You are on page 1of 794

Stochastic Modeling & Applications ISSN: 0972-3641

Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Stochastic Modeling
&
Applications
Editor In Chief

Debasis Bhattacharya
Visva-Bharati University, Santiniketan, India

Carlo Bianca
Laboratorie de Physique Statistique, Paris, France

Indexing: The journal is index in UGC, Researchgate, Worldcat


Founder Editor

A.K.Basu

University of Calcutta, India

Editors

Prof . Debasis Bhattacharya


Visva-Bharati University, Santiniketan,India

Carlo Bianca
Laboratorie de Physique Statistique, Paris, France

Yuri E. Gliklikh
Professor of Mathematics Faculty
Voronezh State University
Voronezh, Russia

Prof. Sugata Sen-Roy


University of Calcutta, Calcutta India

Managing Editor

Martin Bohner
Missouri University of Science and Technology
Rolla, Missouri
USA

Editorial Board

M. Ahsanullah
Rider University, USA

Elias Camouzis
National and Kapodistrian University of Athens,
Department of Economics,
Sofokleous 1, 10559, Athens, Greece

B. Chaouchi
Energy and Smart Systems Laboratory (LESI),
Khemis Miliana University, Algeria
C.C.Y. Dorea
University of Brasilia,Brazil

Khalil Ezzinbi
Cadi Ayyad University, Faculty of Sciences Semlalia,
Department of Mathematics
Morocco

Nour-Eddin EL FAOUZI
Head of Unit | Transport and Traffic Engineering Laboratory (LICIT)
Université de Lyon | IFSTTAR and ENTPE

Lidia Z. Filus
Professor and Chair of Mathematics
Mathematics Department
Northeastern Illinois University,
5500 North St. Louis Avenue, Chicago, IL 60625, USA

Jesus Enrique Garcia


University of Campinas
Brazil

Enrico Guastaldi
Head of Applied and Environmental Laboratory, CGT
Via Vetri Vecchi 34, 52027 - San Giovanni Valdarno - Arezzo – Italy

Shezhana Hristova
Plovdiv University
Department of Applied Mathematics and Modeling
Plovdiv,
BULGARIA

N. Mukhopadhyaya,
University of Connecticut, USA

Mikhail Moklyachuk
Department of Probability Theory, Statistics and Actuarial Mathematics,
Taras Shevchenko National University of Kyiv,
Volodymyrska st.64, Kyiv 01601, Ukraine

Donal O'Regan,
School of Mathematics, Statistics and Applied Mathematics,
National University of Ireland, Galway, Ireland

J.S.Rao
University of California, Santa Barbara, USA
George G. Roussas
University of California ,Davis California,USA

Naseer Shahzad
Department of Mathematics
King Abdulaziz University
Jeddah, Saudi Arabia

V.A. Gonzalez-Lopez
University of Campinas
Brazil

Sencer Yeralan
University of Florida, Gainesville, Florida, USA.
Yasar University, Izmir, Turkey

Xiaowen Zhou
Department of Mathematics and Statistics
Concordia University
Canada

A.Ganesh
Asst.Professor, Department of Mathematics, RUSA Unit Project Coordinator, Govt. Arts and Science
College,
Hosur-635 109, Tamil Nadu, India

D. Jaya Shree
Department of Mathematics, Govt. Arts and Science College,
Hosur-635 109, Tamil Nadu, India

MuK Publications & Distributions


F-2562, Palam Vihar
Gurgaon-122017 (Haryana)
E-mail: mukpublications@gmail.com
https://www.mukpublications.com
Stochastic Modeling & Applications

Special Issue
On

Recent Research on Management, Applied Sciences and


Technology
Stochastic Modeling & Applications ISSN: 0972-3641

Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

CONTENTS
Research Papers
CORROSION BEHAVIOR OF 7075 ALUMINIUM ALLOY IN DIFFERENT 1–4
CONCENTRATION OF POTASSIUM HYDROXIDE AT DIFFERENT
TEMPERATURES

GNANAMURUGAN K

ANTIBACTERIAL ACTIVITY OF LEAF EXTRACTS OF CARICA PAPAYA AGAINST 5 – 12


SOME COMMON HUMAN PATHOGENIC BACTERIA

SHEERAZ AHMAD WAGAY, PARUL JAIN AND MURTAZ RASHID

COVID19 AND GLOBAL ANALYSIS OF ONLINE LEARNING IN HIGHER 13 – 23


EDUCATION USING MACHINE LEARNING

DR. HARVINDER KAUR

ROLE OF NAAC IN TECHNICAL EDUCATIONAL INSTITUTIONS LIBRARIES 24 – 27

MR. ABHISHEK KUMAR SHARMA AND DR. INDU BHARTI GHILDIYAL

WATER SAVINGS & REDUCTION OF COSTS THROUGH THE USE OF DUAL 28 – 41


WATER SUPPLY SYSTEM IN A SPORTS FACILITIES

SANJEEV KUMAR AND RAJIV BANARJEE

PERFORMANCE EVALUATION OF MACHINE LEARNING-BASED SMART GRID IN 42 – 51


AN INTERCONNECTED POWER SYSTEM BY USING WIRELESS
COMMUNICATION SYSTEMS

ASTHA SINGH KUSHWAHA, DR. MAHAVEER SINGH NARUKA AND E. R. PARITOSH


TRIPATHI

LIC’s IPO: AN EMPIRICAL STUDY 52 – 60

DR. ANAND KUMAR, PROF. SOMESH KUMAR SHUKLA AND DR. PRASHANT SINGH

CHILD PORNOGRAPHY LAWS IN INDIA: A CRITICAL STUDY 61 – 70

MONALIKA SINGH MAHESHWARI AND UJJWAL KUMAR SINGH

A DETAILED REVIEW METHODOLOGY FOR THYROID NODULE FEATURES 71 – 78


EXTRACTION: COMBINATION OF TEXTURAL AND MORPHOLOGICAL
FEATURES

REEMA PAREKH AND PROF. (DR.) MANISH THAKKER

REMOVAL OF HEAVY METALS FROM SOIL USING NANOMATERIALS: A 79 – 90


REVIEW

RAJNI KUMARI, MANVENDER SINGH AND VIKAS DHULL


THE LEGAL ASPECTS OF SPYWARE SURVEILLANCE IN INDIA – THE PEGASUS 91 – 96
CHALLENGE

MR. AMONKAR VASSUDEV ANANT SINAI AND DR. NAGESH COLVALKAR

A PILOT SURVEY ON UNDER WATERMILL FOR POWER GENERATION TO THE 97 - 101


MECHANICAL DEVICES

GNANAMURUGAN K

RESTRAINED DOUBLE GEODETIC NUMBER OF A GRAPH 102 - 108

T. JEBARAJ AND AYARLIN KIRUPA M

APPLICABILITY OF ENTERPRISE RESOURCE PLANNING SYSTEM FOR 109 – 115


BETTERMENT OF HIGHER EDUCATION EXAMINATION PROCESS: A CASE
STUDY FOR NEP 2020

AARTI SOLANKI, SANJAY BANSAL, ARUN VAISHNAV AND ABHIJEET SUKHWAL

DESIGN & DEVELOPMENT OF THERMOELECTRIC GENERATOR FOR POWER 116 – 120


GENERATION USING EXHAUST GAS FROM INTERNAL COMBUSTION ENGINE

AJITHA MARY C AND PREMLATA PANDIT

NOTION OF SPACES USING MODULUS FUNCTION 121 – 126

SAMEER AHMAD GUPKARI

SOCIAL SUPPORT AND MENTAL HEALTH AMONG OBESE PEOPLE 127 – 135

M. YOUSUF ADAM AND DR. MOHAMMAD AMIN WANI

PROSPECTS OF BRACKISH WATER FISHERIES IN TIDALLY ACTIVE INDIAN 136 – 151


SUNDARBANS

PRADIP CHANDRA PATRA, DEBDIP BHATTACHARJEE, ANIMESH JANA, UTTAM


MUKHOPADHYAY, DHIMAN CHAKRABORTY AND AMAL MAHATO

ROLE OF ONLINE EDUCATION IN STUDENTS ACHIEVEMENT: A COMPLETE 152 – 156


CASE STUDY OF INVOLVEMENT OF PARENTS AS SMC MEMBERS

MS. RACHANA AND DR. HARISH KUMAR

A SMART MASK WITH SPEECH TO TEXT CONVERSION 157 – 162

SENBAGAVALLI.G, SHASHIDHAR SATISH HEGDE, REVANNARADHYA R, PRAVEEN B AND


SUDEEP V

A NOVELAPPROACH FOR PERFORMANCE-BASED FACULTY CLUSTERING 163 – 171

PREETI JAIN DR. GYANESHSHRIVASTAVA AND DR. UMESH KUMAR PANDEY

ASTUDY ON ACOUSTICAL PARAMETERS OF NIXCO1-XFE2O4 NANOFERROFLUIDS 172 – 177


PREPARED BY CO-PRECIPITATION METHOD

P. CHITHRALEKHA, K. GANGADEVI R. SRINIVASAN AND R. KARTHICK


DETERMINANTS OF ONLINE TRAVEL PURCHASE INTENTION: 178 – 189
UNDERSTANDING THE MODERATING ROLES OF SOCIO-DEMOGRAPHIC
VARIABLES IN THE CONTEXT OF A DEVELOPING COUNTRY

SATADRUTI CHAKRABORTY AND DR. DIPA MITRA

A REVIEW ON MACHINE LEARNING APPROACHES FOR NETWORK INTRUSION 190 – 195


DETECTION SYSTEM

SURUCHI GAUTAM, RAVINDER BAHL AND DR. RAMAN CHADHA

IN VITRO ANALYSIS OF ANTIMICROBIAL ACTIVITY OF SOME INDIAN 196 – 199


MEDICINAL PLANTS

VED RAM SHARMA, MOHSIN HASAN KHAN AND SWAPANIL YADAV

FABRICATION OF A TEST RIG FOR EXPERIMENTAL STUDIES ON 200 – 209


MISALIGNMENT EFFECT BETWEEN ROTORS CONNECTED THROUGH
FLEXIBLE COUPLING BY TORQUE AND VIBRATION MEASUREMENTS

MILI HOTA AND V.D.DHIMAN

INTEGRATED WATER RESOURCES MANAGEMENT FOR AYODHYA 210 – 233


(FUTURISTIC APPROACH)

ARUN KUMAR YADAV, RAJIV BANARJEE, MD. SAJID AND DR. SYED AQEEL AHMAD

A STUDY OF CONSUMER BEHAVIOUR AND PREFERENCES TOWARDS FOOD ORDERING 234 - 238
AND DELIVERY PLATFORM / SERVICES AVAILABLE IN INDIA

DR. JAYASHREE MEHTA

EFFECTIVENESS OF SUNDRY SOLVENTS OVER EROSION RATE IN VIBRO 239 – 243


CLEANER USING ULTRASOUND STATISTICS

VIPULKUMAR ROKAD AND DIVYANG H. PANDYA

VALUATING THE IMPACT OF EHRM ON INSTITUTIONAL PERFORMANCE 244 – 248

S. SAKTHI KAMAL NATHAN, DR. D. JAGADEESAN AND DR. R. KARTHI

POWER DOMINATOR CHROMATIC NUMBER FOR CENTRAL GRAPH, 249 – 257


SUBDIVISION GRAPH FAMILY

A. UMA MAHESWARI, BALA SAMUVEL J AND S. AZHAGARASI

FINANCIAL ANALYSIS OF MOTHERSON SUMI SYSTEMS LIMITED, ENDURANCE 258 – 263


TECHNOLOGIES LIMITED AND VARROC ENGINEERING LIMITED WITH
REFERENCE TO PRE AND POST BS VI NORM

DR. BABITA KANOJIA AND CHETAN DEVASHISH BOSE

AN ANALYTICAL STUDY OF E-COMMERCE IN RATNAGIRI DISTRICT 264 – 267

MRS. SHREEYA VAIBHAV RAUT

INDIA’S INDUSTRIAL GROWTH SCENARIO DURING COVID-19 PANDEMIC- A 268 – 283


TIME SERIES ANALYSIS

DR. SIDHARTHA SANKAR LAHA


A NEW GENERALIZATION OF TBS-g¨-SPACES 284 - 289

K. GOWRI, T. RAMACHANDRAN AND V. SANGEETHASUBHA

ON SOLVING SOLID ASSIGNMENT PROBLEM WITH APPLICATION TO REAL 290 – 293


LIFE

DHANASHRI A. MUNOT AND DR. KIRTIWANT P. GHADLE

RELATIONSHIP ORIENTATION OF B2B SALES THAT ENABLES RECIPROCATION 294 - 302


IN ENGAGEMENT

KUNAL R JOSHI AND DR. D ANAND

STUDY AND PREDICTION OF SCOURING NEAR THE BRIDGE PILLAR IN THE 303 – 308
RIVER

ALOK KUMAR YADAV, MD. SAJID AND DR. SYED AQEEL AHMAD

ANALYSIS OF SOCIAL MATURITY AND ITS RELATIONSHIP WITH ACADEMIC 309 – 313
PERFORMANCE IN CHEMISTRYAMONG HIGHER SECONDARY STUDENTS

S. UMAMAHESWARI AND DR. P. KARTHIKEYAN

ANALYTICAL SOLUTION OF THERMAL RADIATION, CHEMICAL REACTION 314 – 327


AND VISCOUS DISSIPATION EFFECTS ON MHD FREE CONVECTION FLUID
FLOW PAST A VERTICAL PLATE IN THE PRESENCE OF DIFFUSION-THERMO

S. RAMA MOHAN AND N. MAHESHBABU

MODIFIED NEW GENERAL INTEGRAL ADOMIAN DECOMPOSITION METHOD 328 – 332


TO SOLVE RICCATI DIFFERENTIAL EQUATION IN QUADRATIC FORM BASED
ONNEWTON - RAPHSON METHOD

K. N. VABLE AND DR. D. P. PATIL

HARMONIOUS COLORING ON STAR GRAPH 333 – 340

N. ANANTHI AND V. T. CHANDRASEKARAN

REVIEWS ON BRAIN TUMOUR SEGMENTATION AND CLASSIFICATION USING 341 – 349


CONVENTIONAL MACHINE LEARNING AND DEEP-LEARNING APPROACH

DEBENDRA KUMAR SAHOO, SATYASIS MISHRA AND MIHIR NARAYAN MOHANTY

SPATIAL AND TEMPORAL ANALYSIS OF DIASPORA IN SOUTH ASIA 350 – 353

ABHISHEK SINGH AND DR. SUNIL KUMAR JHA

STRUCTURAL AND OPTICAL ANALYSIS OF GLYCINE SUBSTITUTED 354 – 365


SULPHAMIC ACID

FREDSELIN R.S VITHEL AND R. MANIMEKALAI

TRANSLATIONSOF BIPOLARVALUED MULTI FUZZY SUBNEARRING OF A 366 – 370


NEARRING

S. MUTHU KUMAR AN AND B. ANANDH


A COMPARATIVE ANALYSIS OF FOOD GRAIN PACKAGING BASED ON 371 – 376
CONSUMER PERCEPTION BY USING NOVEL, NEW NOVEL AND IMPROVED
ACCURACY FUNCTIONS UNDER INTERVAL-VALUED INTUITIONISTIC FUZZY
SETTING

C. GLADIA VINCY AND M. MARY MEJRULLO MERLIN

TEST CASE PRIORITIZATION WITH ENHANCED METAHEURISTIC 377 – 388


ALGORITHM: ‘AMBHA_GWO’

BHAWNA JYOTI AND AMAN KUMAR SHARMA

EXPORTING FISH SEEDS USING MULTI-OBJECTIVE TRANSPORTATION 389 – 394


MODELS

T. LENIN AND K. SUNDAR

ANALYTICAL SOLUTION OF A FRACTIONAL ORDER BIOLOGICAL 395 – 406


POPULATION MODEL USING LAPLACE ADOMIAN DECOMPOSITION METHOD

PRADIP R. BHADANE AND KIRTIWANT P. GHADLE

INTUITIONISTIC FUZZY PRIME BI-IDEALS IN NEAR-SUBTRACTION 407 – 414


SEMIGROUPS

K. MUMTHA AND V. MAHALAKSHMI

RENDEZVOUS POINT SELECTION WITH MULTIPLE MOBILE SINKS IN WSN BY 415 – 421
USING ENHANCED CLUSTERING AND ANT COLONY ALGORITHM

DEEPAK KUMAR SINGH, DHIRENDAR KUMAR AND SAURABH JHA

POLICE REFORMS IN INDIA- A CRITICAL ANALYSIS 422 - 427

TANISHA GUNIYAL AND DR. LAKSHMI PRIYA VINJAMURI

HOMOMORPHISM IN BIPOLAR VALUED I-FUZZY IDEAL OF A RING 428 – 431

PANCHAL CHETNA SHAILESH, M. PALANIVELRAJAN AND K. ARJUNAN

CUSTOMER PERCEPTION TOWARDS ONLINE BIKE-TAXI SERVICES: AN 432 – 437


EMPIRICAL STUDY

SYED MOHAMMED ABUL WASEEM AND DR. RESHMA NIKHAT

EFFECT OF ADVERTISEMENT ON PURCHASE BEHAVIOUR OF CONSUMER 438 - 443


DURING COVID-19

N. PRABHAKARAN

A CONCEPTUAL STUDY ON THE TRENDS OF KNOWLEDGE AND KNOWLEDGE 444 – 450


MANAGEMENT

SUMAN BALA, NEETU RANI AND POOJA

A STUDY OF AUDITORS AWARENESS OF FORENSIC ACCOUNTING AND 451 – 460


PERCEPTION ON FRAUD

SEEMA DEVI AND RAM RATTAN SAINI


ASSESSING THE WORK ENVIRONMENT OF SURAT DIAMOND POLISHING 461 – 468
INDUSTRY

RUCHIKA AGARWAL AND DR. SARJOO PATEL

ECO-FRIENDLY PRODUCTS: ASSESSING AND ENHANCING THE AWARENESS OF 469 – 473


THE HOMEMAKERS

DR. SARJOO PATEL AND MS. KAVITA SHAH

DOCUMENTARY DEVELOPMENT: ASSESSMENT OF SATISFACTION AND 474 – 480


VISITING INTENTIONS OF THE VIEWERS

DR. SARJOO PATEL AND ASTHA GARG

PROBABILISTIC ANALYSIS OF ANNUAL TIME SERIES OF PRECIPITATION DATA 481 – 488


OVER MARATHWADA REGION OF MAHARASHTRA, INDIA

PRITI PARMAR, MOHIT MAYOOR AND HARENDRA PRASAD SINGH

TRAINING THE 12th PASS OUT GIRLS ON HOSPITALITY MANAGEMENT 489 - 493
OPERATIONS FOR PROVIDING THEM EMPLOYABILITY

MISS SMITA AND DR. SARJOO PATEL

IMPROVED INTERNET OF THINGS DEVICE SECURITY USING THE 494 – 503


DEPLOYMENT OF BLOCKCHAIN TECHNOLOGY

CHETAN CHAUHAN AND DR. MANOJ KUMAR RAMAIYA

A STUDY OF CONSUMER BEHAVIOR TOWARDS ONLINE SHOPPING 504 – 507

DR. JAYASHREE MEHTA

DIGITAL MARKETINGAND ITS IMPACT ON CONSUMER BUYING BEHAVIOR 508 - 512

MRS. SHREEYA VAIBHAV RAUT

NETWORK RANSOMWARE DETECTION BY GROUP SEARCH OPTIMIZATION 513 – 520


AND MACHINE LEARNING TECHNIQUES

SHWETA SHRIVASTAVA AND DR. S. VEENADHARI

ADOPTION OF ECOLOGICAL MARKETING: AN EMPIRICAL STUDY 521 – 528

DR. V N BAJPAI, DR. SATISH KUMAR AND DR. ASHISH KUMAR JHA

CRITICAL THINKING ENHANCING PREDICTIVE PARAMETERS TO EARLY 529 – 537


DETECTION OF LEUKEMIA AN ANALYTICAL MODELING USING WEKA

MS. HARSH PALIWAL AND DR. KUNTAL BARUA

AN EMPIRICAL ANALYSIS OF MACHINE LEARNING MODELS FOR SENTIMENT 538 – 543


ANALYSIS OF TWITTER REVIEWS

SHWETA BARHATE

LEGAL PROTECTION OF GEOGRAPHICAL INDICATION IN INDIA 544 – 553

DR. NAMAH DUTTA AND PARUL SHARMA


ELECTRONIC PRODUCTS PRODUCTION INVENTORY MODEL WITH EXTENDED 554 – 561
PRODUCER’S RESPONSIBILITY COST PARAMETERS

M. KASI MAYAN, NIVETHAMARTIN AND D. SELVI

COMPARATIVE STUDY BETWEEN FERROCEMENT AND CONCRETE 562 – 567

MR. DEVDATTA K. MOKASHI, MRS. JOTHI DHANKE, MR. NILESH MADHAV SHIVPUJE,
MR. BALJAI RAM BIRADAR AND MR. TEJODEEP DEEPAK KORPE

INFLUENCE OF BIRTH ORDER ON ACHIEVEMENT MOTIVATION AMONG 568 – 572


ADOLESCENTS

J. MAMATHA AND DR. SHIVAKUMARA. K

ON SOME NEW Ö- -CLOSED SETS WITH RESPECT TO AN IDEAL TOPOLOGICAL 573 – 577
SPACES

T. SIVA SUBRAMANIA RAJA, G. ARUNA DEVI, G. THANAVALLI AND A. PANDI

A GREEN SYNTHESIS AND CHARACTERIZATION OF ERBIUM DOPED CERIA– 578 – 590


ZIRCONIA NANOCOMPOSITES USING MORINDACITRIFOLIA FRUIT EXTRACT
AND ITS ANTI-CANCER ACTIVITIES

TAMILSELVI RAMASAMY, SUBALAKSHMI BABU, THIRUMOORTHI ARUNACHALAM AND


KATHIKEYAN KATHIRAVAN

ULTRASONIC VELOCITY MEASUREMENTS OF MONOCROTOPHOS SOLUTIONS 591 – 595


IN AQUEOUS AND NON-AQUEOUS SOLVENTS

ARVIN PANWAR, UMENDRA KUMAR AND MANISHA

A SECURE DATA SHARING SCHEME USING LIGHTWEIGHT SEARCHABLE 596 – 599


ATTRIBUTE BASED ENCRYPTION (LSABE) FOR CLOUD COMPUTING

DR. B RASINA BEGUM, M. PREM KUMAR, S. FAZIL MOHAMED, M. SHAIK FAREED AND
N. SHEIK ABDULLAH

IMPLEMENTATION OF THE PROTECTION OF WOMEN FROM DOMESTIC 600 – 603


VIOLENCE ACT, 2005 DURING PANDEMIC: A REVIEW

LALITA AND DR. JAGBIR NARWAL

A ROLE OF QUEUING THEORY IN OPERATIONAL DECISIONS: WITH SPECIAL 604 - 610


REFERECENCE TO CEMENT MANUFACTURING PLANT

THANESHWARLAL VERMA AND D. K. GANGESHWER

A STUDY OF INTEGRATED MARKETING COMMUNICATION PRACTICES (IMC) 611 – 621


IN HIGHER EDUCATION INSTITUTES (HIES) IN THE ERA OF NATIONAL
EDUCATIONALPOLICY (NEP)

PROF. DR. KARUNA GOLE

APPLICATIONS OF “INTERNET OF THINGS (IoT)”: A REVIEW 622 - 627

POONAM AND VAISHALI SINGH

VOTING RIGHTS OF PRISONERS: A CRITICAL ANALYSIS 628 - 633

DR. SATISH CHANDRA AND DAL CHANDRA


ABSTRACTION OF CODE COMPLIANCE INFORMATION USING PYTHON FROM 634 – 640
THE IFC MODEL

ER. NARINDER SINGH, PROF. HARVINDER SINGH AND PROF. HARDEEP SINGH

CONSEQUENCES OF INDIA CHINA BORDER DISPUTE ON THE SALE OF CHINESE 641 – 646
MOBILE PHONES IN KERALA

NUSARATH K. K AND DR. HABEEBURAHIMAN P. M

OPERATING CYCLE: A TOOL FOR WORKING CAPITAL 647 – 655

DR. HITESH G. SUTHAR

GENDER’S IMPACTS ON PERCEPTION TOWARDS INFLUENCER MARKETING 656 - 662


FOR OTT PLATFORM

DR. RACHIN SURI, AMIT KUMAR MANDAL AND MANVI KHOSLA

SYNTHESIS, CHARACTERIZATION AND ANTIMICROBIAL STUDY OF 663 – 665


SULFONAMIDE METAL DRUG COMPLEXES

AMIT KUMAR

MODERN JUDICIAL INSTITUTION IN ARUNACHAL PRADESH: THE COURT 666 – 669

ROBIN HISSANG

USES OF SOCIAL MEDIA AMONG STUDENTS PURSUING HIGHER EDUCATION 670 – 676
IN UTTAR PRADESH

CHHAYA BJAPAI AND DR. SITA DEVI

EMERGING TRENDS AND PATTERNS IN MICRO FINANCE IN INDIA 677 – 683

SAGAR SHUKLA AND DR TRUPTI SINGH

EMPOWERMENT OF PERSONS WITH DISABILITIES IN INDIA: WITH SPECIAL 684 – 688


REFERENCE TO UTTAR PRADESH

ALENDRA TRIPATHI AND DR. A. P. BHARTI

IMPACT OF COVID-19 LOCKDOWN ON RESTAURANT BUSINESS IN 689 – 694


PUDUCHERRY

DR. S. VAIDHEESWARAN AND MS. K. KALAIVANI

APPLICATION OF DECISION TREE CLASSIFIER FOR CLASSIFYING THE 695 – 701


PURPOSE OF INVESTMENT

TANMAY GUPTA, RAVINDRA GHARPURE AND RAHUL MOHARE

CONSUMERS BUYING BEHAVIOUR TOWARDS ONLINE PURCHASE OF 702 – 708


PHARMACEUTICAL PRODUCT (MEDICINE) DURING COVID-19 PANDEMIC IN
CHANDRAPUR AREA

DR. KAVITA HINGANE


PHASE OF NATIONALIZATION OF BANKS IN INDIA 709 – 715

VIVEK KUMAR TIWARI AND DR. S. D. SHARMA

EFFECTIVE USAGE OF HELLO PACKET AND TIME STAMP TO IMPROVE THE 716 – 723
END-TO-END DELAY

MUKUL RUSTAGI AND SURJEET

DATA SECURITY OF IOT DEVICES USING BLOCKCHAIN 724 – 728

SURJEET

EXTENSION OF SRIVASTAVA -HYPER GEOMETRIC FUNCTION 729 – 735

AMARNATH KUMAR THAKUR* AND SHAILENDRA KUMAR SAHU

PELTIER COOLER BASED TEMPERATURE CONTROLLER FOR CCD DETECTOR 736 – 741
IN RAMAN SPECTROMETER DESIGNING

PANKAJ UPADHYAY, P. BHASKAR AND RAMESH DATLA

CANDIDATE EXPERIENCE OF AI IN TALENT ACQUISITION: A STUDY ON THE IT 742 – 754


SECTOR

DR. SWETA BANERJEE AND DR. MITTAL MOHITE

FUZZY DECISION TREES WITH MATHEMATICAL SOFTWARE 755 – 762

DR. B. MOHANA PRIYAA

A NEW METHOD TO FIND BASIC ACCEPTABLE SOLUTION FOR 763 – 766


TRANSPORTATION PROBLEMS

J. BOOBALAN AND P. RAJA

COMPRESSION OF DIFFERENT TECHNIQUE USING FOR INTERFERENCE 767 – 771


AVOIDANCE MECHANISMS IN BLUETOOTH

NITI SINGHAL AND DR. RUCHI SHARMA

MODIFIED EXPANDING RING SEARCH BASED ON TTL OPTIMIZATION FOR 772 - 778
MANETS

PRAKHAR SHARMA AND SURJEET


Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

CORROSION BEHAVIOR OF 7075 ALUMINIUM ALLOY IN DIFFERENT CONCENTRATION OF


POTASSIUM HYDROXIDE AT DIFFERENT TEMPERATURES

GNANAMURUGAN K

ABSTRACT
The erosion geste of 7075 Aluminium matrix were experimentally assessed. The erosion test carried out
at different temperature in potassium hydroxide medium at a attention of 0.5N, 0.75N and1N
as erosion media using Tafel extrapolation and Electrochemical impedance a attention of 0.5 N, 0.75 N
spectroscopy (EIS). The face morphology was studied using scanning electron microscope (SEM).
The results attained from Tafel extrapolation fashion and electrochemical impedance spectroscopy studies were
in good agreement. The results indicatesthatan increase in erosion rate with increase in temperature as well as
increase the attention of erosion media.

A. INTRODUCTION
Corrosion of structural elements is a major issue for any industry because of the chemical environment of
chemical processing.al 7075 is special class of ultra-high strength metals that differ from conventional
aluminium in that they are hardened by a metallurgical reaction. Recently, the needs of high reliable substances
of high strength and high ductility are gradually increased with the development of aerospace industry. The
characteristics of this grey and white steel are high ductility, formability; high corrosion resistance, high
temperature strength, ease of fabrication; weldability and maintenance of an invariable size even after heat
treatment. The corrosion rate of al 7075 in acid solutions such as sulphuric acid, hydrochloric acid, formic acid,
and steari acid are substantial. Heat treatment affects the corrosion rate. Critical and passive current densities
increase as the structure is varied from fully annealed to fully aged. Several technical papers covering alloy
design, material processing, thermo-mechanical Treatments, welding, strengthening mechanisms, etc., have
been published. Aluminium have emerged as alternative materials toconventional quenched and tempered steels
for advanced technologies such as aerospace, nuclear and gas turbine applications.potassium hydroxide is
usually used in degreasing purpose. The corrosion behavior of al 7075 was investigated in koh over a range of
concentration. Electrochemical techniques like tafel extrapolation and electrochemical impedance spectroscopy
were studied and have revealed that the corrosion rate of al 7075 samples increase with increase in
concentration of koh in the medium.
II. METHODS
2.1 Material
The experiments were performed with specimens of 7075 aluminium alloy. The composition of the 7075
aluminium alloy specimens is given in table 1.
Table 1: Composition (wt %) of Aluminium 7075 alloy
ELEMENT Ti Cr Mn Fe Si Cu Mg Zn Al
PERCENTAGE 0.15 0.2 0.4 0.5 0.5 1.8 1.9 3.25 Bal
Rectangular shape of metals were cut from the plate and covered with Teflon tape in such a way that, the area
exposed to the medium is 1 cm2. These metals were polished as per standard metallographic practice, followed
by polishing with emery papers, finally on polishing wheel using legated alumina to obtain mirror finish,
degreased with acetone, washed with double distilled water and dried before immersing in the corrosion
medium.
2.2. Medium
A stock solution of potassium hydroxide was prepared by dissolving analytical grade of potassium hydroxide
pellets in double distilled water and standardized by volumetric method using phenolphthalein indicator.
Solutions of required concentration 0.5, 0.75 and 1.0N were prepared by appropriate dilutions as and when
required. Experiments were carried out at temperatures 250C, 300C, 350C, 400C, 450C and 500C.
2.3. Electrochemical Measurements
Electrochemical measures were carried out by using an electrochemical work station, CH608E-
series.Instrument (USA) with a beta software as shown in the Fig1. Polarization measures were carried
out using conventional three electrode assembly having Pyrex glass cell with platinum counter electrode
1
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

and impregnated calomel electrode (SCE) as reference electrode. The working electrode was made up of
Al7075. The polarization angles were recorded incontinently after the EIS studies on the same electrode
continuously one after the other.

Fig.1: (a) The Electrochemical work station and (b) Experimental setup
2.3.1. Tafel Polarization Studies
Finely polished Al7075 samples of1.0cm2 face area were exposed to erosion medium of different attention of
potassium hydroxide (0.5 N, 0.75 N and1.0 N) independently at different range of temperature (250C-500C).
The potentio dynamic current eventuality angles were recorded by centralizing the instance to-250mV
cathodically and 250mV anodically with respect to open circuit eventuality (OCP) at checkup rate of 5 mV/s.
2.3.2. Electrochemical Impedance Spectroscopy Studies (EIS)
Electrochemical impedance spectroscopy( EIS), which gives early information about the
electrochemical processes, at the essence result interface, has been used in numerous reports on
the erosion studies.The erosion geste of the Al7075 was also attained from EIS fashion using electrochemical
work station, CH608E- Instrument (USA). In‘EIS fashion a small breadth ac signal of 10 mV and frequence
diapason from100 kHz to 0.01 Hz was impressed at the OCP and impedance data were anatomized using
Nyquist plots. The charge transfer resistance, Rt was uprooted from the periphery of the element in
Nyquist plot. In all the below measures atleast three analogous results were considered and
their average values are reported. The face morphology of aluminium face, in the absence and in the presence of
the medium was studied. SEM image of glass polished face of Al7075 was taken first using Analytical
Scanning Electron Microscope. also it was immersed in potassium hydroxide medium and SEM image of the
eroded sample was recorded.
2.3.3. Scanning Electron Microscopy (SEM)
The effect of potassium hydroxide medium on the erosion rate of 7075 aiuminium matrix was studied
using Tafel polarization fashion.Fig. 2- 4 represents the potentiodynamic polarization angles of Al7075 matrix
in colorful attention of potassium hydroxide at different temperature. Results are tabulated in Table 2.
The erosion geste of 7075 aluminium amalgamation samples was also delved by EIS ways in colorful attention
of potassium hydroxide medium. The impedance gamuts were recorded and displayed as Nyquist plots as
a function of strength of result. Nyquist plots for Al 7075 matrix in different attention of potassium
hydroxide medium at different temperatures are shown in Fig 5 and 7 independently. The Rp
values attained from EIS measures are reported in Table1.still, the fractions of the impedance gamuts for
the7075 aluminium amalgamation samples inpotassium hydroxide.
III. RESULTS AND DISCUSSION
3.1. Tafel Polarization Measurement
The effect of potassium hydroxide medium on the erosion rate of 7075 aiuminium matrix was studied
using Tafel polarization fashion. Fig. 2- 4 represents the potentiodynamic polarization angles of Al7075 matrix
in colorful attention of potassium hydroxide at different temperature. Results are tabulated in Table 2.

2
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig.2: Tabel polarization curves for matrix of Al7075 at different temperatures in 0.25N KOH

Fig.3: Tafel polarization curves for matrix of Al7075 at different temperatures in 0.75N KOH
IV. CONCLUSIONS
A study of the corrosion behavior of 7075 aluminium matrix in different concentrations of potassium hydroxide
at different temperatures by electrochemical methods lead to the following conclusions:
REFERENCE
[1] Abd Ei-Rehim SS, Ibrahim MAM, Khaled KF (1999) 4-Aminoantipyrine as an inhibitor of mild steel
corrosion in HCl solution. J Appl Electrochem 29: 593-599.
[2] Almeida E, Pereira D, Figueiredo MO, Lobo VMM, Morcillo M (1997) The influence of the interfacial
conditions on rust conversion by phosphoric acid. Corros Sci 39: 1561-1570.
[3] R. Asthana, M. Singh, N. Sobczak (2005), The role of wetting and reactivity in infiltration of ceramic-
metal composites, Ceram. Eng. Sci. Proc. 2,249-261.
[4] Bellanger G, Rameau JJ (1996) Effect of slightly acid pH with or without chloride in radioactive water on
the corrosion of maraging steel. J Nuclear Mat 228:24-37.
[5] Bellanger G (1994) Effect of carbonate in slightly alkaline medium on the corrosion of maraging steel. J
Nuclear Mat217:187-193.

3
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[6] Cheng S, Chen S, Liu T, Chang X, Yin Y (2007) Carboxymethylchitosan + Cu2+ mixture as an inhibitor
used for mild steel in 1 M HCL. Electrochim Acta 52: 5932-5938.
[7] J.E.Castle, L.Sun and H.Yan (1994),The use of scanning auger microscopy to locate cathodic centers in
SiC/Al6061 MMC And to determine the current density at which they operate, Science, 36(6), 1093-1110.
[8] H.E. Deve, C. McCullough (1995), Continuous-fiber reinforced Al composites: A new generation, JOM 4
,33-37.
[9] J.M.G.DeSalazar, A.Urefia, S.Mazanedo and M.Barrens (1999), Corrosion behaviour of AA6061 and
AA7075 reinforced with Al2O3 particulates in aerated 3.5%chloride solution potentiodynamic
measurements and microstructure evaluation, Corrosion Science, 41, 529-545.
[10] El-Neami KKH, Mohamed AK, Kenawy IM, Fouda AS (1995) Inhibition of the corrosion of iron by
oxygen and nitrogencontaining compounds. Monatsh Chem J 126: 369-376.
[11] Gunasekaran G, Chauhan LR (2004) Eco friendly inhibitor for corrosion inhibition of mild steel in
phosphoric acid medium. Electrochim Acta 49: 4387- 4395.
[12] Gurrappa & V. V. Bhanu Prasad (2006) Corrosion characteristics of aluminium based metal matrix
composites, Materials Science and Technology, 22:1, 115-22, DOI: 10.1179/174328406X79324.
[13] Katsuaki Suganuma. (1993) Interfaces in β–SiC whiskers/6061 aluminum composites. Journal of Materials
Research 8:10, pages 2569-2576.
[14] Krupakara, P. V (2013), Corrosion Characterization of Al6061/Red Mud Metal Matrix Composites,
PortugaliaeElectrochimicaActa 31(3), 157-164.
[15] S. Lakshmi Priya, A. Chitra, S. Rajendran & K. Anuradha (2005) Corrosion behaviour of aluminium in
rain water containing garlic extract, Surface Engineering, 21:3, 229-231, DOI: A
10.1179/174329405X50073.
[16] Larabi L, Harek Y, Benali O, Ghalem S (2005) Hydrazide derivatives as corrosion inhibitors for mild steel
in 1 M HCl. Prog Org Coat 54: 256-262.

AUTHOR DETAILS:
GNANAMURUGAN K
Department of Mechanical Engineering, Perunthalaivar Kamarajar Institute of Engineering and Technology,
Puducherry, India

4
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

ANTIBACTERIAL ACTIVITY OF LEAF EXTRACTS OF CARICA PAPAYA AGAINST SOME


COMMON HUMAN PATHOGENIC BACTERIA

SHEERAZ AHMAD WAGAY, PARUL JAIN AND MURTAZ RASHID

ABSTRACT
The Bioactive compound of leaf of carica papaya become extricated utilizing water, methenol, ethanol &
chloroform and had been tested for antibacterial movement against a few pathogenic microscopic organisms
like Klebsilla, S.aureus, Bacillus, Proteus, Cons, E.coli, Pseudomonas, Acromobactor, Enterococci by means of
the Agar well dissemination method & Disc diffusion method. In phytochemical investigation showed that the
extract include Alkaloid, Tannins, Saponins, Glycosides & Phenols. In Agar disc diffusion Method the aqueous
extricate of Carica papaya appeared more action against Enterobactor, zone of distance across fresh leaf
(20±0.6 mm), sun dried leaf ( 28±0.8 mm), shade dried leaf (25±0.7 mm) & Methenol extract of Carica Papaya
showed more activity against Cons, zone of diameter fresh leaf (22±0.6 mm), sun dried leaf (27 ±0.8mm),
shade dried leaf (25±0.6mm) compared to other solvent extractThe aqueous extract of Carica papaya
demonstrated greater activity against Enterococci, zone of diameter fresh leaf, in the Agar well diffusion
method. (24±0.9 mm), sun dried leaf (15±0.6 mm), shade dried leaf (20±0.7 mm) & Methanol extricate of
Carica Papaya appeared more action against Bacillus, zone of diameter fresh leaf (18±0.5 mm), sun dried leaf
(10±0.3 mm), shade dried leaf (12±0.4 mm) compared to other solvent extract. Presences of phytochemical &
antimicrobial activity are confirmed.
Keywords- Antibacterial activity, Phytochamical analysis, leaf extract & zone of inhibition.

INTRODUCTION
Carica papaya is a member of the Caricaceae family. It's also known as the pawpaw tree, papaya tree, papayer,
tinti, pepol, chich placed, fan kua, pale shou kuo, kavunagaci, and kepaya.. (1) The takes to the air, herbal
product, seed, latex, and root are some of the most commonly used components. The plant is described as a
short-lived, erect, mostly unbranched tree or bush, 7-8m tall, with abundant latex, and a trunk that extends
nearly 20cm throughout.. The plant is moreover depicted in a archived belongings shapes and it act as ache
relieving, amebicide, antibacterial, cardiotonic,cholagogue, belly associated, emenagogue, febrifuge,
hypotensive, purgative, pectoral, stomachic and vermifuge.It's miles disseminated all through asia, nigeria and
so forth.(2)
Scientific Classification of Carica Papaya-
Kingdom - Plantae
Order - Brassicales
Family - Annonaceae
Genus - Carica
Species - Carica Papaya
The natural products, clears out & latex gotten from Papaya plant are utilized medicinally & for different other
purpuse. Papain, a major chemical compound extricated from natural product. Polysaccharides, vitamins,
minerals, chemicals, proteins, alkaloids, glycosides, fats and oils, lectins, flavonoids, sterols, and other
photochemical counting polysaccharides, vitamins, minerals, chemicals, proteins, alkaloids, glycosides, fats and
oils, lectins, flavonoids, sterols, and other photochemical counting polysaccharides, vitamins, minerals,
chemicals, proteins, alkaloids, glycosides Regular consumption of papaya ensures a consistent supply of
vitamins A and C. (3)
MATERIALS AND METHODS
Collection of Plant Materials
Fresh Carica papaya leaves were harvested in and around Bhopal Basoda Village from March to April of 2013.
(M.P).These were at that point composed in a hygienic polythene pack, flushed, sundried, shadedried and made
into a fine frame some time recently utilize.
Sterilization of Materials
All glasswares were washed with cleanser and flushed with delicate water correctly. Those were at that point
speak dried some time currently wrapping with aluminum thwart and sterilized in warm speak stove at 170°c
5
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

for 2hours. Arranged media which include supplement agar and supplement broth were sterilized in an
autoclave at 121°c for 15minutes. Plug borer, glassrods and forceps were sterilized with the aid of plunging in
70% ethanol which changed into at that point blazed in bunsen fire. The immunizing circle become moreover
sterilized by means of warming in bunsen hearth. The vaccinating circle turned into too sterilized through
warming to redness making use of exposed hearth a while currently and after each utilize.
Collection and Maintenance of Test Organisms
The check lifestyles bureaucracy that have been applied were all human pathogenic living beings from scientific
root. These confines comprise escherichia coli, pseudomonas, klebseilla , staphylococcus aureus, proteus, cons,
enterobactor, enterococci, bacillus, acromobactor. They had been obtained from the department of microbiology
in hamidia clinic bhopal. The organisms have been accumulated on sterile agar slants and incubated at 37°c for
48hours.
Phytochemical Screening of the Leave Extracts -
Phytochemical screening become worn out arrange to distinguish the nearness of plant components inclusive of
alkaloids, tannins, saponins, phenolics, flavonoids, glycosides and plobatannis within the plant extract. Aqueous
extracts of the plant became prepared. The extract become then filtered the usage of whatmann no. 1 filter
paper. A portion of the extract turned into used to test for the subsequent plant elements: alkaloids, saponins,
tannins, phlobatannins, flavonoids and glycosides the use of the strategies defined beneath:
Test for Saponins: Two millilitres of the aqueous extracts were shaken for two minutes in a test tube. The
presence of saponins was determined by frothing that persisted after shaking.4)
Test for Alkaloids: In a test tube, three millilitres of aqueous extract were measured, then a few drops of picric
acid were added. An orange colour shows the presence of alkaloids..(4)
Test for Phenolics: After two drops of 5% ferric chloride were applied to 5 millilitre of the aqueous extract in
the test tube, a greenish precipitate was obtained as an indicator of phenolics.4)
Test for Tannins: In one millilitre of the aqueous extract, one millilitre of newly produced 10% potassium
hydroxide was added. A filthy white precipitate was thought to indicate the presence of tannins. (4)
Test for Flavonoids: A yellow tint indicates the presence of flavonoids when a volume of 1 millilitre of 10%
sodium hydroxide is added to a quantity of three millilitre of aqueous extract. (4)
Test for Glycosides: 2ml chloroform was added to 1ml of aqueous extract. To form a lower layer,
tetraoxosulphate vi acid was cautiously added. The existence of a steroid ring was revealed by a reddish brown
colour on the interface.(4)
Test for Phlobatannins: 1 mL of 1 percent hydrochloric acid was mixed with 1 mL of aqueous extracts.
Because of the presence of phlobatannins, a purple precipitate was collected.(5)
Preparation of Leaf Exract:-
Aqueous Extracts of Fresh and Dried Leaves-
One hundred grammes of fresh papaya leaves were weighed and pulverised in a special processor before being
poured into 400 ml cold refined water into a cone-shaped carafe with elastic plugs and left to clear for seven
days with occasional shaking. Sift the contents into a clean funnel-shaped carafe using sterile channel paper
(whattman no. 1). After that, the standard extricates were kept at 4°C for an antibacterial movement test. (6)
Ethanol Extract of Fresh and Dried Leaves-
One hundred grammes of fresh papaya peels were weighed and pulverised in a food processor before being
poured into 400 ml ethanol in a funnel-shaped container with elastic stops and shaken occasionally for seven
days. Sifted into a smooth funnel-shaped jar using sterile channel paper (whattman no. 1). The standard
extricates were then kept in a refrigerator at 4°C for an antibacterial movement test..(6)
Methenol Extract of Fresh and Dried Leaves-
A hundred grammes of fresh papaya peels were weighed and pulverised in a food processor before being poured
into 400 litres methenol in a funnel-shaped carafe with elastic stops and left to clear for seven days with
periodic shaking. Sifted into a smooth funnel-shaped jar using sterile channel paper (whattman no. 1). The
standard extricates were then kept in a refrigerator at 4°C for an antibacterial movement test..(7)
Chloroform Extract of Fresh and Dried Leaves-
After soaking in 150 ml of chloroform overnight, fifty grammes (50 g) of the beat dry plant materials were
weighed and successively extricated using a wrist hobby shaker for two hours. After filtration, the exams were
flushed with bigger 3 x 60 ml packets of the dissolvable. The extricates were kept at 4°C in the fridge until use.
(8)

6
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Antibacterial Test-
1) Disc Diffusion Method
2) Agar Well Diffusion Method
Agar Disc Diffusion Method-
The antibacterial activity of Carica papaya rough plant extricates was determined using a circular dissemination
approach. The plates were made by putting sterile muller hinton agar (himedia) into sterile petri dishes that had
already been autoclaved. Cotton swabs were sterilised and soaked in complement broth before being swabbed
on agar plates to test the bacterial tradition. The dried discs impregnated with plant extract were placed on the
floor of the infected media after being sterilised in an oven for half an hour at 80 degrees. The plates were
inverted and left for 30 minutes to allow the extract to diffuse into the agar, after which they were incubated
aerobically at 37°C for 24 hours. (9)
Agar Well Diffusion Method-
The agar nicely strategy of the agar dissemination technique become applied to decide the antibacterial
movement of the plant extricates. One millilitre of the various standardized existence paperwork had been
offered independently and altogether combined with 30milliliters of liquid supplement agar each in a sterile
petri dish and approved to set at that factor named. A sterile 8mm plug borer become at that factor utilized to
punch gaps (i.E. 5wells) in the immunized agar and the agar became at that factor evacuated. Four wells that
had been fashioned were filled with different concentrations of the extricate which had been labelled.Those
have been at that factor cleared out at the seat for 1hour for first-rate dissemination of the extricates and hatched
at 37°c for 48hours. After hatching, the gap throughout of the zones of restraint around each well were
measured to the closest millimeters alongside hub i.E. 90° to each other and the merciless of the 2 readings
were at that point calculated. (10)
RESULT Phytochemical Analysis of the Aqueous Extract
The result of the phytochemical analysis of the aqueous extract of carica papaya leaf is shown in Table no. 1
plant components together with glycosides, phlobatannins have been not detected.
Table 1: Phytochemical analysis of the Carica papaya:-
Sample Aqueous extract
Saponins +
Alkaloids +
Phinolics +
Tannins +
Flavonoids +
Glycosides -
Phlobatannins -

Saponins Test Phenolic Test Flavonoids Test

7
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Alkaloids Test Tannins Test


Fig. 1: Phytochemical analysis of the aqueous extract of Carica papaya leaf
Antibacterial Test-
The agar disc diffusion method and the agar well diffusion method, which involved measuring the diameter of
boom inhibition zones using aqueous, methenol, ethenol, and chloroform leaf extracts against a variety of
pathogenic microorganisms, were used to determine the antibacterial activity of carica papaya leaves. (Table 2,
3,4 & 5).
Table 2: Antibacterial activity of Aqueous and Methanol extract of Carica papaya in paper disc method
Test Organism Zone of Inhibition (mm)
Aqueous Methanol
Fresh Sun Shade dried Fresh Sun dried Shade
dried dried
S.aureus 23 ± 0.6 4 ± 0.2 3 ± 0.5 5 ± 0.3 3 ± 0.4 -
Bacillus 20 ± 0.7 22 ± 0.3 19 ± 0.6 22 ± 0.8 16 ± 0.5 20 ± 0.6
Enterobactor 20 ±0.6 28 ±0.8 25 ±0.7 13 ± 0.4 15 ± 0.3 10 ± 0.3
Proteus 18 ± 0.4 15 ± 0.3 14 ± 0.2 10 ± 0.5 8 ± 0.4 5 ± 0.3
Cons 24 ± 0.8 20 ± 0.5 25 ± 0.7 22 ± 0.6 27 ± 0.8 25 ± 0.6
E.coli 10 ± 0.4 16 ± 0.3 22 ± 0.6 8 ± 0.2 10 ± 0.2 13 ± 0.4
Pseudomonas 25 ± 0.8 10 ± 0.2 15 ± 0.5 20 ± 0.7 11 ± 0.4 7 ± 0.3
Achromobactor 20 ± 0.6 17 ± 0.5 5 ± 0.3 14 ± 0.7 12 ± 0.4 10 ± 0.2
Enterococci 12 ± 0.3 18 ± 0.5 20 ±0.7 13 ± 0.2 6 ± 0.3 10 ± 0.3
Klebsiella 22 ± 0.8 2 ± 0.1 - 20 ± 0.7 18 ± 0.6 10 ± 0.4

Table 3: Antibacterial activity of Ethanol and chloroform extract of Carica papaya in paper disc method
Test Organism Zone of Inhibition (mm)
Ethanol Chloroform
Fresh Sun dried Shade Fresh Sun dried Shade
dried dried
S.aureus 5 ± 0.3 - 3 ±0.2 - - -
Bacillus - - - 9 ± 0.4 10 ± 0.6 8 ± 0.5
Enterobactor - 5 ±0.3 15 ± 0.6 9 ± 0.4 10 ± 0.6 5 ± 0.2
Proteus - - - - - 10 ± 0.5
Cons 14 ±0.6 18 ±0.7 16 ±0.5 20 ±0.8 18 ±0.6 16 ±0.7
E.coli - - - 5 ± 0.2 12 ±0.5 15 ±0.8
Pseudomonas 20 ±0.7 - 15 ±0.6 16 ±0.4 12 ±0.6 -
Achromobactor 11 ±0.5 - 5 ± 0.4 12 ±0.6 10 ±0.4 11 ±0.5
Enterococci 20 ±0.7 12 ±0.5 14 ±0.7 14 ±0.6 13 ±0.4 15 ±0.5
Klebsiella 17 ±0.8 15 ±0.7 - - - -

8
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table 4: Antibacterial activity of Aqueous and Methanol extract of Carica papaya in Agar well diffusion
method
Test Organism Zone of Inhibition (mm)
Aqueous Methanol
Fresh Sun dried Shade Fresh Sun dried Shade
dried dried
Enterococci 24 ±0.9 15 ±0.6 20 ±0.7 22 ±0.7 15 ±0.6 25 ±0.8
Bacillus 20 ±0.7 16 ±0.5 18 ±0.6 18 ±0.5 10 ±0.3 12 ±0.4
Pseudomonas 20 ±0.8 13 ±0.4 15 ±0.5 17 ±0.6 - 15 ±0.7
E.coli 15±0.8 12±0.5 - 15±0.7 - -
Acromobactor 10±0.5 - - 12±0.6 - 16±0.7
Table 5: Antibacterial activity of Ethanol and Chloroform extract of Carica papaya in Agar well diffusion
method
Test Organism Zone of inhibition (mm)
Ethanol Chloroform
Fresh Sun dried Shade Fresh Sun dried Shade
dried dried
Enterococci 15 ± 0.6 - 13 ±0.5 15 ±0.6 10 ±0.4 10 ±0.3
Bacillus 14 ±0.5 15 ±0.6 5 ±0.4 15 ±0.7 5 ±0.3 17 ±0.8
Pseudomonas 19 ±0.8 6 ±0.5 16 ±0.7 16 ±0.5 - 14 ±0.4
E.coli 15±0.7 5±0.4 - - - -
Acromobactor 8±0.4 - - 9±0.6 - -
Agar Disc Diffusion Method-
In Staphylococcus aureus aqueous extract of fresh leaf (23±0.6mm), sun dried leaf (4±0.2mm) & shade dried
leaf (3±0.5 mm) & methanol extract of fresh leaf (5±0.3 mm), sun dried leaf (3±0.4 mm), shade dried leaf
shows no inhibition & ethanol extract of fresh leaf (5±0.3 mm), shade dried leaf (3±0.2 mm) & inhibition is not
observed from chloroform extract.
In Enterobactor aqueous extract of fresh leaf (20±0.6 mm), sun dried leaf (28 ±0.8mm) & shade dried leaf
(25±0.7 mm) & methanol extract of fresh leaf (13±0.4 mm), sun dried leaf (15±0.3 mm), shade dried leaf
(10±0.3 mm) & ethanol extract of fresh leaf shows no inhibition, sun dried leaf (5±0.3 mm), shade dried leaf
(15±0.6 mm) & chloroform extract of fresh leaf (9±0.4 mm), sun dried leaf (10±0.6 mm), shade dried leaf
(5±0.2 mm) is observed.
In Cons aqueous extract of fresh leaf (24±0.8 mm), sun dried leaf (20±0.5 mm) & shade dried leaf (25±0.7 mm)
& methanol extract of fresh leaf (22±0.6 mm), sun dried leaf (27±0.8 mm), shade dried leaf (25±0.6 mm) &
ethanol extract of fresh leaf (14±0.6 mm), sun dried leaf (18±0.7 mm), shade dried leaf (16±0.5 mm) &
chloroform extract of fresh leaf (20 ±0.8mm), sun dried leaf (18 ±0.6mm), shade dried leaf (16±0.7 mm) is
observed.
In Klebsiella aqueous extract of fresh leaf (22±0.8 mm), sun dried leaf (2±0.1 mm) & no inhibition is shade
dried leaf & methanol extract of fresh leaf (20±0.7 mm), sun dried leaf (18 ±0.6mm), shade dried leaf (10
±0.4mm) & ethanol extraction of fresh leaf (17±0.8 mm), sun dried leaf(15±0.7 mm), no inhibition is shade
dried leaf & inhibition is not observed from chloroform extract.

Fig.2: Zone of inhibition of S.aureus Fig.3: Zone of inhibition of Enterobactor


9
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig.4: Zone of inhibition of CoNS Fig.5: Zone of inhibition of Klebsiella


Fig.- Zone of Inhibition of Leaf extract against human pathogenic bacteria in Agar disc diffusion method.
Agar Well Diffusion-
In Enterococci aqueous extract of fresh leaf (24±0.9 mm), sun dried leaf (15±0.6 mm) & shade dried leaf
(20±0.7 mm) & methanol extract of fresh leaf (22 ±0.7mm), sun dried leaf (15 ±0.6mm), shade dried leaf
(25±0.8 mm) & ethanol extract of fresh leaf (15±0.6 mm), no inhibition is sun dried leaf, shade dried leaf
(13±0.5 mm) & chloroform extract of fresh leaf (15±0.6 mm), sun dried leaf (10 ±0.4mm), shade dried leaf
(10±0.3 mm) is observed.
In Bacillus aqueous extract of fresh leaf (20 ±0.7mm), sun dried leaf (16 ±0.5mm) & shade dried leaf (18
±0.6mm) & methanol extract of fresh leaf (18±0.5 mm), sun dried leaf (10±0.3 mm), shade dried leaf (12
±0.4mm) & ethanol extract of fresh leaf (14±0.5 mm),sun dried leaf (15±0.6 mm), shade dried leaf (5±0.4 mm)
& chloroform extract of fresh leaf (15±0.7 mm), sun dried leaf (5±0.3 mm), shade dried leaf (17±0.8 mm) is
observed.In Pseudomonas aqueous extract of fresh leaf (20±0.8 mm), sun dried leaf (13±0.4 mm) & shade
dried leaf (15 ±0.5mm) & methanol extract of fresh leaf (17 ±0.6mm), no inhibition is sun dried leaf, shade
dried leaf (15±0.7 mm) & ethanol extract of fresh leaf (19±0.8 mm), sun dried leaf (6±0.5 mm), shade dried
leaf (16±0.7 mm) & chloroform extract of fresh leaf (16 ±0.5mm), no inhibition is sun dried leaf , shade dried
leaf (14 ±0.4mm) is observed

Fig.6: Zone of inhibition of Bacillus Fig.7: Zone of inhibition of Enterococci

Fig.8: Zone of inhibition of Pseudomonas


Fig.-Zone of Inhibition of Leaf extract against human pathogenic bacteria in Agar well diffusion method
10
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

DISCUSSION
Secondary chemicals, such as tannis, saponins, cardiac glycosides, and alkaloids, are present in better plant life,
according to them(11). The existence of these chemicals was discovered within the extacts of carica papaya as a
result of the initial phytochemical screeningThe phytochemical investigation of the aqueous extract of carica
papaya leaf as a gift is shown in Table No. 1. revealed the presence of alkaloids, tannins, saponins, flavonoids,
and phenols in the extract. Plant elements which include glycosides, phlobatannins had been no longer
detected.According to them(12), aqueous & chloroform extract of Carica papaya higher antibacterial activity
Baccillus, S.aureus, E.coli. . In display consider of agar well dissemination strategy,
methanol extricate appears most elevated zone of restraint in Enterococci compare than other microscopic
organisms. Fluid extricate appears most noteworthy zone of restraint in Enterococci & Bacillus compare than
other microscopic organisms. Ethanol extricate appears most noteworthy zone of hindrance in Pseudomonas in
comparison to others microscopic organisms and chloroform extricate appears most noteworthy zone
of hindrance in Bacillus compare than other microscopic organisms.
In display think about of agar well dissemination strategy , methanol extricate appears most elevated zone
of hindrance in Enterococci compare than other microbes. Watery extricate appears most elevated zone
of restraint in Enterococci & Bacillus compare than other microbes. Ethanol extricate appears most
noteworthy zone of hindrance in Pseudomonas measure up to than further microbes and
chloroform extricate appears most elevated zone of restraint in Bacillus compare than other microbes.
REFERENCES
 Krishna KL, Paridhavi M, Jagruti AP (2008). Review on nutritional, medicinal and pharmacological
properties of Papaya (Carica papayaLinn.). NPR, 7: 364-373.
 Afolayan, A.J. 2003. Extracts from the shoots of Arctotis artotoides inhibit the growth of bacteria andfungi.
Pharm. Biol. 41: 22-25.
 Ates DA, Erdogrul OT (2003), Antimicrobial activities of various medicinal and commercial plant extracts.
Turkish Journal of Biology.
 Harborne, J.B., 1978. Phytochemical methods (3rd edn) Chapman and Hall, London, pp: 60: 135-203.
 Ajao, A, O. Shonukan and B. Femi-Onadeko, 1985.Antibacterial effect of aqueous and alcohol extracts of
Spondias mombin and Alchornea cordifolia - two local antimicrobial remedies.” Int. J. Crude Drug Res.,
23(2): 67-72.
 Akueshi, C.O., Kadiri, E. U. Akueshi, S. E. Agina, and B. Ngurukwem. 2002. Antimicrobial potentials of
Hyptis sauvedens Poit (Lamiaccae). J. Bot. 15: 37-41.
 Sunday E. Atawodi (2005). Comparative in vitro trypanocidal activities of petroleum ether,chloroform,
methanol and aqueous extracts of some Nigerian savannah plants, African Journal of Biotechnology Vol. 4
(2), pp. 177-182.
 Kareem, S. O. Akpan, I. and Ojo, O. P (2008). Antimicrobial Activities of Calotropis procera on Selected
Pathogenic Microorganisms. African Journal of Biomedical Research, Vol. 11.
 Akinyemi, K.O., Oluwa, O.K. and Omomigbehin, E.O.(2005). Antimicrobial activity of crude extracts of
three medicinal plants in south-west Nigeria folk medicine on some food borne bacterial pathogens.
Department of MCB/Department of BOT Lagos State. University Pp. 1-2.
 Perez, C., Pauli, M. and Bazerque, P. 1990.An antibiotic assay by agar well diffusion method. Acta Biol.
Med.Exp., 15: 113-115.
 Kaufman, P.B, L.J. Cseke, S. Waber, J.A. Duke and H.L. Brielmann, 1999. Natural products from plants.
Boca Raton, Florida: CRC Press.
 Akujobi, C., Anyanwu, B.N., Onyeze, C. and Ibekwe, V.I. 2004. Antibacterial activities and preliminary
phytochemical screening of four medicinal plants. J. Appl. Sci., 7 (3): 4328 – 4338.
 Tlak Gajger, I., J. Kolodziejek, T. Bakonyi, N. Nowotny (2014a). Prevalence and distribution patterns of
seven different honeybee viruses in diseased colonies: a case study from Croatia. Apidologie. 45: 6, 701-
706. doi: 10.1007/s13592-014- 0287-0.

