Proposed method
aimed to predict the risk of certain types of cancer. Based on the
Naïve Bayes algorithm, symptoms of the cancer were classified to
recognize the risk of cancer such as breast and ovarian.
[28] Mandal SK. “Performance analysis of data mining algorithms for
breast cancer cell detection using Naïve Bayes, logistic regression
and decision tree”. International Journal of Engineering and
Computer
Science.
2017;
6(2):20388-91.
DOI:
10.18535/ijecs/v6i2.40
[29] Sumalatha G, Archana S. “A Study on Early Prevention and
Detection of Breast Cancer using Data Mining Techniques”.
International Journal of Innovative Research in Computer and
Communication Engineering. 2017; 5(6):11045-11050. DOI:
10.15680/IJIRCCE.2017.
[30] Devi RD, Devi MI. “Outlier detection algorithm combined with
decision tree classifier for early diagnosis of breast cancer”.
International Journal of Advanced Engineering Technology.2016;
VII (II): 93-98
[31] Abed BM, et al. “A hybrid classification algorithm approach for
breast cancer diagnosis”. In2016 IEEE Industrial Electronics and
Applications Conference (IEACon). 2016: 269-274.
[32] Lavanya D, Rani KU. “Ensemble Decision Tree Classifier for
Breast Cancer Data”. International Journal of Information
Technology Convergence and Services (IJITCS). 2016; 2(1):17-24.
DOI: 10.5121/ijitcs.2012.2103
[33] Sivakami K. “Mining big data: Breast cancer prediction using DTSVM Hybrid model”. International Journal of Scientific
Engineering and Applied Science (IJSEAS). 2015;
[34] Joshi J, Doshi R, Patel J. “Diagnosis of Breast Cancer Using
Clustering Data mining Approach”. International Journal of
Computer Applications. 2014; 101(10):13-7.
[35] https://www.google.com/url?sa=i&url=https%3A%2F
56
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
%2Fwww.emedicinehealth.com%2Fbreast_cancer%2Farticle_em.h
tm&psig=AOvVaw1OL3dZnIfgVM7YbF01eQgi&ust=164711059
9310000&source=images&cd=vfe&ved=0CAsQjRxqFwoTCPCu4
KfbvvYCFQAAAAAdAAAAABAg
[36] https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.
medicinenet.com%2Fbreast_cancer%2Ftreatment&psig=AOvVaw0
ceWkXg2FDN4Cu-e2g1W6-&ust=1647111248085000&source=
images&cd=vfe&ved=0CAsQjRxqFwoTCNCg0NzdvvYCFQAAA
AAdAAAAABAb
[37] https://www.google.com/url?sa=i&url=https%3A%2F%2Fhea
lthcare-in-europe.com%2Fen%2Fnews%2Fremote-24-hour
monitoring- shows-promise-in-chemotherapy-patients.html& psig=
AOvVaw3sQW - H0n5CIlko25i rIxjq&ust = 16471116121
ISBN: 978-93-5619-947-7
17000&source=images&cd=vfe&ved=0CAsQjRxqFwoTCJC62JLf
vvYCFQAAAAAdAAAAABAf
[38] https://www.google.com/url?sa=i&url=https%3A%2F% 2F www.
hormones-australia.org.au%2Fthe-endocrine-system%2F &psig=
AOvVaw1TK5f0K5Ccpigno Ld8oI3N&ust=1647111854329000&
source=images&cd=vfe&ved=0CAsQjRxqFwoTCIi44frfvvYCFQ
AAAAAdAAAAABAZ.
[39] https://www.google. com/url?sa=i&url=https%3A% 2F% 2F
gvhdhub.com%2Ftherapeutics%2Fbiological-therapy&psig = AOv
Vaw2hTOOxFJDewaTR5_5v3D6A&ust=1647112083483000&sou
rce=images&cd=vfe&ved=0CAsQjRxqFwoTCKCo3uvgvvYCFQA
AAAAdAAAAABAl
57
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Analyze the MIS Support in Education System,
Challenges Arising Globalization and
Liberalization
S.Kiruthiga1, N.Beulah Jebaseeli2,Dr.D.Umanandhini3, Dr.S.Sridevi4
1,2
Assistant Professor, 3 Associate Professor,4Professor
Department of Computer Science & Engineering, School of Computing
Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, India
Abstract: Information, data, and the choice cycle are
connected. Information in the wake of handling is changed
into data and data is the base for dynamic interaction. It is
vital to have pertinent data for right, opportune, and
powerful choices to be made. Management Information
System (MIS) has accepted incredible significance in this
unique situation. The paper clarifies the idea of information,
data, and MIS. The paper examines the significance of MIS,
its fast development, and its most recent MIS patterns. The
education area has an extraordinary spot in the plan of any
administration because of its significance for the prosperity
of the residents and the country in general. Education
Management Information System (EMIS) assumes a
significant part in creating fitting plans, techniques, and
arrangements for further developing the education system.
Keywords: Education Management Information System (EMIS),
Information, Management Information System
I. INTRODUCTION
Innovation assumes a basic part in the day-by-day
activities of most current business substances,
associations,
and
establishments.
Mechanical
advancements and the arrangement of robotized gear
prompted quicker, better, and more productive execution
of undertakings, as well as facilitating information-related
processes. Thusly, Information Systems (IS), have
become key parts of an association's proficiency, data
system portrays as a bunch of interrelated parts that
gather, cycle, store, and disseminate data to help
navigation and control in an association. MIS are
interconnected instruments or gadgets that are utilized to
assemble, process, break down, gather and disseminate
data that is fundamental for management capacities,
cycles, and independent direction.
These cycles incorporate preparation, arranging, and
controlling the product that is utilized to recover and store
information in a helpfully available structure. Scholarly
establishments have authoritative designs and societies
that are not the same as that of organizations, business
associations, and non-benefit associations. Scholarly
establishments, like colleges, are intensely dependent on
MIS systems for exercises, for example, understudy
enlistment, library administrations, online classes, and
online assessments. MIS is in this manner fundamental in
ISBN: 978-93-5619-947-7
the regulatory management of colleges. MIS additionally
incorporates components of Enterprise Resource Planning
(ERP), which is an association-wide data system that
coordinates and controls all the business processes in the
whole association. Even though MIS practically works
with institutional management, there is restricted
empirical proof on the real worth MIS brings to scholastic
associations. This study looked to assess the use of MIS at
MEDIU, Called Campus Management System (CMS) as
well as survey the effect of MIS on the hierarchical
execution of the college.
II. MANAGEMENT INFORMATION SYSTEM
Right independent direction is conceivable with the
proficient usage of data. Considering the huge
information and data accessible to the chiefs, the dynamic
cycle turns out to be undeniably challenging. Data
expected for direction ought to be effectively accessible
[2]. Assortment of information, its transformation to the
data, appropriate capacity of data, recovery of data, and
powerful use of data need Management Information
System famously known as MIS Management
Information System is a PC based system. It is an
exceptionally solid instrument accessible to administrators
for arranging, sorting out, executing, observing,
controlling, and assessing their tasks proficiently. MIS
Facilitates compelling correspondence. MIS comprises
three fundamental parts:
Management, Information, System coordinated
utilization of these three parts empowers clearness in
understanding the issues in question, the effect of every
part on other free data sources yet interconnected with one
another. The choices taken in this manner are fitting about
the business prerequisites. MIS empowers to take on a
multi-disciplinary management approach thinking about
every one of the viewpoints connecting with functional,
monetary, materials, conduct, authoritative practices and
arrangements; and PC-related issues.
The association works in an all-encompassing way
with the assistance of MIS rather than in various sections.
Choices in various portions without adopting a
comprehensive strategy have more noteworthy
58
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
possibilities of disappointment. There is gigantic
avoidable waste in the usage of authoritative assets.
Table 1: Types of information, management levels, and types of
decisions
2.1 MIS supports organizational systems
Hierarchical design fundamentally can be separated
into three layers of order: top management level, center
management level, and lower management level (Fig. 2).
Each level takes choices as per their jobs.
2.2 Objectives
1.
2.
Fig. 1: Decision areas and management levels
The lower-level directors are engaged with
functional choices, center-level managers‟ center around
the strategic choices, and high-level chiefs focus on
essential choices. The vast majority of the standard
exercises are arranged, executed, and overseen by lowerlevel supervisors for instance arranging, planning, and
guaranteeing that every one of the plans is carried out as
chosen.
Center level chiefs invest generally less energy on
the standard arranging exercises and spotlight more on
strategic choices, for example, critical thinking, hole
examination, execution evaluation, and publicizing. The
job of top administrators is different than the lower level
and center level supervisors.
They generally focus on the essential issues like
which item ought to be sent off on the lookout, which
market ought to be tapped, how to make passage into the
space of the contenders, how to set up for different assets,
how to further develop the usefulness of the association,
how to lessen cost, with whom to team up, whether to
automate, how much computerization ought to be
executed, how to prepare the labor to coordinate with
innovative difficulties liable to be confronted and so on
Table 1 show the degree of the management pecking
order in an association, related dynamic jobs and the kind
of data's expected by them.
ISBN: 978-93-5619-947-7
To make information one of the main elements
of the administration, management, and planning
of education
To manage research and plan education by
integrating all the sources of information and
providing synthesized reports to the users.
2.3 Method
In an automated climate, the Management
Information System of educational foundation (school)
may involve a module-coordinated exchange handling
system with information warehousing and information
mining limits, connected with a social data set
management system in appropriated data set mode. The
system is intended to recover data of the inward tasks (of
four utilitarian modules) from information bases that are
refreshed by the exchange handling system. It might
acquire information from outer sources, and cover the
functional method of individuals engaged with its activity.
2.4 Organization Structure
The MIS Model as introduced shows the coordinated
exchange handling and management data-producing
process at two levels - one, at the neighborhood
institutional level and the other, at the bunched level. The
grouped level might involve a bunch of foundations or a
college schools consortium joined as one on a specific
normal functional management plan for asset endlessly
sharing normal framework, offices & administrations
for the economy and proficient management. A focal
observing and handling focus might be worked to take
care of the normal housekeeping works, combined
information handling works, and age of standard and
extraordinary report archives of management data for
every one of the individuals from the group.
59
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
The model as introduced incorporates four utilitarian
modules, specifically, Staff Management Module,
Finance-Accounts & General Module, Students'
Management Module, and Library Management Module
to cover all the repetitive natured authoritative exercises.
The modules contain all-around arranged input interfaces
that can be explored through GUI consistent menus
connected with social tables in an organized structure,
where the information is to be placed into the
standardized dispersed data sets. The useful modules
additionally contain some control menus to run
application programs that create a few useful outcomes
(eg. finance, and so on) and create repeating natured data
set reports. A different menu named 'MIS' in the front-end
point of interaction is worked to produce some clear cut,
organized, repeating natured information base reports,
delegated every day, week after week, month to month,
and yearly planned reports.
Modules. Various modules will contain various
arrangements of info information - both expert and
exchange information and will produce various
arrangements of results - the two inquiries and data set
reports.
The DFD of the transaction processing system (in
FA&G Module) is shown in Figure 1 as an
illustration of the workflow of TPS.
2.5 Overview of the Systems’ Workflow
At the nearby level, all the part establishments will
utilize a uniform automated office management system
(UMOM) and will follow a typical information passage
arrangement to run their neighborhood foundation's
exchange handling system (TPS). The TPS will cover the
information passage activities, information legitimacy,
information capacity, and information digging work for
the data age.
The TPS will gather information through different
GUI agreeable info section interfaces (structures) spread
over in the system in its four useful modules. The
standards of information overt repetitiveness and
standardization will be followed at all levels. The entered
information might go through system-characterized
approval programs into very much organized standardized
data set tables as records. Every one of the records so
entered through TPS will have auto-produced foundation's
code number and date/year, to distinguish its presence in
the solidified information base of the entire group. Such
information might even be placed through various menudriven connection points of different modules utilizing
combo-boxes.
A portion of the tables will contain long-lasting
records and will be called Master Files, while some might
contain the exchange records and be known as the
Transaction Files. An exchange can be supposed to be
finished if and provided that, every one of the related data
sets that are impacted by this exchange is refreshed and
every one of the updates is finished. The TPS will
likewise contain tweaked program bundles to produce
results through legitimate articulations and computations
and create the final products as reports, after gathering
various pieces of information from various experts and
exchanging documents arranged under any of the
ISBN: 978-93-5619-947-7
Fig. 1: DFD showing the general workflow of Transaction
Processing (in F A & G Module)
III. RESULT
The personal dispersion of them (as far as 6 factors,
viz., orientation, age, educational accomplishments,
number of years in educational organization, number of
years in the current position, and level in the association)
has been introduced underneath followed by a
conversation on the conveyance of the respondents
regarding every one of those factors.
Table 2: Respondents as per Gender
Gender
Total
Male
Female
Frequen
cy
%
Frequency
%
No.
%
34
69.39
15
30.61
49
100
Source: Field Survey
The male respondents comprise a seriously high
level of them (69.39%), their female partners being
almost 31% of the respondents. This sort of dissemination
is entirely typical as far as female respondents, especially
in a higher educational organization (HEI).
60
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Table 3. Existing information system is properly used for recruitment planning
Response
Alternatives
Educational Attainments
Graduation
(%)
PostGraduation
1
8
(%)
5.26
42.11
Above
Post- (%)
Graduation
0
00.00
2
40.00
Yes
CannotSay
3
15
12.00
60.00
No
7
28.00
10
52.63
3
Total
25
100.00
19
100.00
5
A majority of the respondents who are graduates and
post-graduates, i.e., 56% and 47.37%, respectively were
not sure whether the existing information system is
properly used for recruitment planning. 80% of the
respondents who are above post-graduates did not think
that the existing information system is properly used for
recruitment planning. 24% and 10.53% of the respondents
who were graduates and post-graduates respectively think
that the existing information system is properly used for
recruitment planning. None of the respondents who are
above post-graduates thought that the existing information
system is properly used for recruitment planning. 20% and
42.10% of the respondents who are graduates and postgraduates respectively did not think that the existing
information system is properly used for recruitment
planning.
The findings clearly indicate that there are conflicting
views, vis-a-vis the response alternatives ‘cannot say’ and
‘no’, between the graduates and post- graduates on the one
hand and the above post-graduates on the other hand. A
majority of the senior administrative officers, i.e., 60%,
did not think that the existing information system
Total
(%)
4
25
08.16
51.02
60.00
20
40.82
100.00
49
100.00
is properly used for recruitment planning. a majority of the
junior administrative officers, i.e., 50%, thought that
theexisting information system is properly used for
recruitment planning. 25% and 25% of the junior
administrative officers respectively were not sure whether,
and do not think that, the existing information system is
properly used for recruitment planning. None of the senior
administrative officers thought that that the existing
informationsystem is properly used for recruitment
planning. Interestingly, the middle-level administrative
officers were equally divided amongst the three response
alternatives. a majority of the senior superintendents, i.e.,
64.29%, did not think that the existing information system
is properly used for recruitment planning. a majority of the
junior superintendents, i.e., 75%, were not sure whether
the existing information system is properly used for
recruitment planning. Only 7.14% and 15% of the senior
and junior superintendents respectively thought that the
existing information system is properly used for
recruitment planning. Only 10% of the junior
superintendents did not think that the existing information
system is properly used for recruitment planning.
Table 4. Existing information system is properly used for recruitment planning
Response
Alternatives
Yes
Cannot Say
No
Total
Level in the Organization
Sr.
0
2
3
5
Administrative Officer
(%) Middle (%)
Jr.
00
2
33.33
2
40
2
33.33
1
60
2
33.34
1
100
6
100
4
(%)
50
25
25
100
Sr.
1
4
9
14
Superintendent
(%)
Jr.
07.14
3
28.57
15
64.29
2
100
20
(%)
15.00
75.00
10.00
100
Total
8
24
17
49
(%)
16.33
48.98
34.69
100
Table 5. Data base relating to the teaching and non-teaching staff is adequate
Response Alternatives
Frequency
%
Yes
Cannot Say
04
25
8.16
51.02
20
49
40.82
100.00
No
Total
Source: Field Survey
ISBN: 978-93-5619-947-7
61
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
A good percentage of the respondents (i.e., nearly 41%)
observed that the data base relating to the teaching and nonteaching staff is not adequate. Again, nearly 51% of them
expressed neither a positive nor a negative view, indicating
their lack of understanding and/or confusion regarding
the adequacy of data base relating to the teaching and nonteaching staff. The indication is quite clear, i.e., there is
definite need for improving the data base relating to the
teaching and non-teaching staff.
Table 6: Computation of the Kendall CoefficientofConcordance(W)basedontheRankingofSix(6)Statements(a, b,c, d,e, &f)by the Respondents
Computation of the Kendall CoefficientofConcordance(W)basedontheRankingofSix(6)Statements(a, b,c, d,e, &f)by
the Respondents
Concerns(N)
c
d
243
194
Respondents(K)
Total
∑Rj/6
Rj--∑Rj/6
a
100
b
294
-71.5
122.5
71.5
s=∑(Rj--∑Rj/6)²
5112.25
15006.25
5112.25
1/12k²*(N³--N)
42017.5
W=36267.5/42017.5
f
102
22.5
-75.5
-69.5
506.25
5700.25
4830.25
Total
50
71.5
67.5
0.152
Rank the statements given below in order of
importance in a scale of 1—6 (1 stands for the most
important and 6 stands for the least important).
a) MIS is the key to proper administration in any
organization.
b) As development and implementation of MIS is an
expensive affair, it may be ignored.
c) The job of storing and maintaining relevant data
required for an effective MIS in an organization should be
outsourced/done by external agents to ensure transparency.
d) Delay in recruitment and promotion is mainly due to
inadequate and/or ineffective MIS in an organization.
e) Top management’s commitment is a must to have a
proper MIS in an organization.
f) Inadequate database and ineffective MIS go hand in
hand.
III. RESULT
It reflects the Indian Higher Education System, as of
now, is confronting many difficulties emerging out of
globalization
and
progression.
The
worldwide
establishments of the twenty-first century are now
advancing, who are bit by bit moving towards becoming
virtual
associations
controlled
by
Information
Communications
Technology
and
Management
Information System. A change in standpoint can likewise
be seen where education has now turned into attractive
assistance rather than social help. Also, the utilization of
Information Technology in the field of education is killing
the idea of the locale of a college, and making IT
empowered offices like conveyed study halls.
education area to worldwide contest, and will result into a
danger to the presence and endurance of more vulnerable
foundations. Another angle that draws huge consideration
is the way that numerous feeble establishments, especially
in rustic, semirural, and immature regions are confronting
asset imperatives that incorporate deficiency of labor
supply and personnel other than the foundation. The XIth
Plan has pushed the development of group schools and
colleges as a solution for the issue. IT-based apparatuses
& applications and IT empowered administrations
through organized climate are relied upon to be sent by
these groups for an ideal - 176-usage of assets, and give
better 'just-in-time' administration to its end-users to battle
worldwide contest. Such a model might be viewed as
accommodating in simple access and trade of important
data and information among the schools and
establishments, subsequently helping the foundations and
the universities in the group to work monetarily in more
extensive regions and with better innovative and functional
adequacy. Such an endeavor of a legitimate plan of a M I
S, keeping in view the authoritative and management
system of the organizations in West Bengal, support the
present and the future day needs for an easy to understand
Uniform Mechanized Office Maintenance System to run
effectively in workplaces of a bunch of educational
foundations of advanced education for functional
productivity and economy in scale, and may subsequently
be considered as a stage towards the improvement of an
'ERP for Indian Educational Sector'.
REFERENCES
[1]
IV. CONCLUSION
[2]
These circumstances make rivalry for schools and
colleges, especially sped up with the opening up of
ISBN: 978-93-5619-947-7
e
96
Harsh, Stephen B., L. J. Connor, and G. D. Schwab, Managing the
farm business. Prentice-Hall, Inc., Englewood Cliffs, New Jersey,
2015.
Pedarpur, M; et al, „Management Information systems, functions,
structure and its importance – In Manager‟s Decision Making‟,
IJCRB, Vol. 4, No. 10, 2013, pp 901-997.
62
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
House, William C., „Decision support systems – a data-based,
model-oriented user-developed discipline, Petrocelli Books, Inc.
NY. 2016.
Laudon, K & Laudon, J., „Management information systems:
managing the digital firms‟, 9th ed, Prentice-Hall, 2015.
Hinchliffe, J.K., Public Expenditure on Education in Nigeria:
issues, estimates, and some implications, Washington, World Bank,
2017.
Carrizo, L; et al, „Information tools for the preparation and
monitoring of education plans‟, Education Policies and Strategies,
UNESCO, Paris, 2018.
Kaduna SMoE, Kaduna State, Education Strategic Plan (ESP) 2006
- 2015, (unpublished), Kaduna SMoE, Final Draft, 2019.
Dawam, S. R., Ahmad, K. A., Jusoff, K., Tajuddian, T., Elias, S. J.,
&Mansor, S. W. (2009). The use of ICT in public and private
institutions of higher learning, Malaysia. Computer and Information
Science, 2 (4), 122–128.
Fulmer, C. (2019). Maximizing the potential of information
technology for management: Strategies for interfacing the technical
core of education. In B. Barta, M. Telem, and Y. Gev (Eds.),
Information Technology in Educational Management (pp. 1–8).
London: Chapman and Hall.
Hruskocy, C., Cennamo, K. S., Ertmer, P. A., & Johnson, T. (2020).
Creating a community of technology users: students become
technology experts for teachers and peers. Journal of Technology
and Teacher Education, 8 (1), 69–84.
Kirkman, C. (2015). A model for the effective management of
information and communications technology development in
schools is derived from six contrasting case studies. Journal of IT
for Teacher Education, 9 (1), 37–52.
Passey, D. (2017). ICT and school management - A review of
selected literature. Unpublished Research Report: Lancaster
University, Department of Educational Research
Visscher, A. J., & Wild, P. (2019). The potential of information
technology in support of teachers and educational managers
managing their work environment. Education and Information
Technologies, 2 (4), 263–274.
Yee, D. L. (2018). Images of school principals’ information and
communications technology leadership. Journal of Information
Technology for Teacher Education, 9 (3), 287–302.
ISBN: 978-93-5619-947-7
63
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Security Based Home Automation
using IoT Devices
Dr.J.Dhilipan1, D.B.Shanmugam2, Chiranjeevi .C3
Professor & Head, Department of Computer Applications, SRM IST, Ramapuram Campus, Chennai
2
Asst. Prof, Department of Computer Applications, SRM IST, Ramapuram Campus, Chennai
3
Final Year MCA, Department of Computer Applications, SRM IST, Ramapuram Campus, Chennai.
1
Abstract: The Internet of things, or IOT, is an arrangement
of interrelated figuring gadgets, mechanical and advanced
machines, items, creatures or individuals that are given
remarkable identifiers and the capacity to move information
over an organization without expecting human-to-human or
human-to-PC association. One of these applications is home
robotization which is utilized to control all electrical home
machines naturally of by means of advanced mobile phones.
This controls gadgets through a Boolean orders of valid and
bogus to control to gadgets. These dampness levels for wet
and dry conditions (cases) can be changed relying upon the
plant necessities for plant development. This can be utilized to
identify soil dampness when the dirt dampness shortage
module plant watering gadget, so the plants in our nursery
without individuals to make due. This aides in numerous
ways like while are getting back to home and you need the AC
to be on and be cooled before you happen to assuming that
you neglect to turn of light or fan you want not again come to
home and turn off them, rather than it you can handle with
your advanced mobile phone when any place you are. This
undertaking incorporates IFTTT, Blynk and Node
MCU(ESP32) .
At first the gadgets are associated with the Node
MCU(ESP32) to the regarded ports then the sign from the
Blynk application will give signs to the Node MCU(ESP32)
then, at that point, the regarded port will give power supply
to the gadget through Relay board and the gadget will turn
on. The Blynk application is associated with google aide,
through IFTTT. In IFTTT the google right hand and web
hook is associated together to make this project achievement.
Assuming the form in laud is given as a contribution to
research aide then the gadget will turn on.
Keywords: Internet of Things, Current Transformer, Wireless
Fidelity, General Purpose Input/Output.
I. INTRODUCTION
Every day modern people expect an New device
and new technology to simplify their day today life. The
developers and researchers a real ways trying to find
new things to provide comfort to the people. In the past
1990s, Internet usage increased rapidly in enterprise and
consumer markets but was still limited in its use because
of the low performance of the network interconnects.
But in the 2000s Internet connectivity became a part for
many applications to provide access to information.
However, these devices require more human interaction
and monitoring through apps and interface. The Internet
of Things is a new era of intelligence computing and it’s
providing a privilege to communicate around the world.
Figure 1 describes the coupling of C’s and A’s. That
ISBN: 978-93-5619-947-7
reveals people and things can be connected, ideally by
using in Any path/network and any service.
 Resource usage (water conservation and energy
consumption)
 Security and
 Comfort.
This paper introduces an IoT agent which is the
brain of this architecture and it controls the devices
through the internet. At a very short period of time, the
IoT agent receives the user data in the form of
commands, which will be sent to control the systems
through Google commands. This command will be
received by Google assistant and control the devices.
Home Automation is controlling and managing the basic
operations in a household automatically. It is very
inconvenient to have to do every single task manually so to
make our lives a bit easier, the concept of home
automation has been introduced. Home automation
necessitate us to introduce computerized or automatic
control to certain electrical and electronic systems either
house or factory. These include wiring, lighting, plumber,
air conditioner control, smoke indicators, etc. A
microprocessor or micro-controller or FPGA based system
is used to control the various appliances. These systems
control the appliances according to configuration. For
example they may be capable to turn on the lights at
particular time, or they should quantify the humidity with
help of hardware sensor and turn On/Off lights
accordingly. Remote control is the most basic example of
automation. It lets us control a particular device according
to us by sitting within a specific range. The concept of the
project is creating an interface that lets us control certain
devices and also allows us to monitor several occurrences
around the house. The interface created is on XAMP that
has SQL and Apache which enables the user to do the
programming related to the circuit. XAMP further transfer
data to MATLAB which in turn sends the data to the
Arduino and the device can be con-trolled according to the
conditions. The project revolves around making a website
that controls all the basic information related to the sensors
and does all the necessary monitoring.
II. SYSTEM DESIGN
In IOT automated systems, the architecture has 2 level
of its design, the first level is hardware architecture and the
other level is software architecture. Hardware architecture
is the most essential part of the system once it is
64
Proceedings of International Multidisciplinary Conference on Information Science, Management Research and
Social Sciences
18th &19th April 2022
configured correctly then software application can easily
integrate with hardware architecture because the purpose of
software application is to invoke the request. The main
output depends upon the hardware module. Both should be
made sync with each other.
2.1 IOT Home Automation Architecture
The architecture of IOT consists of software
application that interacts with hardware board connected
with home devices using internet. For every single home
device one input output pin of hardware board is connected
with every single relay module which works as a switch for
the devices. The static IP is assigned to the hardware board
through which we can access the board or execute its
stored scripts with the help of software application.
The sensors are used to process or generate the
appropriate environmental data on real time needed for the
systems and they have the most significant role in
providing the energy efficiency in IOT systems [26]. The
sensors like motion detection and temperature camera
sensor etc. can also connect with the hardware board. They
normally have separate input output pin in different
hardware board but some board support the same input
output pins which are used for smart home devices.
Without the sensors used, systems can be implemented by
it will not provide full support. The use of sensor
technologies provides measurement and evaluation of
environmental indicators, as the information shared over a
sensor network.
Fig.1. Concept-specific hardware trainers for Digital Fundamentals
2.2 Working
As discuss above the home automation architecture,
the working of the system is mainly based upon
architecture. Software application is responsible to provide
the user interface to the users. Users must need to login to
the system and then he/she can control or monitor the
status of devices. Software Application receives the request
generated from the user and passed it to hardware board.
Application by means of IP Address access hardware board
remotely and perform its execution with respect to user's
input request. The working of software application defines
with the help of flow chart in Fig [1].
Scripts are written and stored for every input output
pins of hardware board that are connected to every single
device like light, fan etc. via single relay module which
works as a switch between the device and the hardware
board pin. Mostly scripts are written in python language.
But the support of JavaScript is also available on many
hardware boards depending upon on which Operating
system it is using. Once the user click on the any device
button from the software application, the application
program invokes and run the respected script of board
which execute the command in result the status of device
changed with respect to user performed action. This same
whole working functionality performs by all other input
output pins of hardware board.
ISBN: 978-93-5619-947-7
Fig.2. Internal working of the Home Automation System
Fig. 2 shows the whole internal working of smart
home automation. Application users can also control or
monitor the smart home devices if he is not available
within the specific domain or network. But it is mandatory
for hardware board to contain a specific static IP through
which hardware board can access remotely anywhere from
the World. By this Application can then run any scripts
stored in hardware board that correspond to users
performed activity. But it requires authorized users to
access otherwise it will be a thread for the system that may
cause a harmful result. Some level of security support is
needed for authentication.
65
Proceedings of International Multidisciplinary Conference on Information Science, Management Research and
Social Sciences
18th &19th April 2022
Fig.3. Basic setup for home automation
There are four primary operating standards for home
automation technology—Wi-Fi, Z-Wave, Zigbee, and
Bluetooth Low Energy (BLE). Wi-Fi is the most
commonly used standard where IoT devices are connected
to a centralised controller/hub (either wired or wireless),
which is connected to the router through an Ethernet link.
The IoT devices can connect to a cloud network on the
Internet using the controller/hub and the router. They can
be controlled through the cloud network using a FOSS or a
mobile app. The mobile app can be used to send and
receive data through the cloud network to control and
monitor the IoT devices installed in a house.
 Energy monitors. IoT energy monitors are digital
energy meters that can monitor the power consumption
of the house, also helping one monitor the overall
power consumption remotely.
 Thermostats. IoT thermostats can be used to monitor
the temperature of the house in real-time. Using such
thermostat sensors can help monitor the temperature
inside the house from anywhere using the Internet.
 Smart door locks. Smart door locks are IoT door locks
that can be controlled using a home security system and
IoT OSS/app over the Internet. One can lock and
unlock them remotely via the app.
 Air-conditioners. Air-conditioning is a very important
part of a house and controlling the air-conditioner
remotely is a part of home automation.
 Surveillance cameras. IoT cameras can be used for the
surveillance of the house and they can give live video
footage of the house remotely. Both indoor and outdoor
cameras can be used to monitor the indoor and outdoor
environments. Such a surveillance system can have
features like motion detection and can alert whenever
there is a security breach.
Apart from the above IoT devices, many other devices
can be installed in a house to improve the convenience and
automation. Many IoT-based home appliances like
washing machines, water heaters, refrigerators, dish
washers, robot floor cleaners, etc can also be installed
additionally to make your house fully automated.
IV. CONCULSION
Fig.4: Basic setup for home automation
III. IOT DEVICES FOR SECURING YOUR HOME
There are various IoT devices and sensors that can be
used for home automation and security. The basic ones are:
 Wall switches. IoT-based wall switches can be mounted
on the wall of a house like regular wall switches, but
can be controlled remotely. Such IoT switches can also
be wireless and can be connected to an IoT hub or
router wirelessly.
 Voltage sensors. IoT voltage sensors can monitor the
supply voltage of the house and one can even monitor
the same remotely using the Internet.
ISBN: 978-93-5619-947-7
The home automation using the Internet of Things has
been proven to work by connecting simple appliances to it
and the appliances were successfully controlled through
internet. The designed system processes according to the
requirement, for example switching on the light when we
give the command. This will help the user to get an
overview of various parameters in the home anytime
anywhere. Low cost and flexible home Automation system
using Node MCU microcontroller is proposed and
implemented. Overall, Node MCU is easy to understand &
its coding is easy. By implementing this type of system, we
can ensure that the energy conservation can be done. By
help of this system we can increase, the efficiency of the
appliances. We can have the complete control over the
home appliances from a long distance. This will Increase
the comfort ability of human being and it will reduce the
Human efforts.
REFERENCES
[1] T. Sehgal and S. More, "Home Automation using IOT and Mobile
App.," International Research Journal of Engineering and Technology
(IRJET), vol. 04, no. 02, pp. 2395 - 0072, February 2017.
[2] V. Yadav and S. Borate, "Smart Home Automation using Virtue of
IoT," in International Conference for Convergence in Technology
(I2CT), Mumbai, India, 2017.
[3] K. Moser, J. Harder and S. G. M. Koo , "Internet of Things in Home
Automation and Energy Efficient Smart Home Technologies," in
2014 IEEE International Conference on Systems, Man, and
Cybernetics (SMC), San Diego, CA, USA, 2014.
66
Proceedings of International Multidisciplinary Conference on Information Science, Management Research and
Social Sciences
18th &19th April 2022
[4] J. Thati, P. V. Kumari and Y. Narayana, "Controlling of home
appliances through Internet," in 2017 International Conference on
Energy, Communication, Data Analytics and Soft Computing
(ICECDS), Chennai, India, 2017.
[5] X. Hong, C. Yang and C. Rong, "Smart Home Security Monitor
System," IEEE, 2016.
[6] R. K. Kodali, V. Jain, S. Bose and L. Boppana, "IoT based smart
security and home automation system," in 2016 International
Conference on Computing, Communication and Automation
(ICCCA), Noida, India, 1016.
[7] P. Gupta and J. Chhabra, "IoT based Smart Home design using power
and security management," in 2016 International Conference on
Innovation and Challenges in Cyber Security (ICICCS-INBUSH),
Noida, India, 2016.
[8] V. Chayapathy, G. S. Anitha and B. Sharath, "IOT BASED HOME
AUTOMATION BY USING PERSONAL ASSISTANT," in
International Conference On Smart Technologies For Smart Nation
(SmartTechCon), Bangalore, India, 2017.
ISBN: 978-93-5619-947-7
67
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Empowerment of Self Help Groups Towards
Women Microenterprise Improvement in
Tamilnadu
1
V.Sudha1, Dr.S.Balamurugan2
Ph.D.Rresearch Scholar, Department of management Studies, Periyar university, Salem
2
Assistant Professor, Department of Management Studies, Periyar University, Salem
Abstract: Self-Help Group concept which is now almost two
decade old. It is reported that the SHGs have a role in
hastening country’s economic development. SHGs have now
evolved as a movement. Mainly, members of the SHGs are
women. Consequently, participation of women in the
country’s economic development is increasing. They also play
an important role in elevating the economic status of their
families. This has led boost to the process of women’s
empowerment. The origin of SHGs is from the brainchild of
Grameen Bank of Bangladesh, which was founded by
Mohammed Yunus. SHGs were started and formed in 1975.
In India NABARD is initiated in 1986-87. But the real effort
was taken after 1991-92 from the linkage of SHGs with the
banks. A SHG is a small economically homogeneous affinity
group of the rural poor voluntarily coming together to save
small amount regularly, which are deposited in a common
fund to meet members emergency needs and to provide
collateral free loans decided by the group. (AbhaskumarJha
2000).
Keywords–
Empowerment;
Self
Microenterprise Entrepreneurship.
Help
Groups;
I. INTRODUCTION
Runnning a Self Help Group is not as easy as it
seems. There must be sincere willingness to learn and then
practice what is taught to make a difference. Effective
support leaders and facilitators: Leader should be
knowledgeable of group behaviors. Leaders/facilitators
tend to have familiarity with or past experience as group
leaders. It is very useful to understand how people behave
in groups and how helpful they can be to one another in a
group setting and possess a basic commitment to the selfhelp process. Leading an effective self-help group begins
with a commitment to three basic assumptions: each
member can make a contribution, each member is the
ultimate authority on their needs and what will work for
them, and communication must be open and honest to
promote a positive group experience. Identified that the
Women SHGs are not acting as much as the expectancies
because of lack of knowledge at the role of a member and
management related troubles. In this regard, the banks
began penalizing through lowering the mortgage amounts
and the governmental groups are decoupled from the
responsibility of making sure to banks. In this situation
many SHGs are closed and a number of them are
restructured by way of Merging with other companies.
Many research studies are centered on assessing the
performance and models and the modus operandi, nature
ISBN: 978-93-5619-947-7
of commercial enterprise and achievement of SHGs in the
country.
II. CONCEPT OF SELF HELP GROUP
The concept of self help groups had its origin in the
co-operative philosophy and the co-operators by and large,
including the National Federations in the credit sector,
could not think of any better SHG than a primary cooperative credit society itself.2 As SHG are small and
economically homogenous affinity groups of rural poor,
they are voluntarily coming together for achieving the
following.
 To save small amount of money regularly.
 To mutually agree to contribute a common fund.
 To meet their emergency needs.
 To have collective decision making.
 To solve conflicts through collective leadership mutual
discussion.
Today, the self help group movement is increasingly
accepted as an innovation in the field of rural credit in
many developing countries including India to help the
rural poor considered a vehicle to reach the disadvantaged
and marginalized section, which in the normal course
cannot avail of credit facility from the bank.
Self help groups are small informal association of the
poor created at the grass root level for the purpose of
enabling members to reap economic benefits out of mutual
help solitarily and joint responsibility. Self help groups are
formed voluntarily by the rural and urban poor to save and
contribute to a common fund to be lent to its members as
per group decision and for working together for social and
economic uplift of their families and community.Self
assist businesses are important to overcome exploitation,
create self assurance for the financial self-reliance of rural
humans, particularly amongst girls who are primarily
invisible inside the social shap. These organizations allow
them to return together for commonplace objective and
gain energy from each different to address exploitation,
which they are going through in several bureaucracy.
Groups become the basis for action and trade. It also
allows homes of dating for mutual trust among the selling
company and the agricultural bad via constant contact and
proper efforts. The rural negative are in-capacitated
because of various motives such as; most of them are
socially backward, illiterate, with low motivation and
68
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
negative financial base. Individually, a poor is not weak in
socio-economic term however also lacks get entry to the
expertise and facts, that are the most important
components of state-of-the-art improvement process.
However, in a group, they may be empowered to conquer
many of these weaknesses, consequently there are desires
for SHGs which is specific terms are as under.
 To uplift the living conditions of the poor.
 To create a habit of savings, utilization of local
resources.
 To mobilize individual skills for group's interst.
 To create awareness about right.
 To assist the members financial at the rime of need.
 Entrepreneurship development.
 To identify problems, analyzing and finding solutions
in the groups.
 To act as a media for socio-economic development of
village.
 To develop linkage with institution of NGOs.
 To organize training for skill development.
 To help in recovery of loans.
4.2 Group Meeting
The group members meetings should be held once a
week or fortnight / monthRegularly on a convenient day,
place and time as decided by the group. The members
should attend all the meetings in time without fail. The
member who unable to attend the meeting for genuine
reasons, the same has to be intimated to the group in
person or through a messenger in advance or at least
informed at the same meeting. If fails the member is liable
to pay fine for the absence as decided by the group.
V. IMPACTS OF SELF-HELP GROUP IN INDIA SAVING
AND FINANCIAL DECISION MAKING
One of the number one blessings of participation in a
SHG is the possibility to keep regularly, access formal
financial savings institutions and participate in the control
of those savings. They shop frequently, have their own
financial institution debts and make deposits into these
bills. SHG is having an awesome impact on individuals, in
their ability to save their difficult earned money.
III. THE FEATURES OF SELF HELP GROUPS
VI. ACCESS TO CREDIT
According to D'souza5 the SHGs are basically Small
casual corporations, characterized by voluntary
memberships, a democratic and consultative structure of
governance, monetary participation of contributors,
autonomy, education and schooling and worries for the
negative. Apart from several of factors, the members do as
a collection, they pool their financial savings and lend
within the institution to fulfill the credit score needs of the
members. Creation of a common fund through everyday
contribution of members and insurance of loan with
minimal files and often with none security are, in fact, the
important thing capabilities of SHGs.
A corollary of participation in SHGs is an
improvement in a women get entry to credit score. Since
the project is possibly too early in its implementation to
immediately improve women get right of entry to to credit.
The financial mobility because of participation within the
SHG has caused an development within the fine of
lifestyles, consistent with some of the a hit organizations.
Overall, many families had been capable of cope with
their fundamental wishes better than before. Some of
NGOs reviews have proven that the file on the
compensation of loans by women changed into frequently
better than that of men, and that women have been
additionally much more likely to spend the earnings
earned, on their households, leading to improved health
and nutrition of the terrible populace and for enhancing the
pleasant of their lives.
Fund technology within the preliminary tiers may be
substantially low in those companies. Such price range
though meager, may be supplemented via external
resources mainly, loans from banks or presents given via
NGOs, which promote them. SHGs offer to contributors
preliminary banking services characterized through value
effectiveness, flexibility and freedom from defaults.
Assessment of the credit score needs of individuals is
executed periodically at group conferences. The claims for
credit are settle in the institution via consensus.
IV. RULES AND REGULATIONS OF SHGS
4.1 Memberships
Only one responsible person from a family aged
around 21-60 years can become member in the groups.
The members/persons who are involved in any party
politics activities or involved in any type of antisocial
activities or the willful defaulters are not eligible for
membership in the group. The size of the group shall be
around 10 to 20 members.
ISBN: 978-93-5619-947-7
6.1 Decision-making within the household
The social impact of the SHG program increased
involvement in Decision-making, recognition about
various programs and companies, accelerated get right of
entry to such companies, multiplied expenditure on Health
and Marriage occasions, there's a Change in the attitude of
male participants of the households, now they're
convinced about the idea of SHG and encourage ladies to
take part inside the meetings and girls said that they have
savings in their name and it offers them confidence and
elevated self-respect. Within own family the honor and
status of women has extended. Children Education has
advanced drastically. Especially woman education was
very low but now SHG contributors are sending their
children which include girls to high school. The Sanitation
in members‟ families has progressed and it has brought
about better fitness in participants‟ families. Now girls are
69
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
taking treatment from qualified docs, even though they
ought to travel to close by towns. Members at the moment
are confident enough to elevate social status.
VII. CONCLUSION
Women compared to men have continually been
delicate and therefore they have got to face many
problems while they come out of the residence to paintings
with men. Women in developed economic system do no
longer face the problems which can be faced by the Indian
girls. Despite many achievements, girls get trifled by
many problems. Some being commonplace for both male
and omen and a few are the curse simplest to the ladies.
There are many psycho-social factors which avert the
course of ladies empowerment and her stepping towards
entrepreneurship. Women have usually been criticized by
way of the male dominant society for their out of domestic
sports. Indian girls are faced with many such problems.
Indians believe inside the philosophy that “Women need
to in no way be left unbiased she should be under the
manager of her father in early life, underneath the
manipulate of her husband after marriage and under the
manager of her son in old age”. Some of the foremost
difficulties on this appreciate can be illustrated as
below.SHGs may be cars for social and political
movement as well as for economic intermediation. This
flexibility and freedom additionally has its charge.
Politicians are pushed by using their need for recognition
and power, and bureaucrats through their need to obtain
numerical targets. SHGs can offer both with a equippedmade vehicle. If their individuals can pick out and resist
the disadvantages of being „used‟ by using outsiders, and
might exploit them rather than be exploited, the movement
may also in time play an crucial function in the discount or
maybe the removal of India’s foremost claim to repute, its
leadership in world poverty. If no longer, however, they
will emerge as no greater than another milestone in the
country’s long listing of failures.
ISBN: 978-93-5619-947-7
REFERENCES
[1] Aloysius P. Fernandez (2006), “History and spread of the self-help
affinity group movement in India-The role played by
IFAD”,Occasional
Papers,
Knowledge
for
development
effectiveness, © 2006 by the IFAD
[2] Dr. V. Balachandran and P Brintha (2016), “Empowering Rural
Women Through Self Help Groups, International Journal of
Advanced Research in Management and Social Sciences Volume
1,Issue 4 , October 2012 ISSN: 2278-6236
[3] Dr.A.Sundaram (2012), “Impact of Self-help Group in Socioeconomic development of India” IOSR Journal of Humanities and
Social Science (JHSS) ISSN: 2279-0837, ISBN: 2279-0845. Volume
5, Issue 1, Page no 20-27 www.iosrjournals.org
[4] Dr.A.Sundaram, “Role of Self-help Group in Socio-economic
development of India”The International Journal‟s RJEBS, Volume 2,
Issue 6, April-2013 ISSN 2251-1555
[5] Mr. T. Thileepan and Dr.K. Soundararajan, “Problems and
Opportunities of Women SHG Entrepreneurship in India”,
International Research Journal of Business and Management –
IRJBM ISSN 2322-083X
[6] Sanjay Kanti Das, “Ground Realities of Self Help Group –Bank
Linkage Programme: An Empirical Analysis”, IJRSS Volume 2,
Issue 2 May 2012,ISSN: 2249-2496.
[7] Grisna Anggadwita, & Wawan Dhewanto. (2015). Women
Entrepreneurial Intentions in Micro and Small Enterprises (MSME)
in Indonesia: The Influence of Environmental Factors on Perceived
Behavioral Control. International Conference on Multidisciplinary
Trends in Academic Research” (GTAR- 2015), 1, 248-258.
[8] Joseph Schumpeter. (1951). The Thoery of Economic Development.
Harvard University Press, Cambridge, Massachusetts.
70
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Social Science with Gender Issues, Equality and
Empowerment of Women and Girl Child
Dr. S. Kalaichelvi
Associate Professor, Department of Zoology, Sri G.V.G Visalakshi College for Women (Autonomous), Udamalpet
Abstract: Social science research - refers to any
scientific study of human action and interaction
focusing on elements of thought and behavior that are
in some sense social. This paper discussing about the
women and girl child related issues like female
infanticide, women education, sexual harassment, acid
flash, dowry demands and murders, abuse in travel in
bus and transport, cybersex crime, gender equality,
domestic violence, female genital mutilation and
empowerment.
Keywords: Infanticide, sexual harassment, acid flash,
dowry demands and murders, cybersex crime and female
genital mutilation.
I. INTRODUCTION
with varied age group like teenage to old age of her own
Apartment, teenage girls by school masters and boys in
her own class, Women at work place by higher officials,
Teenage girl Covid - 19 patient by ambulance driver,
women passenger by Call taxi drivers, Breast Cancer
patient in hospital by the technician and Dengue patient by
the Doctor and ward boy etc.
1.4 Acid Flash
Acid is flashed on the faces of teenage girls when they
are refusing to love the proposing guys. The cases all over
India and Tamil Nadu the girls died due to acid flash. The
girls should not have her own desire to love. She will lose
her confidence and cannot survive if she survives. In India
strict legislation should punish the victims.
Social science research - refers to any scientific study
of human action and interaction focusing on elements of
thought and behavior that are in some sense social. This
paper discussing about the women and girl child related
issues like female infanticide, women education, sexual
harassment, acid flash, dowry demands and murders,
abuse in travel in bus and transport, cybersex crime,
gender equality, domestic violence, female genital
mutilation and empowerment.
1.5 Dowry Demands and Murder
1.1 Female Infanticide
1.6 Abuse in Travel in bus and Transport
In embryonic stage itself the girls are started to
struggle for their survival. If the scan report gave report as
female baby, then the baby will be get aborted. If the girl
baby give birth in Usilampatti and Madurai region the
baby will be fed with kalli pal (Poisonous plant milk) and
killed.
In the case of Nirbaya, when she was returning to her
home with her boyfriend at night, she was brutally
attacked and sexually harassed by the bus driver and
cleaners. Her boyfriend also attacked and thrown away
him from bus. Finally she died in the hospital after given
her report to the police.
1.2 Women Education
1.7 Cybersex Crime
Girl education is properly given only in the well to do
family. But in middle class and poverty line the education
is given with partiality with boys. As our Mahatma Gandhi
told “If you educate a man you educate an individual, but
if you educate a woman you educate an entire family”. As
our Brigham young told “You educate a man; you educate
a man. You educate a woman; you educate a generation”.
Education given to a girl will educate the generations.
The women and girls are threatened by the photo
morphing and sexually harassed otherwise forced to
commit suicide.
1.3 Sexual Harassment
Sexual harassment during child hood like chennai
school deaf and dumb girl harassed by the 11 securities
ISBN: 978-93-5619-947-7
Kerala have more women dowry murder cases in
recent days than other states and other country. Woman
killed by her husband for getting married second time and
getting dowry second time. He killed his wife by snake
bite with a help of snake charmer who has given cobra for
money. She killed by her husband in her mother’s house
itself. This incident breaking our heart like anything.
1.8 Early Marriage
The girls are in the age of 15 or 16 years before
reaching age of 18 years they are forced into early
marriage. They are getting married a man with more age
like 30 or 40 years. Her life will be spoiled. Education and
her future will be spoiled.
1.9 Gender Equality
71
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Gender equality is not only a fundamental human
right, but necessary foundation for a peaceful, prosperous
and sustainable world. Many challenges faced by women
like discriminatory laws and social norms pervasive,
women continue to be underrepresented at all levels.
Women and girls between the ages of 15 and 49 report
experiencing physical or sexual violence by intimate
partner.
1.10 Domestic Violence
The Covid - 19 pandemic has also led to a steep
increase in violence against women and girls during lock
down. Many women were trapped at home with their
abusers, struggling to access services that are suffering
from cuts and restrictions. Data shows that, since outbreak
of the pandemic, domestic violence against women and
girl child has been intensified.
1.11 Female Genital Mutilation
Female genital mutilation (FGM) comprises all
procedures that involve partial or total removal of the
external female genitalia, or other injury
to the female
genital organs for non-medical reasons in Somalia and
African countries. The practice is mostly carried out by
traditional practitioners. In
several settings, there
is evidence suggesting greater involvement of health care
providers in performing FGM due to the belief that the
procedure is safer
when
medicalized.
WHO
strongly urges health care providers not to perform FGM.
 FGM is a violation of the human rights of girls and
women.
 More than 200 million girls and women alive today
have undergone FGM in 30 countries in Africa, the
Middle East and Asia where FGM is practiced.
 FGM can cause severe bleeding and problems
urinating, and later cysts, infections, as well as
complications in childbirth and increased risk of
newborn deaths.
 Sunday, 6 February, 2022 marks the International Day
of Zero Tolerance for female genital mutilation (FGM).
This year’s theme is "Accelerating Investment to End
FGM" — calling for support for programmes to
provide services and response for those affected and
those at risk; in developing and enforcing laws, and
fortifying institutional capacity to eliminate the
practice.
UN women has developed a rapid and targeted
response to mitigate
the impact of the covid - 19
crisis on women and girls and to ensure that long - term
recovery benefits them, focused on five priorities:
 Gender - based violence, including domestic violence,
is mitigated and reduced.
 Social protection and economic stimulus packages
serve women and girls.
 People support and practise equal sharing of care work.
ISBN: 978-93-5619-947-7
 Women and girls lead and participate in Covid - 19
response planning and decision making.
 Data and coordination mechanisms include gender
perspectives.
 Globally, 750 million women and girls were married
before the age of 18 and at least 200 million women
and girls in 30 countries have undergone FGM.
 The rates of girls between 15-19 who are subjected to
FGM (female genital mutilation) in the 30 countries
where the practice is concentrated have dropped from 1
in 2 girls in 2000 to 1 in 3 girls by 2017.
 In 18 countries, husbands can legally prevent their
wives from working; in 39 countries, daughters and
sons do not have equal inheritance rights; and 49
countries lack laws protecting women from domestic
violence.
 One in five women and girls, including 19 per cent of
women and girls aged 15 to 49, have experienced
physical and/or sexual violence by an intimate partner
within the last 12 months. Yet, 49 countries have no
laws that specifically protect women from such
violence.
 While women have made important inroads into
political office across the world, their representation in
national parliaments at 23.7 per cent is still far from
parity.
 In 46 countries, women now hold more than 30 per
cent of seats in national parliament in at least one
chamber.
 Globally, women are just 13 per cent of agricultural
land holders.
 Women in Northern Africa hold less than one in five
paid jobs in the non-agricultural sector. The proportion
of women in paid employment outside the agriculture
sector has increased from 35 per cent in 1990 to 41 per
cent in 2015.
 More than 100 countries have taken action to track
budget allocations for gender equality.
 In Southern Asia, a girl’s risk of marrying in childhood
has dropped by over 40per cent since 2000.
Literally meaning 'Educate the Girl Child, Save the
Girl Child' the Beti Padhao, Beti Bachao Scheme is an
ambitious scheme of the Government of
India which
is intended to generate massive awareness, improvement
of quality of welfare services for females and helping
them (girls and women) access these services better.
II. CONCLUSION
From historic period to modern world the women
were the target to men for revenge. Even though the
Legislation are strict the man won’t change his attitude.
He should understand, he gave birth into a boy only by a
mother not by the father. He fed with milk by mother and
grown up by his mother. He is having elder sister
and
younger sister and cousin.etc. But when he gets married
with a woman and
getting girl child he will
become giant and treat them brutally. Positive revolutions
72
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
happen in his mind, then only women and girl child can
lead a happy and gender equality life .It will leads to
women empowerment.