11
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Tlak Gajger, I., J. Bičak, R. Belužić (2014b). The occurrence of honeybee viruses in apiaries in the
Koprivnica-Križevci district in Croatia. Vet. Arhiv 84: 421- 428.
 Tlak Gajger, I., Z. Kozarić, D. Berta, S. Nejedli, Z. Petrinec (2011). Effect of the herbal preparation
Nozevit on the mid-gut structure of honeybees (Apis mellifera) infected with Nosema sp. spores.
Veterinarni Medicina 56:7, 343-350.
 Tlak Gajger, I., S. Nejedli, Z. Kozarić (2013a). The effect of Nozevit on leucine aminopeptidase and
esterase activity in the midgut of honey bees (Apis mellifera). Veterinarni Medicina 58: 8. 422-429. 31.
 Tlak Gajger, I. (2011). Nozevit aerosol application for Nosema ceranae disease treatment. Am Bee J. 151:
11. 1087- 1090.
 Tlak Gajger, I., Z. Tomljanović, Lj. Stanisavljević (2013ab). An environmentally friendly approach to the
control of Varooa destructor mite and Nosema ceranae disease in Carnolian honeybee (Apis mellifera
carnica) colonies. Arch. Biol. Sci. 65:4, 1585-1592.
 Tlak Gajger, I., J. Ribaric, M. Matak, L. Svecnjak, Z. Kozaric, S. Nejedli, I. M. SmodisSkerl (2015).
Zeolite clinoptilolite as a dietary supplement and remedy for honeybee (Apis mellifera) colonies.
Veternarni Medicina, 60: 12, 696-705.
 Tlak Gajger I and Dar S A . 2021. Plant Allelochemicals as Sources of Insecticides. INSECTS 12 (189), 1-
21
 Dar S A, AR Wani, A Sofi, SS Pathana. 2017. IPM for brinjal shoot and fruit borer (Leucinodes
Orbonalis)- A review. Indian Journal of Entomology 79 (2), 130-137
 Dar S A, AR Wani, MA Sofi. 2018. Diversity and abundance of insect pollinators of sweet cherry Prunus
avium in Kashmir valley .Indian Journal of Entomology 80 (3), 725-736
 Dar S A, AR Wani. 2018. Cleptoparasitic behaviour of Sphecodes tantalus nurse (1903) on Lasioglossum
marginatum (Brulle) in Kashmir. Indian Journal of Entomology 80 (4), 1431-1435
 Dar S A, AB Wani, A Ganie, AA Kandoo, MY Wani. 2017. Resistance against insect pests by phenolics
and their derivative compounds. Chem Sci Rev Lett 2017, 6(23), 1941-1949
 Dar S A, SH Mir, BA Rather. 2017. Importance of hedgerows for wild bee abundance and richness in
Kashmir Valley. Entomon 42 (1), 59-68
 Dar S A, GM Mir, MA Parry, SB Ahmad, MA Ganie, TA Raja, M Yaqob . 2016. Diversity and Richness
Indices and the Whittaker Plot Value of Insect Pollinators of Peach Prunus persica in Landscapes of
Temperate India. Academic Journal of Entomology 9 (4), 62-73
 Nissar N M, Sushil Kumar, Irham Rasool, Showkat Dar. 2017. Efficacy of Various Insecticides against
Pear Psylla ( Psylla pyricola Foerster) on Pear in Kashmir. International Journal of Plant Research A
SOCIETY FOR PLANT RESEARCH. 30 (1): 62-64
 Dar S A, AR Wani, TA Raja, SH Mir. Insect Biodiversity of Brinjal Crop in Kashmir. 2015. The Indian
Ecological Society 42 (2), 295-299
 Dar S A, M Tanweer-Ul-H, SH Dar, M Nissar, RA Wani, AA Kandoo. 2018. Foraging pattern of
Lasioglossum (Hymenoptera: Halictidae) species on Himalayan indigo (Fabaceae) in Kashmir. The Pharma
Innovation 7 (5, Part H), 530
 Dar S A, GM Lone, Sajad H Parey, Gh. I Hassan and Bashir A Rather. 2017. Insect pollinators and their
conservation. Journal of Entomology and Zoology Studies. 5(3): 1121-1131.
 Dar S A, Wani AB, Mir SH, Nehru RK and Jeelani MI. 2014. Relationship between morphological
characters of different brinjal genotypes and extent of infestation by L. orbonalis. Green Farming 6 (5), 1-5

AUTHOR DETAILS:
SHEERAZ AHMAD WAGAY, PARUL JAIN AND MURTAZ RASHID

12
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

COVID19 AND GLOBAL ANALYSIS OF ONLINE LEARNING IN HIGHER EDUCATION USING


MACHINE LEARNING

DR. HARVINDER KAUR

ABSTRACT
This study intends to investigate student perceptions of global higher education institutions using the new
digital culture spawned by the COVID-19 pandemic, namely, online learning better known as e-learning.
which has become prevalent globally . Based on student state residence location, the study used quantitative
survey methodologies and a sample size of 581 global students from the three categories of higher education
institutions including universities, polytechnics, and colleges and diferent departments of higher education.
Students are dissatisfied with virtual learning implemented by many higher education institutions across the
country during the COVID-19 lockdown, and they do not want online learning to continue after the pandemic
due to poor internet infrastructure and a lack of electricity, according to the study. The study found that global
students of higher education have a low acceptance of online learning technology, preferring instead the
traditional classroom setting, placing them in the diffusion innovation theory's . The group that is highly
conservative and extremely slow to accept new technological innovations. Universities should engage students
more interactively, not just via texts, but also through video demonstrations, according to the report. It will
increase their online learning throughout the pandemic so that they do not fall behind academically, and they
will spend more time on online learning until traditional learning returns. Administrators of global higher
education institutions should return to a traditional teaching and learning structure as soon as the pandemic is
over, as well as a state wide reform and reorganization of the internet and electrical system.

1. INTRODUCTION
Access to modern ICT (ICT) infrastructure over an internet connection makes education more accessible and
removes distance and location barriers previously inaccessible to those seeking higher education (Oriji and).
Torunarigha, 2019; Renes, 2015). Many higher education institutions and universities use web-based learning
(such as e-learning) to provide educational opportunities for future students such as workplaces, people with
disabilities, parents with children, and military personnel. O'Neill and Singh O'Donoghue, 2004; Renés,
2015). Teachers and students who are not in the same place and are learning in a synchronous or
asynchronous setting teach about ICT in this type of educational process. This type of learning is facilitated
by ICT tools such as video, audio and computer technology, CDROM technology, and storage devices such as
text communication and USB-enabled storage tools (Renes, 2015). This allows students to see e-learning
from multiple perspectives. While some writers (Hawkes and Cambre, 2000; Knight, 1996) feel that elearning
will increase students' involvement in the learning process by requiring them to do a lot of tasks on their own,
others (Hawkes and Cambre, 2000; Knight, 1996) disagree Others, such as Kershaw (1996), Cooper (1999), and
Renes (2015), point out that not all students will be able to reach the goal of their studies because not all of them
will be able to learn independently. As a result, institutions of higher learning will need to develop models that
cater to individual student requirements as well as their ability in order to obtain the necessary competencies.
E-learning requires the basic infrastructure to run the process effectively. In many parts of developing
countries, digital devices such as computers and mobile phones are exorbitantly expensive. For example,
global data is not cheap. In the , the poverty rate is about 40% of the population of 200 million and the low-
wage population of 74 million (City Population, 2020; Punch, 2020). As a result, it is difficult for low-income
earners to master the skills needed for efficient e-learning (Olaniyi, 2006). Olaniyi (2006) argues that
setting up an ICT center on a university campus without considering network access requirements is
ineffective. Many scholars have studied the strengths and weaknesses of e-learning in higher education.
According to O`Neill and SinghO'Donoghue (2004), many universities are competing for e-learning
compliance without considering the shortcomings, despite the "promised" results. The shortcomings they
need to address include high implementation costs for both staff and students, limited active student
participation, health implications of staring at the screen all day long, staff training and retraining. Claims to
be enthusiastic about accepting this non-traditional form Education can be costly and time consuming, so
many staff feel "constrained" and take advantage of e over traditional learning It's difficult to judge.
Kituyi and Tusubira (2013), a survey of 266 college students from five universities in Uganda, found that
the majority of students find it less efficient than combining e-learning and face-to-face learning. I found.
13
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Olaniyi (2006) and Eze et al. According to experts such as. (2018) is the most widely used e-learning format
in global universities, where lectures are prepared and stored on a CD-ROM for students to play in their free
time. Scholars have identified various benefits and problems of e-learning in the (Hurixdigital, 2020;
Nnajiofor and Achukwu, 2011). Flexibility (that is, participation from anywhere), cross-platform accessibility
(that is, use with a variety of digital tools), and low-cost deployment (that is, use with a variety of digital
tools) are just some of the benefits. is. (That is, people of all sizes can access the content). Among the many
problems of online learning in the are resistance to accepting e-learning, power, bandwidth, lack of
connectivity, inadequate ICT equipment for e-learning platforms, low computer skills and technology.
There is a shortage of skilled professors (Afolabi and Uhomoibhi, 2017). According to Afolabi and
Uhomoibhi (2017), 72% of UK students using e-learning gained weight more rapidly than just 58% of
global students. The perception of e-learning students as active participants has been studied by many
authors. According to Linjawi and Alfadda (2018), successful online learning requires a prior understanding of
ICT and a good internet connection. Armstrong (2011), on the other hand, found that student awareness of
technical tools is essential, but not the instrument itself.
Ward et al. (2010) and Gómez Reyetal. (2018) found that students perceive online lectures as quality, while
Smart and Cappel (2006) found that the quality of electives is superior to the quality of compulsory education.
discovered. On the other hand, according to Armstrong (2011), students find online learning less academically
difficult than face-to-face classes. Bali and Liu (2018) found that students prefer face-to-face classes to online
learning, while Matsunaga (2016) found that students prefer online learning to face-to-face classes. This study
had nothing to do with the and did not see a pandemic like COVID 19 from a pandemic perspective. This study
analyzes this discrepancy by examining global students' perceptions of online learning, which was popular
during the COVID 19 epidemic. COVID19, Pandemic, Digitized Education, Online Learning (ie, e-Learning),
and Perception are five major events that deepen our knowledge of how global students view their learning and
higher education experiences. And the concept.
The term "digital education" refers to a curriculum style that encourages teachers and students to use digital
technology to promote distance learning and learning (Oriji and Torunarigha, 2019). This is an increasingly
important aspect of education in many countries, as many of the younger generation in the 21st century were
born as "digital natives" who understood the languages of digitization, computers, video games and the Internet
from birth. .. Students have grown up with mobile phones, computers, high-speed internet, social media, email,
telegrams, and other online-based messaging services (such as WhatsApp) (Oriji and Torunarigha, 2019). This
type of education is called digitized education when these tools are used for educational reasons. According to
Siemens (2020), digital education is defined as "teaching students of all ages using desktop computers, mobile
devices, the Internet, software applications, and other types of digital technologies."
All educational activities carried out by individuals or groups working synchronously or asynchronously
through networks, stand-alone computers, or other electronic devices are called e-learning (Tulasi et al., 2013).
E-learning is the target usage of information and communication technology (ICT) for electronic media used for
education and learning (the letter "e" stands for "electronic").
E-learning is personalized because it can be adjusted to your personal pace. It can also be clustered and
tailored to a specific audience at the same time. Synchronous when all learners work at the same time, as
opposed to asynchronous when learners can work at different times. Online if the survey requires an internet
connection, offline if the learning resources do not require continuous internet services, not asynchronous if
the learners can work at different times, and if all learners work at the same time Will be random (Naidu,
2006). .. Whether undergraduate or graduate level education, e-learning enables a high level of participation
between teachers and students, allowing greater flexibility between the two. The general purpose of this study
is to: (1) To what extent are global higher education institutions engaged in e-learning? (2) To the extent
that global students are engaged in e-learning. (3) Mutual benefit in online courses. (4) Types of challenges
faced by students during the web-based learning process. With these goals in mind, I came up with four
research questions. RQ1: How much e-learning is being done at higher education institutions in the during
COVID19? RQ2: How much e-learning do students do at global higher education institutions during the
COVID19 era?RQ3: How confident were your students in online learning during the COVID 19 era? RQ4:
What problems do higher education students in the face regarding online education during COVID19?
2. LITERATURE REVIEW
According to Li and Lalani (2020), COVID19 has a global impact on education, driving nearly 1.2 billion
students out of the classroom and needing research on alternative ways to educate school children. They have
14
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

seen an explosive growth in voice apps, simulated tutoring, video conferencing, and online learning software
since the outbreak of COVID 19, and investment in education from $ 18.66 billion in 2019 to 2025. It is
projected to grow to $ 350 billion, spurring the offering of many schemes. Free lesson service. Founded in
2011, BYJU, Bangalore's online tutor learning environment, has grown to become the world's most valuable
EdTech (educational technology) startup. According to Bansal (2020), e-learning is more cost-effective than
learning in the classroom. Since the outbreak of COVID19, the number of freshmen using BYJU's Think and
Learn app has increased by 200%. Similarly, during the COVID19 pandemic, Lark, a Singapore based
education tool, offered education programs such as unrestricted teleconferencing time, autotranslation
functionality, realtime coediting of research project, and intelligent calendar scheduling, all of which increased
the software's patronage exponentially. Song et al., as well as the European Commission (2020). (2004) Other
benefits of elearning include asynchronous learning settings for teachers and students, as well as opportunities
for staff professional development (which would not have been available otherwise).
One of the oldest social sciences and communication theories, the Diffusion of Innovation Theory, was
developed by Everett M. Rogers in 1962. She explains that new innovations in information technology will
grow, spread, become popular and accepted within a particular population or social system (La Morte, 2019;
Frank et al., 2020). In other words, people in a particular social system recognize and adopt new ideas, actions,
or products and spread the ideas to other members of the same social system or to a wider group of people other
than the population in which the idea was born. Such recognition, acceptance and dissemination of ideas is often
a fundamentally innovative process to fit into this theoretical framework and is usually a process that takes
place over a period of time. Adoption of innovations by individuals in a social system does not happen at the
same time. People tend to adopt a new idea with time. While some require a shorter time, sometimes the period
can be much longer—this is called adopter categorization (Dearing and Cox, 2018; Frank et al., 2020; LaMorte,
2019). Such adopter categorization helps to explain how populations either accept or refuse innovations.
Dearing and Cox (2018) and LaMorte (2019) have listed the five adopter categorizations: (1) innovators—these
are people who are daring and are always willing to try an innovation (i.e. this population will accept innovation
as soon as it is discovered without any persuasion); (2) early adopters—these are people who occupy leadership
positions and enjoy large followership and can, therefore, mold opinion of such populations quite easily (i.e.
these people can embrace innovative ideas with no persuasion); (3) early majority—these are people who
generally do not occupy leadership positions but easily embrace new innovative before other members of the
population but need evidence that the innovative idea works before they embrace such ideas; (4) late majority—
these are people who are always skeptical of change and typically embrace an innovative idea that has been
accepted and confirmed as effective by the larger population; and (5) laggards— these are very conservative
people and are the most difficult to convince of an innovative idea and can only be carried along via statistics,
fear appeals, and pressure from others.
Nonetheless, Li and Lalani (2020) argued that online learning still has some challenges (for example, lack of
access to digital tools for digital learning and absenteeism or the poor internet. connection). Regarding the
effectiveness of e-learning, Gutierrez (2016) found that the retention rate of what was learned was 25-60% for
e-learning, while it was 8-10% for learning in the classroom, and 5 for e-learning students. I found that I learned
once. There is more material than classroom learning, even though students spend 40-60% less time on e-
learning than face-to-face classes. Li and Lalani (2020) argued that the benefits of e-learning over classroom
learning result, among other things, from students being able to study at their own pace, listening to recorded
lectures, and reading materials. However, some scholars (Bansal, 2020; Goldstein et al., 2020; Lau et al., 2020;
Srivastava, 2020) have internet connectivity and digital divide in computers and classrooms. Similarly,
Goldstein et al. (2020) We found that less than half of American college students did not take online classes
during the COVID 19 era due to chronic absenteeism and failure to complete assignments. Srivastava (2020)
has only 21.3% access to school computers in 2018, compared to Lau et al. (2020) We assume that the actual
university environment is irreplaceable and is the key to a deeper understanding.
Learning theories have their origin in theoretical psychology. Psychologists have become interested in how one
acquires knowledge. This is because “it is only if we know how knowledge is acquired that we will be able to
use appropriate teaching and learning methods in the classroom” (Learning Theories, 2004). Learning Theories
(2004) have identified the four socalled modern learning theories, namely, behaviorism, cognitivism, Gestalt
theory, and constructivism. Behaviorism can be traced to the works by J.B. Watson and B.F. Skinner in the 19th
century and focuses on how students learn. This is the theory that states that "all behaviors are learned through
interaction with the environment, and congenital or hereditary factors have little effect on behaviors" (Western
Governors University, 2020). Cognitivism is a direct reaction to behavioralism, and psychologists begin to
15
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

downplay their interest in obvious and observable behavior, instead with more complexities such as reasoning,
problem-solving, language, concept formation, and information processing. Began to emphasize the cognitive
process (Ertmer and Newby, 2013; Rhalmi, 2011). Cognitivism abolishes the outward representation of learning
and focuses on the internal processes and connections that occur during learning in which learners actively
participate in the learning process (Rhalmi, 2011). Gestalt theory, which was born in the 19th century by the
study of German psychologists Max Wertheimer, Wolfgang Koehler, and Kurt Koffka, who studied the nature
of perception, is a theory derived from the German word "Gestalt" which means "form of substance". Was
derived. Theory believes that all stimuli are perceived by humans in their simplest form. Gestalt theory, which
applies to learning environments such as schools, applies to problem-solving and cognition (Pappas, 2014). In
Gestalt theory, psychologists believe that the whole is greater than the parts and that if a problem arises, it can
disturb the equilibrium of the organism and its environment which seeks balance. The constructivist theory is
rooted in the works of Jean Piaget, Jerome Bruner, and Cecile Goodman and is often considered to be a branch
of cognitivism. However, while cognitivism focuses on the mind as the sole source of knowledge,
constructivism interprets the mind`s source of knowledge on experience.
Both Gestalt theory and constructivist theory provide a stronger justification for the study, as this study
considers the application of e-learning tools in higher education. Gestalt theory justifies the use of e-learning
tools to solve the problems of higher education during a pandemic. This is because learning is essentially
described as problem-solving. Similarly, because constructivist theory describes learning based on the learner's
active participation and experience, the student's (ie, learner's) explanation of e-learning perception is based on
individual experience.
3. METHODOLOGY
The K-Means algorithm is self-explanatory. It's a straightforward technique that's perhaps the most widely
utilized for clustering. The main principle behind k-means is to define k clusters with the least amount of
variation (or error) inside each cluster. The representation of a cluster is the cluster center. The needed variation
is the squared distance between each point and its cluster center. The goal of k-means clustering is to locate
these k clusters and their cent res while minimizing total error.
Scaling
Finally, features are scaled to fit the model, ensuring that all features are on the same numerical scale. The
magnitude of the coefficients learned during training in a linear model like logistic regression is dependent on
the scale of the features. The coefficients could not be consistently compared between characteristics on a scale
of 0–1 and other features on a scale of, say, 0–100.
4. DATA SET
The level or extent of the existence of the phenomenon [X]. Similarly, the descriptive research design is majorly
either quantitative or qualitative [X]. The descriptive quantitative method is the most appropriate for this study
because it investigates the current state of online learning that is already taking place in higher institutions in the
as well as the suitability of the large sample size.
5. RESULT ANALYSIS
There were 142 male students under the age of 30 in the undergraduate category. The population was 588 and
the overall proportion was 24.19. In the Covid scenario, this was a population using e-learning based systems as
mentioned in table.(1). The number of male students of the same age group who did not use e-learning during
the Covid-19 pandemic was 132. As shown in the Table(2) ,Table(3) and figure. (1) and Figure (2), they
accounted for 22.45% of the total population (2).
While 134 female students in the undergraduate category under the age of 30 were identified. Within a
population of 588, the overall percentage recorded was 22.45. In the Covid scenario, this was the population of
female students using e-learning. There were 132 female students of the same age group who did not use e-
learning in Covid. As shown in the figure. (1) and Figure (2), which accounted for 22.45% of the total
population (2).
There were 5 male students over the age of 30 in the undergraduate category. The population was 588 and the
overall proportion was 0.85. In the Covid scenario, this was a population using an e-learning-based system, as
shown in the table. (1). The number of male students of the same age group who did not use e-learning during
the Covid19 pandemic was 5. As shown in Table (2), Table (3) and the figure. (1) and Figure (2), they
accounted for 0.85% of the total population (2).
On the other hand, 5 female students were identified in the undergraduate category over 30 years old. With a
population of 588, the overall percentage recorded was 0.85. In the Covid scenario, this was the population of
16
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

female students using e-learning. There were 5 female students of the same age group who did not use e-
learning at Covid. As shown in Table(1) and Figure (2) which make up 0.85% of the total population (2).
There were no male students under the age of 30 in the postgraduate category. The population was 588 and the
overall proportion was nill. In the Covid scenario, this was a population using e-learning based systems as
mentioned in table.(1). The number of male students of the same age group who did not use e-learning during
the Covid-19 pandemic was 2. As shown in the Table(2) ,Table(3) and figure. (1) and Figure (2), they
accounted for 0.340% of the total population (2).
While 4 female students in the postgraduate category under the age of 30 were identified. With a population of
588, the overall percentage recorded was 0.680. In the Covid scenario, this was the population of female
students using e-learning. There was only one female students of the same age group who did not use e-
learning in Covid. As shown in the figure. (1) and Figure (2), which accounted for 0.170% of the total
population (2).
There was only one male student over the age of 30 in the postgraduate category. The population was 588, with
a total of 0.170. In the Covid scenario, this was a population using an e-learning-based system, as shown in the
table. (1). The number of male students of the same age group who did not use e-learning during the Covid19
pandemic was 3. As shown in Table (2), Table (3) and the figure. (1) and Figure (2), they accounted for 0.510%
of the total population (2).
On the other hand, 3 female students were identified in the postgraduate category over 30 years old. With a
population of 588, the overall percentage recorded was 0.51. In the Covid scenario, this was the population of
female students using e-learning. There only one female students of the same age group who did not use e-
learning at Covid. Like a photograph. (1) and Figure (2) make up 0.17% of the total population (2).
Table 1: Various types of e-learning tools used by students (Population size=588) from around the world during
the COVID-19 epidemic.
Type of e-learning tools Participants Percentage (%)

Edmodo 1 0.17
Facebook 1 0.17
Webex 12 2.04
Google Duo 17 2.89
Skype 19 3.23
Zoom 44 7.48
Google Meet 45 7.65
Learning management systems 75 12.76
E-mail 78 13.27
WhatsApp 98 16.67
Google Classroom 198 33.67
Total 588 100

Table 2: Gender of pupils who took part in the poll from around the world.
Gender Participants Percentage (%)
Male 291 49.5
Female 297 50.5
Total 588 100
Table 3: Academic level of pupils who took part in the poll from around the world.
Level of study Participants Percentage (%)
Undergraduate 573 97.5
Graduate 15 2.5
Total 588 100

17
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Figure 1
According to the Figure 1, In the class 0.38-0.44 the number of female learners using e-learning is minimum
close to zero and the count of females is not more than 5. The number of females in the class 0.63-0.68 the
count reaches maxima upto about 195. In case of male learners, the count is minimum with the count as low as
less than 5. The count of male learners is maximum in the class 0.27-0.34 the count shooting up to the about
160.

Figure 2
According to the Figure 2, in the classes 0.20-0.25 and 0.25-0.30 only male learners are involved in e-learning.
The count of males in both the classes is 1.00 with no female learner prsesent in the classes. In the class 0.65-
0.70 the count of male e-learners is mnimum with the number reaching only upto 0.30. It is also noticed in the
figure 2 that in the class 0.45-0.50 only female e-learners are present with value shooting up to 1.00. The
minima for female learners is observed in the figure 2 with the range 0.69 to 1.00 i.e., count is only 0.31.

Figure 3
18
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

According to Figure 3, the local minimum count of male learners is observed in the classes in the classes 0.20-
0.25 and 0.35-0.40 with the count, not exceeding the value of 5. Similarly, the minimum value more than zero
for female e-learners lie in the range 0.45-0.50 with the value reaching only upto about 4. The local maxima
count for male e-learners is noticed in the class 0.30-0.35 with the value soaring high upto 120. Similarly, the
maximum value for the female e-learners in the Covid scenario exists in the range 0.65-0.70 with the count
ranging from 70 to 240 means value settles at 170. It is to be noticed also that in the classes 0.40-0.45 and 0.50-
0.55 no male or female learners exist means value of male and female e-learners is zero.

Figure 4
According to the Figure 4, density of Faculty of Law touches maxima in the range 0.8-0.9 with the density
value upto 7.5. The density of Faculty of Science and Information is at minima at about value 2 but the
variational range for this case is broad with the range spanning from 0 to 9, the whole range spectrum. Other
faculties like Faculty of Engineering, Faculty of Language and Arts and Faculty of Pharmacy are at middle
levels with the density avlue ranging from 1-3 with showing a mixed pattern of density levels. The global
maxima is displayed by Faculty of Law at desity level 7.5 and Global minima is shown by Faculty of Science
and Information with the value fof density ranging from 0 to 0.5.

Figure 5
According to the Figure 5, with a negation of the parameters density pattern changes. In comparison with Figure
4, in this case the maxima shifts in the range 0-0.18 with the value of density 7.5 with the Faculty of Law
remaining the same. In case of negation of parameter minima is also observed for the same faculty i.e., Faculty
of Science and Information with the minima ranging from 0 to 0.2 at x-axis parameter at 0.3 value. Other
faculties like Faculty of Engineering, Faculty of Languages and arts and Faculty of Pharmacy showing a mixed
pattern in the class range 0.1 -0.7 with the density ranging from 0.2 to 4.

19
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Figure 6
Figure 6 which shows department-wise response of students and minimum value of students response involved
in e-learning in Covid scenario is displayed by Faculty of law students and value reaches only upto 12. The
Faculty of Languages and Arts is showing maximum number os students involved in e-learning during Covid
with the value soaring high upto 100. Other faculties like like Faculty of Engineering, Faculty of Languages,
Faculty of Business, Faculty of Educational Science and arts and Faculty of Pharmacy show midium variational
pattern with the values ranging from 25 to 75.

Figure 7
Figure 7 shows Gender-wise respones of students involved in e-learning during Covid. According to the graphs
in the Figure 7, Faculty of Law is displaying minimum response of students with the value not exceeding 5 and
gender-wise females are at still more minima with value only upto 3. Maximum response of both male and
female e-learners is observed in case of Faculty of Languages and Arts with females at value 10 and males at
value 20, the maximum value. In all the faculties under obseravation female e-learners response exceeds the
response by male e-learners during Covid. In case of faculty of Engineering, female response is nil and male e-
learner response reaching the value only upto 5. Othe faculties show mixed patterns with the female response
always more than male e-learners during Covid.
CONCLUSION
The reaserch have found that there were only one of the four students of the higher education with online
learning activities, compared to Polytechnics and one of the university education. These results complement the
findings os A Dewoledeshi (2014), Bali and Liu (2018) and Opeyemi et al. (2019), all of which revealed that
the students were keen on many global universities in ELearning. However, between the pandemics, two of the
20
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

four students who were not satisfied with online learning were university students. After the pandemic, it was
shown that three of the four four of the four students of the Higher Education Organization were not desirable
for mixed studies where online and classrooms are performed simultaneously. The results of this study confirm
previous studies on online learning and support the application of the diffusion theory of innovation. While
other studies have focused on online learning at specific institutions or student perceptions in COVID-19-
specific situations, this study includes students surveyed from across the country and their online perceptions.
Since it was, it should be considered both global level pilot studies and learn during the COVID-19 pandemic.
REFERENCES
 Adewole-Odeshi E (2014) Attitude of students towards e-learning in south-west Nigerian universities: an
application of technology acceptance model. Available at:http:// digitalcommons. unl.edu/ cgi/viewcontent.
cgi?article=2504andcontext=libphilprac(accessed on 11 May 2021).
 AECT (2001) What is descriptive research? The Association for Educational Communications and Tech-
nology. Available at:http://members.aect.org/edtech/ed1/41/41-01.html(accessed on 11 May 2021).
 Afolabi OO and Uhomoibhi J (2017) E-learning implementation in higher education: aspects of
infrastructure development challenges and students learning approaches. Available at:https:// pure. ulster.
ac.uk/ en/ publications/ e-learning-implementation-in-highereducation-aspects-of-infrastru-3(accessed on
11 May2021).
 Apuke OD (2017) Quantitative research methods: a synopsis approach. Arabian Journal of Business and
Management Review 6(10): 40–47.
 Armstrong DA (2011) Students’ perceptions of online learning and instructional tools: a qualitative study
of undergraduate students’ use of online tools. The Turkish Online Journal of Educational Technology
10(3): 222–226.
 Bali S and Liu MC (2018) Students’ perceptions toward online learning and face-to-face learning courses.
Journal of Physics 11(8): 1–8.
 Bansal N (2020) Importance of online education during coronavirus crisis. Available at:http:// bweducation.
businessworld.in/article/Importance-Of-Online-Education-During-Coronavirus-Crisis-/30-04-2020-
190816/(accessed on 11 May 2021).
 City Population (2020) Nigeria: states and cities. Available at:https://www.citypopulation.de/Nigeria-
Cities. html(accessed on 11 May 2021).
 Cooper T (1999) Whose academy is it? New Statesman 128(4460).
 Dearing JW and Cox JG (2018) Diffusion of innovations theory, principles, and practice. Health Affairs
37(2): 183–190.
 Ertmer PA and Newby TJ (2013) Behaviorism, cognitivism, constructivism: comparing critical features
from an instructional design perspective. Performance Improvement Quarterly 26(2): 43–71.
 European Commission (2020) Coronavirus: online learning resources. Available at:https:// ec.europa.eu/
education/ resources-and-tools/coronavirus-online-learning-resources_en(accessed on 11 May 2021).
 Eze SC, Chinedu-Eze VC and Bello AO (2018) The utilisation of e-learning facilities in the educational
delivery system of Nigeria: a study of M-University. International Journal of Educational Technology in
Higher Education 15(34): 1–20.
 Frank M, Jadick MJ, Minnick C, et al. (2020) Diffusion of innovation theory. Available at:https:// www.
ou.edu/ deptcomm/ dodjcc/groups/99A2/theories.htm#home (accessed on 11 May 2021).
 GfK Polonia (2013) Analysis of sample size in consumer surveys. Available at:https:// ec.europa.eu/
economy_ finance/db_indicators/surveys/documents/workshops/2013/pl-gfk_k._pusczak_-_sample_ size_
in_ customer_ surveys_ v2_2.pdf(accessed on 11 May 2021).
 Goldstein D, Popescu A and Hannah-Jones N (2020) As school moves online, many students stay logged
out. The New York Times. April 6. Available at:https://www.nytimes.com/2020/04/06/us/coronavirus-
schools-attendance-absent.html(accessed on 11 May 2021).

21
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Gutierrez K (2016) Facts and stats that reveal the power of eLearning. Available
at:https://www.shiftelearning.com/blog/bid/301248/15-facts-and-stats-that-reveal-the-power-of-elearning
(accessed on 11 May 2021).
 Gómez-Rey P, Barbera E and Fernandez´-Navarro F (2018) Students’ perceptions about online teaching ef-
fectiveness: a bottom-up approach for identifying online instructors’ roles. Australasian Journal of Ed-
ucational Technology 34(1): 116–130.
 Hawkes M and Cambre M (2000) The cost factor. Technological Horizons in Education 28(1): 26.
 Hurixdigital (2020) 10 Advantages of e-Learning in higher education over traditional methods. Available
at: https://hurix.com/e-learning-in-higher-education/(accessed on 11 May 2021).
 Kershaw A (1996 September/October). People, planning, and process: the acceptance of technological in-
novation in post-secondary organizations. Educational Technology 36: 44–48.
 Kituyi G and Tusubira I (2013) A framework for the integration of e-learning in higher education
institutions in developing countries. International Journal of Education and Development using Information
and Communication Technology 9(2): 19–36.
 Knight P (1996) Assessment for Learning in Higher Education. SEDA Series. London: Kogan Page.
 Learning theories (2004) Insight into the move towards outcomes based education. Available
at:http://dl.icdst. org/pdfs(accessed on 11 May 2021).
 LaMorte WW (2019) Diffusion of innovation theory. Available at:https://sphweb.bumc.bu.edu/otlt/MPH-
Modules/SB/BehavioralChangeTheories/BehavioralChangeTheories4.html(accessed on 11 May 2021).
 Lau J, Yang B and Dasgupta R (2020) Will the coronavirus make online education go viral? Available
at:https://www.timeshighereducation.com/features/will-coronavirus-make-online-education-go-
viral(accessed on 11May 2021).
 Li C and Lalani F (2020) The COVID-19 pandemic has changed education forever. This is how. Available
at: https://www.weforum.org/agenda/2020/04/coronavirus-education-global-covid19-online-digital-
learning/(accessed on 11 May 2021).
 Linjawi AI and Alfadda LS (2018) Students’ perception, attitudes, and readiness toward online learning in
dental education in Saudi Arabia: a cohort study. Advances in Medical Education and Practice 9: 855–863.
Matsunaga S (2016) College students’ perceptions of online learning: knowledge gain and course
effectiveness.
 The Online Journal of Distance Education and e-Learning 4(2): 20–30.
 Naidu S (2006) E-Learning: A Guidebook of Principles, Procedures and Practices. 2nd edition. New Delhi:
Commonwealth Educational Media Center for Asia.
 NUC. (2020). National Universities Commission statistical digest 2017. Available at:https:// www. nuc.edu.
ng/ nuc-statistical- digest-2017/(accessed on 11 May 2021).
 Nnajiofor FN and Achukwu BC (2011) Benefits, challenges and implication of implementing e-learning
Nigeria higher institutions. UNIZIK Orient Journal of Education 6(1): 221–229.
 O’Neill K and SinghO’Donoghue GJ (2004) Implementing eLearning programmes for higher education: a
review of the literature. Journal of Information Technology Education 3: 313–323.
 Olaniyi SS (2006) E-learning technology: the Nigeria experience. Available at:https:// www. fig.net/
resources/ proceedings/ fig_proceedings/fig2006/papers/ts84/ts84_03_salawudeen_0593.pdf(accessed on
11 May2021).
 Opeyemi OZ, Adeyemi AA, Olajuwon TD, et al. (2019) Perception of nursing students towards online
learning: a case study of Lautech open and distance learning centre, Ogbomoso, Oyo State, Nigeria. Galore
International Journal of Health Sciences and Research 4(4): 23–30.
 Oriji A and Torunarigha YD (2019) Digitized education: examining the challenges of digital immigrant
educators in the face of net generation learners. KIU Journal of Social Sciences 5(4): 337–347.

22
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Pappas C (2014) Instructional design models and theories: gestalt theory. Available
at:https://elearningindustry. com/gestalt-theory (accessed on 11 May 2021).
 Punch (2020) 87% Nigeria’s poverty rate in North–World bank. Available at:https://punchng.com/87-
nigerias-poverty-rate-in-north-world-bank/(accessed on 11 May 2021).
 Renes SL (2015) Increasing access to higher education through e-learning. In: Gradinarova B (ed)
Instructional design, organizational strategy and management. ■■■: IntechOpen, 347–361.
 Rhalmi M (2011) Description of cognitivism. Available at:https:// www.myenglishpages.com/ blog/
description-of-cognitivism/ (accessed on 11 May 2021).
 Siemens (2020) Digitalization in education. Available at:https:// www. plm. automation. siemens. com/
global/ en/ our-story/glossary/digitalization-in-education/25307(accessed on 11 May 2021).
 Smart KL and Cappel JJ (2006) Students’ perceptions of online learning: a comparative study. Journal of
Information Technology Education 5: 201–219.
 Smith C, Hoderi M and Mcdermott W (2019) A preliminary study of students’ perception and learning
from different delivery methods. Academy of Educational Leadership Journal 23(2): 1–10.
 Song L, Singleton ES, Hill JR, et al. (2004) Improving online learning: student perceptions of useful and
challenging characteristics. The Internet and Higher Education 7(1): 59–70.
 Srivastava S (2020) Online learning in times of coronavirus: net-based learning can’t be temporary
measure, must be part of education policy. Available at:https://www.firstpost.com/learning/online-learning-
in-times-of-coronavirus-net-based-learning-cant-be-temporary-measure-must-be-part-of-education-policy-
8277281.html(accessed on 11 May 2021).
 State University (2020) Nigeria higher education. Available at: https:// education. State university. com/
pages/ 1105/ Nigeria-HIGHER-EDUCATION.html (accessed on 11 May 2021).

AUTHOR DETAILS:
DR. HARVINDER KAUR
Associate Professor, Department of Training and Technical Education, Bhai Parmanand Institute of Bussiness
Studies, Shakarpur Delhi-110092

23
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

ROLE OF NAAC IN TECHNICAL EDUCATIONAL INSTITUTIONS LIBRARIES

MR. ABHISHEK KUMAR SHARMA AND DR. INDU BHARTI GHILDIYAL

ABSTRACT
NAAC plays an important role in higher education which is playing a vital role in providing high quality
services to technical educational institutions. NAAC is a type of institution that assesses the resources and other
types of facilities of any technical institution, including whether the infrastructure of the educational institution
is complete as per standards. NAAC is constituted by UGC. NAAC is headquartered in Bangalore, which is a
technical division of UGC. The need for setting up NAAC came after the recommendations of the National
Policy on Education 1986. Any institution which has completed two student batches from its institution or it has
been at least 6 years since the institute started, can start any educational institution. The process of NAAC is
done once in five years in all educational institutions. NAAC process has been made online for colleges,
universities and NAAC since 2017. NAAC also issues new guidelines for evaluators from time to time. Through
this research paper, we will be able to know that how much importance is there in the library of any
educational institution of NAAC. The educational institution should not only present the library as a library, but
try that the library can also do 1-2 best practices for the educational institution like book bank facility, rare
books collection in library, some cultural and social events through library must go.
This research paper of mine tells about the process of NAAC and the importance of NAAC in libraries.
Keyword: National Assessment and Accreditation Council, Technical Educational Intuitions Libraries, Role of
NAAC, Importance of Libraries

INTRODUCTION
The NAAC working methodology has been amended in 2017 and now the work of the NAAC has been divided
into three phases. In the first phase, the self-study report is filled by the Technical Education Institute, after that
the NAAC After examining the self study report by the council, it is sent to the affiliated educational institution
for data verification and verification process. (1) In the second phase, after evaluating the data verification and
verification process by the technical institute, the information sought by the NAAC is completed and the data
verification and verification process is again sent to the NAAC. After that, the NAAC send its Peer team to the
institute. This visit of the Peer team is of 2-3 days in which all the resources of the institute are inspected by the
Peer team, after that once by the Peer team I meet the students. Meeting, knowing their views, then there is
interaction and question answer with the faculty of the institute, after that the peer team meets with the non-
teaching staff, information is taken about the facilities provided to them by the institute, after all these
procedures, the report is written by the peer team. A copy of which is sent to the NAAC and a copy is sent to
the higher authority of the technical institute which has been visited by the PIR team. After the Peer team leaves
the institute, its assessment grade gets updated on the website of National Assessment and Accreditation
Council within 5-7 days. After 2017, two new types of study methods are being adopted by the NAAC, in
which one is the qualitative metrics and the other is the quantitative matrix method to know the quality of any
technical educational institution. In Qualitative Matrix, the answers to the questions are descriptive, whereas in
the Quantitative Matrix, the answers to the questions are required to contain the data, facts and their numerical
data of the departments of the institute, in which the supporting documents of the working style of all the
departments, geo tagged photos, web of documents by the institute. Links and other types of data are sent online
to the National Assessment and Accreditation Council. (2)
Library Criteria in NAAC
4.2.1 What software is the library using to automate the library (LIMS)
Example
S.No. Name of software Automation (fully or Partial) type Establish year
1 Libsys partially Libsys-10 2012
4.2.2 The Institute of Technical Education has a provision of e-resources for the stakeholders of the Institute:
E-books
E-Journals & Magazines
24
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Shodhganga
Eshodhsindhu
E-database

Options
A. any 4 of these
B. any 3 of these
C. any 2 of these
D. any 1 of these
E. none of these
4.2.3 Yearly expenses of purchase of Books/e-books, journals/e-Journals and database per year for last five
years (Rs. in Lakhs)
Example
Year 2020-2021 2019-2020 2018-2019 2017-2018 2016-2017
Amount in Lakhs 20.4 18.5 17.8 16.4 15.75
4.2.4 Percentage of data for each day of library usage by teachers and students of educational institutions. (Data
for any latest 5 days of footfall off-line and on-line attendance data for the same 5 days. Percentage of library
usage per day by students and teachers (data for latest completed academic year)
1. Capable copy of the Ledger of the students and teachers using the library for the latest 5 days certified by the
Head of the Institute.
2. Online access data of online databases such as e-books, e-journals etc. by students and teachers for the same
5 days for which offline users data has been given that the able copy has been certified by the head of the
institute.
Importance of Libraries in National Assessment and Accreditation Council
Library is the teaching resource of any educational institution, which is an essential and primary source for the
teaching process. To survive, a library committee must be constituted by the higher authority of the educational
institution. Library is the heart and brain of every technical educational institution, if the heart is working
properly in the body, then our body also works properly, it is believed that if the condition of the library in any
educational institution is good and the stock of the library is updated. (3) If so, in this situation the educational
institution is also of high quality, to support the courses run or taught in any educational institution. The library
serves its stock according to the needs of the educational institution. The main purpose of any library is that it
Satisfy all your users and try to get all the users in the library For which it is very important for the library to
have its own separate campus Should be automated and automated, seminars, meetings, webinars, conferences
and workshops should be organized from time to time by the library workers for the students after a short
interval and the library staff should also take part in such programs and share their knowledge and skills. Keep
updating your skills. The library must organize an exhibition of books once in a year so that the stock of the
library is updated etc. The only objective of the National Assessment and Accreditation Council is to make the
quality and timing of higher education according to the social and economic needs of the education. (4) The
only objective of the National Assessment and Accreditation Council is to make the quality and timing of higher
education according to the social and economic needs of the education. The National Assessment and
Accreditation Council have 20 weight age points for the evaluation of the library of the Institute of Technical
Education, which are divided into 4 parts. Which is very important for libraries, first of all I would have
information about the automation of the library such as whether the library is automated or not, when is the
library automated, fully automated or semi automated, etc. In the second part all the aspects of the library are
included like how many books are there in the library, how many e-books are there in the library, how many
journals and e-journals are there in the library from which e-database the library has taken for the students etc.
(5) In the third part study we show the annual average expenditure of books/e-books expenditure, year wise
average of all expenditure during last five years in lakhs. In the context of the library, the 4th part of National
Assessment and Accreditation Council contains the details of the users visiting the library, in which the details
of daily use of the library by teachers, students, external users etc. Apart from this, the details of using the
25
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

online database are also to be given in this point, this point is a quantitative matrix in which the National
Assessment and Accreditation Council has to give the details of the related work as well as the latest data of 5
days has to be given to the National Assessment and Accreditation Council in which the daily students end The
details of the footfall of the faculty and the e-database used by the teachers and students are also to be given. (6)
Apart from all the 4 points in libraries, the educational institution should present any service of the library
which is the best service of the library as a best practice in National Assessment and Accreditation Council.
There can be many types of best practices in libraries like Providing book bank to students by the library at no
charge.
The library should have a computer lab of its own in which students can carry forward their research work using
online databases.
Library Committee should be constituted in the library so that the promotion of the library can be promoted and
the difficulties in running the library can be removed.
The operation of the library should be automated so that there should not be any difficulty in running the
library.
Book fairs should also be organized by the library from time to time so that the library gets an opportunity to
increase its book stock.
The library should organize seminars, workshops, webinars etc. for its employees from time to time, due to
which the skill development of the library staff continues.
The library should run online database awareness programs for students and teachers from time to time, in
which workshops, seminars, webinars etc. can be organized by the library so that all the teachers, staff and
students of the institute are aware about the database purchased by the library and how to access the database. It
is to be used that the information should be with everyone.
At the time of admission, students' induction program should also be arranged by the library so that the new
students coming to the educational institution can get all the information about the library like
What time does the library open in the morning and what time does it close at night.
Library time is more in exams or not.
What e-facilities are provided to the students by the library etc?
What are the rules of the library for the students of the educational institution?
Important preparations to be made before NAAC Peer team enters the educational institution
Preparing the Library for NAAC Peer Team Visits for the newly appointed Librarians in many educational
institutions, preparing and educating the library staff is a challenging task. 1 Librarian and library staff should
have complete information about the library like What is the collection policy of the library, information about
the number of books entered in the access register, information about the facilities provided by the library to its
users, how the learning materials are given to the users in the library, for distribution of learning materials
Whether there is any software in the library, if not, what is the type of software, how to use the software, etc.,
which magazines have been purchased by the library, which e-resources are taken by the library, how do we use
them? There is other information.
The librarian should be aware of the educational policy of the library, the achievements of the library and
library staff, the efforts made by the librarian to further the work of the library, etc.
Photos of all types of activities done by the library should be with the librarian, all such photos should be stored
in one place with the caption.
The librarian should submit the quotations of the library, bills of books and other materials, payment receipts of
materials, notices issued by the library, accession registers, journals and magazines registers, footfall register of
library users, library committee files, library It is necessary to have knowledge of all types of documents like
Late Fee Register, Library Rules File etc. because all this information is sought by the librarian by the Peer team
at the time of visit.
Before peer team visit by librarian, how many books are there in his library, how many magazines are there in
the library, how many newspapers come in the library, how many DVDs, CDs, manuscripts, old books
collection, rare books and rare reports are there in the library Knowledge needs to be conveyed to the library
26
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

staff and teachers/students? Everyone should have knowledge of library's web OPAC, library software, library's
e-resources (7)
The library should have its personal library notice board at the gate of the library, which should contain all
kinds of links, notices, information on resources, library materials and at a glance of the library etc.
A table containing information about the librarian's own and personal achievements of the library staff should
also be displayed in the library.
The librarian should keep 5 years budget and 5 years balance sheet of the library expenses in the library signed
by institute Chartered Accounted and head of the institution.
The supporting documents of the library committee's meetings, agenda points, action reports, action reports for
the last 5 years in the library should be signed by the head of the library and the head of the educational
institution.
There should be a new arrival section for the new books and other library study materials that came in the
library, in which the new study materials that came in the library can be displayed for everyone.
CONCLUSION
In today's time we can say that library is not only for exchange of books but it is a very influential area, in
today's time library is the knowledge center of any Technical educational institution and plays a great role in the
progress of educational institution. It is playing an important role in helping the researchers of the library to
conduct research. , Because the library provides research e-journals, e-books, e-journals, e-dissertations etc. for
its researchers. The Librarian not only presents the library to the NAAC peer team at NAAC, but the Librarian
plays a vital role in fulfilling many more criteria. The librarian also has an important role in the IQAC of the
educational institution. In today's time, the librarian is not less than the teachers in any way, if the teachers
educate the students, then the librarian directly and indirectly helps all the students completely in their
education. The educational institution must do a silent visit 1-2 times before the visit of the peer team to test its
preparedness. It is very important for any educational institution to visit NAAC to evaluate its educational
institution. By visiting NAAC, the educational institution becomes aware of its shortcomings and merits, in
which area the educational institution is improving. It has been said that more time is given in the library
department than other departments by the peer team. Point number 4.2.1 to 4.2.4 of NAAC is enough to show
the importance of librarian and library staff in any technical educational institution.
REFERENCES
1. Vyas, S. D. "Best practices in academic libraries in India: a study." In proceeding of: International
Conference on Academic Library. 2009.
2. Sengupta, Shantashree. "NAAC Accreditation and Responsibility of College Libraries in India." Library
Philosophy and Practice (e-journal) (2021).
3. Goel, Preeti. "Role Of Naac In Higher Education Institutions’libraries.".
4. Urkunde, Ganpat. "Role of Libraries in Higher Education in India." Available at SSRN 3636129 (2019).
5. Sengupta, Shantashree. "NAAC Accreditation and Responsibility of College Libraries in India." Library
Philosophy and Practice (e-journal) (2021).
6. Vyas, S. D. "Best practices in academic libraries in India: a study." In proceeding of: International
Conference on Academic Library. 2009.
7. http://naac.gov.in/images/docs/Manuals/SOP-General-University-as-on-01-01-2021.pdf
8. https://www.iitms.co.in/blog/importance-of-naac-accreditation-for-colleges.html

AUTHOR DETAILS:
MR. ABHISHEK KUMAR SHARMA1 AND DR. INDU BHARTI GHILDIYAL2
1
Senior Librarian of Tula’s Institute Dehradun, India
2
Assistant Professor of Himaliyiya University

27
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

WATER SAVINGS & REDUCTION OF COSTS THROUGH THE USE OF DUAL WATER SUPPLY
SYSTEM IN A SPORTS FACILITIES

SANJEEV KUMAR AND RAJIV BANARJEE

ABSTRACT
Water occurs as a liquid on the surface of Earth under normal conditions, which makes it invaluable for
transportation, for recreation, and as a habitat for a myriad of plants and animals. The fact that water is
readily changed to a vapor (gas) allows it to be transported through the atmosphere from the oceans to inland
areas where it condenses and, as rain, nourishes plant and animal life.The major goal of this work is to
conserve the fresh ground water with the help of dual water supply system including distribution network and
water treatment unit. In this study it is found that initial cost of project is high but in long term it is economical
and eco-friendly. New technique of dual water supply system increases the operation cost of water supply from
10.06 L to 37.52 L.Per day we can save 176.27 KLD of water in KD Singh Babu Stadium.

1. INTRODUCTION
Water, a substance composed of the chemical elements hydrogen and oxygen and existing in gaseous, liquid,
and solid states. It is one of the most plentiful and essential of compounds. A tasteless and odorless liquid at
room temperature, it has the important ability to dissolve many other substances. Indeed, the versatility of water
as a solvent is essential to living organisms.
2. TECHNIQUES FOR WATER CONSERVATION
 Greywater Recycling Systems
 Rainwater Harvesting
 Efficient Irrigation Technology
 Water Meters
 Pressure Reducing Valves
 Insulated Pipes
 Dual Water Supply System (DWSS)
2.1 Dual Water Supply System (DWSS)
Properties which are supplied or have access to both standard drinking water and recycled water. Two separates,
underground, piped water systems that serve a parcel of land or lot characterize dual water systems. As the
name implies, dual distribution systems involve the use of water supplies from two different sources in two
separate distribution networks. The two systems work independently of each other within the same service area.

Fig. 1.1 Dual water supply system

28
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

As shown in fig.1.1, the use of tap water for purposes that do not require drinking water, as in toilet flushing,
cleaning of pavement, watering lawns and gardens, is neither environmentally nor economically justified.
3. Types of Dual Water Supply System
The dual supply might be termed "potable" supply and "non-potable" supply.Dual water distribution systems
usestypical drinking water and highquality drinking water that are each supplied through separate pipe
networks. A dual water supply system is defined as one consisting of both a public water network and an onsite
rainwater harvesting system that provide sustainable water for potable and non-potable purposes,
respectively.

Fig. 1.2 Potable water treatment process


In the literature, despite the same assumption (dual supply), there are different definitions of these systems.
considered the dual water distribution system as one consisting of both rainwater and groundwater.

Fig. 1.3 Non-Potable water treatment process


5. Operation and Maintenance of Dwss
Depending on the use (i.e., intermittent use in the case of fire-fighting supplies or regular in the case of
irrigation supplies) and water source used (e.g., seawater or wastewater), in the dual
The technology is suitable only in distribution system, regular testing of the system is recommended.
6. Cost of Dwss
The cost of constructing a new distribution system for seawater (capital costs) would be similar to that for
laying regular distribution pipelines.
7. Suitability of Dwss
Areas where a supply of raw water is available. This type of system is generally used near the coast where
seawater is abundant, or in places where wastewater is readily available as a source of supply.
8. ADVANTAGES & DISADVANTAGES OF DWSS
8.1Advantages
 This technology allows the use of cheaper sources of water for non-consumptive purposes, which may
currently be served from more expensive, and limited, potable water supplies.

29
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

8.2 Disadvantages
 A dual distribution system requires that two distribution systems have to be installed, at essentially double
the cost of a single system.
10. INTRODUCTION TO SPORTS FACILITY
Sports facilities means enclosed areas of sports pavilions, stadiums, gymnasiums, health spas, boxing arenas,
swimming pools, roller and ice rinks, billiard halls, bowling alleys, and other similar places where members of
the general public assemble to engage in physical exercise, participate in athletic competition, or witness
sporting events.
In this case study, KD Singh Babu Stadium has been taken as a sports complex which has many sports facilities
inside it like stadiums, gymnasiums, boxing arenas, swimming pools, Boxing Arena, etc. as shown in fig. 1.4.
The function of a dual water supply system operating in a sports facilitywas evaluated on the basis of technical,
quantitative and financial data.

Fig. 1.4 KD Singh Babu Stadium Sports Complex


For treatment of water dual water system needs a treatment unit like Water Treatment Plant (WTP) or Effluent
Treatment Plant (ETP). This case study is performed on ETP be because waste water is less than compared to
WTP.
11. INTRODUCTION TO ETP
ETP (Effluent Treatment Plant) is a process design for treating theindustrial waste water for its reuse or safe
disposal to theenvironment as shown in fig. 1.5.
• Influent: Untreated industrial waste water.
• Effluent: Treated industrial waste water.
• Sludge: Solid part separated from waste water by ETP.

Fig. 1.5ETP Flow Chart


LITERATURE REVIEW
In order to fulfil the aims and objectives of the present study following literatures have been reviewed.
2.1 GENERAL
In sustainable urban management, rainwater, greywater, and groundwater are increasingly being considered as
alternative water sources where quality drinking water is not required for the water supply. Current
technological solutions allow for the use of dual water supply systems in both private and public buildings. The
latter, due to the potential to better manage an alternative water source in a sustainable manner, are
recommended for larger scale use. In this article, the function of a dual water supply system operating in a
sports facility, including the collection and use of rainwater for non-potable purposes, was evaluated on the
basis of technical, quantitative and financial data.
30
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

2.2 LITERATURE REVIEW


2.2.1. Water savings and reduction of costs through the use of a dual water supply system in a sports facility by
Ewa Burszta-Adamiak a& Paweł Spychalski (2021)
2.2.2. Development of dual water supply using rooftop rainwater harvesting and groundwater systems by
Siti Nazahiyah Rahmat 1 &Adel Ali Saeed Al-Gheethi1 (2019)
2.2.3. Trends in dual water systems by Peter D. Rogers & Neil S. Grigg (Nov. 2014)
2.2.4. Design of dual water supply system using rainwater and groundwater at arsenic contaminated area in
Vietnam by Duc Canh Nguyen & Moo Young Han (2014)
2.2.11. Analysis of a rainwater collection system for domestic water supply in Ringdansen, Norrko¨ping,
Sweden by Edgar L. Villarreala, Andrew Dixonb (2001)
2.2.12. The Recognition of Drought and its Driving Mechanism based on "Natural-artificial" Dual Water Cycle
by FENG Jing, WENG Baish (2001)
2.2.13. Water Route: A model for cost optimization of industrial water supply networks when using water
resources with varying salinity by Joeri Willet a, Koen Wetser, Jouke E. Dykstra (1997)
2.2.14. Fluorescence analysis of centralized water supply systems: Indications for rapid cross-connection
detection and water quality safety guarantee by Sihan Pan, Xiaowen Chen, Chenyue Cao. (1992)
2.2.15. Tertiary treatment and dual disinfection to improve microbial quality of reclaimed water for potable and
non-potable reuse: A case study of facilities in North Carolina by Emily S. Bailey a, Lisa M. Casanova, Otto D.
Simmons III (1992)
2.2.16. DUAL WATER DISTRIBUTION SYSTEMS IN CHINA by Chunping Yang, Zhiqiang Shen, Hong
Chen, Guangming Zeng (2007)
2.3 PROBLEM STATEMENT
 A dual distribution system requires that two distribution systems have to be installed, at essentially double the
cost of a single system.
2.4OBJECTIVES
The Main Objectives of This Study are as Follows:
1. To analyze the present water supply status.
2. To estimate the cost of dual water supply system.
3. To estimate the water saving & cost analysis.
4. Propose the additional water recharge mechanism.
RESEARCH & METHODOLOGY
3. METHODOLOGY
The methodology contains with case study of sport facility of K.D Singh Babu Stadium including data
collection of site location, Analysis of data, Providing Optimal Solution, Future aspect, Result, Conclusion and
Future.
3.1 Selecting Site Location of Sport Facility.