REFERENCE
[1] https://www.who.int/news-room/fact-sheets/detail/female-genitalmutilation
[2] https://wcd.nic.in/bbbp-schemes
[3] https://www.census.gov/library/publications/1998
[4] https://blog.frontiersin.org/2017/12/27/frontiers-in-public-healthwomen-girl
[5] https://lawrato.com/legal-help-center/family-law
ISBN: 978-93-5619-947-7
73
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
AI based Drone Escort Ambulance Service System
in Heavy Traffic
S.Kiruthiga1, N.Beulah Jebaseeli2, Dr.D.Umanandhini3, Dr.S.Sridevi4
1,2
Assistant Professor, 3Associate Professor ,4Professor
Department of Computer Science & Engineering, School of Computing
Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, India
Abstract: Every year 20% of emergency patient death
is blamed on traffic jam delays. More than 50% of
heart attack cases reach the hospital late. The major
problem is that no one is responding until ambulance
reaches them, it became a hard time for an ambulance
to reach its destination. To avoid such situations, most
of the European countries introduced “Police
motorcycle Escorts” for clearing the way. To
accomplish this, we propose Drones which are designed
by neural network that travel through streets of city
safely. It is designed as a fast residual network of eight
layers, two outputs are produced by the drones for
each single input image drone navigates using a
steering angle while avoiding obstacles, and dangerous
situations are recognized by a collision probability to
let the UAV take action accordingly. Deployment in
urban environments has so far been limited to certain
extent.
Keywords: Artificial Intelligence, Drones, Neural Network,
Accident rescue System, UAV navigation.
I. INTRODUCTION
The lifesaving minutes after an occurrence of an
accident is very critical and it is much needed to provide
emergency care to prevent life of humans. Speeding up the
emergency medical services is important to prevent deaths
and screw up the recovery immediately. This is
significantly true for drowning, heart failure, traumas and
other respiratory issues. Lifesaving medical aids can be
carried and services can be provided inspite of heavy
traffic.
Automation is about, using robots or materialistic
components instead of human. We use artificial
intelligence in these components or robots to work as like
humans. Because of heavy traffic in urban areas, it’s
impossible for ambulances to reach the destination in a
short period. Most of the European countries use police
escorts to clear the way for ambulance [4].Instead of using
human energy or effort it’s better to use the technology.
We use the technology in the form of drones with
Artificial Intelligence.
The main aim of our work is to make use of
technology instead of human effort. Death rate due to
ISBN: 978-93-5619-947-7
delay of ambulance can be decreased. Reducing the
travelling time as much as by providing right (clear) way
for the ambulance. Not only at the signals, throughout the
way by which ambulance goes. Collecting the data
accurately and efficiently can achieve in providing the
service. This system can be used to avoid the obstacles and
collisions. Being able to successfully navigate while
avoiding obstacles, is indeed crucial to unlock many
robotics applications.Alerting the vehicles is done using
signals and voice commands. Death rate can be decreased
which causes due to traffic delay. Drones can be used
instead of Police escorts.Using AI for Drone controlling
and avoid obstacles gives higher efficiency. Using AI
technology more, reduces human effort.
II. METHODOLOGY
We arrange a set(3-4) of drones for an ambulance.
Each drone has a different states(p1,p2,h,g,etc..) to work
according the scenario in figure 1.P1- It alerts or indicates
the vehicle to clear the way or to give space.P2- It finalize,
whether the way is cleared in between P1 and ambulance
as shown in fig 1. Else it informs or warns the vehicle to
give the way ,if required it takes snaps of the vehicle
plates. H- It halts the vehicles using red signal, where
there are no signal points. It will wait for other drone to
replaces its state or it can be used as a backup.
Fig1. Drone Ambulance Path finding and Navigation
UAV navigating through the streets successfully
should be able to promptly react to dangerous situations as
it follows the roadway as well . Therefore, we herein
propose to use data collected from ground vehicles which
are already integrated in environments as fore mentioned.
74
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Overall, this work makes the following contributions as
shown in fig.2
LCD Display: The sensor values
like airbag
releasing , person status are displayed using this.
Messaging Protocol—TWILIO: It is a cloud based
communication system which uses (PaaS) platform as a
Service in collision intelligent system. It serves from San
Francisco, California. It allows techies toprogrammatically
receive and make calls, text messages and communicate al
functions using its web service API.
Fig 2.a) Outdoor 1 b)outdoor 2 (c) Outdoor 3
Fig 3. (a)Model A
b)Model B
Fig.4: Block diagram
2.1 Description of Modules
ATMEGA328 Microcontroller: AVR RISC-based
microcontroller which 8-bit combines 32 KB ISP flash
memory with-read –write capabilities. The above has the
configuration 1KB EEPROM,32 general purpose registers,
timers with compare nodes which are flexible. Internal and
external interrupts.it operates between 1.8-5.5 volts.
2.2 Working
The complete model of this accident detection and
information passing method uses the above steps as
shown in figure 4.GPS is used to detect the latitude and
Longitude ,and a text message is sent to rescue team
through GSM. Using EEPROM the message receiver
number is pre-stored. It is also provided with an option to
avoid false messages. Piezo an electronic device, generates
voltage ,when it is deformed physically by vibration,
mechanical strain and sound wave.
It vibrates and creates a tone when a voltage passes
across piezo, which is used to detect and play tones.
Tracking and navigation is done by GPS .The vehicle is
tracked without the intervention of the manual systems.
Using this system on time emergency medical services can
be provided to the accident victims who are injured, and
their life can be saved. Particularly people living in Urban
areas could not get immediate medical help due to heavy
traffic, even if the patients are travelling in their own
vehicle, so these drones can be used efficiently by
employing artificial intelligence Technique to detect the
exact location of accident spot and provide the medical
services. Not only accidents this is also useful in case of
emergency situations like Stroke Attack, Heart Attack, and
other diseases where immediate treatment is needed.
People can be saved in the Golden Hours with being much
affected by the attacks.
III. EXPERIMENTAL RESULTS
GPS Module: GSM is abbreviated as Global System
for Mobile Communication. For transmitting mobile and
voice data services it is the digitalized cellular technology
used. GPS is a specially designed unit for tracking the
navigation of mobile objects and find its location.
Vibration sensor: For measuring and analyzing the linear
velocity, displacement and proximity and acceleration
vibration sensors are used.
PIR Sensor: It stands for passive infrared sensor (PIR
sensor) which is an electronic sensor that measures
infrared (IR) light that is radiating from objects in its field
of view. It is mostly used in PIR-based motion detectors.
ISBN: 978-93-5619-947-7
Fig.5: Location of occurrence of accident
75
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
IV. CONCLUSION
In the proposed work ,when a vehicle meets with an
accident, and after accident if there is no movement in the
car or by the people in the car ,automatically the vehicle
number and person details will be transferred to police
control room and rescue team. So using GPS system the
rescue team can easily locate the location where accident
have occurred and send rescue assistance team
immediately to the spot. GSM technology is employed to
achieve wireless communication. The get more optimal
results about the accident, sensors are used. This system
can also be used in automatic traffic monitoring and
estimation of traffic. Tracking of collision can be done
intelligently and loss of life can be prevented well in
advance.
[15] Syed Ali Shahbaz,” Ambulance Drone Support System (ADSS),
International Journal of Engineering Science and Innovative
Technology (IJESIT) Volume 4, Issue 3, May 2015.
[16] Conor Mackle,” A Data-Driven Simulator for the Strategic
Positioning of Aerial Ambulance Drones Reaching Out-of-Hospital
Cardiac Arrests: A Genetic Algorithmic Approach” IEEE J Transl
Eng Health Med. 2020;
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
Wang Wei, Fang Hanbo , Traffic accident automatic detection and
remote alarm device, IEEE International Conference on Electric
Information and Control Engineering, 2011.
Mr.S.Iyyappan and Mr.V.Nandagopal ,Accident Detection and
Ambulance Rescue with Intelligent Traffic Light System,
International Journal of Advanced Technology and Engineering
Research,2013.
K.Athavan; S.Jagadeeshwaran, G.Balasubraminan, N.Dinesh,
G.Abhilash, G.Gokul ,Automatic ambulance rescue System, 22nd
IEEE International Conference on Tools with
Artificial
Intelligence, 2012.
Amnesh Goel ,Sukanya Ray ,Nidhi Chandra, Intelligent Traffic
Light System to Prioritized Emergency Purpose Vehicles based on
Wireless Sensor Network , International Journal of Computer
Applications , Volume 40 No.12, February 2012 .
Mr.S.Iyyappan ,V.Nandagopal “Accident detection and ambulance
rescue with intelligent traffic light system” International Journal of
advanced Research in EEIE-2013.
K.Sangeetha, P.Archana, M.Ramya , P.Ramya “Automatic
Ambulance Rescue with Intelligent Traffic Light System”
International organization of scientific Research journal of
Engineering-2014
Mr. Sahil Gadroo, Mr. Pinkesh Jodhwani Mr. Gunveer Singh Mr.
A. D. Londhe “Automatic accident detection and ambulance rescue
system” International journal of scientific &engineering
research,2015
Hrishikesh Murkut, Fazal Patil, Vishal Yadav, Meghana Deshpande
“Automatic accident detection and rescue with ambulance”SSRG
International journal of ECE-2015 .
R. Kannan , R. Nammily, S. Manoj , A. Vishwa, ” Wireless
Vehicular Accident Detection and Reporting System”, International
Conference on Mechanical and Electrical Technology,2010.
Vikram Singh Kushwaha , Deepa Yadav, Abuyeed Topinkatti,
Amrita Kumari . “Car Accident Detection System using GPS And
GSM”, 2015.
Nimisha Chaturvedi, Pallika Srivastava . “Automatic Vehicle
Accident Detection and Messaging System Using GSM and GPS
Modem “,2018
C.Prabha, R.Sunitha, R.Anitha. “Automatic Vehicle Accident
Detection and Messaging System Using GSM and GPS Modem”,
2014
Hoang Dat Pham, MichealDrieberg, Chi Cuong Nguyen,
“Development of vehicle tracking system using GPS and GSM
modem “,IEEE Conference on Open Systems (ICOS),2015
Lih-Jen Kau, Member, IEEE, and Chih-Sheng Chen, “A Smart
Phone-Based Pockert Fall Accident Detection, Positioning And
Rescue System”, 2013.
ISBN: 978-93-5619-947-7
76
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Mathematical Modelling on Vaccine Distribution
for Prevention of Covid
Dr.P. Jamuna Devi,¹ D. Mahalakshmi²
1
Assistant professor, Department of Mathematics, A.D.M. College for women, Nagapattinam.
Bharathidasan University.
2
PG Research Scholar, M.Sc Mathematics, A.D.M. College for women, Nagapattinam.
Bharathidasan University.
Abstract: Vaccines are a special kind of drug, the quality of
which is highly sensitive to temperature and directly related
to public health.
Recently, numerous vaccine-related
adversee events have occurred in the world, especially in
developing countries, due to vaccines being exposed to
inappropriate temperatures during their transportation.
This paper consider the vaccine distribution for prevention
of COVID. The number of people infected with COVID-19
virus in Brazil was about 529,405 the number of death in
30,046 the number of recovered is 211080, and the number is
subject to increase. This is due to the delay by a number of
countries in general, and Brazil in particular. In taking
preventive and proactive measures to limit the spread of the
COVID-19 pandemic.
Optimizing COVID-19 vaccine
distribution can help plan around the limited production
and distribution of vaccination, particularly in early stages.
One of the main criteria for equitable vaccine distribution is
predicting the geographic distribution of active virus at the
time of vaccination. The research developed sequencelearning model to predict the behavior of the COVID-19
pandemic.
It is based on the previously reported
information, we formulate and theoretically analyze a
mathematical model of COVID-19 transmission mechanism
incorporating vital dynamics of the disease and two key
therapeutic measures-vaccination of susceptible individuals
and recovery/treatment of infected individuals. Both the
disease-free and endemic equilibrium are globally
asymptotically stable when the effective reproduction
number (V) is repectively, less or greater than unity. We
propose to study an optimal control approach with delay in
state and control variables in out mathematical model
proposed by Kouidere et al. Considers seven stages of
infection: susceptible(S), infectious(I), quarantined(Q),
recovered(R), deaths(D), and vaccinated(V). Initally, a
mathematical analysis is carried out to illustrate the nonnegativity, boundedness, and the basic reproduction number
of the proposed model.
Keywords: Mathematical modelling, Optimal control, vaccine
distribution, SEIR Model.
1.
INTRODUCTION
On December 31, 2019, the chinese authorities
announced a dangerous virus outbreak in the Chinese city
of Wuhan. The virus was temporarily called the novel
Coronavirus nCoV-19, then the International Virus
Classification Committee named it (SARS-CoV-2)
[19,20]. This virus belongs to Corona viruses COVID-19
that infect the human respiratory system from seasonal
colds. The danger of the novel Coronavirus 2019 lies in
the fact that the infected person does not show symptoms
of the disease in the incubation period, which ranges from
ISBN: 978-93-5619-947-7
two days to 14 days. The person then shows mild
symptoms such as sneezing, a slight rise in temperature,
then severe fatigue, a dangerous rise in temperature,
difficulty breathing, and failure to breathe that leads to
death.
According to the World Health Organization, The
novel Coronavirus COVID-19 belongs to the strains of
Coronaviruses, which are transmitted from animals to
humans and between humans. The most prominent of
these is the SARS virus, which also appeared for the first
time in China and infected about 8098 people and caused
the death of 774 people. The source of this virus was bats.
Comapared to the rest of the Coronaviruses, COVID-19
virus is considered the most dangerous and the fastest in
spread. Up to June 02, 2020, this virus caused about
6,400,055 infected cases, 378,069 deaths and 2,930,682
recovered cases. Following this huge spread around the
world. The WHO declared a state of emergency.
In USA, about the infected individuals reached
1,859,772 and the deaths reached 106929. In Brazil,
529,405 people were infected and 30,046 died. In Russia,
about 423,741 people were infected and 5037 died.
According to the last states declared on June 02, 2020.
The epidemic has moved from China to Europe and to
USA and now to South America, which has become the
main epidemic area according to the World Health
Organization.
On February 26, 2020, Brazilian
authorities announed the first case of COVID-19, the first
case recorded in South America, of a Brazilian national
from Italy. The spread of the COVID-19 virus was
initially stable. Then in recent weeks, where the spread of
the virus has experienced tremendous acceleration,
reaching in June 02, 2020, 3 months after the registration
of the first case, approximately 529,405 infected, 30,046
deaths. Brazil has become the second country in the world
in terms of infected, after the United States of America.
Where he recorded in State of S ao Paulo about
109,698 infected, followed by State of Rio de Janeiro
about 53,388 infected,and in State of Ceará about 48,489
infected, and in State of
Ama-zonas about 41,378
infected.A large number of mathematical models have
been developed to simulate, analyse and understand the
Corona virus. In a related research work. They found that
the model is locally asymptotically stable at disease free
equilibrium Eo when Ro<1 and when Ro> 1, endemic
equilibrium exists and becomes stable. In their research,
77
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
equilibriunm points are also globally asymptotically stable
under certain conditions.
Delay in applying precautionary and preventive measures,
such as:
 The delay in schools closure in the affected countries.
 The delay in closing airports and ports in a timely
manner.
 The delay in suspending air, land and navigation
travels from and to the affected countries.
 The delay in applying precautionary, preventive and
strict mea-sures when receiving travelers. The delay in
diagnosis of the infected cases, given that symp-toms
do not appear in the disease's incubation period.
 The tolerance of others in the passage of passengers
through airports in some countries.
 The delay in diagnosis of infected cases, especially as
symptoms does not appear in the disease's incubation
period.
 The delay in imposing quarantine among patients
increases the spread of the disease.
Mathematical epidemic models based on the SIR
model are widely used to study the spread of a disease in a
population . Recently, several mathematical models have
been developed to study the transmission dynamics of
COVID-19 . However, these models suffer from various
sources of uncertainties, due to the incomplete description
of the biological processes governing the disease spread,
and also due to some involved parameters being poorly
known. One way to mitigate these uncertainties is to
constrain epidemic forecasting models with available data.
An extended SEIR model comprising of seven
compartments-susceptible,
exposed,
infectious,
quarantined, recovered, deaths, and vaccinated is then
proposed. First, we conduct a mathematical analysis to
illustrate the non-negativity, boundedness, epidemic
equilibrium, existence, and uniqueness of the endemic
equilibrium, and the basic reproduction number of the
model. A Joint- COVID-19 is transmitted from human to
human viadirect contact with contaminated surfaces and
through respi-ratory droplets' inhalation from infected
individuals. Presently, there is no vaccine or antiviral
treatment approved for the prevention or management of
COVID-19.
To effectively reduce the spread of COVID-19,
governments have been implementing various control
measures such as imposing strict, mandatory lockdowns
and encouraging (and in some cases strictly enforcing)
other measures such as individuals maintaining a
minimum distance between themselves (social distancing),
avoiding crowded events, imposing a maximum number of
individuals in any gather-ing (religious and social), and
the use of face masks in public. To further help mitigate
the spread of COVID-19, con-tact tracing of suspected
infected cases has been stepped up in Several countries
and detected cases (asymptomatic and symptomatic) are
quickly placed in isolation for prompt treatment. Thailand
has begun opening its borders to foreigners and with the
ISBN: 978-93-5619-947-7
growing cases in the USA and Europe, there is a con-cern
that COVID-19 cases in Thailand may rise soon. Hence,
this study is aimed at (i) formulating a mathematical
model to understand the dynamics of the COVID-19
pandemic in Bangkok, Thailand, (i) examining the impact
of the control measures currently employed in Thailand,
and (ii) deter-mining if these measures will be effective in
preventing COVID-19 cases in Thailand. The remainder
of this article is structured as follows. The proposed model
is presented in Mathematical Model Formulation and
Description. The mathematical analysis of the model is
presented in Analysis of the Model. The results obtained
from Mathematical modeling for prevention of COVID
Finally, the conclusion drawn from this study is given in
Conclusion.
II. MATHEMATICAL MODEL FORMULATION
AND DESCRIPTION
We consider a mathematical model SIW ICHR of
kouidere et al., that describes the of transmission of novel
coronavirus “COVID-19”. We divide the population
denoted by N into six compartments: susceptible
population Brazil S, the infected without symptoms IW ,
the infected with symptoms I, the infected with
complications C, the number of people who have been
quarantined in hospitals H and recovered R.
Hence, we present the COVID-2019 mathematical
model is gov- erned by the following system of
differential equation:
=
=
S(t) -
–(
+
+
=
+
=
I(t) – (
)C(t)
=
–(
)H(t)
= σH(t) −μR(t)dt
+ ) I(t)
…….(1)
where S(0) ≥ 0 , IW (0) ≥ 0 , I(0) ≥ 0 , C(0) ≥ 0 , H(0) ≥ 0
and R (0) ≥ 0 are the initial state.
With
: Denote the incidence of susceptible in Brazil.
μ: natural mortality
β1 : The rate of people who were infected with
the virus by contact with the infected patients without
symptoms
The rate of people who were infected with
the virus by communicating with the infected patients
with symptoms.
α2 : The rate of people have developed a rapid
and dangerous development of the disease due to
immunodeficiency, old age or children.
-
78
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
α3 : The rate of people
complications such as pulmonary failure.
-
have
severe
-
-
-
-
-
+(
) S(t)
0
We obtain
then dtd
Integrating this inequality from 0 to t gives:
ds ≥ 0
then
t
Sds )
.
Similarly, we prove that IW (t ) ≥ 0 I (t ) ≥ 0 , C (t ) ≥
0 , H (t ) ≥ 0 and R (t) > 0 .
Fig. 1. Accumulated cases of COVID-19 in Brazil after 4 months
θ1 : The rate of people with symptoms of mild
virus who have been quarantined.
θ2 : The rate of people with serious
complications who have been quarantined.
σ: The rate of people who recovered from the
virus.
δ1 : Mortality rate due to complications.
δ2 : The rate of people who died under
quarantine in hospi- tals.
Fig. 1 shows that, if Brazil does not apply preventive
precau- tions to reduce the spread of the COVID-19
pandemic, the number of COVID-19 infected cases is
likely to reach millions.
-
Theorem 2:
The disease free equilibrium point E 0 is locally
asymp- totically stable if R 0 < 1 and unstable if R 0 > 1 .
Proof. The Jacobian matrix of system at the disease free
equilibrium point E 0 as follows:
From the jacobian matrix J(E 0 ) we obtained a
characteristic polynomial:
p(λ) = (μ+ λ)(λ2 + aλ+ b) = 0 with
a
b
−
2.1. Model Basic Properties
Theorem 1:
If S(0) ≥ 0 , IW (0) ≥ 0 , I(0) ≥ 0 , C(0) ≥ 0 , H(0) ≥ 0 and
R (0) ≥ 0 , the solutions S(t ) , IW (t ), I (t ), C (t ), H (t
We see that the charac- teristic equation p(λ) of J(E 0 )
has an eigenvalue λ1 = −μ is neg- ative. So, in order to
determine the stability of the E 0 , we discuss the roots of
the following equation λ2 + aλ+ b = 0 .
) and R (t) of system are positive for all t ≥ 0 .
Proof. It follows from the first equation of system that
dS(t) S(t) IW (t) S(t) I(t)
ISBN: 978-93-5619-947-7
By Routh-Hurwitz criterion, system is locally stable
if a > 0 and b > 0 . Obviously we see that a and b to be
positive, (1 − R 0 ) must be positive, which leads to R 0 <
1. So E 0 is stable if R 0 < 1 and unstable if R 0 > 1.
79
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
In addition, for biological reasons, we assume, for ϕ
∈ [− τ, 0 ], that S ϕ , IW ϕ , I ϕ , C ϕ , H ϕ and R ϕ are
nonnegative continuous func- tions and u ϕ = 0 , v ϕ = 0 ,
w ϕ = 0 and z ϕ = 0 .
III. THE OPTIMAL CONTROL PROBLEM
3.1 Problem Statement
As of today June 02, 2020, there is no cure or vaccine
for the disease. So, we suggest the following strategies:
there are four con- trols u (t) , v (t) , w (t) and z(t) for t ∈
[0 , T ], that represent consec- utively the awareness
program through sensitization and preven- tion,
quarantine and health monitoring, diagnosis, monitoring
and the last is treatment and psychological support with
follow-up at time t. In order to have a realistic and logic
model, we need to take in consideration that the
movement of controlled individuals from the
compartment of Infected without symptoms ( IW ) to
quar- antined in hospitals ( H), and transition by the
contact between In- fected without symptoms
(Respectively Infected with symptoms) with susceptible
to susceptible, and the transition of Infected with
symptoms (Respectively Infected with complications) to
quaran- tined in hospitals, and the transition of
quarantined in hospitals to rocovered is subject to a delay.
Thus, the time delay is introduced into the system as
follows: at the moment,Thus, the delay is intro- duced
into the system as follows: in time, only a percentage of
in- dividuals ( IW , C, I, H) that have been treated and
controlled τi time unit ago, that is to say that at the time k
−τi with i ∈ { 1 , 2 , 3 , 4 }, are removed to other
compartments.
So, the mathematical system with time delay in state
and con- trol system of variables is given by the nonlinear
retarded system of differential equations:
=
-
-
-
+
)
3.2
Model Basic Properties
3.2.1 Boudedness of the Solutions
Theorem: The set ( S, IW , I, C, H, R ) ∈ R 6+ / 0 ≤ S +
IW + I + C
is positively invariant under
system with initial conditions, S(0) ≥ 0 , IW (0) ≥ 0 , I(0) ≥
0 , C(0) ≥ 0 , H(0) ≥ 0 and R (0) ≥ 0 .
Proof: By adding the equations of system we obtain
=
N(t)
+ N(0)
If we take limit t → ∞ we have
.
It implies that the region is a postivily invariant set for
the system.
IV. EXTENDED SEIR MODEL
We extend the SEIR model to seven compartments to
simulate the epidemic of COVID19. Seven state variables
are considered within a population, that is, S(t), E(t), I(t),
Q(t), R(t), D(t), and V(t), denoting the number of
susceptible, exposed (infected, but not yet infectious),
infectious (not yet quarantined), quarantined (confirmed
and infected), recovered, dead, and vaccinated cases,
respectively. The disease transmission flow of the
proposed model is sketched in Figure 1. The model is then
governed by the following set of nonlinear ordinary
differential equations:
=
+
C
-
-
)
=
=
(1 - u(t))
-(
+
(1 - u(t))
(t) – W(t)
(t)
I(t) –
=
I(t) – I(t)
=
=
v(t)I(t)
–(1-k)λQ(t)–
kρQ(t)
=
+
)C(t) –
= (1-k) λ Q(t) –
v(t)C(t)
=
))
w(
)
– z(t)H(t)
=
= k ρ Q(t)
)H(t) +
H(t) -
ISBN: 978-93-5619-947-7
)+C
))
=
with non-negative initial conditions S(0) = , E(0) = ,
I(0) =
.
The coefficients
ρ represent
the new births and new residents per unit of time,
80
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
transmission rate divided by N, vaccination rate natural
death rate, average latent time, average quarantine time,
mortality rate, average days until recovery, and average
days until death, respectively. is the vaccine inefficacy
(0 ≤ σ ≤ 1). So 1 − σ represents the vaccine efficacy. If σ =
0, the vaccine offers 100% protection against the disease.
N = S + E + I + Q + R + D + V is the total population size.
Finally, system (1) is solved using a fourth-order Runge–
Kutta method.
Fig.2: Disease transmission flow
4.1 Problem Definition
The COVID-19 vaccine distribution problem is
studied. The current distribution network does not have a
defined pattern, and the strategy used shows political
biases that benefit some states and leave others vaccinefree. In general, COVID-19 vaccines that come from
international sources typically enter a country via airline
and are initially stored in a central warehouse usually
located in transported via intermediate cross-dock to states
or DC. In most countries, the legacy medical supply
chains typically have a four-tier arborescent structure for
vaccine distribution. Although there might be one less or
one more tier and the tiers might have different names.
We can see that the largest number of vaccines
available in Mexico as of June2021 is from Pfizer with
39.30%, followed by Sinovac with 20.40% and
AstraZeneca with 19.73%. The least number of vaccines
that has been received is CanSino and Sputnik V with
13.54% and 6.99%, respectively. Vaccines require storage
and transport in a temperature-controlled environment.
Therefore, the vaccination strategy has areas of
opportunity and represents an interesting and difficult
problem.
V. RESULTS ANALYSIS
The mathematical models used in the supply chain for
vaccines and the performance measure used can be costs,
as is traditionally done; however, there are other measures
of interest such as response capacity, availability of
vaccines, use of resources, or the number of lives that can
be saved either in a number of people or years of life. In
this work, the total cost of transporting the vaccines to the
distribution centers that will be in charge of distributing
the vaccines to the state health centers is used as a
performance measure; however, due to the information
ISBN: 978-93-5619-947-7
available from official authorities, this analysis will be
done to compare the current distribution of vaccines
against the results of the model; in this way, our analysis is
based on showing which is the best way to use the
resources for distribution of vaccines against COVID-19.
The main interest of this work is to show the assignments
to the state distribution centers and to show that there are
better schemes for the use of resources.
The Mexican Government has designed a set of
airline and land routes to distribute vaccines to the 32
states; The case study results show a distribution proposal
that can be taken into account for the redesign of the
airline routes proposed by the Mexican Government. It is
important to emphasize that our proposal does not consider
the definition of distribution routes; it only indicates the
sites where the cross-docks should be placed and shows
which states could be supplied with vaccines to optimize
the distribution network’s costs. The cross-docks that
must be opened and operated to receive vaccines from
authorized laboratories and the international supply are
Mexico City, Queretaro, were proposed considering their
capacity and infrastructure for international arrivals and
geographic position to supply the rest of the Republic
States. The distribution of Republic States that would be
provided from the open cross-docking to minimize the
fixed and operational costs of the distribution network and
guarantee the supply of vaccines in the shortest possible
time. The model presented guarantees the sources will
supply all open cross-docks to have the entire vaccine
portfolie to supply the total demand of the states.
However, it is important to highlight that the model does
not consider the shortages in deliveries or vaccines. The
vaccine requirements to attend 83.5 million people in 2021
with at least one dose of the vaccines available in Mexico.
where it can be seen that 52% of the vaccines are
administrated by the Mexico City cross-dock, which is the
main airport of the country.
V. CONCLUSION
A mathematical model SIwICHR of kouidere et al,
that described the spread of COVID-19 virus in Brazil. We
divided the population denoted by N into six
compartments, susceptible population Brazil S, the
infected without symptoms Iw, the infected with
symptoms I, the infected with complications C, the
number of people who have been quarantined in hospitals
H and recovered R. We analyzed a mathematical model
and the local and the global stability of COVID-19 free
equilibrium and COVID-19 are obtained. We also
studied the optimal control with delay which represents
measuring the extent of interaction with the means of
treatment or awareness campaigns. that if preventive and
proactive measures are implemented, such as awarenessraising and quarantine campaigns in all overe Brazil, the
spread of the COVID-19 epidemic will be reduced, thus
the number of people infected with the virus and the
number of deaths will be reduced. We applied the results
of the control theory and we managed to obtain the
81
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
characterizations of the optimal controls. The paper
presented an extended SEIR model with seven stages of
infection, including vaccination, to simulate and predict
the development of the novel COVID-19 Outbreak.
[16]
[17]
Results also show that intensifying the vaccination
campaign significantly decreases the number of
Confirmed cases and deaths. The proposed model can
serve as a tool for health authorities to plan, prepare, and
take appropriate measures and decisions to control the
pandemic. The equilibrium point relating to the formulated
model was computed. Using the T next generation matrix
approach, the basic reproduction number denoted as
relating to the model was also computed. However, it will
take a while before the vaccines are made readily available
in all countries worldwide. Therefore, the use of face
masks should be made compulsory till the vaccines are
available for everyone. We propose that future researchers
implement the model proposed in this study to the second
wave of infected cases in to explore the efficiency to the
current measures used to prevent COVID-19.
[18]
[19]
[20]
[21]
[22]
[23]
[24]
Manufacturing &Service Operations Management, 18(3), 332346.
Degardin, K., Roggo, Y., & Margot, P. (2014). Understanding and
fighting the medicine counterfeit market. Journal of
Pharmaceutical & Biomedical Analysis, 87, 167-175.
"Bangkok and five other provinces close malls and 25 other
locations (with clip)," Thairath Online (in Thai), 2020, Retrieved
March 29 2020.
"Nearly 100,000 flock home on tour buses to flee COVID!(32]
Transport Minister orders 7-step procedure," Khaosod (inThai),
2020, Retrieved March 29 2020.
"PM declares state of emergency effective March 26 in response
to COVID-19, maintains there is no curfew yetThe Standard (in
Thai)Retrieved March 29 2020.
"Curfew starts today," Bangkok Post, 2020, Retrieved April 3
2020.
J. Kuhakan, Thai Trafic Back to Gridlock as Coronavirus
MeaSures Ease, Reuters, 2020.
J. Harmer, 39 Chinese Are Thailand's 1st Foreign Tourists in 7
Months, Associated Press, 2020, Retrieved October 21 2020.
A. Wipatayotin and S. Chaolan, Infected Tourist on Samui,
Bangkok Post, 2020, Retrieved October 26 2020.
A. O. Egonmwan and D. Okuonghae, "Mathematical analysis of a
tuberculosis model with imperfect vaccine," International Journal
of Biomathematics, vol. 12, no. 7, article 1950073,2019.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
World Health Organization (WHO). Coronavirus Disease
(COVID-19)
Outbreak
Situation.
Available
online:
https://www.who.int/emergencies/diseases
/novel-coronavirus2019 (accessed on 17 December 2020).
Kermack, W.O.; McKendrick, A.G. A contribution to the
mathematical theory of epidemics. Proc. R. Soc. Lond. 1927, 115,
700-721.
Giraldo, J.O.; Palacio, D.H. Deterministic SIR (SusceptibleInfected-Removed) models applied to varicella outbreaks.
Epidemiol. Infect. 2008, 136, 679-687. [CrossRef] [PubMed]
Fung, LC.H. Cholera transmission dynamic models for public
health practitioners. Emerg. Themes Epidemiol. 2014, 11, 1-11.
Trawicki, M.B. Deterministic SEIRs epidemic model for
modeling vital dynamics, vaccinations, and temporary immunity.
Mathematics 2017, 5, 7. [CrossRef]
Bjornstad, O.N.; Shea, K.; Brzezinski, M.; Altman, N.S. The
SEIRS model for infectious disease dynamics. Nat. Methods
2020, 17, 557-558. [CrossRef]
Kumar, S.; Ahmadian, A.; Kumar, R.; Kumar, D.; Singh, J.;
Baleanu, D.; Salimi, M. An efficient numerical method for
fractional SIR epidemic model of infectious disease by using
Bernstein wavelets. Mathematics 2020, 8, 558. [CrossRef]
Cooper, L; Mondal, A.; Antonopoulos, c.G. A SIR model
assumption for the spread of COVID-19 in different communities.
Chaos Solitons Fractals 2020, 139, 110057. [CrossRef]
Bärwolff, G. Mathematical modeling and simulation of the
COVID-19 pandemic. Systems 2020, 8, 24. [CrossRef]
Ndairou, F; Area, I; Nieto, JJ; Torres, D.F. Mathematical
modeling of COVID-19 transmission dynamics with a case study
of Wuhan. Chaos Solitons Fractals 2020, 135, 109846. [CrossRef]
Chick, S. E., Hasija, S., & Nasiry, J. (2017). Information
elicitation and influenza vaccine production. Operations Research,
65(1), 75-96.
Chick, S. E., Mamani, H., & Simchi-Levi, D. (2008). Supply
chain coordination and influenza vaccination. Operations
Research, 56(6), 1493-1506.
Clements, C. J., Lawrence, G. L, & Macartney, K. K. (2017).
Vaccine safety. Reference Module in Biomedical Sciences.
Crawford, N. W., Clothier, H., Hodgson, K., Selvaraj, G., Easton,
M. L, & Buttery, J. P. (2014). Active surveillance for adverse
events following immunization.
Expert
Review
of
Vacines,
13(2),
265-276.
Dal, 1., Cho, S., & Zhang. F. (2016). Contracting for on-time
delivery in the U.S. influenza
vaccine supply chain.
ISBN: 978-93-5619-947-7
82
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Recent Trends in Tithe Green Banking Products
and Services in India
Dr. D. Murugan
Department of B. Com (BM & CS), School of Business Studies, Hindustan College of Arts and Science,
Padur, Chennai -603 103
Abstract: Green Banking is also called as the ethical banking
which aims to protect the environment and reduce the
carbon footprint from banking activities. It encourages
banks to carry out environment-friendly investments by
combining its operational improvements and technology
know-how in banking business activities. Green Banking has
started priority lending to those industries which are already
green or putting its efforts to go green. The aim of going
green is to increase the energy efficiency and to use the
biodegradable products. The performance of banks largely
depends upon the performance of its clients. The banks have
to diligently check that the customer’s projects are meeting
all the legal and environmental compliances as any failure
can result in nonperforming assets for the banks. The
concept of going green is new in India and has been adopted
by the Indian banks in many forms. Banks have started
providing services of online banking.
Keywords: Green Banking, ATM, Green Mobile Banking, Green
credit cards, Green Mortgage Loan, Online Banking and SWOC
Analysis.
I. INTRODUCTION
The banking sector in India is the lifeline of the
nation. It is the largest financial sector in India. Indian
banks have the potential to become fifth largest in the
world by 2020 and third largest by 2025. Banks have
helped in country’s economic development and have
transferred the hopes of people into the reality. In recent
years Indian banks have witnessed the growing trend and
have transformed its operational strategies to a large
extent. The banking sector in India has gone through
many challenges which include a shift in consumer
behaviours, technological changes, regulatory changes,
etc. It has faced various ups and downs and has become
adaptive to the changing environment.
Green Banking is different from traditional banking
as it is the concept of promoting sustainable development
in the country. Green Banking is the new phenomenon in
the financial world which concentrates on environmental
and socially responsible investing. In the era of
Globalisation, global warming is becoming one of the
major issues across the world. The effects of Global
warming have found to be responsible for the destruction
of the climate changes which have impacted the land,
water and human resources of the world. As people of the
society are becoming more concerned about the depletion
of natural resources, organisations have started
performing their corporate social responsibilities. They
ISBN: 978-93-5619-947-7
have started modifying their working techniques to
maximise the greenery and to reduce the impact of their
activities on the environment.
1.1 Meaning and Concept of Green Banking
In today’s society, climate change is a most
complicated issue. Nowadays, people are more conversant
with global warming and its inherent consequences on
human life (Sharma, 2013). So, change is imminent in
present scenario for the survival, and continuous efforts
are made to the environmental management (Elkington,
1994) in a sustainable manner. It is the matter of concern
for the government and the direct polluters and also for
other stakeholders like financial institutions. This includes
banks, which are playing a fundamental role in the
development of the society. Although banking activities
are not physically related to the environment, yet it is an
external impact of the customers which is substantial for
them. To reduce the carbon footprint from the
environment substantially, it is required by banks to
promote those products, process and technology which
adhere to it. Therefore, banks are adopting green
strategies into their buildings, operations, and investments
and financing strategies.
The banking industry in India witnessed many
changes and introduced a lot of technical changes (Curry
and Moutinho, 1993) that changed the definition of
banking. Many functions were included in the process
other than the core ones. However, in the twentieth
century when everyone was hailing about sustainable
development banking industry went into yet another
revamp. Many studies undertaken back then proved that
banks were a major source of environment degradation
and increased the level of carbon footprint. As per the
requirement, sustainable development was seen as the
only option in order to reduce the factors giving birth to
global warming (Elkington, 1994). Already much
advancement has been undertaken by the banking
industry and to support sustainable development; Green
Banking was taken to be a common answer to all the
environment related problems. With the widespread use
of internet banking, mobile banking and cashless
transactions, it is easy to implement the concept of Green
Banking. In order to promote the use and implementation
of Green Banking, a general campaign was launched by
83
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
NDTV under the name Greenathon. Inspired by this
campaign many banks started to finance those projects
which were eco-friendly and included provisions for
providing energy efficiency.
Green Mortgages. The importance of Green Banking is
immense for the overall economy as it mitigates Credit
Risk, Legal Risk and Reputation Risk involved in the
banking sector.
The increasing adoptable symbol of Ecoconsciousness in the world is green. According to Indian
Banks Association (IBA, 2014) “Green Bank is like a
normal bank, which considers all the social and
environmental/ecological factors with an aim to protect
the environment and conserve natural resources”. It is also
known as an ethical bank or sustainable bank. The purpose
of these banks is to perform banking activities alongside
with taking care of earth’s environment, ecology and
natural resources including biodiversity. The key reasons
for going green are:
 Credit Risk: Customers affected by credit risks (Kiesel
and Spohnholtz, 2017) due to lending are those whose
businesses are affected by the pollution cost, changes
in environmental regulations and new requirements on
emissions levels. It is higher due to the probability of
customer default arising due to uncalculated expenses
for capital investment in production facilities, loss of
market share and third party claims.
 Legal Risk: Banks are likely to face legal risk
(Charlier, 2000) if they violate environmental
regulation rules. They may also face risk of direct
lender liability for cleanup costs or claims for damages
in case they actually take possession of pollution
causing assets.
 Reputational Risk: Banks are prone to loss of their
reputations (Saleuddin, 2014) if they indulge in
environmentally damaging projects.
 Increase in consumption and of energy
 Increase in energy prices
 Increase in demand for environmentally-friendly
goods and services by consumers
 Higher expectations by the public on Ban’s
environmental responsibilities
The emergence of stricter regulatory and compliance
requirements.
The concept of Green Banking or Green initiatives
taken by Banks is making technological improvements,
operational improvements and changing client habits in
the banking sector. It means promoting environmentalfriendly practices and reducing the carbon footprint of
banking activities. Green Banking is not only a Corporate
Social Responsibility (CSR) (Narwal, 2007) activity of an
organisation, but also it is about making the society
habitable without any considerable damage. For banking
professionals, Green Banking involves the tenets of
sustainability, ethical lending, conservation and energy
efficiency. This comes in many forms:
 Increasing Use of online and reduce use of branch
banking
 Performing online payments instead of using emails
 Opening online bank accounts, instead of large multibranch banks
 Finding that local bank in their vicinity which supports
local green initiatives.
The concept of Green Banking is mutually beneficial
to the Consumers, banks, industries and the economy. For
consumers, this shift towards Green Banking means that
more deposit and loan products will be available through
online and mobile banking. It also means better deposit
rates on Green Deposits and Green savings accounts and
lowers interest rates for Green Mortgages. For banks,
adoption of Green Banking services leads to paperless
banking, energy saving, etc. This is an effort by the banks
to make the industries grow green through prudent use of
ISBN: 978-93-5619-947-7
1.2 Commencement of Green Banking
Initially, the banking industry was considered to be a
most relaxing job. Employees would wind up their work
by four in the evening and would also do the pending
work the next day. Backdate entries were common as the
ledger were posted manually. This gave an opportunity to
the bankers to become lazy and also frauds became
common. Another very major drawback of the traditional
banking was that the cash timings were till two in the
afternoon. After that, there was neither the facility of
withdrawal or deposit. Moreover, if anyone required
money in an emergency, then the person has to borrow it
from relatives or friends. Moreover, in many cases, there
were casualties as the required amount of money could
not be arranged in order to treat the patient. It was also
seen that there was extensive use of paper which in turn
resulted in deforestation.
Post new economic policy (Gorton, and Huang,
2002) the role of banking increased manifolds, and their
participation in the economy became more and more
significant. Apart from the core banking activities like
accepting deposit and giving out loans, banks started
many other activities as well. The other activities included
insurance, debit card, credit card, message alert and
insurance. Although the first ATM (Sharma, 2013) in
India was launched in 1989 by HSBC, it was not popular
among the clients as well as banks. Slowly after 1990, all
banks started the process of launching ATMs and debit
cards in order to reduce the workload in the branch as
more and more people started using banking services.
Even though the ATMs allowed cash withdrawal for 24*7
customers fear using them as it was a new technology,
and they were unaware of its use. Hence, even after
84
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
having debit cards, customers rushed to the branches for
withdrawing money. To solve this problem banks
launched awareness campaigns in which the customers
were taught how to use ATM and also its importance.
Eventually, the clients started using ATMs when a
new concept of internet banking was launched by ICICI
bank. This facility allowed the clients to access all the
functions of the bank by themselves using the internet.
They had to register for the service and obtain an ID and
password. Through this, they could access their account
by visiting the site of the bank. Online transfer, bill
payments, examination fee payment and online
purchasing became much easy. Even though one could
not withdraw or deposit money through internet banking
but transfer entries made realising the payment to
anybody much easy. This in turn led to an increase in the
product range of the bank making banking transactions
very simple. Adding to the innovations in banking
industry Union Bank became the first ever bank to launch
a talking ATM in 2012. These ATMs were specially
designed for physically challenged and visually impaired
people. After the first launch, SBI made it a point to
launch real talking ATMs across India. Making it even
easier for the clients to operate, ICICI Bank launched the
concept of mobile ATM. This meant a van would carry an
ATM from place to place and people could withdraw and
deposit money as in any other ATM. Similar to ATMs the
banks launched another machine for depositing cash into
the account through the debit card itself. Through this
step, RBI tried to reduce the movement of cash and
customers for cash transactions so that employees could
manage branches easily. It reduced the long queues in
banks and also zeroed the time limitation on withdrawal
and deposit of cash.
during that period. With the closure of Alexander
Company (Anitha and Rao,1998), The Bank of Hindustan
failed as well in 1832. The new twist in the history of the
banking sector of India came when the three Presidency
States set up their respective banks in their domains,
namely, The Bank of Bengal (1806), The Bank of
Bombay (1840) and The Bank of Madras (1843). These
banks were established by the East India Company in
order to lend and safeguard money. These banks (Bonin,
2016) enacted all th e responsibilities of a central bank an
d carried out the activities in their respected vicinity.
The first proper commercial bank of India was
established after the Joint Stock Companies Act was
passed in 1850. Following the suit, Oudh Commercial
Bank emerged on the horizon of Indian Banking industry
in the year 1881 and further in 1894 Punjab National
Bank was the next milestone. After that, the banking
industry adhered to mushroom growth where banks
sprang in every hook and cranny of the country owing to
the absence of proper rules and regulations. This led the
failure of these banks at the same speed with which they
have been coming up in the competition
.
Looking
into the matter more seriously the
Indian government was compelled to pass the Indian
Companies Act in 1913 after analysing the hardcore
failure and crisis of different commercial banks. After
that, the banking industry saw many changes two of them
being the merger of three Presidency Banks into one
single Imperial Bank (1920) and the establishment of an
apex bank for controlling all the banks, i.e., Reserve Bank
of India (1935).
1.3 Commencement of Commercial Banking
1.5 Green Banking Products and Services
Commercial banking was unknown to the Indian
economy in the ancient era. However, various accounts of
the learned people and various travellers depict the
existence of merchants and moneylenders (Dadabhoy,
2013). They were rich and used to run a type of
unorganised banking sector, but in only for lending
money. The other activities were absent. People used to
preserve their wealth in the form of gold that could be
easily stolen. Thus, the gold was kept safely in the
temples. While in the Mughal period the moneylenders
and rich merchants achieved a significant position for
providing and facilitating the exchange of trading
instruments. Finally, in the British period, these
unorganised bankers were shifted to the role somewhat
similar to commercial bankers. These bankers were made
to collect, store and loan the money to the British
government. Commercially the very first bank was
established in India in Calcutta in the year 1770. The bank
was started by a European agency M/s. Alexander &Co. It
was named The Bank of Hindustan. The main purpose of
establishing the bank was to facilitate the trading practices
There is a greater scope of Green Banking in India as
constant planning and efforts have been laid in the field.
As per the Happy Planet Index, India is making steady
progress towards reducing the carbon emissions. The
index shows that while in 2006 India stood at the 90th
position in the race of reducing carbon emissions. The
same index in 2009 showed an improvement in the
position of India, and it moved from the 90th to the 35th
place. Continuing the progress India is aiming at reducing
the carbon emission by 20-25% till 2020. Thus, it shows
that the economy of the country especially the banking
sector has been working in order to prevent further
environmental loss by reducing carbon emissions. The
banking sector has thoroughly built its strategy keeping in
mind the six major factors i.e. the 3Cs and the 3Ps. On
one hand where the 3Cs stands for Cost, Control and
Customer Service, 3Ps stand for Profit, Planet, and
People.
ISBN: 978-93-5619-947-7
The 3Cs are the important part of banking operations,
and with the help of Green Banking, it all can be achieved
85
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
by the companies. Green Banking promotes online
transactions, and it is the best way to enhance better
customer services. The customers can avail all the
facilities just by sitting at their place. They can access
important information through laptops or even through
smart phones. It is also a part of better customer services,
and cost can also minimise. Thus, Green Banking has
huge advantages for the banks as well as for the society.
Green Banking is having two folds; one is promoting
environmental practices through the introduction of Green
Banking Financial Products and Services and second is
reducing carbon footprints from banking activities on the
environment.


1.6 Green Banking Financial Products and Services
 Green Deposits: Banks offer higher rates on
commercial deposits, money market accounts,
checking accounts and savings account if customers
opt to conduct their banking activities online.
 Green Mortgages and Loans: The green mortgage is a
type of debt given to the customers for making their
homes more energy efficient and eco-friendly. Banks
offer a green mortgage with better rates or terms for
energy efficient houses. The Ministry of Nonrenewable Resource in association with some
nationalised and scheduled banks undertook an
initiative to go green by paying low-interest loans to
the customers who would like to construct houses or
buildings with energy efficient designs and would like
to install gadgets that are environmentally safe like
solar equipment, energy-efficient windows, geothermal heating or water heaters (Rouf, 2012). The
savings in monthly energy bills can offset the higher
monthly mortgage payments and save money in the
long run.
 Green Credit Cards: Green credit cards are helpful in
reducing the personal carbon footprint of each and
every client. The scheme is mainly launched in order
to increase the use of plastic money (debit and credit
cards) in place of currency notes. A green credit card
facilitates cardholders to earn rewards/points through
redeeming it for contributions to eco-friendly
charitable organisations. These cards offer an excellent
incentive for consumers to use them for their
expensive purchases. As per a research if a person
spends $1 from his/her green card then the carbon
emissions would be reduced by two to four pounds. It
means that if a person is spending $100 per week
through green card then as per the calculations, it
would be possible to stop 20,000 pounds of carbon
emissions per year.
 Green Reward Checking Accounts: It is a bank
product called reward checking accounts which pay a
bonus to customers who are going green. This account
helps the environment by utilising more online
banking services (Roux, 2015) like online bill
payment, debit cards, and online statements.
Customers can earn higher checking account rates if
ISBN: 978-93-5619-947-7



they meet monthly requirements that might include
receiving electronic statements, paying bills online or
using a debit or check card. Higher rates and ecofriendly living go hand-in-hand with this banking
product.
Mobile Banking: Mobile banking has the ability to
check balances, transfer funds or pay bills from a
mobile phone, which saves time and energy of the
customers. It also helps in reducing the use of energy
and paper of the bank. Most of the Indian banks have
introduced this paperless facility.
Online Banking: Online banking is the developing
concept in young and corporate India. Online banking
helps in additional conservation of energy and natural
resources. Online Banking includes:
o Paying bills online,
o Remote deposit,
o Online fund transfers, and
o Online statements.
It creates savings from less paper, less energy, and less
expenditure of natural resources from banking
activities. Customers save time by avoiding standing
to queues and paying the bills from home online.
Banking through ATMs: ATMs are becoming more
powerful than before and banks are consciously
driving its usages with the concept of branchless
banking. A visit to an ATM helps customer
accomplish myriad value-added transaction services
like utility payments, pre-paid mobile re-charge, credit
card payments, tax payments and much more.
Carbon Footprint Reduction: Carbon footprint is a
measure of the impact of activities on the
environment. It relates to the amount of Green House
Gases (GHG) (Gibbs and O’Neill, 2012) producing in
day-to-day business while burning fossil fuels for
electricity, heating, transportation, etc. Banks can
reduce their carbon footprints by adopting the
following measures:
o Paperless Banking: Banks are switching their
customers towards Online Banking and Mobile
Banking to promote paperless banking.
o Energy Consciousness: Banks save their energy
consumption by developing energy consciousness,
adopting effective office time management and
automation solutions and using compact
fluorescent lighting (CFL) which helps them
considerably. In order to manage their offices and
ATMs, banks are switching over to renewable
energy (solar, wind etc.) resources.
o Using Mass Transportation System: Banks are
becoming fuel efficient organisation by providing
common transport for a group of officials posted
at one office.
o Use of Solar and Wind Energy: To go green,
usage of solar and wind energy is a preferable
option. State Bank of India (SBI) has become the
first bank in the country to venture into a
generation of green power by installing windmills
for captive use. As part of its Green Banking.
86
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
1.7 A SWOC Analysis: Green Banking
are involved in those projects which are damaging the
environment they are prone to loss of their reputations.
1.7.1 Strengths




II. CONCLUSION
Green Banking practice saves the time of customer as
well as the bank.
It reduces the cost of bank operation and cost to the
customer too.
The transaction can be done at any time and any
place.
By financing in solar energy and wind energy
program, the bank is reducing the carbon footprint
from the environment.
1.7.2 Weaknesses




Lack of knowledge among the employees has been
noticed.
There are some geographical barriers for the
implementation of Green Banking practices.
All banks are not coming equally for the practice of
Green Banking.
Problem of security is always with Green Banking
practices
1.7.3 Opportunities



People are becoming more computer literate, so it is
easy to start Green Banking practices and grape the
customer toward the activities.
Most of the customers are using ATM card only. So
it is a time to start all the initiatives for Green
Banking practices.
Mobile banking and Internet banking is increasing
day by day, so it is a time to spread Green Banking
practices.
1.7.4 Challenges


Startup face: Since it is a new concept, so the
customer will take the time to adopt this.
Higher operating cost: Green Banking requires
talented, experienced staffs to provide proper
services to customers and technology which costs
highly. It requires renewable and recycling
techniques, which is again costly.
Diversification problems: Green banks restrict their
business transactions to those business entities who
qualify screening process done by green banks. With a
limited number of customers, they will have a smaller
base to support them. Credit Risk: Credit risks arise due
to lending to those customers whose businesses are
affected by the cost of pollution, changes in
environmental regulations and new requirements on
emissions levels. It is higher due to the probability of
customer default as a result of uncalculated expenses for
capital investment in production facilities, loss of market
share and third party claims. Reputational Risk: If banks
ISBN: 978-93-5619-947-7
Green Banking is the new phenomenon in the
financial world which aims to protect the environment by
promoting environmental-friendly practices through the
introduction of Green Banking financial products and
services and reduce the carbon footprint from banking
activities. Wherein, Green Banking products and services
include Online Banking, Mobile Banking, Banking trough
ATMs, Green Credit Cards, Green Mortgages and Loans,
Green Deposits and Green Rewards Checking Accounts.
Carbon footprint is a measure of the impact of activities
on the environment. It relates to the amount of Green
House Gases (GHG) producing in day-to-day business
while burning fossil fuels for electricity, heating,
transportation, etc. Banks can reduce their carbon
footprints by adopting the measures like Paperless
Banking,
Energy
Consciousness,
using
Mass
Transportation System, Use of Solar and Wind Energy.
Green Banking offers various benefits over
traditional banking which includes digitization of banking
processes, 24*7 access facility, time effective and
convenience. Green Banking is not only a Corporate
Social Responsibility (CSR) activity of an organisation,
but also it is about making the society habitable without
any considerable damage. For banking professionals,
Green Banking involves the tenets of sustainability,
ethical lending, conservation and energy efficiency.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
Al-Tekreeti, S. M. and Beheiry, M. S. (2016). A Decision matrix
approach to Green Project Management Processes. World Journal
of Science, Technology and Sustainable development. Volume
13(3).