Fig. 3.1 Google image of K D Singh Babu Stadium


31
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

3.2 About Sport Facility


 The KD Singh Babu Stadium, formerly known as the Central Sports Stadium, is a multi-purpose stadium
named after the famous hockey player K. D. Singh. Some important points of stadium are given below.
Table 3.1: About K D Singh Babu Stadium
Sport Facility Name : K D Singh Babu Stadium
Location : Hazratganj, Lucknow, U.P., India.
Maximum Capacity : 25,000
Establishment : 1957
Owner : UPCA (Uttar Pradesh Cricket Association)
Present RSO : Ajay Kumar Sethi
3.3 DATA COLLECTION
3.3.1 Annual Ground Water Consumption by K D Singh Babu Stadium 2016

Table 3.2: Water consumed in year of 2016


3.3.2 Annual Ground Water Consumption by K D Singh Babu Stadium 2017
Table 3.3: Water consumed in year of 2017

32
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

3.3.3 Annual Ground Water Consumption by K D Singh Babu Stadium 2018

Table 3.4: Water consumed in year of 2018


3.3.4 Annual Ground Water Consumption by K D Singh Babu Stadium 2019

Total Water Consumed in 2019


Avg. Annual water Avg. Annual waste
Avg. Annual Annual water Avg. Annual Annual water Annual waste
consumed for water discharged
S.No. List of Sports Facility water entered in consumed for water consumed consumed for water discharged
water recharge in Sewer line in
sports facility KL drinking KL in toilets KL other works KL in Gomti River KL
works KL
1 Staff Quarter 5,198.12 14.40 0.72 5,183.00 - 5,183.00 15.12
2 Swimming Pool 83,695.48 2.61 0.13 83,692.74 - 83,692.74 2.74
3 Indoor Facility 5.62 2.55 0.13 2.94 - 2.94 2.68
4 Tennis Court 162.69 - - 162.69 - 162.69 -
5 Badminton Court 199.48 5.55 0.28 193.65 - 193.65 5.83
6 Volleyball Court 118.50 - - 118.50 118.50 - -
7 Cricket Practice Area 11.61 - - 11.61 11.61 - -
8 Weight Lifting Hall 83.67 4.26 0.21 79.20 - 79.20 4.47
9 Taekwondo Hall 117.57 3.54 0.18 113.85 - 113.85 3.72
10 Gymnasium 104.82 7.05 0.35 97.42 - 97.42 7.40
11 Basketball Court 212.88 - - 212.88 - 212.88 -
12 Boys & Girls Hostels 223.57 142.92 7.15 73.50 - 73.50 150.07
13 Boys & Girls Mess 130.50 120.00 6.00 4.50 - 4.50 126.00
14 Guard Rooms 6.33 3.92 0.20 2.21 - 2.21 4.12
15 4 Gardens 34.70 - - 34.70 34.70 - -
16 Public Toilets 15.26 - - 15.26 - 15.26 -
17 Sprinklers 28,382.40 - - 28,382.40 28,382.40 - -
18 Boxing Arena 143.36 2.81 0.14 140.42 - 140.42 2.95
19 Martial Art Area 159.20 2.81 0.14 156.26 - 156.26 2.95
20 Store Room 98.21 1.98 0.10 96.13 - 96.13 2.08
21 Office 269.12 13.68 0.68 254.76 - 254.76 14.36
22 Public Water Tank 299.25 285.00 14.25 - - - 299.25
23 Admin. Office 168.84 28.80 1.44 138.60 - 138.60 30.24
Total Water Consumed 1,19,841.19 641.88 32.09 1,19,167.22 28,547.21 90,620.00 673.98 KL
119.84 0.64 0.03 119.17 28.55 90.62 0.67 ML
Table 3.5: Water consumed in year of 2019
33
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

3.3.5 Annual Ground Water Consumption by K D Singh Babu Stadium 2021

Table 3.6: Water consumed in year of 2021


3.4 Analysis of Annual Water Consumption.
 In last 5 years 114.92 ML, 118.74 ML, 120.04 ML, 119.84 ML & 123.41 ML water is consumed shown in
fig. 3.10.

Fig. 3.10 Comparison of Annual Water Consumption of 5 Years

34
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 On an avg. of 5 years data 93,256.36KLor 93.26 MLwater is drained in Gomti river without reuse & which
can be saved with new technique of dual water supply system every year as shown in table 3.7.

Table 3.7 Average of 5 Year Water Consumption


3.5 Providing Optimal Solution for Water Conservations & Cost Reduction.
 Engineering is the application of science and mathematics to solve problems. Engineers figure out how
things work and find practical uses for scientific discoveries. Here, water conservation can be done using
dual water supply system which leads to cost reduction. Techniques.
 In KD Singh Babu Stadium there is 4.65 km water distribution network from (Pump House 1, Pump House
2) to each (Sports Facilities, Hostels, Staff Rooms etc.). Both pumps of capacity 2 HP& 10 HP and
separated at a distance of 143 m between them and pumping hours in stadium is 8 hrs. for each pump.
 The depth of the both borewells are of 34.62 m&29.50 m as per the data shared by the stadium engineers.DI
K7 pipe is used with 125 mm, 100 mm & 80 mm dia.
 According to the stadium maintenance team, the depth of the borewell has never been increased since
establishment because stadium is located near the Gomti river, which recharge its draw down depth.
3.5.1 Techniques for Water Conservation in KD Singh Babu Stadium
 As per the study we have found that every year 93.26 ML water is getting wasted and directly drained into
the Gomti river. So, in order to save this water, we must treat the water by proposing a ETP inside the
stadium complex.
 2.20 km pipe should be laid parallel to the existing pipe line, which will Convey the partial treated water to
each sports facility as per the requirement.
 Size of water recharge pits can vary from 2m x 2m, 4m x 4m with suitable depth.
 During rainy season water should in collected in desired size of tank, which can be used in stadium.
3.5.2 Cost Analysis of Dual Water Supply System
 In this case study we have proposed an Effluent Treatment Plant (ETP),Distribution Network &Motor
pump, which will increase the initial cost of the dual water supply system and considered major work for
cost analysis.
3.5.2.1 Cost Analysis of Effluent Treatment Plant
 Cost of ETP is calculated by taking the reference ofDesire Solution & Services, New Delhi.
 As per the data collected from stadium of waste water is 93.26 ML per year as shown in table no. 3.7. So,
the capacity of ETP is analyzed byconsidering 1% lossesof water on distribution side and 1 % losses of
water from sport facilities to ETP. Pumping hours of stadium is shown in table no. 3.10.
35
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table 3.9ETP Capacity Calculation


S.No. Stadium Daily Demand Water Losses Pumping Hr. ETP
(KLD / MLD) Capacity
1. = (93.26 / 365) *1000 = 2 % Assumed for 16 Hrs. for 2 ETP 400 KLD
255.50 KLD or = 0.255 MLD design of ETP
 Adopted size of ETP is 400 KLD which should be installed in stadium for partial treatment.
 Cost analysis of 100 KLD& 300 KLD capacity ETP is 39.99 lacs., including transportation, installation and
GST which is manufactured by Riva Appliances Private Limited, Delhi.
 3.5.2.2 Cost Analysis of Distribution Network Connected with ETP
 The most important part of dual water supply system is parallel pipe lines which consist of partial treated
water.
 Total distribution length of pipes connected with ETP 1 and ETP 2 is 4.85 km.
 According to old survey report data elevation points are considered for laying of new pipe line. Total
capacity of new pipe line shown in table no. 3.11 –
Table 3.11Pipe Abstract
S.No. Description Design Values
1. Design Period 30 Years
2. Minimum Terminal Pressure 7 m for ETP 1 & 12 m for ETP 2
3. Peak Factor 3
4. Minimum Diameter of Mains 110 mm, 90 mm & 75 mm
HDPE Pipe PE – 100 grade PN – 6
5. Pipe Material working pressures has been provided.
 For the cost estimation of distribution pipe rates are considered from State Water & Sanitation Mission.
Table 3.12HDPE pipes rates approved by SWSM

Pipe Table
Following table gives the detailed output of the hydraulic design of the KD Singh Babu Stadium obtained from
Water GEMS.
 Distribution attached to ETP 1 consist of 2640.41 m or 2.64 Km pipes having various diameter varying
from 75 mm to 110 mm dia. and varying length.
 Distribution attached to ETP 2 consist of 2204.85 m or 2.20 Km pipes having various diameter varying
from 75 mm to 110 mm dia. and length.
Junction Table
 Maximum and minimum pressure available at ETP1 are 13 m and 7 m& maximum and minimum pressure
available at the junctions in this study are. ETP 2 is 16 m and 12 m.

36
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Cost Analysis of Distribution Network


o Cost of distribution network is done by considering the required length of pipe as per design report obtained
by Water GEM as shown in table no. 3.17. And the rates of various pipe dia. are taken from the Jal Jeevan
Mission project under State Water and Sanitation Mission.
Table 3.17Cost Analysis of Distribution Network
Length of Pipe connected to ETP 1 Rates Units Amount
Total length of 75 mm dia. 1,136.71 m 169.20 Per m 1,92,331.33
Total length of 90 mm dia. 642.78 m 229.50 Per m 1,47,518.01
Total length of 110 mm dia. 860.92 m 339.9 Per m 2,92,626.71
Sub Total (B) 2,640.41 m 6,32,476.05

Length of Pipe connected to ETP 2 Rates Units Amount


Total length of 75 mm dia. 1,197.83 m 169.20 Per m 2,02,672.84
Total length of 90 mm dia. 355.29 m 229.50 Per m 81,539.06
Total length of 110 mm dia. 651.73 m 339.9 Per m 2,21,523.03
Sub Total (A) 2,204.85 m 5,05,734.92
Total C = ( A+ B ) 4,845.26 m 11,38,210.97
Existing Pipe in K D Singh Babu Satdium
ETP 1 (Refer Drawing 3/3 )
Node Number Dia. mm Material length Unit Rates Amount
J63 J631 90 mm H/PN 6 28.10 m 229.50 6,448.95
J631 J6311 75 mm H/PN 6 10.00 m 169.20 1,692.00
J631 J6312 75 mm H/PN 6 10.00 m 169.20 1,692.00
J61 J611 90 mm H/PN 6 38.51 m 229.50 8,838.05
J7431 K1 90 mm H/PN 6 14.16 m 229.50 3,249.72
K1 K8 90 mm H/PN 6 70.00 m 229.50 16,065.00
K1 K82 75 mm H/PN 6 1,027.24 m 169.20 1,73,809.01
Total (P) 1,198.01 m 2,11,794.72

ETP 2 (Refer Drawing 3/3 )


Node Number Dia. mm Material length Unit Rates Amount
N23 N231 90 H/PN 6 40.27 m 229.50 9,241.97
N22 N221 90 H/PN 6 40.00 m 229.50 9,180.00
N21 N211 90 H/PN 6 21.04 m 229.50 4,828.68
N8 N81 90 H/PN 6 12.50 m 229.50 2,868.75
N10 N101 90 H/PN 6 11.66 m 229.50 2,675.97
N7 L1 90 H/PN 6 46.30 m 229.50 10,625.85
L1 L9 90 H/PN 6 80.00 m 229.50 18,360.00
L1 L92 75 H/PN 6 1,197.83 m 169.20 2,02,672.84
Total (Q) 1,449.60 m 2,60,454.05

Final Length & Cost of Distribution Network


2,197.65 m 6,65,962.19
C-P-Q

Say 6.66 Lacs.


 Valve Table
o As per design sluice valves have been provided at the outlet of each ETP. Air valve of required size has been
provided at required regular intervals in main distribution line from ETP to sports facilities.
o And the rates of various valves are taken from the Jal Jeevan Mission project under State Water and
Sanitation Mission.
Table 3.18Valve Abstract
Valve Type Valve Size (mm) Quantity Rates Amount
300 mm 0 64,042.00 0
250 mm 0 48,109.00 0
200 mm 0 27,304.00 0
150 mm 0 17,626.00 0
Sluice Valve 125 mm 0 14,505.00 0
100 mm 4 14,455.00 57,820.00
80 mm 2 12,401.00 24,802.00

37
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Air Valve / 150 mm 0 1,24,575.00 0


Pressure 100 mm 6 80,025.00 4,80,150.00
Release Valve 80 mm 0 54,219.00 0
250 mm 0 48,109.48 0
200 mm 0 27,304.03 0
Scour Valve 150 mm 0 17,625.57 0
100 mm 4 12,535.28 50,141.12
80 mm 0 10,160.84 0
Total 6,12,913.12 6.13 Lacs.
 Analysis of Pump Motor for EPT 1 & ETP 2
Table 3.19 Capacity of Motor Pump

Cost Analysis of Pump Motor & Power Consumption Charges


o Rates of pump motors are taken from the Jal Jeevan Mission project under State Water and Sanitation
Mission as shown in table no. 3.20, refer Annexure 1.
Table 3.20Cost of Motor Pump
Item Description Rate Qty. Unit Amount
2 HP 35,843.14 2 Job 71,686.28
10 HP 2,30,200.00 0 Job 0
20 HP 2,95,145.00 2 Job 5,90,290.00
25 HP 3,34,043.48 0 Job 0
Total Cost of Pumps complete in all aspect including 6,61,976.28.00 Or 6.62 L
installation & labour charges.

o Total Cost of Pumps complete in all aspect including installation & labour charges is 6.62 L.
o Power consumption of motor is calculated by considering present rate of electricity tariff of UPPCL, as
shown in table no. 3.21.
Table 3.21 per Month Electricity Bill Charge
ETP 1 Motor Operation Cost ETP 2 Motor Operation Cost
Monthly Power Consumption of 2 HP motor Monthly Power Consumption of 20 HP motor
Motor Capacity 2.00 HP Motor Capacity 20.00 HP
Motor Capacity 1.49 kW Motor Capacity 14.90 kW
Pumping Hrs. 8.00 Hrs. Pumping Hrs. 8.00 Hrs.
Per Unit Bill 7.50 Rs. Per Unit Bill 7.50 Rs.
Monthly
Charge 2,682.00 Rs. Monthly Charge 26,820.00 Rs.
2 Motors of 2 2 Motors of 20
HP 5,364.00 Rs. HP 53,640.00 Rs.
Annual Cost 64,368.00 Rs. Annual Cost 6,43,680.00 Rs.
Expected Cost Expected Cost in
3,21,840.00 Rs. 32,18,400.00 Rs.
in next 5 years next 5 years

38
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

3.5.3Summary of Dual Water Supply System Including Assembling & Cost Analysis.

S.No. Dual Water Supply System Components Over All Cost (Lacs.)
1. ETP (Effluent Treatment Plant) installation cost 39.99
2. Distribution Network of HDPE PN-6 (75 mm to 110 mm dia.) 6.66
3. Installation of Valves in distribution 6.13
4. Installation of motors for pumping 6.62
Total Cost for Dual Water Supply System 59.40 L
1. Operation Cost of ETP by motors of 2 Hp & 20 Hp for next 5 35,40,240.00 Or 35.40 L
years for 16 hrs.
3.5.4 Cost Analysis of Water Recharge Mechanism
o In Uttar Pradesh, Jal Jeevan Mission is going on under the Ministry of Jal Shakti. The aim of this
mission is to provide fresh water to each and every household of villages by any surface source of water or
any ground water source.
o The provision of water recharge mechanism is made by central government to save guard the ground water
table in order to provide quality and desired amount of water.
o The executing body State Water & Sanitation Mission with collaboration of Uttar Pradesh Jal Nigam
Grameen&Minor Irrigation has finalized the rate of water recharge mechanism. Some schedule of rates of
5 divisions are as follows –
Table 3.23Rates of Water Recharge Mechanism
S.No. Division Item Description Rates Unit Amount
1. Lucknow Water recharge mechanism 89,285.71 Sqm. 89,285.71
with in water work campus
o Water recharge mechanism in KD Singh Babu Stadium thenwill cost14.29 L
Table 3.24Cost Analysis of Water Recharge Mechanism
S.No. Item Description Qty. L B Area Rate Unit Amount
1. Water recharge 1.00 4 m 4 m 16 m2 89,285.71 Sqm. 14,28571.36 Or
mechanism near 14.29 L
swimming pool
o The design drawing of water recharge mechanism is approved by Technical Cell of State Water & Sanitation
Mission, and can be proposed to KD Singh Babu Stadium for water recharge, refer Annexure 2.
3.6 Flow Chart of Dual Water Supply System
o The main working principle of dual water supply system is to conserve the fresh water as shown in fig.3.13.

39
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig. 3.13 Flow Chart of Water Supply System


3.8 Cost Analysis & Comparison

Table 3.26Comparison of Pumping Hours & Cost


 From the table no. 3.26, we observe that pumping hours of submersible pumps reduced from 16 to 2.11 hrs.
 Similarly, the operation cost of submersible pumps has also reduced form 10.06 L to 2.12 L by assuming the
UPPCL tariff charge constant for next 5 years.
 As the pumping hours is reduced the serviceability & durability of submersible will also increase.
3.9 RESULT & DISCUSSION
 This case study shows that every year 93.26 ML or 255.50 KLD can be saved by using proposing dual water
supply system in K D Singh Babu Stadium. Following results are found listed in table no. 3.27.
Table 3.27 Results of Case Study
S.No. Parameters Analyzed Results
1. Water Demand in Stadium 327.09 KLD
2. Distribution Network in Stadium 4.65 km
3. Design Discharge of pumps (P1 & P2) 40.94 KLD & 286.15 KLD
4. Capacity of Submersible pumps 2.5 HP & 10 HP
5. Distance between pumps 143 m
6. Quantity of Waste Water 255.50 KLD
7. Operation Cost of last 5 yrs. 10.06 L
After Proposed ETP
1. Proposed Network of ETP 1 & ETP 2 4.85 km inclusive of old length.
2. Demand for ETP 255.50 KLD
3. Design Demand & Capacity of ETP 1 40.94 KLD & 100 KLD
4. Design Demand & Capacity of ETP 2 286.15 KLD & 300 KLD
5. Installation Cost of ETP 39.99 L
6. Operation Cost for next 5yrs, 35.40 L
7. Pumping Cost Submersible Pumps @ 2.11 hrs. 2.12 L
3.10 CONCLUSIONS
 In this study, it is found that new technique of dual water supply system increases the operation cost of water
supply from 10.06 L to 37.52 L.
40
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Per day we can save (251.68 KLD – 75.41 KLD = 176.27 KLD)

Fig. 3.14 Comparison of Waste Water


3.11 FUTURE SCOPE
 This Study can be formed in all sports complex, commercial buildings etc. and dual water supply system is
effective technique to conserve the water.
 Area which uses high ground water can be studied with proposal of WTP.
 Cost of pumping can be studied by using non-conventional source of energy like solar energy.
REFRENCES
[1] Ewa Burszta-Adamiak a & Paweł Spychalski (2021) “Water savings and reduction of costs through the use
of a dual water supply system in a sports facility”
[2] Siti Nazahiyah Rahmat 1 & Adel Ali Saeed Al Gheethi1 (2019) “Development of dual water supply using
rooftop rainwater harvesting and groundwater systems”
[3] Peter D. Rogers & Neil S. Grigg (Nov. 2014) “Trends in dual water systems”
[4] Duc Canh Nguyen & Moo Young Han (2014) “Design of dual water supply system using rainwater and
groundwater at arsenic contaminated area in Vietnam”
[5] David J., Jia Liu (2014) “Optimizing rainwater harvesting systems for the dual purposes of water supply
and runoff capture”
[6] R. Chee & K. Lansey (2009) “Design of Dual Water Supply Systems”
[7] Okun (2009) “Benefits of Shifting Fire Protection to Reclaimed Water”
[8] Grigg, N. (2009) “Institutional analysis of infrastructure problems: case of water quality in distribution
system”
[9] X.H. Zhang, H.W. Zhang (2009) “An inexact-stochastic dual water supply programming model”
[10] Mantovani, P., et. al (2001) “Management Practices for Non potable Water Reuse”
[11] Edgar L. Villarreala, Andrew Dixonb (2001)“Analysis of a rainwater collection system for domestic water
supply in Ringdansen, Norrko¨ping, Sweden”
[12] FENG Jing, WENG Baish (2001) “The Recognition of Drought and its Driving Mechanism based on
"Natural-artificial" Dual Water Cycle”
[13] Joeri Willet a, Koen Wetser, Jouke E. Dykstra (1997) “Water Route: A model for cost optimization of
industrial water supply networks when using water resources with varying salinity”
[14] Sihan Pan, Xiaowen Chen, Chenyue Cao. (1992) “Fluorescence analysis of centralized water supply
systems: Indications for rapid cross-connection detection and water quality safety guarantee”
AUTHOR DETAILS:
SANJEEV KUMAR1 AND RAJIV BANARJEE2
1
M.Tech , Integral University, Lucknow, Uttar Pradesh, India, Branch- Civil, Specialization- Hydraulic and
Water Resource Engineering
2
Associate Professor, Integral University, Lucknow Dr. Syed Aqeel Ahamad, H.O.D. (Department of Civil
Engineering), Integral University, Lucknow
41
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

PERFORMANCE EVALUATION OF MACHINE LEARNING-BASED SMART GRID IN AN


INTERCONNECTED POWER SYSTEM BY USING WIRELESS COMMUNICATION SYSTEMS

ASTHA SINGH KUSHWAHA, DR. MAHAVEER SINGH NARUKA AND E. R. PARITOSH


TRIPATHI

ABSTRACT
With expanding energy interest, maturing framework and dependability hardships moving to a brilliant
framework, the new sort is a more productive and solid power lattice (SG). Customary power circulation
frameworks have been changed into new SGs in light of present day power network foundation, high proficiency
and unwavering quality, computerized control, high power transformers, high level correspondence foundation,
sensors and metering advancements and high level power the board advancements in view of interest and
power improvement. What's more, accessibility. These elements are incorporated in light of the fact that it is
presently conceivable to utilize computerized reasoning (AI) and AI (ML) strategies to all the more likely
evaluate energy utilization. The Internet of Things (IoT) and brilliant meters (SM) assume a significant part in
gathering constant information on electrical energy. Then, we will talk about normally utilized AI (ML)
strategies for assessing electrical energy utilization in structures. To comprehend the association between
various parts of SG, IoT and ML, we will create a straightforward model that comprises of layers coordinated
into collaborations elements utilizing joins. This article utilizes dull brain organizations (RNNs) and long haul
memory (LSTMs) to gauge the electrical power utilized by the genuine informational index.
Keywords: MachineLearning, SmartGrid, InternetofThings,RNN, LSTM, Forecasting,Prediction,SmartMeters

1. INTRODUCTION
We presently have a lot of information in SG because of the consideration of brilliant meters and the quick
extension of SG's framework.With this brilliant power matrix, clients can screen, survey, plan, learn and arrive
at conclusions about energy utilization and creation continuously with the capacity to speak with the power
lattice (Decebal Constantin Mocanu, 2016). As the purchaser is the buyer and maker of energy, this
organization enjoys the benefit of better preparation and use of electrical energy.To decrease power utilization,
SG illuminates the end client continuously how much power each electrical gadget consumes.Shrewd meters,
sensors and AI (ML) are utilized related to the Internet of Things (IoT) and SG to accomplish this.It requires a
ton of investment and work to follow energy utilization since it comes from three sources: petroleum products,
inexhaustible assets and thermal power (Ralph EH Simsa, 2003). Subsequently, we can gauge how much energy
is being consumed in various regions and make arrangements in view of that data.The above power can be all
valued for strategy creators and chiefs. It is feasible to diminish the energy utilized in a cycle or occupation by
making changes in light of how much energy required. Momentary figures range from one hour to seven days,
medium-term gauges from multi week to one year, and long haul conjectures from over a year. (Mokanu, 2016)
Classify power request gauges into three categories.one year. The writing shows that momentary interest The
appraisal grabbed the eye of a large number. These evaluations are significant for controlling the power
framework, monetary portion and power markets (Salah Bukatif, 2018). Interestingly, medium and longterm
Although gauges are significant for power lattice arranging and spending plan allotments, very little exploration
has been finished on them (Hindman, R. J., Shu, F, 2010).Succession arranged histogram of intermodular joins
in LSTM (Lin-Thorne-Gers) networks coordinated into the RNN is utilized as a sign of our outcomes (Lin-
Thorne-Gers, 2000). This makes conceivable the unique fleeting way of behaving of the grouping. Normal to
many models that depend on verifiable information, it has shown extraordinary commitment in large numbers
of these forecasts (Yi-Ting Sai, 2018). Consequently, we need to utilize LSTM to tackle this kind of issue and
exploit the novel ability of the strategy to expand the exactness of electrical energy gauges in structures.The
remainder of the paper is coordinated as follows: SG and Architecture are examined in Section 2, while IoT,
Component Architecture and SM are talked about in Section 3 as an IoT apparatus. Area 4 spotlights on the ML
model and its capacity to foresee results. In Section 5, we propose a worked on three-level model of ML, SG
and IoT substances and their connections.Ends and plans for additional examination are introduced in Section 6.

42
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

2. SMARTGRID
2.1 Definition
As data streams in just a single manner, energy disseminates and there is a rising requirement for energy,
conventional power frameworks are being changed into shrewd networks to tackle issues connected with the
ongoing power framework. SG utilizes existing power framework to join PC abilities with two-way
correspondence. The energy esteem covers all levels of the chain; It utilizes sensors, implanted and figured to
make the power network monitorable (estimation and representation ability), controllable (manipulative and
enhancement capacity), computerized (versatility and self-rectification), as well as completely incorporated
(completely interoperable). With the capacity to coordinate existing frameworks and various sorts of energy
assets) (M. FOUAD, 2019). Consequently, SG should have availability, robotization and observing for these
gadgets to work. The Internet of Things (IoT) is utilized. At the point when utilized related to SG frameworks,
IoT gadgets (like sensors, actuators, and SM) support a scope of organization exercises across power age,
transmission, dissemination, and usage (Cynthia Rudin and David Waltz, 2011).Traditional power frameworks
have for quite some time been tormented with issues like shortcoming, dependability, security and solidness and
the developing interest for electric power. The presentation of Smart Grid (SG) is viewed as a feasible response
to these issues. Notwithstanding self-fix, dispersed item, request reaction, communication, client interest and
resource the board, SG has various different advantages. With progresses in SM, sensor-based approaches can
be taken advantage of to give a figure of the energy load expected to stay away from a blackout (R.K. Jain,
K.M. Smith, 2014). Information gathered from SM and weather conditions stations can be utilized by cutting
edge counterfeit brilliant procedures and ML calculations to connect energy utilization with different factors, for
example, temperature, radiation sun powered, season of day or season and inhabitance (S. Papantoniou, D.
Kolokotsa, 2014). Because of the fast advancement and utilization of minimal expense choices for energy
metering lately, energy load guaging is turning out to be increasingly exact, savvy and substantially more
popular (C. Fan, F. Xiao, 2014) (D. Kolokotsa, 2015).With the utilization of strategies in light of the study of
computerized reasoning and ML that permit the double-dealing of datasets to fabricate models for the
expectation of energy utilization and pinnacle power interest, determined to work on the exactness of the
estimate is continually advancing. These gathering models can be significant apparatuses for further developing
techniques for issue identification and conclusion, and cooperations among structures and SG. Also, the
handling and translation of information extricated by SM can give fascinating data on the energy conduct of
structures.
2.2 Architecture
According to a design perspective, SG comprises of three structure blocks: HANs, NANs and WANs. SG is a
three-level framework (WAN). HANs are answerable for interfacing scattered RERs (sustainable power
sources), extra electric vehicles (PEVs), purchaser apparatuses and brilliant meters (SM). Subsequently, HANs
are liable for re-energizing PEVs. It is accepted that 50% of the all out energy is utilized in homes. Additionally
(B. Slope, 2010).NANs interface numerous HANs to one another. Computerized Measurement Infrastructure
(AMI) and Field Area Networks (FAN) make up NAN (FAN). Fans and AMIs are looked at exhaustively in this
article (K. H. Chang, 2013). The power offices and control focus are associated with NANs by means of WANs
worked by WANs

Fig 1.Architecture

43
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

With progresses in SM, sensor-based approaches can be taken advantage of to give a figure of the energy load
expected to stay away from a blackout (R.K. Jain, K.M. Smith, 2014). Information gathered from SM and
weather conditions stations can be utilized by cutting edge counterfeit brilliant procedures and ML calculations
to connect energy utilization with different factors, for example, temperature, radiation sun powered, season of
day or season and inhabitance (S. Papantoniou, D. Kolokotsa, 2014). Because of the fast advancement and
utilization of minimal expense choices for energy metering lately, energy load guaging is turning out to be
increasingly exact, savvy and substantially more popular (C. Fan, F. Xiao, 2014) (D. Kolokotsa, 2015).With the
utilization of strategies in light of the study of computerized reasoning and ML that permit the double-dealing of
datasets to fabricate models for the expectation of energy utilization and pinnacle power interest, determined to
work on the exactness of the estimate is continually advancing. These gathering models can be significant
apparatuses for further developing techniques for issue identification and conclusion, and cooperations among
structures and SG. Also, the handling and translation of information extricated by SM can give fascinating data
on the energy conduct of structures.
3. INTERNETOFTHINGS IOT
3.1 Definition
As per the RFID association, RFID is characterized as "the worldwide organization of arranged content that is
actually settled in light of standard correspondence conventions".The Internet of Things (IoT) is a bunch of
interconnected frameworks that start information the board, exploration, and usage made by interconnected
objects (Bruno.dorsemaine, 2015).With the Internet of Things, sensors and apparatuses can speak with one
another continuously and share data across stages and gadgets. Making the most of the open doors presented by
the Internet, numerous remote advancements have as of late been created as the Internet of Things (IoT). The
Internet of Things (IoT) is adding knowledge to practically all areas, for example, brilliant urban communities,
retail, farming, water transport, medical care and energy (Mohsen Marjani, 2017).True sensors are incorporated
with countless IoT specialized gadgets. Underlying specialized gadgets for information assortment gadgets
catch and communicate information. Correspondence arrangements, for example, Bluetooth, WIFI, ZigBee and
GSM are utilized to associate gadgets and articles. Using PCs, these information transmission and driving
gadgets can be incorporated straightforwardly into the genuine climate, enhancing, mechanizing and working on
all activities.
3.2 Componentarchitecture
The Internet of Things and related advancements can be utilized in various businesses, yet the things that are
associated are as yet attached to a similar engineering: information should be communicated, put away, handled
and made accessible.
• For the worked on construction of the Internet of Things, we have characterized four levels:
• Associated components and neighborhood gathering areas make up the items in the gadget level. These
parts collaborate with wired or remote advancements (Ethernet, fiber-optic, and so forth) (Energy in
Bluetooth, Wi-Fi, ZigBee, and so on.). Cell phones and other little gadgets can be utilized as catch focuses
(discretionary). Objects that need more power can get to the framework through these doors (battery,
figuring power, and so on.). At times, they make the client cooperate straightforwardly with the item (for
instance an application on a cell phone).
• Because of the great degree of information transmission and correspondence control servers can cooperate
with capacity gadgets and hardware.
• By utilizing a cloud-based administration stage for information capacity and extraction, information
handling is conceivable.
• Information can likewise be gotten to involving APIs or graphical connection points in the Management
Portal for different clients and frameworks.

44
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Figure 2. End-to-end IoT architecture (Zhengyuan Sheng,2015).


3.3 Smartmeters Asiot
The smart meter is one of the utility cases of the IoT application, which generates large amounts of data from
various sources such as SG, water currents and silo stock calculation, where processing takes a lot of time, even
on a dedicated site and powerful machine (Improve Marzani, 2017). SM is a device Between the meter and the
control framework that electronically records electrical energy utilization information. With regards to the
Internet of Things information from SM can be utilized by chiefs to appraise how much power they need. To
keep away from emergencies and accomplish vital objectives, SM examination can likewise be utilized for
request determining. Information should be changed into data that can be utilized by both public and
confidential area associations using complex examination and the handling of a lot of information.
4. MACHINE LEARNING
4.1 Definition
The objective of AI, the part of man-made reasoning, is to foster calculations that can gain from their own
information. It includes the capacity to recognize objects in their environmental elements and survey the way of
behaving of those creatures to come to clever conclusions about their current circumstance (Pankaj Mehta,
2019). Support Learning (RL) is one of the three significant developments of AI (ML). It is normal to involve
marked information for directed learning errands like characterization and retreat (for instance, a bunch of
pictures that could conceivably incorporate felines). Unlabeled information is utilized in directed practice to
track down usable examples and designs in the information. Bunching, size decrease, and item displaying are
instances of solo practice.After the specialist interfaces with his environmental factors, he advances by changing
his activities to work on his prize. For instance, a robot can be instructed to get a mind boggling climate through
remuneration exercises that lead to its planned objective (Lady Nargis Falah, 2018).To foster a Power Usage
Prediction model, you really want an AI calculation. Information based building energy utilization evaluation
studies have recently utilized SVM, ANN, choice trees and/or other measurable advances (Kadir Amazali,
2018).
4.2 Machine Learning Models
For each model considered, several variations are proposed in the literature, and below we provide a
classification of commonly used ML models: ANN, DT, RNN, MLP, SVM / SVR, ELM, WNN, hybrid
methods, in-depth study.

45
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Figure 3.Thetaxonomy of Research


4.3 Therole of mlinprediction
Each phase of the AI (ML) interaction can be separated into one of four classes (Wang Z, 2017). Building
energy utilization can be assessed utilizing a few ML calculations and forecast models that follow these means.
Artificial intelligence based forecast models can be partitioned into three kinds in view of their normal parts:
essential, total and half and half. The training technique is utilized to make interesting assessment models,
though by and large models contain a few assessment models to give yield information.Half breed models have
no less than two AI (ML) strategies. This kind of model is more solid than others since it utilizes incorporated
procedures and gives better prescient exactness (Zhui-sheng Chou, 2018).

Figure 4.Steps of ML Model (Francesca Lazzeri, 2019)


Organizations can offer better types of assistance to their clients on the off chance that they have exact
assumptions. Monetary determining, seismic estimating, profit guaging, risk funding versus risk anticipating,
land use evaluation and execution of players and groups in sports, political determining, and a wide assortment
of future markers can be characterized under the heading "guaging". Item and deals evaluation, charge appraisal
and general point of view on innovation and assessments. Momentary conjectures (ST) frequently center around
transient vital objectives like expanding efficiency.Capacity to design and deal with one's activities. Medium-
term guaging (MT) has been a key administration device in the modern and government areas for a long time.
Industry and associations that need to execute long haul techniques need exact long haul estimates, and these
projections are connected to supply markers (Tanveer Ahmed, 2020).
5. LITERATURE REVIEW AND OUR MODEL
5.1 Relatedworks
(Amir Mousavi, Abdullah Bahmani 2018) A broad rundown of prescient articles utilizing ML strategies and
other work depicting the degree, properties, calculations and execution of information in the writing on IoT
shrewd meters is accessible on SG organizations. (Kadir Amassiali, Noura Mohammed El Gohari, January 11,
2018).SGAM is broadly utilized and surpasses its underlying objective of reporting mistakes in confirmation
(Matthias Uslar, January 15, 2019), SGAM-based utility case demonstrating and work plan (Philip Prestl
Andren, March 16, 2017) exhibiting the communication design between all components.

46
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

5.2 Proposed Model


5.2.1 EntityInteractionModel: In light of the three elements and the four associations (SG Network, IoT
Information Collection Entity, ML Prediction Technologies), our model improves on how these three
substances collaborate with one another.

Figure5.SimplifiedEntity InteractionModel
5.2.2 DESCRIPTIVE LAYERED MODEL
In our model, there are five levels, every one of which can be ordered into one of three gatherings: Sensors,
brilliant meters, cameras and different gadgets that can gather and communicate data are essential for the IoT
layer.Electrical layer alludes to the foundation expected to communicate electrical energy from the creation
source to the end client through an electrical power wholesaler.Ethernet, optical fiber and remote availability are
a portion of the innovations utilized by the correspondence layer to coordinate numerous organization parts
utilizing different correspondence conventions (Energy in Bluetooth, WiFi, ZigBee, and so on.). Luca Mainetti
(2011) Cloud server farms or confidential mists (exclusive on-premises server farms) are strong figuring servers
that can store and handle a lot information progressively. These registering units are intended to be quantifiable
and expandable in accordance with future development in both capacity and handling limits, as well as their
design, stockpiling and handling limit. AI Layer: This application permits you to gain AI calculations from the
gave information or informational collections and make forecasts quicker than expected and with more
noteworthy exactness.
ML ANN, CNN,RNN, DeepLearning AILayer
StorageServersandProcessing InformationLayer
SG TelecommunicationNetwork CommunicationLayer
ElectricalNetwork ElectricalLayer
IoT SmartMeters IoTLayer
Table1.SimplifiedLayeredModel
5.2.3 Validation: The genuine SG network is portrayed underneath the outline of our model to demonstrate
the way that the above layers can be utilized to decrease electrical energy utilization while likewise
lessening expenses for the client by anticipating their utilization and permitting them to follow their
utilization continuously through the SM application.

Figure 6.Target archite cture (Enidis, 2019)


47
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

5.2.4 Forecasting Result: We used the Kaggle dataset (Rob Mulla, 2018) with hourly data measurement
frequency and hourly power consumption to experiment with RNN and LSTM prediction methods. From
2004-10-01 to 2018-08-03, 10 years MW power consumption data were collected. Data from Dayton Power
and Light Company (DPLC) consists of a dataset containing 121271 raw data points. The visualization of
this data set can be seen in the table below.
Datetime DAYTON_MW
0 2005-12-3101:00:00 9389.0
1 2005-12-3102:00:00 9070.0
2 2005-12-3103:00:00 9001.0
3 2005-12-3104:00:00 9042.0
4 2005-12-3105:00:00 9132.0
… … …
121268 2018-08-0222:00 :00 2405.0
121269 2018-08-0223:00 :00 2250.0
121270 2018-08-0200:00 :00 2024.0
Table 2.data set table
Prior to introducing the outcomes, we will momentarily present the methodology of RNN and LSTM, a sort of
counterfeit brain network created to recognize designs in information successions like scalar time series
information from sensors, monetary business sectors, and so forth.The public authority does likewise (yet
including text, penmanship and expressed word). As opposed to other brain organizations, RNN and LSTM
networks have a period division that isolates them from others (AI Wiki, 2019).
Recurrent Neural Network: It is an ever-evolving brain network with standardized inside memory. RNNs are
specific subsets of brain networks that are worked to function admirably with the information gave in the
consecutive request. Instances of this sort of information are text records that can be seen as a rundown of
words or sound documents and saw as a progression of sound frequencies after some time.This is rehashed in
light of the fact that it carries out similar role for every information passage, yet the ongoing outcome depends
on the result of the past computation. In settling on a choice, it considers both the ongoing information and the
consequence of the past data sources

Figure 7. RNN with input X and output Y with multiplerecurrentsteps andahiddenunit


Long Short-Term Memory: Streamlined RNNs, like LSTMs, are made to work with the catch of long haul
connections across information arrangements. Momentary memory influences the enactment of a secret state in
the typical RNN, while long haul memory influences the heaviness of the organization, which is the
consequence of long haul computations known as long haul memory. Thus, RNN has been upgraded to
incorporate enactment expresses that go about as loads and store data over significant distances and have been
nicknamed for long haul memory (Nagesh Singh Chauhan, 2019).

Fig 8. thenet work architectureofLSTM


48
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

We use RNN and LSTM for assessment. To make a brain organization and execute RNN with LSTM utilizing
TensorFlow, we use Keras, an undeniable level brain network API written in Python and equipped for running
on Tensorflow2.The three-layer profound model (RNN or LSTM) is utilized, each with a tanh initiation work,
40 blocks and a succession length of 20. A thick layer follows the third layer. Utilizing the typical square
blunder (MSE) misfortune capacity and 1000 cluster size, we fit the model into 10 periods.It is obvious from the
diagram that the appraisals are firmly matched to the genuine outcomes, which shows that the RNN model
works astoundingly in assessing the succession.
The assurance coefficient, called R2 or r2, is a proportion of the exactness of direct relapse expectation.
Altogether:

(1)

Where n = number of measurements yi = measurement value n˚ i


ŷ = relative estimated value = average of measurementsThe R² score for the trained Simple RNN model is
0.9541.

Figure 9.Prediction by RNN


The trained LSTM model R2 estimates values with a score of 0.9553, which is very close to the actual value of
the prediction function.

Figure10. Prediction byLSTM

49
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Figure 11 shows a comparison of the estimates made by the basic RNN and LSTM models using the data shown
in a single graph for greater resolution.

Figure 11.Predictions comparison for better accuracy we can add other input parameters such as weather, solar
radiation, prices and other information.
6. CONCLUSION
The ML, IoT and SG brilliant frameworks cooperate to guarantee a two-way transmission of electrical energy
and dynamic correspondence between all partners on the network, so this part is vital To additionally work with
our review, we have planned a straightforward model of the Internet of Things, containing five layers of
electrical data, correspondences, and man-made reasoning. These layers are coordinated into three elements
(Internet of Things, Smart Grid and Machine Learning) and connected through four connections
(Sensing/Operation/Training/Forecasting).Utilizing the RNN-LSTM approach, we had the option to precisely
gauge short-range electrical power utilization north of a ten-year time span. The benefits of this strategy for
reviewing past states are especially clear and we had the option to test it on genuine informational index with
hour recurrence.Extra information highlights, like climate and other important information, as well as blended
techniques that have been demonstrated to be valuable in a new report, may assist us with further developing
expectations in future work. We support exploration to normalize correspondence and media conventions and
foster answers for improve handling power so that results can be utilized progressively to help with settling on
choices for better execution and dependability.
7. REFERENCES
 Ralph E.H. Simsa, Hans-Holger Rognerb, Ken Gregory Carbonemission and mitigation cost comparisons
between fossil fuel, nuclear and renewable energy resources for electricity generation, Energy Policy31
(2003)1315–1326.
 DecebalConstantinMocanu,ElenaMocanu,PhuongH.Nguyen,MadeleineGibescuandAntonio2016:LiottaDepa
rtment of Electrical Engineering, Eindhoven University of Technology, 5600 MB Eindhoven, The
NetherlandsBig IoTdata mining for real-time energy disaggregation in buildings. 2016 IEEE International
Conference on Systems, Man, and Cybernetics• SMC2016|October 9-12, 2016• Budapest,
 Mocanu, E.;Nguyen,P.H.;Gibescu,M.;Kling,W.L.Deeplearning for estimating building energy consumption.
Sustain.EnergyGrids Netw. 2016,6,91–99.
 SalahBouktif,AliFiaz,AliOuniIDandMohamedAdelSerhani,OptimalDeepLearningLSTMModelforElectricL
oadForecastingusingFeatureSelectionandGeneticAlgorithm: Comparison with Machine Learning
Approaches, 22June2018.
 Hyndman, R.J, Shu, F. Density forecasting for long-term peakelectricity demand. IEEE Trans. Power Syst.
2010, 25, 1142 –1153.
 Lin,T.,Horne,B.,Tino,P.,&Giles,“Learninglong-term dependencies in NARX recurrent neural
networks,”IEEETransactionson Neural Networks,1996,7(6),1329–1338.
 Gers, F. A., Schmidhuber, J., & Cummins, “Learning to forget:continual prediction with LSTM,” Neural
Computation, October2000,p.2451-2471.

50
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Yi-Ting Tsai, Yu-Ren, Zeng, Yue-Shan Chang, Air pollutionforecasting using RNN with LSTM, 2018
IEEE 16th Int. Conf.OnDependable, Autonomic & Secure Comp., 16th Int. Conf.On Pervasive Intelligence
& Comp., 4th Int. Conf. On Big DataIntelligence&Comp.,and3rdCyber Sci.&Tech.Cong.
 FOUAD Mountassir, MALI Reda, PR. BOUSMAH Mohamed,Labo LTI ENSAJ, Machine Learning for
Forecasting BuildingSystemEnergy Consumption,EMENA-ISTL 2019.Learningand Analytics in Intelligent
Systems, vol 7. Springer, Cham, December 2019
 Cynthia Rudin; David Waltz; Roger N. Anderson; Albert Boulanger; Ansaf Salleb-Aouissi; Maggie Chow,
Machine Learning for the New York City Power Grid, IEEE, 19 May2011.
 B.Heile,“Smartgridsforgreencommunications[industryperspectives],” IEEE Wireless Communications, vol.
17, no. 3,pp.4–6, June2010.
 K. H. Chang, “Interoperable NAN standards: a path to cost- effective smart grid solutions, ”IEEE Wireless
Communications, vol.20,no.3,pp.4–5, June2013.
 M.Bae, H.Kim, E.Kim, A.Y.Chung, H.Kim, J.H.Roh, toward electricity retail competition: Survey and case
study ontechnical infrastructure for advanced electricity market system, Applied Energy. 133 (2014) 252
273. doi:10.1016 /j. apenergy.2014.07.044.
 R.K. Jain, K.M. Smith, P.J. Culligan, J.E. Taylor, Forecastingenergy consumption of multi-family
residential buildings usingsupport vector regression: Investigating the impact of tempor a land spatial
monitoring granularity on performance accuracy, Applied Energy.123(2014)168–
178.doi:10.1016/j.apenergy.2014.02.057.

AUTHOR DETAILS:

ASTHA SINGH KUSHWAHA1, DR. MAHAVEER SINGH NARUKA2 AND E. R. PARITOSH


TRIPATHI3
1
Research Scholar, Department of ECE, MUIT, Lucknow
2
Professor, G L Bajaj Institute of Technology & Management, Greater Noida
3
Assistant Professor, IET, Dr. RML Avadh University, Ayodhya

51
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

LIC’s IPO: AN EMPIRICAL STUDY

DR. ANAND KUMAR, PROF. SOMESH KUMAR SHUKLA AND DR. PRASHANT SINGH

ABSTRACT
A big number of investors have created new De-mat accounts specifically for the Life Insurance Corporation
(LIC) of India's initial public offering (IPO), which is scheduled to begin trading on May 17, 2022. Since March
2020, there has also been a tremendous rush of new investors into the equities market.
All of these investors are presently dealing with their first protracted market drop. No listing advantage? The
listing of any public sector firm raises concerns about it shifting its focus to only suit the profitability demands
of investors. The large number of claims handled by LIC during the COVID-19 epidemic exemplifies its public-
good efforts. The cliams grew by 37% year on year to around Rs 23,927 crore in the fiscal year 2021. LIC has
the highest premium collection at more over Rs 4,032 billion (about Rs 4.03 lakh crore), whereas SBI Life has a
significantly lesser collection of Rs 502 billion (about Rs 50,200 crore).
In present study I try to understand insurance market and LIC strong presence in Indian insurance market on
the basis of LIC fundamental variable I try to make predication on LIC IPO investor what to do IN market and
this study shows all the related data od LIC IPO.
Keyword-LIC, IPO, INSURANCE INDUSTRY, NBP

INTRODUCTION
LIC is an abbreviation for Life Insurance Corporation of India. It began operations as a corporate entity in
September 1956, after the passage of the Life Insurance of India Act by India's Parliament in June 1956. The
LIC Act became effective in July 1956. It aided in the nationalisation of India's private insurance business. The
LIC of India was founded via the merger of 154 life insurance firms, 16 foreign businesses, and 75 provident
funds. It is one among India's major financial organisations. Its asset worth exceeds 2,529,390 crores. The LIC's
headquarters are in Mumbai, Maharashtra.
The Life Insurance Organization of India (LIC) is the country's largest govt life insurance and investment
corporation. The primary function of LIC is to invest in global stock markets and various government assets.
According to one of the requirements, at least 75% of the funds raised must be placed in State and Central
Government securities.
Lic's Primary Functions are As Follows:
 Collect and encourage savings in the country by collecting people's savings in return for an insurance
coverage.
 People's capital can be safeguarded by investing in government securities.
 Provide insurance at reasonable prices.
 At fair interest rates, provide different loans such as direct loans to industries, housing loans, and loans to
various national initiatives.
LIC'S OBJECTIVES
 LIC strives to raise awareness about the necessity of life insurance among persons living in rural regions
and those from socially and economically disadvantaged backgrounds.
 It strives to address the community's various life insurance demands, which are susceptible to change as the
social and economic environment changes.
 It seeks to do business in an efficient manner while keeping in mind that the money belongs to the
policyholders.
 Through appealing insurance-linked savings, it strives to enhance the mobility of people's funds.
 It seeks to provide the highest level of job satisfaction to all of the corporation's agents and employees, as
well as to foster the development of a collaborative work environment in order to provide efficient service
with civility to its insured public.
52
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

LIC IPO
As of December 31, 2021, Life Insurance Corporation (LIC) has a 61.6 percent market share in terms of
premiums (or GWP) and a 71.8 percent market
 With AUM of 40.1 lakh crore as of December 31, 2021, LIC is India's largest asset manager. (FY21 annual
premium of | 4.0 lakh crore) .
 Individual products offered by LIC include I par and (ii) non-par products such as savings, term, health,
Ulip, and annuity and pension products.
 The combination of favourable demographic tailwinds backing India's economic narrative and low
penetration in life insurance. Life insurers' GWP is expected to expand at a 14-15 percent CAGR in FY21-
26, reaching | 12.4 lakh crore.
 Market dominance (61.6% share), with a cross-cyclical product mix dominated by participating items.
Increase the participation of non-participating items to further diversify the product mix.
 As of December 31, 2021, the company's presence in India is supported by an omni-channel distribution
network and an unrivalled agency team that sources 96% of new premium. With 2,048 branch offices and
1,559 satellite offices covering 91 percent of India's districts, we have a strong geographical presence across
the country.
 India's largest asset manager, having a proven track record of financial performance and profitable
development.

Market Share of LIC

Industry Overview
According to Swiss Re, India is the tenth biggest life insurance market in the world and the fifth largest in Asia
in terms of premiums. Based on total premium, the Indian life insurance business was worth | 6.2 lakh crore in
FY21, up from | 5.7 lakh crore in FY20. In the five years ending in FY21, the industry's total premium increased
at an 11 percent CAGR. In FY16-21, new business premiums (NBP) increased at a 15% CAGR to | 2.78 lakh
crore. The industry's NBP increased by 7.5 percent in FY21, despite the impact of the Covid- 19 epidemic.
Within NBP, group business premium increased at a 15.4 percent CAGR from FY16 to FY21, while individual
premium increased at a 14 percent CAGR over the same time.
53
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Types of Life Insurance Product

In FY16-21, life insurance premiums increased at an 11 percent CAGR. Premium growth in the double digits
may be linked to distribution network development, the implementation of various government initiatives, and
the financial inclusion drive.

In the last five years, new business premiums have increased at a CAGR of 15%, while LIC and private insurers
have grown at a CAGR of 14% and 18%, respectively. In FY21, despite the Covid19 pandemic, NBP increased
by 7% year on year, showing the impact of the economic slump. NBP growth in the industry remained moderate
in 9MFY22, at 7.4 percent.
The Indian Market is Still Under-Insured
In CY20, India's life insurance penetration was 3.2 percent, compared to the global average of 3.3 percent. In
CY20, life insurance penetration in Thailand, South Korea, and Singapore was 3.4 percent, 6.4 percent, and 7.6
percent, respectively. The Indian industry's penetration is not similar to that of industrialised economies such as
the United States and Australia, where mandated pension contributions are not included in the insurance pie.
Life Insurance Industry Density (Premium Per Capita in US$)

54
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Life Insurance Industry Penetration (As of CY20)

Furthermore, Crisil Research predicts that the real protection offered by insurance in India would be
substantially lower than in other developing countries due to the larger percentage of savings than protection in
life insurance premiums. Insurance density in India remained quite low in CY20, at $59, as compared to other
established and emerging market nations.
Indian Life Insurance Industry Trends
Life Insurance Coverage Has Grown Significantly.
For FY21, the total sum guaranteed under the individual life insurance industry in India was | 170.5 lakh crore,
or 89 percent of India's GDP. Individual insurance amount guaranteed has risen at a 15.7 percent CAGR from
FY16 to FY20. In FY21, the total number of individual policies in force was 33.2 crore, with 2.8 crore
individual new policies issued.
Industry’s Product Mix Based on Premium

Non-linked product mix based on total premium

55
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The Banca Channel is Gaining Popularity, but the Agency Remains Dominating.
From FY18 onwards, life insurance companies have heavily relied on banking channels to sell their policies.
This steadily increased the role of the bancassurance channel while decreasing the role of individual agents in
the marketing of individual life insurance products. In the individual business, the share of the bancassurance
channel increased from 23.8 percent of NBP in FY16 to 29 percent of NBP in FY21, driven mostly by private
players that either have large holdings from banks or have empanelled banks as their corporate agents.
Individual agents, on the other hand, continue to account for up to 58 percent of individual life insurance
premiums in FY21, owing to the personal connection they may build with consumers. They can assist these
consumers by explaining the different benefits of the policies and the distinctions between various products, as
well as providing advise on the selection of the product based on the customer's needs, premium reminders, and
assistance with cheque collection, among other things.
NBP by Industry Distribution Channels (Individual Life)

NBP by Distribution Channels for Industry (Group Life)

LIC Dominant in Group Insurance with ~80% Market Share


In terms of segments, group NBP's proportion of total NBP has risen from 58 percent in FY16 to 60 percent in
December 31, 2021. With a 78 percent market share in FY21, LIC maintains its dominance in the group NBP
category. Private businesses, on the other hand, have raised their market share in individual NBP from 44
percent in FY16 to 50 percent in FY21 and 57 percent by December 31, 2021.
Group NBP Accounts for ~60% Share for FY21

56
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Market Share of Private Players vs. LIC (Group - NBP)

Market Share of Private Players vs. LIC (Individual – NBP)

The Industry's Operating Expenses are decreasing; LIC Has the Lowest Cost Ratios.
Because LIC is an established firm, its expenditure ratio is significantly lower than that of private businesses.
Private firms in the sector are also seeing lower operational expenses as a result of increased reliance on
technology and fintech partnerships for many activities.
Operating Expense Ratio (As % of Total Premium)

Significant Decrease in Overall Cost Ratio as A Proportion of New Business Premium


Overall cost is steadily dropping across the sector as a result of consolidation, branch development, and other
cost rationalisation. However, due to high expense and commission costs in relation to business, private players'
total cost ratio has remained high when compared to LIC.

57
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Total Cost Ratio (As Percentage of Total Premium)

LIC’s Plan Includes:


1. Increasing the bancassurance channel's market share by partnering with additional banks and enhancing their
efficiency by providing digital solutions for onboarding clients for their products.
2. Increasing direct sales of their individual items on their website through increased promotion of their
corporation's website and the addition of new products for sale on their website.
3. Increasing the percentage of non-participating goods by focusing more on Ulip, protection products,
pension/annuity products, and health insurance sales.
4. Increasing the number of millennial agents in response to shifting demographic patterns
5. Increased upselling and cross-selling to individual customers and group product beneficiaries to meet their
diverse financial demands.
RISKS AND CONCERNS
The Ongoing Epidemic May Have A Negative Impact on Many Elements of Business.
On March 11, 2020, the World Health Organization (WHO) proclaimed the Covid-19 outbreak a worldwide
pandemic. The government imposed a countrywide lockdown, which slowed corporate operations. Lockdowns
hampered LIC's and its distribution partners' capacity to distribute goods. Furthermore, during the epidemic,
LIC's insurance claims by death rose. Insurance claims by death in benefits paid (net) for FY19, FY20, FY21,
and 9MFY22 were | 16963.7 crore, | 17341.8 crore, | 23483.3 crore, and | 29310.7 crore, respectively. The
amount to which the pandemic will continue to have an impact on business, financial position, and operating
performance in the future will be determined by future events, which are very unknown.
A Negative Variance in Persistence May Have an Influence on Financial Status.
Maintaining high persistency ratios is critical for operating outcomes since a big block of in-force policies
delivers consistent revenue in the form of renewal premiums. In the worst case situation when a high number of
customers surrender their policies, resulting in payouts surpassing cash flows, LIC may be forced to sell
investment assets, perhaps at unfavourable prices, in order to make big surrender payments. Some investment
assets, such as held-tomaturity debt instruments and private equity investments, have little liquidity, and LIC
may be obliged to sell such investment assets at below market value to satisfy relinquished payments, which
might considerably and negatively impair financial situation.
Interest Rate Swings May Have a Negative Impact on Profitability
Depending on the structure of the asset and liabilities portfolio, changes in interest might have a significant
impact on operating performance. Matching the duration of assets to the duration of obligations decreases
exposure to interest rate fluctuations since the effects of the changes may be mitigated against each other.
Actual investment returns that are lower than those expected may result in losses on non-participating items and
future price increases on non-participating products, which may cause new business to drop.
Estimates for Embedded Value Computations May Vary Significantly If Critical Assumptions Change.
While LIC acquired the study from an independent actuary, the estimates utilised in such embedded value
studies might vary considerably if key assumptions are modified or if LIC's experience differs from the
assumptions used to calculate their Indian embedded value. The computation of the numbers must incorporate
58
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

several assumptions and estimations, many of which are outside the control of the author. Despite taking
precautions to ensure that models are adequate, there is a chance that the model used to generate Indian
embedded value may not be appropriate.
Business Competition May Be Significantly Impacted.
LIC is India's sole public sector life insurance business, and its main competitors are private life insurance
firms. Private sector insurance businesses have outpaced LIC in terms of growth and market share. In terms of
total premium, LIC had a market share of 66.4 percent in FY19, 66.2 percent in FY20, 64.1 percent in FY21,
and 61.6 percent in the nine months ending December 31, 2021, respectively. As a result, there is no guarantee
that LIC would not lose further market share.
Impact of LIC IPO on Stakeholder
The government has fixed the price range for Life Insurance Corporation of India's (LIC) first public offering
(IPO) at Rs 902-949 per share. It is providing policyholders with a Rs 60 discount. Retail investors and LIC
workers, on the other hand, may receive a Rs 45 discount on subscribing to the shares.
Following the IPO, the percentage of investment surpluses accruing to participating policyholders will
progressively decrease to 90% by the fiscal year 2025. Shareholders will get the remaining 10% of the surplus
earned by deploying funds from non-participating policyholders, such as those who purchase term protection.
Prior until recently, participating policyholders received 95 percent of all surpluses.
According to the IPO prospectus, the rebalancing will put LIC in line with its private-sector competitors, but it
may also "lower the attractiveness of our participating products, which might have an unfavourable effect on
our business, financial condition, operating performance, and cash flows."
The most recent modifications to the LIC Act have cut policyholders' minimum share of the corporation's
income from 95% to 90%. The commission claims that this is an indication of how policyholders will be
handled in the coming years, and that they stand to lose even more as a result of the disinvestment.
"95 percent of LIC's profits are returned to policyholders." They have funded LIC's extraordinary expansion
throughout the years. LIC and its policyholders enjoy a mutually beneficial relationship, with each having a
large interest in the other. In the usual sequence of events, they should be essential in deciding the trajectory of
LIC's future expansion."
The government has often said that disinvesting in LIC will help it increase its profitability and efficiency.
According to the commission, this is a flawed argument because the effectiveness of a life insurance firm is
judged by claim settlement performance.
"By this standard, the LIC is not only superior to its private counterparts, but also among the finest in the
world." For the record, the LIC has settled almost 99 percent of all claims. The fact that LIC's claim rejection
rate is considerably lower than that of its private sector competitors demonstrates that it does not require private
engagement to improve its performance."
IRDAI data confirms that LIC's operational expenditures are lower than those of private insurers. According to
the regulator's annual report for 2020-2021, LIC's operating expenditures are 8.68 percent of total premium
income, while private sector life insurers' operating expenses are a disturbing 11.72 percent.
CONCLUSION
There may be some retail selling today owing to current market emotions, but the long-term fundamentals of
LIC remain intact.
Equities in the insurance industry, as well as other beaten down stocks in the Banking/NBFC area, may see
excellent momentum after the dust settles on the market owing to the lingering challenges relating to the
Ukraine-Russia crisis and inflation concerns.
In the short to medium term, LIC is a good investment opportunity because to its strong market position,
improved future profitability due to improvements in excess distribution criteria, and strong industry
development forecast.
I believe LIC will continue to be a good long-term investment since it is a play on the growth narrative of the
under-penetrated life insurance sector. Its prolonged market leadership position, powerful pan-India distribution
network, and trend toward lucrative products, which supports margins and improves persistency ratios, will
make LIC an appealing long-term investment.

59
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Investors should not look to exit at present prices and should instead keep the stock for the medium to long
term. Investors should hang on to their shares since the stock will rise in the long run.
REFERENCE
 D’Arcy, S. P., & Oh, P. (1997). The Cascade Effect in Insurance Pricing. The Journal of Risk and
Insurance, 64(3), 465. https://doi.org/10.2307/253760
 Hamid Rahman and Kenneth Yung (1999), Insurance IPOs- A Test of the underpricing, theories journal of
insurance issues, 22, 1, pp 61-77
 KulkanyaNapompech(2002) “Financial performance of insurance companiesfollowing
initialpublicofferings”dissertastion,692:http://ditigalcommons.latech.edu/dissertations/62
 Richard B Carter, Mark L Power(2012) Reputational Signals and Capital Acquisition when Insurance
companies Go Public, The Geneva Papers on Risk and Insurance- Issues and Practice, volume 27, Issues
3, pp 485-508
 Richard B Carter,Mark L Power(2012) Reputational Signals and Capital Acquisition When Insurance
Companies Go Public,The Geneva Papers on Risk and Insurance - Issues and PracticeJuly 2012, Volume
37, Issue 3, pp 485–508
 TIPURI, D., HRUKA, D., & KRITO, J. (2008). Privatization Process in Croatia - Case Study Of Croatia
Insurance Company. International Journal of Management Cases, 10(2), 60–67.
https://doi.org/10.5848/apbj.2008.00017
 Wang, Q., &Ligon, J. A. (2009). The Underpricing of Insurance IPOs. Financial Management, 38(2), 301–
322. https://doi.org/10.1111/j.1755-053x.2009.01037.x
BOOKS
o Risk and Insurance Management, R k Gupta, Himalaya publishing House
o Investment Management, V A Avadhani , Himalaya publishing House
 Investment Analysis and Portfolio management, Prasanna Chandra, 3 rd edition, Tata McGraw – Hill
education Private limited
PAPERS
 Business line
 Economic Times
 Google search
 Union Budget 2020-21

AUTHOR DETAILS:
1
DR. ANAND KUMAR, 2PROF. SOMESH KUMAR SHUKLA AND 3DR. PRASHANT SINGH
1
Assistant Professor, IISE College, Lucknow,
2
Professor and 3Assistant Professor, Department of Commerce, University of Lucknow

60
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

CHILD PORNOGRAPHY LAWS IN INDIA: A CRITICAL STUDY

MONALIKA SINGH MAHESHWARI AND UJJWAL KUMAR SINGH

ABSTRACT
Due to the sheer way society standards are evolving, it is critical to protect youngsters. Given that youngsters
cannot discern the difference between the wrong and correct route on their own, contemporary technology has
the potential to trap them in something severe and irreversible. Because a kid is vulnerable, he might suffer
severe emotional and physical suffering if he is subjected to child abuse. Child sexual abuse is a worldwide
disease, and no one country can be held solely responsible for its fast spread. Child pornography is a nasty kind
of child maltreatment that seeks to hurt youngsters in every way imaginable. The pain of this heinous act has
deepened its roots, and it is critical to treat the issue properly. The criminal justice systems, which seem to be
robust on the outside, provide insignificant outcomes owing to interpretation flaws and inconsistencies with
parallel enactments. The purpose of this article is to define the subject of child pornography and to examine its
situation in India.
Keywords: Pornography, Child, Pedophile, IT Act, POCSO

INTRODUCTION
Human activities have grown increasingly reliant on technology, especially information technology, in the
digital era. Instant access and information sharing across national and geographic barriers are now possible
because to the Internet and its network of computer networks. A virtual environment in which electronic
transactions and interactions take place is known as cyberspace. Cyberspace is intangible in scope and fast
rising in size, richness, and political relevance, in addition to being intangible and borderless.1
This 'virtual world' has allowed individuals to connect with one another while also making it easy to share
information, ideas, and data. In the present digital era, people are increasingly impacted and reliant on the
Internet for entertainment, communication through emails, instant messaging, video chats, mail and voice
messages, business transactions, banking, and so on.2
Cyberspace's anonymity, on the other hand, may be hijacked, misused, and abused by criminals to carry out
illegal and fraudulent activities. This subset of electronic crimes, especially those perpetrated in cyberspace, has
given birth to a new sort of crime known as cybercrime.
Among the various cybercrimes that are facilitated, planned, and choreographed inside cyberspace, cyber child
pornography, also known as child sexual abuse material, has grown in popularity in recent years as a
consequence of the Internet's pervasiveness (CSAM).
Child pornography is a severe issue that is surfacing in the community, posing a significant risk to society's most
vulnerable members, notably children. The Internet's tremendous growth and development has had both positive
and negative implications for young people. Without aquestion, the Internet has enabled new study patterns and
"day to day" learning sessions that have improved the educational system both intellectually and
psychologically, but it has also shown a dark and evil side that cannot be spoken. Child abuse is a blanket term
that refers to a wide range of crimes done against children. Examples include child trafficking, prostitution,
abduction, and other crimes. It is critical to emphasize that no country is immune from this threat, and that
everyone must be vigilant at all times. Child pornography is often seen as the most heinous form of abuse. This
is due to the fact that it not only physically but also mentally damages the young guy. Pornography has always
been a contentious topic, both in terms of its ethics and wickedness, as well as its existence since it involves
adults. When juveniles are engaged in such a situation, it is almost always deemed unlawful, as it is in most
nations.
DEFINING CHILD PORNOGRAPHY
The Optional Protocol to the Convention on the Rights of the Child defines child pornography as “any
representation, by whatever means, of a child engaged in real or simulated explicit sexual activities or any
representation of the sexual parts of a child for primarily sexual purposes.”3
Child pornography involves a child and pedophile, as mentioned in the definition. “A pedophile, in most cases is
a male (and some, a female) who imposes his/her sexual desires onto achild. Pedophilia is common term used to

61
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

express a sexual preference which greatly covers fantasizing sexual activities with children. Such an occurrence
is a direct denial of a healthy sexualrelationship which reflects when it occurs between two adults”.
According to Article 9 of the Cyber Crime Convention, 2001, child pornography is defined as “pornographic
material that visually depicts: a minor engaged in sexually explicit conduct and a person appearing to be a minor
engaged in sexually explicit conduct.” Children are very delicate and vulnerable on intellectual front and it is
arduous for them to step back from the negative constituents of the modish technological era. Social media is
the catchiest platform wherein children tend to fall prey to or get in touch with people who look for minors to
fulfill their sexual pleasures. This makes it easier for the pedophile(s) to target innocent children and brainwash
them,which leads to heinous crimes like child pornography and trafficking.4
As per section 2(da) of the Protection of Children from Sexual Offences Act, 2012, “child pornography is any
kind of visual display of overt sexual activity that engages a child. Such content may be an image, a video or any
computer-generated picture which cannot easily be differentiated from a real child. It includes all those images
which shows a child to be involved in such activitieswhether it is created, adapted or modified”.5
Perils of Child Pornography
Child pornography primarily involves recording the sexual abuse of a child in the form of a photograph, film,
video or an audio clip. It also includes computer-generated images, pictures or animations depicting children
engaging in sexually explicit acts. The Internet served as a potent tool that enhanced the demand for CSAM.
The sexual abuse and exploitation of a child is undoubtedly a human right violation of that child and the Internet
has expanded and diversified the scope of offences associated with child pornography.
Every image, picture or video clip depicting a child in sexual overtones amounts to blatant violation of his or her
basic human rights. Moreover, given the character of cyberspace, any content that is published or uploaded on
the Internet remains within the virtual space till perpetuity.
Multiple copies are generated which are freely accessed by users thereby making it a near- impossible task to
erase or obliterate inappropriate material and its copies that are available on theInternet.
Thus, a material depicting the sexual abuse of a child can persist online forever, which can be viewed, accessed,
downloaded and possessed repeatedly by perpetrators for sexual gratification, the world over given the borderless
nature of the Internet. Therefore, the online protection of children is an important aspect, which needs to be
emphasized to safeguard and protect children from being victimized through information and communication
technology (ICT) facilitated sexual offences.6
Meaning and Scope of Child Pornography
One of the most depraved and corrupt forms of obscenity is that of children being depicted in sexually explicit
acts. With the advent of the Internet and advancements in new technologies, the landscape of child pornography
has changed considerably. Prior to the Internet, individuals who wished to view child sexual abuse material,
would need to actively seek out for it, have it delivered to their house and the format in which child
pornographic content was available was mostly through magazines, videos cassettes/CDs, and photographs.7
But in present times, computers and the Internet play a predominant role in the distributionof such material. Now,
it is possible to upload material onto data medium through videotapes, CD- ROMs, DVDs, external hard disk
drives and USB sticks. With the emergence of these data carriers, it has become easier to spread pornographic
material, because one simply needs to connect it to a computer, upload the material and disseminate and spread
the content using the Internet, in complete anonymity.
“The explicit representation or exposition of sexual themes or behaviors in literature, art, cinema, etc. in a way
calculated to excite sensuous rather than artistic impulses,” according to the Oxford Dictionary. Child
pornographic material, including real and computer-generated images or photos of children under the age of
eighteen engaged in actual or simulated sexual behavior, physically or graphically shows minors.8
The impact and role that the Internet has had and continues to have in the production, dissemination, and
collection of child pornographic material are tremendous. Child pornography is relatively new as opposed to
child abuse, which has existed since time immemorial, like any other crime. However, child pornography is
often regarded as a subset or a manifestation of childabuse.9
Child pornography involves visualizing images, pictures or video clips of children engaging in sexually explicit
acts and lewd activities, where the child may not be hurt physically but immense psychological, emotional and
reputational damage may be caused to the child in theprocess.

62
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

There are some who opine that “child pornography is comparatively worse” and it “poses an even greater threat
to the child victim than does sexual abuse or prostitution”. The possession and viewing of child pornography also
tantamount to an offence and was constitutionally forbiddenand outlawed.
Moreover, child abuse takes place in secrecy and this gives an opportunity to the predator to continue with the
abuse and in the process also manipulate the victim to keep the abuse a secret. This results in the continuation of
such activity and the child being victimized repeatedly. It is this nature of secrecy of child abuse that not only
makes its detection difficult but also punishing the perpetrator an equally arduous task.
By growing and multiplying the quantity of information available, enhancing the efficiency of its transmission,
and making it more accessible, the Internet has increased occurrences of child pornography, as well as other
cybercrimes. The following are the key reasons behind this:
 the vast global accessibility to child porn material;
 the instant availability of material;
 the anonymity of child porn offender;
 high digital quality images which are easy to store;
 there are a variety of formats like pictures, videos, and sound;
 there is also a potential for “real-time and interactive experiences”;
 composite or virtual images can be created by modifying digital images (morphing)
Therefore, child pornography poses serious concerns within cyberspace and to the societyat large.10
Child Pornography: the Indian Scenario
India is known to be one of the largest contributors and consumers of child pornography despite a ban being
imposed by the government on sites feeding such content. It is deduced that the situation is alarming as
shockingly, almost 35-38 percent of the total pornographic content uploaded online pertains to children. Child
pornography is a crime under two pronouncedlegislations, Information Technology Act, 2000 (ITA) and Indian
Penal Code, 1860 (IPC). The Information Technology Bill passed in February 2009 made production, creation
and transmissionof child pornography illegal and a punishable offence. A striking feature of the bill is that along
with other attributes, it makes browsing illicit content pertaining to a child, illegal and prescribed punishment for
the first-time offender in such a case can attract five-year sentence as well as a huge fine of Rs. 10 Lakh. The
ITA's Section 67B specifically targets child pornography. According to this clause, it is illegal to show a kid
engaging in sexual activity, upload digital text or photographs, sell or promote any material that depicts children
in an obscene or indecent way, or encourage minors to participate in an online relationship with one or more
children. Although the selling of obscene content to minors is illegal, the Indian Penal Code does not directly
regulate obscenity on the Internet. Furthermore, the rationale underpinning Section 292 is what led to an
amendment to the ITA in 2008 that prohibited "obscenity on the Internet and in electronic form." Another solid
and well-thought-out piece of legislation is the Children's Sexual Offenses Protection Act 2012 (POSCO),
which explicitly includes the protection of children from sexual abuse and pornographic offenses in its
prologue. It also creates Special Courts for such cases and provides the state the power to impose stringent
regulations that impact children. POSCO Chapter
III deals explicitly with the use of a minor for pornographic purposes and the consequences. The possession of
illicit sexual materials pertaining to a child, as well as the storage of pornographic material involving a minor,
are both banned under Section 15 of the same statute. It's also worth mentioning that POSCO mandates media
outlets, studios, and photographic facilities to report child pornography situations when they come across it on
the internet. The first Obscenity Test was established in Regina v. Hicklin11. There is a "tendency to deprave
and corrupt those whose minds are open to such immoral impulses and into whose hands such a book may fall,"
accordingto the report. In the matter at hand, Lord Cockburn said that the "danger of obscene literature was that
it imparted concepts of a very unclean and libidinous kind to the minds of the young of either sex, and even to
older individuals." The Supreme Court of India found Cockburn's criteria to be applicable. Obscenity, according
to the Supreme Court, is a distinct trait that varies based on the point of view of different states. Miller v.
California12, for example, established the three-point test in the United States. Firstly, whether the “average
person” applying societal caliber would find the content, as a whole, to be of sexual interest. Secondly, whether
the content suggests or describes, in an evidently offensive manner, sexual material which is expressly denied by
the statelaw. Thirdly, whether content, gravely lacks, literary, artistic, political or scientific value. However, this
63
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

test requires more clarity in the terms of defining “average person”. In an Indian case, it is stated by the
Supreme Court that a prudent or “average” man should take into account, his common sense to judge whether
the content amounts to obscenity. This obviously excludes themind frame possessed by a hypertensive person.13
Child Pornography and the Information Technology Act, 2000
In India, a country with a deep-rooted religious ethos and moral standards, lewd and vulgar human conduct is
looked down upon and disregarded. For the longest time, there was no law, which prescribed a separate
provision to criminalize child pornography, though obscenity was dealt under Section 292 and 293 of the Indian
Penal Code, 1860.14
With technological developments and the ever-increasing boundaries of the Internet, child pornography started
making its way into Indian homes. Therefore, there was a need to curb this menace and the Information
Technology (Amendment) Act, 2008 filled this vacuum existing within the legal framework by inserting
Section 67B15 which differentiates between “mainstream pornography” and “child pornography”. Section 67B
prescribes “punishment for publishing or transmitting material depicting children in sexually explicit acts, etc.
in electronic form.” The section reads as under: “Whoever-
a) publishes or transmits or causes to be published or transmitted material in any electronic form which depicts
children engaged in a sexually explicit act or conduct; or
b) creates text or digital images, collects, seeks, browses, downloads, advertises, promotes, exchanges or
distributes material in any electronic form depicting children in obscene or indecent or sexually explicit
manner; or
c) cultivates, entices or induces children to online relationship with one or more children for and on a sexually
explicit act or in a manner that may offend a reasonable adult on the computerresource; or
d) facilitates abusing children online, or
e) records in any electronic form own abuse or that of others pertaining to sexually explicitact with children,
shall be punished on first conviction with imprisonment of either description for a term which may extend to
five years and with fine which may extend to ten lakh rupees and in the event of a second or subsequent
conviction with imprisonment of either description for a term which may extend to seven years and also with
fine which may extend to ten lakh rupees.”
However, the provision also prescribes certain exceptions, which reads as follows:
“Provided that the provisions of section 67, section 67A and this section does not extend to any book, pamphlet,
paper, writing, drawing, painting representation or figure in electronic form”-
(i) “the publication of which is proved to be justified as being for the public good on the ground that such
book, pamphlet, paper, writing, drawing, painting representation or figure is in the interest of science,
literature, art or learning or other objects of general concern;” or
(ii) “Which is kept or used for bonafide heritage or religious purposes.”16
The aforesaid section is exhaustive in its own right and deals with the offence of child pornography in the
electronic form. It describes what constitutes child pornography. The provision not only makes publication or
transmission but also the creation of, browsing and downloading of child pornographic content, an offence.
Furthermore, the section not only provides grave corporal punishment, but pecuniary punishment is also heavy,
of up to 10 lakhs in both convictions.
Child pornography being different from mainstream pornography is connected with social issues and thus it
receives stringent legal treatment even in countries like the US and the UK. TheInternet has provided pedophiles
and child sexual offenders with an anonymous agency to distribute and circulate child sexual abuse material
(CSAM). Therefore, in addition to legal reforms, other innovative strategies are required to combat online child
pornography.
Furthermore, the insertion of Section 67B to the law book was long overdue, considering India's international
commitments as a signatory to the Convention on the Rights of the Child (CRC) and ratification of the Optional
Protocol on the Sale of Children, Child Prostitution, and Child Pornography. The child pornography provision is
draconian in that it punishes not only the "posting" or "transmission" of pornographic material involving
children, but also its collecting, online watching, downloading, advertising, trade, and distribution.17 Critical
Analysis of Section 67B of the Information Technology Act, 2000
64
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Every crime contains certain basic characteristics, and the existence of these elements mustbe shown in a court of
law in order for the defendant to be found guilty. In criminal law, mental components like as intent, purpose,
mens rea, and knowledge are crucial. The aim or plan to participate in an act that is banned by criminal law and
for which there is no legitimate reason or justification is referred to as "criminal intent." Thus, an act is
considered valuable if it was conceived before it was carried out or if it still exists now.
Any offense requiring proof of intent necessitates the court obtaining factual evidence to demonstrate the
existence of intent. The aim, on the other hand, is often determined from the conduct and its expected
consequences. The burden of proof is on the prosecution to establish criminal intent. "Criminal intent as a
psychological reality must be established even in connection to the crimes allowed for in the Special Laws,
unless specifically ruled out or tacitly ruled out," itwas declared in State of Maharashtra v. MH George18.
The concept of mens rea is well-known in criminal law. It is a concept in English criminallaw that asserts that if
a person's mind is innocent, he or she is not guilty of committing a crime. As a result, the legal maxim actus non
facit reum, nisi mens sit rea states that for a crime to be committed, both the motive and the act must be present.
There must be a guilty mentality before acrime may be committed.
Therefore, the ‘state of mind’ is crucial for proving any crime. If the mental element is proved to be absent for
any conduct that is being alleged as a crime, then the crime is not committed. However, the above maxim
cannot be applied generally to all statutes and thus it is important to understand the object of each Act under
consideration to ascertain how far the intention is present and relates to the offence done.
Therefore, it is in this background that an analysis of Section 67B, which is a penal provision under the IT Act
reveals that the mental element of the intention to commit an offence is completely absent from the said
provision. The provision prescribes acts or conducts the commission of which would amount to the offence of
child pornography, in the electronic form.
However, the lack of mens rea, a crucial component in the commission of any crime, renders the disposition
ineffective and places a greater burden on the acquitted to prove the presence of a guilty mind prior to the
commission of any of the acts listed in the section in order to ensure the accused conviction.
Furthermore, a person must have the intent of accessing and entering a child pornographicwebsite, as well as be
aware of the possibility of discovering such material there. As a result, the intent to commit an offense must be
determined by the character of the activity or if the crime is committed in exchange for a reward.
Section 67B penalizes five types of online child pornography; clauses (a) and (e) are broad,whilst clauses (b), (c),
and (d) are more specific. In all cases of infantile pornography, the of Section 67B (a) considers the use of
electronic resources and communication devices. It is illegal to "publish or transmit" any content that depicts
young people engaging in sexually explicit behavior. This includes content in the form of text, images, audio, and
video snippets. Furthermore, the 'intent' to publish or transmit information that describes minors engaging in
sexually explicit conduct is punishable under the law.
Section 67B (b), considers all cases of child pornography in which a user actively (rather than passively) uses an
information resource and a communication device to "create text or digital images, recompile, search, navigate,
download, publicize, promote, exchange, or distribute any material in any electronic form that represents
children in an obscene manner."
A critical component of 'possession' of sexually abused children's data on a person's computer, external hard
drive, mobile phone, or other communication device is not covered by the scope of this clause. In fact, the lack of
'property' of child sexual abuse material in electronic format excludes a large group of people who, in some other
way, actively participate in the illegal sale ofchild pornography.
Possession of child sexual abuse material is the most common method of disseminating and promoting child
sexual abuse for pornographic purposes. Persons in possession of photographs, films, or audio fragments of
child sexual abuse distribute and publish this content onthe Internet inside the cyberspace, satisfying demand and
encouraging the consumption of child pornography.19
The Indian legislation against child pornography does not include or address " Pseudo- photograph" as is the
case in the United Kingdom's child pornography statutes. In the United Kingdom, the Law of Criminal Justice
and Public Order of 1994 updated the 1978 Law of Child Protection to include and define " Pseudo-
photograph." A pseudo-photo is a picture created by a computer that seems to be a photograph.

65
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The incidence of online grooming of minors for sexual purposes by Internet predators is covered under Section
67B, Clause (c). This is accomplished by encouraging, soliciting, or attempting to persuade a young person
to participate in sexually explicit activities or behaviors through social media websites, gaming websites, and
chat rooms. However, the terms 'cultivar,' 'atraer,' and 'inducir' are not defined in the law, and to reach a decision,
one must examine the factsand circumstances unique to each case. As a consequence, the mental component of a
'culpable mind' is no longer within the scope of the accusation.
Online grooming often entails a person befriending a youngster and creating an emotional tie of trust and
confidence with that child via the use of cyberspace's anonymity. With the goal of sexually abusing the
youngster, the offender misrepresents his or her age and gender (sometimes claiming to be someone of a similar
age group). Grooming of children takes happen online in public chat rooms and on numerous social media
platforms. However, under clause (c) of Section67B, the phrase "grooming" is not used expressly.
Bonafide heritage material or material which is used for religious purposes is also excluded from the scope of
Section 67B. However, screening video graphs and photographs of sexually explicit acts involving children,
making a pornographic video or MMS clips and distributing such material in an electronic form through mobile
phones and other communication devices through Internet all come within the sweep of Section 67B.
But the proviso fails to draw a distinction between Section 67A and Section 67B which deal with two distinct
genres of pornography, i.e., adult and child pornography respectively. Both these forms of pornography
involving different subjects, an adult in one and a minor in the other are judged by different standards of
morality and ethics. Adult pornography, when viewed in private, does not amount to an offence and is protected
by the freedom of expression. However, the depiction of a minor in a sexually explicit act or conduct and
viewing of such material, in any form is considered an offence world over and thus cannot be subjected to any
exception whatsoever.20
Furthermore, despite having a comprehensive legal framework to deal with online obscenity and child
pornography there are some striking deficiencies in the law at hand. The term ‘pornography’ is not defined in
any statute book and this has resulted in unaddressed and ignored issues associated with child pornography, such
as child pornography depicted through animations, morphed images of children depicted in sexually explicit
acts, virtual pornography, poser pornography and crimes against women and children that are perpetuated and
fueled by pornography.
There also appears to be a big lacuna when it comes to ensuring proper psychosocial counselling and
rehabilitation of victims and spreading awareness among children and their parents regarding online child
pornography. The various aspects of pseudo photographs, non- photographic pornographic images of children,
fantasy images, computer-generated images (CGI), Graphics Interchange Format (GIF) and virtual pornography
remain unacknowledged by the legislation.
Therefore, the Information Technology Act, 2000 has not been effective in dealing with child pornography and
crimes associated with pornography like revenge porn, defamation, stalking, sexual harassment, and online
grooming. However, the legislature subsequently incorporated and dealt with these issues under the Protection
of Children from Sexual Offences (POCSO) Act, 2012, which is model legislation enacted to protect children
from sexual offences,viz., sexual assault, sexual harassment, and pornography.
The "storage and retention of information by intermediaries" is likewise permitted under Section 67C. As a
consequence, it makes intermediaries responsible for preserving and maintaining infringing material. As a
consequence, intermediaries play a critical role in the distribution and hosting of child pornography on the
Internet.21 Critical Analysis of Provisions under the POCSO Act, 2012
The POCSO Act deals with the use of kids for pornographic purposes and imposes penalties under Chapter III,
in addition to the substantive provision of Section 67B of the IT Act dealing with online child pornography. It is
against the law to utilize juveniles for pornographic purposes, both online and offline, according to the POCSO
Act.
Section 13 of the POCSO Act prohibits the use of a minor for pornographic purposes. As a consequence, child
pornography is defined as the online representation of a kid for the purpose of sexual enjoyment over the
Internet or via any other electronic means. The 'use' of a child for pornography is defined in this clause to
encompass the sexual exploitation and abuse of a child via the development, preparation, offering, transmission,
publishing, and distribution of child sexual abuse material. Anyone who uses a kid for pornographic purposes
or engages in sexual contact with a minor in any media is in violation of Section 13 of the POCSO Act.
66
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

As a result, anyone who seeks sexual gratification by depicting a child's sexual organs, engages a child in a real
or simulated sexual act, or portrays a child in an indecent or obscene manner in any medium, including
television or commercials, the Internet, or any other electronic medium, is guilty of child pornography. The
crime stated in Section 13 of the POCSO Act is a non-bailable offense for which the punishment is specified in
Section 14 of the Act.22
Section 13 also covers 'simulated sexual conduct with a kid.' This category includes animations, computer-
generated visuals, and fantasy pornography that depicts children doing sexually explicit actions. This aspect of
Internet child pornography is not addressed by Section 67B of the IT Act. Given the rapid advancement of
technology, this new category of computer- generated, virtual, animated, shifting images and video clips should
be brought under the purview of Section 67B of the Information Technology Act, bringing the creators,
producers, and users ofsuch information under the law's jurisdiction.
Section 14 makes it illegal to utilize a kid for pornographic reasons. The article punishes the behavior described
in section 13, namely, anybody who employs a kid for pornographic purposes faces up to 5 years in jail and a
fine, with a second conviction carrying a penalty of up to7 years in prison and a fine.
When a defendant engages in a pornographic act and commits any of the crimes specified in Sections 3
(penetrative sexual assault), 5 (aggravated penetrative sexual assault), 7 (sexual assault), or 9 (aggravated sexual
assault), the accused is punished correspondingly.
A person who sexually abuses a child faces a minimum of 10 years in jail and a maximum of life in prison, as
well as a fine; aggravated penetrative assault faces life in prison and a fee; and aggravated sexual assault faces
life in prison and a fine. A person who sexually assaults a child can be sentenced to a minimum of 8 years in
prison and a fine.
As a consequence, the POCSO Act has clearly categorized the many forms of sexual crimes to which a child who
is recruited or exploited for pornographic purposes may be subjected, and it has established a penalty that is
proportionate with the crime's severity and cruelty.
The IT Act, on the other hand, makes no distinction or definition between the many forms of sexual crimes to
which a child may be subjected when used for pornographic purposes. The ITAct stipulates a wide punishment if
the defendant does any of the conduct described Section 67B(a) to €. Section 14 of the POCSO Act, which
punishes the accused depending on the gravity of the crime committed against a child while personally engaging
in a pornographic act, does not examinethe nature of the violation.23
Section 15 of the POCSO Act makes it illegal to store pornographic material concerning minors. According to
the legislation, "anyone preserves any pornographic material in any fashion that includes a kid for commercial
reasons shall be penalized with imprisonment of any sort, whichmay be extended to three years, or with a fine, or
with both."24
As a consequence, the POCSO Act makes it unlawful to preserve child sexual abuse material in any form,
including offline and internet storage, for commercial purposes. The storage of child pornographic material in
electronic format includes data saved on a computer system, internal or external data storage systems, mobile
phones, and other communication devices.
As a consequence, in order to be convicted of child pornography under Chapter III of the POCSO Act, the
following key aspects of the law must be met:
 Showing a child's sexual organs, utilizing a kid for real or simulated sexual actions, or depicting a child in
an obscene or indecent way for pornographic or sexual entertainment reasons;
 Create and store child pornographic material for commercial or personal benefit;
 The "use" of a child includes the preparation, production, publishing, offering, facilitation, and diffusion of
child sexual abuse material.
The POCSO Act also covers sexual harassment of children. Section 11 sub-sections (iii), (iv), (v), and (vi)
include elements of child pornography. These sections concern the use or threat of utilizing a kid for
pornographic purposes. "When a person displays an item to a child in any form or medium for pornographic
purposes; or regularly or consistently follows, monitors, or contacts a child, either directly or indirectly, by
electronic, digital, or any other means, such personis considered to be sexually harassing a child."

67
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Sexual harassment of a kid occurs when an adult shows a youngster any material with sexual overtones for
pornographic reasons, such as pictures, videos, movies, or audio snippets. When a person follows or observes a
child repeatedly, or tries to communicate with the child through electronic or digital means, such as social
networking sites, public chat rooms, online gaming sites, or mobile phones and other communication devices, it
is likely that the person is planning to sexually harass the child.
If there is a danger of depicting a child in a sexually explicit conduct, a person may be prosecuted under Section
11(v) of the POCSO Conduct states that "Threatens to use, in any formof media, a real or fictitious portrayal of
any portion of the child's body or the child's involvementin a sexual act by electronic, video, digital, or any other
medium".
As a consequence, this clause covers both actual and artificial portrayals of a child engaged in sexually explicit
activity or portions of the child's body, such as computer-generated, animated, or altered pictures of a kid
engaging in sexually explicit behavior or parts of the child's body. As previously stated, Section 67B of the IT
Act does not encompass transformed pictures, fantasy pornography, or computer-generated images of a child
participating in sexually explicit activities.
If a person grooms a minor for pornographic purposes, the provisions of sub-section (vi) apply. As a result,
section 11(vi) deals with the crime of 'online grooming,' which occurs when a juvenile is tempted and
encouraged to participate in sexual discourse and, finally, sexually explicitaction via the Internet.25
According to the provision, "a person is regarded to be sexually harassing a kid when that person entices a child
for pornographic purposes or provides the youngster pleasure with sexual intent." Section 67B(c) of the IT Act
deals with the crime of internet grooming. However, neitherthe IT Act nor the POCSO Act specifically mention
"online grooming." Section 11 violations are easily identifiable and may be bailed out. For violations described
in Section 11 of the POCSO Act, Section 12 allows for a punishment of up to three years in prison and a fine.
As a consequence, the POCSO Act creates a broad legal framework to safeguard kids frompornography and other
types of sexual assault and harassment. At all stages of the legal procedure, the child's best interests are
safeguarded. According to the newspaper, this is accomplished by creating "child-friendly mechanisms to
rapidly report, record evidence, investigate, and prosecute offenses via designated special courts." As a
consequence, the POCSO Act deals with substantive child pornography laws more completely than Section 67B
of the IT Act.26
CONCLUSION AND SUGGESTIONS
The phenomenon of child pornography cannot be studied in isolation and separate from sexual violence and
abuse against children. There is an intricate association between child sexual abuse and exploitation images and
sexual violence against children. Therefore, attempts to combat child pornography should take in to account the
sexual violence to which children are subjected, the manifestations of which are sexual abuse images and
videos. It will not be prudent on the part of the State to protect and safeguard children by an approach that is
repressive and tyrannical.
Protection of children against sexual abuse ought to focus on prevention of offences, expeditious identification
of victims, robust investigation machinery to identify and prosecute the sexual offender and those involved in
the entire chain starting from making child pornography to browsing child pornography content online and also
providing health care and assistance to childvictims. This can be achieved through an interdisciplinary approach
and cooperation between governmental bodies, non-governmental actors and the private sector.
Therefore, in the backdrop of the above discussion following conclusions can be drawn with regard to child
pornography:
 Child pornography is one of the many manifestations of sexual violence against children. Child
pornography always occurs in association with other forms of sexual conduct like human child
trafficking, prostitution or online grooming of children.
Therefore, child sexual abuse material (CSAM) depicts sexual violence against children represented through
images or video clips.
 Children are sexually exploited for commercial purposes and child pornography is one such industry that is
hugely profitable and flourishing commercially owing to the ease of access to such material online facilitated
by the Internet and rapid developments in Information and communication technologies. Therefore,
strategies to combat child pornography should focus on safeguarding and protecting children against
“sexual” violence.
68
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 The technology, perpetrator and victims involved in child pornography differ from case to case. Technology
includes within its scope ICT that facilitates the production, possession and distribution of CSAM online.
However, the perpetrators may form a heterogeneous group wherein some individuals might only indulge in
viewing child pornography while others might themselves sexually abuse children and produce images or
clips of such acts and further distribute and upload such content online for others to view and access.
 The age group of the child victim determines the nature of the material and the circumstances under which it
was produced. Therefore, policies and strategies should take in to account the diversity of child victims,
offenders and child sexual abuse material to effectively tackle child pornography.
 With the advent of the Internet and rapid developments in technology, child pornography predominantly
exists in the digital form. However, sexual violenceagainst children continues to exist in the physical world as
well. The Internet has given a new dimension to sexual violence exhibited against children in the form of
online grooming, child sex tourism, sexting and child pornography that have gained prominence in the past
decade.
 Online sexual offenders and potential victims are also users of the Internet and ICT, which facilitate the
commission of sexual crimes against children. Moreover, for children the cyberspace and the real world are
not separate entities, one is the extension of the other. Therefore, strategies and policies should consider both
the real and the virtual worlds while devising measures to tackle child pornography. However, legal,
research and technical experts should keep abreast of the progress and growth occurringin the digital realm.
 Furthermore, the occurrence of child pornography is not restrained by time or space. Sexual abuse and
exploitation of children have always taken place even when the Internet did not exist. Child sexual abuse
images have been produced and viewed since the time photography has prevailed. However, with
technological developments child sexual abuse material, which existed in the non-electronic form, can now
be made available and viewed online and it can remain in cyberspace indefinitely.
 The cyberspace is an intangible and non-physical space which provides a safe haven to perpetrators who can
initiate contact with potential child victims and upload, browse, access, advertise, trade and download child
sexual abuse images or clips operating fromany part of the world and in different time zones. This reflects the
global nature of theproblem and calls for international efforts and cooperation.
 Lastly, given the global nature of child pornography, it is not possible for lawenforcement alone to effectively
tackle this problem. With technological advancements and easy access to the Internet, there has been a
proliferation in the number of perpetrators and the volume of CSAM available online cannot be tackled alone
by thecriminal law system. The traditional criminal justice system is not well equipped to effectively process
and approach this multifaceted problem.
Therefore, it requires a technologically sophisticated and futuristic approach on part of the law enforcement
agencies and other State actors to combat the menace of child pornography and safeguard children against
sexual abuse and exploitation. Moreover, the legal framework operatingin India is inadequate and not the only
perspective through which sexual violence against children for pornographic purposes and its various
manifestation should be approached.
REFERENCES
1. Gurudev Sahil, “Child Pornography in Cyberspace: An Analysis of the Legal Framework”, 16 JASRAE
1605 (2019).
2. Ethel Quayle, Child Pornography: An Internet Crime 151 (Routledge, Oxfordshire, 1st edn., 2003).
3. Strengthening the Convention on the Rights of the Child: Optional Protocols, available at:
https://www.unicef.org/child-rights-convention/strengthening-convention-optional-protocols (Visited on
March 20, 2022).
4. The Budapest Convention on Cybercrime, 2001, art. 9.
5. The Protection of Children from Sexual Offences Act, 2012 (Act 32 of 2012), s. 2(da).
6. Mark McLelland, “Young people, Online fandom and the Perils of Child Pornography Legislation in
Australia”, 22 IJCS 103 (2019).
7. Parnita Agal, “Child Pornography: A Comparative Analysis”, 8 IJSR 746 (2018).

69
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

8. Oxford University Press, Oxford Advanced Learner's Dictionary 142 (Oxford University Press, Oxford,
10th edn., 2020).
9. The Impact of Child Pornography on Victims, available at: http:// www.foothillscac.org/
uploads/ 9/9/2/1/9921414/the_impact_of_child_ pornography_on_victims.pdf (Visited on March 23, 2022).
10. Supra note 09.
11. (1868) 3 QB 360.
12. 413 US 15 (1973).
13. Child Pornography: A Comparative Analysis, available at: https://www.legalserviceindia.com/legal/article-
986- child-pornography-a-comparative-analysis.html (Visited on March 23, 2022).
14. Pornography As Cyber Crime, available at: https://www.legalserviceindia.com/legal/article-914-
pornography-as- cyber-crime.html (Visited on March 24, 2022).
15. The Information Technology Act, 2000 (Act 21 of 2000), s. 67B.
16. Supra note 15.
17. Yashika Arora, The Dark Side of Cyber Pornography, 4 PA 2 (2018).
18. AIR 1965 SC 722.
19. Aishwarya Deb, “A Critical Analysis of the Information Technology Act, 2000 vis-à-vis Mitigation of
Child Pornography”, 7 CULJ 17 (2018).
20. Supra note 17.
21. Supra note 17.
22. A Critical Analysis of the Protection of Children from Sexual Offence Act, 2012, available at:
https://lexlife.in/2021/03/28/a-critical-analysis-of-the-protection-of-children-from-sexual-offence-act-2012/
(Visited on March 26, 2022).
23. Supra note 17.
24. Critical Analysis of India’s Protection of Children from Sexual Offenses Act 2012, available at:
https://www.jurist.org/commentary/2020/05/mayank-tiwari-posco-act/ (Visited on March 21, 2022).
25. A Critical Analysis of the POCSO Amendment (2019), available at: https:// nickledanddimed.com/
2021/02/05/a- critical-analysis-of-the-pocso-amendment-2019/ (Visited on March 23, 2022).
26. Ganguly, The Protection of Children from Sexual Offences (POCSO) Act, 2012 674 (Dwivedi & Company,
Prayagraj, 3rd edn., 20200.

AUTHOR DETAILS:
MONALIKA SINGH MAHESHWARI2 AND UJJWAL KUMAR SINGH2
1
Student B.A. LL.B (H.), 5th Year and 2Assistant Professor, Law College Dehradun, Uttaranchal University,
Dehradun (UK)

70
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

A DETAILED REVIEW METHODOLOGY FOR THYROID NODULE FEATURES EXTRACTION:


COMBINATION OF TEXTURAL AND MORPHOLOGICAL FEATURES

REEMA PAREKH AND PROF. (DR.) MANISH THAKKER

ABSTRACT
Ultrasound is a basic instrument which is widely used to diagnose malignancy of thyroid gland and
therefore, it is essential to identify set of features which can differentiate between malignant and benign
nodule of an ultrasound image. There are different set of features to enhance quality of ma- lignancy
measurement in a tumor. This review paper consists of different feature extraction techniques to accurately
identify major aspects of the nodule. Apart from feature extraction - which is a foremost step, selection of
set of extracted features is also vital for malignancy classification. To develop efficient and effective
classifier, excessive extracted features needs to be eliminated. This paper presents review of feature extraction
tech- niques along with dimensional reduction techniques to identify best attributes for malignancy
classification. The wider aspect of this study is to improve accuracy of computer aided diagnosis by
undertaking different features in to consideration.
Keywords: Thyroid Nodule,Textural features, Morphologi- cal features,Feature selection methods

INTRODUCTION
Cancer is fatal disease not only in India but also worldwide in recent years. Especially in India more than 1
million cases of cancer were diagnosed every year in a population of 1-2 billion and estimated 600000-700000
deaths in year of 2012 [1]. This seems to be an alarming condition to cope up with rising cancer cases. Further
to this as per the World Health Organization’s Global health workforce statistics, supplemented by different
country in the year of 2016, India is having 0.759 Physicians per 1000 people which can be increased to 0.8 in
year of 2017 [2]. These figures are minuscule in comparison to other developed countries. Considering the
above facts, it is essential to develop a radical cost effective solution to tackle this alarming issue. This solution
will aid doctors by reducing their burden by early diagnosis. The medical imaging technology has gone through
drastic revolution during past century. Being 100% digital imaging technology will be helpful for the diagnostic
and therapeutic goals. Most commonly used medical imaging modalities are X-ray, Computer tomography
(CT), Magnetic Resonance Imaging (MRI), Positron Emission Tomography (PET) and Ultrasound Sonogram
(USG). All imaging techniques have unique applications with its own advantages and disadvantages. USG
scans are widely used in recent times for its wider goal advantages in comparison to other instruments. To name
few, it is completely non- invasive, radiation free, portable, less expensive and it gives real time image.
However, It has few disadvantages as well, like speckle noise, difficulty in penetrating bone structure. Due to
high speckle noise image processing is an inevitable part of the USG image for error less detection [3]. There
are many state-of-the-art techniques filters techniques which are available to remove Spackle noise from an
image [4]. The next important and crucial part is the segmentation of the image. In this segmentation, Region of
Interest (ROI) will be identified [5]. Different variants of methods are used to overcome the limitations of
segmentation methods to form a closed contour region with homogeneous boundary. After completion of image
segmentation next task is to extract features from ROI as well as rest of the image and compare the features to
identify the malignancy inside the image. Many types of features can be extracted from the USG image but this
study focuses on textural features as well as morphological features for thyroid ultrasound image because
combination of these two features will only improve the prediction of malignancy.
MATERIALS AND METHODS
This section deals with the two major features extraction techniques and combination of these two can add
additional value in malignancy classifier. Feature extraction converts visual information into the vector space
and mathematical operation can be implemented on it to derive the findings inside the image.
A. TEXTURE FEATURES
There is no exact definition for texture features but those features can be described by the gray level
distribution on the image region. These features can be divided in to first and second order statistics.
Texture features will be beneficial to identify hidden and potentially relevant pattern in images [6].

71
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

First-Order Statistics: First-order statistics describe the distribution of grey level intensities within image
region. Let random variable I represent the grey level of the image region. The first-order histogram P(I) is
defined as [7]:
number of pixels with grey level I
𝑃(𝐼) =
total number of pixels in the region
First-order features deal with only single gray scale value. The histogram of the image will provide the
information about the number of repeated grey scale value in to the image. Mean, Variance, Skewness, kurtosis
are the features to identify the histogram values mathematically. Variance is a measurement of the grey value
deviation from the mean value so that overall width of the histogram can be calculated. Skewness measures of
lack of equality near mean value in histogram whereas Kurtosis is a measure of sharpness of histogram [8].
B. Second Order Feature Extraction
In this method pair of grey scale image pixels are considered so it will provide information about the relative
position of pixels with respect to each other in texture. There are main two methods to generate second order
texture features which are mentioned below:
Gray level co–occurrence matrix (GLCM): This method describes the spatial relationship of pixels in the
image. A GLCM is having size of N X N matrix of second-order pixels in the image. The probability function
of the same can be defined as
𝑝(𝑖, 𝑗||𝛿, 𝜃)
Wherein (i, j)th element of this matrix represents the pair of i and j pixels value repeated in the image with
𝛿 distance and 𝜃 angle [9]. The value of 𝛿 is the distance between reference and neighbor pixels which can be
chosen according to the requirement. The value of 𝜃 can be degree 0 (Horizontal), 90 (Vertical), -45 (Bottom
left to top right), -135 (Top left to bottom right). The different combination of 𝛿, 𝜃 can generate unique features
value from the image. Below are the list of basic GLCM features with mathematical expressions [10].
(1) Contrast: It is measure of intensity variation in gray scale image between reference pixel and neighbour
pixel. Larger the contrast value lager the intensity difference between both pixels.

∑ ∑ |𝑖 − 𝑗|2 ∗ 𝑝(𝑖, 𝑗)
𝑖 𝑗

(2) Homogeneity: It measures the closeness of the distributed elements inside the image. It is exactly
opposite to the contrast. As homogeneity increases, contrast of the image will decrease.
𝑝(𝑖, 𝑗)
∑∑
1 + |𝑖 − 𝑗|2
𝑖 𝑗

(3) Entropy: It measures the randomness of the element present in the image. The value of entropy can be
calculated as a degree of disorder present in the image. The value is higher when all elements of the
matrix are same and small when those are unequal.

∑ ∑ 𝑝(𝑖, 𝑗) ∗ 𝑙𝑜𝑔𝑝(𝑖, 𝑗)
𝑖 𝑗

(4) Energy: It measures the local uniformity of the grey level pixels. So when energy value is high entropy is
low.

∑ ∑ 𝑝(𝑖, 𝑗)2
𝑖 𝑗

(5) Correlation: This feature measures the linear dependency of gray level values in the image.
(𝑖 − µ𝑥 )(𝑗 − µ𝑦 )𝑝(𝑖, 𝑗)
∑∑
𝜎𝑥 𝜎𝑦
𝑖 𝑗

Where,µ𝑥 , µ𝑦 and 𝜎𝑥 𝜎𝑦 are the means and standard deviations simultaneously.


(6) Variance: It measures the distribution of the grey level in the image with regards to the mean value.
72
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

∑ ∑ |𝑖 − 𝑣|2 ∗ 𝑝(𝑖, 𝑗)
𝑖 𝑗

(7) Dissimilarity: It measures the mean of the grey level difference distribution of the image. A larger value
implies greater disparity in intensity values among neighbouring pixels.

∑ ∑ |𝑖 − 𝑗| ∗ 𝑝(i, 𝑗)
𝑖 𝑗

Gray level Run length matrix (GLRLM): GLRLM is higher order statistical texture features extraction
technique. It will measure the size of homogeneous runs for each grey level consecutively and co-linearly
distributed in given direction. Number of pixels in that particular set is called the length of the grey level run
[11]. The element (i,j) of GLRLM corresponds to the number of homogeneous runs of j pixels with intensity i in
the direction θ. Like GLCM in GLRLM also consider the four principal direction which are horizontal (0° ),
anti-diagonal (45° ), vertical (90° ) and diagonal (135° ). The GLRLM is computed as [12]:
𝑅(θ) = (g(i, j)||θ), 0 ≤ i ≤ Ng, 0 ≤ j ≤ R max
Where,
Ng = the maximum grey level
R max = the maximum length.
Below are the basic GLRLM features with mathematical expressions:
(1) Short Run Emphasis:
2
1
∑ p(i, j)
n
j

(2) Long Run Emphasis:


2
1 p(i, j)
∑ 2
n j
j

(3) Grey Level Non Uniformity


1
∑(∑ p(i, j))2
n
i j

(4) Run Length Non Uniformity


1
∑(∑ p(i, j))2
n
j i

(5) Run Percentage


n

p(i, j)j
i,j

(6) Low Grey Level Rub Emphasis


p(i, j)

i2
i,j

(7) High Grey Level Run Emphasis


1
∑ i2 p(i, j)
n
i,j

73
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Morphological Features: Morphology characterizes form and structure of organism. Textural features’ precision
depends on the ultrasound machine gain value. It is effective only with specific system. Unlike textural features
morphological features are almost independent of USG machine gain settings and specifications. Thyroid
Imaging Reporting and Data System (TI-RADS) has suggested image and description for each of the ultrasound
features extracted from lesion to identify benign and malignant tumour [13]. Below are fundamental and
clinically useful morphological features with their relevancy to malignancy of the tumour [14].
(1) Shape: Taller-than-wide, Ratio of anteroposterior/transverse diameter to the horizontal diameter is greater
than 1 is a suspicious feature for malignancy [15].
(2) Perimeter: A tumour with irregular shape and large perimeter is having strong possibility that tumour is
malignant.
(3) Area: Malignant tumours are having large area than benign tumours.
(4) Aspect ratio: If the depth of the tumour exceeds its width then tumour is having higher probability of
being malignant.
Ddepth
Aspect ration =
Dwidth
(5) Form Factor: If its value close to 1, the tumor is nearly round in shape.
(6) Roundness:
4 ∗ Area
Roundness =
π ∗ (MaxDiameter)2
Where, MaxDiameter denotes the length of the major axis from the equivalent ellipse of tumour
(7) Solidity: Value of solidity close to 0, the tumour is malignant.
Area
Solidity =
ConvexArea
Where, ConvexArea is an area of the convex hull of the tumour.
(8) Number of Substantial Protuberances and Depressions (NSPD): It will measure the level of
irregularity in boundary. Irregularity is measured the level of irregularity in boundary. Irregularity
is measured through concave and convers points. Malignant tumour has anfractuous boundary
which gives larger NSPD.
NSPD = 2 ∗ n
Where, N is the number of concave points.
(9) Lobulation Index (Li): Larger the LI maximize the chances of malignancy.
Amax − Amin
LI =
Aaverage
Where, Amax = Size of largest lobe region,
Amin = Size of smallest lobe region,
Aaverage = Average size of all lobe region.
FEATURE SELECTION METHODS:
Feature selection plays an important role in dimensionality reduction for predictive model. This is desirable
to control computation cost while improving the performance of the model. It is a method to select numbers
of input variables which are having the strongest relationship with target variable. It reduces complexity of
a model and over-fitting too. Dimensionality reduction is divided in to two major task which are feature
selection and feature extraction [16]. Feature ex- traction combines original features and generate new
features from available features while feature selection selects a subset of original features [16].In medical
imaging technology, usually use of feature selection techniques is widespread because feature extraction gives
a combination of features which might not have physical meaning. Hence, for easy interpret ability,
readability and transparency feature selection methods are use in medical problems. Due to large number of
74
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

features available dimenationality reduction is inevitable part of the process. Below are the list of methods
to identify set of features to achieve best accuracy in thyroid tumour classification. Feature selection
methods are further classified in to Filter, wrappers, embedded methods depending on the relationship with
the learning method [17].
a. Filter Method:
This feature selection methods works on statistical measures to identify the correlation and dependency of input
and output variable. In this method data type of the input and output variable has been chosen carefully [18]. It
will generate result on ranking for variable selection on the basis of the “relevance”. Chi-squares test,
information gain, correlation coefficient scores are examples of filter methods.
b. Wrapper Method
This method create multiple models with different subsets of features to results in best performing model. These
methods does not concern about the variable types of input and output variable. Optimal performance of the
model can be achieved by adding and removing variables. This method is computationally expensive due to
repeated learning steps and cross- validation [19]. Forward feature selection, backward feature elimination,
recursive feature elimination are typical examples of wrapper methods.
c. Embedded Method
This method has a quality of Filter as well as Wrapper method [20]. Feature selection is done in coordination
with the model tuning for classifier. Hence, the quality of this technique is to have its own built-in feature
selection and learning model. This method is less computationally expensive than wrapper method. LASSO,
Elastic Net, Ridge Regression etc. are examples of embedded methods.
Algorithms for Feature Selection:
In this section six feature extraction techniques are dis- cussed which are concluded f rom recent
research papers in the area of feature extraction in ultrasound images. The implementation of the methods is
completely depends on the data set and the purpose of the outcome. It is important to note that each
method is having different set of variables to process.
A. Genetic Algorithm(Ga)
This is consider as one of the most advance technique for feature selection, when there is large number of
features available. Although it is computationally very demanding and its run time can be prohibitive. To
reduce the training time, overall process can be divided into two parts, filtering and wrapping. Filtering
process will identify top ranked features based on threshold value. Wrapper methods will do smaller search
from the features selected during filter process and create the model. This algorithm generates new
solutions relevant to the output variable using implicit distribution. Population method will be used to find
the fitness function [21]. Selection operator selects individuals in the population based on individual’s
fitness [22]. Higher the fitness higher the chances of selection compare to lower fitness individuals.
Crossover process exchanges the information with each other to generate off springs. Mutation filliped the
value 1/0 of the bit of selected individuals. This process repeats until the outcome has been achieved. Each
cycle of the process called generation [23].
B. Principal Component Analysis (Pca)
This technique is used for unsupervised dimensionality reduction when the data is consist of many variables
and those are highly correlates with each other. PCA converts data in to lower dimensional space while
maximize the variance in the data. It will work on eigenvalue and eigenvector of co-variance matrix to find
the principal component [24]. PCA does the analysis in two phases, in first phase those principal
components will be identifies which are having maximum variance in the data set and remaining component
with lower variance will be identified in second phase. The correlation between first principle component
and second principle component should is zero. These component have direction and magnitude which
represents across which principal axes the data is mostly spread out and the amount of variance simultaneously
[25].
C. Least Absolute Shrinkage and Selection Operator (Lasso):
LASSO methods is a linear regression method used to obtain the subset of the predictors to minimize the
output prediction error. This regression analysis is shrinkage and variable selection method. The algorithm
achieves this by imposing a constraint on the features that cause regression coefficient for some variables to
shrink toward zero. Variable with zero regression coefficient can be excluded and with non- zero regression
coefficient are strongly associates with the response variable. LASSO chooses only one from the group of
75
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

predictors having high correlation. Hence, the number of variable can be reduced and the model designed
through LASSO regression is less complex and prevents from over- fitting problem [26]. (Lasso-ref) Linear
regression minimize the absolute sum of co-efficient and ridge regression minimize squared sum of the
coefficients.
D. Linear Discriminate Analysis(Lda):
LDA is popular supervised dimensionality reduction technique as well as classifier. The important step in
LDA is pattern classification in more than two groups based on set of parameters. LDA tries to maximize
the relation between class variance and the within-class variance by drawing a decision region between the
different classes [27]. Unlike other techniques LDA has ability to update the features in algorithm without
running it on whole data set. PCA and LDA both are dimensionality reduction techniques but there is
difference between both of them in term of implementation. LDA is used for data classification while
PCA is used for features classification [28].
E. Random Forests with Bourta Algorithm
Random forests are promising relatively good accuracy, robustness and ease of use. Random forests consist of
hundred decision tress but not every tree sees all features. All tress are de-correlated with each other so
less prone to over-fitting [29].Bourta algorithm is built around the random forest algorithm designed to solve
the subset of features from the dataset which are relevant to the output variable. Bourta does a sharp
classification of features rather than ordering, unlike other feature selection methods [30]. Bourta uses
shadow features which are copies of original features but with randomly mixed values, so their distribution
will remain same but importance get change. In the process to identify best original features, in each iteration
find the highest performance of shadow feature and accumulate hit counts. The original features importance
is than compared with shadow features and significantly identifies the best performed and outperformed
features. The algorithm stops when all features have an established decision or maximum iteration numbers
[31]. Bourta is a heuristic serial algorithm so the stability in terms of feature selection as classification
accuracy may deceiving.
F. Recursive Feature Elimination(Ref)
As the name suggests this method recursively removes the weakest features and assigned the weight
according to the importance of that feature which fits a model. Importance of the features is decided through
attribute and by removing the features per loop attempts to eliminate dependencies and co linearity exist in
the model [32]. This process is repeated until the specifies number of features required to train the model has
eventually reached. This process is applied on smaller and smaller set of features. At every iteration model will
calculate the accuracy to identify that which features contribute the most to predicting the target output.
DISCUSSION
In summary, due to safe and painless technique Ultrasound is welcomed by all the medical community
widely. So it is important to develop tool which can help doctors for prediction through USG images. Features
play a vital role to classify the malignancy inside the image. In this study variety of features are discussed,
which can be implemented individually or in combination with multiple techniques. These features will
provide in depth knowledge about the overall image. In order to train the classifier, one cannot use all the
features so feature selection is also plays pivotal role. Six different feature selection methods are discussed as
per the current scenario to select the best feature for classification. Implementation from above said methods
completely depends on the complexity in available data set.
FUTURE SCOPE
The methods are further used for classifier to classify the malignancy inside the nodule. Any programming
platform can implement the discussed methods for thyroid ultrasound image for automatic diagnosis task.
Combination of texture and morphological features can improve the accuracy of the overall classification.
REFERENCES:
 M. K. Mallath et al., “The growing burden of cancer in India: Epi- demiology and social context,”
Lancet Oncol., vol. 15, no. 6, pp. 1–8, 2014.
 https://data.worldbank.org/indicator/SH.MED.PHYS.ZS?locations=IN- CA-CN-FR-DE6
 El-Gwad, G. N. H. A., Omar, Y. M. K. (2017). Selection of the best despeckle filter of ultrasound
images. Proceedings - 2017 2nd International Conference on Multimedia and Image Processing, ICMIP
2017, 2017-January, 245–249.

76
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Gupta, M., Taneja, H., Chand, L. (2018). Performance Enhancement and Analysis of Filters in Ultrasound
Image Denoising. Procedia Computer Science, 132, 643–652.
 Noble, J. A., Boukerroui, D. (2006, August). Ultrasound image seg- mentation: A survey. IEEE
Transactions on Medical Imaging, Vol. 25, pp. 987–1010.
 Mugasa, H., Dua, S., Koh, J. E. W., Hagiwara, Y., Lih, O. S., Madla, C., Acharya, U. R. (2020). An
adaptive feature extraction model for clas- sification of thyroid lesions in ultrasound images. Pattern
Recognition Letters, 131, 463–473. https://doi.org/10.1016/j.patrec.2020.02.009
 Aggarwal, N., K. Agrawal, R. (2012). First and Second Order Statistics Features for Classification of
Magnetic Resonance Brain Images. Journal of Signal and Information Processing, 03(02), 146–153.
https://doi.org/10.4236/jsip.2012.32019
 Soh, L.−K., Tsatsoulis, C. (1999). Texture Analysis of SAR Sea Ice Imagery Using Gray Level Co-
Occurrence Matrices. In IEEE TRANS- Actions On Geoscience And Remote Sensing (Vol. 37).
 Zayed, N., Elnemr, H. A. (2015). Statistical Analysis of Haralick Texture Features to Discriminate Lung
Abnormalities. International Journal of Biomedical Imaging, 2015.
 P.S, S. K., V.S, D. (2016). Extraction of Texture Features using GLCM and Shape Features using
Connected Regions. International Journal of Engineering and Technology, 8(6), 2926–2930.
 Zhang, H., Hung, C. L., Min, G., Guo, J. P., Liu, M., Hu, X. (2019), GPU-Accelerated GLRLM
Algorithm for Feature Extraction of MRI. Scientific Reports, 9(1).
 Sayeed, A., Sohail, M., Bhattacharya, P., Mudur, S. P., Krishna- murthy, S. (n.d.). Local Relative-Based
Texture Feature Extraction For Classifying Ultrasound Medical Im- Ages.
 Tessler, F. N., Middleton, W. D., Grant, E. G. (2018). Thyroid imaging reporting and data system (TI-
RADS): A user’s guide. Radiology, 287(1), 29–36.
 Huang, Y. L., Chen, D. R., Jiang, Y. R., Kuo, S. J., Wu, H. K., Moon,W. K. (2008). Computer-aided
diagnosis using morphological features for classifying breast lesions on ultrasound. Ultrasound in
Obstetrics and Gynecology, 32(4), 565–572. https://doi.org/10.1002/uog.5205.
 http://tiradscalculator.com/description-of-features/Taller-than-wide
 Remeseiro, B., Bolon-Canedo, V. (2019, September 1). A review of feature selection
methods in medical applications. Computers in Biology and Medicine, Vol. 112.
https://doi.org/10.1016/j.compbiomed.2019.103375
 Hira, Z. M., Gillies, D. F. (2015). A review of feature selection and feature extraction methods applied
on microarray data. Advances in Bioinformatics, 2015.
 https://www.analyticsvidhya.com/blog/2016/12/introduction-to-feature-selection-methods-with-an-example-
or-how-to-select-the-right-variables/
 Jović, K. Brkić and N. Bogunović Faculty of Electrical Engineering and Computing, University of
Zagreb / Department of Electronics, Microelectronics, Computer and Intelligent Systems, Unska 3, 10
000 Zagreb, Croatia alan.jovic, karla.brkic, nikola.bogunovic@fer.hr
 https://towardsdatascience.com/intro-to-feature-selection-methods-for- data-science-4cae2178a00a
 Tesař, L., Smutek, D., Jiskra, J. (n.d.). Genetic Algorithms for Thyroid Gland Ultrasound Image Feature
Reduction.
 Chaikla, N., Qi, Y. (n.d.). Genetic Algorithms in Feature Selection.
 Tesař, L., Smutek, D., Jiskra, J. (n.d.). Genetic Algorithms for Thyroid Gland Ultrasound Image Feature
Reduction.
 Song, F., Guo, Z., Mei, D. (2010). Feature selection using principal component analysis. Proceedings -
2010 International Conference on System Science, Engineering Design and Manufacturing Informatiza-
tion, ICSEM 2010, 1, 27–30.