Anitha, B. And Rao, S.P. (1998). Quality of Work Life in
Commercial Banks. Discovery Publishing House.
Bahl, Sarita. (2012). The Role of Green Banking in Sustainable
Growth. International Journal of Marketing, Financial Services
and Management Research. Ludhiana. 1(2), 27-35.
Bonin, H. (2016). Colonial and Imperial Banking History.
Routledge Publications.
Dadabhoy, B. (2013). Barons of Banking. Random House India.
Gibbs, D. and O’Neill, K. (2012). Green Entrepreneurship :
Building a Green Economy? – Evidence from UK. Contemporary
Issues in Entrepreneurship Research. Volume 2.
Kiesel , F. and Spohnholtz, J. (2017). CDS spreads as an
independent measure of Credit Risk. The Journal of Risk
Finance. Volume 18(2).
Roux, M. (2015). Finance Otherwise: The End of Banks?
International Symposia in Economic Theory and Econometrics.
Volume 24.
Saleuddin, R. (2014). Reputation Risk Management in Financial
Firms : protecting some small investors. Journal of Financial
Regulation and Compliance. Volume 22(4).
Sharma, K. (2013). Green Banking in India: A Roadmap to
Success. IBMRD's Journal of Management and Research
.Volume 2 (1).
87
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Art Authentication through Digital Techniques
Dr. K. Hema Shankari
Associate Professor, Department of Computer Applications, Women's Christian College, Chennai
Abstract: This paper presented the digitalized authentication
techniques to verify and certify the artworks. Artworks are
complicated structures. And art forgeries are often difficult to
identify when either the original artwork is missing or the
forgers are highly talented to deceive the art experts. Apart
from art forgery, various art crimes, such as art theft, have
been increasing rapidly and known to be extremely difficult to
track. This paper describe about various digital techniques
used in authenticate of artworks to prevent such forgeries and
thefts.
Keywords: Artworks, Art authentication, multispectral imaging,
reflectance transformation imaging, blockchain.
amount of information about a painting such as
dimension and size of the pigments’ grains. Due to the
development of digital imaging techniques, various
non-invasive techniques have been implemented to
analyse artworks from which acquisition of samples for
investigation is impossible. This development has led to
more effective and non-destructive methods to obtain
more information from an artwork. By comparing the
data acquired from the analysis of a painting and its
forged counterpart, the work of forgery that escapes the
perusal of art experts can be unveiled easily.
II. MULTISPECTRAL IMAGING
I. INTRODUCTION
Art crimes are one of the highest-grossing crimes
happening around the world. Statistics reveal that around
50,000 pieces are being stolen every year around the world.
The rate of fake and forged artworks that are being unveiled
in museums is hiking up. Fortunately, the advancement in
image processing and acquisition has enabled digitalization
of artworks. More effective techniques have been handled
by art experts in the analysis of art and detection of forgery.
After the discovery of X-rays in 19th century, X-rays, InfraRed rays and IR reflectography were used to investigate the
underdrawings and pentimenti of paintings. A manual
authentication process involves the following steps: 1)
Provenance research: This step involves investigation of the
artwork’s history of ownership. 2) Visual analysis: It is the
understanding of an artwork’s features which includes color,
texture/surface, lines, shapes. 3) Photography & UV
analysis: Reveals the natural varnishes and materials used
by the artist to compose the painting.4) X-ray fluorescence
analysis: Sheds light on the distribution of pigments in the
painting. 5) Microscopy: involves extraction of samples of
few millimetres from the painting and yields a substantial
Color is an essential aspect in analysis of pigment
measurement and archival of a painting. Colors are
linked to the object and the light that illuminates it. Not
all colours are visible to human eyes. There exist some
colors that are not seen by naked eyes. Multispectral
imaging produces a series of images obtained from a
painting, within specific wavelength that ranges across
electromagnetic spectrum. Multispectral imaging
captures that additional information that human eyes
fail to recognize. The painting to be analysed is
irradiated by Ultraviolet rays, visible rays and Infra Red
rays, and the reflecting radiation is captured by a
camera. Once the images are calibrated, they are fed
into a reflectance image cube which represents the
pixels in X and Y axis and the wavelength of each
pixels in Z axis. The results provide wider gamut
information regarding the painting since it utilizes 3D
scanning and photogrammetry. This provides accurate
information on the pigmentation used in a painting.
This is also helpful in identifying the discolorations and
stains that are difficult to investigate by naked eyes.
Fig.1: Multispectral imaging of The Crusaders Farewell
ISBN: 978-93-5619-947-7
88
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Visible light (VIS): Regular image of the painting
that serves as a reference for other images. Raking
light(RAK): The light is irradiated on the painting from a
shallow angle which makes the craquelure and texture of
painting more distinguishable. Ultraviolet Fluorescence
(UVF): The painting is irradiated by UV radiation and
the resulting fluorescence is recorded. Ultraviolet
Reflected (UVR): The painting is irradiated by UV
radiation and the reflecting UV radiation is recorded
which sheds light on varnishes. Infrared Radiation (IR):
The painting is illuminated by IR radiation which
distinguishes the behaviour of each pigment in the
painting.Infrared False Color (IRFC): This is developed
by integrating a regular picture and an infrared picture
which makes it possible to observe various materials and
retouches in the false color image. Infrared
Fluorescence(IRF). The painting is irradiated by visible
or infrared rays and the resulting fluorescence in the
infrared region of the spectrum is recorded, which
detects pigments such as cadmium yellow fluorescence
in the IR region.
Infrared Transmitted (IRTR). The painting is
irradiated by IR radiation and the reflected radiation on
the other side of the painting is recorded, which enables
better visual representation. Infrared Reflectography
(IRR): The painting is irradiated by IR radiation and the
reflected radiation is recorded which makes the
underdrawing more distinguishable
.
Fig.2: Virgin with the Child and a Saint, 14th century, unknown author, public library of Taormina (silicily)
In the figure, the technique of false colors is applied
using 12 spectra. The gray areas visible on the false-color
IR image represent the areas that have been repainted III.
Reflectance Transformation Imaging(RTI): The expansion
of art database in recent years has called for classification
of artworks based on the color and morphological features
of artwork. Statistics proposed by Fine Arts Experts
Institute (FAEI) claimed that about 50% of all artwork
available in art market is forged. The works are either
found to be fake, forged or misattributed. One of the best
instances for art forgery is Han Van Meegeren, an
Amsterdam painter who forged paintings attributed to
Dutch artists including Pieter de Hooch and Johannes
Vermeer. His forgery works were unveiled shortly after
WWII and was sentenced to one year in prison.
Reflectance Transformation Imaging, also known as
Multi-Light Image Capture (MLIC), is a productive tool
in detailed study of paintings such as surface geometry
and materials used in the creation of the painting. This
ISBN: 978-93-5619-947-7
information obtained from a single image or a series of
images acquired from the painting are processed by
machine learning algorithm which identifies the
patterns that exist within the painting and various
artworks of the same artist. This proves to be effective
in detecting forged or misattributed works of the artist.
In first stage, a camera is placed at a fixed position and
as static LEDs are illuminated on the painting one-byone, photos are taken from various angles. This process
produces a series of images with varying highlights and
shadows, illuminating the surface details and revealing
intricate details. In order to detect forgeries, the image
datasets obtained from a set of painting attributed to a
specific artist are applied to a machine learning
algorithm which studies the patterns of brushstrokes.
Brushstrokes are one of the attributes that explains
about the artist’s style and reveals other information
like texture, color, pattern and composition of elements
used in the artwork. While these brushstrokes are not
89
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
clear in typical photographs, RTI produces highlighted
image datasets with enhanced surface details. The
algorithm recognizes the pattern in brushstrokes and
compares it with the pattern in brushstrokes of various
paintings and differentiates the artist’s authenticated
paintings from forged or misattributed artworks.
Fig.3: The Sennedjem Lintel from Hearst Museum of Anthropology, University of California, Berkeley
III. BLOCKCHAIN TECHNOLOGY
AUTHENTICATION
IN
ART
Blockchain technology has been making tremendous
reforms in art world. It provides novel form of physical
and digital artwork authentication. Blockchain is an
append-only digital ledger that not only allows easy
access to information on artworks, for instance
provenance, but also functions as a secured and
trustworthy keeper of that information. It maintains a
time-stamped record of information that organises the
information into chained blocks connecting the first block
and the last part of the previous one using alphanumeric
code.
These records are protected cryptographically by
utilizing one-hash function. The hash function is a
mathematical function that converts any variable-length
input into a fixed-length output. It is called one-way hash
function since it is extremely difficult to retrace it back to
the inputs and to find inputs that would result in the same
hash value. Hence the whole technology is referred to as
append-only transaction record system.
Provenance is an essential part of authentication.
Provenance is a time-consuming process a museum
carries out to trace an artwork to its creator. While
blockchain has made it effortless to keep trace of an
artwork’s history of provenance, some information stored
on blockchain may be misinterpreted or inaccurate is a
ISBN: 978-93-5619-947-7
non-negligible possibility. It requires experts’
investigation of an art piece to determine where the
work is genuine or not. But the conclusion drew from
the investigation such as the authenticity and
provenance of the art piece.
A living artist can authenticate their artwork
through blockchain technology while the painting
attributed to deceased artists can be analysed by art
experts and updated into the system. This process
involves placing a chip that contains a private code on
the artwork. The corresponding public key is stored in
the system. The system certifies the artwork and stores
information related to the artwork.
As the artwork is sold to different parties, the key
is passed to the current owner and the system records
the change in ownership. Once the artwork is
established in the blockchain system, it prevents a
forgery of that artwork being sold in the market. This
paves an effective way in putting an end to art forgery
or art theft. When a stolen or forged art is detected in
the system, the provenance record prohibits the artwork
being sold in the market. This blockchain technology is
also influencing the art market by converting a physical
artwork into digital tokens and passing it to potential
buyers thereby expanding the scope of art market. This
enables various owners from around the world to stake
their claim on a specific piece of art while the artwork
itself
is
stored
in
a
museum.
90
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Fig.4: 14 Small Electric Chairs of Andy Warhol, first art to be tokenized and sold on blockchain
IV. CONCLUSION
This paper examined the emerging technologies that
can be used to authenticate artworks effectively and to
substantially reduce the art crimes occurring around the
globe. Techniques such as Multispectral Imaging,
Reflectance Transformation Imaging and blockchain
technology were examined.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
Lyu, S., Rockmore, D. and Farid, H. (2004) A digital technique
for art authentication.
Cornelis, B., Dooms, A., Cornelis, J., Leen, F. and Schelkens, P.
(2011) Digital Painting Analysis, At The Cross Section Of
Engineering, Mathematics And Culture.
Arora, R.S. and Elgammal, A. (2012) Towards Automated
Classification of Fine-art Painting Style: a Comparative Study .
Giachetti, A., Ciortan, I., Daffara, C., Pintus, R. and Gobbetti, E.
(2017) Multispectral RTI analysis of heterogeneous artworks.
Giachetti, A., Daffara, C., Reghelin, C., Gobbetti, E. and Pintus,
R. (2015) Light calibration and quality assessment methods for
Reflectance Transformation Imaging applied to artworks'
analysis.
Whitaker, A., Bracegirdle, A., De Menil, S., Gitlitz, M.A. and
Saltos, L. (2020)
Art, antiquities, and blockchain: new
approaches to the restitution of cultural heritage.
ISBN: 978-93-5619-947-7
91
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Investigation Study on Energy Efficient Routing
Techniques in Wireless Sensor Network
P.Arunkumar1, Dr.K.K.Savitha2
Research scholar, Bharathiar University PG Extension and Research Centre, Erode
2
Assistant Professor, Department of MCA, Bharathiar University PG Extension and Research Centre, Erode
1
Abstract: Wireless sensor networks (WSN) are infra-structure
less network where sensor nodes are densely deployed with
limited power, computational capacity and memory. WSN
collects the information from sensed node. Routing in WSN is
a demandingone in recent years for identifying the path across
networks to perform data transmission in WSN. Routing is a
higher-level decision making that transmits the network
packets from source node to destination node through
intermediate sensor nodes. Researchers carried out their work
on energy efficient routing techniques in WSN with help of
clustering techniques. But, the packet delivery ratio was not
improved and energy consumptionnot reduced. In order to
address these problems, the existing routing techniques are
reviewed in this paper.
Keywords: Wireless sensor network, sensor nodes, sink node,
source node, destination, routing, higher-level decision making
I. INTRODUCTION
WSN comprises many sensor nodes organized in
adistributed area. WSN examine specific event occurrence
and determine the parameter like temperature, pressure, or
humidity. Sensor nodes sense the data and transmit to the
base station. Every sensor node included the battery with
required energy which is not rechargeable or replaceable.
The sensor nodes are densely organized within the sink with
restricted power, computational capacity and memory.
Consequently, energy consumption is an essential demand
in wireless networks during routing process.
This paper is organized as follows: Section II explains
the review on different energy efficient data packet routing
techniques in WSN, Section III portrays the study and
analysis of existing energy efficientdata packet routing
techniques, Section IV describes the possible comparison
between them. In Section V, the limitations of existing
techniques are studied and Section VI concludes the paper.
II.
LITERATURE REVIEW
Clustering Fixed Parameter Tractable (CFPT)
approximation algorithm was designed in [1] with
approximation factor for LBCP. An energy-efficient and
energy-balanced routing algorithm performed routing
process between cluster head and sink node. Though energy
consumption was minimized, clustering accuracy was not
enhanced. A energy efficient tree clustering (EETC) was
ISBN: 978-93-5619-947-7
designed in [2] for solving multi-hop data forwarding
problem with lesser energy consumption and enhanced
network lifetime while preserving tour delay. Though
energy consumption and delay was minimized,
computational cost was not minimized using EETC. A
multi-hop graph-based approach for energy-efficient routing
(MH-GEER) protocol was designed in [3] to deal out
energy consumption between clusters.
But, routing
overhead was not minimized using multi-hop graph-based
approach. Two-Tier Distributed Fuzzy Logic Based
Protocol (TTDFP) was designed in [4] to enhance the multihop WSN lifetime with efficiency of clustering and routing
phases. TTDFP was distribution adaptive protocol that
balanced for sensor network applications. However, packet
delivery ratio was not enhanced by TTDFP.
An improved chain-based clustering hierarchical
routing (ICCHR) algorithm was designed in [5] on LEACH
algorithm with features of orchard planting in rows and
shade by sparse random features. But, delay time was not
minimized using ICCHR algorithm. A similarity-aware data
aggregation was performed by fuzzy c-means approach in
[6] through considering data aware clustering and detection
of anomalous occurrences. But, the data aggregation time
was not minimized by similarity-aware data aggregation.
2.1 Related Works:
A cluster-based data aggregation algorithm was
designed in to increase the WSN lifetime. However, the
data aggregation accuracy was not enhanced by clusterbased data aggregation algorithm. Two distributed
aggregation algorithm were designed in where aggregation
tree and conflict-free schedule utilized the active time slots
from all neighbors. The aggregation latency and utilization
ratio of accessible time slots were improved. But, energy
consumption was not minimized by distributed aggregation
algorithm. A firefly algorithm was designed in [9] for data
aggregation in WSN. Though energy consumption was
minimized, the data aggregation accuracy was not
improved.
A new Cluster-Tree routing scheme for
gathering data (CTRS-DG) was introduced in [10] for
routing and aggregation. But, the delay was not minimized
using CTRS-DG. A selective-path priority table energybalanced (EB) and energy-efficient (EE) clustering based
routing protocol was designed in [11] with mobile sink. The
priority table was generated through prioritizing shortest
92
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
paths to CH by efficient rules. But, packet delivery ratio
was not enhanced. A scalable and load-balanced scheme
was designed in [12] for mobile agents-based data
aggregation. However, packet delivery ratio was not
enhanced using scalable and load-balanced scheme.
Directional forwarding performed geographic routing
process in [13]. The number of sensor nodes was clustered
to execute the data aggregation process. But, time
consumption for routing was not reduced.
III. ENERGYEFFICIENT ROUTING TECHNIQUES
IN WIRELESS SENSOR NETWORK
WSNs are the communication infrastructures with
number of spatially distributed sensor nodes. Sensors are
employed to sense the data from particular region for
gathering and processing. Many data aggregation and
routingmethodsidentifiedefficient route paths in WSN
through energy constraints of sensor nodes. Clustering is an
essential process where network is dividedinto many
clusters. Every cluster includes Cluster Head (CH) that
collects the data from their cluster members and sends to
the sink node.
3.1 A routing algorithm for wireless sensor networks
based on clustering and an fpt-approximation algorithm
Sensor node clustering is an efficient process for
routing the data packets in WSNs to increase the network
lifetime. The load minimization of CHs was key issue
termed as Load Balanced Clustering Problem (LBCP).
Fixed Parameter Tractable (FPT) approximation algorithm
was introduced with approximation factor for LBCP. The
running time complexity was computed for diverse WSNs.
An energy-efficient and energy-balanced routing algorithm
was designed for data packet routing between CHs and sink.
LBCP was addressed with better approximation factor
resulted in sensor node load balancing among CHs. In
addition, energy consumption gets balanced among CHs.
The designed routing algorithm distributed overhead among
all nodes for balancing the energy consumption of network.
The cluster based routing algorithms minimized the network
energy consumption and enhanced network lifetime.
Clustering FPT-algorithm comprised of four phases.
The first three phases were processed only once. The fourth
phase functioned periodically. The first phase of CFPT
algorithm was network-bootstrapping phase where the
information about nodes and their neighbors were gathered
and transmitted to the sink. The second phase was
clustering. The sink addressed LBCP by FPTapproximation algorithm to find which gateway sensor node
gets allocated. The sink transmitted clustering algorithm
performance to the nodes in network. Every sensor node
identified their gateway for allocation. The third phase was
routing among the CHs. In third phase, next-hop relay node
ISBN: 978-93-5619-947-7
of every gateway was determined for data transmission to
the sink node. Data-gathering was fourth phase where data
collected from sensor nodes and transmitted to the sink. The
data-gathering phase was partitioned into rounds. In every
round, each sensor node analyzed the data from neighboring
area and transmitted to equivalent gateway. The gateway
grouped the data. After that, the collected data were
transmitted to sink on the path comprising other gateways.
After initiating fourth phase, Re-Clustering process was
employed for gateway handling process. The process
functioned inside every gateway and computed the node
energy level. When energy level of gateway was lesser than
threshold, it not functioned as CH.
3.2 A multi hop graph based approach for an energy
efficient routing protocol in wireless sensor networks
MH-GEER protocol was introduced in WSN to
distribute energy consumption between clusters at balanced
rate with higher network lifetime. MH-GEER protocol
carried out node clustering and inter-cluster multi-hop
routing selection process. The clustering phase was
constructed upon centralized formation of clusters and
distributed selection of cluster heads. The routing phase
constructed dynamic multi-hop path between CH and base
station. The designed strategy was constructed for exploring
the energy levels in network to choose the next hop in
probabilistic manner. MH-GEER algorithm improved data
routing approach performance in LEACH protocol
depending on direct transmission from CH to BS. A distant
CH with large energy consumption died earlier than other
CHs which reduced network lifetime, coverage, stability
and load balancing between all clusters. The designed
protocol used probabilistic multi-hop approach for
transmitting the data packets to BS.
3.3 EETC: Energy Efficient Tree Clustering in Delay
Constrained Wireless Sensor Network
A new tree-clustering scheme termed energy efficient
tree clustering (EETC) was introduced to reduce the
network energy consumption and to increase the network
lifetime while preserving the pre-bound tour delay of
mobile sink. EETC employed Optimal Generation of
Clusters (OGENCL) in clustering phase. The number of
relay hops between cluster member node and CH balanced
the network load. An upper bound on cluster size was
employed for balancing the network load. OGENCL issue
was considered as Mixed Integer Linear Programming
(MILP) Problem. EETC was employed to identify the
optimal selection of cluster heads in every round depending
on residual energy of sensor nodes and distance of sensor
nodes from BS. The network energy consumption gets
reduced and network lifetime gets increased while
maintaining tour-delay constraint of MS. EETC problem
was NP-hard. OGENCL chosen the optimal CHs in every
93
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
round where cluster size and relay hops between the sensor
node and associated CH were considered limitations.
IV. COMPARISON OF ROUTING TECHNIQUES IN
WSN& SUGGESTIONS
In order to compare therouting techniques in WSN,
number of data packets and number of sensor nodes is taken
to perform the experiment. Various parameters are used for
enhancing routing performance in WSN.
4.1 Analysis on Packet Delivery Ratio
Packet delivery ratio is defined as the ratio of number
of data packets correctly delivered to the total number of
data packets. It is measured in terms of percentage (%). It is
calculated as,
(1)
From (1), the packet delivery ratio is determined. The
method is more efficient when packet delivery ratio is
higher.
Table 1 Tabulation for Packet Delivery Ratio
Number of
Data
packets
Packet Delivery Ratio (%)
CFPT
algorithm
EETC
Scheme
10
81
75
MHGEER
protocol
67
20
83
77
69
30
87
79
71
40
85
76
68
50
84
74
65
60
82
72
63
70
83
75
66
80
86
77
69
90
100
89
92
80
82
71
73
Table 1 explains the packet delivery ratio with respect
to number of data packets ranging from 10 to 100. Packet
delivery ratio comparison takes place on existing CFPT
algorithm, EETC scheme and MH-GEER protocol. The
graphical illustration of packet delivery ratio is given in
figure 1.
ISBN: 978-93-5619-947-7
Fig.1: Measurement of Packet Delivery Ratio
From the figure 1, packet delivery ratio of three
existing methods for different number of data packets is
described. It is observed that the packet delivery ratio using
CFPT algorithm is higher when compared to EETC scheme
and MH-GEER protocol. This is due to the application of
energy-efficient and energy-balanced routing algorithm for
data packets routing between CH and sink. CFPT with
better approximation factor resulted in sensor node load
balancing among CHs. The designed routing algorithm
distributed routing overhead among all nodes for improving
the packet delivery ratio performance of entire network.
Research in CFPT algorithm has 11% higher packet
delivery ratio than EETC scheme and 25% higher packet
delivery ratio than MH-GEER protocol.
4.2 Analysis on Energy Consumption
Energy consumption is defined as the amount of
energy consumed for performing the data aggregation and
routing in WSN. It is the product of the number of sensor
nodes and energy consumed by one sensor node. It is
measured in terms of joules (J). It is calculated by,
(2)
From (2), energy consumption is calculated. „ ‟
denotes number of sensor nodes. When the energy
consumption is lesser, the method is said to be more
efficient.
Table 2 Tabulation for Energy Consumption
Number of
Sensor
nodes
10
20
30
40
Energy Consumption (Joules)
CFPT
algorithm
35
38
40
39
EETC
Scheme
24
27
30
28
MH-GEER
protocol
46
48
51
49
94
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
50
60
70
80
90
100
38
36
34
37
40
43
26
24
21
23
27
40
47
45
43
46
48
50
Table 2 illustrates the energy consumption with respect
to number of sensor nodes ranging from 10 to 100. Energy
consumption comparison takes place on existing
CFPTalgorithm, EETC scheme and MH-GEERprotocol.
The graphical representation of energy consumption is
described in figure 2.
clustering time is lesser, the method is said to be more
efficient.
Table 3 Tabulation for Clustering Time
Number of
data
packets
10
20
30
40
50
60
70
80
90
100
Clustering Time (ms)
CFPT
algorithm
34
37
38
40
42
44
47
50
52
55
EETC
Scheme
25
27
29
32
35
37
38
40
42
44
MH-GEER
protocol
19
21
23
25
27
30
32
35
37
39
Table 3 depicts the clustering time with respect to
number of data packets ranging from 10 to 100. Clustering
time comparison takes place on existing CFPT algorithm,
EETC scheme and MH-GEER protocol. The graphical
analysis of clustering is.
Fig. 2: Measurement of Energy Consumption
From figure 2, energy consumption of three techniques
for different number of sensor nodes is explained. It is clear
that the energy consumption using EETC scheme is lesser
when compared to CFPT algorithmand MH-GEER
protocol. This is due to the application of heuristic
clustering algorithm in clustering phase. The number of
relay hops between cluster member node and CH was
limited to balance network load. An upper bound on cluster
size was designed for balancing the network load. The
network energy consumption gets minimized to improve the
network lifetime while preserving the tour-delay constraint
of MS. Research in EETC scheme consumed 32% lesser
energy than CFPT algorithm and 46% lesser energy than
MH-GEER protocol.
4.3 Analysis on Clustering Time
Clustering accuracy is defined as the amount of time
consumed for performing the clustering process. It is the
difference of ending time and starting time of clustering
during routingprocess. It is measured in terms of
milliseconds (ms).It is measured as, (3)
From (3), the clustering time is calculated. When the
ISBN: 978-93-5619-947-7
Fig. 3: Measurement of Clustering Time
Figure 3 describes the clustering time of three
techniques for different number of data packets. It is
observed that the clustering time using MH-GEER protocol
is lesser when compared to CFPTalgorithmand EETC
scheme. This is due to the application of node clustering
and inter-cluster multi-hop routing selection process. The
routing phase identified the dynamic multi-hop path
between cluster head and base station for determining the
energy levels in network to select the next hop in
probabilistic way. Research in EETC scheme consumed
35% lesser clustering time than CFPT algorithm and 18%
lesser clustering time than MH-GEER protocol.
95
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
[2]
V. LIMITATION ON DATA AGGREGTAION AND
ROUTING TECHNIQUES IN WSN
Clustering Fixed Parameter Tractable (CFPT)
approximation algorithmwas balanced and enhanced the
network performance. The running time complexity of
CFPT approximation algorithm was minimized. But, the
energy consumption was not minimized and clustering
accuracy was not improved.MH-GEER protocol was
designed to distribute the energy consumption between the
clusters at balanced rate for increasing the network lifetime.
The energy depletion in remote clusters was reduced by
MH-GEER protocol. MH-GEER protocol guaranteed the
load balancing process in network. The network lifetime
was enhancedby MH-GEER protocol. MH-GEER
maintained the coverage area of distant nodes at longer time
intervals. However, the routing overhead was not
minimized using multi-hop graph-based approach.EETC
was introduced for multi-hop data forwarding to address the
energy consumption problem while preserving the tour
delay. Number of relay hops between cluster member node
and CH were limited to balance network load.By using
EETC, the energy consumption and delay was reduced to
increase the network lifetime. However, the computational
cost was not reduced using EETC.
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
5.1 Future Direction
The future direction of the work is to perform energy
efficient routing in WSN by using machine learning and
ensemble learning techniques with higher packet delivery
ratio and lesser energy consumption.
[11]
[12]
VI. CONCLUSION
[13]
A comparison of different techniques for energy
efficient routing is carried out. From the survival study,the
energy consumption was not minimized and clustering
accuracy was not improved by CFPT approximation
algorithm.In addition, the routing overhead was not
minimized using multi-hop graph-based approach. The
computational cost was not reduced by using EETC
scheme. The wide range of experiments on existing
techniques compares the results of various energy efficient
routing techniques and discusses its limitations. Finally
from the result, the research work can be carried out using
machine learning and ensemble learning techniques with
minimal energy consumption and higher packet delivery
ratio.
Srijit Chowdhury and ChandanGiri, “EETC: Energy Efficient
TreeClustering in Delay Constrained Wireless Sensor Network”,
Wireless Personal Communications, Springer, May 2019, Pages 1–22
Hana Rhim, KarimTamine, RymaAbassi, Damien Sauveron and
SihemGuemara, “A multihop graph‑based approach for an
energy‑efficient
routing
protocol
in
wireless
sensor
networks”,Human-centric Computing and Information Sciences,
Springer, Volume 8, Issue 30, December 2018, Pages 1-21
SeyyitAlperSert, Abdullah Alchihabi and Adnan Yazici, “A TwoTier Distributed Fuzzy Logic Based Protocol for Efficient Data
Aggregation in Multi-Hop Wireless Sensor Networks”, IEEE
Transactions on Fuzzy Systems, Volume 26, Issue 6, December
2018, Pages 3615 – 3629
Huarui Wu, Huaji Zhu, Lihong Zhang, Yuling Song, “Energy
Efficient Chain Based Routing Protocol for Orchard Wireless Sensor
Network”, J. of Electrical Eng. & Tech., Springer, June 2019, P. 1–10
Runze Wan, NaixueXiong, Qinghui Hu, Haijun Wang and Jun
Shang, “Similarity-aware data aggregation using fuzzy c-means
approach for wireless sensor networks”,EURASIP Journal on
Wireless Communications and Networking, Springer, Volume 59,
2019, Pages 1-11
Hanady M. Abdulsalam, Bader A. Ali and EmanAlRoumi, “Usage of
mobile elements in internet of things environment for data
aggregation in wireless sensor networks”,Computers and Electrical
Engineering, Elsevier, Volume 72, November 2018, Pages 789-807
Quan Chen, Hong Gao, ZhipengCai, Lianglun Cheng and Jianzhong
Li, “Distributed Low-Latency Data Aggregation for Duty-Cycle
Wireless Sensor Networks”, IEEE/ACM Transactions on
Networking, Volume 26, Issue 5, October 2018, Pages 2347 – 2360
Islam Mosavvar and Ali Ghaffari, “Data Aggregation in Wireless
Sensor Networks using Firefly Algorithm”, Wireless Personal
Communications, Springer, V104, I. 1, September 2018, Pages 1-18
WalidOsamy, Ahmed M. Khedr, Ahmed Aziz and Ahmed A. ElSawy, “Cluster-Tree Routing Based Entropy Scheme for Data
Gathering in Wireless Sensor Networks”,IEEE Access, Volume 6,
December 2018, Pages 77372 – 77387
Olayinka O. Ogundile, Muyiwa B. Balogun, Owoicho E. Ijiga and
Elijah O. Falayi, “Energy-balanced and energy-efficient clustering
routing protocol for wireless sensor networks”, IET Communications,
Volume 13, Issue 10, 2019, Pages 1449 – 1457
Govind P. Gupta, ManojMisra, and KumkumGarg, “Towards
scalable and load-balanced mobile agents-based data aggregation for
wireless sensor networks”,Computers & Electrical Engineering,
Elsevier, Volume 64, November 2017, Pages 262-276
KhaledHadi, “Analysis of Exploiting Geographic Routing for Data
Aggregation in Wireless Sensor Networks”,Procedia Computer
Science, Elsevier, Volume 151, 2019, Pages 439-446
REFERENCES
[1]
RaminYarinezhad and SeyedNaserHashemi, “A routing algorithm for
wireless sensor networks based on clustering and an fptapproximation algorithm”,Journal of Systems and Software, Elsevier,
Volume 155, September 2019, Pages 145-161
ISBN: 978-93-5619-947-7
96
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
A Spatio – Temporal Analysis on Human Resource
Management in Fishing – Some Evidential Proofs
Dr. H. Sulaiman
Assistant Professor in Commerce, PG & Research Dept of Commerce, Khadir Mohideen College, East Coast Rd, Adirampattinam,
Thanjavur(Dt), Tamilnadu – 614701
Abstract: Human Resource Management in agriculture is a
very complex phenomenon influenced more by social factors
than by economic factors. The study of changing ocean
structure, fishers and fishers’ relations in India has developed
into one of the most important themes of social sciences
research. Several research studies have been carried out on
this theme during the last three decades. It is thought
appropriate to present a brief review of the research studies
undertaken on some of the aspects of human resource
management in fishing. This paper broadly analyses the role
of Human Resource Management in increasing fishing
productivity in the context of Fishing Economy like us.
Keywords: HR, Temporal Analysis, Fisher Productivity, Labour
Relations, Fishing.
I.
INTRODUCTION
India is the third largest fish producing country and the
second largest aquaculture fish producer in the world. India
contributes about 7% to the global fish production. The
country is also home to more than 10% of the global fish
biodiversity and is one of the 17-mega biodiversity rich
countries. Around 14 million people are engaged in
fisheries and its allied activities. Andhra Pradesh is the
largest fish producer in the country followed by West
Bengal and Gujarat. The total fish production during 201718 is estimated to be 12.60 million metric tonnes, of which
nearly 70% is from inland sector and about 50% of the total
production is from culture fisheries. More than 50 different
types of fish and shellfish products are being exported to 75
countries around the world. Fish and fish products have
presently emerged as the largest group in agricultural
exports from India, with 13.77 lakh tonnes in terms of
quantity and Rs. 45,106.89 crore in value. This accounts for
around 10% of the total exports and nearly 20% of the
agricultural exports, and contribute to about 0.91% of the
GDP and 5.23% to the Agricultural GVA of the country.
II. CONTRIBUTION OF HUMAN RESOURCES IN
INDIAN AGRICULTURE
In general, the immediate returns for investments in
HRD are not always obvious. Accordingly, development
institutions, governments and donor agencies tend to give a
relatively low priority to HRD, even though most nations
consider HRD as a priority area for development of the
ISBN: 978-93-5619-947-7
sector. For example, a recent Network of Aquaculture
Centres in Asia-Pacific (NACA)/Food and Agriculture
Organization of the United Nations (FAO) survey in Asia
revealed that 93% of the countries considered HRD as a
major problem facing aquaculture, and 71% of the nations
noted that a lack of skilled personnel was a major
impediment to further development(NACA/FAO, 1996). A
recent review on aquaculture development in Africa
identified eight strategies as pivotal to the development of
the sector, and not surprisingly, five of these involved
HRD, particularly in relation to small-scale farmers and
extension workers. (Machena and Moehl, 2001). On the
issue of HRD, it is also important to recognize the specific
needs of nations and regions. Past experience in the
aquaculture sector and elsewhere has shown that mere
transfer of technologies is not always effective and can
even be counterproductive. Obviously, training needs vary
significantly amongst regions and are related to the degree
of development of the sector, thus the gross needs of Africa
may be significantly different from those of Asia (Machena
and Moehl, 2001).
III. BACKGROUND OF THE STUDY
Fish has been the most important and sustaining factor
for people around the world. It is particularly true in case of
the coastal communities, as fish constitutes the most
important part of their diet and also the main source of their
livelihood. Fish is a major industry for the coastal people. It
is a main raw material for many industries – the
manufacture of fishmeal for the poultry and the production
of oils of various kinds. India is endowed with rich marine
resources with a 7,517 km. coastline. There is a vast
potential for fishing development and it is emerging as one
of the growing item of India’s exports. While India has so
far concentrated mainly on the vast potential of ships, deep
sea fishing for other rich varieties, for instance, has a
tremendous scope for exploitation, given the right types of
inputs and facilities.
IV. REVIEW OF LITERATURE
Ostroff (1995) identied that when human resource
professionals perceive a higher quality of human resource
practices; these rms have higher business results. Studies
have shown that relationship between progressive human
97
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
resource practices and rm performance in manufacturing
rms.
Barbosa (2002) in his study “Fishing for a High
Living” states that the mechanized fishing in Goa is done
without any proper regulations. There is no license system
for trawlers in the state. Once a trawler owner registers his
trawler, he need not approach any government department
again. The state of Goa has 1128 registered trawlers and
this is far above the saturation point. He suggests that there
is a need to regulate the number of trawlers that go in the
sea and their expedition schedule. The author strongly feels
that there is a need to redraft the laws and to control the
mesh size.
Nirmale vivek H.; Sontakki Bharat S, Birodar R. S.;
Metar Santosh Y. –(2003)- Central Institute of fisheries
education- Mumbai – Assessment of Indigenous knowledge
of coastal fisher folk of greater Mumbai and Sindhudurg
district of Maharashtra – 10 June 2003- The conclusion of
this study is the indigenous knowledge of coastal fisher folk
on various fisheries management aspects like choice of
materials and methods for fishing and fish processing, their
perceptions on the effect of water color, wind direction,
lunar cycles, tidal fluctuations on fish catch is by and large
based on scientific rationality efficacy and use of local
resources as judged by the fisheries experts, Hence such
indigenous knowledge can be gainfully blended with the
modern scientific and technical wisdom to evolve a
package of fisheries management that enjoys ready
acceptance by the fishermen and enhances efficacy.
Sustainable use of local resources without Adversely
affecting the environment.
Rajasenan D. (2001) in his paper “Technology and
labour process in marine fishery: The Kerala experience”,
believes that the amount of fish that can be harvested per
unit of time depends primarily on the level of technology,
which in turn depends upon the size of investment and the
number of fishermen that participate in fishing operations.
Mechanization has resulted in higher production and
productivity. The new labour process in mechanized fishing
due to capital intrusion has brought a change in the theory
of labour process. It also resulted in outboard motorization.
management of inputs used for fishing. Tiwari P. C. (2005)
in his paper “Natural Resources Information System for
Wasteland Development in Uttaranchal: A Planning
Support System for Sustainable Watershed Management in
Uttaranchal Himalaya” concludes that the sustainable
development of wasteland development strategy is
community and people oriented, and the local people are
willing to adopt the practice of sustainable resource
development and utilization.
Kumar Suresh P. (2001) in “New Technology and
Artisanal Fishermen in Kerala” makes an attempt to discuss
the emergence of motorization and the marginalization of
the traditional fishermen. The study reveals that
modernization of fishing industry has led to marginalization
of artisan fishermen.
V. STATEMENT OF THE PROBLEM
During the course of the Rural Labour Enquiries (RLE)
data on various socio-economic aspects viz, Employment &
Unemployment, Consumption Expenditure, Wages &
Earnings and Indebtedness of rural and agricultural
labourers are collected. The RLE is also aimed at throwing
up data on household consumption expenditure of the
rural/fishermen for drawing weighting diagrams for
updating the series of the Consumer Price Index Numbers
for fishers. Under these enquiries, the data are collected and
analysed for fishers as a whole.
However, in order to enable comparison with the
previous enquiries as also to understand problems of this
segment which constitutes bulk of the rural fishers, the
analysis is presented for fishers separately. The usefulness
of the data thrown up by the Rural Labour Enquiries has
been acknowledged by various Committees and
Commissions from time to time. The National fisheries
development board has recommended that the periodic
surveys undertaken by the Government to understand the
rural situation should be continued and intensified. Hence
the present study elaborately deals on the Human Resource
Management in Indian fishing and its temporal analysis in
the selected areas.
VI. SCOPE OF THE STUDY:
Sehara D. B.S. et.al (2000) studied “Economic
Evaluation of Different Types of Fishing Methods along
Indian Cost.” They indicated that the studies on the craft
and gear combination should be conducted on macro level
in different maritime states for effective future planning in
maritime fisheries sector. Non-mechanized motorized and
mechanized sector should be given equal priorities while
undertaking cost and earning studies. There has to be also a
stress on employment potential, marketing problems,
financial needs of various types of units and proper
ISBN: 978-93-5619-947-7
The present study is an immense importance in the
sense of analyzing the role and contribution of Human
Resources in increasing Indian fisheries and other related
issues in the study area. There were many more macro level
studies have been already carried out but no attempt has
been made in the micro analysis and analyzing the
significance of the contribution of HRM in our fishing and
tries to solve and answer the research gaps and unanswered
research questions. In this juncture this research is
98
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
considered most relevant and having vast scope for further
productive efficiency in the particular angle. The Enquiry
relates to all rural fishers households. However, provision
has been made in the tabulation plan to get separate
estimates for fishers households.
VII. OBJECTIVES
The main objectives of the enquiry are: To study the role and contribution of human resources
in Fishing yield in the study area.
 To deals the matters pertaining to the Spatio and
Temporal analysis of Human Resources in India over
the study years.
 To project actual and real picture of the Human
Resources and their utilization of fishers force in
increasing fishing productivity through modern methods
of production.
 To analyse the problems and woes of fishermen inn
receiving their share of wages and livelihood problems
encountered in this area.
 To provide upto date serial data on demographic
structure, extent of employment & unemployment,
wages and earnings, household consumption
expenditure, indebtedness, etc. for building up of
reliable estimates of important socio-economic
characteristics of rural fisher in general and fishermen in
particular.
 To provide data relating to consumption expenditure for
derivation of weighting diagram for updating the series
of CPI numbers for fishing and rural fishers.
 To suggest certain policy recommendations for
improving the productivity of fishermen force.
VIII. HYPOTHESES
Having the broad objectives in the mind the researcher
formulated the following major hypotheses for undertaking
the present work.
 There is a close and perfect positive relationship
between technological diffusion in Indian marine and
managing fishers.
 There is a high degree of concentration of the labour
force on fishing (Primary sector) than allied sectors in
this area over the study years.
 There is a significant association between the
improvement of modern methods of fishing production
and labour productivity.
 There is no significant relationship between managing
Human resource practices and intra group fishermen.
IX. GEOGRAPHICAL COVERAGE
The survey covered the whole of the Indian Union.
ISBN: 978-93-5619-947-7
9.1 Sample Design
A stratified multistage sampling design was adopted
for selection of the sample units for the survey. The first
stage units (FSU) were the census villages (panchayat
wards for the selected area). The ultimate stage units
(USU) were the households. Stratification of the first stage
units : From the list of villages of each State/Union
Territory (U.T.), initially, two special strata were formed by
considering villages (a) with very small population and (b)
with very high population as stated below:Stratum 1: all FSUs with population between 1 to 100.
Stratum 2: FSUs with population more than 10,000
The above two strata were spread across a given State
and were not confined to any particular administrative
division within the State. Each of the above two strata was
formed if at least 50 such FSUs were there in the respective
frames. Otherwise, these villages were included in the
general strata. While forming general strata, efforts were
made to treat each district with population less than 2
million as a separate stratum. If limitation of sample size
did not allow forming so many strata, smaller districts
within a particular NSS region were merged to form a
stratum. Each district with rural population of 2 million or
more as per 1991 Census (1.8 million or more as per 1981
Census in case of Jammu & Kashmir) was as usual split
into a number of strata.
Allocation of first stage units: At the all-India level, a
total number of 10,384 FSUs (6208 villages and 4176
urban blocks) was selected for survey in the central sample
in the 55th round. The actual State/UT level allocation of
FSUs in the rural sector is given in Statement- I. State/UT
level rural sample size was allocated among the rural strata
in proportion of population. Sample size for the whole
round for each State/UT was allocated equally among the 4
sub-rounds.
Stratum level allocation for both rural and urban areas
of a sub-round was made in even numbers in order to
facilitate selection of FSUs in the form of 2 independent
sub-samples. Sub-sample numbers were 1 and 2 for subround 1; 3 & 4 for sub-round 2; 5 & 6 for sub-round 3; and
7 & 8 for sub-round 4. One salient feature of the 55th round
was the rotation sampling scheme which was adopted for
the first time in the NSS for the purpose of collection of
employment-unemployment data from central sample only.
Under this scheme, 1 sub-sample of the sampled first stage
units (FSUs) of each sub-round was revisited in the
subsequent sub-round. From each such FSU, sample
households visited in the previous sub-round for collecting
data on employment-unemployment were revisited in the
subsequent sub-round for collecting employmentunemployment details.
99
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Selection of FSUs: For each sub-round, sample first
stage units from each stratum were selected in the form of 2
independent sub-samples by following circular systematic
sampling with (a) probability proportional to population for
all rural strata other than stratum 1, and (b) equal
probability for rural stratum 1.
X. MAJOR FINDINGS OF THE STUDY
The vast majority of workers in India are in informal
jobs. Although there has been a shift out of fishing,
construction has absorbed more workers than other sectors
in recent years. What is more concerning is that, most of
the new jobs being created in the formal sector are actually
informal because the workers do not have access to
employment benefits or social security. In addition, notable
disparities in the labour force participation rates of men and
women persist.
The share of agriculture in India’s GDP has steadily
declined since 1950, which used to be little over 52% and
now stands close to 16–17%. In comparison the % of other
two sectors in GDP (Industry and Services) now stands
close to 20+% and 55+% respectively. In 1950, the GDP of
India was around 40 Bn USD (2004-05 series, 2016
Exchange rate) which reached to roughly 900 Bn USD
(2004-05 series, 2016 Exchange rate) in 2015. So,
Agricultural sectors increased from 20.5 Bn USD to 150+
Bn USD between 1950 and 2016. India's economy has
returned to high rates of growth, according to the latest
figures. In 2015-16 the GDP growth rate reached 7.6 per
cent, up from 5.6 per cent in 2012-13. The challenge
continues to be to ensure that economic growth translates
into better labour market conditions.
10.1 Recent economic trends: Growth recovers and
inflation stabilizes
India" initiative, manufacturing has grown rapidly, at 9.3
per cent in 2015-16.
XI. CONCLUSION
About two-third of the total labour force in the country
lives in rural areas. Wage paid employment is the main
source of their livelihood. It has been the endeavour of the
Government of India to alleviate the poverty, particularly in
the rural areas, by formulating and implementing various
target oriented anti-poverty rural development programmes.
Sound data base is of utmost importance for formulating
such action programmes. With this end in view, the first
Agricultural Labour Enquiry (ALE) was conducted in
1950-51, followed by the second in 1956-57. The scope of
the subsequent enquiries was enlarged to cover all rural
labour households instead of fishers households alone
covered in the first two enquiries.
REFERENCES
[1] Comin, Diego (2006): "Total Factor Productivity", New York
University and NBER
[2] J. Hawks, University of Kansas, and N. Lyons, Pennsylvania State
University, personal communication[s])
[3] Hochachka, P. W. 1990. Scope for survival: a conceptual “mirror” to
Fry’s scope for activity. Transactions of the American Fisheries
Society 119:622–628.
[4] Murphy, B. R., and D. W. Willis, editors. 1996. Fisheries techniques,
2nd edition. American Fisheries Society, Bethesda, Maryland.
[5] P. L. Fuller, L. G. Nico, and J. D. William. 1999. Nonindigenous
fishes introduced into inland waters of the United States. American
Fisheries Society, Special Publication 27, Bethesda, Maryland.
[6] Kapuscinski, A. R., and L. D. Jacobson. 1987. Genetic guidelines for
fisheries management. University of Minnesota, Minnesota Sea Grant
College Program, Sea Grant Research Report 17, Duluth.
[7] Vladykov, V. D., and E. Kott. 1982. Comment on Reeve M. Bailey’s
view of lamprey systematics: Comment. Canadian Journal of
Fisheries and Aquatic Sciences 39:1215–1217. Bailey, R. M. 1982.
Comment on Reeve M. Bailey’s view of lamprey systematics: Reply.
Canadian Journal of Fisheries and Aquatic Sciences 39:1217–1220.
Fishing and aquaculture made up over 1.4 trillion
Indian rupees in gross valued added to agriculture across
India in fiscal year 2019. The GVA increased consistently
since fiscal year 2012 from this sector. GDP growth
reached 4.0 per cent during 2019-20 years 2019-20 and
2018-19 stands at Rs 145.69 trillion and Rs 140.03 trillion,
respectively, showing a growth of and 6.5 per cent during
2018-19. It also reveals that real gross value added (GVA)
reveal that the return of these higher growth rates has been
spurred by strong industrial growth.
The GVA in India's economy shrank 6.2% in 2020-21,
compared to a 4.1% rise in the previous year. Only two
sectors bucked the trend of negative GVA growth Agriculture, Forestry and Fishing (which rose 3.6%) In
line with the aims of the Government of India's "Make in
ISBN: 978-93-5619-947-7
100
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Analysing Problems of Tiny Agricultural Farmers
with Special Reference to Selected Farmers
Collectives in Kozhikode District, Kerala
Dr. M.Dhanabhakyam1, Monish P2
Professor and Dean, Department Of Commerce, Bharathiar University, Coimbatore
2
PhD Full time Research Scholar, UGC Junior Research Fellow (JRF), Department Of Commerce, Bharathiar University,
Coimbatore.
1
.
Abstract: India is an agriculture oriented country.
Agricultural sector contributes more than 16% in GDP
and more than 10% of the total export. In recent days,
many farmers left their farming job and went to
seeking other job opportunities. Also, some of the
farmers committed suicide and the reason is that their
crops are failed due to various reasons. The major
problem faced by tiny agricultural farmers is lack of
good infrastructural facilities and lack of sufficient
knowledge base. Some of the farmers are conducted
experiments and implementing innovative technics in
their farming. But they lack knowledge regarding how
to apply these technics in long term farming and
practical implications of the same. Government of
Kerala initiated an agricultural contingency plan for
each district to support the farmers. Hence the
researcher made an attempt to study the major
problems faced by tiny agricultural farmers, analyse
perception of farmers on various problems and
measure the impact of such problems on quality of life
of farmers in Kozhikode district, Kerala. The study
also analyses various grievances filed by farmers in
farmer’s collectives, Kozhikode district.
Keywords: Agricultural Development, Problems and Prospects,
Farmers Collectives, Grievances, Quality of Life.
I. INTRODUCTION
In terms of growth, agricultural sector have been
occupied a great position in Indian economy. Majority of
Indian population is clustered to the rural area, and they
are depending agriculture for source of income. Here the
question is that whether these farmers earn sufficient profit
or not? Previous researchers proved that they didn’t get
sufficient income from farming. Farmers facing many
problems like lack of availability of modern equipment’s,
poor irrigation facilities, negotiation between local traders
and middle man, lack of storage facilities, unavailability of
productive seeds. India has been ranked as the second
largest irrigated land in the world, but still farmers faced
various problems related with irrigation. Most of the
farmers are depends monsoon rain for irrigation. Due to
the absence of effective market areas, farmers are not able
to their products at fair profit. Hence they approach
middleman or merchants for business. These middleman
or merchants exploiting farmers and they not offer good
ISBN: 978-93-5619-947-7
price. Another problem is related with lack of proper
storage and maintenance facilities. Small farmers are
forced to sell their crops to consumers and middleman at
whatever price is offered by them, due to perishable nature
of crops. Another problem is lack of availability of
productive seeds for small farmers. Sellers charged higher
price for productive seeds, which are used by farmers for
their basic farming. Agricultural marketing is also in a bad
stage. Government of Kerala take various initiatives and
projects to support tiny agricultural farmers. Recently
government started a farmers call centre and agricultural
information hub for effective communication and
grievance redressal. Government also initiates various
schemes for awareness, consultation and facilitation
among farmers. Government provide a special focus on
women farmers and agro based entrepreneurship. Kerala
government conducted various training and orientation
programs to support tiny agricultural farmers. Finance
minister K.N.Balagopal announced a package of 5650
crore to assist small scale traders and farmers in Kerala.
On the light of these aspects the researcher conducted this
study to analyse problems and prospects of tiny
agricultural farmers in Kozhikode district, Kerala.
II.
OBJECTIVES OF THE STUDY
 To know the association between type of farming and
awareness on various initiatives of government.
 To analyze perception of tiny agricultural farmers on
various challenges faced by them.
 To explore major challenges faced by tiny agricultural
farmers in Kozhikode district, Kerala.
 To understand the relationship between various
initiatives taken by government and quality of life of
tiny agricultural farmers.To measure the effectiveness
of grievance redressal mechanism in farmers
collectives in Kozhikode district, Kerala.
III. RESEARCH METHODOLOGY
The study follows the descriptive and empirical
research methods. Both primary and secondary data are
used in the study to fulfill the objectives of the study. The
primary data was collected through questionnaire
distributed among respondents from 5 farmer’s collectives
in Kozhikode district, Kerala. Secondary data was
collected from academic journals and websites. The
101
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
sample size taken for the purpose of the study is 290
farmers. Simple random sampling is used as sampling
technique and the study is conducted at Kerala state, India.
Independent sample t test, correlation, multiple regression
and exploratory factor analysis were used for data
analysis. All the tests are carried out with the help of SPSS
and AMOS software’s.
IV. REVIEW OF LITERATURE
S. K. Goyal, Prabha, Jai P. Rai and Shree Ram Singh
(2016) made a study on Indian agriculture and farmers
problems and reforms. The study is conceptual in nature
and focused on various problems faced by farmers in
India. Predominance of food grains, limited intensive
agriculture, lower status, land tenancy, traditional bound
were considered as major problems faced by farmers. It is
also founded that Problems related to irrigation
infrastructure, market infrastructure and transport
infrastructure add significant cost to farmers' in rural
areas.
Thangamani (2016) studied Indian agriculture
performance and challenges. The researcher tries to
analyse the importance of agriculture in the Indian
economy in the planning period and find out the factors
responsible for the poor performance of agriculture sector.
Primary data was collected from the selected households
of tribal area in Thalaimalai village. The study concluded
that Reduction in public investment on irrigation and
seeds, technology and extension has greatly affected yield,
Changing cropping pattern has diverted the crop from low
priced food grains to high priced commercial crops were
the challenges identified and made a negative impact on
growth of agricultural sector.
V. ANALYSIS AND INTERPRETATION
5.1 Chi-Square Test
Chi- square test of association is a statistical tool used
to test the relations between the two categorical variables.
It tests the significance between the observed frequencies
with the expected frequency.
H01: There is no association between type of farming and
awareness on various initiatives of government
Table 1. showing association between type of farming and awareness on various initiatives of government
Awareness on various initiatives
taken by government
Type of farming
Chi- square
Significance.
11.421
.018
Source: primary data
Above table states the chi-square association between
type of farming and awareness on various initiatives of
government. It is inferred from the table type of farming
and awareness on various initiatives of government has
significant association with chi square value 11.421 with P
value .018.