77
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Guo, Q., Wu, W., Massart, D. L., Boucon, C., De Jong, S. (n.d.). Feature selection in principal component
analysis of analytical data.
 R. Muthukrishnan and R. Rohini, ”LASSO: A feature selection tech- nique in predictive modeling for
machine learning,” 2016 IEEE Inter- national Conference on Advances in Computer Applications
(ICACA), Coimbatore, 2016, pp. 18-20.
 Aliyari Ghassabeh, Y., Rudzicz, F., Moghaddam, H. A. (2015). Fast incremental LDA feature
extraction. Pattern Recognition, 48(6), 1999–2012.
 Balakrishnama, S., Ganapathiraju, A. (n.d.). Institute For Sig- Nal And Information Processing Linear
Discriminant Analysis-A Brief Tutorial.
 Rogers, J., Gunn, S. (n.d.). LNCS 3940 - Identifying Feature Relevance Using a Random Forest.
 Kursa, M. B., Rudnicki, W. R. (2010). Feature Selection with the Boruta Package. In JSS Journal of
Statistical Software (Vol. 36).
 Degenhardt, F., Seifert, S., Szymczak, S. (2019). Evaluation of variable s e l e c t i o n methods for random
forests and omics data sets. Briefings in Bioinformatics, 20(2), 492–503.
 https://towardsdatascience.com/feature-selection-in-python-recursive-eature-elimination-19f1c39b8d15
 Bauer, Nancy. “Simone De Beauvoir: The Second Sex.” Oxford Scholarship Online, 2017,
doi:10.1093/oso/9780190608811.003.0007.
 Eden, Mary. “LuceIrigaray”.In Jon Simons (ed.), Contemporary Critical Theorists: From Lacan to Said.
Edinburgh: 2004
 Edinburgh University Press.ONeill, Maggie. Prostitution and Feminism: towards a Politics of Feeling.
Polity Press, 2001.Walters, Margaret. 2005. Feminism: A Very Short Introduction. Delhi: Oxford
University Press.
 Goswami, Indira. The Shadow of Kamakhaya: Stories. New-Delhi: Rupa and Co. 2001
 Irigaray, Luce. This Sex which is Not One, Catherine Porter trans. New York: Cornell
University, 1985.
 Zakin, Emily, "Psychoanalytic Feminism", The Stanford Encyclopedia of Philosophy (Summer 2011
Edition), Edward N. Zalta (ed.), URL = <https://plato.stanford.edu/archives/sum2011/entries/feminism-
psychoanalysis/>.

AUTHOR DETAILS:
1
REEMA PAREKH AND 2PROF. (DR.) MANISH THAKKER
1
Instrumentation and Control, Gujarat Technological University, Ahmedabad, India
2
Instrumentation and Control, L.D. College of Engineering, Gujarat Technological University
Ahmedabad, India

&
SHILPI PRIYA SAIKIA
Guest Lecturer (Naharkatiya College), Department of English

78
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

REMOVAL OF HEAVY METALS FROM SOIL USING NANOMATERIALS: A REVIEW

RAJNI KUMARI, MANVENDER SINGH AND VIKAS DHULL*

ABSTRACT
Increased heavy metalions toxicityin damaged soilbecause of several human and natural operations has
promoted a greater need to treat environmental toxicity. To treat polluted soil, various traditional methodswas
developed, like chemical precipitation method, filtration, precipitation, also absorption processes, but they have
their own drawbacks, such as being expensive, low efficiency in removing heavy metals, and toxicity.
Nanotechnology has grown in popularity as an evolving field, and several nanoparticles have been developed to
remove heavy metal ions from damaged soil because of their superior properties like mechanical strength, low
cost, easy renewable, high specificity, and large surface area they easily intact contamination, which arise from
their nanoscale impacts. In this review, some nanomaterials such as carbon sorbents (Biochar, activated
carbon), silica nanocomposite, clay-based nanocomposite, alginate-based nanocomposites, cellulose, chitosan,
and zinc oxide nanomaterial have been described that efficiently remove heavy metals from polluted soil. The
review aims to remediation of heavy metal toxicity in damaged soil with help of nanomaterials or
nanocomposites.
Keywords: soil contamination, heavy metals, nanoparticles, adsorption

INTRODUCTION
Soil is the top loose layer of earth’scrust, which is produced by flouting of rock. India is an agronomy country,
with agriculture serving as the key link between economic growth and population or as a means of meeting the
demands of fast growing population, but as populationincreases, it will become more difficult to supply all of
their needs. As a result,boosting agricultureuses various types of pesticides, bio solids,manure, bacterial pests
and other factors, which contributes to contamination of soil, as do several industrial activities like metal
mining, milling process and industrial waste and waste water all of which merge in soil and causes heavy metal
toxicity(Wuana et al., 2011a).
Heavy metal ions are naturally occurring elements with a high atomic mass and a density greater than one than
4.5 times that of water(Tchounwou et al., 2012).It refers to elements with high bio-toxicity, such as Hg, Cd, Pb,
Cr and anothersemimetal. Toxicity of heavy metals occurs when heavy metals contaminateatmospheric air,
groundwater, agriculturalsoil, and biosphere as a consequence of human operations(Wuana et al.,
2011b).Heavy metal ions discharged into the environment because of the aforementioned human activities are
primarily found in soil.Unlike organic pollutants, which are reduced to carbon dioxide by bacteria, microbes,
resulting in soil pollution, do not eliminate most metals. (Kirpichtchikova et al., 2006). Many studies conducted
in this field ,with the finding indicating that agriculture, mining, agrochemicals and industries are the principles
suppliers of heavy metals(Alengebawy et al., 2021). Agriculture and industry, according to research by Xiao et
al have a significant influence on heavy metal contamination in soil and plants.(Xiao et al., 2017). Heavy metals
effects have a negative impact on soil organism, diminishing quantity of microorganism and activity of soil
microorganism, heavy metals even low concentration integrated with plant’s physiological metabolism. Heavy
metal ion can be taken up by plant through damaged soil and accumulate along with food chain, posing a risk to
animals and human beings for example encourage the development of reactive oxidation stress( ROS ) in
aquatic system, which can harm fish(Jiwan et al., 2011).
contamination risk must be considereda realistic, cost effective and rapid valued method must be implanted to
remove heavy metal contamination (Lamine et al., 2019).Conventional method such as flocculation, ion-
exchange, chemical-extraction and oxidation, chemical leaching, precipitation, immobilization, soil washing,
phytoremediation and others have been used to remediate heavy metal ion toxicity in damaged soil (Yu et al.,
2021).In the past, while they produced good results, they also had some drawbacks such as cost effectiveness,
low efficiency for removal of toxins, and others (Khoso et al., 123 C.E.).Nanotechnology breakthroughs have
created a global window for remediating or restoring damaged soil in cost effective manner(Rajput et al., 2022)
Nanotechnology has also been identified of potential as an environment friendly technology , particularly in
term of reducing the toxicities of heavy metal (Kumari et al., 2022). Soil remediation is one of the most
common example of nanotechnology method. Useof nanoparticles remove pollutants, in a variety of method has
recently been investigated, including adsorption, photo catalysts, precipitation and co-precipitation, all of which
79
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

facilitated by the large specific area (Raffa et al., 2021). As shown in Figure 1 heavy metal can be produced by
anthropogenic and natural way, which leads to soil toxicity, which is removed by using nanoparticles via
adsorption. In recent years, nano-remediation technologies for contamination positions have been
deployed(Alazaiza et al., 2021). A variety of natural and synthetic polymers, such as silica, clay minerals, bio
sorbent, activated carbon, proposed by researchers for use in adsorption processes. Nanoparticles, on the other
hand, offer various unique characteristics, such as adsorptive and a large surface area, as well as being
shapeless, easy to use, and manufacture (Diallo et al., 2014).Metal oxide sorbent like ferrous oxide, magnesium
oxide, Zirconium oxide, and titanium dioxide have recently gotten a lot of attention to removal of heavy metal
toxicity(R, 2015). ZnO nanoparticles is most common nanoparticles employed to remove heavy metal
contamination from soil among these nanomaterial because they are inexpensive and have strong photocatalytic
activity, also have strong adsorption ability for heavy metal toxicity elimination(Le et al., 2019). This review
aims to remove heavy metal contamination from soil at large scale operations including nanomaterials. Finally,
the problems and prospects for invigilators working in the exciting field of research are highlighted.

Figure 1. Heavy metal removal from contaminated soil utilizing several types of nanomaterials
SOIL CONTAMINATION
Urbanization process and development have resulted in a large number of harmful substances being released in
environment. In the urban environment, dust is primary carrier of heavy metals, while soil is main
absorber(Long et al., 2021) because of their durability and high tendency for biota, toxic metal contamination
in soil has been concern in recent year. The majority of toxic metal with non-volatile features clings to very
small particles and remain fouling in environment(Dartan et al., 2015). Heavy metal contamination caused by
various type of metals special effects in soil such as cadmium, chromium, zinc, lead and magnesium shown in
below Table 1. Heavy metal have a substantial effect on soil microorganism and processes, disrupting the
organic balance in soil and resulting soil degradation as well as growth and development of plant
species(Wyszkowska et al., 2007). It can be accumulate in plant tissue and then be passed on to humans via the
food chain; the availability of this toxic substance is a concern. in the environment has a significant detrimental
influence on human health(Algattawi et al., 2018).Given the dangers of heavy metal toxicity to people, plants,
and soil, several methods for eliminating heavy metals from soil have been developed Such as electrochemical
oxidation and Ion-exchange resins, chemical coagulation, precipitation, bioremediation, photo-catalytic
degradation, and adsorption(Gupta et al., 2015). However, because of its great efficiency and economic value,
the adsorption technique is the most widely used, and several nanoparticles or nanocomposites were used as
adsorbents such biochar, activated carbon, silica nanocomposites, clay materials, and Zn nanomaterials (Yu et
al., 2021).

80
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table 1. For Heavy Metal Effect on Soil


Heavy metal Sources Effect on soil References
Cadmium Manmade Effect in crop plant – reducing nutrient value, water (Haider et al.,
activities like uptake reduction, translocation, increase oxidative 2021)
Urban waste damage, affect plant metabolism, and inhibit plant
disposal, casting, morphology and physiology.
mining, metals
production, and
the usage of
synthetic
phosphorus
fertilizers
Chromium Lather industry, In plant- Alteration in the germination process( (Kumar et al.,
sewage sludge, roots, leaves, stem), damage plant physiological 2015)
and industrial process , and yield attributes
effluent
Magnesium Magnesite mining Disturb soil function , reduced water penetration (L. Wang et
areas, al., 2015)
Nickle Paper, food and Soil metabolism along with growth development of (Wyszkowska
iron and steel plants et al., 2007)
production,
fertilizer
Arsenic Basic source Plant uptake and scattering. Volatilization, vacuolar (Al-Makishah
Human activities- repossession et al., 2020)
herbicides,
pesticides, and
food additives
Natural source-
Rocks, volcanoes.
Copper Copper-based Adverse effect in microbial function, soil fertility (Obeng et al.,
fungicidal, 2018)
pesticides
Chromium Mining, smelting Plant metabolic activities, hampering crop growth, (Prasad et al.,
activities reducing vegetable and grain quality 2021)
Cobalt Cobalt mining Decreases microbes activity, soil fertility increases (M. Jiang et
fertilizers, al., 2022)
wastewater
discharge as
mixture of
combustion fuel,
cobalt content
Lead Mining and Reduced physiological or biochemical stress (Shen et al.,
smelting activities 2016)
along with lead
containing paints,
gasoline, sewage
sludge, and
fertilizers.
Molybdenum Excessive Direct effect on metabolism of microorganism, (Zaborowska
emission from Soil fertility et al., 2016)
mining, biosolids,
fertilizers,
production of
alloys, catalysts
and coal

81
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Types of nanomaterials using in heavy metal degradation


As shown in figure 2 various nanomaterial are using elimination of heavy metals in the damaged soil such as
carbon sorbents (Biochar, activated carbon), alginate nanocomposite ,silica coated magnetic nanocomposite,
and metal oxide based nanomaterial (AlO3, TiO2,) but ZnO nanomaterial specially used to remove heavy metal
at high adsorption capacity.

Figure 2. Various Types of Nanoparticles


Carbon Sorbent Nanocomposite
Because of their environmentally favorable character, carbon sorbentsare desirable for the immobilization of
heavy metal ions. Biochar and activated carbon are the extreme often employed carbon adsorbents for damaged
soil remediation among the numerous carbon sorbents(Burachevskaya et al., 2021).
Biochar
Biochar is derivative of carbon that produced by heating of animals and plants biomass. The growing interest in
biochar's positive applications has spawned a slew of new scientific and engineering fields. Carbon
repossession, soil productivity enhancement, pollution restoration, and agronomic derivatives/waste recycling
are all possible biochar applications(Chausali et al., 2021). Pyrolysis temperature, retention duration, heat
transfer rate, and biofuel are the essential parameters, whichinfluence its characteristics. The surface area, pore
size distribution, and ion-exchange efficiency of biochar determine its performance in pollutant
remediation(Ahmad et al., 2014). According to recent studies, biochar has a greatcapability to eliminate heavy
metal ions toxin from polluted water and damaged soil systems. The magnetic biochar spheres were created in
this study by combining gelatin alginate and Iron(III) chloride firstly to form an alginate-ferric ion gel, which
was then hydrolyzed at 300℃ and showed good adsorption capacity , lowering arsenic concentration from
60.23 ± 0.39 to 27.34 ± 0.94 being easy to extract from soil by using magnets(Liu et al., 2020). Heavy metal
ions remediation by help oflignocellulose biochar, with highlighting on chromium and cadmium ions.These
nanocomposite offers excellent physical and chemical properties due to the advantages of both constituent
particles(Pathania et al., 2020). By modifying biochar with zero-valent iron to increasing sorbents capacity
(7.5%-6.37) for removal of phosphorus and organic contaminants, this study compared modified biochar
nanocomposite to normal biochar(Kołodyńska et al., 2017).
Activated Carbon
Activated carbon is a type of carbon that forms micro/nonporous and has a vast surface area (Baby et al., n.d.).
Due to its high mechanical strength activated carbon can swiftly remove metal ions, gases, and biological waste
from soil and (Y. Wu et al., 2019). One of the study by Abeer et al., synthesis of activated carbon using apricot
stone shows high adsorption capacity for Zn2+ and Al3+approximately 95%(El-Saharty, 2018).According to
Ahmed kabbani et al. they created an activated carbon silica nanocomposite for nickel removal with a 92%
adsorption capacity (Karnib et al., 2014). The production of activated charcoal (AC) from waste “coconut
buttons” was explored in this work, which shows high adsorbing capacity towards lead and copper ions at their
respective pH levels(Anirudhan et al., 2011).

82
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Alginate Based Nanocomposite


Natural polymer composites are being studied as green adsorbents. Nanocomposites like alginate appears to be
a promising contender because of excellent sorption capabilities(B. Wang et al., 2018). Alginate is a soluble
linear polymer generated by brown algae that offers various advantages such as abundant supply, low cost,
biocompatibility, and biodegradability(Kloster et al., 2020).Therefore, alginate nanocomposites are currently
popular in environmental related researches, and numerous polymer nanocomposites are being developed for
applications (Talbot et al., 2018). The adsorption techniques and effectiveness of numerous alginate-based
nanocomposites for the removal of various toxins from water and soil, including colors, heavy metals, and
antibiotics, were investigated(Thakur et al., 2016).Bin Wu et al.,(B. Wu et al., 2020)found that sodium alginate
coated with FeSSi nanocomposite helped to increase adsorption capacity. SA- FeSSi's efficiency in cadmium,
lead, nickel, and chromium solutions were 80.10 percent, 99.96 percent, 66.80 percent, and 80.46 percent,
respectively(Esmat et al., 2017).
Composited nanopolymers attached with SE-photosynthesized Iron-Nanoparticles are strongly advised in this
study for the total removal of Chromium ion into aquatic settings. The most effective batch adsorption settings
were pH 5.0, 4 g/L adsorbent dosage, 210 min contact duration, and 75 ppm starting Cr (VI) concentration. As a
result of these features, Cr (VI) may be completely eliminated from batch experiments (Almutairi et al.,
2021a).In this work, a superparamagnetic Fe3O4/alginate nanocomposite material (SPFe3O4/alg-NCM)
synthesized from algae was employed as a nonabsorbent to eliminate heavy metals from industrial sewage.
Cadmium and cobalt adsorption efficiencies and capacities for SPFe3O4/alg-NCM were determined to be 31.93
mg/g and 58.8 mg/g, respectively(Ince, 2022).
Silica Coated-Magnetic Composite
Because of theiradvantageous properties like contact surface area, saturation of magnetism, and cheap cost,
researchers manufactured magnetic Fe2O3-silica shell nanocomposites with varied Fe2O3/silica ratios. They have
a high adsorption ability (maximum 14.9 mg/g) when compared with identical materials, which was employed
to reduce Pb toxicity(Nicola et al., 2020). The removal of heavy metal ions from aqueous solutions utilizing
nanostructured GO, silica/GO nanocomposite, and silica nanoparticles was investigated or compared in this
batch experiment. According to batch adsorption studies, the silica/GOcomposite are effective heavy metal ion
porousmaterial that is frequently used in purification procedures(Sheet et al., 2014).Researchers in this study
surface functionalized amino modified nanosilica to create a novel NS-amine-IL nanocomposite. These new
nano-compositesshowed a high adsorption capacity (98-99%) to remediate heavy metal ions toxicity in both
damaged soil and wastewater(Mahmoud et al., 2018). Padervand et al.,(Padervand et al., 2013) found the use of
a modified magnetic core and zeolite shell to extract lead and cadmium from sorption solutions. In that study
(Saini et al., 2020) through green synthesis created a new SiO2@OPW nanocomposite with a high sorption
capacity to remediate heavy metal toxicity.
CHITOSAN
These days, Chitosan, a natural product with antimicrobial properties, adjustable mechanical strength,
biocompatibility, biodegradability, and water-solubility are gaining popularity. Chitosan nanocomposites are
employed in agriculture, horticulture, bio sensing, wound dressing, bone engineering, and medicine production
applications and medicine delivery due to their characteristics.(Murugesan et al., 2021). This study used
chitosan nanoparticles made from fungal chitosan to remediate Pb and Cd pollutants from both wastewater and
damaged soil(Almutairi et al., 2021b). In the study, nanocomposite adsorbents, particularly LDH-chitosan-
alginate beads, were shown to be very effective in remediation of metal ions toxicity from various wastewaters.
The removal efficacy of the LDH-chitosan-alginate beads was the greatest, ranging from 92.253 to 98.833 % for
chromium and ferric ions, respectively, while the alginate beads had the lowest. This work, synthesizesHigh
mechanical strength carboxylate graphene oxide/chitosan/cellulose composites nanoparticles for copper ion
adsorption from effluent and damaged soil (Zhao et al., 2019).The researchers employed "chitosan/Ag-
substituted hydroxyapatite nanocomposite beads" to remove dyes, heavy metal ions, and microbes from water
solution. In this study, they took two samples of tap water and untreated river water to remove specific copper
ion and rhodamine B. Their removal efficiencies ranged from86.7 to 94.4 percent, with a microbiological load
decontamination rate of 99.99 percent(Li et al., 2018).
Clay Based Nanomaterial
Different clay material(montmorillonite, kaolinite) are extensively used as adsorbent due to its high capacity
for sorption of different heavy metal like Arsenic(Shukla et al., 2011), lead(Yadav et al., 2019) . According to
this study, modified clay nanoparticles immobilized into soil help to remove cadmium, Zinc, copper and
nickel(Feizi et al., 2018).In study clay mineral (zeolite and bentonite) nanoparticles used to remove chromium
83
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

contamination in contaminated soil. Kaolinite,montmorillonite treat with acid to remove copper toxicity by
adsorption- mediated adsorption(Bhattacharyya et al., 2011).In this study increased adsorption capacity more
than 68% normal kaolinite modified with MnO2 to remove heavy metal toxicity(Sari et al., 2014). According to
Young-Chul-Lee et al., study magnesium amino clay is used to remove lead and cadmium ions toxicity with a
high adsorption efficiency of 26.30 and 91.31 mg/g from soil sample (Lee et al., 2011).
Cellulose
Cellulose is the most prevalent natural biopolymer that has unique properties like being biodegradable, high
surface area, low weight, as well as the ability to easily create hydrogen bonding with other polymers and is a
good adsorbent (Tayeb et al., 2018). In Suman et al. used a purification approach, Nano cellulose
nanocomposites were employed to remove heavy metal ions, pigments, and microbes from water. The result
was that the adsorption efficiency for Chromium and lead was 98% to 99%(Suman et al., 2014). In Xiao gang
Luo et al., reported that using an optimal extrusion doped technique, they were able to increase the adsorption
capacity of synthesis magnetic-based beads embedded in chemically modified magnetic nanoparticles for lead,
copper, and zinc ions toxicity remediation(Luo et al.,
2016).In this research, modified spherical Fe3O4/BC nanocomposites with excellent adsorption capacity for
removal of heavy metal ions. The order of adsorption for heavy metal ions Pb (II) > Mn (II) > Cr (III)(Zhu et
al., 2011)
Nanoparticles of zinc Oxide
Different kinds of metal oxides are used to elimination of heavy metals such as ZVI, TiO2, SiO2, Al2O3 and
ZnO. In these metal oxides, ZnO shows high adsorption capacity and ZnO@chitosan core-organic
nanocomposites were synthesized with high efficiency for removing of heavy metals in effluent(Saad et al.,
2018).Because of itsexceptional optical and electrical characteristics,which may be employed in a range of
applications, including filmsto remove harmful bio-chemical contaminants, like heavy metal ions(Behnajady et
al., 2006). Due to its excellent ultraviolet absorption characteristics, ZnO is being used in a growing variety of
personal grooming products, such as beauty products and moisturizers. (J. Jiang et al., 2018). According to
M.Jayaraj et al., ZnO nanoparticles help to remove cadmium and lead toxicity with high adsorption capacity and
showdecreased oxidative stresses to boost photosynthetic pigmentation and soluble protein in
plants(Venkatachalam et al., 2017).According to, researcherssynthesized ZnO nanoparticles and modified them
with humic acid, which helped to increase their absorption capacity for remediation of cadmium, copper and
nickel ionsin damaged soil(Mahdavi et al., 2014).According to Motshekga (Motshekga et al., 2015), they
developed nanocomposites in which bentonite ZnO nanoparticles are synthesized. Due to their antibacterial
properties,a ZnO nanocomposite shows best for removal efficiency to removal of ‘Enterococcus bacteria’. We
have conclude adsorption capacity of nanoparticles for removing heavy metal from open environment in Table
2
Table2. For Nanoparticles Using For Heavy Metal Degradation
Nanoparticles Heavy Adsorption References
metal capacity
(mg/g or %)
2+
Nano-TiO2-glu-CMC Cd 2440 (Mahmoud et al., 2017)
Pb2+ 2880
Hg2+ 1160
Fe2O4 @ PTMT modifies Hg2+ 603.16 (X. Huang et al., 2018)
with magnetic particles Pb2+ 533.13
Cd2+ 216.59
Polyacrylamide/sodium Ni2+ 99.3 (Moreno-Sader et al., 2019)
Montmorillonite
nanocomposite Co2+ 98.7

Ligand coated dense Cd 80 (Y. Huang et al., 2015)


nanoparticles(DNP) Pb
Fe3O4/cyclodextrin Pb2+ 64.5 (Badruddoza et al., 2013)
Cd2+ 27.7
Ni2+ 13.2
Fe2O3/CS Pb(II) 79.24 (Fan et al., 2017)
Cd(II) 36.42
84
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

PAACS Pb(II) 734.3 (Ge et al., 2016)


ZnO(Casein based Cd(II) 156.74 (Somu et al., 2018)
biogenic) Pb(II) 194.93
Cu(II) 67.93
Iron-supported clay Zn(II) 5780 (Dammak et al., 2020)
nanomaterial Ni(II) 2580
PEI- silica nanoparticle Cr(III) 183.7 (Choi et al., 2018)
CONCLUSION
Heavy metals are a key source of worry for environmental and human health protection. These ions donot be
removed because the requirements for this have not yet been met. Nanomaterials or nanocomposites were
extensively researched for the removal of heavy metal ions toxicity from polluted soil. Because of their large
surface area and compact size,they have the ability to absorb a number of impurities. Adsorption techniques are
highly effective and simple to implement, and they could be used to eliminate heavy metal ion contaminants
from water without causing soil damage. Different types of nanocomposites or nanoparticles are used, such as
carbon sorbents, clay nanocomposites, alginate nanocomposites, and ZnO nanoparticles are used as
adsorbents.ZnO nanoparticles show high efficiency in eliminating heavy metal from damaged soil in these
absorbents. Because of their unique anticorrosion, antimicrobial, photocatalytic, and greater surface area,
reduced density, and high surface permeability.
ACKNOWLEDGEMENT
I am thankful to the ‘’University Institute of Engineering and Technology’’ of biotechnology department at
Maharishi Dayanand University, Rohtak for providing me all necessary stuffs.
CONFLICT OF INTEREST
The authors have stated that there are no conflicting interests.
REFERENCES
 Ahmad, M., Rajapaksha, A. U., Lim, J. E., Zhang, M., Bolan, N., Mohan, D., Vithanage, M., Lee, S. S., &
Ok, Y. S. (2014). Biochar as a sorbent for contaminant management in soil and water: A review.
Chemosphere, 99, 19–33. doi: 10.1016/J.CHEMOSPHERE.2013.10.071
 Al-Makishah, N. H., Taleb, M. A., & Barakat, M. A. (2020). Arsenic bioaccumulation in arsenic-
contaminated soil: a review. Chemical Papers 2020 74:9, 74(9), 2743–2757. doi: 10.1007/S11696-020-
01122-4
 Alazaiza, M. Y. D., Albahnasawi, A., Ali, G. A. M., Bashir, M. J. K., Copty, N. K., Amr, S. S. A.,
Abushammala, M. F. M., & Al Maskari, T. (2021). Recent advances of nanoremediation technologies for
soil and groundwater remediation: A review. Water (Switzerland), 13(16). doi: 10.3390/w13162186
 Alengebawy, A., Abdelkhalek, S. T., Qureshi, S. R., & Wang, M. Q. (2021). Heavy Metals and Pesticides
Toxicity in Agricultural Soil and Plants: Ecological Risks and Human Health Implications. Toxics, 9(3), 1–
34. doi: 10.3390/TOXICS9030042
 Algattawi, A. A., Fayez-Hassan, M., & Khalil, E. (2018). Soil contamination with toxic aluminum at Mid
and West Libya. Toxicology International, 25(4), 198–203. doi: 10.18311/ti/2018/v25i4/23743
 Almutairi, F. M., El Rabey, H. A., Alalawy, A. I., Salama, A. A. M., Tayel, A. A., Mohammed, G. M.,
Aljohani, M. M., Keshk, A. A., Abbas, N. H., & Zayed, M. M. (2021a). Application of Chitosan/Alginate
Nanocomposite Incorporated with Phycosynthesized Iron Nanoparticles for Efficient Remediation of
Chromium. Polymers, 13(15). doi: 10.3390/polym13152481
 Almutairi, F. M., El Rabey, H. A., Alalawy, A. I., Salama, A. A. M., Tayel, A. A., Mohammed, G. M.,
Aljohani, M. M., Keshk, A. A., Abbas, N. H., & Zayed, M. M. (2021b). Application of Chitosan/Alginate
Nanocomposite Incorporated with Phycosynthesized Iron Nanoparticles for Efficient Remediation of
Chromium. Polymers 2021, Vol. 13, Page 2481, 13(15), 2481. doi: 10.3390/POLYM13152481
 Anirudhan, T. S., & Sreekumari, S. S. (2011). Adsorptive removal of heavy metal ions from industrial
effluents using activated carbon derived from waste coconut buttons. Journal of Environmental Sciences,
23(12), 1989–1998. doi: 10.1016/S1001-0742(10)60515-3
 Baby, R., Saifullah, B., & Hussein, M. Z. (n.d.). Carbon Nanomaterials for the Treatment of Heavy Metal-
Contaminated Water and Environmental Remediation. doi: 10.1186/s11671-019-3167-8
85
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Badruddoza, A. Z. M., Shawon, Z. B. Z., Tay, W. J. D., Hidajat, K., & Uddin, M. S. (2013).
Fe3O4/cyclodextrin polymer nanocomposites for selective heavy metals removal from industrial
wastewater. Carbohydrate Polymers, 91(1), 322–332. doi: 10.1016/J.CARBPOL.2012.08.030
 Behnajady, M. A., Modirshahla, N., & Hamzavi, R. (2006). Kinetic study on photocatalytic degradation of
C.I. Acid Yellow 23 by ZnO photocatalyst. Journal of Hazardous Materials, 133(1–3), 226–232. doi:
10.1016/J.JHAZMAT.2005.10.022
 Bhattacharyya, K. G., & Gupta, S. Sen. (2011). Removal of Cu(II) by natural and acid-activated clays: An
insight of adsorption isotherm, kinetic and thermodynamics. Desalination, 272(1–3), 66–75. doi:
10.1016/J.DESAL.2011.01.001
 Burachevskaya, M., Mandzhieva, S., Bauer, T., Minkina, T., Rajput, V., Chaplygin, V., Fedorenko, A.,
Chernikova, N., Zamulina, I., Kolesnikov, S., Sushkova, S., & Perelomov, L. (2021). The effect of granular
activated carbon and biochar on the availability of cu and zn to hordeum sativum distichum in
contaminated soil. Plants, 10(5). doi: 10.3390/plants10050841
 Chausali, N., Saxena, J., & Prasad, R. (2021). Nanobiochar and biochar based nanocomposites: Advances
and applications. Journal of Agriculture and Food Research, 5, 100191. doi: 10.1016/J.JAFR.2021.100191
 Choi, K., Lee, S., Park, J. O., Park, J. A., Cho, S. H., Lee, S. Y., Lee, J. H., & Choi, J. W. (2018).
Chromium removal from aqueous solution by a PEI-silica nanocomposite. Scientific Reports 2018 8:1,
8(1), 1–10. doi: 10.1038/s41598-018-20017-9
 Dammak, N., Bel Hadjltaief, H., Hamza, W., & Benzina, M. (2020). Sonosynthesis of Iron-Supported Clay
for Heavy Metal Removal via Sonoassisted Adsorption Process. Arabian Journal for Science and
Engineering, 45(9), 7645–7654. doi: 10.1007/S13369-020-04754-6/FIGURES/4
 Dartan, G., Taşpınar, F., & Toröz, İ. (2015). Assessment of heavy metals in agricultural soils and their
source apportionment: a Turkish district survey. Environmental Monitoring and Assessment, 187(3), 1–13.
doi: 10.1007/S10661-015-4337-5/TABLES/7
 Diallo, M. S., Fromer, N. A., & Jhon, M. S. (2014). Nanotechnology for sustainable development, first
edition. Nanotechnology for Sustainable Development, First Edition, 1–401. doi: 10.1007/978-3-319-
05041-6
 El-Saharty, A. (2018). Effect of Apricot Stone Activated Carbon Adsorbent on the Removal of Toxic
Heavy Metals Ions from Aqueous Solutions. International Journal of Ecotoxicology and Ecobiology, 3(2),
51. doi: 10.11648/j.ijee.20180302.13
 Esmat, M., Farghali, A. A., Khedr, M. H., & El-Sherbiny, I. M. (2017). Alginate-based nanocomposites for
efficient removal of heavy metal ions. International Journal of Biological Macromolecules, 102, 272–283.
doi: 10.1016/J.IJBIOMAC.2017.04.021
 Fan, H. L., Zhou, S. F., Jiao, W. Z., Qi, G. S., & Liu, Y. Z. (2017). Removal of heavy metal ions by
magnetic chitosan nanoparticles prepared continuously via high-gravity reactive precipitation method.
Carbohydrate Polymers, 174, 1192–1200. doi: 10.1016/J.CARBPOL.2017.07.050
 Feizi, M., Jalali, M., & Renella, G. (2018). Nanoparticles and modified clays influenced distribution of
heavy metals fractions in a light-textured soil amended with sewage sludges. Journal of Hazardous
Materials, 343, 208–219. doi: 10.1016/J.JHAZMAT.2017.09.027
 Ge, H., Hua, T., & Chen, X. (2016). Selective adsorption of lead on grafted and crosslinked chitosan
nanoparticles prepared by using Pb2+ as template. Journal of Hazardous Materials, 308, 225–232. doi:
10.1016/J.JHAZMAT.2016.01.042
 Gupta, V. K., Moradi, O., Tyagi, I., Agarwal, S., Sadegh, H., Shahryari-Ghoshekandi, R., Makhlouf, A. S.
H., Goodarzi, M., & Garshasbi, A. (2015). Study on the removal of heavy metal ions from industry waste
by carbon nanotubes: Effect of the surface modification: a review.
Http://Dx.Doi.Org/10.1080/10643389.2015.1061874, 46(2), 93–118. doi: 10.1080/10643389.2015.1061874
 Haider, F. U., Liqun, C., Coulter, J. A., Cheema, S. A., Wu, J., Zhang, R., Wenjun, M., & Farooq, M.
(2021). Cadmium toxicity in plants: Impacts and remediation strategies. Ecotoxicology and Environmental
Safety, 211, 111887. doi: 10.1016/J.ECOENV.2020.111887

86
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Huang, X., Yang, J., Wang, J., Bi, J., Xie, C., & Hao, H. (2018). Design and synthesis of core–shell
Fe3O4@PTMT composite magnetic microspheres for adsorption of heavy metals from high salinity
wastewater. Chemosphere, 206, 513–521. doi: 10.1016/J.CHEMOSPHERE.2018.04.184
 Huang, Y., & Keller, A. A. (2015). EDTA functionalized magnetic nanoparticle sorbents for cadmium and
lead contaminated water treatment. Water Research, 80, 159–168. doi: 10.1016/J.WATRES.2015.05.011
 Ince, M. (2022). Green-synthesis of superparamagnetic Fe 3 O 4 / alginate bio-nanocomposites for heavy
metal contamination removal from industrial wastewater Experimental. 1–18.
 Jiang, J., Pi, J., & Cai, J. (2018). The Advancing of Zinc Oxide Nanoparticles for Biomedical Applications.
Bioinorganic Chemistry and Applications, 2018. doi: 10.1155/2018/1062562
 Jiang, M., Wang, K., Wang, Y., Zhao, Q., & Wang, W. (2022). Technologies for the cobalt-contaminated
soil remediation: A review. Science of The Total Environment, 813, 151908. doi:
10.1016/J.SCITOTENV.2021.151908
 Jiwan, S., & Ajay, K. (2011). Effects of Heavy Metals on Soil, Plants, Human Health and Aquatic Life.
International Journal of Research in Chemistry and Environment, 1(September), 15–21. Retrieved from
www.ijrce.org
 Karnib, M., Kabbani, A., Holail, H., & Olama, Z. (2014). Heavy metals removal using activated carbon,
silica and silica activated carbon composite. Energy Procedia, 50, 113–120. doi: 10.1016/
j.egypro.2014.06.014
 Khoso, W. A., Haleem, N., Anwar Baig, M., & Jamal, Y. (123 C.E.). Synthesis, characterization and heavy
metal removal efficiency of nickel ferrite nanoparticles (NFN’s). Scientific Reports |, 11, 3790. doi:
10.1038/s41598-021-83363-1
 Kirpichtchikova, T. A., Manceau, A., Spadini, L., Panfili, F., Marcus, M. A., & Jacquet, T. (2006).
Speciation and solubility of heavy metals in contaminated soil using X-ray microfluorescence, EXAFS
spectroscopy, chemical extraction, and thermodynamic modeling. Geochimica et Cosmochimica Acta,
70(9), 2163–2190. doi: 10.1016/J.GCA.2006.02.006
 Kloster, G. A., Muraca, D., Moscoso Londoño, O., Pirota, K. R., Mosiewicki, M. A., & Marcovich, N. E.
(2020). Alginate based nanocomposites with magnetic properties. Composites Part A: Applied Science and
Manufacturing, 135, 105936. doi: 10.1016/J.COMPOSITESA.2020.105936
 Kołodyńska, D., Bąk, J., Kozioł, M., & Pylypchuk, L. V. (2017). Investigations of Heavy Metal Ion
Sorption Using Nanocomposites of Iron-Modified Biochar. Nanoscale Research Letters, 12(1), 1–13. doi:
10.1186/S11671-017-2201-Y/FIGURES/10
 Kumar, V., & Chopra, A. K. (2015). Toxicity of Chromium in Agricultural Crops with Respect to its
Chemical Speciation-A Review. World Applied Sciences Journal, 33(6), 944–969. doi:
10.5829/idosi.wasj.2015.33.06.9533
 Kumari, A., Kumari, P., Rajput, V. D., Sushkova, S. N., & Minkina, T. (2022). Metal(loid) nanosorbents in
restoration of polluted soils: geochemical, ecotoxicological, and remediation perspectives. Environmental
Geochemistry and Health, 44(1), 235–246. doi: 10.1007/s10653-021-00996-x
 Lamine, S., Petropoulos, G. P., Brewer, P. A., Bachari, N. E. I., Srivastava, P. K., Manevski, K.,
Kalaitzidis, C., & Macklin, M. G. (2019). Heavy Metal Soil Contamination Detection Using Combined
Geochemistry and Field Spectroradiometry in the United Kingdom. Sensors (Basel, Switzerland), 19(4),
762. doi: 10.3390/S19040762
 Le, A. T., Pung, S. Y., Sreekantan, S., Matsuda, A., & Huynh, D. P. (2019). Mechanisms of removal of
heavy metal ions by ZnO particles. Heliyon, 5(4), e01440. doi: 10.1016/J.HELIYON.2019.E01440
 Lee, Y. C., Kim, E. J., Ko, D. A., & Yang, J. W. (2011). Water-soluble organo-building blocks of
aminoclay as a soil-flushing agent for heavy metal contaminated soil. Journal of Hazardous Materials, 196,
101–108. doi: 10.1016/J.JHAZMAT.2011.08.077
 Li, L., Iqbal, J., Zhu, Y., Zhang, P., Chen, W., Bhatnagar, A., & Du, Y. (2018). Chitosan/Ag-
hydroxyapatite nanocomposite beads as a potential adsorbent for the efficient removal of toxic aquatic
pollutants. International Journal of Biological Macromolecules, 120, 1752–1759. doi: 10.1016/ J.
IJBIOMAC. 2018.09.190
87
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Liu, Y., Huang, J., Xu, H., Zhang, Y., Hu, T., Chen, W., Hu, H., Wu, J., Li, Y., & Jiang, G. (2020). A
magnetic macro-porous biochar sphere as vehicle for the activation and removal of heavy metals from
contaminated agricultural soil. Chemical Engineering Journal, 390, 124638. doi:
10.1016/J.CEJ.2020.124638
 Long, Z., Zhu, H., Bing, H., Tian, X., Wang, Z., Wang, X., & Wu, Y. (2021). Contamination, sources and
health risk of heavy metals in soil and dust from different functional areas in an industrial city of Panzhihua
City, Southwest China. Journal of Hazardous Materials, 420, 126638. doi:
10.1016/J.JHAZMAT.2021.126638
 Luo, X., Lei, X., Cai, N., Xie, X., Xue, Y., & Yu, F. (2016). Removal of heavy metal ions from water by
magnetic cellulose-based beads with embedded chemically modified magnetite nanoparticles and activated
carbon. ACS Sustainable Chemistry and Engineering, 4(7), 3960–3969. doi:
10.1021/ACSSUSCHEMENG.6B00790/SUPPL_FILE/SC6B00790_SI_001.PDF
 Mahdavi, S., Jalali, M., & Afkhami, A. (2014). Heavy metals removal from aqueous solutions by Al2O3
nanoparticles modified with natural and chemical modifiers. Clean Technologies and Environmental
Policy, 17, 85–102. doi: 10.1007/s10098-014-0764-1
 Mahmoud, M. E., Abdou, A. E. H., Sobhy, M. E., & Fekry, N. A. (2017). Solid–solid crosslinking of
carboxymethyl cellulose nanolayer on titanium oxide nanoparticles as a novel biocomposite for efficient
removal of toxic heavy metals from water. International Journal of Biological Macromolecules, 105, 1269–
1278. doi: 10.1016/J.IJBIOMAC.2017.07.156
 Mahmoud, M. E., Osman, M. M., Yakout, A. A., & Abdelfattah, A. M. (2018). Water and soil
decontamination of toxic heavy metals using aminosilica-functionalized-ionic liquid nanocomposite.
Journal of Molecular Liquids, 266, 834–845. doi: 10.1016/J.MOLLIQ.2018.06.055
 Medina-Pérez, G., Fernández-Luqueño, F., Vazquez-Nuñez, E., López-Valdez, F., Prieto-Mendez, J.,
Madariaga-Navarrete, A., & Miranda-Arámbula, M. (2019). Remediating polluted soils using
nanotechnologies: Environmental benefits and risks. Polish Journal of Environmental Studies, 28(3), 1013–
1030. doi: 10.15244/pjoes/87099
 Moreno-Sader, K., García-Padilla, A., Realpe, A., Acevedo-Morantes, M., & Soares, J. B. P. (2019).
Removal of Heavy Metal Water Pollutants (Co2+ and Ni2+) Using Polyacrylamide/Sodium
Montmorillonite (PAM/Na-MMT) Nanocomposites. ACS Omega, 4(6), 10834–10844. doi:
10.1021/ACSOMEGA.9B00981/ASSET/IMAGES/ACSOMEGA.9B00981.SOCIAL.JPEG_V03
 Motshekga, S. C., Ray, S. S., Onyango, M. S., & Momba, M. N. B. (2015). Preparation and antibacterial
activity of chitosan-based nanocomposites containing bentonite-supported silver and zinc oxide
nanoparticles for water disinfection. Applied Clay Science, 114, 330–339. doi:
10.1016/J.CLAY.2015.06.010
 Murugesan, S., & Scheibel, T. (2021). Chitosan-based nanocomposites for medical applications. Journal of
Polymer Science, 59(15), 1610–1642. doi: 10.1002/POL.20210251
 Nicola, R., Costişor, O., Ciopec, M., Negrea, A., Lazău, R., Ianăşi, C., Picioruş, E. M., Len, A., Almásy, L.,
Szerb, E. I., & Putz, A. M. (2020). Silica-coated magnetic nanocomposites for Pb2+ removal from aqueous
solution. Applied Sciences (Switzerland), 10(8). doi: 10.3390/APP10082726
 Obeng, A., Hanyabui, E., & Asiamah, J. (2018). Remediation Technology for Copper Contaminated Soil: A
Review. 1–7. doi: 10.9734/ASRJ/2018/4532
 Padervand, M., & Gholami, M. R. (2013). Removal of toxic heavy metal ions from waste water by
functionalized magnetic core-zeolitic shell nanocomposites as adsorbents. Environmental Science and
Pollution Research, 20(6), 3900–3909. doi: 10.1007/s11356-012-1333-y
 Pathania, D., & Srivastava, A. K. (2020). Advances in nanoparticles tailored lignocellulosic biochars for
removal of heavy metals with special reference to cadmium (II) and chromium (VI). Environmental
Sustainability 2020 4:2, 4(2), 201–214. doi: 10.1007/S42398-020-00142-W
 Prasad, S., Yadav, K. K., Kumar, S., Gupta, N., Cabral-Pinto, M. M. S., Rezania, S., Radwan, N., & Alam,
J. (2021). Chromium contamination and effect on environmental health and its remediation: A sustainable
approaches. Journal of Environmental Management, 285. doi: 10.1016/J.JENVMAN.2021.112174
88
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 R, T. (2015). Metal Oxide Nano-particles as an Adsorbent for Removal of Heavy Metals. Journal of
Advanced Chemical Engineering, 5(3). doi: 10.4172/2090-4568.1000125
 Raffa, C. M., Chiampo, F., & Shanthakumar, S. (2021). Remediation of Metal/Metalloid-Polluted Soils: A
Short Review. Applied Sciences 2021, Vol. 11, Page 4134, 11(9), 4134. doi: 10.3390/APP11094134
 Rajput, V. D., Minkina, T., Kumari, A., Shende, S. S., Ranjan, A., Faizan, M., Barakvov, A., Gromovik, A.,
Gorbunova, N., Rajput, P., Singh, A., Khabirov, I., Nazarenko, O., Sushkova, S., Kızılkaya, R., Rajput, V.
D., Minkina, T., Kumari, A., Shende, S. S., … Kızılkaya, R. (2022). A review on nanobioremediation
approaches for restoration of contaminated soil. Eurasian Journal of Soil Science, 11(1), 43–60. doi:
10.18393/EJSS.990605
 Saad, A. H. A., Azzam, A. M., El-Wakeel, S. T., Mostafa, B. B., & Abd El-latif, M. B. (2018). Removal of
toxic metal ions from wastewater using ZnO@Chitosan core-shell nanocomposite. Environmental
Nanotechnology, Monitoring & Management, 9, 67–75. doi: 10.1016/J.ENMM.2017.12.004
 Saini, J., Garg, V. K., & Gupta, R. K. (2020). Green synthesized SiO2@OPW nanocomposites for
enhanced Lead (II) removal from water. Arabian Journal of Chemistry, 13(1), 2496–2507. doi:
10.1016/J.ARABJC.2018.06.003
 Sari, A., & Tuzen, M. (2014). Cd(II) adsorption from aqueous solution by raw and modified kaolinite.
Applied Clay Science, 88–89, 63–72. doi: 10.1016/J.CLAY.2013.12.021
 Sheet, I., Kabbani, A., & Holail, H. (2014). Removal of heavy metals using nanostructured graphite oxide,
silica nanoparticles and silica/graphite oxide composite. Energy Procedia, 50, 130–138. doi:
10.1016/J.EGYPRO.2014.06.016
 Shen, J., Song, L., Müller, K., Hu, Y., Song, Y., Yu, W., Wang, H., & Wu, J. (2016). Magnesium
Alleviates Adverse Effects of Lead on Growth, Photosynthesis, and Ultrastructural Alterations of Torreya
grandis Seedlings. Frontiers in Plant Science, 7(NOVEMBER2016). doi: 10.3389/FPLS.2016.01819
 Shukla, E. A., Matsue, N., Henmi, T., & Johan, E. (2011). Arsenate Adsorption Mechanism on Nano-ball
Allophane by Langmuir Adsorption Equation. Environmental Research, Engineering and Management ,
58(4), 5–9. doi: 10.5755/J01.EREM.58.4.395
 Somu, P., & Paul, S. (2018). Casein based biogenic-synthesized zinc oxide nanoparticles simultaneously
decontaminate heavy metals, dyes, and pathogenic microbes: a rational strategy for wastewater treatment.
Journal of Chemical Technology & Biotechnology, 93(10), 2962–2976. doi: 10.1002/JCTB.5655
 Suman, Kardam, A., Gera, M., & Jain, V. K. (2014). A novel reusable nanocomposite for complete removal
of dyes, heavy metals and microbial load from water based on nanocellulose and silver nano-embedded
pebbles. Http:// Dx.Doi.Org/ 10.1080/09593330.2014.959066, 36(6), 706–714. doi: 10.1080/ 09593330.
2014.959066
 Talbot, D., Abramson, S., Griffete, N., & Bée, A. (2018). pH-sensitive magnetic alginate/γ-Fe2O3
nanoparticles for adsorption/desorption of a cationic dye from water. Journal of Water Process Engineering,
25, 301–308. doi: 10.1016/J.JWPE.2018.08.013
 Tayeb, A. H., Amini, E., Ghasemi, S., & Tajvidi, M. (2018). Cellulose Nanomaterials—Binding Properties
and Applications: A Review. Molecules : A Journal of Synthetic Chemistry and Natural Product Chemistry,
23(10). doi: 10.3390/MOLECULES23102684
 Tchounwou, P. B., Yedjou, C. G., Patlolla, A. K., & Sutton, D. J. (2012). Heavy Metals Toxicity and the
Environment. EXS, 101, 133. doi: 10.1007/978-3-7643-8340-4_6
 Thakur, S., Pandey, S., & Arotiba, O. A. (2016). Development of a sodium alginate-based
organic/inorganic superabsorbent composite hydrogel for adsorption of methylene blue. Carbohydrate
Polymers, 153, 34–46. doi: 10.1016/J.CARBPOL.2016.06.104
 Venkatachalam, P., Jayaraj, M., Manikandan, R., Geetha, N., Rene, E. R., Sharma, N. C., & Sahi, S. V.
(2017). Zinc oxide nanoparticles (ZnONPs) alleviate heavy metal-induced toxicity in Leucaena
leucocephala seedlings: A physiochemical analysis. Plant Physiology and Biochemistry, 110, 59–69. doi:
10.1016/J.PLAPHY.2016.08.022

89
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Wang, B., Wan, Y., Zheng, Y., Lee, X., Liu, T., Yu, Z., Huang, J., Ok, Y. S., Chen, J., & Gao, B. (2018).
Alginate-based composites for environmental applications: a critical review.
Https://Doi.Org/10.1080/10643389.2018.1547621, 49(4), 318–356. doi: 10.1080/10643389.2018.1547621
 Wang, L., Tai, P., Jia, C., Li, X., Li, P., & Xiong, X. (2015). Magnesium Contamination in Soil at a
Magnesite Mining Region of Liaoning Province, China. Bulletin of Environmental Contamination and
Toxicology, 95(1), 90–96. doi: 10.1007/S00128-015-1530-8
 Wu, B., Wang, Z., Peng, D., Wang, Y., He, T., Tang, H., & Xu, H. (2020). Removal and recovery of heavy
metals from soil with sodium alginate coated FeSSi nanocomposites in a leaching process. Journal of
Hazardous Materials, 398. doi: 10.1016/J.JHAZMAT.2020.122732
 Wu, Y., Pang, H., Liu, Y., Wang, X., Yu, S., Fu, D., Chen, J., & Wang, X. (2019). Environmental
remediation of heavy metal ions by novel-nanomaterials: A review. Environmental Pollution, 246, 608–
620. doi: 10.1016/J.ENVPOL.2018.12.076
 Wuana, R. A., & Okieimen, F. E. (2011a). Heavy Metals in Contaminated Soils: A Review of Sources,
Chemistry, Risks and Best Available Strategies for Remediation. ISRN Ecology, 2011, 402647. doi:
10.5402/2011/402647
 Wuana, R. A., & Okieimen, F. E. (2011b). Heavy Metals in Contaminated Soils: A Review of Sources,
Chemistry, Risks and Best Available Strategies for Remediation. ISRN Ecology, 2011, 1–20. doi:
10.5402/2011/402647
 Wyszkowska, J., Boros, E., & Kucharski, J. (2007). Effect of interactions between nickel and other heavy
metals on the soil microbiological properties. Plant, Soil and Environment, 53(12), 544–552. doi:
10.17221/2190-pse
 Xiao, R., Wang, S., Li, R., Wang, J. J., & Zhang, Z. (2017). Soil heavy metal contamination and health
risks associated with artisanal gold mining in Tongguan, Shaanxi, China. Ecotoxicology and Environmental
Safety, 141, 17–24. doi: 10.1016/J.ECOENV.2017.03.002
 Yadav, V. B., Gadi, R., & Kalra, S. (2019). Clay based nanocomposites for removal of heavy metals from
water: A review. Journal of Environmental Management, 232, 803–817. doi: 10.1016/
J.JENVMAN.2018.11.120
 Yu, G., Wang, X., Liu, J., Jiang, P., You, S., Ding, N., Guo, Q., & Lin, F. (2021). Applications of
nanomaterials for heavy metal removal from water and soil: A review. Sustainability (Switzerland), 13(2),
1–14. doi: 10.3390/su13020713
 Zaborowska, M., Kucharski, J., & Wyszkowska, J. (2016). Biological activity of soil contaminated with
cobalt, tin, and molybdenum. Environmental Monitoring and Assessment, 188(7). doi: 10.1007/S10661-
016-5399-8
 Zhao, L., Yang, S., Yilihamu, A., Ma, Q., Shi, M., Ouyang, B., Zhang, Q., Guan, X., & Yang, S. T. (2019).
Adsorptive decontamination of Cu2+-contaminated water and soil by carboxylated graphene
oxide/chitosan/cellulose composite beads. Environmental Research, 179, 108779. doi: 10.1016/
J.ENVRES.2019.108779
 Zhu, H., Jia, S., Wan, T., Jia, Y., Yang, H., Li, J., Yan, L., & Zhong, C. (2011). Biosynthesis of spherical
Fe3O4/bacterial cellulose nanocomposites as adsorbents for heavy metal ions. Carbohydrate Polymers,
86(4), 1558–1564. doi: 10.1016/J.CARBPOL.2011.06.061

AUTHOR DETAILS:
RAJNI KUMARI, MANVENDER SINGH AND VIKAS DHULL*
Department of Biotechnology Engineering, University Institute of Engineering & Technology, Maharishi
Dayanand University, Rohtak- 124001, Haryana, India

90
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

THE LEGAL ASPECTS OF SPYWARE SURVEILLANCE IN INDIA – THE PEGASUS CHALLENGE

MR. AMONKAR VASSUDEV ANANT SINAI AND DR. NAGESH COLVALKAR

ABSTRACT
This article attempts to understand the premise of Computer Surveillance and the use of Spyware
Pegasus developed by the Israeli cyber arms firm NSO Group Technologies in surveillance across the world to
keep a track on the user’s mobile/cell-phone device.
It is against this backdrop that this article attempts to examine, how the Pegasus spyware infects a device and
what data may be compromised, the effects of Pegasus Spyware in India and the present Indian Legal remedies
available for addressing the issues arising in the event of breach of user’s privacy and personal data . For this
purpose the present article has used secondary data from books, articles, journals, newspapers, online
publications, etc.
Keywords: Computer Surveillance, Spyware, Pegasus, Data Protection, Privacy, Digitalisation.

INTRODUCTION
In the present age of Internet and Digitisation, Spyware is playing a pivotal role in surveillance across the
world. Spyware has been considered to be a key software in this area since it's deemed to be very significant to
monitor and target users generally having links to criminal or terrorist activities. Though this use of a Spyware
appears vital from the National safety and security of a country, it’s nefarious and controversial use to monitor
members of society or protestors or important persons poses a challenge, as through cyberwar or
cyberattack based on such surveillance the entire political system of a country can be manipulated.
The current spread of the pandemic has hastened and highlighted the ever-increasing need for a virtual and
digital world but Spyware attacks prove to be a bane to the advancement of this technology. When
governments, ruling parties, political executives, or corporations start withholding and using that data in
unlawful ways, they hold power grossly disproportionate to that held by regular and ordinary citizens and thus
distort democracy.
The surveillance and monitoring in India by Spyware counters the lawfully laid out system of authorized legal
surveillance that may be mandated by demands of national security and safety. With the advancement of
technology, it is becoming easier for the governments and private agencies to look into the private lives of
individuals. In addition to this, the fine line between reasonable surveillance and data collection is blurred as the
government and other authorities tend to infringe upon these rights on the alleged reason of terrorism or national
security.
There is thus a strong need to provide clarity on existing laws and adopt better laws that would deal with
protection against such unauthorized surveillance, data protection and privacy.
Unfortunately at present in India there is lack of an adequate legal standing on this and concerns regarding the
violation of certain fundamental rights conferred upon the citizens also come into play, moreso since the
Spyware software is purportedly used for the purposes of surveillance and intelligence gathering, which requires
tapping into the devices of individuals, gathering the data contained therein. Though the primary object of the
Spyware is for tracking terrorists and criminals but the recent news reports indicate that this was used by some
governments to spy on its citizens. The Spyware software has the ability to intercept and transmit various
aspects of the mobile device including the messages, emails, photos and videos, contacts, calendar, camera,
GPS Data etc.
What is a Spyware
Spyware is a kind of malware intended to be primarily used to spy on the activity of a user on a computer.
Spyware is meant to gather information on users’ habits viz. browsed Web sites, accessed applications,
downloaded programs, etc.
This information is then sent back to the perpetrator, so he or she knows what attacks can be perpetrated on a
system. Spyware can have even more direct and grave effects, like stealing of passwords and even credit card
information. This type of information can lead to direct financial benefits to the perpetrator. Spyware generally
does not spread from infected system to other infected system. It is usually, downloaded from a web site or

91
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

server that the user is tricked to believe contains beneficial software. In fact, many times, spyware is bundled in
a download with a legitimate software.
Distinction between Spyware and Adware:
Spyware many a times also includes or facilitates download of Adware
Sometimes the purpose of generating a virus attack by the perpetrator is not limited only to cause harm and
damage to the victim, but to earn monetary benefits. Spyware and adware have become lucrative business for
those who have tried it and were successful at it. Adware is a Spyware program designed to monitor the users’
Web browsing habits and then market relevant advertisements to these users based on their browsing history,
which generate marketing revenue to the perpetrator.
Some adware programs display unsolicited advertisements and then trick or force the user to click on them.
Some even get self-activated.
Unlike Spyware, Adware programs do not spread like viruses do, they are generally installed by exploiting
known website security holes or are sometimes packaged with software that the end user downloads and installs
onto a computer system.
While Spyware programs are normally installed as Trojan horses, meaning the user believes that genuine
software is being installed that does a specific function, but in the background, other undetected functions are
taking place. Adware on the other hand exploits and obtains user information by analysing what sites the user
has visited and the browsing habits of the user, it then invades the user’s privacy further by not only using that
information to market products to the user, but many a times also avoiding deletion or removal of the adware
itself so that the user cannot remove it.
Interestingly, Spyware differs from standard computer viruses in that their creators represent themselves openly
as businesses, whether legitimate or not.
What is Pegasus
Pegasus is a understood to be the Spyware developed by the Israeli cyber arms firm NSO Group Technologies
(“NSO”) to keep a track on the user’s mobile/cell-phone device. In this spyware, a link is generated and sent to
the targeted individual and as soon as the targeted individual opens that link, malware is downloaded in the
device which allows surveillance on the targeted individual. Allegedly, an updated version of the same is
supposed to be more powerful and destructive and does not even require the user’s interference.
As per NSO, the spyware was created to keep an eye on the terrorist activities and other criminals and the NSO
works with the governments of various countries and law enforcement agencies to conduct such activities. The
Citizen Lab, based in the University of Toronto, has stated that Pegasus Spyware exploits the security feature of
the mobile/cell-phone device and it penetrates the targeted individual’s device without his knowledge.
This kind of exploitation is known as “Zero-Day exploit” it means that it is an unknown vulnerability of which
the targeted individual and not even the manufacturer is aware of and hence it becomes difficult to fix such
issues in a device. Information of this particular spyware first emerged when a Human Rights activist was
targeted through SMS links on his mobile phone. There have been various such incidents in Israel itself but it
was through the law suit filed by WhatsApp that the gravity of the situation came to light.
The suit was filed in California Court against the NSO Group Technologies wherein Whatsapp alleged that the
spyware Pegasus created and used by the NSO was used to hack the phone systems of 1,400 users across
various countries in the world. It has also alleged that such users were mostly civil members of the society,
journalists and Human Rights defenders from almost twenty countries.
How Pegasus Spyware Infects a Device and What Data May be Compromised
As we have seen, Pegasus is a spyware used for surveillance on the targeted individual. It has been claimed that
even a simple missed video call on WhatsApp could give Pegasus complete access to the targeted individual’s
mobile/cell-phone device. It enables the opening up of the mobile/cell-phone device and the operator installing
the spyware on the device without the targeted individual’s knowledge. This results in the perpetrator accessing
the targeted individual’s data including location, passwords, contacts, calendar events, text messages and even
live voice calls from messaging apps.
It is given to understand that Pegasus is capable of surveillance on three levels, i.e. initial data extraction,
passive monitoring and active collection.