5.2 Independent Sample T Test
H02: There is no significant difference in the perception of
farmers on challenges faced by them based on their gender
Table 2. showing significant difference in the perception of farmers on challenges faced by them based on their gender
Particulars
Challenges faced by tiny
agricultural farmers
Label
t
Significance
3.235
0.038
Male
Female
Source: primary data.
Above table states the perception of farmers on
challenges faced by them based on their gender. The P
value is 0.038, which is less than 0.05, which indicates
that the null hypothesis is rejected. Thus there is
significant difference in the perception of farmers on
ISBN: 978-93-5619-947-7
challenges faced by them based on their gender.
Correspondence analysis proves that female farmers
facing problems of marketing and distribution than male
farmers.
102
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
5.3 Exploratory Factor Analysis
Table 3. Challenges faced by tiny agricultural farmers
Factor and Variance
Rotated Factor
Components
Explained
Loadings
Unavailability of Water and soil testing labs
.967
Electricity supply is not enough for farming
.954
Labour is not easily available
.889
Commission agent system is exploiting farmers
.878
Storage facilities are not sufficient
.845
Less imitation from government agencies for purchasing crops
.746
Subsidies are not reached at farmers fairly
.735
Lack of cooperative societies in rural areas
.721
Farmers needed special packages in worst situations
.713
Serious diseases like cancer, due to use of pesticides
.640
Infrastructure
Marketing and distribution
Government assistance
Use of pesticides and health
Values and chemical effects of pesticides not determined
.635
clearly
issues
Pesticides are not provided on subsidy basis
.618
Source: primary data
The above table shows the factor extraction from the
loaded items. 12 statements were loaded to extract 4
major challenges faced by tiny agricultural farmers of
selected locality using principal component method. The
identified challenges are named after thorough review of
literature. The first major challenge is identified as
‘infrastructure’, second challenge ‘marketing and
distribution’, third challenge ‘government assistance’ and
fourth challenge named as ‘use of pesticides and health
issues’.
5.4 Correlation Analysis
H03: There is no significant relationship between
assistance provided by government and quality of life of
tiny agricultural farmers.
Table 4. Showing significant relationship between assistance provided by government and quality of life of tiny agricultural farmers
Dependent variable
Independent variable
Agricultural
system
Quality of life of tiny
agricultural farmers
information
Community drip irrigation
Rain shelter cultivation
Decentralization of nurseries
management
Pearson
correlation
Significance
.654
.000
.764
.634
.678
.000
.000
.000
Source: (Primary Data)
Above table portrays the correlation between the
dependent variable quality of life of tiny agricultural
farmers and independent variables Agricultural
information management system, Community drip
ISBN: 978-93-5619-947-7
irrigation, Rain shelter cultivation, and Decentralization
of nurseries . Community drip irrigation has shown
highest significant relation with P value .000 and
correlation value .764. Hence the null hypothesis is
103
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
rejected and concluded that there is strong relationship
between assistance provided by government and quality of
life of tiny agricultural farmers.
5.5 Multiple Regression Analysis
H04: There is no significant impact between grievance
redressed mechanisms of farmer’s collectives on quality of
life of tiny agricultural farmers.
Table 5. Significant Impact of grievance redressal mechanism of farmer’s collectives on quality of life of tiny agricultural farmers.
Model
Impact of grievance redressal mechanism
of farmer’s collectives on quality of life of
tiny agricultural farmers
R square
Adjusted R square
0.823
0.828
Predictors: Timeliness of Grievance Redressal, Problem Solving Attitude of Farmers Collectives, Satisfaction on
grievance resolution
Dependent variable: quality of life
 Government should Mapping clusters of tiny
agricultural farmers and provide special assistance for
The above table shows the impact of grievance
them.
redressal mechanism of farmer’s collectives on quality of

Government should made more investment for
life of tiny agricultural farmers. The R-Square value
establishing labs and research institutions in rural
shows that any change in the chosen predictors will yield
areas.
82.3% changes in the dependent variable that is the quality

Policy makers should clearly defining rain fed
of life of tiny agricultural farmers. Hence the null
agriculture, micro irrigation, and group farming.
hypothesis is rejected and concluded that there is a
 Farmer’s collectives can use grip boxes and suggestion
significant impact of grievance redressal mechanism of
boxes for grievance redressal.
farmer’s collectives on quality of life of tiny agricultural

Government should collect feedback from farmers
farmers. The adjusted r-square value shows the change in
related with various government initiatives and reframe
the r-square value when a predictor is added or deleted
policies related with community irrigation and rain
from the existing regression model.
shelter cultivation.

Special attention should be provided for redressing
VI. FINDINGS AND SUGGESTIONS
grievances related with marketing and distribution,
infrastructure and government assistance.
 Chi square test revealed that there is a strong
association between type of farming and farmers
VII. CONCLUSION
awareness on various government initiatives.
 Results of independent sample t test showed that there
The study concluded that the government should
is significant difference in the perception of farmers on
increase the awareness of farmers regarding various
various challenges faced by them based on their
initiatives taken by government for support tiny
gender. Further correspondence analysis proved that
agricultural farmers. Farmer’s collectives should take
female farmers facing more problems related with
initiative on the same. Most of the farmers are dissatisfied
marketing and distribution of their agricultural
with existing infrastructural facilities and marketing
products than male farmers.
facilities in rural areas. It is also founded that existing
 Exploratory factor analysis identified major challenges
grievance redressal mechanism in selected farmer’s
faced by tiny agricultural farmers in rural areas and
collectives has some limitations. Most of the strategies
named as infrastructure, marketing and distribution,
used for grievance redressal were outdated. Hence
government assistance, and use of pesticides and health
farmer’s collectives should reframe their existing
issues.
grievance management policy and adopt some innovative
 Correlation analysis concluded that there is strong
technics for grievance identification and redressal.
relationship between various assistance provided by
government for farmers and quality of life of tiny
REFERENCES
agricultural farmers.
[1] Rao C H (2003). WTO and Viability of Indian Agriculture.
 It is also noted that Community drip irrigation has
Economic and Political Weekly, 36 (36), 3453-3457.
shown highest significant relation with P value .000
[2] Dhanabhakyam, M., & Monish, P. A Study of Employees
and correlation value .764.
Perception on Grievance Redressal Mechanism in Non Banking
 Regression analysis proved that there is 82% impact of
Financial Institutions in Kozhikode City.
[3] Thangamani (2016). Indian agriculture performance and
grievance redressal mechanism of farmers collectives
challenges.-a case study. Shanlax International Journal of Arts,
on quality of life of tiny agricultural farmers in
Science & Humanities, 3(3), 134-141.
Kozhikode district, Kerala.
ISBN: 978-93-5619-947-7
104
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
[4]
Monish, P., & Dhanabhakyam, M. (2021). Sustainability Strategies
for Developing SMEs and Entrepreneurship. In Handbook of
Research on Sustaining SMEs and Entrepreneurial Innovation in
the Post-COVID-19 Era (pp. 527-547). IGI Global.
[5] Kumari, M., Meena, L.K. and Singh, R.G. (2015). Problems and
prospects of maize crop in eastern zone of Bihar. International
journal of agricultural science, 5 (2), 138-146.
[6] Dhanabhakyam, M., & Monish, P. (2021). Impact of Employee
Grievance Identification Strategies on Job Performance with
Special Reference to Info Park and Techno Park, Kerala. Asian
Journal of Managerial Science, 10(1), 33-35.
[7] Vadivelu A. and Kiran B.R. (2013). Problems and Prospects of
Agricultural Marketing in India: An Overview. International
Journal of Agricultural and Food Science. 3 (3), 108-118.
[8] Monish, P., & Dhanabhakyam, M. Demystifying Employee
Grievance Management and Exploring the Workplace Justice and
Job Commitment Nexus.
[9] Gurudas Nulkar. (2014). SMEs and environmental performance- a
framework for green business strategies. Procedia-social and
behavioural sciences, 133, 130-140.
[10] Gupta, S.P. and Rathore N.S. (1999). Disposal pattern and
constraints in vegetable market: A case study of Raipur District of
Madhya Pradesh. Agricultural Marketing. 42 (1), 53-59.
[11] Dhanabhakyam, M., & Monish, P. (2019). Impact Of Employee
Grievance Management On Job Commitment In Cyber Park
Kozhikode.
ISBN: 978-93-5619-947-7
105
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Social Role of IOT and Impact Analysis of its
Penetration and Evolving into Society and
Beneficiaries
P.Gayathridevi
Assistant Professor, PG-Department of Computer Science, Sengunthar Arts and Science College, Tiruchengode-637205
Abstract: Intelligent and IoT-based technologies have allowed
for a wide range of technological advances across multiple
aspects of life due to the rapid development and
implementation of smart IoT (Internet of Things) technologies.
The primary objective of IoT technologies is to simplify
processes in different fields, to make better performance and
efficiency of systems and finally to improve life quality in a
smart way. IoT now emerging on many professions like
engineering, industries, research environment, educational
sector and living system. IoT makes their environment more
smatter. The impact of IoT on the society is it will be able to
improve the quality of life and reduce healthcare costs for
individuals, businesses, and governments, as well as increase
access to education and safer transportation for those remote
and underserved.
Keywords: Mechanisms, IoT, Blockchains, Heterogeneous.
I.
INTRODUCTION
The Internet of Things(IoT) is an emerging technology
representing of the system of connected people, devices, and
services. There are numerous devices and objects that
comprise the World Wide Web - each of which provides
valuable information and innovative services through a
number of standard communication protocols and each of
which has its own unique addressing scheme. Future
networks are expected to connect the physical world data
with digital content and efficient services via billions of
objects which will play a key role in integrating the physical
and digital worlds. We can call this emerging networking
paradigm the Internet of Things (IoT),will provide a
uppermost set of opportunities trousers, manufacturers, and
service providers with a wide applicability in many
productive sectors.
These include environmental monitoring, health care,
inventory and product management, smart home and
workplace, security and surveillance, and many others. The
result is that today we have a novel approach to build
applications that are enhanced and services that involve
communication among objects on the Internet of services of
people. The inspiration to develop more IoT objects has,
therefore, evolved in recent years and outstands as
succeeding research area that will unsurprisingly continue
ISBN: 978-93-5619-947-7
over the coming years with the beginning of innovative
enabling technologies .For example, the arrival of the latest
concepts, like big data, informatics centric networking,
cloud computing and social networking.
These technologies have by now to some extent
impacted and are playing important role in evolving the IoT
idea and many new ultramodern paradigms are already in
the sphere of progress. This paper is a review to motivate by
the above considerations and aims at providing a vigilant
analysis of the technologies that have contributed to the birth
of the IoT and to its growth over the time. And also how
necessary is the need of smart objects for the social use [1].
Smart objects are only the first step of an evolutionary
process that is affecting modern communication devices and
has been triggered by the advent of IoT in the
telecommunication scenario. We are currently observing a
generational leap from objects with a certain degree of
smartness to objects with an actual social consciousness.
One primary goal behind such smart integration of devices is
to simplify people‟s lives by having technology work for
them seamlessly [1].
The IoT as a term and concept is itself a metaphor that
suggests an imaginary of things that connect seamlessly
with and through the Internet as part of a dense network of
objects.
Objects in the IoT universe are characterized in
anthropomorphic terms as “intelligent,” “smart,” “sociable,”
and “communicative”: in some cases, possessing
capabilities beyond those of human intelligence and
interactions . Terminology employing the “smart” metaphor
is frequently used interchangeably with the IoT. Concepts
such as “smart cities,” “smart environments,” “smart
factories,” “smart healthcare,” “smart agriculture,” “smart
transport,” “smart workplaces,” “smart schools,” “smart
hospitals,” “smart grids,” “smart buildings,” and “smart
homes” include reference to the IoT. Computer scientists
and informatics researchers have often made bold claims
relating to the futures of the IoT: for example, that they can
operate by “putting intelligence into everyday objects,”
thereby working to “form a system where the real and
106
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
digital worlds meet and are continuously in symbiotic
interaction”[2]
standard and rules for communication, so it becomes a major
problem in IOT.[4]
II. CHALLENGES IN IOT
2.5 Scalability
As IOT has come up with many new opportunities and
applications in various fields, but it faces some challenges as
well. Some of them are:
Given the huge number of devices requiring
simultaneous connectivity, scalability in IoT systems has
become a concern. In IoT, there are mainly two types of
scalability issues: vertical scalability, which refers to the
addition or removal of computing resources of an IoT node;
and horizontal scalability, which refers to the addition or
removal of an IoT node. Given its importance, IoT
scalability has been extensively addressed in the literature,
with the proposal of cloud computing or cloud-based
architectures. However, despite these efforts, challenges still
remain, such as IoT nodes needing to provide an increased
number of services, such as functional scalability, access
control, data storage, fault tolerance, and privacy and
security, to name a few.[1][3].
2.1 Security
Security is one of the biggest challenges in IOT. As the
IOT devices such as sensors, actuators and they are directly
accessible, so they are prone to various security attacks such
as spoofing, denial of service, altering attack. So there is
need to deploy against these attacks.
2.2 Data Storage
As the amount of data is increasing with a very high
pace, so the storage of data becomes a major problem. Data
storage also effects data protection. As the stored data crash,
it is difficult to backup all the stored data. So it is also major
problem in IOT. Massive volume and heterogeneous data are
the challenges in IoT data storage. A properly designed IoT
middleware is required to handle the issues.
This paper presents a framework consists of Internet
Gateway Device (IGD) function, a Web service, NoSQL
database, and IoT Application. The framework efficiently
handles the structured and unstructured of sensors data. To
verify the framework, we evaluated it using functional and
non-functional testing. From the functional testing, this
framework can deliver and store data with heterogeneous
data and volume. From the non-functional testing, this
framework can receive 443 data per second from an IGD,
can deliver 173 data per second to IoT Apps, and response
times are acceptable which is under 1 seconds.
2.6 Security and Privacy
The lack of privacy standards and end-to-end security
solutions has been an ongoing concern for conventional IoT
deployment, and wireless IoT faces more challenges in terms
of these aspects. Several technologies are aiming to solve
privacy and security issues from both a hardware and
software perspective.A hardware security system that
utilizes RFID and localized network protocols is a key
component in addressing security problems.By taking
advantage of the zero-trust network feature of Key
Management Systems (KMS) and blockchain technology,
they address the privacy and trust threats with enhanced
security features.A major challenge for IoT devices involves
the interdependence of security, privacy, and trust for IoT
ecosystems, thanks to newer communication protocols,
KMSs, and blockchains. In order to achieve optimal
integrity and performance, the challenge should always be
regarded as holistic.
2.3 Standard and interoperability challenge
2.7 Energy Efficiency
Set of standard has a huge impact on IOT. Each sort of
objects in Internet of Things has diverse data, preparing and
correspondence abilities. Diverse objects would likewise be
subjected to various conditions, for example, the vitality
accessibility and the correspondences data transfer capacity
necessities. To encourage correspondence and participation
of these items, basic benchmarks are required.[4]
2.4 Architecture challenge
IOT consist of couple of devices connected, sensors and
many more. Different device uses different set of protocols
and standards to communicate. And there is no well defined
ISBN: 978-93-5619-947-7
Researchers have used several approaches to address the
problem of designing energy efficient IoT networks: (a)
developing energy-efficient routing protocols to reduce the
number of hops, optimizing communication link status,
adopting wake sleep strategies based on network traffic, and
data reduction via controlling the network topology. (b)
incorporating renewable energy devices in the network
alongside adopting load-balancing strategies.(c) exploiting
wireless charging mechanisms to solve the fundamental
issue of power management, especially for large-scale
heterogeneous IoT networks. However, from hardware
perspective there is a significant need to develop net-zeroenergy sensor nodes, since the current trend is to pack an
107
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
energy constrained node with more and more functionality,
which could lead to a possible compromise between fidelity
and power efficiency.[3].
2.8 Self-Organization
There is an ongoing paradigm shift from Internet-ofThings to Internet-of-Everything due to the proliferation of
IoT nodes which demands new approaches to autonomic
management to make the network proactive rather than
reactive. The main idea behind self-organization in IoT
systems is to actively respond to the changing environments
in an automatic and coordinated fashion through the use of
one or more control loops that reconfigures the system
behavior on-demand to keep it within desired bounds .[3] In
these systems, advanced algorithms are used in conjunction
with high-level human goal and policy definitions to selfmanage proactively when the environment changes. The
ability to organize self-tively and autonomously will be
crucial for the survival and robustness of a dense IoT
network in the future, which has sparked a great deal of
research.
However, there are many open challenges in this space
and some notable research directions for the future include
dealing with the heterogeneous interoperability of the
system, designing of optimal self-organizing protocols and
routing strategies for large-scale distributed heterogeneous
IoT networks, and cross-platform behavior optimization.[3]
III. IMPACT OF IOT IN OUR SOCIETY
3.1 IoT Based Parking System
Parking is a major difficult in most of the place
nowadays. Daily traveler have to spend a significant amount
of time, fuel and energy to find a parking area. This situation
gets worse during the peak hours. Internet of Things (IoT)
has the potential to change this. In fact, startups have already
implemented technology to solve this problem in many parts
of the world. An up-to-date map of all the legal parking
spots in a neighborhood can be accessed through these
startups. through this the user can able to identify the
availability of the parking place from their location. also
they book their exact spot to park. They can make payments
via e-payments. Consequently, travellers do not need to
navigate the parking lot several times before finding a
parking spot and can save time searching for parking.
the buses arrive, there are chances that they will be full, and
hence passengers are not able to board them.
This problem is being solved by startups that are using
the Internet of Things (IoT). They can communicate with
commuter and provide them real-time information about the
location of the bus and the availability of seats in them. They
also provide information about the route and suggest
alternative means of transport.
3.3 IoT- Home Automation System(Smart Home)
Home automation system we can also call as smart
home is a biggest welcoming field in IoT technology. it has
several advantages. it is really a amazing thing to Imagine
being able to set the lighting and temperature of your room
without even moving out of your chair.
The lights and temperature could be set according to the
temperature and weather all the time if these settings could
be stored. Also, imagine if you could remotely trigger your
appliances so that your clothes can be washed at a specific
time or your brewed coffee can be ready just when you reach
home! it all being as a magic. the IoT technology make it all
possible in our day to day life. but it seems very expensive
nowadays.
As a result, these technologies are only being utilized in
the residences of the wealthy! In time, however, this
technology will become cheaper, and everyone will have
access to this comfort. Experts often say that Internet of
Things (IoT) is the new electricity! Another major benefit of
the Internet of Things (IoT) is that it cuts the utility bills of
the house. Hence, even though the equipment may be
expensive, it prevents wastage of electricity and brings down
the bill.
3.4 Benefits of Social internet of Things
3.2 IoT Based Public Transport Systems
The general effect that IoT can have on social media is
enormous and spurring. In the context of social media, IOT
will be able to distribute some of the most important
benefits, including tracking the behavior of consumers in
real-time and increasing awareness on the situation. This can
be very useful for businesses who relies on deep insights
into consumer behavior to deliver the desired services. Smart
phones, which have turned into a fundamental part of our
lives, are a standout amongst the most normally utilized
gadgets. These smart phones can actually be seen as the
control panels for IoT.
Public transport system is really a biggest problem for
everyone who is all using public transport system. There is
no previous information about the bus and when the arrival.
passengers ideally have to wait for the vehicles. at the time
This can be the ideal “battle-room” for all
interconnected IOT gadgets. According to the tech experts
today, connected gadgets have exceptionally affected the
way we relate and connect with others. Indeed, even most
ISBN: 978-93-5619-947-7
108
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
organizations trust that their shoppers are investing a
considerable measure of their energy in informal
communities, for example, Facebook, WhatsApp, Instagram,
and others.
Comm., vol. 52, no. 1, 2014, pp. 97–105.
[11] J. Lu, T. Sookoor, V. Srinivasan, G. Gao, B. Holben J. Stankovic, E.
Field, and K. Whitehouse, “The Smart Thermostat: Using Occupancy
Sensors to Save Energy in Homes,” ACM SenSys, 2010
IV. CONCLUSION
Just like a magic, the IoT Penetrate in our society, we
adopt the benefits of IoT successfully, in this review paper,
we have discussed and analyzed about the current
technological benefits of IoT. The success and growth of the
IoT is unquestionable. In this review paper, we have analyzed
and discussed the previous and current approaches.[1]
In relation to connecting people with IoT systems, we
presented several reference scenarios. In our proposal, we
propose to reduce the complexity inherent in the IoT by
having people interact with smart objects using their smart
phones, thereby enabling the evolution of the IoP.[1]People
have used the term "Internet" before, but usually to describe
traditional Web systems designed only for humans to use.
Here, it is used as a means of bringing the Internet of Things
(IoT) closer to people, so they can easily get involved in it
and fully benefit from it.
REFERENCES
Ayesha Bhandralia1, Kanika Chuchra2, Richa Vasuja3 1,2,3 Assistant
Professor, Dept. of Computer Science, Chandigarh University, Punjab,
India, Role of Internet of Things(IoT)to Overcome Social Challenges.
[2] A Review of IOT Architecture, Challenges, Applications, Future
Trends Davinder Kaur, Assistant Professor, Department of Computer
Applications, CGC Landran davinder.3771@cgc.edu.inInderpreet
KaurAssistant Professor, Department of Computer Applications, CGC
Landran cecm.bca.ik@gmail.com
[3] How Internet of Things Influences Human Behavior Building Social
Web of Services via Agent-Based Approach Article in Foundations of
Computing and Decision Sciences · September 2016.
[4] Grand Challenges in IoT and Sensor Networks Muhammad Ali
Imran*, Ahmed Zoha, Lei Zhang and Qammer H. Abbasi James Watt
School of Engineering, University of Glasgow, Glasgow, United
Kingdom.
[5] Trends, benefits, risks, and challenges of IoT implementation in
residential and commercial buildings Kehinde Lawal a , Hamed
Nabizadeh Rafsanjani b , a School of Electrical and Computer
Engineering, University of Georgia, Athens, GA 30602, USA b
School ofEnvironmental, Civil, Agricultural, and Mechanical
Engineering, University of Georgia, Athens, GA 30602, USA
[6] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos,
“Context aware computing for the internet of things: A survey,” IEEE
Communications Surveys & Tutorials, vol. 16, no. 1, pp. 414–454,
2014.
[7] Luigi Atzori, Davide Carboni, Antonio Iera, “Smart Things in the
Loop: Paradigms, Technologies, and Potentials”, in Ad Hoc Networks
Journal, March 2013.
[8] F. Akyildiz and J. M. Jornet, “The internet of nano- things,” IEEE
Wireless Communications, vol. 17, no. 6, pp. 58–63, December 2010.
[9] J. M. Jorne t and I. F. Akyildiz, “The internet of multimedia
nanothings,” Nano Communication Networks, vol. 3, no. 4, pp. 242–
251, 2012
[10] L. Atzori, A. Iera, and G. Morabito, “From „Smart Objects‟ to „Social
Objects‟: The Next Evolutionary Step of the Internet of Things,” IEEE
[1]
ISBN: 978-93-5619-947-7
109
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Handwritten Digits Recognition using CNN
Identifying the Regional Based Writing Style
Mrs.S.Sindhu1, Mrs. P M Kavitha2, Mr.MD.Tafsil3, Mr.Rajesh Rana4, Mr. Akshay Kumar Rana5
1,2
Assistant professor, SRM Institute Of Science and Technology, Chennai , India
3,4,5
Student, SRM Institute Of Science and Technology, Chennai , India
Abstract: Humans' reliance on technology has never been
higher, to the point that deep learning and machine learning
algorithms can conduct everything from object detection in
images to adding sound to silent movies. Similarly,
handwritten text recognition is a major area of research and
development with a plethora of possibilities. Handwriting
recognition (HWR), also known as Handwriting Text
Recognition (HTR), is a computer's capacity to recognize
and interpret comprehensible handwritten input from
sources such as paper documents, pictures, touch displays,
and other devices. It appears that this paper used Support
Convolution Neural Network (CNN) models to accomplish
handwritten digit recognition using MNIST datasets. Our
major goal is to compare the accuracy of the above models
with their execution times in order to find the optimum digit
recognition model.
Keywords: Deep Learning, Machine Learning, Handwritten
Digit Recognition, MNIST datasets, and Convolution Neural
Network (CNN).
I INTRODUCTION
Handwritten digit recognition. Because handwritten
digits are not flawless and can be generated with a variety
of tastes, it is a difficult assignment for the machine. The
solution to this problem is handwritten digit recognition,
which uses an image of a digit to recognize the digit
present in the image. A computer that can recognize
human handwritten numbers from a variety of sources,
such as photographs, papers, and touch displays, and
classify them into ten different categories (0-9).
Numerous applications exist for digit recognition,
including number plate identification, postal mail sorting,
and bank check processing. Handwritten digit recognition
refers to a computer's capacity to recognize human
handwritten digits from various sources such as
photographs, papers, and touch screens. This has been a
topic of boundless-research in the field of deep learning.
There are numerous applications for digit recognition,
including number plate identification, postal mail sorting,
and bank check processing [2]. Because handwritten digit
recognition is not an optical character recognition, we
encounter numerous obstacles due to the various styles of
writing used by different people. This study compares and
contrasts various machine learning and deep learning
methods for handwritten digit recognition. We employed
Support Vector Machines, Multilayer Perceptron’s, and
Convolutional Neural Networks to achieve this. The
algorithms are compared based on their accuracy,
mistakes, and testing-training time, which are supported
ISBN: 978-93-5619-947-7
by plots and charts created with matplotlib for
visualisation.
II
RELATED WORK
With the humanization of machines, a significant
amount of research and development activity has sparked
interest in deep learning, machine learning, and artificial
intelligence. Machines are becoming increasingly smart
throughout time, and they have made our lives more
secure and manageable, from fundamental math to retina
recognition. Similarly, deep learning and machine
learning are useful for recognising handwritten text. to
evaluate the core machine learning algorithms on many
criteria such as performance rate, execution time,
complexity, and so on [3].
The Multilayer Perceptron classifier produced the
most accurate results with the lowest error rate, followed
by Support Vector Machine, Random Forest Algorithm,
Bayes Net, and Random Tree, respectively. A comparison
of SVM, CNN, KNN, and RFC was presented, with the
highest accuracy of 98.72 percent using CNN (which took
the longest to execute) and the lowest accuracy using
RFC. did a detailed study-comparison of SVM, KNN, and
MLP models to classify handwritten text and found that
KNN and SVM correctly predict all the classes of dataset
with 99.26 percent accuracy, but the process gets a little
complicated with MLP when it had trouble classifying
number 9, for which the authors suggested using CNN
with Keras to improve the classification.
Diagnostic characteristics. While has focused on
comparing deep learning methods with machine learning
methods and comparing their characteristics to see which
is better for classifying meditational lymph node
metastasis of non-small cell lung cancer from 18 F-FDG
PET/CT images and also to compare the discriminative
power of the recently popular PET/CT texture features
with the widely used diagnostic features to see which is
better. It was established that CNN's performance in
classifying mediastinal lymph node metastasis of NSCLC
from PET/CT images is comparable to that of the best
traditional methods and human clinicians. CNN, on the
other hand, does not use the import diagnostic features,
which have been shown to be more discriminative than
texture features when it comes to categorising tiny lymph
nodes. As a result, putting diagnostic features into CNN is
an exciting prospect. As a result, adding diagnostic
110
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
features into CNN is a promising future research
direction.
III
MOTIVATION FOR PROPOSED WORK
Machine learning and deep learning approaches are
being used by developers to make machines more
intelligent. A person learns how to accomplish a task by
practising and repeating it over and again until it
memorises the steps. The neurons in his brain then fire
automatically, allowing them to do the task they've learnt
rapidly. This is also quite similar to deep learning. It
employs a variety of neural network topologies to solve
various issues. Object identification, image and sound
classification, object detection, image segmentation, and
so on are examples.
IV FEASIBILITY STUDY
The first step in the project feasibility assessment is
to sketch out your strategy. This offers you a sense of
what your project's purpose is and where your analysis
should focus. Using the MNIST dataset, we'll create a
handwritten digit recognition software. Convolutional
Neural Networks are a sort of deep neural network that we
will use. Finally, we'll create a user interface that allows
you to draw a digit and instantly recognise it.
V ARCHITECTURE OF THE PROPOSED WORK
Fig 1:- Architecture of the Proposed System
The major goal is to apply machine learning
approaches to discover the rules that should be employed
in the AHDR for document images. The goal of this
research is to recognize corrupted handwritten digits,
improve the reliability of the recognition process' results,
and reduce the time it takes to collect training and test
data from handwritten digit strings. Preprocessing,
segmentation, classification, and eventually recognition of
supplied input data make up the total recognition process.
In order to classify and detect the digits, the
suggested model has four stages:
A. Pre-processing
B. Segmentation
C. Feature Extraction
D. Recognition and Classification
Pre-Processing: The first step in processing the
training set photos is to threshold them into a binary
image in order to reduce the data.
ISBN: 978-93-5619-947-7
Fig 2:- Sample images taken from MNIST database
Segmentation: After the input photos have been preprocessed, the sequence of images is divided into subimages of individual digits. Individual digits are assigned
a number and pre-processed digit images are divided into
a sub-image of individual digits. Each digit gets resized
into pixels on its own. An edge detection is performed in
this stage. Feature Extraction: After the pre-processing
and segmentation stages are completed, the pre-processed
images are represented in the form of a matrix that
contains pixels from very large images. In this approach,
representing the digits in the photos that carry the
necessary information would be beneficial. Feature
extraction is the term for this activity. Redundancy in the
data is removed during the feature extraction stage.
Classification and Recognition: The retrieved feature
vectors are used as individual inputs to each of the
following classifiers in the classification and recognition
stage. To demonstrate the working system model, the
extracted characteristics are integrated and described
using the three classifiers shown below:
 Random Forest Classifier
 Support Vector Machine
 K-Nearest Neighbor
Fig 3:- Block Diagram of proposed model
111
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
5.1 K-Nearest Neighbour
KNN is an instance based learning algorithm. There
are two main benefits of using KNN algorithm, that is, it
is robust to noisy training data and it is very efficient if
the data is very large in size. To perform admirably, this
algorithm requires a set of training datasets which
includes perfectly labelled data points. KNN is also a nonparametric classifier. The algorithm considers new data
point as its input and performs classification by
calculating distance between new and labelled data points
using the Euclidean or Hamming distance formulas. The
Euclidean distance is calculated using the following
formula:
The SVM algorithm recognises the digit. The
confusion matrix is presented using a matrix in which
each row represents instances from a predicted class and
each column represents examples from a real class.
5.2 Random Forest Classifier
RFC is a method of supervised learning. It implies
that there is a direct relationship between the total number
of trees and the outcome: the more trees there are, the
more precise the result will be. This classifier can be used
for both classification and regression. If there are enough
trees in the RFC algorithm, the classifier will not overfit
the model, instead avoiding overfitting concerns. The
missing quantities are handled by this classifier.
Following the training, predictions are obtained from each
individual tree, and the average is determined
Fig 3:- Digit Recognized by SVM algorithm
5.3 Support Vector Machine
SVM is a supervised learning technique as well. It
can also be used for classification and regression. There
are data elements in this type of method that are treated as
points in an n-dimensional space. By completing
classifications between the two classes, this classifier
discovers the hyper plane. One of the most important
features of this method is that it includes a regularisation
parameter that prevents overfitting. All of the preceding
processes are depicted in the block diagram displayed in
Figure 3.
VI RESULTS
The following figures show the sequence of steps to
be carried out to obtain the required output.
The output
generated by running the KNN algorithm.
Fig 4: Output generated by CNN
VII CONCULSION
Handwritten Digit Recognition using Deep Learning
Methods has been implemented in this research. To obtain
a comparison of the classifiers, the most extensively used
Machine learning algorithms, KNN, SVM, RFC, and
CNN, were trained and tested on the same data. A great
level of accuracy can be achieved with these deep learning
approaches. In comparison to other research approaches,
this strategy focuses on which classifier performs best by
enhancing classification model accuracy by above 99
percent. A CNN model with Keras as the backend and
Tensorflow as the software can achieve 98.72 percent
accuracy. In this first trial, CNN achieves a 98.72 percent
accuracy, KNN achieves a 96.67 percent accuracy, and
RFC and SVM do not do well.
REFERENCES
[1]
[2]
[3]
https://pythonprogramming.net/tensorflow-deep-neural-networkmachine-learning-tutorial/?completed=/tensorflow-introductionmachine-learning-tutorial/
Https://En.Wikipedia.Org/Wiki/Rectifier_(Neural_Networks)
https://projectworlds.in/artificial-intelligence-project-handwrittendigits-recognition/
Fig 2:-.Output generated by KNN
ISBN: 978-93-5619-947-7
112
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
S. Ioffe and C. Szegedy, "Batch normalization: Accelerating deep
network training by reducing internalcovariate shift", CoRR,
February 2015.
J. Y.-H. Ng, M. Hausknecht, S. Vijayanarasimhan, O. Vinyals, R.
Monga and G. Toderici, "Beyond shortsnippets: Deep networks for
video classification", CoRR, March 2015.
Karpathy and L. Fei-Fei, "Deep visual-semantic alignments for
generating image descriptions", CoRR, 2014.
F. Schroff, D. Kalenichenko and J. Philbin, "Facenet: A unified
embedding for face recognition and clustering", CoRR, Marchs
2015.
Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, et al.,
"Going deeper with convolutions", CoRR, 2014.
M. Bishop, Pattern Recognition and Machine Learning, Springer,
2006.
C.-C. Chang and C.-J. Lin, "Libsvm: A library for support vector
machines", ACM Trans. Intell. Syst. Technol, vol. 2, no. 3, pp.
27:1C27:27, 2011.
DE Rumelhart, GE Hinton, RJ Williams et al., "Learning
representations-by back-propagating errors", Cognitive modeling,
vol. 5, no. 3, pp. 1, 1988.
H Jaeger, "Controlling recurrent neural networks by
conceptors", arXiv preprint 573arXiv, vol. 1403, no. 3369, 2014.
Hu Yuhuang, M S Ishwarya and Kiong Loo Chu, "Classify Images
with Conceptor Network", cs.CV arXiv, 2015.
.S H Chen, S H Hwang and Y R Wang, "An RNN-based prosodic
information synthesizer for Mandarin text-to-speech[J]", IEEE
Transactions on Speech Audio Processing, vol. 6, no. 3, pp. 226239, 1998.
Mantas, "A Practical Guide to Applying Echo State Networks[M]"
in Neural Networks: Tricks of the Trade, Springer Berlin
Heidelberg, pp. 659-686, 2012.
Herbert Jaeger, "Using Conceptors to Manage Neural Long-Term
Memoriesfor Temporal Patterns", Journal of Machine Learning
Research, vol. 18, no. 13, pp. 1-43, 2017.
ISBN: 978-93-5619-947-7
113
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Modelling and Forecasting of Stock Price
Volatilty– An Analysis
K. Kannan1, Dr. S. Balamurugan2
Research Scholar, Department of Management Studies, Periyar University, Salem,
Tamil Nadu, India
2
Assistant Professor, Department of Management Studies, Periyar University, Salem,
Tamil Nadu, India
1
Abstract: The present study attempts to use the GARCH
family models for modelling and forecasting the price
volatility of the NIFTY 50 companies listed under the Indian
stock market, using the daily adjusted closing price for the
period from 1/04/2011 to 31/03/2021. The research design
used for the study is analytical research design. The sampling
design used for the study is purposive sampling method in
which the researcher selects one important sector from the
NIFTY 50 index listed on 31/03/2021. The major sector like
Financial Services sector were selected based on the sector
weightage. In this study the researcher used different
combination of ARCH and GARCH lags and the high-order
models were generally tested to select the most suitable
model. The models of forecasting like Generalized
Autoregressive Conditional Heteroskedasticity- symmetric
GARCH (2,1), asymmetric GARCH models like Exponential
GARCH- EGARCH (2,1) and Threshold GARCH –
TGARCH (2,1) were considered for the study. In order to see
the ARCH effect, Heteroskedasticity Test like - The
Lagrange Multiplier (LM) test for ARCH were used to see
the presence of Heteroskedasticity in residual of the return
series. Because if ARCH effect is present, we can use
ARCH/GARCH models. The stationarity test like
Augmented Dicky-Fuller test were conducted to see whether
the return series are stationary. The test of normality like
Jarque-Bera test were used to see whether the return series
were normally distributed. The performance of these
GARCH models were evaluated by using the two error
statistics like Root Mean Square Error and Mean Absolute
Error. Based on these evaluation TGARCH were
outperformed well and it helps to capture the leverage effect,
volatility clustering, accuracy in forecasting and to
differentiate the asymmetric effect between good news and
bad news.
Keywords: Price Volatility, Modelling and Forecasting, NIFTY
50, GARCH family Models.
I.
INTRODUCTION
Investment in the stock market is always predicted to
be risky because they are more volatile. In the stock
market, there is volatility when the stock markets are
influenced by the macro-economic variables. The
volatility is the extent to which the security price, market
or commodity increases or decreases for a particular time.
The volatility relates to the quantity of uncertainty
regarding the scale of adjustments in the value of a
security. In securities markets, volatility implies peaks and
troughs which might lead for either loss or gain. The term
volatility is the quantitative measure of the fluctuations of
the price or rate of return of the percentage price
ISBN: 978-93-5619-947-7
adjustment. Volatility is a challenge and a major problem
for those concerned with cash or trading in the stock
exchange or some other financial instrument. For financial
professionals, market participants, institutional investors,
regulators and analysts, the issues of volatility were
becoming extremely important in recent years. Volatility
is calculated by the average value of variance or by the
standard deviation of stock returns. The stock returns are
taken instead of stock values when calculating the
volatility so mean must be constant at the distinct time
when calculating the dispersion around an average value.
The modelling and forecasting of asset return volatility is
critical in different financial market-related applications,
such as derivative valuation and the management of risk.
To take an investment decision in the stock market, the
consideration of volatility is mandatory. Numerous studies
to test the volatility are being carried out in the developing
countries. Different variables such as market rate, trading
process, dividend distribution and data arrival have been
selected as various factors to calculate volatility. Since the
stock market volatility is an inevitable problem, it is
necessary for the developing countries to re-examine the
issues related to the stock market volatility .The present
study attempts to use the GARCH family models for
modelling and forecasting the price volatility of the
NIFTY 50 companies listed under the Indian stock market,
using the daily adjusted closing price for the period from
1/04/2011 to 31/03/2021 in a quantitative term. The
financial services sector was purposefully selected by the
researcher based on the sectors weightage. The stock price
volatility modelling and forecasting of the selected sectors
indexed under NIFTY 50 and listed under the National
Stock Exchange of India has been evaluated by using the
GARCH family models. The study is based on the
adjusted closing price of the selected 10 companies under
the financial services sector. Because to give the investors
a more current and accurate idea about the stock price
adjusted closing price of each selected companies were
taken into consideration. The structure of this paper are as
follows: Section 2 shows the related review of literature.
Section 3 explains the research methodology. Section 4
provides empirical results. Section 5 presents the
conclusion.
II. REVIEW OF LITERATURE
Earlier studies such as Abdalla and Winker (2012),
Babatunde (2013) were examined the modelling and
114
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
forecasting of the stock market by using the GARCH
family models. Their studies revealed that the GARCH
models were better and considered as the best fitted
models for forecasting the stock price volatility. Godfrey
(2020) were studied the stock market volatility modelling
for the accuracy in forecasting by using symmetric and
asymmetric GARCH type models. Fauzia (2018),
Dohyunchun (2019) and Huthaifa (2020) were analysed
the volatility of the stock prices by using non-linear
GARCH type models and they made a comparison
between them and their findings revealed that which
model is better for capturing the leverage effect, volatility
clustering, conditional variance, leptokurtosis and
skewness. Hussainy and Khanh (2009), Narayan and
Reddy (2020) were examined how the macroeconomic
variables affect the performance of the stock market
through an empirical analysis and they found the
relationship between the stock market development and
returns by considering various macro-economic factors.
Liu (2010) examined the time series studies i.e. the
leverage effect (asymmetric). It may happen when the
stock returns have adverse correlation with the changes in
volatility. i.e. because of the bad news the volatility is
expected to increase and the volatility decreases as a
response to the good news. Phich and Henghan (2011),
Dana (2016), were used the ARCH/ GARCH models for
modelling and forecasting the stock price volatility and
their findings revealed which model is better for volatility
forecasting. Their findings revealed different models like
GARCH, GJR GARCH, E GARCH, M GARCH and T
GARCH were better for forecasting the volatility of the
stock market at different time periods. Jelilov et.al (2020),
Mazur et.al (2020) analysed how COVID-19 pandemic
and the march 2020 market crash affect the stock market
by conducting an analytical study and they provide an
empirical result. The outcome of their study shows that the
performance of the stock market was affected during the
COVID-19 period, particularly the investment in the
automobile sectors and other major sectors were affected
adversely during this period.
accurate idea about the stock price. The primary objective
is to identify the suitable GARCH family models for
forecasting the stock price volatility among the selected
NIFTY 50 companies in India.
The statistical tools like Descriptive analysis, Test of
Normality,
Augmented
DickeyFuller
Test,
Heteroskedasticity Test, GARCH family models like
Generalised
Autoregressive
Conditional
Heteroskedasticity (GARCH), Exponential GARCH (EGARCH) & Threshold GARCH (T-GARCH) were used to
analyse the data.
IV. EMPIRICAL RESULTS
The descriptive statistics of the financial services
sector shows that all the selected companies mean values
are positive which indicates the fact that price has
increased over the period. The standard deviation of return
series revealed that the selected companies are relatively
volatile. If the skewness is normal, it should be zero. If the
skewness values are positive or long right tailed it has the
higher chance of getting positive returns. Similarly, if the
value of skewness is negative or long left-tailed it has the
higher chance of getting negative returns. For all the
selected companies the value of kurtosis is greater than 3.
It indicates that the return series are fat tailed and were not
normally distributed.
Table 1. Test of Normality
S.No.
Name
1
HDFC Bank
2
HDFC
3
ICICI Bank
4
KOTAK Bank
5
AXIS Bank
6
SBI
7
Bajaj Finance
8
Bajaj Finserv
9
IndusInd Bank
10
SBI
Source: Computed from Eviews
J-B
5413.60
5719.20
2322.63
2101.72
13210.33
6151.02
10360.48
13646.25
15610.21
16140.13
Probability
0.000
0.000
0.000
0.000
0.000
0.000
0.000
0.000
0.000
0.000
III. RESEARCH METHODOLOGY
Research is the “acquisition of new knowledge or the
creative use of existing knowledge to produce new ideas,
approaches, and conceptions”. The Analytical Research
Design were used for the study and the sampling method
used is “Purposive Sampling”. The sampling unit used for
this study is 10 Companies under one major sector like
financial services and which is listed in the National Stock
Exchange of India and indexed under NIFTY 50 as on
31/03/2021.
The list of companies in the financial services sector
were selected based on the sector weightage. The daily
adjusted closing price of these companies were taken from
the financial information provided by the National Stock
Exchange of India (Source: Yahoo! Finance). Because the
adjusted closing price provides investor more current and
ISBN: 978-93-5619-947-7
Jarque-Bera test helps to see whether the return series
were normally distributed. The test statistic P-value falls
between 0 and 1. The null hypothesis were rejected at 1%
significance level, which indicates the fact that the return
series were distributed normally were rejected and it may
have concluded that all the return series were not
normally distributed which is leptokurtic distribution with
positive peaked curve. To check the stationarity of the
return series ADF test were used. It helps to check
whether the time series has a unit root. The (t-statistic)
values of the ADF test are more negative than the test
critical values, therefore the null hypothesis which
indicates the return series has a unit root i.e. (the return
series are non-stationery) is rejected at 1% significant
level at the level difference itself. Hence, it is
concluded that the return series of all the selected
companies are stationary.
115
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Before applying the ARCH/ GARCH model it is
mandatory to test the ARCH effect in the re4turn series.
Hence, Lagrange Multiplier (LM) method were used, and
the P-Value of the test is almost zero. The critical value
of the chi-square (1) at 1% is 6.645. Therefore, the null
hypothesis is rejected at 1% significance level for all the
selected companies. This shows the presence of ARCH
effect in the return series. Hence, GARCH family models
can be applied.
The result of GARCH (2,1), EGARCH (2,1) and
TGARCH (2,1) model for the financial services sector
reveals that the GARCH (2,1) model shows the
coefficient estimation for all the selected companies.
The (β1) value clearly shows the maximum information
were comes from the past. The new information has a
less impact (α1). The long run average variance is near to
zero. Since GARCH (2,1) model does not capture the
effect of asymmetric volatility. EGARCH (2,1) model
were used for the volatility estimation of stock returns.
The condition of stationarity is both the ARCH and
GARCH term should be less than 1. Therefore, the
stationarity condition was not met for the selected
companies using the return series under EGARCH
model. Since the Gamma value is non-zero it shows that
there is an existence of asymmetry in the volatility, but
this model does not provide valuable information
whether the good or bad news affects the volatility.
Therefore, TGARCH model were used. The TGARCH
model shows that the bad news increases the volatility
substantially and the stock return volatility is asymmetric.
To obtain the best forecasting model, the statistics
from that volatility model is used with the: Lowest Akaike
Information Criterion (AIC), Lowest Schwartz
Information Criterion (SIC), Lowest Root Mean Square
Error (RMSE), Lowest Mean Absolute Error (MAE). For
all the selected companies, it is observed that the
RMSE and MAE values are lowest under TGARCH
(2,1) model. Therefore, it indicates that the TGARCH
(2,1) model outperforms all the other models and
provides a more accurate forecast in terms of RMSE
and MAE.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
Abdalla, S., Z., & Winker, P. (2012). Modelling Stock Market
Volatility Using Univariate GARCH Models: Evidence from Sudan
and Egypt. International Journal of Economics and Finance, 4(6),
161 – 176.
Babatunde, O. A. (2013). Stock Market Volatility and Economic
Growth in Nigeria. International Review of Management and
Business Research, 2(1), 201 – 209.
Dana AL- Najjar. (2016). Modelling and Estimation of Volatility
using ARCH/ GARCH Models in Jordan’s Stock Market. Asian
Journal of Finance and Accounting, 8(1), 152-167.
Dohyunchun, Hooncho, & Doojin Ryu. (2019, January).
Forecasting the Korea Composite Stock Price Index 200 Spot
Volatility Measures. Statistical Mechanics and its Applications
Journal, 514, 156-166.
Fauzia Mubarik, & Attiya Yasmin Javid. (2018). The Impact of
Macroeconomic Volatility on Stock Return Volatility: Evidence
from Pakistan Stock Market. Pakistan Business Review, 826 – 842.
Godfrey Joseph, & Ismail. (2020). Modelling Volatility in the Stock
Market for Accuracy in Forecasting. International Journal of Recent
Technology and Engineering, 8(5).
Hussainey, K., & Khanh Ngoc, L. (2009). The impact of
macroeconomic indicators on Vietnamese stock prices. Journal of
Risk Finance, 10(4), 321-332.
Huthaifa, Alaa, & Ahmad. (2020). Modelling and Forecasting the
Volatility of Cryptocurrencies: A Comparison of Non- Linear
GARCH type Models. International Journal of Financial Research,
11(4), 346-356.
Jelilov, Paul, & Usman. (2020). Testing the nexus between stock
market returns and inflation in Nigeria: Does the effect of COVID‐
19 pandemic matter?. Journal of Public Affairs an international
journal.
Liu, H.C., & Hung J.C. (2010). Forecasting S&P-100 stock index
volatility: The role of volatility asymmetry and distributional
assumption in GARCH models. Expert Systems with Applications,
37, 4928-4934.
Mazur, Dang, & Miguel. (2020). COVID-19 and the march 2020
stock market crash. Evidence from S&P1500. Finance Research
Letters, 10(4).
Narayan, & Reddy. (2020). The Dynamics of Macroeconomic
Variables in Indian Stock Market: A Bai- Perron Approach. Journal
of Macroeconomics and Finance in Emerging Market Economics,
13(1).
PhichHang Ou, & Hengshan Wang. (2011, July). Modeling and
Forecasting Stock Market Volatility by Gaussian Processes based
on GARCH, EGARCH and GJR Models. Paper Presented at
International Conference of Applied and Engineering Mathematics,
Proceedings of World Congress of Engineering, London, U.K. 6-8.
V. CONCLUSION
The detailed analysis shows that the forecasting
ability, prediction, and estimation of the stock market
volatility for the return series of the selected NIFTY 50
companies under financial services sector for the period of
1/04/2011 to 31.03/3021. The TGARCH model
outperforms, and it is considered as the best-fitted model
based on the evaluation of the forecasting performance by
using two different error statistics like Root Mean Square
Error and Mean Absolute Error. Hence, TGARCH (2,1)
model helps to capture the leverage effect, accuracy in
forecasting and to differentiate the asymmetric effect
between good news and bad news.
ISBN: 978-93-5619-947-7
116
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Payment Transaction using Face-Recognition
P. M. Kavitha1, D. B. Shanmugam2, T. Akash3, T. Karan Raj4, A. Girish Gowtham5
Assistant Professor, Department of Computer Applications, SRM IST, Ramapuram Campus, Chennai.
2
Assistant Professor, Department of Computer Applications, SRM IST, Ramapuram Campus, Chennai.
3,4,5
BCA Final Year Students, Department of Computer Applications
(BCA), SRM IST, Ramapuram Campus, Chennai
1
Abstract: The new progressions in innovation have
prompted a flood in online exchanges using web-based
shopping, web banking, installment entryways, and so on
Security is the most predominant issue during these
exchanges. Because of such issues, individuals are reluctant
to utilize online exchanges, so we propose our framework
which gets online exchanges utilizing two-venture
confirmation. The initial step is OTP confirmation followed
by facial acknowledgment. The framework involves an
internet-based interface to communicate with a client. The
point of interaction is utilized to get card subtleties from the
client. After the OTP confirmation, the client is validated
utilizing facial acknowledgment. The framework involves an
MTCNN to confirm the client by contrasting the ongoing
caught picture of the client against the pictures related to the
client's account.
Key words: MTCNN, online payment, security, image
verification, face recognition, credit card.
I. INTRODUCTION
In the current universe of cutting edge innovation, it
is simple for programmers to get individual subtleties of
clients due to which certain individuals are reluctant to
utilize online exchanges. This makes security a
significant variable at the hour of making computerized
installments. Subsequently, we propose a framework to
improve the security of online exchanges by giving a 2venture check process: OTP confirmation followed by
Facial Recognition.
The framework, which we will propose, will
attempt to decrease the quantity of assaults at the hour of
making computerized installments. Online exchanges
become helpless due to lost or taken cards, account
takeover, fake cards, false application, various
engraving, and tricky shippers. On account of record
takeover, a card holder unwittingly gives his financial
subtleties to a fraudster and the fraudster then makes a
copy card with those subtleties. Likewise, in fake, a
client's card is cloned and afterward utilized by the
fraudster. Numerous engravings happen when a similar
solitary exchange is recorded on various occasions. In
deceitful traders, representatives of the shipper work
with the fraudsters. The proposed framework prevails
with regards to decreasing this large number of cheats
by catching and confirming an ongoing picture of the
card holders.
are unique finger impression, hand math, iris, face and
palm.
In this paper, we are involving face acknowledgment
as it's the most well-known, effectively usable and
generally OK [8]. Under facial acknowledgment, there
are different methods utilized like, SVM[2], PCA [2],
LDA [3], CNN and MTCNN. This paper involves
MTCNN for facial acknowledgment as it has been on
depicted better outcomes under facial acknowledgment.
Likewise, it is viable with all working frameworks and a
wide range of programs. The client (card holder) should
basically have a have a camera associated with the
gadget to catch an ongoing picture, and a decent web
association with access the (UI), as the framework has a
web UI.
II. RELATED WORK
2.1 Strategies for getting on the web exchanges
The current strategies for getting on the web
exchanges are account related secret phrase, card check
esteem (CVV) and once secret key (OTP). OTP is a mix
of letter sets and numbers which is shipped off the record
holders' enlisted telephone number through SMS or by
means of email. Any card holder who doesn't have any of
the 2 referenced above can not totally finish the internet
based exchange. It is for the most part accepted that OTP
is secure and safe. In any case, it isn't powerful to
assaults like pantomime, phishing, and malware-based
replay assaults.
2.2 Procedures for bio-metrics
Biometric innovation is utilized for verification of a
card holder. The different biometric methods are utilizing
voice,
face,
palm
and
fingerprints.
Voice
acknowledgment estimates a client's voice designs,
talking style and pitch, finger impression ID utilizes
examples of the rides and valleys present in fingerprints
checked in advance, palm recognizable proof uses palm
prints and other actual attributes for remarkable ID of
client's palm, and face acknowledgment catches and
stores the facial highlights of an individual and stores
them for ID process.
2.3
Biometric genuineness is acquiring a great deal of
consideration because of its uniqueness for each person.
A portion of the different biometric verifications
ISBN: 978-93-5619-947-7
Methods for face acknowledgment
The various strategies utilized in facial
acknowledgment incorporate PCA[2], SVM[2], LDA[3],
117
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
CNN and MTCNN. Standard part investigation (PCA) is
utilized to diminish the dimensionality of information to
lessen the quantity of boundaries in pictures, which are
high layered corresponded information. It depends on
Eigen values and Eigen vectors. Support Vector Machine
(SVM) is utilized for twofold arrangement.