92
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The Pegasus software can take control of a mobile/cell-phone device running on iOS, Android and even
BlackBerry operating systems.
What is even more frightening is that, it leaves no trace on the device, consumes minimal battery, memory and
data consumption and comes with a self-destruct option that can be used any time. It is believed to be one of the
most powerful mobile phone hacking tools presently available, Pegasus enables its clients to secretly read every
message of a target, track their location, operate their microphone and even film them through their own
mobile/cell-phone device camera remotely.
However this is not the first time such misuse of the software has come to light. Similar surveillance activities
were reported in 2019 as well and it is alleged that in India over two dozen Indian academics, lawyers,
journalists and dalit activists are believed to have been targeted in 2019. Thus, Pegasus is now at the centre of
global interest and investigation that has found that the spyware was used to target, among others, hundreds of
mobile phones in India.
Effects of Pegasus Spyware in India
It was on July 19, 2021 that India was rudely awaken to explosive revelations by a consortium of news
publications about eminent politicians, journalists, activists, and bureaucrats allegedly being under illegal
surveillance using the spyware Pegasus. These claims were based on a document leaked to a Paris based non-
profit media, Forbidden Stories and Amnesty International, which collaborated with a clutch of various other
media companies, to analyse and publish the list which allegedly contained 50,000 telephone numbers of people
identified as potential targets via use of Pegasus between 2016 and June 2021. This list included names of
prominent business executives, human rights activists, journalists and politicians and government officials,
including heads of state, prime ministers, cabinet ministers, diplomats, military and security officers, including
over 300 people who were Indian politicians, activists, business persons and journalists. The NSO though, has
denied that such a list exists buat has however said that the spyware is only meant for use in fighting crime and
that it is exported only after obtaining the approval of Israel's defence ministry.
The Indian Legal Perspective
In Indian various human rights and activists' groups have alleged that the use of Pegasus spyware is being made
for mass surveillance, which is being done by unknown organizations and government agencies possibly with
the intention of furthering their political motives and limiting voices of criticism and opposition that could be
raised against the government. This it is said is being done without any proper legal or statutory support and
leads to a violation of the fundamental right of freedom of speech and expression, among other illegal activities.
It is thus, significant to understand the basic laws applicable in India involved in such a scenario.
The Information Technology Act, 2000 (as amended by the Information Technology Act, 2008) ( hereinafter
the “IT Act”) is the primary law relating to activities conducted online or through digital space.
Section 69 of the IT Act confers upon the Central or State Government with the power to "intercept, monitor
and decrypt" any information on a computer resource. This however needs to be done for the purpose of
protecting the security interests of the country, sovereignty and integrity of India, the security of the State and
friendly relations with foreign states or public order or for preventing incitement to the commission of an
offence.
Sections 43 and 66 of the IT Act, criminalises any act of unauthorised access to the computer and even the
Government is included under these provisions.
The Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of
Information), Rules 2009 (hereinafter the “Said Rules”) provides for the meaning of interception, monitoring
and decryption.
“Interception”, as per Section 2(i) of the said rules can be done by any manner including by using interception
devices, whereas as per Section 2(o) of the said rules “Monitoring” can be done only by using monitoring
devices as defined under Section 2(p) of the said rules. “Decryption” as per Section 2(f) of the said rules means
the process of conversion of information in non-intelligible form to intelligible form via a mathematical
formula, code, password or algorithm or a combination thereof.
Rule 4 of the said rules provides that ‘the competent authority may authorise an agency of the Government to
intercept, monitor or decrypt information generated, transmitted, received or stored in any computer resource
for the purpose specified in sub-section (1) of Section 69 of the Information Technology Act, 2000.

93
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Interception and monitoring can also fall under the ambit of "hacking". Though the term Hacking is not
specifically defined, in simple terms Hacking’ means destruction or alteration of any information residing in
computer resource. Interestingly however, software such as Pegasus would not be able to strictly fall within the
definition of "interception devices" or "monitoring devices" in terms of Section 2(m) and 2(p) of the said rules.
Nevertheless, in order to exercise surveillance powers, there are some conditions that need to be complied with
as per the Said Rules –
 Prior written permission needs to be obtained by the relevant government agency by means of a reasoned
Order of the necessary authority of the State or Central Government. (Rule 3 of the Said Rules).
 Such an order can be in force for only 60-180 days.( Rule 11 of the Said Rules)
 Additionally, a review Committee needs to be set up by the Government which is supposed to review the
Orders and regularly take stock and record filings on the validity of such orders.( Rule 22 of the Said Rules).
Thus, a bare perusal of the Said Rules shows that these steps only need to be taken in urgent circumstances and
not in daily situations.
Section 5(2) of the Indian Telegraph Act, 1885, permits the Central or State Government to intercept a
message or class of messages in the interest of India's sovereignty and integrity, security, friendly foreign
relations and preventing the incitement of illegal acts. A Proviso to Section 5(2) provides that press messages
intended to be published in India of correspondents accredited to the Central or State Government shall not be
intercepted or detained, unless such transmission has been prohibited under this sub-section , this measa that
even this lawful interception cannot take place against journalists.
Further, the concept of “Privacy” has been persistently argued on and emphasized by the citizens as a
fundamental right and thereby that surveillance and phone tapping done without a legal authority and reason
infringe upon these basic fundamental rights.
The right to privacy with respect to surveillance first came to be argued in PUCL v. Union of India in 1996. In
this case, PUCL challenged the validity of Section 5(2) of the IT Act, 1885 that permits interception by
authorised agencies. Although, the Supreme Court did not strike down the provision as unconstitutional it
however emphasised on the right to privacy and stated that interception by a public authority should be done on
two primary conditions, i.e., 'public emergency' and 'interest of public safety'.
In 2017, the PUCL judgment was upheld in the Supreme Court in the case of K S Puttaswamy & Anr. v.
Union of India & Ors. In this case, the Right to Privacy was held to be a fundamental right and the Court
emphasised on the principle that "Privacy is the ultimate expression of the sanctity of the individual". It
additionally noted that any restriction on the right to privacy must satisfy the "principle of proportionality and
legitimacy".
The above being the present legal position in India, ironically none of these circumstances satisfied the need for
a surveillance mechanism such as Pegasus, and as such this in turn has further raised various questions
including the safety of digital users in India and the liability of the Government in terms of data being under
surveillance and bolstered the need for a strong Privacy Protection Regime and a Data Protection Act that would
preserve and protect the rights of the citizens and hold any organization, entity person or agency that tries to
infringe on these rights, accountable.
Considering thus the criticality of the issue, in the pleas related to reports of alleged snooping by government
agencies on eminent citizens, politicians and scribes by using Israeli firm NSO's spyware Pegasus, the Supreme
Court on 27/10/2021 has appointed a committee of experts (Tenhnical Committee) to inquire into the alleged
use of Israeli spyware Pegasus for surveillance of Indian citizens. It said that the three-member committee will
be headed by former apex court judge RV Raveendran.
Citing national security, the Centre had refused to file a detailed affidavit in the matter.
The said Technical Committee vide its Public Notice has sought information from the people who suspect their
phones were targeted, asking such persons to contact the Committee by January7, 2022 and that the Committee
is ready to examine their phones.
The Pegasus case has thus highlighted how Spywares can breach a user’s privacy and personal data.
Other Spywares Like Pegasus
CVE-2019-11931– After the Pegasus case, WhatsApp was again targeted with another same kind of attack.
This attack prompts the user to download an MP4 file through any contact which would result in breaching the

94
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

security of the device and the spyware will violate the device’s Denial of Services (DoS) and Remote Code
Execution (RCE). This can breach any device’s security without the knowledge of the user.
Cool Web Search – This is a spyware that installs itself on Microsoft Windows based computers. Once
infected it can slow down the speed of the connection of the computer. The pop-ups can further lead to
redirecting the user to other websites and collect private information about the user. It is reported that certain
versions of it can use advertisements to infect the computer and can access the user’s history as well.
Gator– It was considered to be a defunct software company known for adware products. It used to download
the user’s software and tracked online user’s browsing habits and patterns. But presently the company emerged
as one of the firsts to track the user’s behavioral pattern on the online platform and uses advertisement using
such patterns for marketing.
Exodus– This is an IOS version and uses phishing traps so that users are aligned to download malicious apps
through which surveillance is possible. It is reported that Apple’s Developer Enterprise Program was used to
infect the devices and legitimately spread the spyware. It could potentially use the user’s device’s photos,
videos, contact list and locations as well.
Dropoutjeep– It was used by the National Security Agency in America to spy on targeted users through their
laptops and mobile devices. It had the capability of spying the files, folders, camera, location, mic, voicemail,
SMSs and contact lists. Without the knowledge of the user, the agency could spy on such a person and access to
location, messages and contacts that are being used.
What Precautions Can One Take
Theoretically, smart cyber hygiene can safeguard against the surveillance and hacking baits. But when
Spywares like Pegasus exploit vulnerability in one’s phone’s operating system, there is nothing one can do to
stop a network injection. Worse, one will not even be aware of it unless the device is scanned at a digital
security lab. Switching to an old handset that allows only basic calls and messages will certainly limit data
exposure, but may not significantly cut down infection risk. Also, any alternative devices used for emails and
apps will remain vulnerable unless one forgoes using those essential services altogether.
Therefore, the option to safeguard is to stay up to date with every operating system update and security patch
released by device manufacturers, and hope that zero-day attacks become rarer. Also, if one has the budget,
changing handsets periodically is perhaps the most effective, but expensive, remedy.
It needs to be noted that since the Spyware resides in the hardware, the attacker will have to successfully infect
the new device every time one changes the device. That may pose both logistical (cost) and technical (security
upgrade) challenges to the attacker, unless the attacker has unlimited resources.
CONCLUSION
With the advancement of technology, it is thus easier for the organizations, governments and private agencies to
snoop into the private lives of individuals. In addition to this, there is no fine line between reasonable
surveillance and data collection as the government and other authorities tend to infringe upon these rights on the
pretext of sovereignty and integrity, security, friendly foreign relations, preventing the incitement of illegal acts,
terrorism and national security.
There is therefore a strong need to provide clarity on existing laws and frame and adopt specific, better and
stronger laws that can deal with Data Protection and Spyware cases like Pegasus and protect the privacy on the
individuals. The advancement of the pandemic has accelerated and highlighted the increasing need for a virtual
and digital world, and with the advancement in information technology, incidents of surveillance are likely to
happen more. It is thus very crucial that there are stringent laws in case of foreign or third party illegal access to
devices and the limitations of spyware control.
The Pegasus case has greatly highlighted the need for regulating the spyware as though the objective is to target
users who are criminals or suspicious of any such activities, spying on innocent individuals as well such as
activists and protestors in a long term may damage the whole structure of democracy and privacy of individuals.
BIBLIOGRAPHY
1. https://www.mondaq.com/india/privacy-protection/1107548/pegasus-and-the-law.
2. https://www.moneycontrol.com/news/india/in-depth-pegasus-spyware-scandal-and-growing-chorus-to-
regulate-private-surveillance-7254741.html.
3. https://www.medianama.com/2020/01/223-pdp-bill-2019-government-surveillance/
4. https://softwarelab.org/what-is-spyware/
95
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

5. https://economictimes.indiatimes.com/tech/trendspotting/what-is-pegasus-spyware-and-how-it-
works/articleshow/84607533.cms
6. https://www.moneycontrol.com/news/india/in-depth-pegasus-spyware-scandal-and-growing-chorus-to-
regulate-private-surveillance-7254741.html.
7. https://www.mondaq.com/india/privacy-protection/1107548/pegasus-and-the-law
8. https://www.theindiaforum.in/article/why-pegasus-snooping-hacking-india-s-democracy
9. https://indianexpress.com/article/explained/pegasus-whatsapp-spyware-israel-india-7410890/
10. https://www.theindiaforum.in/article/why-pegasus-snooping-hacking-india-s-democracy
11. https://www.drishtiias.com/pdf/1627043441-surveillance-laws-in-india-and-privacy.pdf
12. The Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of
Information) Rules 2009.
13. The Information Technology Act, 2000 ( as amended by the Information Technology Act, 2008).
14. The Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of
Information) Rules 2009.
15. Section 5(2) of the Indian Telegraph Act, 1885
16. PUCL v. Union of India (1997) 1 SCC 301.
17. Justice K S Puttaswamy (Retd) & Anr. v. Union of India (2017) 10 SCC 1.
18. https://blog.ipleaders.in/pegasus-case-laws-concerning-spyware-india/
19. https://pib.gov.in/Pressreleaseshare.aspx?PRID=1556945

AUTHOR DETAILS:
1
MR. AMONKAR VASSUDEV ANANT SINAI AND 2DR. NAGESH COLVALKAR
1
Research Scholar & Research Guide
2
Professor, V.M.S. College of Law, Miramar, Panaji– Goa

96
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

A PILOT SURVEY ON UNDER WATERMILL FOR POWER GENERATION TO THE


MECHANICAL DEVICES

GNANAMURUGAN K

ABSTRACT
We are facing a daily reality such that practically 80% of vitality sought after is provided by sources, for
example, flammable gas, coal or oil, which are rapidly winding down. Global arrangements for the atmosphere
control have supported the exploration in the field of Renewable vitality from seas. Along these lines elective
wellspring of vitality will end up being profoundly effective with high vitality thickness, gave affordable and
specialized issues are illuminated. Tidal stream turbines assume a significant job in age of vitality by
inexhaustible sources. They are driven by the dynamic vitality of moving water, the generator is put in moving
water that normally result when water being streaming submerged ebbs and flows far and wide to make this
type of marine sustainable power source worth seeking after. Subsequently, a few showing ventures in tidal
force are booked to catch the tidal created beach front flows. This is promising territory of research and this
audit for the most part centers around the significant and primary undertakings everywhere throughout the
world. It includes the best venture of a 1 MW twin pivotal stream rotor framework, called 'Seagen' which is
introduced. The establishment and testing of 'Seagen' denoted an exceptional advancement in the field of Tidal
stream turbines.
Keywords: Horizontal axis turbine, Marine Current turbine, Seagen, Tidal Stream turbines, Vertical Axis
turbine

1. INTRODUCTION
Sustainable power source age is developing in importance because of the double issues of proceeding with an
Earth-wide temperature boost and national security of electrical flexibly. A generally undiscovered potential
with worldwide potential to flexibly 170 TW of power every year asset is sea vitality. There are adequate
quantities of such quick streaming submerged ebbs and flows far and wide to make this type of marine
sustainable power source worth to be tackled. Tidal stream turbines are depicted as submerged windmills. They
are driven by the dynamic vitality of moving water like the way that breeze turbines utilize moving air. The
generator is set into a marine flow that ordinarily results when water being moved by tidal powers faces, or
moves around, a snag or through a narrowing, for example, an entry between two masses of land. Tidal stream
turbine can significantly help in delivering the vitality close by hand likewise to different advances.

Fig. 1: Scenary view on Underwater Windmill


The main seaward tidal stream turbine was introduced by analysts on Monday. The rotor utilizes the intensity of
the tides to produce power on the English coast. Simply the start: The principal "ranch" of tidal turbines could
jump up off the English coast inside years. Taking a windmill, turning it on its side and sinking it in the sea is
worth amazing. That, as a result, is the thing that done by engineers in the Bristol Channel in England. The
point is to outfit the vitality the tide delivers day in, day out. On Monday, the world's first model tidal vitality
turbine was propelled. The "Ocean stream" establishment was incorporated with the seabed around one and a
97
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

half kilometers (one mile) off the Devon coast. Over the surface, just a white and red-striped pinnacle is
obvious. Underneath, 20 meters down, the single 11-meter long rotor goes up to 17 and a half times each
moment at a greatest speed of 12 meters for every second, drawing vitality from the water. The "Ocean stream"
establishment was incorporated with the seabed around one and a half kilometers (one mile) off the Devon
coast. Over the surface, just a white and red-striped pinnacle is noticeable. Underneath, 20 meters down, the
single 11-meter long rotor goes up to 17 and a half times each moment at a most extreme speed of 12 meters for
every second, drawing vitality from the water.
2. TECHNOLOGY IN TIDAL RANGE
Tides assume a urgent job in power age. In-stream tidal gadgets are intended to catch the even movement of the
tide, tidal range innovation misuses the vertical movement of the tidal cycle. A dam is built over a cove or
estuary which encounters an enormous tidal range. Conduit doors at the dam base control liquid stream; these
are kept shut until an adequate head is developed over the dam divider. The doors are opened and water streams
from the high side to the low side and in doing so goes through turbines which turn to deliver power. Force is
produced following both the flood and ebb tides with the elevated water being on the sea side of the dam during
flood tides and water being held inside the narrows during the ebb tide. Minor departure from the plan
incorporate tidal ponds, reefs and tidal wall, all of which works utilizing a similar rule. The Tidal level and
Parameter description are as the customary ascent and fall of the water level of the sea is primarily brought
about by gravitational and outward powers which are an aftereffect of the nearness of the Earth to the Moon and
the Sun. At the point when the water streams towards the shore it is known as a flood tide while the retreating
water is known as the ebb tide. This happens on in any event a diurnal (regular routine) in every aspect of the
world and for waterfront regions in northwest Europe the tide displays unequivocally semi-diurnal (twice day
by day) conduct. Elevated tide on earth happens "in line" with the Moon and alternately low tide is + competent
at +/−90° comparative with the Moon. At the point when the Earth, Moon and Sun framework is in arrangement
the gravitational impacts of the Moon and Sun are joined to shape a high tidal range (a spring tide), when the
Moon and Sun are at 90˚ to each other, as saw from Earth, the gravitational impacts of the Moon are checked by
those from the Sun, prompting an extraordinarily low tidal range.
A. Principle
A progression of liquid moves a lot of sharp edges making mechanical vitality which is then changed over to
electrical vitality. They are similarly problematic for preservationists, as wind turbines intrude on flying
creature flights similarly as water turbines can upset submerged life. One preferences water turbine appreciate
over different wellsprings of sustainable power source is an anticipated tide table. Sea vitality gadget deals with
indistinguishable standards from a windmill, where enormous submerged rotors, molded like propellers, are
driven by the colossal mass of streaming water to be found at specific places in the ocean. The innovation
comprises of rotors mounted on steel heaps (cylindrical steel segments) set into an attachment penetrated in the
seabed. The rotors are driven by the progression of water similarly that windmill rotors are driven by the breeze,
the principle distinction being that water is in excess of multiple times as thick as air, so very moderate speeds
in water will create huge measures of intensity. The vitality created, being gotten from tides has the additional
noteworthy favorable position of being unsurprising.
B. Working of Under Water Windmill
In Underwater windmill the tides push water against the sharp edge, making them turn. These turbines can be
set in normal waterways, for example, harbors and tidal ponds that normally include quick moving progressions
of water. These turbines must have the option to turn 180 degrees to suit the back and forth movement of tides,
as exhibited by the Sea Gen model turbine in Ireland. As the edges turn, a gearbox turns an enlistment
generator, which creates an electric flow. Notwithstanding being inexhaustible, another key preferred position
of sea power is that it's dependable and unsurprising, said Daniel England, an examiner at Green tech
submerged breeze factory.
C. Turbine Technology and Concepts
The bridling of the vitality in a tidal stream requires the change of dynamic vitality in a moving liquid, for this
situation water, into the movement of a mechanical framework, which would then be able to drive a generator.
It isn't excessively astonishing, in this way, that numerous engineers propose utilizing innovation that reflects
what has been effectively used to saddle the breeze, which is additionally a moving liquid. In this way, most
gadgets can be portrayed as having a place with three central sorts:

98
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

These are
 Horizontal hub frameworks that has been introduced in the Bristol Channel among England and Wales, or in
Hammerfest Strom, in Norway.
 Vertical hub frameworks, for example, the gadget that was tried in the Strait of Messina among Sicily and
the Italian territory.
 Variable foil frameworks, for example, the gadget that has been tried in Yell Sound in Shetland, which
misleads the North of Scotland and Orkney.

Fig. 2: Tidal turbine Fundamental types


D. The Marine Current Turbine (MCT) Venture
Figure shows half and half delineations of the Seaflow turbine. It has a solitary 11 m distance across rotor, with
full range pitch control, and is introduced in a mean profundity of seawater of 25 m roughly. It has surpassed its
300 kW appraised power under good stream conditions with a 15 rpm rotor speed.

Fig.3: Hybrid & Seagen illustration of Seaflow turbine


A key element is that it is mounted on a steel rounded heap, 2.1 m in distance across, set in an opening
penetrated in the seabed and sufficiently tall to consistently extend over the outside of the ocean. The whole
rotor and force framework can be genuinely raised up the heap over the surface to encourage support or fixes
from a pontoon. MCT Second task was Seagen. The Seagen turbine has its rotors mounted at the external parts
of the bargains of smoothed out wing-like arms anticipating either side of the supporting heap. Every rotor
drives a force train comprising of a gearbox and generator each appraised at around 500 kW. The complete
appraised power is roughly 1 MW. Basically the Seagen turbine creates multiple times the intensity of Seaflow.
The Seagen venture will be trailed by a variety of comparative frameworks (ranch) to be introduced in a vast
ocean area. Three turbines will be added to give a complete limit up to 5 MW.
E. Tidal Stream Energy Project
The Tidal Stream Energy Project (UK). The Tidal Stream turbine is appeared in Fig.7. This setup is intended for
the site of Pentland Firth between the North of Scotland and the Orkney Islands. In the main structure, the twin
turbine conveys two 20 m rotors, is evaluated at 1-2 MW relying upon ebb and flow speed, and works in 30-50
m water profundities. Every rotor runs in clean water upstream of its help arm. The seabed jetty is presently
appeared with a gravity base, and the swinging arm rotating conjuncture is joined to the base by a three-hub turn
get together. The swinging arm is pivoted at its upper end to the fundamental fight float with the goal that it

99
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig.4: Tidal stream Energy


very well may be stowed effectively for establishment/evacuation. During activity it is held set up by a
wrenched swagger. In the present plan of Pentland Firth turbine, the 60 m profound water stream is secured by
four 20 m rotors instead of a couple, so as to keep cutting edge stacks inside viable cutoff points. The entire
turbine power yield is 4 MW. When turned over into its support position, the fundamental swing-arm can be
stowed for glide out expulsion/establishment.
F. Vertical Axis Turbine
Vertical pivot turbines that work in marine flows depend on indistinguishable standards from the land based
Darrieus turbine. The Darrieus turbine is a cross stream machine, whose hub of revolution meets the
progression of the working liquid at right edges. The vertical pivot configuration allows the bridling of tidal
stream from any course, encouraging the extraction of vitality not just in two ways, the approaching and active
tide, however utilizing the full tidal oval of the stream. In this sort of turbines as in the flat hub ones the turn
speed is low (around 15 rpm).
G. The Enermar Project (Italy)
The center of the Enermar venture is the Kobold turbine which is licensed. Among its primary attributes, the
fundamental motivation behind why kobold turbine begins even in high burden condition is its beginning
torque. A pilot plant is secured in the Strait of Messina, near the Sicilian shore in Italy, in a normal ocean tidal
ebb and flow of around 2 m/sec. With a present speed of about 1.8 m/sec, the framework can create an intensity
of 20 kW.

Fig.5: The Enermer project


H. The Blue Energy Project (Canada):
Four of the fixed hydrofoil sharp edges of the Blue Energy tidal turbine are associated with rotor that drives a
gearbox and electrical get together of generator. The turbine is mounted in a tough solid marine caisson which
stays the unit to the sea floor, coordinates course through the turbine further thinking the asset supporting the
coupler, gearbox, and generator above it. These sit over the outside of the water and are available for upkeep
and fix. The hydrofoil sharp edges utilize a hydrodynamic lift head that causes the turbine foils to move
proportionately quicker than the speed of the encompassing water. The turn of the turbine is unidirectional on
both the ebb and the progression of the tide. A unit turbine is relied upon to be around 200 kW yield power. For
enormous scope power creation, numerous turbines are connected in arrangement to make a tidal fence over a
sea section or bay.
100
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig.6: The Blue energy project


CONCLUSION
More and more people have recognized the importance of the renewable energy, the vast coastal and offshore
areas contributes one of renewable resources, i.e. the tidal stream energy, to the entire energy consumption. The
emphasis has been put on tidal turbine concepts. Indeed, it has been described the strength and the weakness of
the major tidal turbine technologies. Moreover, attempts have been made to highlight current trends and alternative
issues for generator topologies. MCT believes it is well on track to delivering commercial tidal stream
technology with the potential to supply electricity on a large-scale, at low cost and without pollution. It is
believed that the concepts under development by MCT will become one of the primary techniques for extracting
energy from the seas.
REFERENCES
[1] Yun Seng. Lim and Siong Lee, Koh, Marine Tidal Current Electric Power Generation: State of Art and
Current Status, www.intechopen.com
[2] Rakesh Patel, A review on underwater Windmill, International Journal for technical education and research
innovations, March 2017.
[3] Jinhai Zheng, Peng Dai and Jisheng Zhang, Tidal Energy Stream in China, *th Internantional Conference
on Asian and Pacific Coasts (APAC 2015)
[4] Kannabiran S, Dhanabal M, Boobalan B and Kailasam R, A Novel Method for Generation of Electricity
using Submerged Windmill, International Journal of Modern Trends in engineering and Science (ISSN:
2348-3121)
[5] P L Fraenkel, Marine current turbines: pioneering the development of marine kinetic energy converters,
Nov 2006.
[6] John Harrison and James Uhomobhi, Engineering Study of Tidal Stream Renewable Energy Generation
and Visualization: Issues of process Modelling and Implementation.
[7] Seifeddine Benelghali, Mohamed Benbouzid, Jean Frederic Charpentier, Marine Tidal Current Electric
Power Generation Technology: State of Art and Current Status, Nov 2010
[8] Andreas Uihlein and Davide Magagna, Wave and tidal current energy- A review of the current state of
research beyond technology (2016) 1070- 1081

AUTHOR DETAILS:
GNANAMURUGAN K
Department of Mechanical Engineering, Perunthalaivar Kamarajar Institute of Engineering and Technology,
Puducherry, India

101
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

RESTRAINED DOUBLE GEODETIC NUMBER OF A GRAPH

T. JEBARAJ AND AYARLIN KIRUPA M

ABSTRACT
A double geodetic set 𝑆 of a graph 𝐺 is a restrained double geodetic set if either 𝑆 = 𝑉 or the subgraph induced
by 𝑉 − 𝑆 has no isolated vertices. The minimum cardinality of a restrained double geodetic set of 𝐺 is the
restrained double geodetic number of 𝐺 and is denoted by
𝑑𝑔𝑟(𝐺). It is shown that for any integers 𝑎, 𝑏 with 3 ≤ 𝑎 ≤ , there is a connected graph 𝐺 with 𝑑𝑔(𝐺) =
𝑎 and 𝑑𝑔𝑟(𝐺) = 𝑏 and also for positive integers 𝑟, 𝑑 and 𝑚 ≥ 12 with 𝑟 ≤ 𝑑 ≤ 2𝑟, there exist a
connected graph 𝐺 with 𝑟𝑎𝑑 𝐺 = , 𝑑i𝑎𝑚 𝐺 = 𝑑 and 𝑑𝑔𝑟(𝐺) = 𝑚.
Keywords: Double Geodetic set, restrained geodetic number, Restrained double geodetic number,

INTRODUCTION
By a graph 𝐺 = (𝑉, 𝐸), we mean a finite undirected connected graph without loops or multiple edges. As usual 𝑛
= |𝑉| and 𝑚 = |𝐸| denote the number of vertices and edges of a graph 𝐺 respectively. The distance (𝑥, 𝑦) is the
length of a shortest 𝑥 − 𝑦 path in 𝐺. It is known that the distance is a metric on the vertex set of 𝐺. An 𝑥 − 𝑦
path of length (𝑥, 𝑦) is called an 𝑥 − 𝑦 geodesic. For any vertex 𝑢 of 𝐺,the eccentricity of 𝑢 is 𝑒(𝑢) =
𝑚𝑎𝑥{𝑑(𝑢, 𝑣) : 𝑣 ∈ 𝑉}. A vertex 𝑣 is an eccentric vertex of 𝑢 if (𝑢) = (𝑢, 𝑣).The radius 𝑟𝑎𝑑 𝐺 and diameter
𝑑i𝑎𝑚 𝐺 are defined by 𝑟𝑎𝑑 𝐺 = 𝑚i{𝑒(𝑣) : 𝑣 ∈ 𝑉} and 𝑑i𝑎𝑚 𝐺 = 𝑚𝑎𝑥{ 𝑒(𝑣) : 𝑣 ∈ 𝑉}. The neighborhood of a
vertex 𝑣 is the set (𝑣) consisting of all vertices 𝑢 which are adjacent with 𝑣. A vertex 𝑣 is an extreme vertex of 𝐺
if the subgraph induced by its neighbors is complete.
The closed interval [𝑥, 𝑦] consists of all vertices lying on some 𝑥 − 𝑦 geodesic of 𝐺, while for 𝑆 ≤ , [𝑆] =
∪𝑥,𝑦∈𝑆 𝐼[𝑥, 𝑦] . A set S of vertices is a geodetic set if [𝑆] = 𝑉 and the minimum cardinality of a geodetic set is
the geodetic number (𝐺). A geodetic set S of a graph
𝐺 is a restrained geodetic set if the subgraph [𝑉 − 𝑆] induced by 𝑉 − 𝑆 has no isolated vertex. The minimum
cardinality of a restrained geodetic set of 𝐺 is the restrained geodetic number of 𝐺. The restrained geodetic
number of a graph was introduced and studied in [1]. A setS of vertices of 𝐺 is called a double geodetic set of 𝐺
if for each pair of vertices 𝑥, 𝑦 in 𝐺 there exist vertices 𝑢, 𝑣 in S such that 𝑥, 𝑦 ∈ 𝐼[𝑢, 𝑣]. The double geodetic
number (𝐺) of 𝐺 is the minimum cardinality of a double geodetic set. The double geodetic number of a graph
was introduced and studied in [4].
PRELIMINARY RESULTS
Theorem 1.1 [4] Each extreme vertex of a connected graph G belongs to every double geodeticset of G.
Theorem 1.2 [4] Every double geodetic set of a connected graph G contains all the weak – Extreme vertices of
G.
Theorem 1.3 The Friendship graph 𝐹𝑛 can be constructed by joining n copies of the cycle graph 𝐶3 with a
common vertex.
Theorem 1.4 The pan graph is the graph obtained by joining a cycle graph to a singletongraph with a bridge and
is denoted by 𝑃𝑛.
Theorem 1.5 A graph obtained by inserting an extra vertex between each pair of adjacent vertices on the
perimeter of a wheel graph W𝑛. 𝐺𝑛.has 2𝑛 + 1 vertices and 3𝑛 edges.
Theorem 1.6 A Prism graph is a graph that has one of the prisms as its skeleton.
2. RESTRAINED DOUBLE GEODETIC NUMBER OF A GRAPH
Definition 2.1
A double geodetic set 𝑆 of a graph 𝐺 is a restrained double geodetic set if either 𝑆 = 𝑉 or the subgraph induced
by 𝑉 − 𝑆 has no isolated vertices. The minimum cardinality of a restrained double geodetic set of 𝐺 is the
restrained double geodetic number of 𝐺 and is denoted by (𝐺).

102
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Example 2.2

Figure 2.1
For the graph 𝐺 given in Figure 2.1 It is easily seen that 𝑆 = { 2, 𝑣5, 𝑣6} is a double geodetic set of 𝐺, 𝑑𝑔(𝐺) = 3.
Since the subgraph induced by 𝑉 − 𝑆 has an isolated vertex. Then it is not a restrained double geodetic set of 𝐺.
Now, 𝑆 𝖴 {𝑣1} is a restrained double geodetic set of 𝐺.Therefore, (𝐺) = 4. Thus the double geodetic number
and restrained double geodetic number of a graph of a can be different.
Theorem 2.1
For any graph 𝐺 of order 𝑛, 2 ≤ (𝐺) ≤ (𝐺) ≤ (𝐺) ≤ 𝑛.
Proof
Any geodetic set needs atleast two vertices and (𝐺) ≥ 2 and every double geodetic set is also a geodetic set of
,it is clear that 𝑔(𝐺) ≤ 𝑑𝑔(𝐺). Also every restrained double geodetic set of 𝐺 is also a double geodetic set of
𝐺. Then (𝐺) ≤ (𝐺). Hence set of all vertices of 𝐺 is the restrained double geodetic set of 𝐺. Obviously (𝐺) ≤
𝑛. Hence restrained geodeticnumber and the restrained double geodetic number of G can be different.
Result 2.2
For the Cycle graph 𝐶𝑛, (𝐶2𝑛+1) = 2𝑛 + 1 and (𝐶2𝑛) = 2 and (𝐶𝑚) = 𝑚 for 𝑚 ∈ {4}.
Result 2.3
For the Complete graph , (𝑝 ≥ 2), 𝑑𝑔𝑟(𝐾𝑝 ) = 𝑝.
Result 2.4
For the Friendship graph 𝐹𝑛, (𝐹𝑛) = 2𝑛 + 1.
Result 2.5
For a non trivial connected graph 𝐺 with order 𝑛, If (𝐺) = 𝑛 − 1 then (𝐺) = 𝑛.
Proof
Given that (𝐺) = 𝑛 − 1. To prove that (𝐺) = 𝑛. Suppose that (𝐺) G 𝑛.
Clearly (𝐺) < 𝑛. Then the possibility that (𝐺) ≤ 𝑛 − 1.If (𝐺) = 𝑛 − 1 then the graph having one isolated
vertex. Which is contradiction .Therefore (𝐺) = 𝑛.If
(𝐺) < 𝑛 − 1. Since (𝐺) = 𝑛 − 1 by the assumption is wrong. Obviously (𝐺) = 𝑛.
Theorem 2.6

Proof
Case (i) 𝑛 is even

103
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Let 𝑃𝑛 be the Pan graph with 𝑛 + 1 vertices. Let 𝑆 = {𝑢, 𝑣}. Since 𝑢 and 𝑣 be the eccentric vertices of 𝑃𝑛 also
𝑢 be the end vertex of . Obviously, every pair of vertices lies between the geodesic {𝑢, 𝑣}. Hence (𝑃𝑛) = 2.
Then the subgraph induced by 𝑉 − 𝑆 has no isolated vertices. Thus it is the restrained double geodetic set of 𝑃𝑛.
Hence (𝑃𝑛) = 2 for 𝑛 is even.
Case (ii) 𝑛 is odd
The cycle graph 𝐶𝑛 is denoted by {𝑣, 𝑣1, 𝑣2, … , 𝑣𝑛−1} where 𝑣 is the support vertex and 𝑢 be the end vertex of
𝑃𝑛. It is easily seen that the set 𝑆’={ 𝑢, 𝑣1, 𝑣2, … , 𝑣𝑛−1} be the double geodetic set and 𝑑𝑔(𝑃𝑛) = 𝑛. Then the
subgraph induced by 𝑉 − 𝑆’ has an isolated vertex. Now, the set 𝑆’’ = {𝑢, 𝑣, 𝑣1, 𝑣2, … , 𝑣𝑛−1} is the restrained
double geodetic set and , 𝑑𝑔𝑟(𝑃𝑛) = 𝑛 + 1for 𝑛 is odd.

Proof

Theorem 2.8

Consider the gear graph 𝐺3, Let 𝑆 = {𝑢, 𝑣} for any pair of vertices , whose distance is 3.ie) 𝑑(𝑢, 𝑣) =
3.Then it is formed the double geodetic set of 𝐺3.ie) 𝑑𝑔(𝐺3) = 2. Then the subgraph induced by 𝑉 − 𝑆 has no
isolated vertices. Therefore (𝐺3) = 2
Case (i) b) For 𝑛 = 4
This is follows from the Case (i)a. Then the double geodetic set of 𝐺4 is 2. ie)𝑑𝑔(𝐺4) = 2. Obviously (𝐺4)
=2
Case (ii) For 𝑛 ≥ 5.
104
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Consider a graph 𝐺𝑛, Let 𝑥 be the single universal vertex of the outer cycle
𝑈 = {𝑢1, 𝑢2, … … , 𝑢2𝑛}. Clearly 𝑛 number of vertices are adjacent by the vertex 𝑥 and remainingn vertices is
not adjacent to 𝑥. These vertices make a double geodetic set 𝑆 of gear graph 𝐺𝑛. ie)
|𝑠| = 𝑛. Now we could not see the isolated vertices of the set 𝑉 − 𝑆 of 𝐺𝑛. Hence (𝐺𝑛) = .
Theorem 2.9

Proof
Case (i) 𝑛 is even
Let 𝑆 = {𝑢, 𝑣} for any 𝑢, 𝑣 then (𝑢, 𝑣) = 𝑑i(𝑌𝑛).Then the 𝑢 − 𝑣 geodesic contains every pair of vertices of 𝑌𝑛. So
(𝑌𝑛) = 2. Since the subgraph induced by 𝑉 − 𝑆 has no isolated vertices . Hence (𝑌𝑛) =2.
Case (ii) For 𝑛 = 3

In Figure 2.2, 𝑌3 has 6 vertices and (𝑌3) = 𝑑i(𝑌3) = 2. The set 𝑆 = { 1, 𝑣5, 𝑣6} is the geodetic set of 𝑌3. But it is
not a double geodetic set. Because , any geodesic of the set 𝑆 does not contains the pair of vertices (𝑣2, 𝑣3) (𝑣2,
𝑣6)(𝑣3, 𝑣5). It is clear that the vertices 𝑣1, 𝑣2, 𝑣5, 𝑣6 are weak extreme vertices. Then the set 𝑆 = {𝑣1, 𝑣2, 𝑣5,
𝑣6} is the minimum dg-set of 𝑌3 and
(𝑌3) = 4. Now, the subgraph induced by 𝑉 − 𝑆 has two isolated vertices 𝑣3 and 𝑣4. Clearly the set 𝑆’ = {𝑣1,
𝑣2, 𝑣3, 𝑣4, 𝑣5, 𝑣6} is the restrained double geodetic set of 𝑌3. Therefore,
(𝑌3) = 6.
Case (iii) 𝑛 ≥ 5
This is follows from case (ii) of Theorem 2.9.
Theorem 2.10
For any integers , 𝑏 with 3 ≤ 𝑎 ≤ 𝑏. there is a connected graph 𝐺 with 𝑑𝑔(𝐺) = 𝑎 and
𝑑𝑔𝑟(𝐺) = 𝑏.
Proof
We prove this theorem by four cases.
Case (i) 𝑎 = 3
For the graph 𝐺 given in example 2.2. It is clear that (𝐺) = 3.
Case (ii) 𝑎 > 3
For the 3-prism graph 𝑌3 , It is easily seen that the double geodetic number of 𝑌3 is 4.
105
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Case (iii) 𝑎 = 𝑏

Let 𝐺 be the graph in Figure 2.3 formed from the path 𝑃3: 𝑣1, 𝑣2, 𝑣3 of order 3, by adding ‘𝑏 − 2’ new vertices
𝑢1, 𝑢2, … … . , 𝑢𝑎−2, 𝑤1, 𝑤2, … … . , 𝑤𝑏−𝑎 to 𝑃3 .Let us assume that 𝑏 − 2 = . Joining each vertex 𝑢i (≤ i ≤ 𝑎
− 2) to 𝑣2 and joining each vertex 𝑤j (1≤ j ≤ 𝑏 − 𝑎) to 𝑣1 and 𝑣3 . By a theorem 1.1, every double geodetic
set and every restrained double geodetic set of 𝐺 contain the set 𝑆 = { 1, 𝑢2, … … , 𝑢𝑎−2} of all extreme vertices
of 𝐺. Clearly 𝑆 is not a double geodetic set of 𝐺. It is easy to see that 𝑆1 = 𝑆 𝖴 {𝑤1, 𝑤2, … … , 𝑤𝑏−𝑎} is the
unique minimum double geodetic set. ie) 𝑑𝑔(𝐺) = 𝑏 − 2 = 𝑎. Then the subgraph induced by 𝑉 − 𝑆1 has no
isolated avertices . Then it follows 𝑆1 is the unique minimum restrained double geodetic set of 𝐺. Hence (𝐺) =
𝑎.
Case (iv) 𝑎 < 𝑏
Let 𝐺 be the graph in Figure 2.4 formed from the path 𝑃3: 𝑝1, 𝑝2, 𝑝3 of order 3,and we consider another one path
𝑄3: 𝑞1, 𝑞2, 𝑞3 of order 3. Let us assume 𝑏 + 3 = 𝑎 and 𝑎 + 1 = . By adding ‘𝑏’ new vertices 𝑢1, 𝑢2, … … … . ,
𝑢𝑎−2, 𝑣1, 𝑣2, 𝑤1, 𝑤2, … … … . , 𝑤𝑏−𝑎 joining each vertex 𝑢i (1 ≤ i ≤ 𝑎 − 2) to 𝑝2 and joining the vertices 𝑣2, 𝑤j
(1 ≤ j ≤ 𝑏 − 𝑎) to 𝑞2 and 𝑞3 . Joining the vertices 𝑝1 to 𝑞1 also 𝑝3 to 𝑣2. Now the vertex 𝑣1 is join to the vertices
𝑝2 and 𝑞2. Bya theorem 1.1, every double geodetic set and every restrained double geodetic set contain the set
𝑆1 = {𝑢1, 𝑢2, … … , 𝑢𝑎−2, 𝑤1, 𝑤2, … … … . , 𝑤𝑏−𝑎} of all extreme vertices of 𝐺. Clearly 𝑆1 is not a double
geodetic set. So we choose the vertices 𝑆2 = {𝑝1, 𝑝3, 𝑞1, 𝑞3, 𝑣2}. Then 𝑆’ = 𝑆1 𝖴 𝑆2 forms the minimum
double geodetic set. Therefore (𝐺) = 𝑏 + 3 = 𝑎. Then the subgraph induced by 𝑉 − 𝑆’ has one isolated vertex say
𝑝2. Then 𝑆1 𝖴 𝑆2 𝖴 {𝑝2} is the minimum restrained double geodetic set of 𝐺. Then (𝐺) = 𝑎 + 1. By our
assumption, (𝐺) = 𝑏. Hence the proof.

106
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Theorem 2.11
For positive integers 𝑟, and 𝑚 ≥ 12 with 𝑟 ≤ 𝑑 ≤ 2𝑟, there exist a connected graph 𝐺 with 𝑟𝑎𝑑 𝐺 = 𝑟, 𝑑i𝑎𝑚 𝐺
= 𝑑 and (𝐺) = 𝑚.
Proof
Case (i) If 𝑟 = 1 then 𝑑 = 1 or 𝑑 = 2. 𝐹𝑜𝑟 𝑑 = 1 ,Let the complete graph 𝐺 = 𝐾𝑚. It is clear that (𝐺) = 𝑚. For 𝑑
= 2, Let the star graph 𝐺 = 𝑆𝑚−1 (𝑚 ≥ 2), Then (𝐺) = 𝑚.
Case (ii) 𝑟 = 𝑑. Let 𝐶2𝑟: 𝑤1, 𝑤2, … , 𝑤2𝑟 be a cycle, which order is 2𝑟. Add ‘𝑚 − 8’ new vertices {𝑣1,2, … ,
𝑣𝑚−11, 𝑢1, 𝑢2, 𝑢3} in 𝐺. Joining a vertex 𝑤𝑟+1to both 𝑢1 and 𝑢2. Also join 𝑢3 to both 2 and 𝑤𝑟+3. Join each
𝑣i(1 ≤ i ≤ 𝑚 − 11) to 𝑢1 and 𝑤𝑟−1. Then the graph 𝐺 has radius 𝑟 and diameter 𝑟. Let 𝑆 = {𝑣1,2, … , 𝑣𝑚−11} be
the extreme vertices of 𝐺. By theorem 1.1, 𝑆 belongs to the double geodetic set, some of the pair of vertices
does not belongs to the set 𝑆. So 𝑆 is not a double geodetic set. Then it is verified that 𝑆’ = 𝑆 𝖴 {𝑢i, 𝑤𝑟,
𝑤𝑟+2, 𝑤j/(1 ≤ i ≤ 3), (2𝑟 − 1 ≤ j ≤ 3)} is the set of all weak extreme vertices. Moreover, 𝑆’ is the double
geodetic set of 𝐺 and (𝐺) = 𝑚 − 1.Then the subgraph induced by < 𝑉 − 𝑆’ > has an isolated vertex. It
followsthat, 𝑆2 = 𝑆1 𝖴 {𝑤𝑟+1} is the restrained double geodetic set and (𝐺) = 𝑚.

Figure 2.5
Case (iii) 𝑟 < . First we assume that, 𝑚 ≥ 14. Let 𝐶2𝑟: 𝑤1, 𝑤2, … , 𝑤2𝑟be a cycle, which is of order 2𝑟. Add ‘𝑚
− 8’ new vertices {𝑣1,2, … , 𝑣𝑚−13, 𝑢1, 𝑢2, … , 𝑢5} in 𝐺. Now, joining a vertex 𝑤𝑟+1 to 𝑢1, 𝑢2 and 𝑢3 and join a
vertex 𝑢4 to both 𝑢3 and 𝑤𝑟+3. Join each 𝑣i(1 ≤ i ≤ 𝑚 − 13) to both 𝑢1 and 𝑤𝑟−1. Also the vertex 𝑢5 is joined to
the vertex 𝑤1. Here, the graph 𝐺 has radius 𝑟 and diameter 𝑑. Now, the vertices 𝑢2 and 𝑢5 are
the end vertices . Let 𝑆 = {𝑣1,2, … , 𝑣𝑚−13, 𝑢2, 𝑢5} be the extreme vertices of 𝐺 . By theorem 1.1, every
double geodetic set contains 𝑆. But, 𝑆 is not a double geodetic set. It verified that 𝑆’ = 𝑆
𝖴 {𝑢1, 𝑢3, 𝑢4 , 𝑤2, 𝑤3, 𝑤𝑟, 𝑤𝑟+2, 𝑤2𝑟−1, 𝑤2𝑟} be the set of all weak extreme vertices. Obviously, 𝑆’ is the double
geodetic set and (𝐺) = 𝑚 − 2. Then the subgraph induced by < 𝑉 − 𝑆′ > has two isolated vertices. Then 𝑆1 =
𝑆’ 𝖴 {𝑤1, 𝑤𝑟+1} is the restrained double geodetic set. Thus , we have 𝑑𝑔𝑟(𝐺) = 𝑚.
107
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Figure 2.6
REFERENCES
1. H . Abdollahzadeh Ahangar , V . Samodivkin , S . M . Sheikholeslami and Abdollah Khodkar. The
Restrained Geodetic Number of a Graph. Bull. Malays. Math. Sci. Soc., 2015. Vol. 38. P. 1143–1155. DOI:
10.1007/s40840-014-0068-y
2. F. Buckley and F. Harary , Distance in graphs , Addison- Wesley, Reading , MA (1990)
3. G. Chartrand , F. Harary and P. Zhang, On the geodetic number of a graph , Networks,39(2002), 1-6.
4. A. P. Santhakumaran, T. Jebaraj, Double geodetic number of a graph , Discussiones Mathematicae, Graph
Theory 32(2012) 109 – 119
5. A.P. Santhakumaran, K. Ganesamoorthy , Restrained Double monophonic number of a graph ural
mathematical journal, Vol. 5, No. 2, 2019, pp. 55–63.

AUTHOR DETAILS:
1
T. JEBARAJ AND 2*AYARLIN KIRUPA M
1
Assistant Professor and 2Research Scholar, Department of Mathematics, Malankara Catholic College,
Mariagiri, Kanyakumari District, 629153, Affiliated to Manonmaniam Sundaranar University, Abishekapatti,
Tirunelveli- 627012, Tamilnadu, India

108
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

APPLICABILITY OF ENTERPRISE RESOURCE PLANNING SYSTEM FOR BETTERMENT OF


HIGHER EDUCATION EXAMINATION PROCESS: A CASE STUDY FOR NEP 2020

AARTI SOLANKI, SANJAY BANSAL, ARUN VAISHNAV AND ABHIJEET SUKHWAL

ABSTRACT
Interest in the area of Enterprise Resource Planning (ERP) is gaining renew interest and numbers of techniques
are being still developed to meet forthcoming challenges to conduct examination as per National Education
Policy (NEP 2020). In this paper, we report on the major issues in conducting University Examination System.
Use of Information Technology to make the examination process secure, robust, student friendly and error free
is discussed. Further, major emphasis is also laid on making the examination process accessible and supportive
to concern users.
Keywords: Enterprise Resource Planning, Information Technology, University Examination System, Technical
Educational Institutes, Higher Education Institutions, Optical Mark Recognition.

1. INTRODUCTION
Enterprise Resource Planning (ERP) is an application software system that groups various departments and
activities across an institution operated by a computer system. ERP works on a single database, enabling various
departments to share information and communicate with each other. ERP systems consist of numerous specific
modules, which are developed to interconnect with the other modules. A systematic and planned ERP solution
can facilitate zero redundancy which helps in increasing organization's efficiency and productivity.
The process of Examinations plays an an important role in sanctity, standing, immaculacy and faith in any
Higher Education Institute HEI. Examination is a tool to assess the knowledge, understanding and learning of
students and learners. For teachers and educationalist, the Examination System also provides feedback to evolve
their way of a fruitful teaching methodology. In couple of decades, higher education has seen incredible
expansion in terms of number of students enrolled, number of courses offered by HEI. In multi faculty HEI, the
examination system become quite complex and embedded. Further, many problems are encountered while
handling the examination process viz. to conduct error free examinations and provide security of certificates. It
is seen that in many reputed national examinations, leakage of question papers conquest the main purpose of
examination. Various allegations encounters regarding leakage of an examination papers leading to negative
image portrayed even by the media makes question marks on capabilities of examination conducting bodies.
Different workers have addressed few issues related to definitions about to ERP System as reviewed in this
section. Majorly ERP definitions have focuses on properties such as combining processes, removing the
difficult links between computer systems, enabling optimization across the company and organisation,
providing a basic IT infrastructure, linking through the supply chain, adapting best industry and management
practices for providing the right product at the right place and affordable cost, tracking the wants of companies
to fulfill day-to-day activities in achieving consistency and efficiency through standardization, enhancing of
market value and organization performance through competence and usefulness gains, providing a quicker
response to customer requirements. They have suggested common measures and discussed the ERP importance
into an integrated, process-oriented, and information-driven and real time organization with stress on the result
of ERP on examination system.
The main aim of present study is on the focus of the ERP implementation challenges from diverse viewpoints,
such as selection of technology, knowledge management, change management and emerging technologies.
A Since ERP technology selection is an most important for enterprise level decision makers and involves a
serious investment decision, implementation of ERP System in organizations are strategic and tough because of
its complexity, high implementation cost and changes in policy issues which are crucial for an ERP software to
fit with organisational goals and objectives.
Yanosky et al. (2002) have discussed transition in higher education ERP leading to educational ERP II. ERP
facing various challenges by the educational institutes due to change in pace of technology has gradually
progressed from Educational ERP to Educational ERP II. Higher-education administrative suites are still
moving toward ERP II functionality, extending the internal enterprise focusing of traditional Educational ERP.
The researchers have highlighted level to implement Educational ERP in organizations.

109
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Pollock and Cornford (2004) in this paper author found that ERP is useable in the real world and it can be
changed by means of present system. Their facts findings are completely based on the analysis of institutions in
UK using ERP system. The authors have positively centered on the growth and execution and it uses both
common and university based functionalities in the ERP. And they study the relationship between the
universities and other organizations. They have illustrated that working with such types of problems except
resolving them which is considered for their distribution hence ERP shifts the accountability for the final
outcomes. New and wise techniques for understanding working mechanism of ERP with recognized operations
of universities have been suggested.
Rabaai (2009) author has discussed about the ERP implementation in higher education. The author has cited
difficulties and failure rate in ERP implementation in university environment and also discussed regarding the
critical success factors of ERP implementations in rare and uneven circumstances. This article is small part of a
bigger study attempt that aims to contribute in understanding the fact of ERP implementation and evaluation in
Higher Education Institutions in the Australasian region. Their analysis based on ERP system implementations
and also discussed their importance of success factors.
Abugabah and Sanzogni (2010) author mentioned that ERP system is the biggest applications software adopted
by the universities, although they require a huge investment in their execution. The main goal of this paper is
perusal of existing research in the field higher education with reference to higher education of Australia.
Goel et al. (2011) have discussed ERP system in Technical Educational Institutes (TEIs) for an incorporated,
superior and well-organized management and the information related to many users in these institutions. They
have highlighted that ERP can be employed in TEIs in India, although it do not gaining much success. This
main aims of this article to gain successful implementation of ERP for end-users. To have concrete conclusion
on the basis of survey of 900 users in four categories in TEIs in India is undertaken to gain feedback from
implementing ERP.
Three characteristics for competent ERP namely (a) functionality (b) security and (c) quality are stressed by
these authors. The analysis of features also recognized the issues encountered in ERP implementation and at last
they suggested a suitable framework for the development of ERP in TEIs. The authors have insisted that their
framework will support the TEI in the effective and efficient implementation of ERP. This ERP framework
blueprint was focused on characteristics to be strengthened, upgraded and controlled to make ERP system more
efficient for catering the best possible satisfaction of the end-users.
Haab and Cramer (2013) have published their research paper on ERP based systems in Higher Education.
Educause (a nonprofit association in USA) along with Cap Gemini Ernst and Young began quantitative and
qualitative study of completed ERP implementations. To recognize the need of implementing ERP systems in
educational institutes, the rationale for selecting specific system, critical decisions in the implementation, the
outcomes archived and next institutional plans are taken care of. One can find the factors influencing vendor
selection, modules implemented, level to which implementations stayed within budget, adherence to original
implementation timeline, degree of customization, impact of ERP implementation on support costs and
outcomes from use of ERP.
Scholtz et al. (2013) have elaborated importance of ERP systems in modern business which has created a
demand for ERP consultants with the appropriate capability to implement, maintain and support these systems.
Proper Training and Education programs have been scheduled for implementation in order to afford ERP
experts and degree holder with the industry relevant ERP. The majority of the training and education programs
make use of huge ERP systems for educational purpose, but end-user of these ERP meet serviceability issues
while learning to operate the systems. The medium sized ERP have been designed for educational purpose
because they are slighter complex and effortless to learn rather than big ERP systems. Empirical studies totally
based on the utility of ERP mainly intended for medium sized ERP systems are less reported. Their study
identified 3 categories of criteria and 10 criteria which are used for the practically assessment of medium-sized
ERP systems. These standard were used in a case study for assessing the practicability of a medium-sized ERP
system and to obtain comparative feedback.
Noaman and Ahmed (2015) stated that ERP application can be widely used in educational centres for
management of activities in higher education. According to authors higher education is basically based on the
actual needs to enhance the capability in adoptions of legacy solutions. They have finalize that ERP system can
serve in the present circumstances and may also fulfill the presumptions of HEIs and the current business
oriented ERP systems.
110
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Chaudhari et al. (2015) have stated that uses of online ERP modules saves paperwork and also maintains big
data. The ERP must contain modules related to staff, students, departments, accounting, training and placement,
etc. where each module should provide different privilege. An online ERP for all education institutes will help
in getting the entire system under one roof which is highly required under NEP-2020 where course credit may
also be transferred. In this way all the institutes can be managed in efficient manner, and will stay connected
and updated with the current affairs of sister institutes. The online ERP system helps in eliminating data
redundancy. The authors have anticipated that this system will prove beneficial for institute by making it faster
and efficient nearly all of the work will be done by the online ERP system.
Sowan et al. (2017) have highlighted HEIs are adopting ERP system to perform the automated tasks using
dedicated platforms with their designed plans. It is possible because of ERP which is completely based on “do-
it-all” approach to perform organizational management in incorporation to education which improves the
quality for student regional and global standards. The basic operations as such as admission, acquisition,
finance, examination, and staff and alumni management can be done via ERP system. This article explores few
problems associated to execution of ERP system in HEIs and also identifies the factors for successful
implementation of ERP system in HEIs. Although few workers have reported about ERP we still feel that more
work is required in ERP for betterment of University Examination modules.
2. ERP in University Examination System (UES)
It is worthwhile to mention that Educational Institutions face following common challenges:
Getting information from paper files which is admittedly difficult task rather than electronic version
 Improper exchange of information between departments
 Poor communication connectivity between departments
 No quick or easy method to keep the records of students and staff which can be error free and up-to-date
 Problem in maintaining the financial records such as fee, salary and other expenditure
 Manual calculations and collection of fee etc.
 Time consuming
 Wastage of time in entering manual information
 Slow accessing records
 Data redundancy
 Ambiguity in information as different software may show different values
 Difficulty in centralized backup facilities
 Higher maintenance and support cost
 Data security from hackers.
2.1 Phases of UES
University Examination setup is mainly divided into three sections (a) Pre-examination phase, (b) Examination
phase and (c) Post examination phase as summarized in Figure 1.