A SVM based classifier is utilized in facial
acknowledgment to anticipate the comparability and
divergence between two images[2]. Convolutional
Neural Network is a profound brain network engineering
which is utilized to remove highlights from pictures.
CNNs can be utilized as classifiers or as component
extraction. Perform various tasks fell convolutional brain
network is a calculation comprising of 3 phases, which
recognizes the bouncing boxes of appearances in a
picture alongside their 5-Point Face Landmarks.
III. LITERATURE SURVEY
3.1 FaceNet (2015 IEEE): A Unified Embedding fo
Face Recognition and Clustering
In this paper is introduced a framework, called
FaceNet [1]. FaceNet figures out how to
straightforwardly plan face pictures to a minimized
Euclidean space. The distances between the produced
vectors give the closeness between the countenances. The
made space can be utilized for various undertakings like
face acknowledgment, check and bunching involving
standard methods with FaceNet embeddings as
component vectors. We stretch out this idea to apply it to
get online exchanges.
3.4 An Efficient Scheme for Face Detection (2015
IEEE)
This work [6] depends on skin tone, shape attracting
and include extraction to give a productive and
straightforward method for recognizing human
countenances in pictures. The highlights viable are
mouth, eyes, and nose. The outcomes are with great
exactness, extraordinary speed and straightforward
calculations.
3.5 Gender and Age Classification of Human Faces
(2017 IEEE)
This paper [10] acquaints a methodology with
characterize orientation and age from pictures of human
faces which is a fundamental piece of our technique for
independent recognition of strange human conduct. This
paper is a constant report from past examination on
heterogeneous information in which pictures as
supporting proof is utilized. A technique for picture
grouping in view of a pre-prepared profound model for
highlight extraction and portrayal followed by a Support
Vector Machine classifier is introduced. We use CNN
instead of SVM.
3.6 Credit Card Transaction Using Face Recognition
3.2 When Face Recognition Meets with Deep
Learning (2015 IEEE)
The paper [4] intends to give a shared belief to all
understudies and scientists the same by directing an
assessment
of
effectively
reproducible
face
acknowledgment frameworks in view of CNNs. It utilizes
public information base LFW (Labeled Faces in the
Wild) to prepare CNNs rather than an individual data set.
It proposes three CNN designs which are the principal
detailed models prepared utilizing LFW information. We
utilize the LFW dataset to prepare our organization as
well as an individual data set to test it.
3.3 Building Recognition System Based on Deep
Learning (2016 IEEE)
Profound learning designs utilize a various
convolution layers and initiation capacities which are fell.
The main perspective is the arrangement the quantity of
layers and the quantity of neurons in each layer, the
determination of initiation capacities and improvement
calculation. It [5] utilizes GPU execution of CNN. The
CNN is prepared in a directed manner to accomplish
awesome outcomes. We We stretch out this framework to
involve it for the protected internet based exchanges.
ISBN: 978-93-5619-947-7
Fig.1: Enrolment Module in Credit Card
IV. METHODOLOGY
Perform multiple tasks Cascaded Convolutional
Neural Network is being utilized for facial
acknowledgment and verification of the client. MTCNN
is a profound learning calculation and is viewed as
proficient in breaking down pictures since they utilize
moderately little pre-handling contrasted with other
picture arrangement calculations [4]. The organization
utilizes a course structure with three organizations; first
the picture is rescaled to a scope of various sizes (called a
picture pyramid), then, at that point, the primary model
(Proposal Network or P-Net) proposes competitor facial
locales, the subsequent model (Refine Network or R-Net)
channels the jumping boxes, and the third model (Output
Network or O-Net) proposes facial tourist spots. [7]
118
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
information. We used the Teachable machine for getting
ready, testing and for making a module.
Fig.2: Face Detection
Fig.3: Face Detection Cycle
MTCNN is a calculation with 3 phases, which
recognizes the bouncing boxes of countenances in a
picture alongside their 5 Point Face Landmarks. Each
stage step by step further develops the discovery results
by going its contributions through a CNN, which returns
applicant bouncing boxes with their scores, trailed by non
max concealment.
In stage 1 the information picture is downsized on
various occasions to fabricate a picture pyramid and
each scaled form of the picture is gone through its CNN.
In stage 2 and 3 we remove picture patches for each
bouncing box and resize them (24x24 in stage 2 and
48x48 in stage 3) and forward them through the CNN of
that stage. Other than jumping boxes and scores, stage 3
furthermore figures 5 face milestones focuses for each
bouncing box. Subsequent to messing with some
MTCNN executions, it just so happens, you can really
get very exact identification results at much lower
surmising times contrasted with CNN, even by running
induction on the CPU.
5.2 Android application
Our App empowers sending and getting cash, yet
dissimilar to other computerized wallets, the installments
can be gotten straightforwardly into the financial
balances. So the whole worry of getting cash in wallets
and afterward moving into the ledger has been killed.
Curiously, an individual doesn't need to be on the
application to get installments. Our application improves
on the course of cash move with facial acknowledgment
and 2-venture verification. Though the essential capacity
of the application is to permit straightforward cash with
high security. To make a purchase, a client taps their
mobile phone on a retail store terminal or chooses to pay
in your convenient application. Our application responds
with the client's tokenized card and a cryptogram which
goes probably as a one-time-utilize secret key and facial
affirmation. We involved Adobe XD for making the easy
to use interface and for the strike work we worked with
android studio.
V. MODULES
5.1 Face Recognition
Facial affirmation is a way to deal with recognizing
or asserting a particular's character using their face. Facial
affirmation structures can be used to recognize people in
photos, accounts, or ceaselessly. Facial affirmation is a
class of biometric security. Various kinds of biometric
programming consolidate voice affirmation, finger
impression affirmation, and eye retina or iris affirmation.
The advancement is generally used for security and
guideline necessities, but there is extending interest in
various areas of usage. Various phones, including the
most recent iPhones, use face affirmation to open the
device. The development offers a solid strategy for
protecting individual data and ensures that delicate data
stays inaccessible expecting the phone is taken. Apple
ensures that the chance of an erratic face opening your
phone is around one out of 1 million. Facial assertion
utilizes PC conveyed channels to change face pictures
into mathematical appearances that can think about pick
their comparability. These channels are generally
conveyed by utilizing huge "understanding," which
utilizations counterfeit brain relationship to oversee
ISBN: 978-93-5619-947-7
Fig4. Flow Chat in Android Application
5.3 Two-step verification
With 2-Step Verification (regardless of called twofactor certification), you add a layer of safety to your
record if your secret articulation is taken. After you set up
2-Step Verification, you'll sign in to your record in two
stages utilizing: Something you know, similar to your
secret articulation. Something you have, similar to your
telephone. For our situation, we utilized facial
acknowledgment and OTP login for two-stage
confirmation. Two-adventure check is now and again
confused with two-factor affirmation (2FA), which
moreover incorporates two for the most part sequential
methods used for check. Regardless, curiously, with 2FA
119
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
cycles, the methodologies in two-adventure check can
have a spot with a comparative grouping of affirmation
factors, and the procedures used for 2FA aren't exactly
progressive. Besides, affirmation and approval are not the
same. The affirmation can be fundamental for a genuine
cycle - - giving a driver's license as proof of character, for
example. Approval is considered to be a change of check
processes planned to shield electronic and online systems.
Regardless, various two-adventure affirmation things and
organizations are furthermore occasions of two-factor
approval. Google's 2-Step Verification organization, for
example, incorporates the standard mystery word
(something the client knows) and a code delivered off the
client's contraption (something the client has). Most other
current internet-based client approval structures depicted
as two-adventure check moreover qualifies as two-factor
confirmation.
Fig.4: Two-step verification
VI. RESULTS
This highlight essentially further develops security
rate and execution soundness contrasted and a standardbased arrangement. The created arrangement, in light of a
high-level brain network-based innovation and stage,
expanded the security rate from 85% to 90 percent.
Recognition Meets with Deep Learning: an Evaluation of
Convolutional Neural Networks for Face Recognition, IEEE
International Conference on Computer Vision Workshop, 2015.
[5] Pavol Bezak, “Building Recognition System Based on Deep
Learning”, IEEE, vol. 6, no. 1, pp. 212-217, 2016.
[6] Mohamed Heshmat, Moheb Girgis,et al, “An Efficient Scheme for
Face Detection Based on Contours and Feature Skin Recognition”,
IEEE, 2015. [7] Kaipeng Zhang1 Zhanpeng Zhang2 Zhifeng Li1
Yu Qiao1, “Joint Face Detection and Alignment Using Multitask
Cascaded Convolutional Networks.”, IEEE Signal Processing
Letters (SPL), vol. 23, no. 10, pp. 1499-1503, 2016 [8] Gittipat
Jetsiktat, Sasipa Panthuwadeethorn, Suphakant Phimoltares,
“Enhancing User Authentication of Online Credit Card Payment
using Face Image Comparison with MPEG7-Edge Histogram
Descriptor”, International Conference on Intelligent Informatics
and Biomedical Sciences (ICIIBMS), IEEE, 2015.
[7] Adrian Rhesa Septian Siswanto, Anto Satriyo Nugroho,
Maulahikmah Galinium, “Implementation of Face Recognition
Algorithm for Biometrics Based Time Attendance System”,
International Conference on ICT for Smart Society (ICISS), IEEE,
2014.
[8] Xiaofeng Wang, Azliza Mohd Ali, Plamen Angelov, “Gender and
Age Classification of Human Faces for Automatic Detection of
Anomalous Human Behaviour”, IEEE, 2017.
[9] W. Mohamed and M. Heshmat, M. Girgis, S. Elaw, A new method
for face recognition using variance estimation and feature
extraction, International Journal of Emerging Trends and
Technology in Computer Science (IJETTCS), vol. 2, no. 2, pp.
134-141, 2013.
[10] R.S. Choras, “Facial feature detection for face authentication”, in
the Proceeding of IEEE Conference on Cybernetics and Intelligent
Systems., 2013, pp.112 116, 2015.
[11] K I. Aldasouqi and M. Hassan, Smart human face detection
system, International Journal of Computers, vol. 5, no. 2, pp. 210216, 2015.
[12] A K. Jain, P.Flynn, A. A. Ross, Handbook of Biometrics, New
York: Springer, 201
VII. CONCLUSION
The framework improves the security of online
exchanges by effectively perceiving and confirming
approved clients. The framework can be utilized as an
installment entryway for any application which requires
online installments. These incorporate online business
sites, web and portable banking. The framework can be
gotten to on any working framework utilizing any internet
browser. For future work, iris recognizable proof can be
added to the framework for additional improving the
security of the exchanges.
REFERENCES
[1]
[2]
[3]
[4]
Florian Schroff, Dmitry Kalenichenko,and James Philbin,
“FaceNet: A Unified Embedding for Face Recognition and
Clustering”, IEEE, 2015.
Muzammil Abdulrahman, Alaa Eleyan, “Facial expression
recognition using Support Vector Machines”, 23nd Signal
Processing and Communications Applications Conference (SIU),
IEEE, 2015.
Yuan Wei, “Face Recognition Method Based on Improved LDA”,
9th International Conference on Intelligent Human-Machine
Systems and Cybernetics (IHMSC), IEEE, vol. 2, pp. 456 - 459,
2017.
Guosheng Hu, Yongxin Yang, Dong Yi,et. al.,When Face
ISBN: 978-93-5619-947-7
120
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Study Paper on E-Recruitment
Priyanka ShivajiPatil
Research Scholar, ChhatrapatiShahu Institute of Business Education and Research, Kolhapur
Abstract: E-enrollment is generally called internet based
enlistment or electronic enlistment. By and by a day the
traditional enlistment procedure has been annoyed with the
surge of web. On the web enrollment has gained a few
astounding headway since its starting point. It is the latest
example in enlistment process besides it has been taken on
by huge and little - estimated affiliations. The significance of
web can be considered to be searching for best suitable
occupation is just a tick away. Individual to individual
correspondence, association destinations, etc. E enrollment
is landing position searchers and exquisite scouts because of
its advantages to the proficient and cost and quality, etc E
enlistment insinuates posting open doors on the corporate
locales or a web based email electronic course of action.
Most of the affiliations already using e enlistment to post
positions and recognize resumes on the messages.
The E enrollment procedures and structure have
helped with recognizing the overall thought of e enlistment.
Enrollment has turned into a huge cycle in the uncommonly
vicious work market. The essential accomplishment factors
of e enlistment are the fast communication, sufficiency, and
cost. The audit researches off the parts of e enlistment,
continuous examples of e enrollment and benefits of e
enrollment are inspected. E enlistment importance and
hardships are in like manner inspected.
Keywords: E
organization.
recruitment,
online
recruitment,
I. INTRODUCTION
E-Recruitment is also known as digital recruitment,
that is refer to use of web technology to the source,
catch/attract, access, select candidate and on boarding
candidate for vacant position. E-recruitment originated in
the form of independed job site called bulletin board
system in the 1980s.
The united started global trend of E-recruitment
when Taylor launched Monster.com in 1994 with 20
clients and 201 job openings. E recruitment has ended up
being very helpful for the both organization and
occupation candidates. A few times it will be neglect to
the assortment of the gig candidates in view of
organization issues.
The reason for e recruitment is to make the cycle in
question more effective just as costly. It can arrive at a
huge pool of likely representatives and it makes
conceivable to the determination cycle. E enlistment has
ended up being very helpful for the both organization and
occupation candidates. A few times it will be neglect to
the assortment of the gig candidates in view of
organization issues. The reason for e recruitment is to
make the cycle in question more effective just as costly.
ISBN: 978-93-5619-947-7
1.1 Meaning of E recruitment:
E recruitment is the utilization of innovation and
electronic assets for the most common way of drawing in
choosing and dealing with the recruitment in an
organization. It include preparing did by the association
utilizing innovation to distinguish plausible workers. It is
otherwise called internet based enlistment as web
correspondence is imperative to the interaction. Anyway
it has specific impediments, for example, being as well
unoriginal, high volume of reactions and countenances
specific innovation issues. Quite a bit of e recruitment
focuses a round significant places of work which classes
open situations by area, industry and position.
E-enrollment components are as following:
 Candidate following
 Business' site
 Work entries
 Internet testing
 Online media
Now days, due to pandemic situation of covid-19 it
is not possible to attend physical interview for vacant
recruitment. The digitalization is growing day by day and
it is easy to access the required vacant position to the job
seeker. There is lots of awareness to the jobseekers from
various companies’ vacant position by various portals. Erecruitment is becoming the backbone of HRM in
company.
II. OBJECTIVES
 To know the constituent of E enrollment.
 To know the new examples of E enrollment.
 To understand the upsides of E enlistment.
III. METHODOLOGY
This is a calculated investigation of the auxiliary
information source. The optional information is utilized
to high light the calculated investigation and audit of
writing. Notwithstanding those books, articles, diaries
these submitted to colleges were additionally alluded.
The web additionally been widely made use with the end
goal of study.
IV. ELEMENTS OF E RECRUITMENT
4.1 Applicant tracking system (ATS)
A candidate global positioning framework (ATS) is
an item application that enables the electronic dealing
with that of e enlistment needs. An ATS can be done or
121
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
gotten to online on an endeavors or private endeavor
level, dependent upon the prerequisites of the association
and there is similarly free and open source ATS
programming available. An ATS is fundamentally
equivalent to customer relationship the board (CRM)
structure, yet are gotten ready for selection following
purposes. When in doubt they channel applications thus
subject to given standards like watch words, capacities,
past supervisors, extended lengths of association and
schools participated.
critical part in glancing through a normal contenders.
Another social locales are open to connect with work upand-comers and attracting them towards affiliations. Web
diaries are similarly getting renowned now a days.
Moreover proceed with scanner helps associations with
screening and shortlist the resume as indicated by
candidates, capacities and experience, uncommon
capacities and pay nuances and is given by critical
passages in India. These new examples are very use full
in the e enlistment, these new examples are by and large
relying upon the advancement. A couple of progressing
designs are there in e enrollment. They are given under:
 Mobile Application
 Job Portals
 Company Websites
 Long range informal communication
These are late patterns in e recruitment. There are
liberal proof which demonstrate that associations are
progressively involving web innovation just as the
internet a stage for selecting up-and-comers.
Fig.1: Elements of E Recruitment
4.2. Employee Websites
A laborer destinations can build up the association
between supervisors by making them feel that they are
essential for a neighborhood. It can likewise serve to
acquaint new staff with the organization, give existing
workers with refreshes organization data and can fill in as
a web-based local area for associating among laborers.
4.3. Job board
A job board is a sites that posts occupations provided
by workers, though pursuit of employment motors scour
the web and total work postings from work sheets and
businesses sites. With work sheets affiliations have
explicitly recorded their unfilled position and reliably
perceive requests for business straightforwardly through
the gig board.
4.4. Online Testing
The terms suggest the electronic stepping or
assessing of a test. E making is a controller driven
development immovably associated with other appraisal
works out, for instance, e testing, or e acknowledging
which are understudy driven.
V. LATE PATTERNS OF E RECRUITMENT
Late examples in e enlistment is usage of convenient
applications enemy work reason or looking beyond
question, monster, naukri are one of the rule work doors
in India who have started compact applications for work
competitors. Association locales furthermore accepts a
ISBN: 978-93-5619-947-7
The fundamental justification behind E recruitment
use further develop web corporate pictures, limits
recruiting cost, lessens paper work and managerial
weight, capacity to organize progressed web devices for
the recruitment group.
● Web presence and utilizing web work on corporate
picture
● Capacity to foster progressed web devices for the
recruitment group
● Paper work and managerial weight
● Limits enlistment cost high to low
The representative should figure out how to arrive at
a specific employment competitors by making benefits
via web-based media organizations, as for sure, linkedin,
Facebook, and can likewise promote work opening with
the e recruitment offices to strengthen the ability chase.
VI. ADVANTAGES OF E RECRUITMENT?
 Lower expenses for the association. Likewise,
posting occupations online is less expensive than
promoting in the papers.
 No go-betweens.
 Decrease in the ideal opportunity for enlistment
(more than 65% of the recruiting time).
 Works with the enlistment of right kind of
individuals with the necessary abilities.
 Further developed proficiency of enlistment process.
 Gives a 24 X 7 admittance to a web-based
assortment of resumes.
VII. DIFFICULTIES OF E RECRUITMENT:
Conventional enlistment strategy have been
supplanted by the web-based recruitment or e recruitment
with the section of web. The greater part of the little and
122
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
enormous scope associations are embracing to the e
recruitment process. In any case, in this cycle the e
recruitment face many difficulties in the association way.
selection process. It is thoroughly relying on the turn of
events or affiliation or web.
REFERENCES
7.1 Administrative Difficulties
Any innovation would stay unused without client
acknowledgment. It is vital that employing and selecting
supervisors are proficient and agreeable with regards to
the utilization of web based enlisting techniques.
Associations should thus lead an extensive preparing
program for HR directors to assist them with utilizing the
e recruitment instrument with next to no trouble
[1] R. Ganesan. (2017). Benefits And Trends of E-Recruitment.
International Journal of Business and Administration Research
Review, 1(20), 117-122.
[2] Dr. P. Subba Rao, International Human Resource Management
[3] https://www.scribd.com/doc/35533485/Recruitment
[4] Yas A. Alsultanny, Mona F. Alotaibi (2015) “Evaluating The
Factors Affecting On Intension To Use Of E-Recruitment”
American Journal Of Information Science And Computer
Engineering, Vol- 1, No. 5,2015,Pp. 324-331 6.
The utilization e recruitment technique has not put a
finish of the utilization of other enlistment strategies, for
example, workers references, papers, advertisements etc.
given the restricted monetary assets, viewing as the ideal
blend of different recruitment techniques is really
difficult for human asset administrators.
7.2 Hierarchical Difficulties
Most qualified candidates are regularly uninvolved
work searchers, who are by and by utilized however
might be intrigued by new position potential open doors.
A technique to perceive detached work searchers and
spur them to apply should be created. Business process
overhaul is required across the entire course of human
asset the executives to understand the web-based
enlistment benefits (taylor, 2005)
7.3 Specialized Difficulties
Absence of privacy and security of data puts the
posting of employment forms down by work searchers.
While security is probably the greatest test with work
candidates, top most organizations don't indicate it
unequivocally on the profession sites. Joining the
interaction online recruitment with cycle of regular
recruitment is basic due to restricted accessibility of
programming assets. Paper based resume should be
changed over into a digitized structure and put away in
the information base.
VIII. CONCLUSION
E-enlistment is electronic enlistment. It is
unbelievably useful to the different affiliations. The spot
of this survey was restricted to parts of e selection and
late instances of e enlistment and advantages of e
enlistment. It has been said that enlistment isn't just about
using the best rather it's the solicitation to enlist the right
up-and-comer in the association. E enlistment it
appreciates many advantages for both work searchers and
selection master like expense saving advantages and
useful, adroitness, yet it can't be reasonable for each work
and profile. It is advancing plan in choice cycle many
little and huge size of affiliations is taken on to the e
ISBN: 978-93-5619-947-7
123
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Analyze the Health Anagement Information System
and Organizational Structure
Ms. Pushpa Rani, Dr. Brij Mohan Goel
Research Scholar, BMU Rohtak
Deptt. of Computer Science & Engineering, BMU Rohtak
Abstract: “Healthcare data frameworks (HISs) are frequently
executed to upgrade the quality and patient-centeredness of
care, as well as to work on the effectiveness and security of the
administrations. Notwithstanding, the results of HISs
executions in both essential care and clinic settings have not
lived up to assumptions. Research reports demonstrate that
there is a need to concentrate on HISs execution process and
its hierarchical outcomes. The point of this paper has been to
sort out the information acquired in qualitative examinations
acted in relationship to HIS executions and to utilize this
information to layout a refreshed design for execution
arranging. We observed that the primary activity suggestion
that could be drawn from the meta-analysis was that simply
executing a HIS won't consequently expand the authoritative
productivity. We utilized a multi-disciplinary group for the
examinations to cover however many parts of the essential
investigations as could be allowed. All things considered, our
outcomes ought to be deciphered as a high-request conspires,
and not a prescient hypothesis and the activity suggestion
should be researched in imminent examinations”.
informatics in recent years. No matter how it is done, the
results of qualitative studies are typically decoded in
isolation, without taking use of relevant linkages to
previous research. The authors of McCormick (2003) draw
attention to the fact that, despite the fact that qualitative
examinations are discussed separately in writing surveys in
health informatics, much qualitative exploration is not
optimally examined and coordinated, resulting in the
exploration's maximum capacity for information
advancement and hypothesis building not being fully
exploited.
The purpose of this study is to bring together the
information gathered from qualitative studies conducted in
connection to the execution of HISs, and to use the
coordinated knowledge to develop a new design for the
organising of execution. The information association is
accomplished through the use of qualitative meta-analysis
methodologies‖.
Keywords: HISs, Adoption,
I . INTRODUCTION
―A variety of healthcare information systems (HISs),
such as the electronic doctor request section (CPOE) and
personal computer-based patient records (CPRs), have been
implemented to improve the quality and patientcenteredness of care while also increasing administration's
productivity and security of information. In any event, the
outcomes of HIS implementations in both the essential care
and clinic settings have fallen short of expectations. Various
research studies indicate unanticipated outcomes, while also
demonstrating that project execution failures harm the
arrival of projects in general.
So as a consequence, clinic administrators have come
to realise that they may overlook interactions between the
HIS and hierarchical presentation, and more precisely
individual users' requirements, difficulties, and demands, if
they blindly rely on the promises provided by vendors. This
situation shows that it is vital to make the best possible use
of the logical knowledge available regarding HIS execution
processes and the authoritative outcomes that result from
those processes. Beginning with a number of significant
research in the 1990s, qualitative inquiry has gradually
gained popularity among scientists in the field of health
ISBN: 978-93-5619-947-7
II. PRIMARY HEALTH CARE INFORMATION
SYSTEM
―Health data is developed and used by multiple
establishments including the Ministry of Health, National
Statistics Office, the commercial sector, common society
organizations, donors, and the National Health Insurance
Agency.
A solid health data framework should create‖.
―Important and quality information to help health
mediations and future arranging Health information
combination in essential care is a test, as it has a few
capacities for keeping up with the offices, doctor,
attendants, and other staff which are troubled by tedious
managerial assignments, an assortment applications, and
reports.
As of now, there are a few applications executed in
PHC for quite some time programs, for example, TB
application and HIV application, which are divided. In light
of the Ministry of Health Regulation, Primary Health Care
Information System (PHCIS) comprises of information
sources and data concerning all clinical administrations like
primitive, preventive, corrective, and rehabilitative
endeavors which are acted locally.
124
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
requirements, for example, offices or framework and
individual variables in the rustic regions in light of the
bleeding edge perspective. It is important to investigate the
obstructions in taking on HIS in a metropolitan region, and
survey the execution interaction from the essential level and
from the functional level or health the executives point of
view, and to give a superior answer for keeping up with the
framework as a solitary data substance with practical
administrations.
Fig. 1 : Current management of data through collecting and reporting
the system of health programs in a primary healthcare organization
PHCIS was used to record personalized healthcare, while a paperbased record was applied for community healthcare documentation
As found in Fig. 1, every one of the functioning
gatherings (for example fundamental local area healthcare
or UKME, trivial local area healthcare or UKMP, and
individual health care or UKP) presents their reports
through the PHC the executives to the District Health
Office consistently utilizing manual structures. Subsequent
to examining the PHC report, the District Health Office
sends their reports to the Provincial Health Office. In the
wake of investigating and gathering the information from
all regions, the Provincial Health Office sends a yearly
report to the Ministry of Health. Each of the cycles should
be all around overseen by a PHCIS.
The PHCIS ought to likewise have the option to work
with references in which the essential doctor and experts in
the reference clinic could impart for organizing care of the
patient. Be that as it may, current PHCIS in India can yet
oblige the requirement for cooperative care, since accounts
of short term center exercises are restricted‖.
III. PRIMARY HEALTH CARE INFORMATION
SYSTEM ADOPTION
A few specialists have inspected healthcare
frameworks utilizing different strategies concerning the
obstructions and difficulties during PHCIS execution in
agricultural nations. Notwithstanding, a portion of these
investigations were more centered around the specialized
ISBN: 978-93-5619-947-7
―Past examinations in India
have effectively
portrayed the obstructions of embracing data frameworks in
a medical clinic setting, wherein the institutional changes
are a fundamental test of HIS execution. However, it is vital
to get the hindrances in various care settings, for example,
in essential care, to give illustrations to be figured out how
to planning of HIS adoption, and to upgrade HIS execution
in PHCs. A few territories, for example, Banten were
focusing on IT execution for 80% of the PHCs to work on
the nature of the health administration during the year 2012
until 2017 However, at present the execution of HIS in
PHCs is moving gradually, as just half of PHCs in the
Province are now associated with the Internet and have
carried out HIS inside their administration.
Thus, our examination was led in a metropolitan area
of Banten Province, and the India District was chosen as it
has been proclaimed as a Smart City which has a solid
obligation to take on HIS, as confirmed by deciding to put
resources into health data innovation for the absolute of 29
public PHCs, to further develop general health
administrations. In view of past review, there are three
phases of the adoption interaction, specifically the choice to
contribute, the execution stage, and institutional use after
choosing to put resources into health IT by sending PHCIS
in 2013, the execution work in Haryana ought to be
assessed to address the hindrances at various degree of
association. As of now, the Haryana District Health Office
carries out a PHCIS, specifically SIMPUS, which was
created by the Agency for the Assessment and Application
of Technology (BPPT)‖.
IV. HMIS IN INDIA
The need for a good data framework to aid in the
numerous formative processes occurring in the Indian
health sector was recognised as early as the Bhore panel
report, which was published not long after the country's
independence and was issued shortly after the country's
independence. As stated in the Indian public health strategy
effective independent direction and programmer arranging
in the health and related fields is unimaginable unless there
is the establishment of a strong health data framework. It
also states that a cross-country administrative structure
should be established in order to acquire fundamental health
125
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
data that will aid in the local administration of health care
and the successful decentralization of activity should be
established. On a national and worldwide scale, health
information systems contribute to the design of territorial
and global healthcare arrangements by providing inputs into
decision-making processes. An international conference on
National Health Information Systems was held in Costa
Rica as early as 1979 in response to an international call for
action to further develop the data framework. The meeting
was organized by the World Health Organization's Division
of Data Support and was intended to help countries develop
their own national health information systems (now known
as the Division of Data Support).
Fig.2: Field Survey Units Diagram
V.
ORGANIZATIONAL ARRANGEMENTS FOR
THE HMIS IN INDIA
―His organizational arrangement of HMIS and the
agencies responsible for it is discussed in the three levels
namely central, state and district‖. Central level -At the
central level there are four major agencies dealing with the
HMIS.
VI. CENTRAL
BUREAU
INTELLIGENCE
OF
HEALTH
―Need to rely upon National Informatics Center (NIC)
(Govt. of India processing wing) for programming help.
This typically postpones the improvement interaction and
they continue to work with the old programming. The
human asset improvement is exceptionally negligible in the
CBHI. The preparation contributions to the advancement of
most recent abilities are not many. The staff are barely are
ship off outer preparation phases on registering and
information base advances‖.
6.1 Evaluation of the Existing HMIS in India
―Focal Bureau of Health Intelligence (CBHI) is the
health insight wing of the Directorate General of Health
Services. At the public level it is the principle association
which manages the assortment, assemblage, analysis and
spread of the data on the health conditions in the nation
covering different parts of health including the health status,
health assets, and use of health offices and so on‖.CBHI is a
reduced association with insignificant staff. Fundamental
issues concerning them are the insufficient registering
offices. As of now it is moved in a space in Delhi where a
few times power supply falls flat for a really long time
together. The old PCs can't run the most recent
programming and bundles. They don't have software
engineers and
Table 1. Fact sheet
Source: Fact Sheet List
ISBN: 978-93-5619-947-7
―Regardless of many expected to be not kidding
endeavors through various joint efforts, the territory of
HMIS in India is week. The absence of mindfulness by
health strategy producers and program supervisors of the
essential significance and viable helpfulness of health data
for arranging and the executives brings about a low interest
for data; (WHO rules). India's formative organization is
organized in manner Key social regions like Health and
essential training get low need. Health and Family
government assistance service is considered as most
reduced in the pecking order of particular posting for the
top officials (generalists). The propensity to rapidly move to
different postings is high. This implies that posting in the
Health and Family government assistance for senior
officials is just a change.
This combined with the inordinate centralization of
abilities in the secretariat arrangement of administration has
made the preparation, checking as a focal action. The
directorates staffed by subject specialists are simple
monetary wards. In India, the overall organization is for the
most part amassed at an area level. Yet, Health and Family
Welfare organization has been incorporated at state and
local levels‖. ―Region Health and Family Welfare the
board: A normal Indian region in size and populace is
greater than 60 to 70 nations on the planet. It gives different
areas various degrees of advancement, geological spread
and populace blend. The locale the board is especially
126
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
adhoc and the majority of the District Medical officials
need the executives preparing and approach. They are
seldom considered as key individual in the chain of
program the executives and not many times applied with
inputs in human asset improvement. The outcome is reliant
locale the executives for each drive and week program
execution. Except if a more prominent measure of
refinement in arranging and the executives is applied in
program the board with nearby drives, neighborhood
choices, the program results will be especially deficient as
they are today‖.
acknowledgment of another item or development, as per the
segment and mental qualities of characterized adopter
gatherings. The course of adoption over the long run is
regularly delineated as an old style ordinary dissemination
or "chime bend." The model shows that the primary
gathering to utilize another item is designated "pioneers,"
trailed by "early adopters." Next come the early and late
greater part, and the last gathering to ultimately embrace an
item are classified "slouches."
India has been putting millions in to Health and
Family Welfare sector through different projects and
undertakings. Yet, the course of speculation arranging
through a few mediations is extremely brought together and
doesn't represent the ground real factors, connect with the
perplexing social, monetary and segment markers. It is put
together commonly with respect to the judgment of the
couple of specialists; adhocly directed studies and
politically spurred libertarian pressures. The preparation
and strategy making process stayed very week without true
information and information culture. This brought about
issues of estimation. (Commonly estimation is just formal
even with the strain from Controller and Auditor General or
outside offices and so on,) Ultimately the program
efficiencies stayed the most reduced. A significant number
of the projects don't accomplish even half
effectiveness/targets or results. The way that half of the
cash put resources into that projects is gone waste is
neglected. More than the actual speculations that count for a
nation like India, the time has come time lost in trails or
broadened pilot executions and insufficient projects and
approaches - 50 years is too enormous a sitting tight for the
everyday person in India-a holding up of a day to day
existence time.
The public-claimed HISs that was arranged to further
develop health care was remembered for the review. The
recognized frameworks were assessed to get the job of ICTs
in supporting the healthcare framework, and whether such
frameworks helped in further developing PHC.
6.2 Organizational structure in HIS
―The Hospital Information System is overseen by
various PC experts, however totally relies upon the size of
the clinic and applications or various modules. The incontrol for the IT division that is answerable for the upkeep
and manageability of the said framework should be a
Database Administrator or IT Manager. At the point when,
any emergency clinic goes for the execution of the Hospital
Information System, whether it is by the product merchant
or by the free exertion of the Hospital by recruiting not
many PC experts, it anyway expects to assemble an IT
division‖.
6.3 Technology Adoption Lifecycle in an Organization
As indicated by Rogers' chime bends: The innovation
adoption lifecycle model portrays the adoption or
ISBN: 978-93-5619-947-7
VII. RESEARCH METHODOLOGY
―An investigating search was continued audits of HIS
utilized in the public sector in India from PubMed, Scopus,
Medline and Google Scholar. The inquiry was restricted
uniquely to concentrates on distributed after the year 2000.
Our hunt watchwords included Health Information Systems
AND IndiaIncorporated Disease Surveillance Project AND
India NIKSHAY AND IndiaMother and Child Tracking
System AND India and Key Management Information
System and IndiaRegion Health Information System AND
Indiain Title/Abstract and restricted to the clinical field. In
the wake of eliminating the copies from different inquiries,
we recognized 900 articles with the above watchwords.
Keeping the importance with the point of the review, we
found just 16 articles appropriate for our review.The HISs
that were utilized at the essential health place, local area
health focuses (CHC) and region emergency clinic (DH)
from four states/association domains (UTs) included
Chandigarh, Punjab, Haryana and Himachal Pradesh. To
survey the progression of data under different public health
programs utilizing HIS, the State TB Cell, State AIDS
Control Society, State National Health Mission Office and
Regional National Informatics Center in Chandigarh were
visited‖.
―Inside and out meetings of purposively chosen key
sources were led by the examiner to gather the qualitative
information on client experience on the execution and
working of ICT frameworks at the state level. At the hour
of the meeting, just specialist and particular member were
available to guarantee security and secrecy at the hour of
information assortment. Program chiefs and investigators at
the National Health Mission (NHM) office of Punjab and
UT Chandigarh and the program coordinator at the State TB
Cell, State AIDS Control Society and Regional National
Informatics Center at UT Chandigarh were evaluated. The
data was likewise gathered from the specialists, health staff
and information passage administrators working at different
127
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
degrees of health care (essential health community, CHC
and DH). Before the beginning of the inside and out
interview, an outline was inspired first by the questioners
on more extensive points being referred to‖.
VIII. ANALYSIS
―The notes produced using the inside and out
interviews were qualitatively dissected utilizing inductive
applied topical coding. In light of the web research,
perceptions, interviews and qualitative analysis, the short
outline accounts of every framework were created,
dissected and deciphered with an attention on the job of
ICTs and what it has meant for PHC. The HIS assessment
depended on standards utilized in arranging commission,
Government of India report[10] and HIS assessment
measures created by Hanmer.[11] The moral endorsement
for the review was taken from the Institutional Ethics
Committee of PGIMER, Chandigarh vide their letter no.
INT/IEC/2017/195 dated 23/08/2017‖. ―We had the option
to distinguish five significant HISs, including National
Health Mission Health Management Information System
(NHM-HMIS), Integrated Disease Surveillance Program
(IDSP), NIKSHAY, Mother and Child Tracking System
(MCTS), Strategic Information Management System
(SIMS) and District Health Information System 2 (DHIS2),
which were utilized by the states for data age under
different National Health Programs in India. The
discoveries are introduced in two sections, in particular,
elements of HIS and examination of HIS‖.
8.1 Features of Health Information Systems
―The main features related to these systems are summarized
in Table 1 and their characteristics are presented below‖.
Table 2. T-based HISs in India
Source: Iit-Based Hiss
ISBN: 978-93-5619-947-7
National Health Mission Health Management
Information System (NHM-HMIS) - ―The National HMIS
entrance was sent off in 2008 as a piece of the public
change process. At first, it was arranged as an archive to
gather locale level total coordinated reports, however
steadily over the long run, it has gone directly down to the
sub-area level, and today around 1, 80,000 health offices in
the nation are answering to this portal. notwithstanding the
total reports, there is a level of individual information
including line arrangements of passing. The program chiefs
and experts brought up that, at first the gateway was
inadequate in much fundamental usefulness however these
have been steadily upgraded after some time. For fortifying
analysis, the functionalities were given to move the
information
into
exclusive
programming
(SAS
programming) and the focal observing and assessment
division under NHM conducts analysis and puts writes
about the entrance to be downloaded by the states. Also for
spatial analysis, outsider restrictive programming (ArcGIS)
is utilized. The essential analysis of information isn't done
by the region or office level staff. With respect to utility of
HIS information, a respondent expressed all the time there
is a mismatch in the HMIS information and it is hard to
depend upon the accessible information for making a
ground appraisal of health condition and use it for asset
assignment‖.
8.1 District Health Information System (DHIS2)
―DHIS2 is a free and open-source stage that has as of
now formed into a worldwide true worldwide norm for
building HISs in low-and center pay nations (LMICs)‖.
―The venture co-facilitator from the HISs Program (HISP),
India informed that DHIS2 has been in activity in India
beginning around 2006 and is by and by being utilized in
nine states as a state information distribution center, where
states enter all their office based information into the
DHIS2, and from that point the reports are additionally
submitted to the public HMIS gateway in the necessary
configuration. Further, the framework is utilized to direct a
state-level analysis of information and give criticism to
fringe units to help activity. Many states have additionally
done explicit customizations for example, for certify social
health extremist (ASHA) observing, steady oversight and
others. One of the respondents expressed,far beyond the
data accessible from Government Portals, DHIS2 gives
adaptability to examine information according to the
neighborhood health needs and create pointers for nearby
direction‖.
Mother and Child Tracking System The Union
Ministry of Health and Family Welfare submitted the
MCTS framework in 2009, which was largely driven by the
premise of working on the accuracy of information. It
includes modules for enrolling pregnant women and
128
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
following them through their antenatal care (ANC)
appointments, as well as modules for enrolling children
throughout the immunisation cycle.
An individual responding to a question about the
varied features in MCTS stated that 'the information is
dissected at the focal observing and assessment and SMS
are sent out to every one of the states constantly based on
the number of enrollments completed.' However, over time,
the framework was able to develop follow-up reports and a
work plan for the health-care workers.
The periphery healthcare providers who are utilising
the framework have raised concern about the framework's
practicality, citing delays in the enlistment of information
that is transmitted up to the public level, where work plans
are prepared and then returned to them. The information
section is created at the essential health place/block level by
an information passage administrator, for which assistant
medical attendant birthing specialists (ANMs) from subfocuses must make a weekly visit to the essential health
community/block office in order to have their sub-focus
information entered into the information section of the
essential health place/block.
―In this study, it was discovered that this framework
was more concerned with watching health-care workers
than it was with assessing maternal and child health
indicators. This framework put a great deal of responsibility
on the shoulders of the medical professionals, who were
responsible for entering name-based information into the
framework while also entering total numbers into the HMIS
portal. Later, it was realized that a significant portion of
reproductive and child health care falls beyond the scope of
this framework as a result the decision was made to convert
to a Reproductive and Child Health (RCH) gateway and
terminate the MCTS‖.
The health worker using the work-plans generated
from MCTS stated, ―The delays in getting the workplans
generated from MCTS make them useless as by the time the
workplans are received they already have their due visits
completed‖. NIKSHAY: Tuberculosis case tracking and
surveillance.
A new electronic tuberculosis (TB) reconnaissance
framework, known as NIKSHAY, was sent out by India in
May 2012, following the presentation of an arrangement for
required notification of tuberculosis s (TB) cases. [14] This
application was developed for the purpose of total
administration revealing and, in addition, for the following
of tuberculosis patients, including those who are multi-drug
resistant (MDR) and broadly drug-safe (XDR). ―He said
that the framework sends daily SMS warnings to local and
state TB officials about patients registered in the Revised
ISBN: 978-93-5619-947-7
National Tuberculosis Control Program, according to the
programmeco-ordinator at the State TB cell (RNTCP). In
the event that a patient relocates to a different location, the
patient's information can be successfully transferred to that
location to avoid a catastrophe in following up. Building
components for warnings and updates for both the patient
and the straightforwardly noticed treatment (DOTS)
provider are being included to the framework to make it
more persistent in the event that the patient forgets to take
his or her prescription. A representative from the
programmer coordinator stated during the meeting that, the
application does not provide disconnected information
section functionalities, which is frequently a requirement in
fringe regions and continues to be a significant
disadvantage of the application‖.
Initially, information is recorded physically in registers
and patient cards at the most granular level, such as the
assigned microscopy location. This information is then
entered into the framework by information section
administrators at the essential health community/block level.
'The application does not uphold the planned age of
pointers, and information should be carried out into
accounting sheet in order to make the marker,' stated the
respondent as another limitation of the framework.
An acronym for the Integrated Disease Surveillance
Program.
The IDSP entrance was completed and delivered in
November 2004. Information section, survey of reports,
flare-up detailing, information analysis and preparation
modules, as well as assets associated with sickness
surveillance are all located in the entryway's first floor. [15]
The IDSP gateway is under the management of the National
Center for Disease Control (NCDC), Ministry of Health and
Family Welfare, which is also supported by the Centers for
Disease Control and Prevention (CDC) in the United States.
As indicated by the current data stream, those
providing health-care services from the most fringe unit (for
example, sub-concentrations and essential health
communities/medical clinics) top off three arrangements of
structures (S, P, and L-syndromic), send them physically to
the sub-areas/location where online passages are completed,
and then send them to the research centre. The L structure
provides a line-by-line breakdown of affirmative cases,
whereas the other structures deal with totals of cases.
IX. RESULTS
According to the responder, "in order to obtain access
to their own data, state authorities must submit a request to
the IDSP office at the national level, which frequently
results in lengthy delays at a time when time is of the utmost
in disease monitoring." The outputs are mediocre, and they
129
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
do not elicit a significant response or action. Some of the
illnesses that are being reported on are also being reported
by other systems, creating confusion for decision makers
about which data to utilise.
such as duration of the interaction and the preconditions
that invigorate the usual meaning of the new HIS, as well as
the significance of the variables that have been identified as
critical to guaranteeing a fruitful execution.
Strategic Information Management System is an
acronym that stands for Strategic Information Management
System (SIMS) - It was developed as an upgrade to the
present computerised management information system,
which is used by the National AIDS Control Organization
(NACO) (NACO). It was formally delivered to the recipient
in August 2010. NACO's programme components have
been brought together in a single framework thanks to an
online focused application. It was discovered that the
merchant who has developed this framework is the same
one who has established the public HMIS entryway, and
many of the same design restrictions that were seen in the
HMIS were also present in this gateway, as well.
REFERENCE
[1]
[2]
[3]
[4]
[5]
[6]
The framework sustains information sections at many
levels, including detailing units (RU), regional and state
levels, and at the national level. The information acquired is
primarily of a general character; nevertheless, there is a
strong desire for case-based information, particularly for
HIV-positive cases, in order to further the growth of the
field. The programme generates yield reports by employing
externally derived insights from third-party instruments
(SAS, GIS). More than 30,000 clients' programme checking
information is captured by SIMS on a month-to-month
basis.
X. CONCLUSION
It is proposed in this research that there are several
areas where concerns might have unexpected consequences
during the implementation of HISs. A significant number of
these effects, both favorable and bad, are unpredictable and
cannot be predicted at the framework construction phase.
Furthermore, the findings emphasize the need of
domesticating and integrating the new HIS into the
association's day-to-day working practices. The usage of
ways that expedite the taming of innovation and, as a result,
the inclusion of HIS into individuals' everyday work
routines should be emphasised during the execution cycle,
in order to achieve the desired results. The majority of the
financial benefits from presenting data innovation in
business over the past 40 years appear to have come
through successful re-designing cycles, according to the
evidence.
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
Rahimi, B., and Vimarlund, V.,(2015) Methods to evaluate health
information systems in healthcare settings: A literature review. J.
Med. Syst. 31:397–432, 2007.
Kaplan, B., Culture counts: How institutional values affect
computer use. M. D. Comput. 17:23–26, 2000.
Van Der Meijden, M. J., Tange, H. J., Troost, J., and Hasman,
(2016) A., Determinants of success of inpatient clinical information
systems: A literature review. J. Am. Med. Inform. Assoc. 10:235–
243, 2014.
Adi, A., Healthcare information systems: challenges of the new
millennium. Hershey, PA, USA: Idea Group Publishing, 2015.
Paré, G., and Elam, J. J., Introducing information technology in the
clinical setting, International Int J Technol Assess Health Care.
14:331-343, 2018.
Fullerton C, Aponte P, Hopkins R, Bragg D, Ballard DJ., Lessons
learned from pilot site implementation of an ambulatory electronic
health record, Proc (Bayl Univ Med Cent). 19:303-10, 2016.
Harrison, M.I., Koppel, R., and Bar-Lev, SH., Unintended
Consequences of Information Technologies in Health Care—An
Interactive Sociotechnical Analysis. J Am Med Inform Assoc. 14:
542-549, 2017.
Lippeveld T, Sauerborn R, Bodart C. Geneva: (2019) World Health
Organization; 2000. Design and Implementation of Health
Information Systems; pp. 15–32. [Google Scholar]
Geneva: World Health Organization; 2008. [Last accessed on 2018
Nov 10]. Health Metrics Network. Framework and standards for
country health information systems.
Nabyonga-Orem J. Monitoring sustainable development goal 3:
How ready are the health information systems in low-income and
middle-income countries.? BMJ Glob Health. 2017;2:e000433.
ICT for Primary Health Care: A Report. Media lab Asia,
Department
of
Information
Technology,
Ministry
of
Communications and Information Technology, India. 2005. [
Krishnan A, Nongkynrih B, Yadav K, Singh S, Gupta V.(2019)
Evaluation of computerized health management information system
for primary health care in rural India.
Balasubramaniam P, Hira S, Reddy K.(2018) Operational Pathways
for Integrating National Disease Control Programmes for Universal
Health Coverage. [Last accessed on 2018 Nov 07]; 2014 Available
from http://dx.doi.org/10.2139/ssrn. 2821364 . [Google Scholar]
Narayana G, Auxila P. Management information Systems in Health
and Family Welfare in India. Hyderbad, Administrative Staff
College of India, 1989.
Rajesh Kumar, Streamlined records benefit maternal and child
health care, World Health Forum, Vol.14, 2016.
In healthcare, we need methods and designs that may
be used to avoid mismatches between HISs, authoritative
characteristics, and the internal and external joining of
associations, among other things. Prospective investigations
should focus on the factors that animate the training of HIS,
ISBN: 978-93-5619-947-7
130
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
A Study on Pradhan Mantri Jan Dhan Yojana in
Public and Private Sector Banks in India
Dr. M. Sumathy1, Sneha Jayalakshmi2
Professor and Head, Department of Commerce, Bharathiar University, Coimbatore-641046
2
Research Scholar, Department of Commerce, Bharathiar University, Coimbatore-641046
1
Abstract: The vision of the Jan Dhan Yojana is to bring all
the citizens of our nations into the basic banking so that they
can avail the financial services at an ease. In addition to that
the leakages as well as the pilferages in the social welfare
schemes can be reduced by enabling the Direct Benefit
Transfer facility and added to that it plays a significant role
to eradicate the financial problems. To meet the objectives of
the study the following details like the number of people who
have benefited, amount deposited by the beneficiaries and
number of RuPay cards which was issued to the beneficiary
in both the private and the public sector banks were taken
into consideration and the secondary data was collected and
the interpretations, tables and charts were framed on this
basis. This study aims to understand about the objectives and
vision of Jan Dhan Yojana which is a national mission and
which encompasses the integrated approach moreover it also
aims to reach out to the younger generation to participate in
this mission. This paper aims to study about the trends and
the growth of the Jan Dhan Yojana in the both the private
bank and the public sectors banks.
India to Digital India mainly due to the efforts taken by the
central government of our nation. The initiatives like Make
in India, Jan DhanYojana, Swachh Bharat, Demonetization
of currency has contributed to the growth of the Indian
economy. ThangarajRavikumar (2018), in his study
evaluates that the financial inclusion is a process of
providing access and usage of financial services like the
savings, insurance, credit and payment facility financially
excluded people. It also examines that the PradhanMantri
Jan-DhanYojana scheme critically and its difference with a
previous
similar
scheme.
MuhammedShafi.M.K,
Dr.M.Ravindar Reddy (2021), inhisstudy examined that the
PMJDY aim is to reach out economic activity around poor
to bring them back to the banking channel. As the part of
it, 20.63 crore bank accounts have been opened and Rs
31399.67 crore has been deposited (as on 3rd Feb, 2016)
and it aims to investigate various measures and initiatives
of banks as well as the governments.
Keywords: Jan Dhan Yojana; Financial Problems; RuPay cards.
Research Objective: To study the trend and growth of
the Jan Dhan Yojana in Public sector and Private sector
banks.
I. INTRODUCTION
Pradhan Mantri Jan-Dhan Yojana was started with the
objective to assure that the different financial services are
available to the weaker section of the society. It is a
national mission which comprises of the integrated
approach. It envisions the universal access to the services
provided by the banking sector so that each household
owns one basic banking account, insurance, financial
literacy, insurance and access to credit. The RuPay debit
card which provides an insurance cover of Rs 1 lakh
benefit is available to the beneficiary. This plan also aims
to sort out the problem which arises due to the technology
problems like poor connection and on-line transactions. An
attempt is being made so that it reaches to the younger
generation of the nation could also take a part in this.
II. LITERATURE REVIEW
SS Chowhan, JC pande (2014), in the study examined
that inspite of the huge growth in the Indian banking sector
a larger section of population in India remained unbanked.
To bring an end to this, Prime Minister Narendra Modi
announced this new scheme on 15Th August 2014. eha
Sharma, RuchiGoyal (2017), in the study investigated that
the PMJDY is major financial plan with the aim of
covering all the households in the nation with the banking
services along with inbuilt insurance. T mary Jones, S
Divyasri, G Bavani ( 2017), in the study investigated that
the Indians are changing from the rural
ISBN: 978-93-5619-947-7
III.
RESEARCH METHODOLOGY AND DATA ANALYSIS
It is analytical in nature and the secondary data is
collected through means of the websites, articles, annual
reports and research papers. The data is collected for
duration of 12 months from February 2021 to February
2022. This table shows the number of people who are
benefitted by the Jan Dhan Yojana in the public sector
banks along with the trend and the growth.
Table 1. People who are benefitted by the Jan Dhan Yojan in the
public sector banks
Month
Feb-21
Mar-21
Apr-21
May-21
Jun-21
Jul-21
Aug-21
Sep-21
Oct-21
Nov-21
Dec-21
Jan-22
Feb-22
Public
sector Trend Forecast Growth
banks-Total
Forecast
beneficiaries
330814446
329854005.1
329964113.2
332100015
331580983.2
331640944
334049692
333307961.2
333326296.3
335222466
335034939.2
335020213.2
335769594
336761917.3
336722738.4
337089188
338488895.3
338433915.6
338914876
340215873.3
340153788.7
341300971
341942851.3
341882402
343880756
343669829.4
343619799.8
345681872
345396807.4
345366026.9
347134461
347123785.4
347121128
349542745
348850763.4
348885148.4
351305271
350577741.5
350658133.2
Source: Jan Dhan Yojana and the tabulations are computed
with the help of the excel
131
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
People who are benefitted by the Jan Dhan Yojana in
the public sector banks along with the trend and the
growth.
issued to the beneficiaries of the public sector banks under
the Jan Dhan Yojana with the trend and the growth.
Table 3. Number of RuPay debit cards issued to the beneficiaries
Month
Fig. 1: People who are benefitted by the Jan Dhan Yojan
The trends shows that the number of beneficiaries
have been increasing during the study period. This table
shows the amount deposited by the beneficiaries’ in the Jan
Dhan Yojana in the public sector banks along with the
trend and the growth.
Table 2. Amount deposited by the beneficiaries’ in Jan Dhan Yojana
Month
Feb-21
Mar-21
Apr-21
May-21
Jun-21
Jul-21
Aug-21
Sep-21
Oct-21
Nov-21
Dec-21
Jan-22
Feb-22
Public sector
banks
Deposits in
Total Rs
10729292.66
10859692.33
11354774.91
11188177.06
11253127.94
11199245.15
11158018.43
11248701.7
11333570.23
11617538.92
11431537.34
12056251.55
12121239.27
Trend Forecast
Growth
Forecast
10818003.47
10906684.53
10995365.58
11084046.64
11172727.69
11261408.75
11350089.81
11438770.86
11527451.92
11616132.97
11704814.03
11793495.09
11882176.14
10827389.64
10911783.44
10996835.04
11082549.58
11168932.21
11255988.15
11343722.65
11432140.99
11521248.51
11611050.57
11701552.6
11792760.03
11884678.39
Source: Jan Dhan Yojana and the tabulations are computed
with the help of the excel
Amount deposited by the beneficiaries’ in the Jan
Dhan Yojana in the public sector banks along with the
trend and the growth.
Feb-21
Mar-21
Apr-21
May-21
Jun-21
Jul-21
Aug-21
Sep-21
Oct-21
Nov-21
Dec-21
Jan-22
Feb-22
Number of RuPay
debit cards issued to
the beneficiaries of the
public sector banks
261928734
263079398
263572904
264187037
264548817
265600195
266968915
268481917
270717908
271939364
265999676
267719558
268940817
Trend
Forecast
Growth
Forecast
262696976.6
263320368.2
263943759.8
264567151.4
265190543
265813934.6
266437326.2
267060717.8
267684109.4
268307501
268930892.5
269554284.1
270177675.7
262703776.9
263319764.9
263937197.2
264556077.3
265176408.6
265798194.4
266421438.2
267046143.3
267672313.3
268299951.5
268929061.4
269559646.4
270191710.1
Number of RuPay debit cards issued to the
beneficiaries of the public sector banks under the Jan Dhan
Yojana with the trend and the growth.
Fig. 3: Number of RuPay debit cards issued to the beneficiaries
The curve shows an increasing trend till October 2021
and it starts to slope downwards after the period of October
2021 and again some increase in the number of Rupay
debit cards issued to the beneficiaries could be noticed
during the study period. This table shows the number of
people who are benefitted by the Jan Dhan Yojana in the
private sector banks along with the trend and the growth.
Table 4. Number of people who are benefitted by the Jan Dhan
Yojana in the private sector banks
Private sector
Month
banks- Number
Trend
Growth
of beneficiaries
Forecast
Forecast
Fig. 2: Amount deposited by the beneficiaries’ in
Jan Dhan Yojana
The curve is fluctuated which represents that the
amount deposited by the people varies during the study
period. This table shows the number of RuPay debit cards
ISBN: 978-93-5619-947-7
Feb-21
Mar-21
Apr-21
May-21
Jun-21
Jul-21
Aug-21
Sep-21
Oct-21
12485826
12514494
12537535
12546156
12549631
12592782
12631641
12664400
12685586
12451080.46
12484688.65
12518296.85
12551905.04
12585513.23
12619121.42
12652729.62
12686337.81
12719946
12452416.45
12485472.49
12518616.28
12551848.06
12585168.05
12618576.49
12652073.62
12685659.67
12719334.88
132
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Nov-21
Dec-21
Jan-22
Feb-22
12731050
12785928
12850401
12910055
12753554.19
12787162.38
12820770.58
12854378.77
12753099.48
12786953.71
12820897.81
12854932.02
Source: Jan Dhan Yojana and the tabulations are computed
with the help of the excel
Number of people who are benefitted by the Jan Dhan
Yojana in the private sector banks along with the trend and
the growth.
Fig.5: Amount deposited by the beneficiaries
The trend shows that the amount deposited by the
beneficiaries’ in the Jan Dhan Yojana in the Private sector
banks have been increasing during the study period. This
table shows the number of RuPay debit cards issued to the
beneficiaries of the private sector banks under the Jan
Dhan Yojana with the trend and the growth.
Table 6. Number of RuPay debit cards issued to the
beneficiaries of the private sector banks
Month
Fig.4: Number of people who are benefitted by the Jan Dhan
Yojana in the private sector banks
The trends shows that the beneficiaries have been
raising till May 2021 and after it saw some decline and
again the number of beneficiaries started to increase during
the study period. This table shows the amount deposited by
the beneficiaries’ in the Jan Dhan Yojana in the Private
sector banks along with the trend and the growth.
Table 5. Amount deposited by the beneficiaries
Month
Feb-21
Mar-21
Apr-21
May-21
Jun-21
Jul-21
Aug-21
Sep-21
Oct-21
Nov-21
Dec-21
Jan-22
Feb-22
Amount
Deposited by
the
beneficiaries
in the Private
Sector Banks
421119.47
421548.59
430902.2
445510.1
445144.34
437869.84
434448.89
432482.7
436200.11
459182.98
457991.85
468911.75
472156.36
Trend
Forecast
Growth
Forecast
Feb-21
Mar-21
Apr-21
May-21
Jun-21
Jul-21
Aug-21
Sep-21
Oct-21
Nov-21
Dec-21
Jan-22
Feb-22
public
sector
banks
Total
Number
of
beneficiaries
11254804
11224838
11199870
11147066
11109643
11112368
11120801
11117973
11124010
11128440
11119859
11020872
11018711
Trend
Forecast
Growth
Forecast
11222293.38
11207029.81
11191766.23
11176502.65
11161239.08
11145975.5
11130711.92
11115448.35
11100184.77
11084921.19
11069657.62
11054394.04
11039130.46
11222449.91
11207075.95
11191723.05
11176391.19
11161080.32
11145790.44
11130521.5
11115273.47
11100046.34
11084840.07
11069654.62
11054489.98
11039346.12
Source: Jan DhanYojana and the tabulations are computed
with the help of the excel
421284.2629
424960.8496
428637.4363
432314.023
435990.6097
439667.1964
443343.7831
447020.3698
450696.9565
454373.5432
458050.1299
461726.7166
465403.3033
421673.6379
425164.1547
428683.5653
432232.1088
435810.0262
439417.5609
443054.9579
446722.4644
450420.3297
454148.805
457908.1438
461698.6016
465520.4359
Number of RuPay debit cards issued to the
beneficiaries of the private sector banks under the Jan
Dhan Yojana with the trend and the growth.
Source: Jan DhanYojana and the tabulations are computed
with the help of the excel
Amount deposited by the beneficiaries’ in the Jan
Dhan Yojana in the Private sector banks along with the
trend and the growth.
ISBN: 978-93-5619-947-7
Fig. 6. Number of RuPay debit cards issued to the beneficiaries of the
private sector banks
133
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
The trend shows that the number of RuPay debit cards
issued to the beneficiaries have been declined during the
study period.
IV. CONCLUSION
The Jan Dhan Yojana envisages to bring all the
citizens of our nations into the basic banking so that they
can avail the financial services at an ease. Moreover this
mission plays a major role to eradicate the financial
problems and at the same time it also wants to in calculate
the habit of saving the income among the people. In
addition to that the leakages as well as the pilferages in the
social welfare schemes can be reduced by enabling the
Direct Benefit Transfer facility.
[4] management and social sciences, Vol 6, Issue 3, PP no: 461-466.
[5] Thangaraj Ravikumar (2018), “Pradhan Mantri Jan-Dhan Yojana: An
Evaluation”, Ushus Journal of Business Management, Vol 17, Issue
3, PP no: 9-13.
[6] Muhammed Shafi.M.K, Dr.M.Ravindar Reddy (2021), “ Financial
Inclusion Growth in India: A study with Reference to Pradhan Mantri
Jan- Dhan Yojana( PMJDY), International Journal of Economics and
Management science, Vol 2, Issue 1, PP no: 33-41.
REFERENCES
[1] SS Chowhan, JC pande (2014), “ Pradhan Mantri Jan Dhan Yojana:
A giant leap towards financial inclusion”, International Journal of
research in management and Business studies, Vol 1, Issue 4, PP no:
19-22.
[2] Neha Sharma, Ruchi Goyal (2017), “Pradhan Mantri Jan Dhan
Yojana (pmjdy) - a conceptual study”, International Journal of
research- Granthaalaya, PP no: 143-152.
[3] T mary Jones, S Divyasri, G Bavani ( 2017), “ A study on the
Implications of Pradhan Manthri Jan Dhan Yojana on the growth of
Indian Economy”,International Journal of
ISBN: 978-93-5619-947-7
134
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Function of Management Information
System in Education
Ms.Suman1, Dr.( Prof. ) MukeshSingla2
Research Scholar, Computer Science Department, Baba Mastnath University, Rohtak.
2
Research Supervisor, Computer Science Department, Baba Mastnath University, Rohtak
1
Abstract: Its effectiveness and suitability for
educational administration have resulted in a rapid
expansion of the use of information technology in
educational
administration.
The
executive's
information systems (MIS) were used mostly for the
purpose of evaluating the success of school office
exercises during the early stages of the event's
unfolding course of events. It was used to hold
information on understudies and staff members. The
ability of a school to keep up with itself internally and
to adapt to a changing and dynamic environment is
critical to its overall effectiveness. The information
section and examination were the areas of most
concern, rather than the movement or inquiry of
information. A suitable partnership exists between the
historical context of education policy and the
advancement of educational administration. Starting
information-gathering efforts aided in the development
of the country's public education policy, which was
later refined. Despite all of the progress that has been
made
in
the
improvement
of
educational
administration, most educational institutions continue
to face a variety of challenges, notably in the area of
information and communications technology. In the
areas of leadership, decision-making, responsibility,
human resource management, the board of directors,
communication and obligation, MIS has transformed
the way CEOs conduct their business. These methods
may assist the school management in determining the
strengths and weaknesses of the school, developing
critical game plans, allocating resources, and
evaluating staff execution as well as organisational
accomplishment, among other things.
Keywords: Management; Information; System; Education
Policy
I.
INTRODUCTION
The majority of educational institutions in many
developing countries have come to recognise the need of
speedy and effective data processing, and they have been
proven correct in their assumptions. Among other things,
the growth of information, communication, and
technology (ICT) as well as the widespread usage of
internet-based applications has heightened this expectation
in the twenty-first century. Since the beginning of time,
there has been a relationship between efficient data
processing and faster decision making. With the
introduction of information technology, it has become
clear that the relationship should be strengthened and the
ISBN: 978-93-5619-947-7
benefits harnessed in order to ensure progress in all
educational establishments. The field of management
information systems (MIS) has seen a lot of alterations in
the course of its comparatively short history. It first
appeared as a combination of operations research and
decision sciences in the late 1950s, and it has continued to
flourish ever since. Within a few decades, it declared its
independence and established itself as a separate field
from the rest of science. When we look back over the
course of its meteoric rise since the 1970s, we can see that
it has gone through a number of twists and turns that have
pushed it further and further away from systems thinking
in some aspects, while maintaining the idea of systems at
its foundation in others, all while maintaining the idea of
systems at its foundation in others.
Administrators at educational institutions have been
slow to embrace computer-assisted data processing. Its
possible that they did understand information systems, or
that system planning was not taken into account at all
throughout the process. It has lately been tried to link
decentralisation policies at all levels of education with the
collection and analysis of educational data in an effort to
bring the two together, with mixed results. MIS are being
used to aid in the establishment of operational plans as
well as the development of budgets for their
implementation as part of this process. In the context of
educational management it is anticipated that the
implementation of Management Information Systems will
play a significant role in the decentralisation process by
assisting in the improvement of the efficiency and
responsiveness of education provision to local needs by
providing reliable and accurate data. A key distinction
between management information systems and regular
information systems is that management information
systems are used to examine other information systems
that are utilised in the organizations operational operations
whereas regular information systems are used to perform
routine tasks. Management Information Systems (MIS) are
also assisting in the advancement of other aspects of the
education system, notably in non-formal education and
higher education (MIS).
Non-formal education is one of the paths via which
Ghana might make progress toward achieving the
Millennium Development Goals (MDGs) (MDG). A
consequence of these developments, the Non-Formal
Education Division (NFED) has meticulously constructed
protocols and procedures to assist in the monitoring of
progress toward established objectives, and in the
rewarding of providers who achieve those goals. National
135
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Council for Tertiary Education (NCTE) data on
universities and polytechnics is also collected, collated,
and analysed. The information gathered and analysed is
then used to determine funding levels for the sector as a
whole (UNESCO, 2003). More specifically, the purpose of
this research is to examine the unique function that
management information systems (MIS) play in education
management, with a particular emphasis on tertiary
institutions and the role they play in preparing students for
life after graduation, as well as the role that MIS plays in
preparing students for life after graduation.
materials management as well as organizational practices
and policies, computer-related challenges, and other
considerations. Organizations that use management
information systems (MIS) may work in a more holistic
manner rather than in discrete divisions. The likelihood of
failure increases when choices are made in discrete pieces
without taking the whole picture into consideration. In
terms of the use of organisational resources, there is a
substantial amount of waste that may be eliminated.
1.1 Objectives
In most cases, organisational structure may be divided
into three levels of hierarchy: the top management level,
the middle management level, and the lower management
level (Figure 1). Each level makes decisions in line with
the responsibilities assigned to them.
 To identify the information technology facilities
available in the schools.
 To identify the software used by schools for the
management information system.
III. MIS SUPPORTS ORGANIZATIONAL SYSTEMS
II. MANAGEMENT INFORMATION SYSTEM
It is possible to make appropriate judgments in the
near term if one makes efficient use of the information
available. When managers are presented with a substantial
quantity of data and information, the decision-making
process becomes very difficult. Easy access to the
information required for decision-making should be a goal
of all organisations. For information management to be
effective and efficient, it must include the collection of
data as well as its conversion into information, efficient
storage of information as well as retrieval and optimum
use of information.
MIS is an abbreviation for management information
system, which is a kind of information system that gathers
and organises data. IT (Information Technology) is a
computer-based system that handles data and information.
In addition to being one of the most powerful management
tools on the market, the application assists managers in the
planning, organisation, and execution of their operations
while also providing them with tools for monitoring,
controlling, and assessing them. The use of management
information systems (MIS) makes it simpler to
communicate successfully.
Organizational management information systems
(MIS) are made of three core components: management
information systems, information systems, and system
information systems. The integrated use of these three
components allows for greater clarity in comprehending
the problems at hand, as well as the influence of each
component on other seemingly unrelated inputs that are
interconnected with one another and with the issues
themselves, thanks to the integration of these three
components. When taken into consideration in the context
of business requirements, the findings made in this way
are appropriate. Utilizing management information
systems (MIS) allows organisations to implement a multidisciplinary management strategy that considers all of the
components relevant to operational, financial, and
ISBN: 978-93-5619-947-7
Fig. 1: Decision areas and management levels
Managers at lower levels are concerned with
operational decisions, while managers at the middle and
upper levels are concerned with tactical decisions, and
managers at the highest levels are concerned with strategic
decisions. A large number of routine activities are
planned, carried out, and supervised by lower-level
managers, such as organising meetings and ensuring that
all plans are performed in the way that has been agreed
upon.
Middle-level managers commit a disproportionately
lesser amount of time to routine planning duties and a
disproportionately higher amount of time to tactical
decisions such as problem resolution, gap analysis,
performance assessment, and advertising, as compared to
upper level managers.
A higher-level manager's job is substantially different
from the jobs of people who operate at the lower and
middle levels of an organisation. They are primarily
concerned with long-term strategic issues such as which
product should be launched into the marketplace, which
market should be tapped, how to gain entry into the
domain of competitors, how to organise various resources,
how to improve productivity of the organisation, how to
reduce costs, with whom to collaborate, whether or not
computerization should be implemented, to what extent
computerization should be implemented, and how to train
the workforce to m. Table 1 displays the levels of
management hierarchy in a corporation, as well as the
decision-making tasks that are connected with each level
and the kinds of information that they need to do their jobs
effectively.
136
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Table 1: Types of information, management levels and types of
decisions
IV. METHODOLOGY
Several advantages of the quantitative approach were
considered by the researchers while collecting data for this
study, including the capacity to investigate correlations
between variables and illustrate cause and effect in
precisely controlled circumstances. This method also has
the advantage of simplifying and re-structuring complex
issues into a small number of variables.
4.1 Methods
There were two (2) basic sampling techniques utilised
in this study: the stratified sampling approach and the
purposive sample technique. The stratified sampling
approach and the purposive sample technique were both
used. To split the sample size into two major groups,
stratified sampling was used to divide the sample size into
two primary groups. These were the categories of
administrative personnel and management. These
classifications will make it feasible to collect and assess
the data that will be required from each stratum when the
classifications are refined. As a result, data on respondents
from the institutions were collected by using a purposive
sampling technique. In this study, the researcher employed
two sampling strategies because they enabled him or her to
collect data that was relevant to the study while also
lowering the number of errors that happened throughout
the data processing process.
A random sample of 100 respondents was chosen in
order to guarantee that all respondents had continuous
access to data inside the institution throughout the survey.
It was decided that three (3) Department of Admissions,
Student Records, and Examinations heads as well as their
respective division heads and administrative assistant were
included in the sample size. The sample size was divided
as follows: Admissions, Student Records, and
Examinations heads; Division heads; and Administrative
assistants. There were five (3) members of staff from the
Central Accounts Department in attendance, three (3)
members of staff from the Audit Department in
attendance, and three (3) members of staff from the
Students Accounts Department in attendance as well. It
was decided who would be the heads of the Human
Resources and General Administration, Planning and
Development, and Planning, Development, and Planning
and Development Departments, as well as the sectional
heads, secretaries, and clerks in each department. The
participants in this research were chosen from among
ISBN: 978-93-5619-947-7
around 20 people from each of the three (3) faculties. They
included deans, administrative officers at the schools
where they worked, accounting officers, and department
heads. Four (4) members of the management team, as well
as their respective sectional heads and clerks, were
selected for this position. Examining officials from the
faculties and departments were also probed since they are
ultimately accountable for the results of exams in their
respective departments.
4.2 Data Source
The key results were compiled using information
gathered from the study's participant group. The
managerial and administrative personnel of the Govt
Polytechnic College in Satna were included in the study's
subject population, which included them as well as other
college employees. Persons who are directly engaged in
the day-to-day activities of the institution make up this
category of people. The administrative team is comprised
of the rector, vice-rector, registrar, and chief financial
officer, among others. It is the responsibility of an
administrative staff member to ensure that information is
continually flowing, either from management to workers
or from employees back to management.
V. DATA ANALYSIS AND RESULTS
5.1 Educational or Professional Qualification of
Respondents
When it comes to educational and professional
qualifications, just one responder has a qualification that is
less than a diploma level of education. Considering that
undergraduates and postgraduates respondents alone
account for 64.1 percent of all respondents, it is possible
that the majority of respondents are well-informed
individuals who form the core of the study”.
Fig. 2: Education / Professional Qualification
VI. DEPARTMENTS
RESEARCH
COVERED
BY
THE
Because of the high percentage of data acquired from
numerous departments, people from the tests, student
137
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
records, central accounts, and other departments were very
involved in the research, as shown by their cumulative
percentage of 89.2 percent. Most of the others are
personnel from the General Administration Department
and departments inside the different schools of the
universities who are constantly processing data. So that the
research project may be completed, larger parts of the
administrative personnel who are responsible for the
continuous processing of data are fully represented in the
execution of the project.
Table 2: Departments covered by the research
Fig. 3: Manual Data Processing
The previous distributions demonstrate that the great
majority of the administrative employees selected has an
adequate grasp of management information systems (MIS)
in terms of the degree of skill they possess. An aggregate
percentage of 89.1 percent of individuals who have
ordinary to comprehensive knowledge of management
information systems and their relevance in school
administration are aware of management information
systems and their significance in school management.
6.1 Length of Service with Polytechnic
When the respondents were asked how long they had
been employed by the institution, the findings indicated
that the vast majority (66.2 percent) had been employed
there for more than two years on average. In other words,
they are up to speed on the procedures and processes
inside the institution, and they will be able to provide
information on their existing work practises as well as the
influence they anticipate the MIS will have on their place
of business.
6.2 Level of Computer Literacy
VIII. INTRODUCTION OF MIS IN EDUCATIONAL
MANAGEMENT
If you take a look at the level of interest expressed by
the sampled respondents, it is clear that the vast majority
of administrative staff, with a cumulative percentage of
97.5 percent, are extremely interested in the
implementation of a Management Information System to
ensure the safe, secure, and reliable flow of data within the
institution. This evident excitement on the part of the
institution's staff members might be a favourable portent
for the success of the MIS project's implementation at the
institution.
In light of the study's findings, it is clear that the vast
majority of respondents are computer literate, as seen by
their cumulative percentage of 90.1 percent. This suggests
that the vast majority of the administrative personnel at the
school is computer savvy and has the potential to boost
their productivity if given the proper tools.
VII. MANUAL DATA PROCESSING
The replies of the respondents reveal indisputably that
manual data processing inside the institution takes a longer
period of time, with a cumulative percentage of 75%.
Because of a shortage of computers, about 75% of all
processes will take an excessive amount of time to
complete, which will have a negative impact on job
performance and output levels. The pie chart depicting the
distribution of the results is displayed in the image to the
right of this section.
ISBN: 978-93-5619-947-7
Fig.4: Introducing of MIS in Educational Management
IX.
DISCUSSION
It is important to understand the function of
management information systems (mis) in improving
educational management. education administration relies
138
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
on management information systems (mis) to execute
important functions, including the management of student
personal data, the assignment of index numbers, and the
distribution of programmes, among other things. in light of
the fact that 75% of respondents agreed that the
introduction of management information systems will
have a significant impact on effective decision-making
within the polytechnic, it has been determined that
management information systems contribute significantly
to the efficiency of educational management generally.
When decisions can be made correctly and rapidly, the
overall development of the organisation in terms of both
numerical and financial growth will be enhanced.
Furthermore, as information technology (it) simplifies
data flows inside and between departments, it becomes
easier for all employees to have access to the information
they need in order to make educated choices about their
jobs.
The importance of management information systems
(mis) in increasing the capacity for data processing,
storage, and analysis, as well as the timely conveyance of
information to management and employee. The goal of
using mis in school administration is to make data storage
and processing more convenient for everyone involved.
most likely, the slow pace at which information is
gathered and retrieved inside organisations is due to the
use of manual data processing, which has been present for
many decades.
It takes substantially longer to transmit data when
information is distributed via the usage of paper for
memos and reports. consequently, it should come as no
surprise that more than eighty percent (80 percent) of
respondents feel that the installation of mis will result in
the preservation of effective data storage. furthermore, the
overwhelming majority of respondents (89.1 percent)
believe that employing management information systems
(mis) would speed the implementation of decisions made
within a department's hierarchical structure. when
questioned about departmental coordination a second time,
more than ninety-seven percent (97 percent) of
respondents said that the implementation of mis would
boost departmental coordination and ensure efficiency in
performance.
The importance of management information systems
(mis) in the planning, coordination, and implementation of
educational activities. Education activities must be
properly supported and promoted, and it is vital that the
necessary management practises be in place to ensure that
this occurs. it has been predicted for a very long time,
according to the majority of respondents, that management
information systems (mis) would be implemented at govt
polytechnic college satna so that it might assist in
educational planning and coordination. alternatively, the
expenses involved with the system's acquisition,
deployment and administration have always acted as a
deterrent to purchase and maintain it. according to the data
ISBN: 978-93-5619-947-7
gathered, 46.2 percent of respondents believe that the issue
of cost is the key cause for the institution's inability to
complete the mis project on a timely basis. another 28.6
percent say that the problem originates from a lack of
knowledge on the part of management, which has failed to
recognise the enormous impact that mis has made in other
educational contexts, including higher education. the
shortage of skilled individuals to operate the system,
however, is seen as a major obstacle to its adoption by
some respondents (37 percent). according to other persons
who have shared their ideas on this topic, workers who
were apprehensive about change and employees who were
computer illiterate were among those who expressed their
opinions on this problem.
Through the use of management information systems,
it is possible to reduce or remove duplications and to fill
information gaps (mis). Efficiencies in information
transportation throughout an organisation are crucial for
supporting swift and efficient decision-making at all
levels. in light of the results, it has become evident that
data duplication is one of the most critical challenges that
workers face on a daily basis in their jobs.
According to the survey results, 82.6 percent of
respondents feel that they repeat data on a regular basis at
work, which results in a large rise in the amount of money
they spend on stationery and other supplies. a further 91.3
percent feel that when data is supplied manually, there are
numerous information gaps as a consequence of the fact
that errors in data gathering and editing have an influence
on the overall outcome. certain information is lost as a
consequence of the fact that some files may not be
discovered at all or may not be retrieved in time for some
critical decisions to be taken, resulting in the loss of some
information. 93 percent of those who responded believe
that, if the proper system is in place, important decisions
can be made quickly and specific plans can be put in place
to ensure the institution's progress. This is because the
information gathered from meetings is used in decisionmaking and, ultimately, educational planning.
X.
CONCLUSION
Generally speaking, the importance of Management
Information Systems in educational management is not
usually considered in most tertiary institutions. This is
because it is assumed that by putting in place the
appropriate
Information
and
Communication
Technologies, all of the problems associated with
information flow will be resolved.
However, according to the findings of this study,
information technology (IT) management (MIS) is more
than just the installation of computer systems, their
relevant computer software, and accessories; it is also the
willingness of management to purchase the appropriate
systems and computer software, the acceptance of
administrators to use the system, and the availability of
qualified ICT personnel to provide system support.
139
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
REFERENCE
[1]
Bloch, D., Hedberg, J.G. & Harper, B. (2012). Managing
informationsystemsintheschool.InternationalJournalofInformation
Management,14(6),443-464.
[2] Bumsted, Aee r.(2013)“The Concept of Systems Management in
Educational Data Processing”
[3] Cambridge Education (February,2016),“Education Management
Information System”:ashort case study of Ghana,(aworkingpaper)
[4] Cambridge Education (February,2014), “Education Management
Information System”:ashort case study of Nigeria,(aworkingpaper)
[5] Charles C.Villanueva(2003),“Education management information
system(EMIS)and the formulation of education for all(EFA)”
[6] Kowizt, Geraldetal(2014),“Information for School Administration
[7] Lewis, David, Alfred (2015) “Inception , Design, and
Implementation o fa Management Information System”.
Dissertation.
[8] Mason ,Richardo and Mitroffiani (2016), “A Program for Research
on Management Information Systems ”Management Science”.
[9] Mccain, k., Ntuen, c.a. & Park, e.h. (2014). “Software Useability as
a Foundation for Human- computer Interaction Designs.Inc.a.Ntuen
& e.h. Park (eds.), Human Interaction with Complex Systems:
“Conceptual Principles and Design Practice (pp. 73-87). Norwell,
ma, USA: Kluwer academic.
[10] Mellor, Warren (December,2014),“Management Information
System”,
Educational
Management
ReviewSeriesNumbe
r25.O’brien, J(1999).“Management Information Systems.
ISBN: 978-93-5619-947-7
140
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Conceptual Insights of Smart Glasses
Ms.SaniaKukkar
Assistant Professor, TIAS
Abstract: The growing field of wearable computing aims to
interweave computing devices into everyday life. This
report emphases on smart glasses, one of the categories of
wearable computing devices which is very extant in the
media and expected to be a big market in the next years. It
analyses the variations from smart glasses to other smart
devices, introduces many possible applications for different
goal audiences and gives an outline of the different smart
glasses which are presented now or should be available in
the next few years. Interesting technological sorts of the
smart glasses are highlighted and explained.
with those virtual objects is a way of communicating
with the figuring devices.
Keywords: Smart Glasses, Media Evolution, Virtual Reality, AR,
Wearable’s Technology, Internet of things.
Fig. 1: Reality is augmented with a virtual object [7]
I.
INTRODUCTION
Smart glasses are computing devices shabby in front
of the eyes. Evidently their displays move with the user’s
head, which leads to the handlers seeing the display
individually of his or her position and orientation.
Therefore smart glasses or lenses are the only devices
which can alter or enhance the wearer’s image no stuff
where he/she is physically located and where he/she
looks. The Internet of things (IOT) is the network of
physical devices, vehicles, home appliances, and other
items embedded with electronics, software, sensors,
actuators, and connectivity which enables these things to
attach, collect and exchange data, creating opportunities
for more direct integration of the physical ecosphere into
computer-based systems, resulting in efficiency
progresses, economic benefits, and reduced human
exertions. There are three different models of how to
alter the visual information a wearer identifies. Those
three are introduced here.
II. VIRTUAL REALITY
The goal is to create a fully cybernetic world for the
user to see, interact with and immerse into. The user sees
this virtual world only, any other nimble sources are not
affecting the eye. One ample difference to a simple
screen is that the actions of the user affect the virtual
world. In example movement upsets what virtual content
the user sees. A famous unreal example of a device
creating a practical world is the Holodeck from StarTrek.
III. AUGMENTED REALITY
The world is enriched or augmented by virtual stuffs
as seen in figure 1. The user can see the real world but
also perceives virtual content created by a totalling
device and displayed by an additional light source which
doesn’t forbid the acuity of the real world. Interaction
ISBN: 978-93-5619-947-7
IV. DIMINISHED REALITY
Objects are subtracted from scenes by riddling the
light imitated or emitted by those objects towards the
eye. This is most often used in balance with augmented
reality to replace the shrank objects by some virtual
objects. Like other smart devices, smart glasses will
often also have a camera. Significant differences to other
camera procedures are that the pictures or videos are
taken from the users point of view, there is no need for
the user to hold the device in his hands and the vision of
the user is not impenetrable. This camera can see what
the wearer sees at any time. In combination with eye
tracing technology the devices can decide exactly what
the wearer is looking at. This allows the device to get
crucial information about the users interests, activities,
surroundings and profession. Those fundamental
differences to other computing devices are what make
smart glasses unique and exciting. They enable new
solicitations which couldn’t be as easily grasped with
other devices.
V. OUTLINES
All the applications in the world are useless without
the right hardware to run on. That is why an overview of
different smart glasses which have been unconstrained
freshly or should be released in the next few years is
provided. Those glasses are developed by different
companies and often trying to achieve different goals and
appeal to altered consumer markets. Therefore they do
not all stand in direct scrap and should not be compared
as such. Devices with one display there are smart glasses
with a single display which is hired in the peripheral
vision of the user. Those displays can be used to display
material to the user. Unfortunately, they cannot be used
to create a slim or virtual reality because sight on one eye
is not affected. They also cannot be used to create an
141
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
banding augmented reality because virtual objects can
one be seen in peripheral vision.
focus on displaying info but rather try to create an
exciting visual experience.
VI. GOOGLE GLASS
One example of smart glasses with one display is
Google Glass which runs the Android operating system.
Its specifications are the following • Weight: 50g.
 Processing: 1.2 GHz Dual-core ARM Cortex-A9
CPU, Power VR SGX540 GPU, 32GB storage,
682MB RAM. That’s coarsely equivalent to the
hardware of an IPhone4
 Camera: 7MP still (2528x1856 pixels) or 720p video.
There is no flashy
 Display: It is a color prism projector with a doggedness
of 640x360 pixels. See figure3.
 Sensors: microphone, accelerometer, gyroscope and
extent.
 Interaction: There is a long an narrow touch pad
which supports swipe and tap motions. The camera
can be started by a button.
 Audio: There is a bone passage transducer for audio.
Sound spreads the inner ear in form of vibrations on
the scull. Note that this technology is audible by the
hearing diminished as well as persons with normal
hearing.
Communication: It has no cellular modem which
means it can not variety phone calls on its own. It does
have Bluetooth and WLAN 802.11b/g Google Glass is
fictional to be used in mixture with a smartphone and one
of its main uses is to display notifications in a fitting and
quick way. It is pretend to be priced similarly to a high
end smartphone but there are no official declarations
concerning the exact price or release date.
VII. DEVICES WITH TWO DISPLAYS
Fig. 2: Google Glass
Smart glasses with two displays can distress all the
wearer sees and could display 3 dimensional content.
This makes it possible to form a virtual, augmented or
diminished reality. Both systems with two shows
presented in this slice need to be connected to a PC with
a cable by which the virtual objects are twisted. In the
future related devices could be wireless and worn
outside. Those devices are curious because they do not
ISBN: 978-93-5619-947-7
VIII. APPLICATIONS
In this section different likely applications that we
can categorize as documentation, productivity, universal
remote control, medical, education, acting, commerce
and sports. The goal is to display how useful smart
glasses could be. It is normal that hardware to realize the
applications will exist in the future.
Fig. 3: Google Glass display
Fig.4: Oculus Rift Crystal cove prototype[10]
Documentation Pictures and videos taken by smart
bifocals are reserved from the point of view of the user
and can be taken hands-free without occluded sight. This
is ideal to detention personal experiences of the wearer.
In addition to pictures taken manually a device could
also take pictures automatically. It could realize when the
user is wild or excited and take more pictures or even
videos in those times automatically. All the pictures
could be uploaded to create a certification of the person’s
life.[4] This documentation could be used positively in
many different ways. It could be used as a memory aid,
to rise safety by forming visual evidence of crimes, as
proof in court or simply for personal use. If many people
used such a device for certification, information of ruins
and other major events would spread even faster due to
the increase of pictures and videos taken in states where
the user might not have time to manually take pictures
like an earthquake. Productivity although there are now
many solutions used for navigation, smart glasses could
be used to create a better practice. In cars they could be
used to highlight the way and offer a speed for the driver.
In granaries they could be used to cross employees to the
objects they need to transport highlighting those with
some colour.
Video streams could be used to ask experts or care
questions while doing work. Imagine having to do a
difficult care task once a year. This could be done while
142
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
being connected to an professional from that products
company seeing exactly what you do, giving advice and
in case something goes erroneous maybe even being
liable for damages. This is a lot cheaper than having an
proficient travel to once location. Smart glasses could be
used to way eye movement of employees. Analysing this
data could help govern when a employee is trite and
needs a break or when a employee runs out of work and
starts working leisurelier. Another possible application
would be to augment construction sites with architectural
policies helping in finding errors made in the planning
phase and also preventing accidents like drilling done a
water pipe. Universal remote control Smart glasses could
be used as universal remote control. The user could issue
an augmented control of any compatible device at any
time and uses this to interact with the device through
shrugs. Examples would be an augmented television
remote, tune, heat, light, oven and security system or
camera control. It would also be possible to remote
governor any computing device with a virtual display
and a near or physical keyboard and mouse or touch
interface. This could be realized by spilling video to the
glasses and control material to the device. If the device
which should be controlled has little computational rule
or the bandwidth is limited it would also be possible to
only send the information to be shown to the glasses and
let the glasses create the picturing. Of course this would
not be as fitting as using an actual desktop PC but it
would enable the user to use the PC from remote place
and use computing devices which do not have a screen or
any physical interfaces. [1,2].
IX.
HEALTH
At first the use of smart glasses for blind or visually
lessened people might seem pointless. But they could be
very useful in assisting those people as a seeing
companion. Many blind people use a stick to get
information about their surroundings. This method only
gives information about items under the waist which
doesn’t prevent collisions with objects placed higher like
tree branches. Smart glasses could advise blind people
from such collisions. They could also be used for
navigation by generous them information about the
distance to predefined landmarks.[3] Another possible
application would be to use the smart glasses as a seeing
aid to create night vision or show objects in a distance.
Virtual reality has been used in physical cure. Studies
prove that the subjective ache sensation of patients
during exercises can be reduced by distracting them with
a virtual reality set up. It would also be probable to have
subtitles for deaf people. Speech recognition would have
to swell and the glasses would have to be able to
distinguish different voices. It would though be relatively
easy to only recognize certain sounds like a vehicle horn,
somebody screaming: Watch out! or simple commands
like crack around or come to me. Education Virtual
reality glasses could be used to teach history by
tolerating the students to view historical places not only
through textbooks but in a virtual 3D world in which
they could move aboutfreely.
ISBN: 978-93-5619-947-7
Those glasses could also be used to create replications
for training. Examples would be driving simulations,
flight simulations, military training or surgery training. It
is beneficial to be skilled in those events in a safe
environment where nobody can be hurt until the skills
required to perform are well-read. Entertainment In 3D
cinemas users wear glasses.
By replacing those glasses with smart glasses the
cinema practise could be improved. Personal titles could
be introduced in the language of choice. Smart glasses
could also be used for a virtual reality cinema practise.
The users could govern what they see accountable on
their head position. The environment might be familiar
according to the conditions in the movie. For example
when it is windy in a scene there could be a ventilator in
the cinema creating similar conditions. Such a system
would be very hard to reinvent for someone at home
therefore adventurer copies would not create a similar
experience to acinema.
This could help the industry in creating a lot more
income. Another big market would be virtual and
augmented reality games. Especially augmented reality
games could reach a wide audience than the people who
play games today because they can be played outdoor
and be based on interaction with other people in count to
augmented virtual objects. One example of such a game
would be tennis with a virtual ball. Commerce
Commercial billboards and advertisement posters could
be superior with video. A movie billboard for example
could be enhanced with a promo of the movie if the user
is wearing a compatible smart glass. Smart glasses with
facial recognition software could help employees spot
customers and display information about them.
Customers in stocks could be given smart glasses to
display information about products and to help them
direct through the stores quicker. At the same time the
glasses could track their eyes assembly data about where
they look. This data could be used to limit the value of
advertising space. This data would then be used to sell
the space at a more appropriate and maybe greater price.
Sports During most sports one does not have a lot of time
to devote to a guessing device and it is impossible to use
one’s hands to interact with the device. These limitations
make use of smart phones during sports very unfeasible.
This is even true for strength sports where you would
have the cerebral capacity to interact with a smart device.
Smart glasses are perfect for exposing evidence during a
sport activity. The evidence that is useful for a person
doing sports would be performance measurement,
performance comparison, and maybe navigation,
notifications about weather or messages and so forth.
The information can be exposed to the wearer in his
peripheral vision without alarming the sports activity.[5]
The smart glasses could also be used to take pictures or
video during sports started by a speech command.
Custom software and sometimes hardware for each sport
would be necessary as smart glasses for surfers would
diverge a lot from smart glasses for snow sports.
143
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
X.
CONCLUSION
There is a lot of fascinating applications which can
only or a lot easier be implemented with smart glasses
than with old-style computing devices. It is feasible that
there will be large heaps into research and development of
smart glasses because the entertainment industry, military
and businesses can value from smart glasses and there
might be a high buyer demand for them soon. The
hardware that will be offered in the near future still has its
pitfalls and will perhaps need a few years and rehearsals
to be fixed. Nevertheless the prototypes available to day
are very hopeful and it might happen that smart glasses
will be a part of our future everyday life. Be it in cinemas,
at the workplace, in our acting systems or as always
connected companion device.
REFERENCE
[1] Andrea Colaco et al. Mime: compact, low power 3D gesture
sensing for interaction with head mounted displays. In Proceedings
of the 26th annual ACM symposium on User interface software
ISBN: 978-93-5619-947-7
and technology (UIST ’13),2013.
[2] ValentinHeun et al. Smarter objects: using AR technology to
program physical objects and their interactions. In CHI ’13
Extended Abstracts on Human Factors in Computing Systems
(CHI EA ’13),2013.
[3] Roberto Manduchi, James Coughlan. (Computer) vision without
sight. ACM Communications, Volume 55, Issue 1, Pages 96-104,
January2012
[4] Steve Mann. Continuous lifelong capture of personal experience
with EyeTap. In Proceedings of the the 1st ACM workshop on
Continuous archival and retrieval of personal experiences,
(CAPRE),2004.
[5] Gabor S ´ or¨ os, Florian Daiber, and Tomer Weller. ¨ Cyclo: a
personal bike coach through the glass. Proceedings of SIGGRAPH
Asia 2013 Symposium on Mobile Graphics and Interactive
Applications, 2013.
[6] Feng Zhou et al. Trends in augmented reality tracking, interaction
and display: A review of ten years of ISMAR. In Proceedings of
the 7th IEEE/ACM International Symposium on Mixed and
Augmented Reality,2008.
[7] http://media.smashingmagazine.com/wp-content/ uploads/ 2012/
11/MISCh05-028.jpg
[8] http://www.catwig.com/ google-glass-teardown/ teardown/glassclearshade-isometric.jpg
[9] http://www.dailymail.co.uk/sciencetech/
article-2306382/
10.https://3.imimg.com/data3/ER/XI/MY-3459895/oculus-riftvirtual-reality-500x500.jpg
144
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Impact of Digitalization of Human Resource
Functions in Private and Public Sector Life
Insurance Companies
Ausaf Ahmad Khan
Ph. D. Scholar, Department of Commerce and Business Management, Integral University Lucknow
Abstract: Private as well as public organizations have been
using digital tools in recent years. Functions of HRM also
had got impacted by Digitalization. Digitalization has become
very important for the functions of HR to make their work
simple, economical, and fast. Factors such as technological
people and organizational tools are necessary for successfully
implementing new digital tools in the functions of HRM in an
organization. The term "Insurtech" is used to define new
technologies that have the potential to be innovative in the
insurance industry as well as have the potential to influence
regulatory practices in the market of insurance. The key
driver of change in the insurance sector is the innovation
through digital tools, and it has also led to infinite efficiency
gains, even though all such transformations can have
uncertainty and doubts. Digitalization can be noticed in
almost every sector, and the insurance sector is no exception
to such development and has the possibility of new methods
and greater opportunities. A sample of190 people from Life
Insurance Company was surveyed to know how a
Digitalization of Human resource function is beneficial for
life insurance companies of the private and public sector.The
study concludes thatthere is a significant difference between
the level of implementation of Digitalization between public
and private sector life insurance companies.
Keywords: e-HRM, insurance companies, digitalization HRM,
Digital transformation.
I. INTRODUCTION
With the advancement in technologies, society has
undergone a rapid and intellectual transformation in recent
decades. Technology advancement has spread into almost
every sector. Because of this technological transformation,
the current period is known as the "digital era." In present
times, the challenges that are being brought by
Digitalization have needed some changes in the model of
human resource management (HRM). How human
resource interacts with data and information has changed
by implementing new technologies. By using digital
technologies, many processes and functions of human
resources like the process of recruiting and selecting,
performance management, and planning, and changed
profoundly and reformed as well as improved the services
that are offered to the stakeholders. In the past, the
relevant information was kept in a paper document by
human resources, but with the advancement of digital
technology and the human resource information system,
the work of human resource functions have been
simplified, and the technology has simplified the
management of data and has saved a lot of time of Human
ISBN: 978-93-5619-947-7
resource system giving them more time to plan their HR
activities. Strohmeier and Parry (2014).
The HR activities are obviously impacted by the
digital technologies and have changed the role played by
the HR managers to dynamic and strategic from static. The
digital skills gap will be filled by the new HR strategies,
develop loyalty and engagement, management of
diversity, enable integration between work and personal
life as well as retain talented employees. The new HR
managers would have to act primarily as strategic to fulfill
the new HR role, they need to know the context of the
business and how to impose the external elements, and
they would have to work as change agents as well as
technological proponents who know how to access, assess,
examine and to share of the information and the
application of new technologies in their work. The
managers of Human resources themselves have to
understand and acquire digital skills and improve their
digital knowledge Chytiri ( 2019).
In the 21st century, digital transformation or
Digitalization has become a major trend in the market.
Transformation of the society at various levels has been
brought by Digitalization, and it also has various
implications for the managers of human resource
management as well as on the organization. To remain
competitive, organizations must be ready to adopt new
technologies. Digitalization has become important for
organizations, and it has become a required transformation
by which organizations cannot escape Das &Suresh
Krishna ( 2019).
Leverage has been provided by the Information and
Communication Technology (ICT) to reconfigure the
fundamental services that are being provided by the
human resource functions, not just with regards to the
range of activities that are automated but also in the pointof-access for the internal stakeholders. Many dynamic
organizations are well-equipped with various latest
instruments that help them in the delivery of human
resource services. It is known that applying tools of eHRM at a different level of growth and application of all
the tools are not fully utilized. To get the maximum
benefit from e-HRM, there is a need for the organizations
to implant tools that are relevant for them and, along with
that, give information, awareness, as well as training to the
employees who do not have any digital knowledge or do
not have trust to use these instruments. At the corporate
145
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
level, in many of the organizations, these tools are very
functional. However, the application is very limited at a
certain level. In the same way, applying all such tools is
limited to the employees of a certain level or to those who
are higher in the spectrum, and there is a scarcity of the
collateral effect. The facts are available that organizations
in the public sector are stragglers in applying various tools
of e-HRM as compared to the organizations of the private
sector and there is a need for these organizations to take
more initiatives to harness the advantages of e-HRM.
Awareness programs need to be conducted by the HR
personnel and more workshops along with seminars for
their staff members and line managers to make e-HRM
successful. One of the biggest encouragement for the
employees to adopt e-HRM tools would be by providing
them a link to select and track their path of career Sinha &
Mishra ( 2014).
II. LITERATURE REVIEW
Prakash, Krishna & Mores (2019) stated that the
automation of computers in the present time had pushed
all the chief organizations to make all departments more
digitalized. All sectors worldwide have started adopting
Digitalization for the craziest disposal of their services.
The HR department must urgently need to link up with the
Digitalization for instant solutions of their problems. As
there is e-HRM available, there is a requirement to refer
ICT by the recruiters in an organization. The system of eHRM refines the system of e-recruitment and e-learning
Milon (2019) explained that the application of e-HRM
in the life insurance companies is not up to the level of
satisfaction as it has some limitations like absenteeism of
employees, turnover rate, training facilities are inadequate,
poor tools of motivation, poor welfare facilities,
unavailability of a performance rating system, etc. There is
a need for the organizations to arrange good facilities of
training for their employees. It would have life insurance
companies have positive motivation, leadership, good
facilities related to welfare for human resources.
Pushpalatha & Pandian (2021) stated that in an era of
digital transformation, the areas of human resource
planning, management of rewards, performance
management, training and developments, safety and health
of employees, and relations with the employees have
totally transformed. Now HR managers have to play a
more active role and give their contribution towards the
era of Digitalization to ensure that the human capital is
skilled as well as educated in order to meet the demand of
Digitalization. To ensure the strategies of Digitalization,
all HR operations must be aligned properly. Human
resource data systems have tremendously changed the
services of Human resources that are being managed and
delivered by the organization.
Raghavendra, Priyanka & Chaithanya (2018)
revealed that the system of e-recruitment is very
convenient and helpful for many of the organizations who
ISBN: 978-93-5619-947-7
have already adopted the technology. The purpose of this
study was to identify the benefits of e-recruitment. The
study found that recruitment is not about just hiring
people. It is about hiring the right candidate for the right
organization. The E-recruitment system has many benefits
for those who are looking for a job as well as for the
recruiter also. E-recruitment is cost-saving, time-saving,
and the quickest way to hire candidates for the
organization. In the present time, many large as well as
small organizations have adopted the technology and are
enjoying its benefits. It is dependent upon technology and
internet connection.
Bala (2015) revealed that in present times, the
transformations begin and end on the basis of the demand
and dominance of Digitalization. Overall, it is fine to say
that the transformations have led to the present time to be
called as "digital age." These changes brought by
Digitalization have made a huge impact on the lives of
Human Resource Management as well as on the lives of
employees. Talking about digital technologies, all these
transformations required attention. Looking at the role
played by the HR managers and professionals, the study
found that there is an element of communication. The
transformation in technology plays an essential role in the
changes in the way of communication. The HR
technologies need to enhance in order to survive in this
digital age.
Samson &Agrawal (2020)explained that attracting
better talents from the market by HR professionals is
enabled by Digitalization, it also helps them in keeping a
close track of the performances of the employees,
anticipating their training requirements, and Digitalization
also helps in encouraging them to be engaged by finding
out their potentials and acknowledging them.
Digitalization has increased the global reach of
organizations, and that is considered an achievement for
the company. The goal of the Digitalization of the
company is to enhance its performance. In order to be
excellent, the HR professionals must have to be more
strategic and proactive and should gain expertise in the
future social as well as technical trends.
Okoronkwo (2021) stated that the Digitalization of the
HRM has transformed the traditional style of the business
model. The functions of Human resource management
have changed totally by the increased usage of software
related to employees, IT-enabled human resource
functions, social networking, and mobile solutions. The
Digital approach has been infused by organizations to
handle their human resources. There is a requirement to
constantly develop and innovate new and strategic human
resource practices to remain competitive in the market and
business. Upgrading the HR services is important to
deliver the best results.
Mohammed (2019) revealed that it is human capital
on which the success of an organization depends, and
recruitment that is done by the department of human
146
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
resources is very important to generate human capital for
the organization. The traditional method of recruiting
people that was paper-based has now been reacquired to
some level through e-recruitment system in the majority of
the companies by the application of technology and the
internet. The success of an organization is dependent upon
the skills, talents, experience, and intellectual capital of
their employees, along with the effective recruitment that
is being done by the human resource department giving
rise to the generation of the intellectual capital of the
organization. In an e-recruitment system, the resumes of
candidates are scanned through the technology, and it is
favorable for the HR department in the process of hiring as
well as for the job seekers. E-recruitment helps job seekers
in submitting their resume to different recruiters from
various locations as well as allow them to store
information. Organizations adopting e-recruitment
increases the connectivity between organizations,
managers, and the outcome in a transformation of the
organization.
Rani, Raman, & Kumar (2019) stated that this study
was conducted to identify the practices of HRM in both
public as well as in life insurance companies of the private
sector. Five factors of HRM practices are being found in
the study is Recruiting and Selecting, Compensating and
Rewarding,
Performance
appraisals,
Training&
Development, and Teamwork. In a study, it is found that
public insurance companies have good HRM practices in
comparison to private life insurance companies.
The research work found that most of the workers are
happy with the functions of the HRM department in public
insurance companies. The work observed significant
differences in HRM practices of public and private
insurance companies on the dimensions like Recruiting
and Selecting, Compensating and Rewarding, Performance
appraisals, Training & Development, and Teamwork.
Nivlouei (2014) found that implementing e-HRM is
an opportunity for the delegation of data entry of
employees. E-HRM simplifies the usage of the human
resource marketplace and also offers more self-services to
its employees. Business solutions get advanced by e-HRM
that gives a complete online platform for the management
activities, processes, information, and data needed by the
HRM in any modern organization. Digital HRM provides
easy, efficient, and reliable instruments to use and is
accessible by a huge number of people.
Swaroop (2012) stated that in organizations in the
present time, web-based applications are introduced
frequently for HRM purposes and are called e-HRM
systems. The rapid development of the internet has
boosted the implementation as well as application of
Digitalization in HRM activities. It is suggested by the
Human Resource Management surveys that both public
and private organizations have started implementing
Digitalization in their organizations. Islam (2016) stated
that nowadays, human resources have big prospects and
ISBN: 978-93-5619-947-7
are very important for organizations. Technology and
systems are great instruments that help to enable life easy
and assist in managing people in the organization. At this
age of global transformation from manual into technology,
the functions of human resource management is a vital key
for the success of the organization and need to be
addressed for the adoption of technology. The study found
a significant difference between the private and public
companies, and it is found that private organizations are in
a better position. E-HRM is the latest and interesting topic
to study and for organizations to adopt. In comparison to
private companies, public companies need to take more
initiative and adopt the technology for the betterment of
their human resource management department.
III. OBJECTIVE OF THE STUDY
 To know how Digitalization of Human resource
functions is beneficial for life insurance companies of
private and public sector.
 To know the difference in Level of Implementation of
Digitalization of Human Resource Function in public
and private sector life insurance companies.
IV. HYPOTHESES OF THE STUDY
Ho - There is no difference between Private and Public
Life Insurance Companies with Respect to the
implementation of Digital HRM.
Ha -There is a significant difference between Private and
Public Life Insurance Companies with Respect to the
implementation of Digital HRM.
V. RESEARCH METHODOLOGY
A sample of 190 people from Life Insurance Company
was surveyed to know how Digitalization of Human
resource functions is beneficial for life insurance
companies of private and public sector. The study is
comparative in nature and the primary data for the study is
collected through random sampling with the help of a
questionnaire particularly designed for the present study.
A comparative mean and independent sample t-test was
applied to analyze the data and get the appropriate results.
VI. RESULT AND DISCUSSION
Table 1 is demonstrating general profile of the
respondents which show that total 190 people were
surveyed in which 54.2% are male and 45.8% are female.
Among them 41.6% are from the age group of 34-40 yrs,
42.6% from 40-45 yrs and rest 15.8% are above 45 yrs of
age group. 50% of the respondents are from private life
insurance company and 50% are from life insurance
Company of the public sector. 33.2% of the respondents
are working as HR Directors, 37.4% as Recruiting
managers and rest 29.5% are working as HR information
specialist in Human Resource department of their
respective companies.
147
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Table 1. General profile of the respondents
Variables
Gender
Males
Females
Total
Age
34-40 yrs
40-45 yrs
Above 45 yrs
Total
Type of company
Private
Public
Total
Designation
HR Director
Recruiting Manager
HR information specialist
Total
Respondents
%age
103
87
190
54.2
45.8
100
79
81
30
190
41.6
42.6
15.8
100
95
95
190
50.0
50.0
100
63
71
56
190
33.2
37.4
29.5
100
Table 2 compares the mean values for the level of
implementation of Digitalization of Human Resource
Function in life insurance companies of private and public
sector. It is observed that the implementation of
Digitalization is more in private sector companies as it
reduces paperwork of organization with mean value 4.79
as compared to Public Sector Company with mean value
3.71. Similar results are shown by private sector which
says that Digitalization reduces manual efforts in
companies showing higher mean value 4.65 as compared
to the public sector (3.49).