Figure 1: Various phases of UES and their sub components

111
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

2.1.1 Pre-Examination Phase:-This phase consists of various activities as summarized in first part of Figure 1.
Salient features of the individual activity are given here. In manual Examination
Systems following jobs have to be accomplished for smooth examination of students:a. Exam
notification:-First step to conduct examination is to publish schedule of start and end date to fill the
examination forms.
B. Application Form for Examination: - Students has to fill the online examination form and upload the
current photo on the online examination form and pay requisite fee to the university before last date of
submission of forms.
C. Admit Card Generation:- in reference to online examination form filled by the candidate and admit card
for particular exam is generated.
D. Exam Paper Setting: - Exam paper is set by the subject expert as per university rule and regulations.
e. Question Paper Printing and distribution along with answer books and other stationary to respective
examination centers : Printing of Question papers are done confidentially and are packed and sealed in
envelop by the assigned printing press and are then sent to various examination centers under the jurisdiction of
the university. The University employs a large number of qualified man power for these confidential jobs,
otherwise question paper may leak at any level/stage.
F. Receiving of Examination Material and Custody: - Question papers, answer book and other examination
related material are sent by the university to the authorities of the respective examination centres who become
custodian of such confidential materials.
2.1.2 Examinations Phase:-This phase contain various operations i.e. opening of paper packets, Student
attendance management, assigning the invigilation duties, conduction of exam and receiving of answer sheets
etc. The major activities in this phase are elaborated below:
A. Tearing the Seals of Question Paper Packets:-A experience authority and a member of examination
control room at the center check the seal and paper code of question paper packets before opening the packets.
If any difference is found then immediately inform the Controller of Examination. Generally, question papers
are opened 30 min before examination or as per university rules and regulations. After that set of question
papers answer answer book are sent to allotted examination rooms.
b. Invigilation Duties: - Center Superintendent assigns the invigilation duties as per strength of students and as
per the requirements of the examination.
C. Examinations Activities: - After distribution of question paper and answer sheets to the assigned
invigilators, the invigilators issues the question paper to candidate and returned the unused question papers.
Candidate wrote their answers in concerned answer books.
D. Answer Books Collection: - After the examination the invigilator has to collects the answer books from the
candidates and Center Superintendent make necessary arrangement for sequential collection of answer books
which are packed/sealed and sent back to the controller of examination.
2.1.3 Post Examination Phase:-This phase performs various operations in University Examination System like
evaluating answer sheets, result processing, reevaluation, grievance redressal and degree printing and
distribution etc. The major activities in this particular phase are given below:-
A. Answer Book Evaluated by Examiner: - After the collection of answer book from various examination
centre are stored at university examination section. After that answer books are sent for evaluation as per the
University rules and regulation to the concerned subject experts and other evaluators (if required) for evaluation
of answer books.
B. Results processing: - After that answer book is evaluated by the examiner, marks are entered from the
respective answer books in the result sheets along with internal/term marks and practical mark (if any). After
that the university will published the result and mark sheets and degree be issued.
C. Printing of Degree and Convocation to Award Degree and Medals: - In this phase, the degree of
respective students is printed and issued to them. Generally degrees are issued to the students during
convocation or thereafter. Students can also get duplicate degree in case theft and lost by paying requisite fees
during their life time because data of students are well preserved for future. University has to preserve the

112
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

academic data of student for verification of degree and to resolve the issues and disputes arising on the
authenticity of university degree.
D. Re-Evaluation and Grievance Redressal: - In this phase of post examination, any student can also apply
for verification/ photocopy of checked answer books and and also apply for the re-evaluation of answer book.
3. Techniques for Betterment of Ues:-
For a better management of university examination system following methods are suggested.
 Use of IT in Examinations: IT should be beneficial for Universities examination system it enhanced the
accuracy, efficiency, intelligibility and reliability. It also lead to improvement in on-line services which is
provided to the students/colleges/ departments etc. by facilitating them through online portal, computerized
help desk at different parts of the University and in affiliated institutions.
 Online Registration: In a current era each and every university shall adopt online student registration for
Admission/examinations and provide online facility to receive the admit card/hall ticket.
 Developing Question Bank: The ERP may be helpful in developing question bank or Question Paper Bank
which are followed by Universities for setting up of their examination papers.
 Question Papers Delivery: Since the delivery of question paper is challenging task, to eliminate such
existing process faced while distribution and delivery of question papers at the colleges/institutes, the
universities should adopted the IT based solution for Secure and fast delivery of question papers. In this
approach QP is randomly selected from the existing database which is encrypted and sent over secure
channel to the examination centers one or two hour before the concerned examination. At the center, it is
decrypted with the unique key/password and printed as per the strength of the students. Applicability of this
technique will overcome the leakage of question paper during transportation and at printing press.
 Quick Response (QR) or Bar Code: In this recommendation universities should use Quick Response (QR)
or Barcode Technology in each and every page of answer booklets to ensure reliability of answer books and
recognition of examiners.
 Scanning and Onscreen Evaluation: Tracing of the hard copy of answer book of students is a difficult
task rather than searching the answer book digitally. It will also provide facility to the students to get
answer book online rather than hard copy of answer book. University shall perform scanning of answer
book and onscreen evaluation of answer book of all examinations. In this process, firstly the answer book
shall be scanned in secure place. This process will help in reducing the issues related to secure transport of
answer books, proxy of answer books, hindrance in assessments, etc. additional, the time for re-evaluation
will be drastically minimized as answer books are available online and can be assessed by the assigned
examiners/subject expert.
 Preparation and Publication of Results: University should display result through website. Further, a
unique provision should be initiated to communicate the results by Simple Messaging Service(SMS) or by
email to respective students on registered mobile numbers and emails which will help in quick disposal of
result part and start of the new session.
 Online Re-Evaluation: Universities start accepting the online application for re-evaluation by paying the
requisite fees online through various payment options like credit /debit card/net banking, etc.
 Dematerialization of Degree and Certificate: In a digital world, we have to move forward with
information technology rather than traditional system. ERP System should facilitate electronic bookkeeping
of educational degree and certificates. The vision of the Universities should be to ultimately shift towards
‘Dematerialization of degrees and certificates” and stores them at government owned central database
National Academic Depository (NAD) for easy verification and fast extraction of academic qualifications of
concerned students.
4. Presently Proposed Model for the Betterment of UES
It is proposed that for managing pre-examinations and post-examinations task, cloud based software can be
more helpful in streaming and automation of these jobs. As the data stored at a centralized database, the institute
does not need to have server room or other hardware infrastructure as well. Further, Artificial Intelligence (AI)
can track the performance of students in the examination and can provide detailed analytics of individual

113
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

student performance and performance of batch as a whole. The University can also organize AI powered
examination form home.
Flowchart of Proposed Technique

Figure 2: Flowchart of proposed technique


Figure 2 shows the proposed technique in which firstly student should need to registered with the university by
taking admission and enrolled in the University. In the second step student has to fill the examination form
along with the correct email id and contact number. Thereafter the University can allot the roll number to
student for his/her respective examination (main/compartment/re-evaluation). Afterward, university
examination can conducted. After completion of examinations, evaluation of the examination answer books by
the examiner should be taken. Thereafter university will declare the result. Declaration of result and uploading
the respective marks of student to be done via ERP server. Finally, Examination ERP will send the result on E-
mail and also send the SMS regarding declaration of result to candidate on their registered mobile number. This
technique pretends as prompt and faster in providing the information to student for their result. These are the
general steps in the proposed technique:
Future of UES relies on use of AI (Artificial Intelligence) based technology to boost the performance and
efficiency. The growth of University examination system from the online model to AI-based examination
system will act as a cornerstone. Implementation of AI’s in the examination system is expected to transform
higher education system and the change should be adopted by universities to advance course curriculum and
offer students the flexibility to take the examinations.
AI is expected to boon for universities as will offer credible, time and cost-effective solutions using AI-based
examination systems. The AI technology has become reliable due to its interactive features that help in creation
of user friendly environment.
Further in AI based examination system, student can be registered by finger print scanner, morpho, etc. to
produce student basic information as other organization like bank, telephone company etc. read the data. It will
provide the authentic and unique method in capture the basic information of the examinee.
Moreover, AI based or voice recognition examination system can be equipped with advanced facial recognition
or voice recognition features. Universities can use AI approach based on facial recognition, to ensure students
authencity.
5. CONCLUSIONS
The present work focuses on University Examination System and highlights the functionality of UES through
ERP system. In the current scenario, ERP is gaining popularity due to its systematic operations. Modularity is
very beneficial in the context of the large amount of student data. ERP system can be maintain, organized and
control various student related activities such as student enrollment, examination and re-evaluation, etc. In this
article, we have proposed a theoretical technique for the betterment of the existing system with unique feature
by providing the result through email and registered mobile number.
REFERENCES
[1.] Abugabah, A., & Sanzogni, L. (2010). Enterprise resource planning (ERP) system in higher education: A
literature review and implications. International Journal of Human and Social Sciences, 5(6), 395-399.
[2.] Chaudhari, B.S., Mathurawala, A. S., Tupe, P.S., Dake, R.P., & Dake, R.O. (2015). Implementation of
114
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

online ERP system for educational institutes. International Journal of Advanced Research in Computer
Engineering & Technology, 4(4), 1114-1116.
[3.] Goel, S., Kiran, R., & Garg, D. (2011). A framework for efficient enterprise resource planning (ERP)
implementation in technical educational institutions. African Journal of Business Management, 5(34),
13197-13204.
[4.] Haab, M. J., & Cramer, S. F. (2013). Enterprise Resource Planning Systems in Higher
Education. Enterprise Resource Planning: Concepts, Methodologies, Tools, and Applications. 182-197.
[5.] Noaman, A. Y., & Ahmed, F. F. (2015). ERP systems functionalities in higher education. Procedia
Computer Science, 65, 385-395.
[6.] Pollock, N., & Cornford, J. (2004). ERP systems and the university as a “unique”
organisation. Information technology & people.
[7.] Rabaai, A. (2009). Identifying critical success factors of ERP Systems at the higher education sector.
In Proceedings of the Third International Symposium on Innovation in Information and Communication
Technology (pp. 133-147). British Computer Society.
[8.] Scholtz, B., Calitz, A., & Cilliers, C. (2013). Usability Evaluation of a Medium-sized ERP System in
Higher Education. Electronic Journal of Information Systems Evaluation, 16(2), pp148-161.
[9.] Sowan, I., Tahboub, R., & Khamayseh, F. (2017). University ERP Preparation Analysis.
[10.] Yanosky, R., Harris, M., & Zastrocky, M. (2002). Higher-Education ERP in Transition. Gartner Research,
May, 17.

AUTHOR DETAILS:
AARTI SOLANKI1, SANJAY BANSAL2, ARUN VAISHNAV3 AND ABHIJEET SUKHWAL4
1,2
Department of Computer Science & IT, Janardan Rai Nagar Rajasthan Vidhyapeeth (Deemed-to-be
University), Udaipur (Rajasthan) 313001
3,4
Department of Computer Science, Mohanlal Sukhadia University, Udaipur (Rajasthan) 313001

115
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

DESIGN & DEVELOPMENT OF THERMOELECTRIC GENERATOR FOR POWER GENERATION


USING EXHAUST GAS FROM INTERNAL COMBUSTION ENGINE

AJITHA MARY C AND PREMLATA PANDIT

ABSTRACT
Purpose: Rapid economic development and increasing environmental pollution have led to an energy shortage.
The internal combustion engine for recovering this wastage of heat has become a topic of interest. Out of the
total fuel or energy supplied to a machine, approximately 30-40 per cent is used for mechanical work. In
comparison, the rest of 60-70% is released into the environment through exhaust gases, resulting in an
environmental threat called pollution. To prevent this, it is essential to use this heat waste for useful work. In
this thermoelectric study, a generator generates a large amount of electricity through the temperature
difference created within the thermoelectric engine. The study aims at using heat energy (HE) from exhaust
gases to produce electricity using the ‘Seebeck effect (SBE).’
Approach: The process uses a ‘Thermoelectric Generator’ to produce electrical energy using the difference in
temperature between the exhaust gas (EG) temperature and coolant flowing over the system. The temperature
of the heat source is decided in the range of 50℃ − 150℃, and experimentation is performed by incrementing
20℃ temperature at each step of a heat source starting at 50℃. For each value of current and voltage,
corresponding power is calculated.
Findings: Through this study, it is observed that as the value of the temperature difference rises, there is a
subsequent increase in electricity.
Keywords: exhaust gases, thermoelectric generator (TEG), Seebeck effect, electricity (E)

1. INTRODUCTION
Recent scientific as well as public knowledge of ecological and energy challenges has piqued public interest in
advanced technology development, particularly in highly efficient internal combustion engines. (Weng and
Huang 2013). From a socio-economic point of view, the energy consumption level is directly relative to the
total country population and economic development. The energy demand will increase with the world's
population growth. Latest technologies like Thermoelectric Generators, Six-stroke Cycle Internal Combustion
engines, Organic Rankin Cycle, and Turbocharger Technology have been developed to save this growing
demand for energy by recovering waste heat loss from automobiles, chimneys etc. into electricity (Suryawanshi
et al. 2017).
THERMOELECTRIC GENERATOR & ITS PRINCIPLE
A solid-state device or TEG directly converts HE into electrical energy (EE), and this effect is known as the
SBE. Under this, two metal strips of different materials are linked from the ends, forming a loop (Orr et al.
2016). Electric current will develop in the loop if the junctions have a temperature difference, and electromotive
force developed due to this is known as the SBE or ‘Thermo emf.’ The electric current can be utilized to power
a load.
The structure of the thermoelectric generator is sandwiched with TE material which is again squeezed in by the
“heat exchanger plates” at their ends, respectively (Haidar and Ghojel 2001). The two heat exchanger plates are
maintained at different temperatures, one with a high temperature on the hot side and the other at a lower
temperature on the cold side, as shown in Figure 1.

Fig 1: Seebeck Effect


116
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

A thermally insulating layer is in the middle of thermoelectric material and heat exchanger plates. The metal
plates electrically link thermoelectric materials (“p-type and n-type”). The electric current is developed when
the hotter side of the metal plate derives the “electrons” in the "n-type,” the cold side passes via the connection
and then passes into the “p-type” (Meng et al. 2017). The greater the difference in temperature of the “cold and
hot sides,” the more the electromotive force will be. After doing several experiments, it was discovered by s-
beck that within a certain range of temperature difference, the electromotive force developed through a TEG is
directly proportional to the “temperature difference between the hot and cold side (Yao Wu, 2015)”,
𝑒 = 𝛼𝑝𝑛 (𝑇𝐻𝐽 − 𝑇𝐶𝐽 )
Where, 𝛼𝑝𝑛 = 𝛼𝑝 − 𝛼𝑛
𝛼𝑝𝑛 is relative Seebeck coefficient,
𝑇𝐻𝐽 & 𝑇𝐶𝐽 are temperatures at hot and cold junctions, respectively,
𝛼𝑝, 𝛼𝑛 are Seebeck coefficients for the P and N pole, respectively.
A larger current and electromotive force can be attained by joining the P-N junction in series or parallel (Yuan
Xiao-hong, 2012).
TEGs are one of the most hopeful and outstanding technology for waste heat recovery. The device helps in
generating dc voltage by converting temperature gradient, which car electronics and air conditioner systems can
utilize. Thermoelectric Generator (or Seebeck generator) does not contain any movable parts, compact in size,
environmental friendly and is highly reliable(Zhang et al. 2015). Recycling and reusing the waste EG will not
only augment the efficiency of fuel energy use but also decrease pollution of the air. Due to these merits, the
thermoelectric generator has become a research topic.
LITERATURE REVIEW: Reviews related to electricity generation using waste heat through combustion
engines were studied to gain more data, enough knowledge and skills required for completing this same.
Several research papers & thesis sources serve as guidelines for this project.
Investigation and optimization of design consisting of the TEG are done by (Liu & others 2018), the TEG which
is useful in recovering exhaust waste heat of automobile. The Multiphysics model of TEG is utilized for
recovering waste heat from the exhaust of automobiles. The proposed study modeled the “exhaust heat source
and water-cooling heat sink.” A similar study (Meisner 2010) developed a TEG to recover automobiles' waste
heat energy. Thermoelectric materials are also discussed in this paper. Overall heat transferred, associated
pressure drop and electrical power output are computed for exhaust gas inlet conditions and the available
volume of a thermoelectric generator. (S. Pratheebha 2016) also worked on exhaust gas usage for generating
power using thermoelectric generators. However, under this study, an “S-turbine” is placed in the exhaust path
of the “silencer.” The power is produced as soon as the “turbine is connected to a dynamo.” Due to the flow of
air, the turbine starts rotating with the dynamo. But under this, the kinetic energy (KE) is changed into EE.
The performance of waste heat recovery of a TEG is studied by (Kim, Negash, and Cho 2016). But under this,
customized thermoelectric modules are connected on both sides of a rectangular EG channel. The diesel engine
is operated under study. The maximum output power (MOP) of a TEG is observed that the power output due to
an increase in speed. The MOP of “119W at 2000 rpm” with a “BMEP of 0.6 MPa;” was approximately the
max energy conversion efficiency, 2.80%. A pressure drop of 0.45– 1.46 kPa is found under all operational
conditions.
HYPOTHESIS: Based on the above study following are the hypothesis
H0: More the temperature difference, the lesser electricity will be generated.
H1: More the temperature difference, the more electricity will be generated.
The study aims to achieve a temperature difference as high as possible to produce a large amount of electricity
through the use of a thermoelectric generator.
MATERIALS & METHODS
The study aims to utilize the HE from EGs to produce electricity using the SBE, which can be used ahead, to
run any auxiliary device like AC or automobiles(Ando Junior, Calderon, and de Souza 2018). The process uses
a Thermoelectric Generator to produce electricity using the temp difference between the EG temperature and
coolant flowing over the system. The exhaust gases pass over the thermoelectric generator, converting the HE
117
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

into EE. A thermoelectric generator is linked to a battery that will be charged by the electrical energy produced
during the process. The system uses thermoelectric modules to generate power by taking source heat, which
utilizes a large temperature gradient. Air or water will make the cold side cool. “Heat exchangers” are used on
both sides of the modules to provide heating and cooling effect (Lan et al., 2018). To design a reliable
thermoelectric generator, several challenges are being faced. Extensive engineer design is required for system
setup to maintain a proper balance between flow of heat through modules and maximize temperature gradient
across them. Because of this reason, thermoelectric generator engineering and maintenance are quite important.
Petrol engine exhaust gas has a higher temperature than diesel engines.
Firstly, EG temperature is being measured to guess the amount of electricity generated. After this,
thermoelectric modules are connected serially to form a thermoelectric generator (Wang et al., 2014). These
modules are selected based on exhaust temperature and are mounted on a heat exchanger, having an “inlet and
exit manifold.” To the exhaust pipeline, the former is directly attached to prevent temperature loss. A lithium
polymer battery is chosen as it is light in weight and takes less time to get charged. The battery gets charged by
electricity generated because of a voltage difference between the 2 terminals of the thermoelectric
generator(Demir and Dincer 2017).
EXPERIMENTAL RESULT & DISCUSSION
The temperature of the heater is decided in the range of 50℃ − 150℃, and experimentation is performed by
incrementing 20℃ temperature at each step of a heat source starting at 50℃. Corresponding current and
voltage were noted for ∆𝑇 at each level. The output power for a given temperature difference is shown in table1.
S. Source Sink Temp. Voltage Current Power
No. Temp. Temp. Difference (V) (Amp) (W)
( ℃) ( ℃) (∆𝑻)
1. 50 22 28 1.10 0.48 0.52
2. 70 29 41 1.28 0.56 0.71
3. 90 35 55 2.05 0.64 1.31
4. 110 43 67 2.77 0.68 1.88
5. 130 61 69 3.93 0.73 2.86
6. 150 70 80 4.26 0.75 3.19
Table 1: Output Power based on Temperature Difference
Figure 2 shows that “output power increases with the increase in the difference of temperature” of source and
sink. Hence, a higher temperature difference (ΔT) must be applied to get higher output power.

Figure 2: Temperature Difference impact on Power generated


118
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Various parameters of electricity generation have been analyzed by directly converting heat energy into
electrical energy using hot exhaust gases through a thermoelectric power generation system. A good amount of
electricity is generated by maintaining the maximum temperature difference. From Figure 2, the power
produced is relative to the temp difference. Hence, hypothesis H1 is accepted.
CONCLUSION
Through this research, an appropriate recovery method is a thermoelectric generator that has been found to
convert waste heat from exhaust engines to electricity. A thermoelectric generator is an appropriate way to
improve fuel efficiency. It is one of the promising technology for future generations as its size is small, highly
reliable, environment-friendly, has less noise or vibration, has low maintenance cost and has a long life. Also,
from this study, it has been concluded that the more the temperature difference of this heat released, the more
the electricity produced, and it improves the overall efficiency of the system. Future study is needed to improve
the thermoelectric generator efficiency and analyze costs.
REFERENCES
1. Ando Junior, Oswaldo, Nelson Calderon, and Samara de Souza. 2018. “Characterization of a
Thermoelectric Generator (TEG) System for Waste Heat Recovery.” Energies 11(6): 1555.
http://www.mdpi.com/1996-1073/11/6/1555.
2. Baig, Hasan et al. 2018. “Conceptual Design and Performance Evaluation of a Hybrid Concentrating
Photovoltaic System in Preparation for Energy.” Energy 147: 547–60. https://
linkinghub.elsevier.com/retrieve/pii/S0360544217321709.
3. Demir, Murat Emre, and Ibrahim Dincer. 2017. “Performance Assessment of a Thermoelectric Generator
Applied to Exhaust Waste Heat Recovery.” Applied Thermal Engineering 120: 694–707. https://
linkinghub.elsevier.com/retrieve/pii/S1359431116329957.
4. Haidar, J.G., and J.I. Ghojel. 2001. “Waste Heat Recovery from the Exhaust of Low-Power Diesel Engine
Using Thermoelectric Generators.” In Proceedings ICT2001. 20 International Conference on
Thermoelectrics (Cat. No.01TH8589), IEEE, 413–18. http:// ieeexplore.ieee.org/ document/ 979919/.
5. Kim, Tae Young, Assmelash A. Negash, and Gyubaek Cho. 2016. “Waste Heat Recovery of a Diesel
Engine Using a Thermoelectric Generator Equipped with Customized Thermoelectric Modules.” Energy
Conversion and Management 124: 280–86. https:// linkinghub.elsevier.com/ retrieve/pii/
S0196890416305830.
6. Kumar, Sumeet et al. 2013. “Thermoelectric Generators for Automotive Waste Heat Recovery Systems Part
I: Numerical Modeling and Baseline Model Analysis.” Journal of Electronic Materials 42(4): 665–74.
http:// link.springer.com/10.1007/s11664-013-2471-9.
7. Lan, Song, Zhijia Yang, Rui Chen, and Richard Stobart. 2018. “A Dynamic Model for Thermoelectric
Generator Applied to Vehicle Waste Heat Recovery.” Applied Energy 210: 327–38.
https://linkinghub.elsevier.com/retrieve/pii/S0306261917315799.
8. Liu, Hai-Bo, Jing-Hui Meng, Xiao-Dong Wang, and Wei-Hsin Chen. 2018. “A New Design of Solar
Thermoelectric Generator with Combination of Segmented Materials and Asymmetrical Legs.” Energy
Conversion and Management 175: 11–20. https:// linkinghub.elsevier.com/ retrieve/pii/
S0196890418309609.
9. Meisner, Gregory P. 2010. “Thermoelectric Generator Cooling System And Method Of Control.” : 28.
10. Meng, Fankai, Lingen Chen, Yuanli Feng, and Bing Xiong. 2017. “Thermoelectric Generator for Industrial
Gas Phase Waste Heat Recovery.” Energy 135: 83–90. https:// linkinghub.elsevier.com/ retrieve/pii/
S0360544217310800.
11. Orr, B., A. Akbarzadeh, M. Mochizuki, and R. Singh. 2016. “A Review of Car Waste Heat Recovery
Systems Utilising Thermoelectric Generators and Heat Pipes.” Applied Thermal Engineering 101: 490–95.
https://linkinghub.elsevier.com/retrieve/pii/S135943111501128X.
12. S.Pratheebha. 2016. “Engine Battery Supercharging from Exhaust Gas.” International Journal of Innovative
Research in Advanced Engineering (IJIRAE) 3(4).
13. Suryawanshi, Shubham et al. 2017. “Use of Exhaust Heat Energy of Two Wheelers to Generate Power by
Seebeck Effect.” International Research Journal of Engineering and Technology (IRJET) 4(1): 1366–70.
119
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

14. Wang, Tongcai, Weiling Luan, Wei Wang, and Shan-Tung Tu. 2014. “Waste Heat Recovery through Plate
Heat Exchanger Based Thermoelectric Generator System.” Applied Energy 136: 860–65.
https://linkinghub.elsevier.com/retrieve/pii/S0306261914007661.
15. Weng, Chien-Chou, and Mei-Jiau Huang. 2013. “A Simulation Study of Automotive Waste Heat Recovery
Using a Thermoelectric Power Generator.” International Journal of Thermal Sciences 71: 302–9.
https://linkinghub.elsevier.com/retrieve/pii/S1290072913000756.
16. Zhang, Yanliang et al. 2015. “High-Temperature and High-Power-Density Nanostructured Thermoelectric
Generator for Automotive Waste Heat Recovery.” Energy Conversion and Management 105: 946–50.
https://linkinghub.elsevier.com/retrieve/pii/S0196890415008055.

AUTHOR DETAILS:
1
AJITHA MARY C AND 2PREMLATA PANDIT
1
Research Scholar, Department of Physics, Dr A.P.J Abdul Kalam University, Indore (M.P.), India – 452016
2
Department of Physics, Dr A.P.J Abdul Kalam University, Indore (M.P.), India – 452016

120
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

NOTION OF SPACES USING MODULUS FUNCTION

SAMEER AHMAD GUPKARI

ABSTRACT
Recently Ganie and Dowlath have introduced the space 𝑟 𝑞 (𝑝, 𝑠) for 𝑠 ≥ 0 and studied its various properties.
The structure of this paper is to introduce the new aspects of modulus function by using the Riesz sequences.
Also, certain basic properties have been established.
2010 AMS Mathematical Subject Classification: 46A45; 40C05; 46J05.
Keywords: Modulus function, paranormed sequence, infinite matrices.

1. INTRODUCTION
We denote the set of all sequences with complex terms by Ω. It is a routine verification that Ω is a linear space
with respect to the coordinate wise addition and scalar multiplication of sequences which are defined, as usual,
by
ζ + η = (ζk ) + (ηk ) = (ζk + ηk )
and
βζ = β(ζk ) = (βζk ),
respectively; with ζ = (ζk ), η = (ηk ) ∈ Ω and β ∈ ℂ. By a sequence space, we define a linear subspace of Ω
i.e., the sequence space is the set of scalar sequences (real or complex) which is closed under coordinate wise
addition and scalar multiplication. Throughout the paper, ℕ and ℂ denote the set of non-negative integers and
the set of complex numbers respectively. As in [1,2,8, 11, 12,17], we denote by ℓ∞ , c and c0 , respectively, the
space of all bounded sequences, the space of convergent sequences and the space of sequences converging to
zero. Also, by ℓ1 , ℓ(p), cs and bs, we denote the spaces of all absolutely convergent, p-absolutely convergent,
convergent and bounded series respectively, as can be seen in [9, 14,21, 31,38].
As in [10], [15] − [19], for an infinite matrix T = (t ij ) and υ = (υk ) ∈ Ω, the T-transform of υ is Tυ =
{(Tυ)i } provided it exists ∀ i ∈ ℕ, where (Tυ)i = ∑∞
j=0 t ij υj .

For an infinite matrixT = (t ij ), the setGT , where


GT = {υ = (υi ) ∈ Ω ∶ Tυ ∈ G } (1)
is known as matrix domain of T in G [23, 24, 32, 33].
An infinite matrix G = (ϱnk ) is said to be regular if and only if the following conditions hold:
(i) limn→∞ ∑∞
k=0 ϱnk = 1,

(ii) limn→∞ ϱnk = 0, (k = 0, 1, 2, . . . ),


(iii) ∑∞
k=0|ϱnk | < M, (M > 0, n = 0, 1, 2, . . . ).

Let (qk ) be a sequence of positive numbers and let us write, Q n = ∑nk=0 q k for
q
n ∈ N. Then the matrix Rq = (rnk ) of the Riesz mean (R, qn ) is given by
qk
q if 0 ≤ k ≤ n,
rnk = {Q n
0 if k > n .
The Riesz mean (R, qn ) is regular if and only if Q n → ∞ as n → ∞ as can be seen in [29, 36].
Quite recently, in [32], the author has introduced the following:
pk
k
1
r q (u, p) = {ζ = (ζk ) ∈ Ω ∶ ∑ | ∑ uj qj ζj | < ∞},
Qk
k j=0
121
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Where, 0 < pk ≤ H < ∞.


In[20], the author introduced the following difference sequence spaces W(∆):
W(∆) = {ζ = (ζk ) ∈ Ω ∶ (∆ζk ) ∈ W},
Where, W ∈ {ℓ∞ , c , c0 } and∆ζk = ζk − ζk+1 .
In[2], the author has studied the sequence space as
bυp = {ζ = (ζk ) ∈ Ω ∶ ∑k|∆ζk |p < ∞},
Where1 ≤ p < ∞. With the notation of(1), the space bυp can be redefined as
bυp = (ℓp ) , 1 ≤ p < ∞,

Where, ∆ denotes the matrix ∆= (∆nk ) defined as


n−k
∆nk = {(−1) if n − 1 ≤ k ≤ n,
0 if k < n − 1 or k > n.
In[27], the author introduced the concept of modulus function. We call a function ℱ: [0, ∞) → [0, ∞) to be
modulus function if
(i) ℱ(ζ) = 0 If and only if ζ = 0 ,
(ii) ℱ(ζ + η) ≤ ℱ(ζ) + ℱ(η) ∀ ζ ≥ 0, η ≥ 0
(iii) ℱ is increasing, and
(iv) ℱ is continuous from the right at 0.
One can easily see that if ℱ1 and ℱ2 are modulus functions then so is ℱ1 + ℱ2 ; and the function ℱ j (j ∈ ℕ), the
composition of a modulus function ℱ with itself j times is also modulus function.
Recently, in [30] the new space was introduced by using notion of modulus function as follows:

L(ℱ) = { ζ = (ζr ): ∑|ℱ(ζr )| < ∞}.


r
The approach of constructing a new sequence space by means of matrix domain of a particular limitation
method has been studied by several authors. (ℓ∞ )Nq and cNq (see, [37]), (ℓp ) = X p and (ℓ∞ )C1 =
C1
X ∞ (see, [28]), (ℓ∞ )Rt = r∞ t
, (c)Rt = rct and (c0 )Rt = r0t (see, [19]), (ℓp ) t = rpt (see, [1]), (ℓp ) r =
R E
erp and (ℓ∞ )Er = er∞ (see, [3]), (c0 )Ar = ar0 and cAr = arc (see, [4]), [c0 (u, p)]Ar = ar0 (u, p) and
[c(u, p)]Ar = arc (u, p) (see, [5]), r q (u, p) = {ℓ(p)}Rq (see, [32]) and etc.
u
𝐪 𝐩
2. THE SEQUENCE SPACE 𝐫𝓕 (△𝐬 )OF
NON-ABSOLUTE TYPE
q p q p
In this section, we define the Riesz sequence space rℱ (△s ) , and prove that the space rℱ (△s ) is a complete
paranormed linear space and show it is linearly isomorphic to the spaceℓ(p).
Let Λ be a real or complex linear space, define the function τ: Λ → ℝ with ℝ as set of real numbers. Then, the
paranormed space is a pair (Λ; τ) and τ is a paranorm for Λ, if the following axioms are satisfied for all ζ , η ∈
Λ and for all scalars β:
(i) τ (θ) = 0,
(ii) τ (−ζ) = τ (ζ),
(iii) τ (ζ + η) ≤ τ (ζ) + τ (η), and
(iv) Scalar multiplication is continuous, that is,
|βn − β| → 0 and h(ζn − ζ)→ 0 imply τ(βn ζn − βζ)→ 0 for all β′s in ℝ and ζ′s in Λ, where θ is a zero vector
in the linear space Λ. Assume here and after that (pk ) be a bounded sequence of strictly positive real numbers
with sup
⏟ pk = H andM = max{1, H}. Then, the linear space ℓ∞ (p) was defined by Maddox [23] as follows:
k

122
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

⏟ |ζk |pk < ∞}


ℓ∞ (p) = {ζ = ζk : sup
k
which is complete space, paranormed by
1⁄
M
τ1 (ζ) = [sup
⏟ |ζk |pk ] .
k

We shall assume throughout that p−1 k + {pk ′}


−1
= 1 provided 1 < inf pk ≤ H < ∞, and we denote the
collection of all finite subsets of ℕ by F, where ℕ = {0, 1, 2, . . . }.
Following Basarir and Öztü rk [6], Choudhary and Mishra [7], Ganie et al [8]-[16], Jalal et al [18]-[19],
Mursaleen [24]-[26], Sengö nü l [31], Sheikh et al. [32]- [34], we define the difference sequence space
q p
rℱ (△s ) as follows:
𝑝𝑘
𝑘
q p 1
rℱ (△s ) = {ζ = (ζk ) ∈ Ω: ∑ |ℱ ( 𝑠 ∑ 𝑞𝑗 𝛥𝜁𝑗 )| < ∞}
Q𝑘
k 𝑗=0

Where, 0 < 𝑝𝑘 ≤ 𝐻 < ∞ and𝑠 ≥ 0.


By (1), it can be redefined as
𝑞 𝑝
𝑟ℱ (△𝑠 ) = {ℓ(𝑝)}𝑅𝑞 (△𝑔) .

𝑞
Define the sequence𝜉 = (𝜉𝑘 ), which will be used, by the 𝑅ℱ (△𝑔 ) −transform of a sequence𝜁 = (𝜁𝑘 ), i.e.,
1
𝜉𝑘 = ℱ (𝑄𝑠 ∑𝑘𝑗=0 𝑞𝑗 𝛥𝜁𝑗 ) (2)
𝑘

Now, we begin with the following theorem which is essential in the text.

𝑞 𝑝
Theorem 2.1. 𝑟ℱ (△𝑠 ) is a complete linear metric space paranormed by ℎ△ , defined as
1
𝑝𝑘 𝑀
𝑘
1 𝑞𝑘
ℎ△ (𝜁) = [∑ |ℱ ( 𝑠 ∑(𝑞𝑗 − 𝑞𝑗+1 ) 𝜁𝑗 + 𝑠 ) 𝜁𝑘 | ]
𝑄𝑘 𝑄𝑘
𝑘 𝑗=0

with0 < 𝑝𝑘 ≤ 𝐻 < ∞.


𝑞 𝑝
Proof: The linearity of 𝑟ℱ (△𝑠 )with respect to the co-ordinatewise addition and scalar multiplication follows
𝑞 𝑝
from the inequalities which are satisfied for 𝜁 , 𝜉 ∈ 𝑟ℱ (△𝑠 ) ( 𝑠𝑒𝑒 [23], 𝑝. 30).
1
𝑝𝑘 𝑀
𝑘−1
1 𝑞𝑘
[∑ |ℱ ( 𝑠 ∑(𝑞𝑗 − 𝑞𝑗+1 )(𝜁𝑗 + 𝜂𝑗 ) + 𝑠 (𝜁𝑘 + 𝜂𝑘 ))| ]
𝑄𝑘 𝑄𝑘
𝑘 𝑗=0

1
𝑝𝑘 𝑀
𝑘−1
1 𝑞𝑘
≤ [∑ |ℱ ( 𝑠 ∑(𝑞𝑗 − 𝑞𝑗+1 ) 𝜁𝑗 + 𝑠 𝜁𝑘 )| ]
𝑄𝑘 𝑄𝑘
𝑘 𝑗=0
1
𝑝𝑘 𝑀
1 𝑞𝑘
+ [∑𝑘 |ℱ (𝑄𝑠 ∑𝑘−1
𝑗=0 (𝑞𝑗 − 𝑞𝑗+1 ) 𝜂𝑗 + 𝑠
𝑄𝑘
𝜂𝑘 )| ] (3)
𝑘

and for any 𝛼 ∈ ℝ ( 𝑠𝑒𝑒 [22])


|𝛼|𝑝𝑘 ≤ 𝑚𝑎𝑥(1 , |𝛼|𝑀 ). (4)

123
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

𝑞 𝑝
It is clear that ℎ∆ (𝜃) = 0 and ℎ∆ (𝜁) = ℎ∆ (−𝜁) for all 𝜁 ∈ 𝑟ℱ (△𝑠 ). Again, the inequality (3) and (4) yield the
subadditivity of ℎ∆ and
ℎ∆ (𝛼𝜁) ≤ 𝑚𝑎𝑥(1 , |𝛼|)ℎ∆ (𝜁) .
𝑞 𝑝
Let {𝜁 𝑛 } be any sequence of points of the space 𝑟ℱ (△𝑠 ) such that ℎ∆ (𝜁 𝑛 − 𝜁) → 0 and (𝛼𝑛 ) is a sequence of
scalars such that𝛼𝑛 → 𝛼. Then, since the inequality,
ℎ∆ (𝜁 𝑛 ) ≤ ℎ∆ (𝜁) + ℎ∆ (𝜁 𝑛 − 𝜁)
Holds, by subadditivity of ℎ∆ , {ℎ∆ (𝜁 𝑛 )} is bounded and we thus have
1
𝑝𝑘 𝑀
1
ℎ∆ (𝛼𝑛 𝜁 𝑛 − 𝛼𝜁) = [∑𝑘 |ℱ (𝑄𝑠 ∑𝑘𝑗=0(𝑞𝑗 − 𝑞𝑗+1 ) (𝛼𝑛 𝜁𝑗𝑛 − 𝛼𝜁𝑗 ))| ]
𝑘

1 1
≤ |𝛼𝑛 − 𝛼|𝑀 ℎ∆ (𝜁 𝑛 ) + |𝛼|𝑀 ℎ∆ (𝜁 𝑛 − 𝜁)
Which tends to zero as n → ∞, which shows that the scalar multiplication is continuous. Hence, ℎ∆ is paranorm
𝑞 𝑝
on the space 𝑟ℱ (△𝑠 ).
𝑞 𝑝
It remains to prove the completeness of the space 𝑟ℱ (△𝑠 ). Let {𝜁 𝑗 } be any Cauchy sequence in the
𝑞 𝑝
space 𝑟ℱ (△𝑠 ), where 𝜁 𝑖 = {𝜁0𝑖 , 𝜁1𝑖 , 𝜁2𝑖 , . . }.Then, for a given 𝜀 > 0, there exists a positive integer 𝑛0 (𝜀) such that
ℎ∆ (𝜁 𝑖 − 𝜁 𝑗 ) < 𝜀 (5)
for all 𝑖, 𝑗 ≥ 𝑛0 (𝜀). Using definition of ℎ∆ and for each fixed 𝑘 ∈ ℕ, we have
1
𝑞 𝑞 𝑞 𝑞 𝑝𝑘 𝑀
|(𝑅ℱ △𝑠 𝜁 𝑖 )𝑘 − (𝑅ℱ △𝑠 𝜁 𝑗 )𝑘 | ≤ [∑ |(𝑅ℱ △𝑠 𝜁 𝑖 )𝑘 − (𝑅ℱ △𝑠 𝜁 𝑗 )𝑘 | ] < 𝜀
𝑘
𝑞 𝑞
for all 𝑖, 𝑗 ≥ 𝑛0 (𝜀), which leads us to the fact that {(𝑅ℱ △𝑠 𝜁 0 )𝑘 , (𝑅ℱ △𝑠 𝜁1 )𝑘 , . . . } is a Cauchy sequence of
𝑞 𝑞
real numbers for every fixed 𝑘 ∈ ℕ . Since ℝ is complete, it converges, say, (𝑅ℱ △𝑠 𝜁 𝑖 )𝑘 → (𝑅ℱ △𝑠 𝜁)𝑘 as
𝑞 𝑞 𝑞
𝑖 → ∞. Using these infinitely many limits (𝑅ℱ △𝑠 𝜁)0 , (𝑅ℱ △𝑠 𝜁)1 , . . .,we define the sequence {(𝑅ℱ △𝑠 𝜁)0 ,
𝑞
(𝑅ℱ △𝑠 𝜁)1 , . .. }. From (5), for each 𝑚 ∈ ℕ, and 𝑖, 𝑗 ≥ 𝑛0 (𝜀),
𝑞 𝑞 𝑝𝑘 𝑀
∑𝑚 𝑖 𝑗
𝑘=0 |(𝑅ℱ △𝑠 𝜁 )𝑘 − (𝑅ℱ △𝑠 𝜁 )𝑘 | ≤ ℎ∆ (𝜁 𝑖 − 𝜁 𝑗 ) < 𝜀 𝑀 (6)

Take any 𝑖, 𝑗 ≥ 𝑛0 (𝜀). First, let 𝑗 → ∞ in (6) and then 𝑚 → ∞, we obtain


ℎ∆ (𝜁 𝑖 − 𝜁) ≤ 𝜀,
Finally, taking 𝜀 = 1 in (6) and by letting𝑖 ≥ 𝑛0 (1), we have by Minkowski’s inequality for each 𝑚 ∈ ℕ that
1
𝑞 𝑝𝑘 𝑀
[∑𝑚
𝑘=0 |(𝑅ℱ △𝑔 𝜁) | ] ≤ ℎ∆ (𝜁 𝑖 − 𝜁) + ℎ∆ (𝜁 𝑖 ) ≤ 1 + ℎ∆ (𝜁 𝑖 )
𝑘
𝑞 𝑝
Which implies that𝜁 ∈ 𝑟ℱ (△𝑠 ).
𝑞 𝑝
Since ℎ∆ (𝜁 𝑖 − 𝜁) ≤ 𝜀 for all, 𝑖 ≥ 𝑛0 (𝜀), it follows that 𝜁 𝑖 → 𝜁, as 𝑖 → ∞, hence we have shown that 𝑟ℱ (△𝑠 )
is complete, hence the proof of the theorem follows.
𝑞 𝑝
Note that one can easily see the absolute property does not hold on the spaces 𝑟ℱ (△𝑠 ), that is, ℎ∆ (𝜁) ≠ ℎ∆ (|𝜁|)
𝑞 𝑝 𝑞 𝑝
for at least one sequence in the space 𝑟ℱ (△𝑠 ) and this says that 𝑟ℱ (△𝑠 ) is a sequence space of nonabsolute
type.
3. INCLUSION RELATIONS
In this section, we investigate some of its inclusions properties.
Theorem 3.1. If 𝑝𝑘 𝑎𝑛𝑑 𝑡𝑘 are bounded sequences of positive real numbers with 0 < 𝑝𝑘 ≤ 𝑡𝑘 < ∞ for each
𝑞 𝑝 𝑞
𝑘 ∈ ℕ, then for any modulus function ℱ , 𝑟ℱ (△𝑠 ) ⊆ 𝑟ℱ (△𝑡𝑠 ).
𝑞 𝑝
Proof: For 𝜁 ∈ 𝑟ℱ (△𝑠 ), it is obvious that

124
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

𝑝𝑘
𝑘−1
1 𝑞𝑘
∑ |ℱ ( 𝑠 ∑(𝑞𝑗 − 𝑞𝑗+1 ) 𝜁 𝑗 + 𝑠 𝜁 𝑘 )| <∞
𝑄𝑘 𝑄𝑘
𝑘 𝑗=0

Consequently, for sufficiently large values of 𝑘 say 𝑘 ≥ 𝑘0 for some fixed 𝑘0 ∈ ℕ.


k−1
1 qk
|ℱ ( 𝑠 ∑(qj − qj+1 ) ζ j + s ζ k )| < ∞
𝑄𝑘 Qk
𝑗=0

But ℱ being increasing and pk ≤ t k, we have


tk
k−1
1 qk
∑ |ℱ ( s ∑(qj − qj+1 ) ζ j + s ζ k )|
Qk Qk
k≥k0 j=0
pk
1 q
≤ ∑k≥k0 |ℱ (Qs ∑k−1 k
j=0 (q j − q j+1 ) ζ j + Qs ζ k )| < ∞.
k k
q
From this it is clear that ζ ∈ rℱ (△ts ) and the result follows. ⋄
REFERENCES
[1] B. Altay and F. Basar, On the paranormed Riesz sequence space of nonabsolute type, Southeast Asian
Bull. Math., 26 (2002), pp. 701-715.
[2] B. Altay and F. Basar, On the space of sequences of p-bounded variation and related matrix mappings,
Ukarnian Math. J., 1(1) (2003), pp. 136-147.
[3] B. Altay, F. Basar, and M. Mursaleen, On the Euler sequence spaces which include the Spaces ℓp and
ℓ∞ , Nonlinear Anal., 176 (2006), pp. 1465-1462.
[4] C. Aydin and F. Basar, On the new sequence spaces which include the spaces c0 and c, Hokkaido Math.
J., 33 (2002), pp. 383-398.
[5] C. Aydin and F. Basar, Some new paranormed sequence spaces, Inf. Sci., 160 (2004), 27-40.
[6] M. Basarir and M. Öztürk, On the Riesz difference sequence space, Rendiconti del Cirocolo di Palermo,
57 (2008), 377-389.
[7] B. Choudhary and S. K. Mishra, On Köthe Toeplitz Duals of certain sequence spaces and matrix
Transformations, Indian J. Pure Appl. Math., 24(4) (1993), pp. 291-301.
[8] D. Fathima and A. H. Ganie, On some new scenario of ∆- spaces, J. Nonlinear Sci. Appl., 14 (2021), 163-
167, 163-167.
[9] D. Fathima, M. m Albaidani, A. H. Ganie and A. Akhter, New structure of Fibonacci numbers using
concept of ∆-operator, J. Math. Comput. Sci., 26(2) (2022), 101-112.
[10] A. H. Ganie, New spaces over modulus function, Boletim Sociedade Paranaense de Matematica (in
press), 1-6: http://www.spm.uem.br/bspm/pdf/next/313.pdf.
[11] A. H. Ganie and N. A. Sheikh, Matrix transformation into a new sequence space related to invariant
means, Chamchuri J. Math., 4(12)(2012), 71-72.
[12] A. H. Ganie, M. Ahmad and N. A. Sheikh, Generalized difference paranormed sequence space with
respect to modulus function and almost convergence, Journal of Global Research in Computer
Science, 6(11) (2015), 23-26.
[12] A. H. Ganie and D. Fathima, Almost convergence property of generalized Riesz spaces, Journal of
Applied Mathematics and Computation, 4(4) (2020), 249-253.
[13] A. H. Ganie and M. m. Albaidan, Matrix Structure of Jacobsthal numbers, J. Funct. Spaces., bf 2021
(2021) Article ID 2888840.
[14] A. H. Ganie and N. A. Sheikh, On some new sequence spaces of non-absolute type and matrix
transformations, J. Egyp. Math. Soc., 21(2) (2013), 34-40.

125
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[15] A. H. Ganie, Mobin Ahmad, N. A Sheikh, T. Jalal and S. A. Gupkari, Some new type of difference
sequence space of non absolute type, Int. J. Modern Math. Sci., 14(1) (2016), 116-122.
[16] A. H. Ganie, S. A. Gupkari and A. Akhtar, Invariant means of sequences with statistical bahaviour, Int. J.
Creative Resh. Thoughts (IJCRT), 8(8) (2020), 2702-2705.
[17] K. G. Gross Erdmann, Matrix transformations between the sequence spaces of Maddox, J. Math. Anal.
Appl., 180 (1993), pp. 223- 238.
[18] T. Jalal and A. H. Ganie, Almost convergence and some matrix transformations, International Jour. Math.
(Shekhar New Series), 1(1) (2009), 133-138.
[19] T. Jalal, S. A. Gupkari and A. H. Ganie, Infinite matrices and sigma convergent sequences, South East
Asian Bull. Math., 36 (2012), 825-830.
[20] H. Kizmaz, On certain sequence, Canad. Math. Bull., 24(2) (1981), pp.169-176. [21] C. G. Lascarides
and I. J. Maddox, Matrix transformations between some classes of sequences, Proc. Camb. Phil. Soc., 68
(1970), pp.99-104.
[22] I. J. Maddox, Paranormed sequence spaces generated by infinite matrices, Proc. Camb. Phil. Soc., 64
(1968), pp. 335-340.
[23] I. J. Maddox, Elements of Functional Analysis, 2nded., The University Press Cambridge, (1988).
[24] M. Mursaleen, A. H. Ganie and N. A. Sheikh, New type of difference sequence space and matrix
transformation, FILOMAT, 28(7) (2014), 1381-1392.
[25] M. Mursaleen, F. Basar, and B. Altay, On the Euler sequence spaces which include the spaces lp and l∞-
II, Nonlinear Anal., 65 (2006), 707-717.
[26] M. Mursaleen, and A. K. Noman, On some new difference sequence spaces of non- absolute type, Math.
Comput. Mod., 52 (2010), pp. 603-617.
[27] N. Nakano, Cancave modulars, J. Math. Soc. Japan, 5(1953), 29-49.
[28] P.-N. Ng and P.-Y. Lee, Cesaro sequences spaces of non-absolute type, Comment. Math. Prace Mat.
20(2) (1978), pp. 429-433.
[29] G. M. Petersen, Regular matrix transformations, Mc Graw-Hill, London, (1966).
[30] W. H. Ruckle, FK spaces in which the sequence of coordinate vectors is bounded, Canad. J. Math.,
25(1973), 973-978.
[31] M. Sengönül and F. Basar, Some new Ces´aro sequences spaces of non-absolute type, which include the
spaces c0 and c, Soochow J. Math., 1 (2005), pp. 107-119.
[32] N. A. Sheikh and A. H. Ganie, A new paranormed sequence space and some matrix transformations, Acta
Math. Acad. Paedagog. Nyiregyhaziensis, 28 (2012), 47-58.
[33] N. A. Sheikh and A. H. Ganie, A new type of sequence space of non-absolute type and matrix
transformation, WSEAS Trans. Math., 8(12) (2013), 852-859.
[34] N. A. Sheikh and A. H. Ganie, Some matrix transformations and almost convergence, Kathmandu Univ.
jou. of Sci. Eng and Tech.,8(II) (2012), 89-92.
[35] N. A. Sheikh, T. Jalal and A. H. Ganie, New type of sequence spaces of nonabsolute type and some
matrix transformations, Acta Math. Acad. Paedagog. Nyiregyhaziensis, 29 (2013), 51-66.
[36] Ö. Toeplitz, Über allegemeine Lineare mittelbildungen, Prace Math. Fiz, 22 (1991), pp.113-119.
[37] C.-S. Wang , On Nörlund sequence spaces, Tamkang J. Math., 9 (1978), pp. 269-274.
[38] A. Wilansky, Summability through Functional Analysis, North Holland Mathematics Studies, Amsterdam
- New York - Oxford, (1984).

AUTHOR DETAILS:
SAMEER AHMAD GUPKARI
Jammu and Kashmir Institute of Mathematical Sciences, Srinagar -190008 India

126
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

SOCIAL SUPPORT AND MENTAL HEALTH AMONG OBESE PEOPLE

M. YOUSUF ADAM AND DR. MOHAMMAD AMIN WANI

ABSTRACT
Obesity and mental health problems are becoming as major health related issues in 21 st century due to
improper and unhealthy lifestyles. It can be revealed through an exploratory study to find out influence of social
support on mental health using regression analysis, to examine gender and age difference in social support and
mental health using non-parametric test as Mann-Whitney test and Kruskal-Wallis test among 203 obese people
habitats in urban and rural areas from southern part of India. Obese participants were selected by measuring
their body mass index, and asked to involve in the study through purposive sampling technique. Measuring tools
used in this study are Multidimensional perceived social support scale (MDPSS) and the mental health
inventory-38 (MHI38). The findings revealed that social support have significant positive influence over mental
health with regression coefficient was with p value .000. Social support and mental health have no significant
gender difference, but have significant age difference among people. Further, this study showed there is
prevalence of high social support and low mental health among obese people.
Keyword: Mental Health, Obesity, Social Support, Regression analysis, Mann-Whitney test, Kruskal Wallis test,
and Body Mass Index.

INTRODUCTION
If anybody teases you about your body appearance, will make you unhappy and soon get depressed. Our body
appearance greatly looks bad especially due to obesity. It means deposition of excessive fat beyond specific
level in body mass index (BMI). World Health Organisation (WHO) classified BMI as underweight (less than
18.5), normal weight (18.5 to 24.9), overweight (25 to 29.9), and obesity (greater than 30). Beyond biological
and hereditary nature of obesity, people with obese have greater chances for depression and mental health
disorder (Milano et al., 2020). Obesity have both medical and psychological consequences. Obesity acts as risk
factor for many metabolic and chronic conditions such as high blood pressure, heart disease, stroke, type 2
diabetes, high cholesterol, joint problems, and sleep apnea (National Institute of Diabetes and Digestive and
Kidney Diseases, 2019). Obesity also associated with many psychosocial issues especially related to mood, self-
esteem, life satisfaction, quality of life and body appearance (Sarwer and Polonsky, 2019). Beyond weight
discrimination happened to obese people in social environment like schools, colleges, restaurants and other
public gatherings, many obese people have been perceiving inequalities in healthcare sectors also (Puhl &
Heuer, 2010). Obese people have low exercise self-efficacy, high depression, high anxiety, high stigma induced
stress, high external shame, poor psychological adjustment, and feelings of social rejection which made some
potential harmful impact in their health promotion and education protocol (Graham & Edwards, 2013). Aim of
this study is to examine influences of social support and self-esteem on mental health among obese people.
Social support acted as potential mediating factor in reducing harmful effect of obesity (Ozbay et al., 2007). A
study revealed that obese adults have 55% of chance of getting depression than non-obese adults (Luppino et
al., 2010). Thus, mental health of obese people will be highly effective to avoid medical complications through
appropriate weight reduction strategies and / or to prevent unnecessary psychological consequences.
SOCIAL SUPPORT
Social support literally means perceived support structure from family peoples, friends and some specific person
which may include teacher, lover, spouse, mentor, guru, religious leader...etc. Social support acts as
contributing agents in maintaining optimum physical, social and mental health (Gofman, 2014). Social support
is an important mediator which prevents unwanted stress especially from social interactions. Social support
structure creates safe mood, respectable behaviour, valued personality, and willing to participate public
gathering (Lam, 2019). Emotional, esteemed, and high intimate relationship give room for greater perception
toward support structure (Pierce et al., 1997). Social support structure minimize one’s health problem and acts
as preventing role in getting physical and mental illness (Roy, 2011).
MENTAL HEALTH
Mental health compromises emotional, psychological and social well-being of an individual. Our thoughts,
feelings and behaviours predict nature and consequence of mental health. Mental health is important for every
body and in every stages of lifespan from childhood, adolescence and adulthood. Obese people perceives poor

127
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

mental health through social stigma, teasing, bullying, weight stigma, body dissatisfaction, low social support
and low self-esteem (Puhl & Heuer, 2010). A community-based review study stated that around 80% of studies
related to obesity revealed presence of depression, but only 53% studies in depression defined about obesity
(Faith et al., 2011). Thus, obesity acts as main causation for poor mental health. Obesity have strong
correlation with emotional disorder especially with women (Scott et al., 2007; Simon et al., 2006). National
Health Insurance Database of Korea showed unhealthy obese people with metabolic disease and healthy obese
female with metabolic disease have strong relationship with depression (Seo et al., 2020).
OBJECTIVE OF THIS STUDY
1. To find the influence of social support on mental health among obese people.
2. To investigate gender difference in social support and mental health among obese people.
3. To investigate age difference in social support and mental health among obese people.
4. To know the level of social support and mental health among obese people.
METHODOLOGY
Present study is an exploratory, quantitative, non-experimental, survey type study with descriptive in nature.
VARIABLE
Social support and mental health are psychological variables in which mental health is dependent variable
(criterion variable) while social support as independent variables (predictor variables). The demographic
variables defined in this study are age and gender.
SAMPLING
This study were carried as community study in which prime focus of data collection is from public people. The
researchers have performed this proposed study in Cuddalore district of Tamil Nadu, India. Research design
includes purposive sampling technique and the criteria for selection of sample are obese people above 15 years
old, from Cuddalore district, and belonging to urban and rural areas.
Table 1: Descriptive statistical details with respect to age, gender, social support, self-
esteem and mental health among obese (203).
Frequency Percentage
Age Group
15 to 25 49 24
26 to 35 72 36
Above 35 years 82 40
Gender
Male 84 41
Female 119 59
Total 203 100
Table 1 described frequency of observation in each subgroup with respect to age and gender among obese. The
prevalence of obesity is much higher among people above 35 years old. This prevalence was supported by one
previous study carried based on Niyantrita Madhumeha Bharata Data in project Control of Diabetes in India
during 2017 stated that obesity prevalence gets increase in greater extent among people in age group above 40
years old (Venkatrao et al., 2020). The prevalence of obesity with respect to gender have showed women
population has higher percentage than men population as seen in present study in which 59% female have in
obese than 41% male obese. This findings were supported by many previous studies as seen in Dwivedi et al.,
2019; Lartey et al., 2019; Al-Raddadi et al., 2019; Andoy-Galvan et al., 2020; Djalalinia et al., 2020; and
Adeloye et al., 2021.
Measuring Tools:
In this study, the researchers used the following measuring scales,
1. Demographic Sheet: It includes questionnaires related to participants’ personal information.
2. Body Mass Index: It is a calculation to identify level of fat deposition based on weight and height of
participant (weight of an individual in kilogram divided by square of height of an individual in centimeter).
WHO classified it as underweight, normal weight, overweight and obese
3. Multi-Dimensional Perceived Social Support Scale (MDPSS); It is used for measuring perceived social
support especially family support, friend support and significant other. This scale was constructed by Zimet
et al (1988) and has 12 items as likert type scale with seven responses 1 to 7 (Very Strongly Disagree to

128
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Very Strongly Agree). It have showed very high Cronbach’s ∝ value which is in between 0.92 and 0.93 for
12 items in recent study by Wittenborn et al (2020).
4. The Mental Health Inventory (MHI-38): It is developed by Veit & Ware (1983) and used for measuring
mental health of an individuals. It consist of 38 items in 6 point likert type responses and it has two global
scale namely psychological well-being and psychological distress. It also have six subscales as anxiety,
depression, behavioural control, positive affect, emotional ties and Life satisfaction.
RESULTS AND DISCUSSIONS
The present study aimed to predict the influence of social support on mental health. Further to investigate
gender and age difference in said variables. The level of social support and mental health among obese people is
also investigated. The findings of the above cited objectives are given in following tables.
Table 2: Descriptive statistical details of social support among obese (203).
Obese
Social Support Range
Frequency Percentage
Low 12 - 33 14 7
Moderate 34 - 60 40 20
High 61 - 84 149 73
Total 203 100
Table 2 showed descriptive statistical details of social support among 203 obese. It revealed 76% of obese
people have scored high social support, while 20% have scored moderate social support and only 7% have low
social support. This finding goes in line side by side with previous studies as obesity was associated with high
social status (Vartanian & Silverstein, 2013), support system have positive correlation with overweight and
obesity (Shenk et al., 2021), high social supports brought to obesity through easy access to social vulnerable
environment like over parental care and easy food access (Iguacel et al., 2020). Thus, emerging prevalence of
obesity as seen oin present study may be due to high perceived social support from family, friend, social
structure or social relations.
Table 3: Descriptive statistical details of mental health among obese (203).
Obese
Mental Health Raw Score Range
Z-Score Range Frequency Percentage
Extremely Low 38 - 104 -2.01& below 7 3
Low 105 - 115 -2.00 to -1.26 12 6
Below Average 116 - 127 -1.25 to -0.51 22 11
Average 128 - 144 -.050 to 0.50 112 55
Above average 145 - 155 0.51 to 1.25 34 17
High 156 - 167 1.26 to 2.00 13 6
Extremely High 168 & above 2.00 & above 3 2
Total 203 100
Table 3 stated descriptive statistical details of mental health among 203 obese people. It revealed around 55% of
them have scored average level of mental health, 25% of them in above average and high mental health, while
only 20% were from below and low mental health. The level of mental health among obese were prepared based
on z-score calculation in which majority of obese people were scored mental health in average and below
average level. only 6% of them have scored high and 2% in extremely high level of mental health. This finding
further supported by many previous studies as there was strong relationships between mental health and obesity
as obesity acted as risk factor for anxiety, depression, and stress (AlQahtani et al. 2015). Patient with obese
have greater chance to get depression (Milano et al., 2020). Perceived physical health acted as the strongest
predictor of mental health among obese people (Knoesen et al. 2010). Further, it is stated that within obese
people women population have high mental health issue like emotional instability, anxiety and depression than
men (Sharafi et al. 2020).
Table 4: Regression analysis shows the influence of social support, and self-esteem on Mental Health
among obese (203) populations.
Std p-
Predictor Criterion Adjus Std. t-
R R2 2 Error of B ᵦ valu
Variable Variable ted R Error value
Estimate e

129
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Social Mental
.356 .127 .122 14.879 .395 .073 .356 5.400 .000
Support Health
Table 4 showed linear regression analysis to know influence of social support on mental health among obese
people using SPSS latest version. The predictor variable social support have statistically significant influences
over criterion variable mental health. Social support have significant positive influence on mental health, p =
.000, R = .356, R2 = .127, adjusted R2 = .122. The regression co-efficient (B) for predictor variable social
support is .395, which revealed an increase in one part of perceived social support will increase the criterion
variable mental health with .395 points. The R2 value denoted co-efficient of determination which means social
support contributed 12.7% in prediction of mental health. This finding is in line side by side with many previous
studies as social support with pampered parenting have higher obesity rate (Yoshida et al., 2020), social support
has buffering action on mental health and body mass index (Xie et al., 2005), mental health issues depend on
perceived social support and self-acceptance (Hwang et al., 2016) and Social support shapes exercise and food
behaviours among obese people (Guevara-Valtier et al., 2021).
Table 5: Gender difference in social support among obese by using Mann-Whitney Test
N Mean Rank Asymp.
Sum of Social
Test Sig. (2-
Ranks Support
tailed)
Mann- 4593.00 .313
Male 84 106.82 8973.00
Whitney U
Female 119 98.60 11733.00 Wilcoxon W 11733.00
Total 203 Z -1.008
Table 5 revealed that gender difference in social support among 203 obese people using non-parametric test
Mann-Whitney test. Even though male obese have scored higher mean rank than female obese people, it
showed there is no significant gender difference between male and female among obese people. Social support
have statistically insignificant higher mean in male obese (mean rank = 106.82) than female obese (mean rank =
98.60) with U = 4593.00, Wilcoxon W = 11733.00, Z = -1.008, p = .313. These findings goes in line with
previous studies with significant output as female have significant high perceived social loneness and isolation
(Neil-Sztramko et al., 2020), perceived support among female helps to buffer their mental health (Alsubaie et
al., 2019), women people have perceived high social support only in expressive trait while other traits men have
high perceived social support (Matud et al 2019).
Table 6: Gender difference in mental health among obese by using Mann-Whitney Test.
N Asymp.
Sum of Social
Mean Rank Test Sig. (2-
Ranks Support
tailed)
Mann- .332
Male 84 106.76 8967.50 4598.50
Whitney U
Female 119 98.64 11738.50 Wilcoxon W 11738.50
Total 203 Z -.970
Table 6 revealed that gender difference in mental health among 203 obese people using Mann-Whitney test.
Even though male obese have scored higher mean rank in mental health than female obese people, it showed
that there was no significant gender difference in mental health between male and female among obese people.
Mental health have statistically insignificant higher mean in male obese (mean rank = 106.76) than female
obese (mean rank = 98.64) with U = 4598.50, Wilcoxon W = 11738.50, Z = -.970, p = .332. This finding goes
in line with previous studies as mental health have showed mean difference based on social type and not by
gender (Kiely et al., 2019), and mental health have no significant gender differences among students (Liu et al.,
2020), gender differences in mental health have as conflicting evidence due to psychopathology within women
(Dhejne et al., 2016), gender differences in mental health also change with age groups like conduct disorder
were common in boy in childhood (Scott 1998).
Table 7: Age difference in social support among obese by using Kruskal-Wallis Test.
Age N Asymp.
Standard Kruskal-
Mean Rank Mean Sig.
Deviation Wallis H
(2-tailed)
15 to 25 years 49 89.49 65.31 14.32 6.044 .049
130
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

26 to 35 years 72 97.51
Above 35 years 82 113.41
Total 203
Table 7 stated that age difference in social support among 203 obese people using Kruskal;-Wallis test which
revealed that there is significant mean difference in social support among different age groups with 49
observations from age group 15 to 25 years old, 72 observations from age group 26 to 35 years old and 82
observations age group above 35 years old, Kruskal Wallis H = 6.044, p = .049, with a mean rank social support
score of 89.49 for 15 to 25 years, 97.51 for 26 to 35 years and 113.41 for above 35 years. Comparatively age
group above 35 years took higher social support mean rank than 26 to 35 years and 15 to 25years old. The
overall mean and standard deviation of social support is 65.30 and 14.31 respectively. This finding goes in line
with previous studies as aged people have good social support than young to prevent their mental abnormalities
(Tyler & Hoyt, 2000), older people with secured family have high perceived social support than young people
from same family (Wojszel & Politynska, 2021), experienced aged staff have high social support than new one
(Cai et al., 2020), but young employee with good education and healthier lifestyles may perceive better social
support than other employees (Alcañiz & Solé-Auró, 2018).
Table 8: Age difference in mental health among obese by using Kruskal-Wallis Test.
Asymp.
Standard Kruskal-
Age N Mean Rank Mean Sig.
Deviation Wallis H
(2-tailed)
15 to 25 years 49 87.86
26 to 35 years 72 94.51 135.96 15.882 9.390 .009
Above 35 years 82 117.03
Total 203
Table 8 stated that age difference in mental health among 203 obese people using Kruskal;-Wallis test which
revealed that there is statistically significant mean difference in mental health among different age groups with
49 observations from age group 15 to 25 years old, 72 observations from age group 26 to 35 years old and 82
observations age group above 35 years old, Kruskal Wallis H = 9.390, p = .009, with a mean rank in mental
health score of 87.86 for 15 to 25 years, 94.51 for 26 to 35 years and 117.03 for above 35 years. Comparatively
age group above 35 years took higher self-esteem mean rank than 26 to 35 years and 15 to 25years old. The
overall mean and standard deviation of social support is 135.96 and 15.88 respectively. This findings goes in
line with previous studies there was change in mental health disorders with respect to age like conduct disorders
more in childhood, while anxiety and substance use was high in adolescence and psychotic disorders was more
common in early adulthood (de Girolamo et al., 2011), mental health issues were high in childhood or
adolescents and gets decrease as age proceeds (Kessler et al., 2007), mental health have significant age
difference only based on category distribution and not merely by age (Li et al., 2021), and older age peoples
gets mental health issues based on their parenting social involvement or marital life (Becker et al.,2018).
CONCLUSION
Obesity is becoming as emerging health problem throughout world population due to its nature of consequences
towards medical problem and psychosocial disturbances (Kopelman et al., 2010). Indian datasets in obesity also
revealed harmful nature of obesity especially among young population (Luhar et al., 2020). Mental health and
obesity have bidirectional correlation between them as obesity increases mental health decrease, similarly low
mental health acted as risk factor for obesity. Thus, maintaining mental health as well as body mass index is
very important in order to avoid mental health issues and obesity. Social support have major role in controlling
mental health and obesity. Social support mediate or enhance mental health through perceived support structure,
healthy self-esteem favours optimum mental health. In obese people, social support promotes health behaviours
like increasing physical activity and healthy food habits to maintain body mass index in normal by shifting
energy balance either in neutral or negative side. The researches recommended policy maker in mental health
and obesity to consider social support as main contributing performer in weight reduction program. Few
previous studies revealed low social support acted as causation for obesity, but present study revealed
prevalence of high perceived social support have seen among obese people. These facts suggested that emerging
obesity issue is due to improper and unhealthy lifestyle with high social support which give path to further
research in mental health and obesity.