Digitalization helps HRM to provide more effective
training to employees for their sales practices showing
mean values 4.53 and 3.97 in private and public
companies, respectively. The private companies say that
Digitalization helps HR to make their work simple and
fast with mean value of 4.39 as compared to public (3.60).
The private company shows higher mean value as they say
that Digitalization keep the client’s information safe for
longer time (4.31) as compared to public (3.24) and
Digitalization increases the connectivity between
organizations, their employees and clients with mean
value 4.32 and 3.11 for private and public sector
companies. Higher mean values are shown by the
company of private sector as they accept that
Digitalization makes the process of hiring and talent
recognition smooth 4.27 as compared to public sector 3.29
and similar results are shown by private sector for
Digitalization helps in managing the records of the clients
in much organized way 4.23 and public sector companies
3.23. Further Independent Sample t-test was applied to
know the difference Level of Implementation of
Digitalization of Human Resource Function in public and
private sector life insurance companies.
Table 3. Independent Sample t-test
SI.
No.
1.
2.
Table 2. Digitalization of Human Resource Function
Sr.
NO
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Digitalization of Human Resource
Function
Digitalization helps HR to make
their work simple and fast
Digitalization
reduces
manual
efforts in companies
Digitalization reduces paperwork of
organization
Digitalization keep the client’s
information safe for longer time
Digitalization manages all the
functions of human resource more
effectively and efficiently
Digitalization makes the process of
hiring and talent recognition smooth
Digitalization helps in managing the
records of the clients in much
organized way
Digitalization
increases
the
connectivity between organizations,
their employees and clients
Digitalization helps HRM to
provide more effective training to
employees for their sales practices
Digital platform increases the
relevance of the business models of
insurance companies
ISBN: 978-93-5619-947-7
Life Insurance
Companies
Private Public
3.
4.
4.39
3.60
4.65
3.49
4.79
3.71
4.31
3.24
6.
3.69
3.11
7.
4.27
3.29
4.23
3.23
4.32
3.11
5.
8.
4.53
9.
3.97
10.
4.11
3.66
Implementation of
Digitalization of Human
Resource Function
Digitalization helps HR to
make their work simple
and fast
Digitalization
reduces
manual
efforts
in
companies
Digitalization
reduces
paperwork of organization
Digitalization keep the
client’s information safe
for longer time
Digitalization manages all
the functions of human
resource more effectively
and efficiently
Digitalization makes the
process of hiring and talent
recognition smooth
Digitalization helps in
managing the records of
the clients in much
organized way
Digitalization increases the
connectivity
between
organizations,
their
employees and clients
Digitalization helps HRM
to provide more effective
training to employees for
their sales practices
Digital platform increases
the relevance of the
business
models
of
insurance companies
df
t value
Sig.
188
3.63
0.00
188
5.35
0.00
188
4.85
0.00
188
5.40
0.00
188
2.77
0.01
188
4.94
0.00
188
4.56
0.00
188
5.20
0.00
188
2.49
0.01
188
2.83
0.00
148
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Table 3 is showing independent sample t-test to know
the difference in Level of Implementation of Digitalization
of Human Resource Function in public and private sector
life insurance companies. It was from the table that the
value in the significance column for all the statements is
significant (below 0.05). Hence, there is a significant
difference between the level of implementation of
Digitalization between public and private sector life
insurance companies.
VII. SUGGESTIONS
The outcome of the study shows that the adoption of
technology and the Digitalization of Human resource
functions are proved to be beneficial for the organization
as it manages all the functions of human resources more
effectively and efficiently, such as hiring, rewards, and
recognition. Compensation, issues of employees etc. are
handled more effectively after the Digitalization.
Implementing Digitalization helps in making the
organization successful as Digitalization make the work
easy, simple and fast, it also reduces manual efforts.
Digitalization reduces paper work and keeps the
information safe for a longer time. Digitalization of the
human resource functions is totally dependent upon the
internet and network. T-test has been done to find out the
outcome of the research, all the statements are found to be
significant as the significant values for all statements is
less than 0.05.
X. FUTURE DIRECTION
This study extends the existing research on the
subject. Although interest in the HRM digitalization
function has grown considerably in recent times but there
is still no clear definition of what the causes and
consequences of the success of the digital transformation
process can be; this study intends to represents a step in
this direction and to answer the following research
question: "What are the factors that determine the success
of the digitalization of human resource management
function in context of Indian Life Insurance Industry?”
In this context, HR people should rethink their role, from
a service provider to a solution facilitator and a promoter
of a healthy organizational culture.
REFERENCES
[1]
[2]
[3]
[4]
[5]
VIII. CONCLUSION
The study concludes that the implementation of
Digitalization of Human Resource Function is more in
Life Insurance Companies of the private sector as it helps
HR to make their work simple and fast, reduces manual
efforts in companies, reduces paperwork of organization,
helps HRM to provide more effective training to
employees for their sales practices and makes the process
of hiring and talent recognition smooth. It is also found
that there is a significant difference between the level of
implementation of Digitalization between public and
private sector life insurance companies.
IX. RECOMMENDATION
Looking at the complete study, it is observed that
there is less Digitalization in the Public Life insurance
companies. Therefore, Public life insurance companies
must learn and implement Digitalization in Human
Resource functions to remain competitive in the market in
urban and later on in the rural branches. Further, they can
do outsource the Digitalization of their branches and can
also partnership with public-private agencies. More
investments need to be done to for the improvement of the
HRM functions and to convert them into digitalized mode.
Initiatives need to be taken by the government side as well
to promote the Digitalization of the HRM functions,
particularly in the public sector organizations.
ISBN: 978-93-5619-947-7
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
Bala, I. (2015). HRM in the Digital Age – Digital Changes and
Challenges of the HR Profession, International Journal of Business
Management, 2(2), 1259-1266.
Chytiri, A.P. (2019). Human Resource Managers’ Role in the
Digital Era, Journal of Economics and Business, 69(1-2), 62-72.
Das, S. & Sureshkrishna, G. (2019) Challenges of Digitalization for
HR Professionals: An Exploratory Study, International Journal of
Innovative Research in Technology, 6(1), 1014 - 1018.
Islam, M.S. (2016). Evaluating the Practices of Electronic Human
Resources Management (E-HRM) as a Key Tool of TechnologyDriven Human Resources Management Function in OrganizationsA Comparative Study in Public Sector and Private Sector
Enterprises of Bangladesh, Journal of Business and Management,
18(11), 1-8.
Milon, M. (2019). Present Scenario of Human Resource
Management (HRM) Practices in the Life Insurance Companies:
Bangladesh Perspective, Canadian Journal of Business and
Information Studies, 1(6), 17-27.
Mohammed, S. (2019). The Introduction and Use of Electronic
Recruitment (E-recruitment) On the Recruitment Process in
Organizations: Benefits of This Technology for Recruiting
Organizations, Global Journal of Human Resource Management,
7(5), 45-59.
Nivlouei, F.B. (2014). Electronic Human Resource Management
System: The Main Element in Capacitating Globalization
Paradigm, International Journal of Business and Social Science,
5(2), 147-159.
Okoronkwo, G.I. (2021). Digitization of Human Resource
Practices: The Realities in the New Normal, International Journal
of Business Systems and Economics, 13(4), 243 – 261.
Prakash, N.B., Krishna, G. & Mores, S. (2019). Digitalization of
HRM Practice in the Present Scenario, International Journal of
Research in Management Studies, 4(1), 1-5.
Pushpalatha, S.&Pandian, R. (2021). Digitalized Human Resource
and its Perseverance in HR Operations, International Journal of
Science Technology and Management, 10(2), 12-27.
Raghavendra, B., Priyanka, C. &Chaithanya, G. (2018). A study on
E-recruitment, International Journal of Advanced Research in
Science and Engineering, 7(3), 843-852.
Rani, L., Raman, G.P., & Kumar, V. (2019). A Study On HRM
Practices In Select Public And Private Sector Life Insurance
Companies In Chennai City, The International Journal of
analytical and experimental modal analysis, 11(10), 2129-2142.
Samson, H. &Agrawal, V. (2020). Effectiveness of Digitalization in
HRM: An Emerging Trend, J. of Critical Reviews, 7(4), 4082-4088.
Sinha, B.C.& Mishra, M. (2014). E-HRM Tools: An Empirical
Study in Select Indian Organizations, International Journal of
Business and Management Invention, 3(9), 71-83.
Swaroop, K. R. (2012) E-HRM and how IT well Reduce the cost in
the organization, Journal of Marketing & Management Review, 1
(4), 133-139.
149
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
DC-IDS: Distributed Collaborative Intrusion
Detection Systems for Vanets
C. Rajkumar1, Dr. T. Sangeetha2, P. Panneer Selvan3
Ph.D. Research Scholar, Department of Computer Science, Kongu Arts and Science College, Erode
2
Associate Professor, Department of Computer Science, Kongu Arts and Science College, Erode
3
Assistant Professor, Department of Computer Science, Kaamadhenu Arts and Science College, Sathyamangalam
1
Abstract: The privacy-preserving technique for distributed
collaborative-based learning is critical for accomplishing
private cooperation; numerous threats are possible, ranging
from passive eavesdropping to active interference. Intrusion
detection systems (IDSs) are critical devices that identify
malicious activities and help to minimize attacks. Otherwise,
distributed machine learning causes training data privacy
breaches. The flow of data between nodes creates a
fundamental obstacle to collaborative learning. A rogue node
may gain sensitive information from other nodes by inferring
from observed data. Machine learning-based Distributed
collaborative IDS (DC-IDS) for VANETs that respect
privacy. To identify intrusions in VANETs, the proposed
technique applies the alternating direction method of
multipliers (ADMM) to a class of empirical risk minimization
(ERM) problems and trains a classifier. We employ
differential privacy to capture the DC-privacy IDS' notation
and present a dual variable approach to achieve dynamic
differential privacy. We suggested a Distributed collaborative
intrusion detection system based on machine learning that
protects user privacy (DC-IDS). To decentralize the
empirical risk minimization (ERM) issue, the alternating
direction multipliers (ADMM) strategy is applied.
Keywords: VANET, IDS, DC-IDS, ERM, ADMM, Collaborative
IDS.
I. INTRODUCTION
The vehicular ad hoc network (VANET) is a verbal
communication device that provides the distribution of
safety-related information, site visitor management,
navigation, and street services [1]. However, it is well
understood that VANETs are vulnerable to assaults
ranging from passive eavesdropping to active interference.
An attacker, for example, may eavesdrop on and record
the communications of other cars, then replay them to get
access to specific assets such as toll services [2]. An
attacker may tamper with a particular vehicle, spoof its
identity, and issue false warnings, causing toll road traffic
to be disrupted [3].
Intrusion detection is critical in minimizing the danger
of VANETs by using signature-based and anomaly-based
methodologies to identify hostile actions. Among the
numerous
IDS
designs
suggested,
Distributed
collaborative IDSs (DCIDSs) have been proposed to
enable the sharing of detection information about known
and new attacks and improve detection accuracy [4].
Learning methods on distributed computing devices offer
a fantastic foundation for DCIDSs to characterize
adversarial behaviors using local datasets and
ISBN: 978-93-5619-947-7
exchange expertise to increase detection accuracy [7].
Network- level intrusion assaults on computer devices
make use of the distributed collaborative nature of
VANETs and design a system structure of a distributed
machine-learning-based DCIDS that operates entirely
inside a VANET [8].
Fig. 1: VANET Communication Architecture
The DCIDS enables each vehicle to use the
knowledge of the labelled coaching statistics of other cars,
increasing each vehicle's coaching data measurement
without taxing each vehicle's storage capacity.
Furthermore, the time-consuming process of gathering
labeled information may be distributed among all cars in a
VANET, reducing the stress on each vehicle. Furthermore,
the DCIDS enables the motors to communicate knowledge
about each other rather than directly replacing the training
data [9]. Furthermore, the DCIDS increases the scalability
of education records processing and enhances decisionmaking pleasure while cutting computational costs. The
alternate direction method of multipliers (ADMM) is
suited for decentralizing the computer learning issue
across a network by allowing nodes to communicate their
classification results and yield the best classifier achieved
via centralized learning. Regardless of the distributed
nature of the learning algorithm, data communications
between distinct vehicles can cause serious privacy
concerns about the coaching statistics in each vehicle
when an adversary can examine the outcome of the
learning and extract the sensitive facts of each vehicle's
education data. The adversary might be either a VANET
vehicle that watches its neighbors or a hostile outsider
examining learning outputs [10].
Intrusion detection systems (IDSs) are critical devices
for mitigating risks by identifying malicious actions, and
cooperation among vehicles in VANETs may increase
detection accuracy by transmitting their experiences across
nodes. In the Distributed collaborative learning of the
DCIDS for a VANET, the DVP is proved to ensure
150
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
dynamic differential privacy [11]. A design method for
determining the ideal value of the privacy parameter via
the solution of an optimization problem to manage the
trade-off between security and privacy in a VANET
Distributed machine learning is an appropriate platform
for developing scalable and deployable Distributed
collaborative detection algorithms across VANETs. A
distributed collaborative intrusion detection system based
on machine learning respects privacy (DC-IDS). To
decentralize the empirical risk minimization (ERM) issue
that represents Distributed collaborative learning, the
alternate direction method of multipliers (ADMM)
methodology is applied.
II. BACKGROUND STUDY
The authors, S. H. Mahin et al. [1], suggested an
anomaly-based technique for detecting and intercepting
Black Hole Attacks. The purpose of this article was to
offer a useful method for detecting and intercepting this
attack using the Dynamic MANET on-demand (DYMO)
routing protocol. This job entails three modules: planting,
detection, and, finally, interception against the black hole
assault. MATLAB software is used to introduce an IDS to
the concept of machine learning. Relative examination of
IDS based on classifiers such as K-Nearest Neighbor,
Support Vector Machine, Decision tree, and neural
network is also performed to verify that the best
practicable classifier is chosen for administering the IDS.
The job is then analyzed using several metrics such as
packet loss rate, average transmission latency, Packet
Delivery Ratio, and throughput.
J. Chen and C. Chen [2] presented event processingbased IDS to tackle the real-time IDS challenge in
VANET. They created the IDS architecture using this
technique based on the Event Processing Model (EPM). It
is a rule-based intrusion detection system (IDS) in which
rules are stored in a Rule Pattern Repository and use
Epser's SQL and EPL as a reference. According to the
results, this technique used more CPU resources, less
memory, and took less time to process than standard IDS.
A rule-based intrusion detection system framework for
VANET was suggested by A. H. Farooqi et al. [3]. This
method is divided into three stages. The first step is the
local auditing phase, which checks packets to ensure they
come from a legitimate adjacent node. The second step is
the rule application phase, which operates in promiscuous
mode. The third step is the intrusion detection phase,
which identifies routing attempts by evaluating data
obtained from the content suppression unit. This security
measure may detect only routing attacks.
The author, C. B. Dutta and U. Biswas [4],
investigates the wormhole attack's impact on Optimized
Link State Routing (OLSR), a common proactive routing
strategy for VANET. In this article, a modified variant of
the wormhole assault termed camouflaging wormhole
attack is devised, and a matching specification-based IDS
is constructed to detect and block this attack. Finally, the
ISBN: 978-93-5619-947-7
suggested algorithm's performance is evaluated using
Network Simulator (NS2). The following experimental
findings demonstrate the efficacy of the suggested
strategy.
C. Cervantes et al. [5] suggested INTI, a sinkhole
detection system for VANET, implemented in the
simulator. The suggested system is divided into four parts.
The first module is the Cluster configuration module,
which categorizes nodes such as members, leaders, and
affiliated nodes based on their network roles. The second
is routing module monitoring, in which the observer node
counts the number of transmissions done. The final
module is the sinkhole attacking node detection module.
The fourth module is the attacker isolation module, which
separates the malicious node from the cluster while raising
an alert to notify its adjacent nodes. The simulation results
reveal that a detection rate of 92 percent is attained. This
method only identifies sinkhole attacks; hence, work may
be improved by detecting other forms of attacks.
SVELTE is a real-time intrusion detection system in
IoT proposed by S. Raza et al. [6]. SVELTE is the sole
IDS accessible in VANET, and Contiki OS uses it. In this
architecture, the 6LoWPAN Border Router has three
major centralized pieces. This method can only identify
internal network spoofing, sinkhole, and selective
forwarding attacks
III.
SYSTEM MODEL
The ADMM technique is utilized to decentralize a
centralized ERM issue in the VANET that simulates
Distributed collaborative learning. We also define
dynamic differential privacy and explore the privacy
challenges related to ADMM-based Distributed
collaborative learning. The local detection engine then
analyses the pre-processed system data using classification
algorithms. The P-CML engine is launched if the vehicle
user requests that the current classifier be upgraded. The
local detection engine uses the newly retained classifier to
examine system data. Otherwise, the current classifier is
utilized to categorize incursions.
The alert is sounded whenever any incursion is
categorized. The privacy-preserving mechanism is based
on the concept of dynamic differential privacy: Dual
Variable Perturbation (DVP), and it describes the
mathematical models of all three P-CML components: the
PP mechanism, the DLL, and the CC engine. By
introducing adequate noise into the deterministic
algorithms, DVP is DDP. The ADMM technique then
decentralizes a centralized regularised empirical risk
minimization (ERM) issue. The privacy problems are
discussed, and dynamic differential privacy is defined.
Vehicles and infrastructures are considered identically in
our paradigm, except that infrastructures are static and
have higher data processing capability. Distributed
collaborative learning should be disseminated via a
VANET without direct data exchange in our paradigm.
151
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
The alternating direction multipliers (ADMM) technique
is a good choice for our model. We concentrate on a class
of distributed ADMM-based empirical risk minimization
(ERM) as the supervised learning algorithm employed in
Distributed collaborative learning in this paper.
(ERM) issue. The privacy problems are discussed, and
dynamic differential privacy is defined. Vehicles and
infrastructures are considered identically in our paradigm,
except that infrastructures are static and have higher data
processing capability.
3.1 Network Design
Distributed collaborative learning should be
disseminated via a VANET without direct data exchange
in our paradigm. The alternating direction multipliers
(ADMM) technique is a good choice for our model. We
concentrate on a class of distributed ADMM-based
empirical risk minimization (ERM) as the supervised
learning algorithm employed in Distributed collaborative
learning in this paper.
Privacy protection mechanisms often obstruct
information exchange and disincentivize nodes from
cooperating. As a result, a privacy-preserving method is
required to maintain the privacy of training data
throughout the network and create a successful DCIDS.
Differential privacy is a well-defined notion that may give
a strong privacy assurance by ensuring that a modification
to any one item in the dataset only marginally changes the
distribution of the dataset's answers. The network-level
intrusion targets computer systems, and the system
architecture of a distributed machine-learning-based
DCIDS over a VANET takes use of the distributed
collaborative nature of the VANETs. The DCIDS allows
each car to use the knowledge of other vehicles' labeled
training data, increasing the training data amount for each
vehicle without really burdening the storage capacity of
each vehicle. Furthermore, the time-consuming process of
gathering tagged data may be dispersed among all cars in a
VANET, lowering each vehicle's effort. Furthermore, the
DCIDS allows the cars to communicate information about
one another without explicitly sharing training data.
Furthermore, the DCIDS enables the scalability of training
data processing and increases decision-making quality
while lowering computing costs.
3.2 DC-IDS Model
Onboard units (OBU), application units (AU), and
roadside units (RSU) comprise a generic VANET (RSU).
Communication between OBUs (vehicle to vehicle) or
between an OBU and an RSU (vehicle to infrastructure) is
based on in-car wireless access (WAVE). The RSUs may
also link to other infrastructures, such as other RSUs and
traffic management centers, and communicate with one
another (infrastructure to infrastructure) via other wireless
technologies. Each vehicle is outfitted with an OBU and
one or more AUs. It also features a collection of sensors to
gather data and utilize the OBU to communicate with
other OBUs or RSUs. Appendix A contains information
on the three primary components of the VANET
architecture for interested readers. A pre-processing
engine, a local detection engine, and a privacy-preserving
Distributed collaborative machine learning (P-CML)
engine comprise the Distributed collaborative system.
Algorithms depict the logical flow of a DC-IDS. The preprocessing engine collects and pre-processes real-time
VANET system data that defines the system actions.
3.3 Distributed private collaborative learning
The ADMM technique decentralizes machine learning
using a centralized regularised empirical risk minimization
ISBN: 978-93-5619-947-7
3.4 Private Collaboration
Dynamic differential privacy is a notation for data
privacy in the Distributed collaborative learning over a
VANET, an approach for the privacy-preserving
mechanism based on the definition of dynamic differential
privacy: Dual Variable Perturbation (DVP), and describes
the mathematical models of all three components of the PCML, namely, the PP mechanism, the DLL, and the CC
engine. By introducing adequate noise into the
deterministic algorithms, DVP is DDP
IV. RESULTS AND DISCUSSION
It usually refers to the consequences and facts
generated by the gadget for many end-users. The output is
the important reason for creating the device and the
foundation on which they evaluate the usefulness of the
application
The results of the simulation are positive concerning
performance. The Proposed system has used the NS2
simulator to evaluate the AODV protocol. The results are
compared with the method of CIDS and DC-IDS methods.
Fig. 2: Throughput Comparison for CIDS and DC-IDS Protocol
In Figure 2 x-axis denotes the total no of nodes, and
the y-axis denotes the throughput.
152
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Figure 5 illustrates the energy comparison for the
existing and proposed methods. In x-axis denotes the
Node density, and the y-axis denotes the Energy.
Fig.3: Packet drop Comparison chart
Figure 3 illustrates the packet drop comparison chart
for the existing and proposed system. In x-axis denotes the
no of slots, and the y-axis denotes the packet drop
frequency.
Fig.6: Packet delivery ratio
Figure 6 illustrates the packet delivery ratio
comparison for the existing and proposed system. The Xaxis denotes the delivery speed in milliseconds, and the yaxis denotes the PDR.
V. CONCLUSION
Fig. 4: Average Delay Comparison chart
Figure 4 illustrates the average delay comparison for
the existing and proposed methods. In x-axis denotes the
packet speed in milliseconds. And y-axis denotes the
Average Delay in seconds.
The distributed machine learning process inherently
causes training data privacy leaks—a distributed
collaborative intrusion detection system based on machine
learning that respects privacy (DC-IDS). The alternate
direction method of multipliers (ADMM) methodology is
used to decentralize the empirical risk minimization
(ERM) issue, which models Distributed collaborative
learning into the distributed ERM that is well-suited to the
nature of the VANET system. The design concept for
determining the ideal value of the privacy parameter issues
solves an optimization problem that optimizes both
security and privacy. The tests also looked at the effects of
varying VANET sizes and modifying VANET architecture
during Distributed collaborative learning.
REFERENCES
[1]
[2]
[3]
[4]
[5]
Fig.5: Energy comparison
ISBN: 978-93-5619-947-7
S. H. Mahin, F. Taranum, L. N. Fatima, and K. U. R. Khan,
―Detection and interception of black hole attack with justification
using anomaly based intrusion detection system in MANETs,‖ Int.
J. Recent Technol. Eng., vol. 8, no. 2 Special Issue 11, pp. 2392–
2398, 2019.
J. Chen and C. Chen, ―Design of complex event-processing IDS in
internet of things,‖ Proc. - 2014 6th Int. Conf. Meas. Technol.
Mechatronics Autom. ICMTMA 2014, pp. 226–229, 2014.
A. H. Farooqi, F. A. Khan, J. Wang, and S. Lee, ―A novel intrusion
detection framework for wireless sensor networks,‖ Pers.
Ubiquitous Comput., vol. 17, no. 5, pp. 907–919, 2013.
C. B. Dutta and U. Biswas, ―Specification based IDS for
Camouflaging Wormhole Attack in OLSR,‖ 23rd Mediterr. Conf.
Control Autom., pp. 960–966, 2015.
C. Cervantes, D. Poplade, M. Nogueira, and A. Santos, ―Detection
of sinkhole attacks for supporting secure routing on 6LoWPAN for
Internet of Things,‖ Proc. 2015 IFIP/IEEE Int. Symp. Integr. Netw.
Manag. IM 2015, pp. 606–611, 2015.
153
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
S. Raza, L. Wallgren, and T. Voigt, ―SVELTE: Real-time intrusion
detection in the Internet of Things,‖ Ad Hoc Networks, vol. 11, no.
8, pp. 2661–2674, 2013.
[7] S. Rehman, M. A. Khan, T. A. Zia, and L. Zheng, ―Vehicular AdHoc Networks ( VANETs ) - An Overview and Challenges,‖ J.
Wirel. Netw. Commun., no. May 2013, pp. 29–38, 2013.
[8] M. Kaur, S. Kaur, and G. Singh, ―VEHICULAR AD HOC
NETWORKS,‖ J. Glob. Res. Comput. Sci., vol. 3, no. 3, pp. 2010–
2013, 2012.
[9] G. S. Chirayil and A. Thomas, ―A Study on Cost Effectiveness and
Security of VANET Technologies for Future Enhancement,‖
Procedia Technol., vol. 25, no. Raerest, pp. 356–363, 2016.
[10] V. H. La and A. Cavalli, ―S ECURITY ATTACKS AND
SOLUTIONS IN V EHICULAR A D HOC N ETWORKS : A S
URVEY,‖ Int. J. AdHoc Netw. Syst., vol. 4, no. 2, pp. 1–20, 2014.
[11] M. Ali et al., ―Classification of Security Attacks in VANET : A
Review of Requirements and Perspectives,‖ Int. J. Innov. Res.
Comput. Commun. Eng., vol. 3, no. 3, March 2015, pp. 2339–2346,
2015.
[6]
ISBN: 978-93-5619-947-7
154
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Voice Based Email for Visually Challenged
Dr.T.S.Suganya1, Mrs. M. Divya2, Mrs. V. Devi3, Sunil S4, Tamil Selvan T5, Akshay Ashok6
1,2,3
Assist.Professor, 4,5,6Student
SRM Institute of Science and Technology. Chennai
Abstract: The Internet has become one of the most common
things that people use on a day-to-day basis. Also with the
growth of the internet, communication has also started to
play a vital role for sending and receiving important
information. Though there have been many advancements in
internet communication, No normal or naive visually
challenged person will be confident enough to use the generic
email system on their own. This is mainly due to the fact that
using them visual perception (ability to see). This research
aims at developing an Email System that will help even the
visually challenged to use the Email system without any
previous training or additional assistance.The system will not
let the user make use of any physical inputs and instead will
solely use Interactive Voice Response along with Text-toSpeech and Speech-to-Text Conversion. This System will also
be helpful for not just visually Challenge but other
differently abled people and people who cannot read.
Keywords: Visually Challenged, Interactive Voice Response,
Text-to-Speech, Speech-to-Text.
I. INTRODUCTION
Today the world is running on the basis of the
Internet. The Internet plays a vital role in the world of
Communication. Without the Internet no work can be
easily done today. E-mail is one of the main fields with the
use of the Internet. Among them Electronic mail (E-mail)
is one of the most dependable and reliable means of
communication. But there are people who are visually
challenged who can’t see things and can't use the generic
email system.
Among 7.9 Billion people as of now (2022) there are
around 2.2 Million people are Visually Challenged. The
only way which will help them to use the email system is
by Speech Recognition and screen readers, so we came up
with our Project called Voice Based Email System for
Visually Challenged. In this system the usage of keyboard
and mouse is completely avoided. All the Interactions
between the system and the user is done through IVR
(Interactive Voice Response). Our architecture will help
them to operate the system easily and efficiently. Our
System can also be used by the Handicapped People.
II. INTERACTIVE VOICE RESPONSE
Interactive voice response (IVR) is a technology that
allows a computer to interact with humans through the use
of voice and DTMF tones input via a keypad. In
telecommunications, IVR allows customers to interact
with a company’s host system via a telephone keypad or
by speech recognition, after which services can be
inquired about through the IVR dialogue. IVR systems can
respond with pre-recorded or dynamically generated audio
ISBN: 978-93-5619-947-7
to further direct users on how to proceed. IVR systems
deployed in the network are sized to handle large call
volumes and also used for outbound calling, as IVR
systems are more intelligent than many predictive dialer
systems.
IVR systems can be used for mobile purchases,
banking payments and services, retail orders, utilities,
travel information and weather conditions. A common
misconception refers to an automated attendant as an IVR.
The terms are distinct and mean different things to
traditional telecommunications professionals—the purpose
of an IVR is to take input, process it, and return a result,
whereas that of an automated attendant is to route calls.
The term voice response unit (VRU) is sometimes used as
well. DTMF decoding and speech recognition are used to
interpret the caller's response to voice prompts. DTMF
tones are entered via the telephone keypad. Other
technologies include using text-to-speech (TTS) to speak
complex and dynamic information, such as e-mails, news
reports or weather information. IVR technology is also
being introduced into automobile systems for hands-free
operation. TTS is computer generated synthesized speech
that is no longer the robotic voice traditionally associated
with computers. Real voices create the speech in
fragments that are spliced together (concatenated) and
smoothed before being played to the caller. Another
technology which can be used is using text to speech to
talk to advanced and dynamic data, such as e-mails,
reports and news and data about weather. IVR is used in
automobile systems for easy operations too. Text To
Speech is a system originated synthesized speech that’s
not the robotic voice historically related to computers.
Original voices produce the speech in portions that are
joined together and rounded before played to the caller.
III. SPEECH RECOGNITION
Speech recognition is the interdisciplinary sub-field of
computational linguistics that develops methodologies and
technologies that enables the recognition and translation of
spoken language into text by computers. It is also known
as "automatic speech recognition" (ASR), "computer
speech recognition", or just "speech to text" (STT). It
incorporates knowledge and research in the linguistics,
computer science, and electrical engineering fields. Some
speech recognition systems require "training" (also called
"enrollment") where an individual speaker reads text or
isolated vocabulary into the system. The system analyses
the person's specific voice and uses it to fine-tune the
recognition of that person's speech, resulting in increased
accuracy. Systems that do not use training are called
"speaker independent" systems. Systems that use training
155
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
are called "speaker dependent". Speech recognition
applications include voice user interfaces such as voice
dialing (e.g. "Call home"), call routing (e.g. "I would like
to make a collect call"), domestic appliance control, search
(e.g. find a podcast where particular words were spoken),
simple data entry (e.g., entering a credit card number),
preparation of structured documents (e.g. a radiology
report), speech-to-text processing (e.g., word processors or
emails), and aircraft (usually termed Direct Voice Input).
The term voice recognition or speaker identification
refers to identifying the speaker, rather than what they are
saying. Recognizing the speaker can simplify the task of
translating speech in systems that have been trained on a
specific person's voice or it can be used to authenticate or
verify the identity of a speaker as part of a security
process. From the technology perspective, speech
recognition has a long history with several waves of major
innovations. Most recently, the field has benefited from
advances in deep learning and big data. The advances are
evidenced not only by the surge of academic papers
published in the field, but more importantly by the
worldwide industry adoption of a variety of deep learning
methods in designing and deploying speech recognition
systems.
Speech recognition works using algorithms through
acoustic and language modelling. Acoustic modelling
represents the relationship between linguistic units of
speech and audio signals; language modelling matches
sounds with word sequences to help distinguish between
words that sound similar. Often, hidden Markov models
are used as well to recognize temporal patterns in speech
to improve accuracy within the system. The most frequent
applications of speech recognition within the enterprise
include call routing, speech-to-text processing, and voice
dialing and voice search. While convenient, speech
recognition technology still has a few issues to work
through, as it is continuously developed. The pros of
speech recognition software are it is easy to use and
readily available. Speech recognition software is now
frequently installed in computers and mobile devices,
allowing for easy access. The downside of speech
recognition includes its inability to capture words due to
variations of pronunciation, its lack of support for most
languages outside of English and its inability to sort
through background noise. These factors can lead to
inaccuracies.
Speech recognition performance is measured by
accuracy and speed. Accuracy is measured with word
error rate. WER works at the word level and identifies
inaccuracies in transcription, although it cannot identify
how the error occurred. Speed is measured with the realtime factor. A variety of factors can affect computer
speech recognition performance, including pronunciation,
accent, pitch, and volume and background noise. It is
important to note the terms speech recognition and voice
recognition are sometimes used interchangeably.
However, the two terms mean different things. Speech
ISBN: 978-93-5619-947-7
recognition is used to identify words in spoken language.
Voice recognition is a biometric technology used to
identify a particular individual's voice or for speaker
identification.
IV. SPEECH RECOGNITION IN PYTHON
The improvement and accessibility alone in the field
of speech recognition are worth considerable. It allows the
physically and the elderly and visually challenged people
to collaborate with state of the art products and services
quickly and naturally no graphical user interface is
needed. If you want to use speech recognition or simply
convert speech to text in your python it is very easy to use.
 Working of speech recognition.
 Packages available in PyPI.
 How to install and how to use speech recognition
packages using python library.
A handful of packages for speech recognition exist on
PyPI. A few of them include:
 Google-cloud-speech
 Watson-developer-cloud
 Pocket sphinx
 Wit
 Apiai
 Speech Recognition
Speech Recognition is a library that acts as a wrapper
for many popular speech APIs and is thus very flexible to
use. One of these is the Google Web Speech API which
supports a default API key that is hard coded into the
Speech Recognition library. The elasticity and easy to use
features of the Speech Recognition package in python
make it a very good choice for developers who are
working on any python project. It does not guarantee to
support every feature that is wrapped with this API. You
will have to dispense some time searching for the easily
available options to find out if Speech Recognition is
going to work in your particular case. Speech Recognition
will work very well if you need to work with existing
audio files. The audio package comes in play when you
need to capture microphone input. The main class which is
used in this package is Recognizer class. The use of the
recognizer instance is obviously to recognize the speech.
Every instance of this class comes with various settings
and functionality for recognizing speech from the speaker.
Fig.1: Recognizing speech from the speaker
156
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
The Microphone class used in this python program
will let the user use the default microphone of their system
instead of using some audio files as a source. If the system
of the user doesn’t have the default microphone or in case
they want to use some other microphone then they will
need to specify which one to use by giving a device index.
The list can be seen by calling list_microphone_names()
which is a static method of the Microphone class.
Every instance of Recognizer class has seven methods for
recognizing speech from speaker source using various
APIs: recognize_bing(): Used in ―Microsoft Bing Speech‖
 recognize_google(): Used in ―Google Web Speech
API‖
 recognize_google_cloud():Used in ―Google Cloud
Speech‖ - requires installation of the google-cloudspeech package
 recognize_houndify(): Used in ―Houndify by
SoundHound‖
 recognize_ibm(): Used in ―IBM Speech to Text‖
 recognize_sphinx():Used
in
CMU Sphinx
requires installing PocketSphinx
 recognize_wit(): Used in ―Wit.ai‖
listen ()
- It is another function used for
capturing microphone input. It works just like the
AudioFile class while Microphone is a context manager.
Input can be captured from the microphone using the
listen() method of the Recognizer class.The first argument
taken by this method is an audio source and it will keep on
detecting the audio input until the silence is detected by it.
The audio input is generally mixed with ambient noises
which can be handled by using the in-built method of
recognizer class adjust_for_ambient_noise().
You need to wait for a second or two to
adjust_for_ambient() to perform its task and then try
speaking ―Whatever you want‖ in your microphone and
wait for some time before returning it to recognize the
speech again. It only recognizes the speech for one second
and it also gives you the option to set the duration for wait
time.
V. VOICE BASED EMAIL
In this proposed system, the user can send and receive
email and also listen to either of these processes with the
help of IVR (Interactive Voice Response) and Voice
commands. In this Email System, the application makes
use of the SMTP protocol for sending emails and POP3
protocol for receiving emails. SMTP (Simple Mail
Transfer Protocol) is the reliable protocol to send emails
and it works in a very simple way that the SMTP server
passes on the email messages quickly. POP3 (Post Office
Protocol) is used to receive emails.
The POP3 server stores the email and on request the
emails are displayed. The same is implemented in our
application, that on the request by the user the emails are
downloaded.
ISBN: 978-93-5619-947-7
Fig.2: Overview of Proposed System
VI. LITERATURE SURVEY
Currently, there is no feasible way in which the
visually impaired or visually challenged people can use
the generic email system without any assistance. The
existing system requires visual perception for any users to
achieve its limits and make full use of it. Also, the existing
system uses a very simple speech to text and text to speech
recognition along with few to many keyboard and mouse
inputs depending upon the application and the action,
which will be difficult for a visually challenged person to
keep track of and remember them.
To use the existing generic systems, the user also
needs to know where the mouse pointer is at all times
which is not feasible nor practical and second, that user
should be very well versed with all the keyboard and
mouse inputs. Therefore a new user cannot use this service
as it becomes a very hectic and strenuous task for them.
However, even the most common mail services like Gmail
that we use in our day-to-day life cannot be used by
visually challenged people. This is mainly because they do
not have any option that is specifically designed to address
this issue. As the visually challenged cannot visualize
what is there on the screen they cannot properly figure out
what to do in order to perform desired operation.
In some places, Even screen readers are used to read
the Content on the screen which reads everything that is
there on the screen without any filters or punctuations.
For this purpose, Few Researches conducted a survey
from many Institutes for Visually Impaired throughout
India and gathered information about what was exactly
needed for them. They highly accentuated on using a
completely autonomous voice based system without
having to move the cursor or giving any physical inputs.
There are few solutions available now, but none of them
provide the proper solution desired by the visually
challenged people and help them without any limitations.
So the best Solution that could be provided to them would
be a System that is completely voice based with the help
of IVR. IVR lets the user use the email system without any
157
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
physical input and could be useful for people with other
disabilities too. Hence, for addressing this issue and
providing a solution for this we propose a system that does
require any sort of physical interaction or inputs. It is
totally voice based and it utilizes IVR technology and
important libraries like Pyaudio and Speech Recognition.
As a result, based on the voice commands and prompts the
user will be guided throughout the desired action.
VII.
DISADVANTAGES
SYSTEM
OF
THE
EXISTING
 There is no voice command or sound system,
 Still the visually impaired person has to use the
keyboard,
 It needs a lot of practice for them to use,
 Third person is sending mails behalf of them,
 There is no STT (speech to text), TTS (text to speech),
or IVR (Interactive voice Response).
VIII. PROPOSED SYSTEM
We now know and have established that even with the
latest advancements in the field of communications, even
now visually challenged people find it difficult to utilize
these technologies because using them requires you to be
able to see and figure out things visually. However we
easily tend to forget that there are still people who are not
as fortunate as most of us and are visually impaired. They
cannot easily figure out what's on the screen. This makes
the whole concept of the internet a completely inert and
useless technology for visually challenged and even
illiterate people in some cases.
In our proposed system, we mainly use three types of
technology, they are:
STT (Speech-to-text): Here whatever we speak is
converted to text. Based on a certain user command,
his/her speech will be converted to text format, which the
people could see and read also.In this STT process the
speech is given as the input using the microphone. The
Output will be in the form of a Text. In this process to
convert a Speech to a text there are various Libraries in
python such as Google Cloud speech, WIT, pyaudio,
Speech Recognition. Here the user gives the speech as an
input, which the system recognizes and converts it into a
text. If everything is done from the user side then the user
can send the mail to the selected participant by declaring
the appropriate command.
TTS (text-to-speech): This method is the complete
opposite of Speech-to-text. Here, the text format of the
emails to synthesized speech. In this TTS Process the Text
is given/taken as an input and the Speech will be the
output. In our project the system will read the messages
for visually challenged people, although it is a difficult
task this can be implemented by using the specific
commands. This mechanism will be much more helpful
for the visually challenged people for communications.
ISBN: 978-93-5619-947-7
IVR (Interactive voice response): IVR is an advanced
technology that describes the interaction between the user
and the system in the way of responding by using physical
input for the respective voice messages. IVR allows users
to interact with an email host system via a system
commands, after that the users can easily service their own
queries by listening to the IVR prompt. IVR systems
generally respond with pre-recorded audio messages to
further assist users on how to proceed.
This is the most important option provided by the
mail services. The functionality of the Compose mail
option in our email system Is completely different from
the existing mail system. Since our system is for visually
challenged people therefore the keyboard operations and
mouse operations are completely avoided, the composing
mail would be done through the Voice Input method
(Speech Recognition). The user can hear the system and
compose the mail they want to send, once the mail is
composed the mail will be ready to send for a selected
participant.
IX. PROPOSED SYSTEM
 The disabilities of visually impaired people are
thrashed.
 This system makes the disabled people feel like a
normal user.
 They can hear the recently received mails to the inbox,
as well as the IVR technology proves very effective for
them in terms of guidance.
 The visually impaired people do not ―necessarily‖
require any assistance technically.
 This presumably has far more implications than just
email systems in the future.
The main benefit of this system is that the use of the
keyboard is completely eliminated, the user will have to
respond through voice commands only. Therefore, the
user does not need to worry about the location of the
mouse pointer nor the physical keyboard keys at all. This
proposed system will be easily accessible to nearly all
types of users as it is just based on interactive voice
recognition and speech conversion; there is absolutely no
need to locate the mouse pointer on the screen. Also
because of this, the people who are unable to read and
write need not worry as they can hear the prompting done
by the system and perform respective actions. Also, the
idea focuses on providing basic functionalities like
compose, send, receive, check inbox and along with
advanced features like Voice based operation, Search
Mail, provision for voice as well as text. Every basic
functionality will be provided.
This implementation has a lot of potential in the
future, with a lot of enhancements; perhaps it was a
system that, in any language, had the functions of email
access and spam emails. In addition, this system can be
upgraded to send an attachment, and it is also very useful
for people with poor eyesight. It can be made available to
158
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
all the region's people, which is quite popular and will
continue to be available in multiple languages; the system
is simple and easy to access. Furthermore, the system
employs sign language and can be integrated into it to
make it more scalable, reliable and Robust.
The research will also be benefited with
implementations like, associating or combining vibration
technologies (vibrators) and haptics (haptic motors) that
are embedded in devices from recent times with the
application so that the user gets a seamless experience
with actual physical feedback. Also in future, we attempt
to make the system autonomous. So, it's easy for the
visually impaired people to access the services. The
system developed now is working only on desktops. As
use of mobile phones is emerging as a trend today, there is
a scope to incorporate this facility as an application in
mobile phones also. Also, security measures to be
implemented during the login phase can be revised to
make the system safer.
(b)
X. METHODOLOGIES
User Registration: Here, we get the details such as
name, contact details, dob and security questions from the
user. Setting Up Credentials: Like in the process of User
Registration, here we get the USER ID and PASSWORD.
Service Selection: We select the process and service that
the user wants to perform. Output Process: Based on the
task or process chosen, the respective functions are
performed and the required result of the process is
received. Logout or Signout: Finally, after the user has
completed his/her desired task, the user is prompted or
suggested to Logout/Sign-out.
(c)
Fig.3: (a), (b), (c) Flow diagram of the proposed method
XI. SENT MAIL
The use of the sent mail option is to keep track of all
the mails which had been sent by the user. If the user
wants to access these mails this option will help the user
by providing the details the user needs. In order to access
the sent mails the user needs to perform certain actions
provided by the system. If the user accessed the particular
mail the system will provide the information as who the
receiver was and what is the subject of the mail. This will
help them in efficiently understanding the process and
extracting the required mail.
XII. CONCLUSION
(a)
ISBN: 978-93-5619-947-7
On successful completion of this research will help
not only the visually challenged but also other people who
face problems accessing the email for communication.
This will completely erase all the hurdles faced by the
visually impaired as it relies on IVR (Interactive Voice
Response) and Voice commands. Here, we eliminate all
159
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
sorts of physical input, as a result the user can send or
receive email without any hassle and need not get the help
of any third person. Since the system uses only voice
response, even a naive user or user without any previous
experience can use this with ease. The system developed
by us now works only on desktops. As use of mobile
phones is emerging as a trend today, there is a scope to
incorporate this facility as an application in mobile phones
also. Also, security measures to be implemented during
the login phase can be revised to make the system safer
and reliable.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
Pranjal Ingle, HarshadaKanade, ArtiLanke ―Voice based Email
System for Blinds‖ in International Journal of Research Studies in
Computer Science and Engineering (IJRSCSE) Volume 3, Issue 1,
2016.
MahamImtiaz, Samina Khalid, SaleemaKhadam, SumairaArshad,
Ali Raza, Tehmina Khalil ―Blind Electronic Mail System‖
Published by Canadian Centre of Science and Education.
Rijwan Khan, Pawan Kumar Sharma, Sumit Raj, Sushil Kr. Verma,
SparshKatiyar, ―Voice Based EMail System using Artificial
Intelligence‖,in International Journal of Engineering and Advanced
Technology (IJEAT) ISSN: 2249-8958 (Online), Volume-9 Issue-3,
February 2020.
MullapudiHarshasri, ManyamDurgaBhavani, and MisraRavikanth
―Voice Based Email for Blind‖, International Journal of Innovative
Research in Computer Science & Technology (IJIRCST), ISSN:
2347-5552,
Volume-9,
Issue-4,
July
2021,
https://doi.org/10.21276/ijircst.2021.9.4.2, Article ID : IRP1185,
Pages 10-13, www.ijircst.org
T.Shabana, A.Anam, A.Rafiya, K.Aisha ―Voice based email system
for blinds‖, in International Journal of Advanced Research in
Computer and Communication Engineering, Vol. 4, Issue 1,
January 2015.
JagtapNilesh, Pawan Alai, ChavhanSwapnil and Bendre M.R
―Voice Based System in Desktop and Mobile Devices for
BlindPeople‖. In International Journal of Emerging Technology
andAdvanced Engineering (IJETAE), 2014 on Pages 404407(Volume 4, issue2).
ISBN: 978-93-5619-947-7
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
UmmuhaniSifa U, NizarBanu P K , ―Voice Based Search Engine
and Web page Reader‖. In International Journal of Computational
Engineering Research (IJCER). Pages 1-5.
The
WHO
website.
[Online].
Available:
http://www.who.int/mediacentre/factsheets/fs282/en/
Saurav Mishra, AshwaniPanwar ―VOICE BASED EMAIL
SYSTEM
FOR
VISUALLY
IMPAIRED‖,
https://pdfcoffee.com/voice-based-email-system-for-visuallyimpaired-p df-free.html
C. Kang, H. Jo and B. Kim, ―A Machine-to-Machine based
Intelligent Walking Assistance System for Visually Impaired
Person‖,The Journal of KICS, vol. 36, no. 3, (2011), pp. 195-304.
K. Jayachandran, P. Anbumani ―Voice Based Email for Blind
People‖ from International Journal of Advanced Research, ideas
and Innovations in Technology. Available online at
www.ijariit.com
Aishwarya Belekar, ShivaniSunka, NehaBhawar, SudhirBagade,
‖Voice based Email for the Visually Impaired‖ in International
Journal of Computer Applications (0975 – 8887), Volume 175– No.
16, September 2020.
K. Venkatesh, P. Santhosh Kumar, A. Sivanesh Kumar ―Voice
Based EMail System For Visionless People And Object Detection
Using Optimization Technique‖ in International Journal Of
Scientific & Technology Research VOLUME 9, Issue 02,
FEBRUARY 2020 ISSN 2277-8616.
Prof. Umesh A. Patil, Pranouti B. Patil, Teja P. Magdum, Shweta
K. Goud and Latika R. Bhosale, "A Survey on Voice Based Mail
System for Physically Impaired Peoples". International Journal of
Innovative Research in Computer and Communication Engineering
(IJIRCCE) -Volume 4, Issue 1, January 2016, pp. 1002-1006.
BishalKalita and Santosh Kumar Mahto, "Voice Based Email for
Blind People". International Journal of Engineering Science and
Computing (IJESC) - Volume 9, Issue 10, October-2019, pp.
23789-23799.
SaurabhSawant, AmankumarWani, SangharshSagar, RuchaVanjari
and M R Dhage, "Speech Based Email System for Blind and
Illiterate People''. International Research Journal of Engineering
and Technology (IRJET) Volume 05, Issue 04, April-2018, pp.
2398-2400.
G. Shoba, G. Anusha, V. Jeevitha, R. Shanmathi. ―AN Interactive
Email for Visually Impaired‖.In International Journal of Advanced
Research in Computer and Communication Engineering
(IJARCCE), 2014 on Pages 5089-5092.
160
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
A Health Care System for Doctor’s Obtainability
and Nearest Search using K-Means Clustering
Mrs.V.Devi1, Dr.T. S. Suganya2, Dr.S.Jayachandran3, Illavarasan4, Dilip Kumar5
Assistant Professor, SRM Institute of Science and Technology, Ramapuram Campus, Chennai, Tamil Nadu, India
4,5
Final Year BCA Students, SRM Institute of Science and Technology, Ramapuram Campus, Chennai, Tamil Nadu ,India
1,2,3
Abstract: The main aim of this project is to improve medical
services, In this project, Doctor-patient portals are online
healthcare portals that enable patients to interact and
connect with their medical providers, such as doctors and
medical organizations, if doctor is not available in the
particular hospital and search the nearest hospital doctor
availability is checked, it is web application for secure storage
of patients medical history. These portal services 24/7 day
and night as well as in case of any emergency. To book a
doctor's appointment and access other services of the
website, patients must first register on the portal. The website
lists a variety of professionals, including gastroenterologists,
neurologists, dermatologists, and others. This application
stores the doctor information in the database server and for
nearest domain search we are providing Global Positioning
System (GPS) Tracking, In the search option providing
doctors detail as per there specialization so that patients can
take appointment. When a patient makes an appointment,
his or her medical records are saved in a database so that the
patient can review them the next time he or she visits the
hospital, can refer to them for future treatment and test
results. This web application mainly focuses on nearest
search doctors, doctor login, Patient appointment etc. so it
becomes more convenient to the patient.
Keywords: Nearest Search, Healthcare, GPS.
I. INTRODUCTION
The scope of this project is to create a platform where
patients and doctors can access or interact efficiently with
each other and provide ease and comfort to the patients.
 It also aims to resolve the problems that patients have to
face while taking appointments and keeping medical
files. A Cloudlet based healthcare system is presented,
where the privacy of user’s physiological data and the
efficiency of data transmission are our main concern.
 We use NTRU (Number Theory Research Unit) for data
protection during data transmission to the cloudlet.
 In order to share data in the cloudlet, we use users
similarity and reputation to build up trust model. Based
on the measured users trust level, the system determines
whether data sharing is performed.
 We divide data in remote cloud into different kinds and
utilize encryption mechanism to protect them.
 We propose collaborative IDS (Intrusion Detection
System) based on cloudlet mesh to protect the whole
healthcare system against malicious attacks.
1.2 Web Technology
Web Technology has become a highly important
aspect in today's globe because to advanced terminologies.
ISBN: 978-93-5619-947-7
It describes both design and code methodologies, therefore
we'll employ both basic and advanced web abilities in this
project. APIs will become increasingly crucial as all
technologies move toward an API-centric approach.
Nowadays, RESTful Web service frameworks are now
available for every major programming language. The
REST architecture style is a networked hypermedia
application architecture. We're utilising the Bootstrap
framework for the front end and a SQL database for the
back end. The project is dynamic because it is run using
the Java programming language. Here rating facility is
also available i.e. every patient authorized patient can give
rating to the doctor in terms of stars so it will become easy
to choose best doctor for patient.
II. SYSTEM ANALYSIS
2.1 Existing System
 Existing system focuses on health information
exchange but suffers from many security issues.
 In a present systems, issues such as risks of privacy
exposure, Scalability in key management, flexible
access and efficient user revocation have remained the
most impartment challenges.
 The main concern is about whether the patients could
actually control the sharing of their sensitive personal
health information.
2.2 Proposed System
 Patient details cannot be accessed efficiently. Lack of
security for records and database.
 There is no facility for searching organs and blood.
 The proposed system that will helps doctor s in their
work and will also help patients to book doctor
appointments and view medical Progress.
In the proposed system different Modules are added
for efficient doctor-patient communication.
Step1: Users login into portal and send a request through
browser. Which is then processed by web server.
Step2: User request is accepted by web server by
authenticating the user through the data available in the
database.
Step3: According to the request type it identifies the
request sender, example: Admin, Patient or Doctor.
Step4: The identified request is then further proceeds by
Admin according to the modules, our system includes 3
modules that work on the basis of the of the request send
to it.
161
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Step 5: According to the request send by the user data is
fetched from database.
Step 6: After that response is send to the browser through
which the request is coming.
III. PROPOSED SYSTEM ARCHITECTURE
The main objective of the project is to provide quality
medical care to the patients by bringing all medical
practitioners of the city to a single platform so that
everybody can easily access them and make appointments.
The second objective is to replace the current manual file
keeping system with an online medical patient database
system
3.1 System Execution
This is a web application that makes advantage of web
services provided by IIS, such as http. We create web sites
that use such web protocols to retrieve data. We designed
web pages statically at the start of the implementation,
which means the content of the page remained identical
while it was loading. We used to execute it dynamically
once we finished the entire implementation, which implies
the page content changes frequently. For static execution
of each module, a local Tomcat apache 8.0 server is
utilised; nevertheless, the project is managed remotely via
the internet, which keeps the material fresh.
3.2 Components of the system
Patient - In this system, there are n numbers of patient
are present. Patient should register before doing some
operations. And register user details are stored in user
module. After registration successful he has to login by
using authorized user name and password. Login
successful he will do some operations like Send
Appointment Request, Access Request, Receive
Prescription
Fig.1: Architecture design
Add Dr
Send Appoinment
Login
View Dr
Register
View Patient Information
Patient
View Request and Choose Dr
CloudLe 1,2,3
View Introduer Info
Login
View Patient Request
Send Access Request to Cloudlet 1 or 2 or 3
View patient records
Update patient health records like ecg,Send
prescription details to user
CloudLet: In this module, the CloudLet has to login
by using valid name and password. After login successful
he can do some operations such as Add Doctor, View all
Doctor Information, view Patient, and view the Intruder
Detection Details.
Access Request
View Patient Request
Dr
Send Access Request to CloudLet
Doctor





Send Prescription
Logout
Fig.2: Use case diagram
Cloud
CloudLet 1,2,3
Dr
Patient
1 : Add Dr()
Intruder
 Login
 View patient records means it is showing only
encrypted format
 Try to modify data means alert mail send to
patient or cloud let.
2 : View All Dr()
3.3 Dataset
3 : Login()
4 : Register()
5 : Send Appoinment()
6 : Request for CloudLet()
7 : Send Prescription()
8 : View All Parient()
9 : View Intruder Details()
Fig.3: Sequence diagram
ISBN: 978-93-5619-947-7
Dataset Training, which includes data storage,
processing, and service, is an excellent support model for
the application. The filtered dataset, which is uniformly
formatted, helps end users in accessing this data and
extracting value from it. The patient's date of birth, blood
group, last treatment date, medical history, reports, mobile
number, address with city and state, and email id are the
most important aspects and information are stored in
database. It enables advanced search criteria for the list
and retrieval of data based on hospital. Name, education,
location, and ratings are some of the information and
critical features of a doctor.
162
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
3.4 Algorithm
V. CONCLUSION
This project is live project is run dynamically on
internet so there are measure algorithms used they are as
follows
• Nearest Search : We're using k-means clustering to
help us find what we're looking for. If we need to
locate a nearby hospital or medical institution, the
referring location will be used to locate a nearby
domain. After that, it separates the data into numerous
clusters and selects the k cluster that is closest to it.
• Security : For security aspect we are using MD5
algorithm it provides best web based security ,it is an
algorithm that are used to verify data integrity through
the creation of 128- bit .
In this paper, we should employ Restful web services
to create a web application that allows doctors and patients
to communicate more quickly.
IV. SCREENSHOTS
CLOUD HOME PAGE
VI. FUTURE ENHANCEMENT
 Nowadays smartphones play a great role in humans life
cycle. Smartphones collect the details like current
location like GPS. Like this smartwatch, we provide to
track the health details by using sensor. In future, it can
be developed to app with several features and
extensions. That can be used easily and fluently in their
daily life style.
 Wearable devices like reputable ring that measures the
PPG signal from which SpO2 and heat rate can be
extracted and sends them to the host computer via RF
transmitter.
REFERENCES
ADD DOCTOR
Fig.4: Application screenshot
VIEW DOCTOR
VIEW PATIENT
[1] Zaheer Merchant (2019, April) , “Health department of northern state
exposed data of 12.5 million pregnant women.”, [Online].Available:
https://www.medianama.com/2019/04/223health-departmentindian-state-pregnant-women-data-leak/
[2] Aimee O’Driscoll (2019, July), “The biggest medical data breaches in
history”,
[Online].Available:
https://www.comparitech.com/
blog/vpnprivacy/biggest-medical-data-breaches/
[3] HIPAA JOURNAL (2018,March) , “Healthcare Data Breach
Statistics.”, [Online]. Available: b.https://www.hipaajournal.com/
healthcare-data-breachstatistics/
[4] G.Magyar,Blockchain: Solving the privacy and research availability
tradeoff for EHR data: A new disruptive technology in health data
management, Budapest, Hungary,24-25 Nov. 2017.
[5] Privacy-Preserving Patient-Centric Clinical Decision Support System
on Na¨ıve Bayesian Classification by Ximeng Liu, Student Member,
IEEE, Rongxing Lu, Member, IEEE, Jianfeng Ma, Member, IEEE,
Le Chen.
[6] paper 1- Domain Specific Search Of Nearest Hospital And Health
care Management System by RashmiA.Nimbalkar, R.A.
Fadnavis.06-08 march 2014.
[7] Paper 5- Big Data, Big Knowledge, Big Data for Personalized
Healthcare Marco Viceconti, Peter Hunter, and Rod Hose. May14.
[8] Design and Implementation of a WebService-Based public-Oriented
Personalized Health Care Platform by PengWei Wang, ZhiJun Ding,
ChangJun Jiang, and MengChu Zhou.
[9] K.T. Win. A review of security of electronic health records.
Electronic Health Records: security, safety and archiving, 34, 2005
Fig.5: Dataset diagram
ISBN: 978-93-5619-947-7
163
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Security Improvement of Cloud Data using Hybrid
Cryptography and Steganography
D.B.Shanmugam1, Dr.N.Vijayalakshmi2, S. Andrew Sesubalan3 ,D.Immanuel4, V.R.Shravan5
Assistant Professor, Department of Computer Applications, SRM IST, Ramapuram Campus, Chennai. dbshanmugam@gmail.com
2
Assistant Professor, Department of Computer Applications, SRM IST, Ramapuram Campus, Chennai. vijinatarajan23@gmail.com
3,4,5
BCA Final Year Students, Department of Computer Applications(BCA), SRM IST, Ramapuram Campus, Chennai
1
Abstract: One of the critical headways in data innovation is
Cloud registering; however, the security issue of information
stockpiling is a major issue in the cloud climate. For that
reason, a framework is proposed in this paper for working on
the security of cloud information utilizing encryption, data
camouflage, and hashing capacities. In the information
encryption stage, we executed cross-breed encryption utilizing
the calculation of AES symmetric encryption and the
calculation of RSA hilter kilter encryption. Then, the encoded
information will be concealed in a picture utilizing LSB
calculation. In the information approval stage, we utilize the
SHA hashing calculation. Likewise, in our idea, we pack the
information involving the LZW calculation prior to concealing
it in the picture. In this manner, it permits stowing away
however much information as could reasonably be expected. By
utilizing data covering innovation and blended encryption, we
can accomplish solid information security. In this paper, PSNR
and SSIM values were determined not withstanding the
diagram to assess the picture covering execution when applying
the pressure cycle. The outcomes showed that PSNR upsides of
stego-picture are better for compacted information contrasted
with information before pressure. In spite of the many
advantages that distributed computing offers, the most
significant are putting away, recovering and moving
information through the cloud rapidly and without any
problem. Thusly, the issue of information security is a
significant test since information is put away at an outsider and
dangers are most noteworthy when clients store their
information in a reasonable structure.
Keywords : RSA, AES Symmetric Encryption, Cryptography.
I. INTRODUCTION
Through its services in recent years in most
organizations, government departments, banks, etc.,
information technology has witnessed a significant
revolution which is mainly attributed to cloud computing [1].
The cloud computing is categorized based on the services it
provides to three layers: infrastructure as a service (IaaS),
software as a service (SaaS) and platform as a service (PaaS)
[2].
IaaS provides users with virtual machines and storage so
they can build their infrastructure on them. Further, SaaS
provides platforms to develop cloud-hosted applications for
users in order to use them in building, developing, testing
and managing their applications. In contrast, PaaS provides
ISBN: 978-93-5619-947-7
services and applications to users anytime, anywhere through
a web browser. Despite the many benefits that cloud
computing offers, the most important are storing, retrieving
and transferring data through the cloud quickly and easily.
Therefore, the problem of data security is a major challenge
because data is stored at a third party and threats are greatest
when users store their data in a clear form [3]. Typically,
there are two techniques used to protect sensitive data:
cryptography and steganography. Cryptography is defined as
converting data into unreadable codes [4]. Encryption
algorithm typically uses a specific parameter or key for the
data conversion procedure. Some encryption algorithms
require one key to encrypt and decrypt called symmetric
encryption.
However, other encryption algorithms need two keys:
for encryption, they need a public key and a private key for
decryption. Decryption is often categorized alongside
encryption on the contrary—decryption results from the
encrypted data of the original data. Steganography is another
technique for protecting data through hiding confidential data
in a cover object such as image, voice, and text [5]. The
strength of the steganography system depends on the ability
to integrate and indistinctness data into the cover object.
Consequently, the confidential information is not recognized
or retrieved by the unauthorized user. Digital files such as
image and sound are more suitable as a cover object in
steganography due to the characteristics of higher
redundancy of digital files [6]. Thus, it obtains an effective
way to hide data.
In this paper, a new way is proposed to protect the data
stored in the cloud by combining the techniques of
cryptography and steganography. This proposed method
encrypts secret data in a hybrid way using the symmetric
encryption algorithm AES256 and the asymmetric encryption
algorithm RSA. Then, the encrypted data is compressed and
sent to the LSB algorithm to be hidden. Hash functions are
used without the need for a third party to confirm the
impartiality of the data quickly after retrieval [7].
The performance of a steganography technique is
evaluated and compared based on some criteria to check the
quality of the stego-image {Formatting Citation}. In this
paper, PSNR and SSIM are used, in addition to the
164
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
histogram. This paper is divided as follows: Section II
highlights the relevant works. Section III tackles the
proposed work; while in section IV, the outcomes of the
work will be discussed. Finally, section V states the
conclusions of this study.
II. LITERATURE SURVEY
In paper author proposes a model using data hashed
message authentication codes (HMAC) and index building
for determining the errors and raises the efficiency.
Performance of Encryption algorithms based on
confidentiality, integrity and availability are also assessed.
Various algorithms are discussed in this paper along with
their and disadvantages. Author also discusses a technique by
the use of Rivest Shamir Adleman (RSA) algorithm and
MD5 to construct a protected atmosphere for cloud
computing. Authors provide more trustworthy, precious and
harmless atmosphere for cloud computing with use of
combination of blowfish symmetric and RSA algorithm.
The usage of above mentioned technique was able to
reduce or overcome the issues of data security and primary
issues in cloud. [1] Author proposed the notion of attributebased encryption (ABE). In subsequent works, they focused
on policies across multiple authorities and the issue of what
expressions they could achieve. Author also proposed the
generic KEM/DEM construction for hybrid encryption which
can encrypt messages of arbitrary length. Based on their
ingenious work, a one-time MAC were combined with
symmetric encryption to develop the KEM/DEM model for
hybrid encryption. [2]
The proposed framework given an original image and
the secret data to be hidden, our purpose is to generate an
intermediate image whose channel compressed version is
exactly the same as the stego-image. To this end, we first
obtain the stego-image by data embedding on the channel
compressed original image using any of the existing JPEG
steganographic schemes. Then, we propose a coefficient
adjustment scheme to produce the intermediate image based
on the stego-image and the original image. This scheme
ensures that the channel compressed version of the
intermediate image is exactly the same as the stego-image.
[3]
In 2011, Ling Zheng et al. [9] contrasting private cloud
and open cloud , records contrasts in the middle of them and
advances a building design of private distributed computing
to bolster savvy brace, explains structure of every layer, and
shows idea of private distributed computing working
framework and system virtualization. It gives the
hypothetical reference to assemble the private distributed
computing, in this way advances the development of the keen
network. In 2011, Ming Li et al. [10] displayed a contextual
ISBN: 978-93-5619-947-7
analysis utilizing online Personal Health Record (PHR), they
first demonstrate the need of pursuit ability approval that
lessens the security presentation coming about because of the
list items, and set up a versatile structure for Authorized
Private Keyword Search (APKS) over scrambled cloud
information. They then propose two novel answers for APKS
in light of a late cryptographic primitive, Hierarchical
Predicate Encryption (HPE). Their answers empower
proficient multi-dimensional catchphrase seeks with reach
inquiry; permit designation and renouncement of pursuit
abilities. They upgrade the inquiry protection which shrouds
clients' question catchphrases against the server.
In 2011, Yanjiang Yang et al. [11] propose that Storageas-an administration is a crucial part of the distributed
computing framework. Database outsourcing is a run of the
mill use situation of the distributed storage administrations,
wherein information encryption is a decent approach
empowering the information proprietor to hold its control
over the outsourced information. Searchable encryption is a
cryptographic primitive taking into consideration private
watchword based pursuit over the scrambled database. The
setting of big business outsourcing database to the cloud
requires multi-client searchable encryption, while for all
intents and purposes every single existing plan consider the
single-client setting. To connect this crevice, they propose a
down to earth multi-client searchable encryption plan, which
has various points of interest over the known methodologies.
In 2011, Wang et al. [12] proposed that distributed
computing has been imagined as the cutting edge building
design of IT Enterprise. It moves the application
programming and databases to the concentrated extensive
server farms, where the administration of the information and
administrations may not be completely dependable.
A creator concentrates on the issue of guaranteeing the
respectability of information stockpiling in Cloud
Computing. Specifically, they consider the assignment of
permitting an outsider inspector (TPA), for the benefit of the
cloud customer, to check the trustworthiness of the dynamic
information put away in the cloud. The presentation of TPA
kills the association of the customer through the evaluating of
whether his information put away in the cloud is for sure in
place, which can be essential in accomplishing economies of
scale for Cloud Computing. In 2012, Syed Naqvi et al. [13]
present a formal method for testing the effect of adaptability
and heterogeneity on the united Cloud security
administrations. Their expects to build up a mean of
measuring the effect on security capacities under different
working conditions and parameters of unified Cloud
arrangements. Their aftereffects of this work will assist
organizations with identifying the best security structural
planning that will fit their Cloud architectures and execution
prerequisites. In 2012, Huaglory Tianfield et al. [14] present
an exhaustive study on the difficulties and issues of security
165
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
in distributed computing. They first investigate the effects of
the unmistakable attributes of distributed computing, to be
specific, multi-tenure, versatility and outsider control, upon
the security prerequisites. At that point, they dissect the cloud
security necessities regarding the principal issues, i.e.,
privacy, respectability, accessibility, trust, and review and
consistence. They talk about the scientific categorization for
security issues in distributed computing. They outline the
security issues in distributed computing by cloud security
building design.
In 2012, Abdullah Abuhussein et al. [15] recommend
Healthcare, training, business, and numerous different areas
take a gander at distributed computing as a try to
comprehend the ceaseless deficiency in volume, foundation,
availability, and observing strength. On the other hand,
moving information to the cloud suggests moving control of
the client's information to the cloud administration supplier
inconclusively. Thus, the security and protection of the
client's data turns into an essential issue. Surveying and
looking at among potential distributed computing
administrations, represents an issue for learner clients
intrigued to move their work to the cloud to pick security
choices that are adequate and hearty in the meantime.
They endeavors to recognize and classify a rundown of
characteristics which mirror the different parts of cloud
security and protection. These credits can be utilized to
survey and analyze distributed computing administrations
with the goal that customers can settle on accomplished
decisions. Cloud administration suppliers can utilize them to
fabricate and/or offer better cloud arrangements.
In 2012, Wentao Liu et al. [16] propose that the security
issue of distributed computing is vital and it can keep the fast
improvement of distributed computing. It presents some
distributed computing frameworks and breaks down
distributed computing security issue and its procedure as
indicated by the distributed computing ideas and characters.
The information protection and administration accessibility
in distributed computing are the key security issue. Single
security technique can't tackle the distributed computing
security issue and numerous conventional and new advances
and methodologies must be utilized together to protect the
aggregate distributed computing framework.
In 2014, Nikhilesh Pant et al. [17] present the procedures
for cloud appropriation and cloud security appraisal to
investigate potential security and consistence suggestions in
cloud environment. They talks about in subtle element on
how an association may continue for security and consistence
appraisal amid the cloud calculation. Their methodology and
ideas point by point in this paper would be valuable for
associations that are included in the cloud reception process.
ISBN: 978-93-5619-947-7
In 2015, Liu X. [18] talks about distributed computing
information security issues, including tile security of
information transmission, stockpiling, security and
administration of security. Concentrate on all inclusive
information administration influence cloud security
examination, and pointed out that a leap forward in the
advancement of this distributed computing, attempt to list the
comparing methodologies and long haul improvement
heading.
In 2016, Gupta et al. [19] has been envisioned as a
cutting edge structural planning of IT Industries. Security and
protection is the significant obstacle in the cloud
environment as a result of its transparent construction
modeling. They investigates the cloud security dangers
furthermore talks about the current security ways to deal with
secure the cloud environment .They additionally proposed a
novel Trisystem for cloud security against information break
which give all around security to the cloud structural
planning.
III. ANALYSIS
3.1 Drawbacks of Previous Work
 Encryption algorithm typically uses a specific parameter
or key for the data conversion procedure.
 Some encryption algorithms require one key to encrypt
and decrypt called symmetric encryption.
 The strength of the steganography system depends on the
ability to integrate and indistinctness data into the cover
object.
 Consequently, the confidential information is not
recognized or retrieved by the unauthorized user.
3.2 Work Proposal
 This proposed method encrypts secret data in a hybrid
way using the symmetric encryption algorithm AES256
and the asymmetric encryption algorithm RSA.
 Then, the encrypted data is compressed and sent to the
LSB algorithm to be hidden.
 Hash functions are used without the need for a third party
to confirm the impartiality of the data quickly after
retrieval.
IV. IMPLEMENTATION WORK
This section presents the design of a new system for
providing complete security of sensitive data in the public
cloud model. The public cloud has been chosen as an
example of cloud types. This is because it is available to
anyone who wants to use it. This means that the proposed
system works with hybrid, private, or community cloud
166
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
deployment models. The flowchart of the proposed system is
explained in Fig. 1. The following processes are included:
Encryption: The secret data upload to the cloud will be
encrypted using a hybrid encryption system.
and the public key. c. Finally, the key is sent to the second
party in securely way. The hybrid encryption of the secret
data is also mentioned in Algorithm I.
Compression: Encrypted data will be compressed to reduce
its size and allow more data to be hidden using
steganography techniques. In this work, the LempelZivWelch (LZW) compression algorithm was used, which
proved to be effective in reducing the data size and speed, as
will be shown in the results in the next section.
Embedding: Here, we will hide data that has been
compressed into a cover image using the Least Significant
Bit (LSB) embedding algorithm that will create a stegoimage as an output.
Fig.2: Algorithm I- Hybrid RSA&AES256
In the LSB algorithm, every bit of the data to be hidden
is written to the last bit of a byte of the data that creates the
cover image. In the proposal, 24-bit images were used, as
three bits of information were included in each pixel, one in
each layer of the RGB colours of the cover image, as
explained in Fig. 3.
Fig.1: Diagram of Proposed Cloud Security System
In our work, hybrid encryption consists of the AES-256
and RSA algorithms, where both RSA and AES are effective
algorithms used in the cloud environment [17]. The hybrid
encryption depends on dividing secret data into odd and
evendata based on location in the data array. Odd-data is
encrypted using the AES algorithm with 256 key sizes that
generate by a random number generator (RNG). The RNG
generates a sequence of numbers that cannot be predicted
correctly and are proved the randomize by NIST randomness
tests [18]. While even-data is encrypted using RSA
algorithm. Where AES key distribution used for encryption is
carried out securely. The key is generated by random number
generators (RNGs), which are available in many computer
software libraries. b. It is encrypted using the RSA algorithm
ISBN: 978-93-5619-947-7
Fig. 3: Embedding Secret Data in RGB Image
In this way, it allows reducing the cloud storage used
and providing protection for transferred data. When the data
owner decides to share his data with the other party, he only
needs to send the stego hash value and the AES key that is
encrypted. Then, the next steps are performed by the receiver
to retrieve confidential data:
4.1 Calculate Hashing
In this step, we will calculate the hash value of the stego
image to confirm the data integrity when retrieved from the
167
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
cloud. Moreover, integrity was implemented using the SHA256 algorithm in this work. Then, the data owner uploads the
stego image to the cloud storage.
(SSIM) matrix of the stego-image is also calculated using
―(3)‖ where SSIM refers to the symmetry between the cover
image and the misleading image of the information
steganography technology.
4.2 Checking Hash
In this step, the data integrity is checked after
downloading stego-image from the cloud by calculate
hashing for it and comparing the value with the stored hash
value.
Where max C indicates the maximum value holds in the
image
4.3 Recovery
Here, the stego-image data is extracted by the receiver
by applying the LSB algorithm and then extracting the
merged bits from the cover image will be possible.
Where C is the cover image, and S is the stego-image. m, n
are number of rows and columns of the cover image and the
stego-image.
4.4 Decompression
After the data is retrieved from the cover image, it is
decompressed and retrieved in its original size by using the
LZW algorithm.
4.5 DecryptionIn this step, the extracted data will be
decrypted by the hybrid algorithm. The hybrid decryption is
implementing based on Algorithm 2.
Where µ is average values of x, y Vx and Vy are the
standard deviation, and Vxy is the cross-covariance for the
image. A secret message with size 1KB is hidden in each of
the cover images. The result of the PSNR value analysis for
each stego-image before and after compression, as shown in
Table I.
Table 1. Comparison Of Psnr Values For Stego-Image
Fig.4:AglorithmII:HybridRSA&AES256
V. RESULT DISCUSSION
For evaluating the proposed system’s performance,
several RGB images are used as cover images and hide a
message containing a different number of characters in each
cover image. Then, the evaluation is performed through the
calculation of the signal-to-noise ratio (PSNR) as a
parameter. ―(1)‖ is used to calculate the value of PSNR, but
first, the value of Mean Square Error (MSE) is needed to be
calculated according to ―(2)‖. The structural similarity index
ISBN: 978-93-5619-947-7
The results show that the PSNR values for RGB
stegoimages of the proposed system with data compression
have better performance for all the tested images. This shows
the difficulty of noticing the difference between the cover
image and stego-image. In other words, the higher the PSNR
value, the harder it becomes for visual attackers to recognize
the stego-image. The second measurement to measure
stegoimage quality is SSIM. The result shows a similarity
between the cover image and the stego-image where the
SSIM value is closer to 1 (SSIM for all images tested is
0.999), which means that the stego-image is of outstanding
quality. Figure 3 shows the cover image histogram and the
stegoimage, and the results show that the histogram is similar
when observed with the naked eye. This entails that the
amount of distortion of the stego-image is very small. The
168
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
last stage of evaluation of the proposed system is figuring the
time for both the process of hybrid encryption,
steganography and compression as well as the calculation of
the total time. The results show that the time taken is very
little for the system proposed, which reflects the efficiency of
the proposed system, as shown in TABLE II.
Table 2. Proposed System Performance
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
VI. CONCLUSION
This study successfully combined two of the security
techniques: cryptography and steganography to provide
double security for stored data in the cloud environment. We
have presented hybrid encryption where symmetric algorithm
AES combine with asymmetric algorithm RSA is used to
secure stored data in the cloud. This technique helps in
achieving higher efficiency and better security due to the use
of multiple algorithms for the encryption/decryption process.
Added work on this paper, the use of 3-DES algorithm has
been done for the encryption purpose for getting suitable
results and achieving higher security for the transmitted data.
High level security of data is required in banking and private
sectors where the proposed system can be used. The results
of the encryption of secret data are then hidden in the image
using the LSB algorithm after encrypted compression data. In
this proposal, the amount of data hidden in the image
increases while the distortion on the image is reduced
compared to the results of data concealment without
compression using the LSB algorithm. This system is more
powerful and efficient for securing the data in the cloud
environment. Besides, it is more powerful to verify the
integrity of data after retrieval from the cloud. Therefore, it
can be said in this paper that security objectives have been
achieved. The experimental results showed that the stegoimage quality after hiding 1 KB data with the average PSNR
value of 72.254 for all tested image.
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
S. C. Sukumaran and M. Misbahuddin, ―DNA Cryptography for
Secure Data Storage in Cloud.,‖ IJ Netw. Secur., vol. 20, no. 3, pp.
447–454, 2018.
S. William, Computer security: Principles and practice. Pearson
Education India, 2008.
L.-C. Huang, L.-Y. Tseng, and M.-S. Hwang, ―A reversible data hiding
method by histogram shifting in high quality medical images,‖ J. Syst.
Softw., vol. 86, no. 3, pp. 716–727, 2013.
R. Shanthakumari and S. Malliga, ―Dual-layer security of image
steganography based on IDEA and LSBG algorithm in the cloud
environment,‖ Sādhanā, vol. 44, no. 5, p. 119, 2019.
Y. Zhang, C. Xu, H. Li, and X. Liang, ―Cryptographic public
verification of data integrity for cloud storage systems,‖ IEEE Cloud
Comput., vol. 3, no. 5, pp. 44–52, 2016.
A. A. Abdulla, ―Exploiting similarities between secret and cover
images for improved embedding efficiency and security in digital
steganography.‖ University of Buckingham, 2015.
A. A. Abdulla, H. Sellahewa, and S. A. Jassim, ―Stego quality
enhancement by message size reduction and Fibonacci bit-plane
mapping,‖ in International Conference on Research in Security
Standardisation, 2014, pp. 151–166.
N. Garg and K. Kaur, ―Hybrid information security model for cloud
storage systems using hybrid data security scheme,‖ Int. Res. J. Eng.
Technol., vol. 3, no. 4, pp. 2194–2196, 2016.
M. O. Rahman, M. K. Hossen, M. G. Morsad, and A. Chandra, ―An
Approach for Enhancing Security of Cloud Data using Cryptography
and Steganography with E-LSB Encoding,‖ IJCSNS, vol. 18, no. 9, p.
85, 2018.
S. Shanthi, R. J. Kannan, and S. Santhi, ―Efficient secure system of
data in the cloud using steganography based cryptosystem with FSN,‖
Mater. Today Proc., vol. 5, no. 1, pp. 1967–1973, 2018.
A. A. Abdullah, Z. A. Abod, and M. S. Abbas, ―An Improvement
Steganography System Based on Quantum One Time Pad Encryption,‖
Int. J. Pure Appl. Math., vol. 119, no. 15, pp. 263–280, 2018.
G. S. Mahmood, D. J. Huang, and B. A. Jaleel, ―Achieving an
Effective, Confidentiality and Integrity of Data in Cloud Computing.,‖
IJ Netw. Secur., vol. 21, no. 2, pp. 326–332, 2019.
O. Hosam and M. H. Ahmad, ―Hybrid design for cloud data security
using combination of AES, ECC and LSB steganography,‖ Int. J.
Comput. Sci. Eng., vol. 19, no. 2, pp. 153–161, 2019.
D. Suneetha and R. K. Kumar, ―Enhancement of Security for Cloud
Data Using Partition-Based Steganography,‖ in Proceedings of the 2nd
International Conference on Data Engineering and Communication
Technology, 2019, pp. 201–209.
P. Semwal and M. K. Sharma, ―Comparative study of different
cryptographic algorithms for data security in cloud computing,‖ in
2017 3rd International Conference on Advances in Computing,
Communication & Automation (ICACCA)(Fall), 2017, pp. 1–7.
A. Rukhin, J. Soto, J. Nechvatal, M. Smid, and E. Barker, ―A statistical
test suite for random and pseudorandom number generators for
cryptographic applications,‖ Booz-Allen and Hamilton Inc Mclean Va,
2001.
REFERENCES
[1]
[2]
S. E. Elgazzar, A. A. Saleh, and H. M. El-Bakry, ―Overview of using
private cloud model with GIS,‖ Int. J. Electron. Inf. Eng., vol. 7, no. 2,
pp. 68–78, 2017.
E. F. Coutinho, F. R. de Carvalho Sousa, P. A. L. Rego, D. G. Gomes,
and J. N. de Souza, ―Elasticity in cloud computing: a survey,‖ Ann.
Telecommun. des télécommunications, vol. 70, no. 7–8, pp. 289–309,
2015.
ISBN: 978-93-5619-947-7
169
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
The Peace of old Life vs. the Craze of Social Media
Dhanalakshmi M
Ii M.A English Language And Literature, P.K.R. Arts College For Women, Gobi
Abstract: Social media is an internet – based form of
communication. It plays a very major role in android life; it
facilitates to share the ideas and thoughts from a person to
other virtually. So, the social being can defend their time in a
fruitful way. The people can extricate themselves directly by
sending a message to someone in a fraction of seconds. Social
media shows the path for beings even they are an illiterate. It
plugs every nook and corner of places and an old generation
feels astonished for this particular rapid enhancement. It
becomes second wife to all the husbands, sibling to every child,
grandchildto all old aged citizens. The single touch makes
everyone please; this is one of the specialities of smart phones.
It teaches to all in an easy way. It seizes everyone’s brain;
grasps the power of mind and it consumes the wisdom of every
single soul. Social media gives merits and demerits parallelly.
This can provide more information which is trending in dayto-day life. Social media will definitely form a good platform
for the people, if they use it in a good path.
Keywords: Communication, technologies, applications.
I. INTRODUCTION
neighbours personally or for an institution officially. In a
professional level, one can use social media in order to
broaden the ideas and information which will obviously
give the right growth in industry field. Users can use the
social media to explore their views like creating blogs,
podcasts, videos and gamming sites. This relationship
between humans and technologies is the focus of new
emerging field of technological self – studies. The social
media also outlets traditional applications like radio
broadcasting. Every information is there in an android
phone in the form of applications.
Everyday the people should update themselves
especially news plays a pivotal role for everyone. So, they
can know every news from nook and corner. Social media
helps those people to receive more information. The users
should analyse before using the applications and that should
be certified in play store (app store). At the same time, it
makes the people idle and they lack to utilize their own
thoughts. They are depending on the system and
unknowingly people are wasting their own time. Probably in
every family, android and social media takes place. But they
should be aware by using those media.
II. AN EARLY FORM OF COMMUNICATION
Fig.1: Social media types
Social media is neither boon nor bane; the information
it gives should be judge but should not believe blindly.
Billons and billons of people connecting gradually in social
media, but it should be only for the basis for the person’s
wisdom rather undesirable information should be avoided.
Social media can avail all the languages in the world. It is
one of the merits so that an illiterate can follow without any
obstacles. Social media is an essential to share for both
personal and impersonal information. Using this media for
every hour, every minute and every second gives hazardous
for mind and physic. Without social media or any other
applications, the information will get delay to reach
ISBN: 978-93-5619-947-7
Fig.2: Early form of Communications
The people in early days are blessed with healthy life
than the contemporary life. They prefer only lively
environment and they refuse to give importance to an
artificial belonging. The people in old days follow only the
simplest way of communication. The percentage of literate
people is less during those days but then they try to
communicate from one place to even far places only through
the letters. The letters play a major role; the receiver will
receive the letter only after the two days from the date of
170
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
posting the letter. Writing the letter will enhance the
vocabulary skill and it is one of the good ways to share all
the ideas and feelings in the written format. Reading the
letter which is especially in written form will provide good
essence of the letter and can visualize the true feelings of the
person who has written the letter. The true aspect of reading
a letter is the reader can reflect the sensitivity of the letter.
Moreover, the reader can sense the image of a person who
has written the letter.
Letter communication builds the right way for the people
by developing the correct sequence of sharing ideas and
thoughts. In this contemporary society, the communication
is only through the social medias like Instagram, WhatsApp,
Facebook, Twitter, etc… But it never builds the strong
communication, the people should try to share their views
only through target language, rather they should avoid to
share in their native language. Sharing the views definitely
helps to enhance the second language. The communication
should deliver in a proper way and there should not be any
diversion. Imperfection occurs in due course of time. The
world is changing in day-to-day life. So, social media is
essential in all the fields like education, industrial fields,
science, society, professional work, engineering, accounts,
banking etc. Even though every individual has all the
applications which are related to their life, it never gives the
sense of real things. For example, for education, there are so
many applications like BYJU’S &Vedantu etc… but it
never ever gives the essence of real time classrooms by
having eye to eye contact. These applications should be a
part of education but not depend blindly. Using these
technologies will definitely hits the person mentally. Using
these applications for long time will surely provide the
effect in olden days. Conscious is very necessary for online
mode of education.Teaching the class with real life
examples long last for many years. This is the right way for
better teaching experience. But an online teaching replaces
the real-life teaching.
III. THE HYPER USE OF SOCIAL MEDIA
FigNo3. Social Media Hype Use
ISBN: 978-93-5619-947-7
FigNo4. Digital world
Argumented Reality and Virtual Reality form a very
good experience in social media. The former deals with the
objects which are enhanced by computer system and
achieved through the use of digital visual elements. This
enhances both virtual and real world while the later deals
with virtual and enhances a fictional reality. An
argumented reality is used in medical, navigation and it is
very expensive in usage. These realities are used in
cinematic industry in order to promote the movie. The
world is changing day by day parallelly there will be the
development of social media because, it becomes the major
tool for the people. They fail to create new things by using
their own style and become dependent on social media is
from the development of computer rather it is not the right
way to follow those medias without analysing it.
IV. CAUSES AND EFFECTS
Using social media without utilising the self-thoughts
will definitely lead to failure. The thinking capacity will
become less, there will be no more innovation and exploring
ideas. Social media users will fix the particular thought and
they will not follow their own style of writing and stick into
the social media. They fail to manipulate their own ideas in
their career. Social media is necessary but it should not be
like a full – time job rather it should be like the part, not as a
whole.
Social media will lead the person to indulge in
medication, it will affect badly both physically and
psychologically. It makes the people slave and never give
happy for the people. Using these medias will lead to the
stress environment for the users. Social media will make
addiction like an alcohol. The more consumption will lead
to dangerous similarly having a dense attachment with
social media will provide mental disorder and it eventually
provide craze on social media.
171
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
V. CONCLUSION
The contemporary society is moving towards the
technological method, ready to face the difficulties and the
people are good enough to find the solution. The more
development in social medias will definitely swifts the
minds of the people into the new world. Generation will get
change and the people never know the value of themselves
and the books by their previous generation. This reveals the
modernity in the society; people fail to read the books by
their grand family. The people never follow the footprint of
elders, religious faith become an interrogative statement,
only due to the effect of social media. Obviously, the world
changes but the people should never ever give up their old
styles and techniques of all the fields.
REFERNCES
[1]
[2]
[3]
https://www.epa.gov/sites/default/files/201403/documents/socialmedia.pdf
https://www.epa.gov/sites/default/files/201403/documents/socialmedia.pdf
https://www.researchgate.net/publication/303216233_The_history_of
_social_media_and_its_impact_on_business
ISBN: 978-93-5619-947-7
172
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
Survival Study on Energy Optimized Data
Forwarding Techniques in Wireless Sensor Network
P.Thirunavukarasu1, Dr.K.K.Savitha2
Research scholar, Bharathiar University PG Extension and Research Centre, Erode
2
Assistant Professor, Department of MCA, Bharathiar University PG Extension and Research Centre, Erode
1
Abstract: Wireless sensor networks (WSN) are attractive one
for engineering practice. WSN has spatially distributed selfgoverning sensors to observe the physical conditions. The
sensor has taken global decision for performing the data
forwarding process. In WSN, key aim of sensor node is to sense
and forward collected data to the base station in multi hop
environment. Data forwarding in WSN is a challenging process
because of nature and sensor node. Data forwarding is the
method of sending the data packets in finest path to the sink
node for further processing. Many researchers are carried out
for performing energy optimized data forwarding in WSN.
But, the time consumption and data packet delivery ratio
performance was not improved. In order to solve these
problems, existing energy optimized data forwarding
techniques are reviewed in this paper.
Keywords: Wireless sensor networks, spatially distributed, data
forwarding, multihop environment, sink node
I. INTRODUCTION
Wireless sensor networks (WSNs) are the interrelated
sensor nodes that interact wirelessly to gather the data in
surrounding environment. Sensor nodes are limited power
and distributed one. The sensor nodes are physically
organized near the event. The collected data transmitted
back to the base station through the route paths constructed
with help of sensor nodes. The randomly distributed sensors
cooperate with the additional sensors within the range for
monitoring or examining the target scene to communicate
with base station.
The cooperation included the route path identification
to transmit the data packets to exact destination. Energy
conservation is a main problem in WSN because the sensor
has limited non-rechargeable power source. It is difficult to
restore the nodes for improving the network lifetime.
Energy optimized routing process is essential one to reduce
the power resource utilization for extending the network
lifetime while performing the data transmission.
This paper is organized as follows: Section II portrays
the review on different energy optimized data forwarding
techniques in WSN, Section III explains the study and
analysis of existing data forwarding techniques, Section IV
depicts the possible comparison between them. In Section
V, the limitations of existing techniques are discussed and
Section VI concludes the paper.
ISBN: 978-93-5619-947-7
II. LITERATURE SURVEY
A metaheuristic search was performed in [1] using
genetic algorithm with mutation operator for finding the
dynamic topology. Tabu search was performed with
forwarding reliable route packets (FRRPs) for optimal route
selection. The search improved reliability and energy
limitations by identifying number of optimized paths. But,
the delay time was not minimized through metaheuristic
search. Advanced threshold-sensitive energy efficient sensor
network (A-TEEN) routing protocol was designed in for
improving the routing performance with stable
spectrum.But, the data forwarding time was not reduced
using TEEN routing protocol.
A new routing algorithm was designed in with help of
ant colony algorithm to find out optimal path for data
transmission process in WSNs. An optimal path from source
node to destination node was carried out using improved
heuristic function. But, the packet delivery ratio was not
improved. The energy-aware routing was performed in
using multi-objective fractional particle lion (MOFPL)
algorithm. MOFPL algorithm identified an optimal cluster
head from many cluster head nodes in WSN. However, the
computational complexity was not minimized by MOFPL
algorithm.
A two fold-sink mechanism was presented in with
mobile and static sink node. The sink nodes gathered the
information regarding boundary sensor nodes to distribute
the energy consumption across network. The designed
mechanism minimized the transmission load on
intermediate nodes between static sink node and network
sensing nodes. However, the data collection accuracy was
not enhanced by twofold-sink mechanism. A data-aware
energy conservation technique was designed in to reduce the
data transmission where inherent correlation between sensor
node and similarity used. However, the data collection time
was not minimized by data-aware energy conservation
technique.
2.1 Related Works
Contact-Aware ETX (CA-ETX) was introduced in to
regulate packet transmission delay through packet
retransmission and recurrent connectivity. But, the energy
173
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
consumption remained unaddressed using CA-ETX.
Steering geometry Interaction system was used in to manage
the surface transition. The designed structure was employed
for magnetic wall-climbing robot to minimize the magnetic
force between perpendicular magnetic surfaces. However,
target tracking time was not minimized through steering
geometry Interaction system. A new positioning system
was designed in for tracking people in dynamic industrial
environments. The designed system performed crossmodality training to track environmental changes through
occlusion maps. But, the energy consumption was not
minimized by positioning system. An improved adaptive
head and improved prediction-based adaptive head were
designed in to enhance the clustering performance. The
algorithm employed clustering process to achieve the
impressive tracking quality through selecting the cluster
head. However, the tracking accuracy was not improved. A
data suppression approach was designed in to detect the
moving target by mobile sink. But, network lifetime was not
enhanced by data suppression approach.
III.
ENERGY OPTIMIZED DATA FORWARDING
TECHNIQUES
IN
WIRELESS
SENSOR
NETWORKS
Wireless sensor networks (WSN) comprised large
number of sensor nodes in physical and digital world. The
sensor nodes get distributed in the sensor field. Every
scattered sensor nodes included the ability to gatherthe data
and transmitted the data packets to the sink node and end
users. WSN is employed in applications like military
surveillance, environmental monitoring, medical and health
care. WSN has dynamic topology because of node mobility.
Energy consumption is a key problem to determine the
network lifetime as the sensor nodes are functioned by
battery.
3.1 Optimized routing in wireless sensor networks by
establishing dynamic topologies based on genetic
algorithm
Adhoc-topologies were established based on genetic
algorithm. A metaheuristic search was carried out by genetic
algorithm with mutation operator to find out the dynamic
topology. Tabu search was depending on FRRPs for optimal
route selection to enhance the quality of service parameters
such as reliability and energy limitations throughfinding out
multiple optimized paths. FRRP packets included
parameters like path delay, node energy and node frequency
to act as router for taking the routing decisions.
Genetic algorithm introduced energy efficient topology
inWSN. The designed algorithm initiated through cluster
formation with regular nodes and sensor nodes. Each cluster
was allocated with cluster head (CH) specified by genetic
algorithm. For efficient energy consumption, base station
ISBN: 978-93-5619-947-7
(BS) makes sensor nodes active when residual energy was
higher than average energy. The mutation operator was used
for every sensor node of CHs chromosome based on the
probability. The probability of mutation identified the bits
which mutate. Off spring chromosomes generated in
previous step were sorted in ascending order depending on
objective function values. CH chromosomes with lesser
objective function values were chosen to form population
pool for the next generation. Depending on the stopping
criteria with predetermined iteration count, deployment gets
stopped.
Tabu search was meta heuristic search
method that avoided cycling back to previously used paths
through short-term memories termed tabu list containing
information like neighborhood nodes energy level, ID,
status etc. Tabu search avoided particular moves being reinstantiated for certain time period by recency-based
memory.Tabu list comprised the active paths available with
their respective energy level. The data packets selected best
route among multiple paths from source to sink.
3.2 Optimization on TEEN routing protocol in cognitive
wireless sensor network
Threshold-sensitive energy efficient sensor network
(TEEN) routing protocol was introduced to enhance the
energy efficiency of cognitive wireless sensor network
(CWSN). TEEN routing protocol combined the idle channel
detection process in each round. With limited HT and ST,
TEEN minimized unnecessary data transmission for many
times. Advanced threshold-sensitive energy efficient sensor
network (A-TEEN) routing protocol was employed to
formulate the stable routing. A-TEEN optimized the cluster
head (CH) election method of TEEN for creating the routing
link more stable and reliable. The channel detection at early
stage of every round adapted tospectrum unpredictability of
CWSN. A-TEEN employed vacant channels as weight in
probability of every node turn into a cluster head. The node
which sensed more idle channels has bigger opportunity to
become CH. CH sensed the existing channel to find out the
communication routes with many cluster members. In ATEEN, cluster members sent the data to CH for minimizing
the waiting time. A-TEEN enhanced the energy efficiency
and improved network lifetime.
3.3 An Improved Routing Algorithm Based on Ant
Colony Optimization in Wireless Sensor Networks
A new routing algorithm was introduced with ant
colony algorithm depending on the position information and
search direction. An optimal path from source node to
destination node was identified with help of improved
heuristic function through considering node communication
transmission distance, transmission direction and residual
energy. The algorithm provided the participation scale of ant
in the searching process. In addition, designed algorithm
employed the route evaluation index to enhance the
174
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
pheromone updating process. A new route updating rule was
designed with average and minimal value of residual
energy. The designed algorithm minimized node energy
consumption efficiently to improve the network lifetime and
to recognize the energy-saving routing of wireless sensor
network in communication process.
IV.
energy efficient sensor network (A-TEEN) routing protocol
and New routing algorithm. Data forwarding time is
computed with respect to number of data packets in WSN.
For experimental purpose, number of data packets is varied
from 10 to 100. The graphical representation of data
forwarding time results for three different methods is
illustrated in figure 1.
PERFORMANCE ANALYSIS OF ENERGY
OPTIMIZED
DATA
FORWARDING
TECHNIQUES
IN
WIRELESS
SENSOR
NETWORKS
In order to compare the data forwarding techniques in
WSN, number of data packets and number of sensor nodes
is considered as an input values for conducting the
experiment. Various parameters are employed for enhancing
energy optimized data forwarding results in WSN.
4.1 Impact on Data Forwarding Time
Data forwarding time (DFT) is defined as the amount
of time taken to perform the data forwarding process in
WSN. It is the difference of ending time and starting time of
data forwarding. It is measured in terms of milliseconds
(ms). It is given by,
Fig.1: Measure of Data Forwarding Time
(1)
From (1), the data forwarding time is calculated. Data
forwarding time is lesser, method is said to be more
efficient.
Table 1. Tabulation for Data Forwarding Time
Number of
Data
packets
(Number)
10
20
30
40
50
60
70
80
90
100
Data Forwarding Time (ms)
Metaheuristic
Search Genetic
Algorithm
16
18
21
23
26
28
31
32
35
37
ATEEN
routing
protocol
22
25
27
29
31
33
36
38
41
44
New
routing
algorithm
35
37
39
42
44
46
47
49
51
53
Table 1 explains the performance analysis of data
forwarding timefor different methods namely Metaheuristic
Search Genetic Algorithm, Advanced threshold-sensitive
ISBN: 978-93-5619-947-7
Figure 1explains the graphical analysis of data
forwarding time versus number of data packets in WSN.
From the figure, it is clear thatdata forwarding time using
Metaheuristic Search Genetic Algorithm is lesser than ATEEN routing protocol and new routing algorithm.This is
because of designing thegenetic algorithm with mutation
operator to identify the dynamic topology. Tabu search was
performed for optimal route selection to improvethe quality
of service.The data packets chosen best route among
multiple paths from source to sink node. This in turn helps
to reduce the data forwarding time. Consequently, data
forwarding time of Metaheuristic Search Genetic Algorithm
gets reduced by 19% and 41% when compared to A-TEEN
routing protocol and new routing algorithm respectively.
4.2 Impact on Energy Consumption
Energy consumption is defined as the amount of
energy consumed for performing the data forwarding
process. It is defined as the product of number of sensor
nodes and energy consumed by one sensor node. It is
measured in terms of joules (J). It is formulated as,
(2)
From (2), energy consumption is calculated. „ ‟
denotes the number of sensor nodes and „
‟ symbolizes
the energy consumption of one sensor node. Energy
175
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
consumption is lesser, more efficient the method is said to
be.
Table 2 Tabulation for Energy Consumption
Number of
Sensor nodes
(Number)
10
20
30
40
50
60
70
80
90
100
From (3), the packet delivery ratio is calculated. „ ‟
denotes the number of packets correctly delivered. Data
packet delivery ratio is higher, more efficient the method is
said to be.
Energy Consumption (J)
Metaheuristic
ATEEN
New
Search Genetic
routing
routing
Algorithm
protocol
algorithm
54
33
45
57
35
48
59
38
50
56
36
47
53
34
45
51
32
41
54
35
43
57
37
46
60
41
49
63
44
52
Table 2 describes the performance analysis of energy
consumption for different methods namely Metaheuristic
Search Genetic Algorithm, Advanced threshold-sensitive
energy efficient sensor network (A-TEEN) routing protocol
and New routing algorithm. Energy consumption is
computed with respect to number of sensor nodes in WSN.
For experimental purpose, number of sensor nodes is varied
from 10 to 100. The graphical representation of energy
consumption results is described in figure 2
Figure 2 describes the graphical analysis of energy
consumption versus number of sensor nodes in WSN. From
above figure, it is observed that energy consumption using
A-TEEN routing protocol is lesser than Metaheuristic
Search Genetic Algorithm and new routing algorithm. This
is due to the application of cluster head (CH) election
method for more stable and reliable routing link detection.
CH sensed the channel to identify the communication routes
with many cluster members the cluster members transmitted
the data packets to the CH for reducing the waiting time.
This in turn helps to enhance the energy efficiency and
improved network lifetime. Therefore, the energy
consumption of Metaheuristic Search Genetic Algorithm
gets reduced by 35% and 22% when compared to A-TEEN
routing protocol and new routing algorithm respectively.
4.3 Impact on Packet Delivery Ratio
Packet delivery ratio (PDR) is defined as ratio of
number of data packets correctly delivered to the sink node
from total number of data packets forwarded. It is measured
in terms of percentage (%). It is calculated as,
(3)
ISBN: 978-93-5619-947-7
Fig. 2: Measure of Energy Consumption
Table 3. Tabulation for Packet Delivery Ratio
Number of
Data packets
(Number)
10
20
30
40
50
60
70
80
90
100
Packet Delivery Ratio (%)
Metaheuristic
ATEEN
New
Search
routing
routing
Genetic
protocol
algorithm
Algorithm
75
81
90
78
83
92
76
80
89
75
78
87
78
82
90
81
85
93
79
82
91
77
80
88
80
83
92
82
86
94
Table 3 explains the performance value of packet
delivery ratio for three different methods namely
Metaheuristic Search Genetic Algorithm, Advanced
threshold-sensitive energy efficient sensor network (ATEEN) routing protocol and New routing algorithm. Packet
delivery ratio is determined with respect to number of data
packets in WSN.
The graphical representation of results is described in
figure 3.
176
Proceedings of International Multidisciplinary Conference on Information Science, Management
Research and Social Sciences
18th &19th April 2022
machine learning techniques with higher packet delivery
ratio and lesser energy consumption.
VI. CONCLUSION
.
Fig. 3: Measurement of Packet Delivery Ratio
Figure 3 describes the graphical analysis of packet
delivery ratio versus number of data packets in WSN. From
the figure, it is clear that packet delivery ratio using new
routing algorithm is lesser than Metaheuristic Search
Genetic Algorithm and A-TEEN routing protocol. This is
because of using new route updating rule based on ant
colony algorithm. The designed algorithm presented the
participation scale of ant during the searching process. In
addition, the route evaluation index is employed to improve
the pheromone updating process. Therefore, the packet
delivery ratio of new routing algorithm gets improved by
16% and 11% when compared to A-TEEN Metaheuristic
Search Genetic Algorithm and A-TEEN routing protocol
respectively.
IV.
DISCUSSION AND LIMITATIONS
Metaheuristic search enhanced the quality of service
parameters such as reliability and energy constraints through
identifying the multiple optimized paths. The tabu search
performed through forwarding reliable route packets for
finding the best route selection path. Tabu search process
avoided data redundancy of sensor nodes. But, delay time
was not minimized using metaheuristic search.A-TEEN
routing protocol enhanced the energy consumption
performance of cognitive wireless sensor network. A-TEEN
used CH election method of TEEN for performing the
routing link as stable and reliable one. The lifetime of
CWSN was improved using A-TEEN routing protocol.
Routing stability was improved by A-TEEN routing
protocol. However, data forwarding time was not minimized
using A-TEEN routing protocol.Routing algorithm called
ant colony algorithm was introduced to identify the optimal
path of data transmission in WSNs. However, the network
lifetime was not enhanced by routing algorithm.
5.1 Future Direction
The future direction of the work is to introduce energy
optimized data forwarding techniques in WSN by using
ISBN: 978-93-5619-947-7
An investigation analysis of different energy optimized
data forwarding techniques is carried out. From study, the
delay time consumption was not reduced by metaheuristic
search .In addition, energy consumption was not reduced
which resulted in minimizing the network lifetime by
routing algorithm. The data forwarding performance was
not improved by using EETC scheme. The wide range of
experiments on existing techniques compares the results of
different energy optimized data forwarding techniques and
discusses its limitations. Finally from result, the research
work can be carried out using machine learning for energy
optimized data forwarding with minimal energy
consumption and higher packet delivery ratio.
REFERENCES
P. SrinivasaRagavan and K. Ramasamy, “Optimized routing in
wireless sensor networks by establishing dynamic topologies based
on genetic algorithm”, Cluster Computing, Springer, January 2018,
Pages 1–7
[2] YanhongGe, Shubin Wang and Jinyu Ma, “Optimization on TEEN
routing protocol in cognitive wireless sensor network”, EURASIP
Journal on Wireless Communications and Networking, Springer,
Volume 2, December 2018, Pages 1-9
[3] Yongjun Sun, Wenxin Dong and Yahuan Chen, “An Improved
Routing Algorithm Based on Ant Colony Optimization in Wireless
Sensor Networks”, IEEE Communications Letters, Volume 21, Issue
6, June 2017, Pages 1317 – 1320
[4] ReetaBhardwaj and Dinesh Kumar, “MOFPL: Multi-objective
fractional particle lion algorithm for the energy aware routing in the
WSN”, Pervasive and Mobile Computing, June 2019, Pages 1-34
[5] SajjadHussainChauhdary, Ali Hassan, Mohammed A. Alqarni,
Abdullah Alamri, Ali Kashif Bashir, “A twofold sink-based data
collection in wireless sensor network for sustainable cities”,
Sustainable Cities and Society, Elsevier, Volume 45, 2019, Pages 1–7
[6] S. Diwakaran, B. Perumal and K. Vimala Devi, “A cluster prediction
model-based data collection for energy efficient wireless sensor
network”, The Journal of Supercomputing, Springer, Volume 75,
Issue 6, June 2019, Pages 3302–3316
[7] Shusen Yang, UsmanAdeel, YadTahir and Julie A. McCann,
“Practical Opportunistic Data Collection in Wireless Sensor
Networks with Mobile Sinks”, IEEE Transactions on Mobile
Computing, Volume 16, Issue 5, May 2017, Pages 1420 – 1433
[8] JerwinPrabu A and Abhinav Tiwari “Optimization approach for a
climbing robot with target tracking in WSNs”, Journal of Ocean
Engineering and Science, Elsevier, Volume 3, 2018, Pages 282–287
[9] Savvas Papaioannou, Andrew Markham and NikiTrigoni, “Tracking
People in Highly Dynamic Industrial Environments”, IEEE
Transactions on Mobile Computing, Volume 16, Issue 8, August
2017, Pages 2351 – 2365
[10] Khalid A. Darabkh, Wijdan Y. Albtoush and Iyad F. Jafar, “Improved
clustering algorithms for target tracking in wireless sensor networks”,
The Journal of Supercomputing, Springer, Volume 73, Issue 5, May
2017, Pages 1952–1977
[11] BartłomiejPlaczek, “Decision-aware data suppression in wireless
sensor networks for target tracking applications”, Frontiers of
Computer Science, Springer, Volume 11, Issue 6, December 2017,
Pages 1050–1060
[1]
177
Download