131
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

REFERENCES
 Adeloye, D., Ige-Elegbede, J. O., Ezejimofor, M., Owolabi, E. O., Ezeigwe, N., Omoyele, C., Mpazanje,
R. G., Dewan, M. T., Agogo, E., Gadanya, M. A., Alemu, W., Harhay, M. O., Auta, A., & Adebiyi, A. O.
(2021). Estimating the prevalence of overweight and obesity in Nigeria in 2020: a systematic review and
meta-analysis. Annals of Medicine, 53(1), 495–507. https://doi.org/10.1080/07853890.2021.1897665
 Al-Raddadi, R., Bahijri, S. M., Jambi, H. A., Ferns, G., & Tuomilehto, J. (2019). The prevalence of obesity
and overweight, associated demographic and lifestyle factors, and health status in the adult population of
Jeddah, Saudi Arabia. Therapeutic Advances in Chronic Disease, 10(0), 204062231987899.
https://doi.org/10.1177/2040622319878997
 Alcañiz, M., & Solé-Auró, A. (2018). Feeling good in old age: factors explaining health-related quality of
life. Health and Quality of Life Outcomes, 16(1). https://doi.org/10.1186/s12955-018-0877-z
 AlQahtani, A. A., Nahar, S., AlAhmari, S., & AlQahtani, K. S. (2015). Association between obesity and
mental disorders among male students of King Khalid University, Abha, Saudi Arabia. Saudi Journal of
Obesity, 3(2), 48. https://doi.org/10.4103/2347-2618.171953
 Alsubaie, M. M., Stain, H. J., Webster, L. A. D., & Wadman, R. (2019). The role of sources of social
support on depression and quality of life for university students. International Journal of Adolescence and
Youth, 24(4), 484–496. https://doi.org/10.1080/02673843.2019.1568887
 Andoy-Galvan, J. A., Lugova, H., Patil, S. S., Wong, Y. H., Baloch, G. M., Suleiman, A., Nordin, R., &
Chinna, K. (2020). Income and obesity in an urban poor community: a cross-sectional study.
F1000Research, 9(9:160), 160. https://doi.org/10.12688/f1000research.22236.1
 Cai, W., Lian, B., Song, X., Hou, T., Deng, G., & Li, H. (2020). A cross-sectional study on mental health
among health care workers during the outbreak of Corona Virus Disease 2019. Asian Journal of
Psychiatry, 51(0), 102111. https://doi.org/10.1016/j.ajp.2020.102111
 de Girolamo, G., Dagani, J., Purcell, R., Cocchi, A., & McGorry, P. D. (2011). Age of onset of mental
disorders and use of mental health services: needs, opportunities and obstacles. Epidemiology and
Psychiatric Sciences, 21(1), 47–57. https://doi.org/10.1017/s2045796011000746
 Dhejne, C., Van Vlerken, R., Heylens, G., & Arcelus, J. (2016). Mental health and gender dysphoria: A
review of the literature. International Review of Psychiatry (Abingdon, England), 28(1), 44–57.
https://doi.org/10.3109/09540261.2015.1115753
 Djalalinia, S., Saeedi Moghaddam, S., Sheidaei, A., Rezaei, N., Naghibi Iravani, S. S., Modirian, M.,
Zokaei, H., Yoosefi, M., Gohari, K., Kousha, A., Abdi, Z., Naderimagham, S., Soroush, A. R., Larijani, B.,
& Farzadfar, F. (2020). Patterns of Obesity and Overweight in the Iranian Population: Findings of STEPs
2016. Frontiers in Endocrinology, 11(0). https://doi.org/10.3389/fendo.2020.00042
 Dwivedi, S., Dwivedi, A., & Behl, A. (2020). A clinical study of prevalence of obesity and abdominal
obesity in adult patients attending hamidia hospital, Bhopal. IP Journal of Nutrition, Metabolism and
Health Science, 2(4), 104–107. https://doi.org/10.18231/j.ijnmhs.2019.021
 Faith, M. S., Butryn, M., Wadden, T. A., Fabricatore, A., Nguyen, A. M., & Heymsfield, S. B. (2011).
Evidence for prospective associations among depression and obesity in population-based studies. Obesity
Reviews, 12(5), e438–e453. https://doi.org/10.1111/j.1467-789x.2010.00843.x
 Gofman, A. (2014). Durkheim’s Theory of Social Solidarity and Social Rules. The Palgrave Handbook of
Altruism, Morality, and Social Solidarity, 00(00), 45–69. https://doi.org/10.1057/9781137391865_3
 Graham, D., & Edwards, A. (2013). The psychological burden of obesity: the potential harmful impact of
health promotion and education programmes targeting obese individuals. International Journal of Health
Promotion and Education, 51(3), 124–133. https://doi.org/10.1080/14635240.2012.750504
 Guevara-Valtier, M. C., Pacheco-Pérez, L. A., Velarde-Valenzuela, L. A., Ruiz-González, K. J., Cárdenas-
Villarreal, V., & Gutiérrez-Valverde, J. M. (2021). Social network support and risk factors for obesity and
overweight in adolescents. Enfermería Clínica, 31(3), 148–155.
https://doi.org/10.1016/j.enfcli.2020.11.007

132
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Hwang, S., Kim, G., Yang, J.-W., & Yang, E. (2016). The Moderating Effects of Age on the Relationships
of Self-Compassion, Self-Esteem, and Mental Health. Japanese Psychological Research, 58(2), 194–205.
https://doi.org/10.1111/jpr.12109
 Iguacel, I., Huybrechts, I., Moreno, L. A., & Michels, N. (2020). Vegetarianism and veganism compared
with mental health and cognitive outcomes: a systematic review and meta-analysis. Nutrition Reviews,
79(4). https://doi.org/10.1093/nutrit/nuaa030
 Kessler, R. C., Angermeyer, M., Anthony, J. C., De Graaf, R., Demyttenaere, K., Gasquet, I., De
Girolamo, G., Gluzman, S., Gureje, O., Haro, J. M., Kawakami, N., Karam, A., Levinson, D., Medina
Mora, M. E., Oakley Browne, M. A., Posada-Villa, J., Stein, D. J., Adley Tsang, C. H., Aguilar-Gaxiola,
S., & Alonso, J. (2007). Lifetime prevalence and age-of-onset distributions of mental disorders in the
World Health Organization’s World Mental Health Survey Initiative. World Psychiatry, 6(3), 168–176.
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2174588/
 Kiely, K. M., Brady, B., & Byles, J. (2019). Gender, mental health and ageing. Maturitas, 129(0), 76–84.
https://doi.org/10.1016/j.maturitas.2019.09.004
 Knoesen, N. P., Mancuso, S. G., Thomas, S., Komesaroff, P., Lewis, S., & Castle, D. J. (2012).
Relationship between severity of obesity and mental health: An Australian community survey. Asia-
Pacific Psychiatry, 4(1), 67–75. https://doi.org/10.1111/j.1758-5872.2011.00164.x
 Kopelman, P. G., Caterson, I. D., & Dietz, W. H. (2010). Clinical obesity in adults and children. Wiley-
Blackwell.
 Lam, B. H. (2019). Social support, well-being, and teacher development. Springer Nature.
 Lartey, S. T., Magnussen, C. G., Si, L., Boateng, G. O., de Graaff, B., Biritwum, R. B., Minicuci, N.,
Kowal, P., Blizzard, L., & Palmer, A. J. (2019). Rapidly increasing prevalence of overweight and obesity
in older Ghanaian adults from 2007-2015: Evidence from WHO-SAGE Waves 1 & 2. PLOS ONE, 14(8),
e0215045. https://doi.org/10.1371/journal.pone.0215045
 Li, F., Luo, S., Mu, W., Li, Y., Ye, L., Zheng, X., Xu, B., Ding, Y., Ling, P., Zhou, M., & Chen, X. (2021).
Effects of sources of social support and resilience on the mental health of different age groups during the
COVID-19 pandemic. BMC Psychiatry, 21(1). https://doi.org/10.1186/s12888-020-03012-1
 Liu, J., Zhu, Q., Fan, W., Makamure, J., Zheng, C., & Wang, J. (2020). Online Mental Health Survey in a
Medical College in China During the COVID-19 Outbreak. Frontiers in Psychiatry, 11(0).
https://doi.org/10.3389/fpsyt.2020.00459
 Luhar, S., Timæus, I. M., Jones, R., Cunningham, S., Patel, S. A., Kinra, S., Clarke, L., & Houben, R.
(2020). Forecasting the prevalence of overweight and obesity in India to 2040. PLoS ONE, 15(2).
https://doi.org/10.1371/journal.pone.0229438
 Luppino, F. S., de Wit, L. M., Bouvy, P. F., Stijnen, T., Cuijpers, P., Penninx, B. W. J. H., & Zitman, F. G.
(2010). Overweight, Obesity, and Depression. Archives of General Psychiatry, 67(3), 220.
https://doi.org/10.1001/archgenpsychiatry.2010.2
 Matud, M. P., García, M. C., & Fortes, D. (2019). Relevance of Gender and Social Support in Self-Rated
Health and Life Satisfaction in Elderly Spanish People. International Journal of Environmental Research
and Public Health, 16(15), 2725. https://doi.org/10.3390/ijerph16152725
 Milano, W., Ambrosio, P., Carizzone, F., De Biasio, V., Di Munzio, W., Foia, M. G., & Capasso, A.
(2020). Depression and Obesity: Analysis of Common Biomarkers. Diseases, 8(2), 23.
https://doi.org/10.3390/diseases8020023
 National Institute of Diabetes and Digestive and Kidney Diseases. (2019, May 12). Health risks of
overweight & obesity | NIDDK. National Institute of Diabetes and Digestive and Kidney Diseases.
https://www.niddk.nih.gov/health-information/weight-management/adult-overweight-obesity/health-risks
 Neil-Sztramko, S. E., Coletta, G., Dobbins, M., & Marr, S. (2020). Impact of the AGE-ON Tablet Training
Program on Social Isolation, Loneliness, and Attitudes Toward Technology in Older Adults: Single-Group
Pre-Post Study (Preprint). JMIR Preprints, 0(0). https://doi.org/10.2196/preprints.18398

133
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Ozbay, F., Johnson, D. C., Dimoulas, E., Morgan, C. A., Charney, D., & Southwick, S. (2007). Social
support and resilience to stress: From neurobiology to clinical practice. Psychiatry (Edgmont), 4(5), 35–40.
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2921311/
 Pierce, G. R., Lakey, B., Sarason, I. G., & Sarason, B. R. (1997). Sourcebook of Social Support and
Personality. Boston, Ma Springer Us.
 Puhl, R. M., & Heuer, C. A. (2010). Obesity Stigma: Important Considerations for Public Health.
American Journal of Public Health, 100(6), 1019–1028. https://doi.org/10.2105/ajph.2009.159491
 Roy, R. (2011). Social support, health, and illness: a complicated relationship. University Of Toronto
Press.
 Sarwer, D. B., & Polonsky, H. M. (2016). The Psychosocial Burden of Obesity. Endocrinology and
Metabolism Clinics of North America, 45(3), 677–688. https://doi.org/10.1016/j.ecl.2016.04.016
 Scott, K. M., Bruffaerts, R., Simon, G. E., Alonso, J., Angermeyer, M., de Girolamo, G., Demyttenaere,
K., Gasquet, I., Haro, J. M., Karam, E., Kessler, R. C., Levinson, D., Medina Mora, M. E., Oakley
Browne, M. A., Ormel, J., Villa, J. P., Uda, H., & Von Korff, M. (2007a). Obesity and mental disorders in
the general population: results from the world mental health surveys. International Journal of Obesity,
32(1), 192–200. https://doi.org/10.1038/sj.ijo.0803701
 Scott, K. M., Bruffaerts, R., Simon, G. E., Alonso, J., Angermeyer, M., de Girolamo, G., Demyttenaere,
K., Gasquet, I., Haro, J. M., Karam, E., Kessler, R. C., Levinson, D., Medina Mora, M. E., Oakley
Browne, M. A., Ormel, J., Villa, J. P., Uda, H., & Von Korff, M. (2007b). Obesity and mental disorders in
the general population: results from the world mental health surveys. International Journal of Obesity,
32(1), 192–200. https://doi.org/10.1038/sj.ijo.0803701
 Seo, Y., Lee, S., Ahn, J.-S., Min, S., Kim, M.-H., Kim, J.-Y., Kang, D. R., Hwang, S., Vicheka, P., & Lee,
J. (2020). Association of Metabolically Healthy Obesity and Future Depression: Using National Health
Insurance System Data in Korea from 2009–2017. International Journal of Environmental Research and
Public Health, 18(1), 63. https://doi.org/10.3390/ijerph18010063
 Sharafi, S. E., Garmaroudi, G., Ghafouri, M., Bafghi, S. A., Ghafouri, M., Tabesh, M. R., & Alizadeh, Z.
(2020). Prevalence of anxiety and depression in patients with overweight and obesity. Obesity Medicine,
17(00), 100169. https://doi.org/10.1016/j.obmed.2019.100169
 Shenk, C. E., Keeshin, B., Bensman, H. E., Olson, A. E., & Allen, B. (2021). Behavioral and
pharmacological interventions for the prevention and treatment of psychiatric disorders with children
exposed to maltreatment. Pharmacology Biochemistry and Behavior, 211(0), 173298.
https://doi.org/10.1016/j.pbb.2021.173298
 Simon, G. E., Von Korff, M., Saunders, K., Miglioretti, D. L., Crane, P. K., van Belle, G., & Kessler, R. C.
(2006). Association Between Obesity and Psychiatric Disorders in the US Adult Population. Archives of
General Psychiatry, 63(7), 824. https://doi.org/10.1001/archpsyc.63.7.824
 Tyler, K. A., & Hoyt, D. R. (2000). The Effects of an Acute Stressor on Depressive Symptoms among
Older Adults. Research on Aging, 22(2), 143–164. https://doi.org/10.1177/0164027500222003
 Vartanian, L. R., & Silverstein, K. M. (2013). Obesity as a status cue: perceived social status and the
stereotypes of obese individuals. Journal of Applied Social Psychology, 43(0), E319–E328. https://
doi.org/10.1111/jasp.12052
 Veit, C. T., & Ware, J. E. (1983). The structure of psychological distress and well-being in general
populations. Journal of Consulting and Clinical Psychology, 51(5), 730–742. https://doi.org/10.1037/0022-
006x.51.5.730
 Venkatrao, M., Nagarathna, R., Majumdar, V., Patil, S. S., Rathi, S., & Nagendra, H. (2020). Prevalence of
Obesity in India and its neurological Implications: A multifactor analysis of a Nationwide Cross-Sectional
Study. Annals of Neurosciences, 27(3-4), 153–161. https://doi.org/10.1177/0972753120987465
 Wittenborn, A. K., Natamba, B. K., Rainey, M., Zlotnick, C., & Johnson, J. (2020). Suitability of the
multidimensional scale of perceived social support as a measure of functional social support among
incarcerated adults with major depressive disorder. Journal of Community Psychology, 48(3), 960–976.
https://doi.org/10.1002/jcop.22315

134
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Wojszel, Z. B., & Politynska, B. (2020). The structure and functional correlates of social support networks
of people in advanced old age living in chosen urban and rural areas in Poland: a cross-sectional study.
European Journal of Ageing, 18(3), 345–355. https://doi.org/10.1007/s10433-020-00583-6
 Xie, B., Chou, C-P., Spruijt-Metz, D., Liu, C., Xia, J., Gong, J., Li, Y., & Johnson, C. A. (2005). Effects of
perceived peer isolation and social support availability on the relationship between body mass index and
depressive symptoms. International Journal of Obesity, 29(9), 1137–1143. https:// doi.org/ 10.1038/
sj.ijo.0803006
 Yoshida, M., Xiong, C., Liu, Y., & Liu, H. (2020). An investigation into the formation of learning groups
on social media and their growth. Interactive Learning Environments, 1(1), 1–14. https:// doi.org/ 10.1080/
10494820.2020.1780268
 Zimet, G. D., Dahlem, N. W., Zimet, S. G., & Farley, G. K. (1988). The Multidimensional Scale of
Perceived Social Support. Journal of Personality Assessment, 52(1), 30–41. https:// doi.org/ 10.1207/
s15327752jpa5201_2

AUTHOR DETAILS:
1
M. YOUSUF ADAM AND 2DR. MOHAMMAD AMIN WANI
1
Ph.D Scholar and 2Assistant Professor Psychology, Lovely Professional University, Punjab

135
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

PROSPECTS OF BRACKISH WATER FISHERIES IN TIDALLY ACTIVE INDIAN SUNDARBANS

PRADIP CHANDRA PATRA, DEBDIP BHATTACHARJEE, ANIMESH JANA, UTTAM


MUKHOPADHYAY, DHIMAN CHAKRABORTY AND AMAL MAHATO

ABSTRACT
Brackish water fishery is one of the prime economic activities in tidally active parts of Bengal delta region of
India. The presence of tidal creeks, rivers and streamlets made this landscape ideal for fishing. Natural
disasters like cyclone and flood have severe effects on natural brackish water ecosystem of this region which
leads to ecological loss of Sundarbans. Not only that, but most of the brackish water fisheries are in vulnerable
condition as they do not have suitable supply of headwaters and sustained water recharge like earlier days.
This article focuses on the future prospect of these vulnerable fisheries of Bengal delta region. The authors have
chosen Sandeshkhali I and Minakhan, two Community Development (CD) Blocks of tidally active Indian
Sundarbans to carry out this analysis. The whole analysis was carried out in two folds i.e. water quality
analysis followed by the experiments of the other factors responsible in prawn and fish production separately.
Seasonal water samples (Pre-Monsoon, Monsoon & Post-Monsoon) of brackish water fisheries were collected
from 16 Gram Panchayets (GPs) and variations in water parameters were tested using one way Analysis of
Variance (ANOVA) followed by computation of Least Significance Difference (LSD) to find the spatial
variations in tested parameters. To test the impacts of other parameters Multivariate Regression analysis was
adopted separately for fish and prawn productions. At the end, it is found that the prospects of fishing in
brackish water Bengal delta is affected by seasonal variations in water qualities as well as disparities in local
physical and socio-economic infrastructural facilities. This study represents the scenario of brackish water
fisheries in tidally active Bengal delta region of Indian Sundarbans.
Keywords: Bengal delta, Brackish water fishery, Prospects of fishing, Water quality, Infrastructural facility.

1. INTRODUCTION
Ganges-Brahmaputra delta is known as one of the most fertile and biggest delta of the world. This is also the
biggest mangrove reserve of this planet (Sundarbans). The region is bounded by Bay of Bengal in the south and
crisscrossed by several rivers, tidal creeks, and streamlets which have given an archipelago look of the area with
numerous and small islands (Morgen, J.P., Mclntire, W.G., 1959; Khandoker, R.A., 1987; Sarker, M.H.,
Huque, I., Alam, M., Koudstaal, R., 2003; Goodbred, S.L., Nicholls, R., 2004). The presence of rivers,
streamlets and tidal creeks made this landscape unique with full of brackish water estuaries. For people in the
ecologically fragile Sunderbans, life revolves around battling high tides daily and cyclones
regularly. Over just the past three years, the Sunderbans, which is home to close to five million
people, has been battered by four tropical cyclones — Fani (May 2019), Bulbul (November
2019), Amphan (May 2020) and Yaas (May 2021). On each occasion, the region has suffered
damage because of strong winds and ruptured embankments, leading to ingress of sea water.
These phenomena not only made this region hypersaline but also triggered the imbalance of
normal ecosystem. So, now a da y the ecological richness of Sundarbans is in threats
(https://science.thewire.in/environment/sundarbans-mangrove-ecosystem-endangered-iucn-red-list/).
Sundarbans is considered as nursery of a large number of fish and shrimp species (Chandra Ganesh,
2012 ). The mudflats of this region's intertidal zone are known to contain a large variety of invertebrates, serve
as a feeding site for young fish, and play an important part in the local food chain (Chaudhuri, A., Mukherjee,
S., and Homechaudhuri, S., 2013).
The Sundarbans Freshwater Swamp Forests were formed when the northern halophytic forest combined with
the Sundarbans Freshwater Swamp Forests. The following is a description of these forests: The brackish swamp
vegetation that lies behind the Sundarbans Mangroves where the salinity is more pronounced .are represented
by this Ecoregion. The freshwater Eco region is an area where the water is just slightly brackish and turns fairly
fresh during the rainy season, when freshwater plumes from the Ganges and Brahmaputra rivers drive off
intruding salt water and deposit sediment (Champion, H. G. and Seth, S. K., 1968).
The Bengal delta, which includes the Sundarbans forest's estuary and coastal tract, is a prograding delta. The
Bengal fan, deposit of sediment just south of the tidally active delta mouth (Fig 1), indicates the process through
which the delta has advanced—certainly, and rather quickly on the geological timeline. The Sundarbans area
136
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

was once occupied by the sea, which existed between five and two thousand years ago (Danda, A. A.,
Sriskanthan,G., Ghosh,A., Bandyopadhyay,J., and Hazra,S., 2011). Paleo-ecologists estimate that the shoreline
was quite near to what is now Kolkata about 6,000 years ago, as evidenced by carbon dating of peat retrieved
during the metro railway digging (Das, S., 2009) .

Fig 1: Location of study area in tidally active Bengal delta region of Indian Sundarbans;
The eastern portion of the delta, dominated by the Meghna mouth and distributaries, is supposed to be an area
with much higher delta-forming activity, is known as Active delta region. Active delta is mostly situated in
Bangladesh. However, the western portion in India is also tidally active. Actually, the delta transformation of
this region has not entirely stopped (Rudra, K., 2018). The lower part (southern) of western portion is tidally
active and known as tidally active delta where the northern portion is known as moribund delta where the delta
formation is totally stopped. In between these active and moribund delta regions there exist mature delta
portions (Fig1).
137
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

1.1 Tidally Active Delta of West Bengal


The extreme south western part of Ganges delta which is mainly covered by mangrove vegetation is tidally
active. The portion is highly influenced by marine waves and currents. In India two districts major portions of
South 24 Parganas and North 24 Parganas are in this tidally active delta region (Islam, S.N. & Gnauck, A.,
2008). The lower deltaic part can be divided in five different landscapes such as: Levee or levee complex, Beel
or depression, abandoned meander belt, Inter distributaries and Estuarine plain (Khan, S.R. & Islam, M.B.,
2008).
1.1.1 Brackish Water Fisheries in Tidally Active Delta Region
Generally, the well-established brackish water Bheri culture in active delta region is rehearsed in block
enclosing low lands by developing earthen dykes all round keeping up profundity of water more than three feet
(usually) and locally the fisheries are called Bheri, Ghery, Gher, and Bhasabadha etc. The fisheries created
through ages in brackish water tidal wet lands, in particular mudf1ats, swamps, marshes, paddy fields and so
on., are locally known as Bhasabadha' or 'Bheries' or "Ghery" in the area of North 24-Parganas, West Bengal.
This traditiona1 fishery is accounted for to have first created in spill zone of the Bidhyadhari river close to the
then Calcutta city, which was silted up because of sewage release in it. A bit of the river and spillway were
embanked and changed over into lucrative bheri fisheries. Later this fishery has been built up the lower deltaic
area of 'west Bengal known as the Sunderbans with the development of transport offices (Saha, G.N. et. al.,
1986). The aquaculture exercises in the State of West Bengal, India is traditional brackish water aquaculture
exercises in the “Bheries” of Sunderban zones are ruling the scene and the spread of brackish water aquaculture
would help elevate the financial state of the needy people of the Sunderbans zones (Ghosh, A., Chakraborty,
P.K., 1989). The Sunderban regions return from fisheries is higher than that from agriculture and fisheries
improvement is basic for supportable advancement of the Sunderban Delta, highest need ought to be given to
the advancement of freshwater and mostly brackish water fisheries so as to create pay, work and riches in the
region (Sharma, B.C., 1994). The principle issues of brackish water fish culture rehearsed in the estuaries of the
Ganga is to control the over-saltiness of the water. There was significant extent of broadening brackish water
fish cultivating and paddy-cum-fish culture in the low-lying zones of the Sunderbans. In the event of shrimp
culturists and crab-catchers of the Sunderbans, the framework is as yet common (Hora, S.L., 1952). Brackish
water shrimp culture is probably going to rise as the most noteworthy marvel of the situation of fisheries
advancement in India during the next decade, inferable from driving force from the export market (Kalawar
A.G and Dandekar R.G., 1988). The shrimp has been presented and cultivated in Asia since the middle of 1990s
(Balakrishnan,G, Soundarapandian,P, Ramachandran,K., Theivasigamani,A.K., Savji, A.M., Chokkaiah, P.,
2011). The shrimp production has developed at marvellous rate during the year 1992-1994 and later began
diminishing because of outbreak of diseases, at the same time; the episode of viral illnesses has expanded the
economic risks and moderated the development of industry (Flegel, T.W., 258) (Flegel, 2006).
This article focuses this foremost burning issue regarding the prospect of brackish water fishing in Sundarban’s
tidally active delta region. Two CD Blocks of North 24 Parganas district i.e. Sandeshkhali I and Minakhan,
which are in tidally active region of Ganges delta, have been chosen as area of experiments.
2. LOCATION OF THE STUDY AREA
Minakhan and Sandeshkhali I CD Blocks are located in North 24 Parganas district, West Bengal are part of the
North Bidyadhari river Plain, which is situated in the tidally active Ganges delta of India (Fig 2). The territory is
brimming with swamps and salt water lakes. The Bidyadhari has a long course through the central part of the
area. North 24 Parganas is covered with brackish water areas constituting 58 % (33949 hectors, 2017-2018) of
the total brackish water resources of West Bengal (Fisheries, 2016-2017). As discussed earlier most of the
brackish water fisheries are in vulnerable condition as they do not have suitable connections with the tidal
creeks right now. This is because most of the tidal rivers in the active delta region of Indian Sundarbans do not
have headwaters and sustained water recharge like earlier days.
Their main source of recharge is precipitation runoff, coming from the monsoon and pre-monsoon rainfalls
(Rudra, K., Chatterjee, M., Shankar, D., Sen, D.K., et al., 2013). So, river water level depends on tidal variation.
That is why smaller creeks are almost totally depleted or vanished because of unplanned expansion of
settlement. The main tidal river of the study area i.e. Bidyadhari river is also facing some problem and not
remain suitable for brackish water fishing like earlier.
Not only the lack of tidal water but also a water quality issue have been found due to mixing of industrial waste
water along with domestic sewage that mix through many canals. The discharges are being productively used
in aquaculture and are also in demand to water the neighbouring lowland agricultural endeavours, making
138
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

industrial effluents a susceptible function in the adjacent wetland environment (Chattopadhyay, B., Dutta, S.,
Chatterjee, A., Mukhopadhyay, S.K., 2001). Due to the current incorporation of industrial effluents in
household sewage, heavy metals or nutrients may emerge in the water, causing biological amplification in both
flora and fauna (Chattopadhyay, B., Dutta, S., Chatterjee, A., Mukhopadhyay, S.K., 2001).

Fig 2: Location of Sandeshkhali I and Minakhan CD Blocks;


3. OBJECTIVES OF THE STUDY
The prime intention of this study is to find out the present prospect status of brackish water fishing in tidally
active delta region of the river Ganges. The objectives can be specified as followings:
a) To analyse the impacts of seasonal change (Pre-monsoon, Monsoon & Post-monsoon) of water quality in
brackish water fisheries,
b) To find out the most unsuitable areas for brackish water fishing in terms of water quality,
c) To find out the impacts of other factors (excluding water quality) in prawn production, and
d) To find out the impacts of other factors (excluding water quality) in fish production.

139
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig 3: Brackish water fisheries in the study area;


4. MATERIALS, METHODS & ANALYSIS
4.1 Sampling and Water Quality Analysis:
The certain physic-chemical parameters are used to understand the variance and its effects in fishing. Primarily
all bheries were categorised according to size i.e. large bhery (Above 5.56 ha), moderate bhery (3.72-5.56 ha)
and small bhery (Below 3.72 ha). This classification was done using mean and standard deviation value of total
bheries. Then water samples were collected from mentioning categories covering two selected blocks of tidally
active delta regions within which 16 GPs of Nortrh 24 Parganas district of West Bengal lies (Fig 3). A standard
sample size level was optimised to carry on the analysis. Water quality parameters and its impacts are highly
variable in nature with the span of different seasons. Thus, it may affect the total production quantity and
overall prospects of fishing of the mentioned area. Sample water specimens were collected and tested in three
seasons i.e. monsoon (May-July), post-monsoon (August-October) and pre-monsoon (February-April)
simultaneously which has shown its probable effects.
Temperature (C), Salinity (ppt), pH, Dissolved Oxygen (mg per litter) and Transparency (cm) were chosen as
the indicating parameters to understand and carry on the analysis. pH meter, digital thermometer and Salinity
meter were used to compute the reading of pH , temperature and salinity respectively whereas DO and
Transparency were tested in the laboratory.
140
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

4.2 Statistical Analysis:


Statistical differences among estimated parameters within seasons were validated using one way ANOVA in all
three categories of bheries followed by LSD (Least Significant Difference).
4.3 Post-Hoc Tests:
Post-hoc (Latin, meaning ‘after this’) are done to analyse the results of any experimental data. Here in this
analysis Fisher’s Least Significant Difference (LSD) have been adopted to understand the prospect status of the
fisheries. LSD is a tool to identify which pairs of means are statistically different. Essentially the same as
Duncan’s MRT, but with t-values instead of Q values.
To start the post-hoc test, the analysis was started with the computation of ANOVA. The conclusion in ANOVA
is general:
 If H0 failed to be rejected, no further test is required as all means are the same.
 If H0 is rejected, the difference in means (which pairs?) cannot be determined through F test in Anova.
A follow-up test to the ANOVA is done when there are three or more groups do exist. A test whenever a
significant difference between three or more sample means has been revealed by ANOVA.
Analysis of Variance (ANOVA) is nothing but the extension of t-test. t-test can be done only in the case of two
groups of data whereas ANOVA is applicable for 3 or multiple group data. Here in this analysis each data has
been examined in 3 separate times thus, t-test cannot be performed and ANOVA were tested. The test was done
with the help of MINITAB-14 software.
All the parameters in 16 GPs were tested and variance found (p<0.05, ANOVA) in three GPs which are Nazat I,
Nazat II and Sahera Radhanagar (Table 1 to 16). However, seasonal variation had significant effect on water
parameters which might have impacts on fish productivity of the mentioned GPs. Rest of the other GPs are not
in such vulnerable condition in respect of water quality. Safe GPs are Atpukur, Bamonpukur, Boyermari I,
Boyermari II, Chaital, Champali, Dhuturdaha, Hatgachi, Kalinagar, Kumarjole, Minakhan, Mohanpur, and
Sarberia Agarhati.
Table 1: Anova Standard Table for Atpukur
Source of Variation DF SS MS F calculated F tabulated (5%)
Parameters 2 29 15 0.14 0.83
Error 12 1279 107
Total 14 1308
Level N Mean St Dev
Pre Monsoon 5 14.82 10.64
Monsoon 5 13.20 11.18
Post Monsoon 5 11.40 9.02
Table 2: Anova Standard Table for Bamonpukur
Source of Variation DF SS MS F calculated F tabulated (5%)
Parameters 2 23 11 0.11 0.895
Error 12 1212 101
Total 14 1234
Level N Mean St Dev
Pre Monsoon 5 14.98 10.83
Monsoon 5 13.18 11.24
Post Monsoon 5 12.00 7.69
Table 3: Anova Standard Table for Boyermari I
Source of Variation DF SS MS F calculated F tabulated (5%)
Parameters 2 77.5 38.7 0.48 0.630
Error 12 966.8 80.6
Total 14 1044.2
Level N Mean St Dev
Pre Monsoon 5 16.54 9.523
Monsoon 5 13.30 9.985
Post Monsoon 5 11.00 7.162
141
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table 4: Anova Standard Table for Boyermari II


Source of Variation DF SS MS F calculated F tabulated (5%)
Parameters 2 81.0 40.5 0.43 0.659
Error 12 1127.7 94.0
Total 14 1208.7
Level N Mean St Dev
Pre Monsoon 5 16.88 9.863
Monsoon 5 13.52 10.773
Post Monsoon 5 11.22 8.281
Table 5: Anova Standard Table for Chaital
Source of Variation DF SS MS F calculated F tabulated (5%)
Parameters 2 35.7 17.8 0.21 0.814
Error 12 1024.3 85.4
Total 14 1060.0
Level N Mean St Dev
Pre Monsoon 5 14.560 9.828
Monsoon 5 11.360 9.429
Post Monsoon 5 11.220 8.402
Table 6: Anova Standard Table for Champali
Source of Variation DF SS MS F calculated F tabulated (5%)
Parameters 2 19.6 9.8 0.10 0.905
Error 12 1166.2 10.346
Total 14 1185.7 9.377
Level N Mean St Dev
Pre Monsoon 5 14.08 9.827
Monsoon 5 11.82 10.346
Post Monsoon 5 11.52 9.377
Table 7: Anova Standard Table for Dhuturdaha
Source of Variation DF SS MS F calculated F tabulated (5%)
Parameters 2 29 14.9 0.15 0.859
Error 12 1164.9 97.1
Total 14 1194.8
Level N Mean St Dev
Pre Monsoon 5 14.90 10.824
Monsoon 5 12.90 10.013
Post Monsoon 5 11.46 8.591
Table 8: Anova Standard Table for Hatgachi
Source of Variation DF SS MS F calculated F tabulated (5%)
Parameters 2 50.9 25.5 0.28 0.764
Error 12 1109.4 92.4
Total 14 1160.3
Level N Mean St Dev
Pre Monsoon 5 16.04 9.550
Monsoon 5 13.48 10.835
Post Monsoon 5 11.54 8.292
Table 9: Anova Standard Table for Kalinagar
Source of Variation DF SS MS F calculated F tabulated (5%)
Parameters 2 88.0 44.0 0.54 0.598
Error 12 983.8 82.0
Total 14 1071.8
Level N Mean St Dev
Pre Monsoon 5 16.64 10.244
142
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Monsoon 5 12.36 9.267


Post Monsoon 5 10.94 7.424
Table 10: Anova Standard Table For Kumarjole
Source of Variation DF SS MS F calculated F tabulated (5%)
Parameters 2 17 8 0.08 0.923
Error 12 1252 104
Total 14 1269
Level N Mean St Dev
Pre Monsoon 5 14.48 10.59
Monsoon 5 13.56 11.36
Post Monsoon 5 11.92 8.46
Table 11: Anova Standard Table For Minakhan
Source of Variation DF SS MS F calculated F tabulated (5%)
Parameters 2 42.9 21.5 0.22 0.809
Error 12 1193.1 99.4
Total 14 1236.0
Level N Mean St Dev
Pre Monsoon 5 15.18 10.381
Monsoon 5 12.24 10.778
Post Monsoon 5 11.18 8.621
Table 12: Anova Standard Table For Mohanpur
Source of Variation DF SS MS F calculated F tabulated (5%)
Parameters 2 21 11 0.09 0.913
Error 12 1380 115
Total 14 1402
Level N Mean St Dev
Pre Monsoon 5 14.42 10.30
Monsoon 5 12.52 11.92
Post Monsoon 5 11.52 9.85
Table 13: ANOVA Standard Table For Sarberia Agarhati
Source of Variation DF SS MS F calculated F tabulated (5%)
Parameters 2 40.5 20.2 0.22 0.804
Error 12 1094.0 91.2
Total 14 1134.5
Level N Mean St Dev
Pre Monsoon 5 14.98 9.843
Monsoon 5 12.82 10.745
Post Monsoon 5 10.96 7.820
Table 14: ANOVA Standard Table For Nazat I
Source of Variation DF SS MS F calculated F tabulated (5%)
Parameters 2 95.6 47.8 0.58 0.573
Error 12 982.7 81.9
Total 14 1078.3
Level N Mean St Dev
Pre Monsoon 5 16.30 9.653
Monsoon 5 13.06 9.529
Post Monsoon 5 10.12 7.856
Table 15: ANOVA Standard Table For Nazat II
Source of Variation DF SS MS F calculated F tabulated (5%)
Parameters 2 108.7 54.4 0.65 0.541
Error 12 1009.5 84.1
Total 14 1118.2
143
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Level N Mean St Dev


Pre Monsoon 5 16.66 9.743
Monsoon 5 12.66 9.445
Post Monsoon 5 10.12 8.260
Table 16: Anova Standard Table For Sahera Radhanagar
Source of Variation DF SS MS F calculated F tabulated (5%)
Parameters 2 101.9 50.9 0.67 0.53
Error 12 912.3 76.0
Total 14 1014.2
Level N Mean St Dev
Pre Monsoon 5 16.66 10.561
Monsoon 5 11.98 8.538
Post Monsoon 5 10.56 6.607

Fig 4: Boxplots showing variance of parameters in Nazat I, Nazat II and Sahera Radhanagar Gps;
As per ANOVA table nos. 14, 15 and 16, the calculated F value is greater than tabulated F values which mean
alternative hypothesis is not rejected but accepted in case of Nazat I, Nazat II and Sahera Radhanagar GPs (Fig
4). It implies that there are variations with seasonal changes in tested parameters which might create impacts on
total fishing prospects of the region. Now to understand the variances in depth, LSD was calculated for these
three identified GPs. LSD test was carried out to determine which pairs are significantly different. To clear it
more distinctly, we can say that we want to know the particular parameter/parameters which is/are different
from control or average value/values. The formula (Equation 1) of LSD is as follows:

(1)
Where, tα = t tabulated for 2 tail at significance level of α and degree of freedom of error (df error), from
ANOVA, MSe = error mean square, from ANOVA.
144
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table 17: Calculation table of LSD showing variances of water quality parameters in Nazat I
Calculated Pre Monsoon Post Mean Difference Compare
LSD=36.12 Monsoon monsoon with control with LSD
(95%)
Temperature in 29.8 21.3 20.9 24 10.84 Not
oC significant
Salinity in ppt 19.6 3.8 3.9 9.1 4.06 Not
significant
pH 7.7 7.9 7.5 7.7 5.46 Not
significant
Dissolved 6.2 7.1 2.7 5.333333 7.83 Not
Oxygen (mg per significant
litter) ppm
Transparency 18.2 25.2 15.6 19.66667 6.51 Not
cm significant
Mean 13.16
Table 18: Calculation table of LSD showing variances of water quality parameters in Nazat II

Table 19: Calculation table of LSD showing variances of water quality parameters in Sahera Radhanagar

Table numbers 17, 18 & 19 are the calculation tables of LSDs of identified three GPs i.e. Nazat I, Nazat II and
Sahera Radhanagar. As the LSD values of all three GPs are higher than the control values of all parameter, it
denotes at 95% significance level the relations are not significant or temperature, salinity, pH, DO and
transparency levels of bhery water varied a lot throughout the years which might affects the total production of
fish of the study areas.
145
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

4.4 Impacts of other factors (excluding water quality parameters) in terms of Prawn and Fish
production:
Fish and prawn production of the study area is also dependent on some other factors excluding water quality
parameters. Present analysis did consider some other factors (Figs 5 – 8), which are the followings:
 Percentage of bheri area to total GP area,
 Road density per GP,
 Ground water depth,
 Distance of water source from mean center of GP,
 Distance of nearest market from mean center of GP,
 GP wise soil pH level.
To examine the present condition of interdependencies and future prospects of fishing and prawn culture of the
study area two separate multivariate analysis have been done for fishing prospect and prawn culture prospect
respectively.
4.4.1 Prospects of Prawn Culture in the Study Area
Multivariate regression between prawn production and determinant factors reveals that there is a weak negative
relation between the parameters (Durbin-Watson statistic =>2 I.E. 2.26563) (Table 20) (Fig 9). However, it can
be said that prawn culture of the study area is not much affected or accelerated by the regional factors of the
region. One thing which was repeatedly raised during survey that the region’s prawn culture is highly affected
by spread of virus which is coming from locally built factories or from some other unknown sources.

Fig 5: Road density map of the study area;


146
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig 6: Location of fish markets and there service areas;

Fig 7: Depth of ground water levels in the study area;


147
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig 8: Variations of soil pH in the study area;

Fig 9: Multivariate regression of between determinant factors of prawn culture;


148
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table 20: Multivariate regression statistics of prawn culture

Apart from that this study reveals some other side of prawn culture which might be important for the prospect of
this area as a major prawn cultured ground.
The lesser P values of road density and distance of water sources are also the emerging determinant factors of
this region’s development (Table 20).
4.5 Prospects of Fishing in the Study Area:
Multivariate regression between fish production and determinant factors reveals that there is a strong positive
relation between the parameters (Durbin-Watson statistic =<2 I.E. 0.951941) (Table 21) (Fig 10). However, it
can be said that fish production of the study area is much affected or accelerated by the regional factors of the
region. From, the variance matrix it clears that road density, distance of nearest market and pH value does have
a significant impacts on total production of fish of the study area.

Fig 10: Multivariate regression of between determinant factors of fish production;


149
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table 21: Multivariate regression statistics of fishing

To conclude the prospect scenario of the study area in respect of prawn culture and fishing we must discuss the
issue of all over impacts of virus attack which emerges to be the most vital issue regarding the production.
During survey it was clear that not only the identified three GPs (according to water quality analysis) i.e. Nazat
I, Nazat II and Sahera Radhanagar but also rest of the other GPs are more or less affected by virus attack. So,
without having any permanent solution of this virus attack the prospect of fishing and prawn culture would not
be better than the present scenario.
5. FINDINGS
Sundarban's fisheries are dependent on both inland and marine resources. A proper connection between the two
systems has the potential to transform the entire perspective of fisheries in this area, and any future growth
should take this into account. The development of inshore brackish water aquaculture in tide-fed regions and
bheries would alleviate the drudgery and enhance the livelihood of a significant number of fish farmers
(Chandra, G. and Sagar, R.L., 2003). This analysis found several prospects by depicting the barrier in front of
development. Variations in water quality parameters lead to infections of fishes which results in reduction of
productivity. Specially, the prawn culture is in threat by virus infection which becomes an inevitable
phenomenon in fishing. To overcome this problem fishermen are now depending on both carp and prawn
productions at a time. Nazat I, Nazat II and Sahera Radhanagar are now severely affected by water quality
issues. Emergence of leather complex besides river Bidyadhari whch leads to huge influx of chemicals in river
water made this area vulnerable. The variance matrix of Multivariate analysis proves that road density; distance
of nearest market and pH value does have significant impacts on total production of fish of the study area.
Nonetheless, the periodic onslaught of tropical storms, which is now becoming more regular, is gradually
turning this region into a hyper saline landscape. This sort of habitat is not suitable for fish.
REFERENCES
 Balakrishnan,G, Soundarapandian,P, Ramachandran,K., Theivasigamani,A.K., Savji, A.M., Chokkaiah, P.
(2011). Growth of Cultured White Leg Shrimp Litopenaeus Vannamei (Boone 1931) In Different Stocking.
Advances in Applied Science Research, 2(3), 107-113.
 Bose, N.K. (1970). Rivers of West Bengal and their Control. Calcutta: West Bengal (ed.) by
Mukhopadhyay.
 Champion, H. G. and Seth, S. K. (1968). A Revised Survey of Forest Types of India. New Delhi: Govt. of
India Press.
 Chandra Ganesh. (2012). Fisheries in Sundarbans: Problems and Prospects. SSRN.
 Chandra, G. and Sagar, R.L. (2003). Fisheries in Sundarbans: Problems and Prospects. SSRN Electronic
Journal.
 Chattopadhyay, B., Dutta, S., Chatterjee, A., Mukhopadhyay, S.K. (2001). The environment impact of
waste chromium of tannery agglomerates in the east Calcutta wet land ecosystem. J Soc Leather Tech
Chem, 84, 94-100.

150
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Chaudhuri, A., Mukherjee, S., and Homechaudhuri, S. (2013). Seasonal. Scientia Marina, 77(2), 301-311.
 Chowdhury, M.I. (1959). The Morphological Analysis of the Bengal Basin. I & II. University of
Cambridge.
 Danda, A. A., Sriskanthan,G., Ghosh,A., Bandyopadhyay,J., and Hazra,S. (2011). Indian Sundarbans
Delta: A Vision. New Delhi: World Wide Fund for Nature-India.
 Das, S. (2009). Palaeoecology of the Lower Bengal Basin, Calcutta, India, during the Late Quarternary.
FeddesRepertorium, 120, 5-6, 333-342.
 Fisheries, D. o. (Ed.). (2016-2017). Hand Book of Fisheries Statistics. West Bengal, India: Department of
Fisheries, Govt of West Bengal.
 Flegel, T.W. (258). Aquaculture.
 Ghosh, A., Chakraborty, P.K. (1989). Aquaculture Status of Coastal West Bengal: Its role in economic
upliftment of rural poor. Nava Prakash.
 Goodbred, S.L., Nicholls, R. (2004). Towards integrated assessment of Ganges-Brahmaputra delta.
Proceeding of the 5th international conference on asian marine geology, and 1st annual meeting of
IGCP475 Delta and APN Mega-Delta (pp. 1-15). Asian Marine Geology.
 https://science.thewire.in/environment/sundarbans-mangrove-ecosystem-endangered-iucn-red-list/.
Retrieved June 27, 2021, from The Wire: https://science.thewire.in
 Hora, S.L. (1952). Major problems of the fisheries of India. Journal of the Asiatic Society, 18(1).
 Islam, S.N. & Gnauck, A. (2008). Mangrove wetland ecosystems in Ganges–Brahmaputra delta in
Bangladesh. Front Earth Sci China, 2(4), 439-448.
 Kalawar A.G and Dandekar R.G. (1988). Bright Prospect for Indian Fisheries. Journal of the Indian
Fisheries , 167-178.
 Khan, S.R. & Islam, M.B. (2008). Holocene stratigraphy of the lower Ganges–Brahmaputra river delta in
Bangladesh. Front Earth Sci China, 2(4), 393–399.
 Khandoker, R.A. (1987). Origin of elevated Barind-Madhupur areas. J Geol, 6(2), 1–9.
 Morgen, J.P., Mclntire, W.G. (1959). Quaternary geology of the Bengal. Bull Geol Soc Am, 70, 319–342.
 Rudra, K. (2018). Rivers of the Ganga-Brahmaputra-Meghna delta : a fluvial account of Bengal ( eBook :
Document : English ed.). Cham, Switzerland : Springer, 2018.
 Rudra, K., Chatterjee, M., Shankar, D., Sen, D.K., et al. (2013). Tidal. Journal of Earth System Science,
122(4), 902.
 Saha, G.N. et. al. (1986). Ecology and fishery management of brackish water bheries in West Bengal.
Indian Council of Agricultural Research. Barrackpore, West Bengal: Central Inland Fisheries Research
Institute.
 Sarker, M.H., Huque, I., Alam, M., Koudstaal, R. (2003). Rivers, chars and char dwellers of Bangladesh.
Int J River Basin Manag, 1(1), 61-80.
 Sharma, B.C. (1994). Lower Sunderban: Role of Fisheries in Sustainable Development. Calcutta.

AUTHOR DETAILS:
1
PRADIP CHANDRA PATRA, 2DEBDIP BHATTACHARJEE, 3ANIMESH JANA, 4
UTTAM
MUKHOPADHYAY, 5DHIMAN CHAKRABORTY AND 6AMAL MAHATO
1
Associate Professor, Department of Geography, Sivanath Sastri College, Kolkata, India
2
Assistant Professor, Department of Geography, Sukanta Mahavidyalaya, Jalpaiguri, India
3
Post Graduate Department of Geography, Vidyasagar College, University of Calcutta, India
4
Associate Professor, Department of Geography, Vidyasagar College, Kolkata, India
5
Research Scholar, Department of English, Dr. Bhimrao Ambedkar University, Agra, India
6
Assistant Professor, Department of Geography, Sivnath Sastri College, Kolkata, India

151
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

ROLE OF ONLINE EDUCATION IN STUDENTS ACHIEVEMENT: A COMPLETE CASE STUDY


OF INVOLVEMENT OF PARENTS AS SMC MEMBERS

MS. RACHANA AND DR. HARISH KUMAR

ABSTRACT
The aim of this paper is to explore various types of online modes to connect with students and their usefulness
in providing education in pandemic.
In the present study data was collected from primary as well as secondary sources. In the category of primary
sources for data collection were students and teachers of government and private schools that were part of the
online teaching-learning process. Random sampling technique was applied to choose the sample. A total of 100
participants participated in the study. In which 40 students, 30 teachers and 30 were parents. Data was
collected with the help of a questionnaire.
During online teachings, a teacher can get connected with their students via. Phone calls, WhatsApp, emails,
Microsoft team, zoom, WebEx Meet, Google Meet, etc. With the help of technology, teachers were able to
conduct classes online and provide homework to students. School Management Committee also helped
Management in developing connectivity between parents, teachers as well as students. It was explored that
parents as SMC members work for student's academic and overall development.
Keywords: parents, students, SMC, online classes.

INTRODUCTION
Education is the process of giving or receiving systematic instruction, at school or university or it can be said
that it is an enlightening experience. Educational methods include teaching, training, storytelling, discussion,
and directed research. Teachers involve their students in the teaching-learning process directly or indirectly. The
connection between the teacher and the taught is major requirement for this process to take its course effectively
so that they can reduce the gap and increase productivity. Now day’s students think critically and research each
aspect in the field of education. Online Education came as resort when pandemic hit across the world. The role
of stakeholders doubled in online education mode. In online education the role of parents was not just to take
care of online classes but it extended to establishing discipline, to create the hassle-free environment, motivate
children for online education, provide facilities for online education. Parents being the stakeholders in School
Management Committee (SMC), have to play a role not only for his or her child but also work for the welfare of
all the students at large. Although the online Education mode it was challenging phase for the parents to
motivate and provide for Online education at homes. In the following study the researcher has highlighted the
role of parents and the challenges faced by parents as SMC members.
There were numerous online resources and tools used by schools and educational Institutions while Online
education phase like websites, e-mails, Whatsapp, Facebook, etc. through which students and teachers could
connect for the continuous teaching-learning process. In today's society, homeschooling has taken the place of
traditional schooling. Teachers and students are now connected through online mode, and teachers are taking
their lessons online through various modes such as Microsoft team, Zoom app, WebEx, Google meet, and other
forms of online mode for acquiring an education. Teachers employ a variety of unique teaching strategies in an
attempt to make the teaching-learning process more inventive.
Schools were closed around the world to protect against the spread of Covid-19, which disrupted the education
of around 1 billion pupils, but with the help of technology, the classroom was replaced by home. As a result,
education should not be harmed, and it aids in the reduction of student learning loss. In comparison to ancient
times, the function of online education has expanded. Nowadays, getting an education via the internet is a very
profitable option. The SMC (school management committee) also encouraged parents and students to
participate in online education. The function of education has changed in this situation because, when offline
education learning was not possible due to the epidemic, online learning took place. SMC also tried to provide
facilities for those who did not have access to online education. The researcher discovered that in this pandemic,
the critical requirement for a mobile, laptop, or tablet increased since a youngster must take online lessons on
the phone without which classes would be impossible to complete. Parents' perspectives on online schooling
varied. For example, one parent stated, "I am extremely glad to see that my child is studying well without any

152
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

distractions." I was worried about whether he would learn or if I should give him a break, but today, thanks to
the teachers' help & support in my child's learning. Another parent stated that “teachers are very cooperative but
sometimes we face network issue and due to this learning do not happen.”
In this study, the researcher explored how SMC played its role in school management and in the academic and
overall development of the child. Parents play a crucial role in the academic achievement of the child and for
their holistic development. According to Alpha Omega Academy (2012) parents play a crucial role in the
teaching-learning process. A teacher or internet or online learning never can replace the parents of a child. As a
parent one should be involved in their child’s education.
REVIEW OF RELATED LITERATURE
According to a Report by UNESCO, due to this pandemic situation education system is affected more because
there is a lack of concentration in students. There are lots of reason that affect the teaching-learning process
like, lack of proper internet connection, poor economic condition students not having laptop or smartphone, in
remote area lack of electricity connection, etc. that affect the teaching-learning process between teachers and
students. Nowadays parents are temporary teachers but due to family burden or more issues they are not able to
give proper time to their children and that is also the main reason that affects students learning process. The
government should also take initiative to make this learning process profitable by providing laptops,
smartphones, etc. to the students whose financial condition is not so good and who are not able to afford to buy
any smartphone or laptop.
A study was conducted by Markus Deli Girik Allo(2020) related to online learning during the midst of the
Covid-19 Pandemic. In this study researcher used a qualitative method and data was taken from the English
study program of UKI Toraja. For the collection of data, the researcher used a semi-structured interview tool.
Researcher discovered that the online medium of learning is effective, and that learners were able to learn and
develop their skills through the use of various types of resources such as messengers, emails, and other forms of
communication, as well as through the effective use of time during this pandemic period. The biggest issue was
that the materials and instructions were not as clear as in physical or face-to-face learning.
A study by Anna Sun and Xiufang Chen (2016) conducted a study on online education used a qualitative
content analysis approach. The main goal of this study was to provide knowledge to those who are planning to
start an online approach by guiding them through the platform in terms of content, design, structure, technology
use, and developing an online learning community, among other things. The approach employed was a review
of published papers and research on online teaching and learning, as well as a review prior to 2008. Journals and
full text were the primary literary sources. The evolution of online education has been referred to by three
terms: successful online teaching, effective online learning, and effective online teaching. According to
Keengwe and Kidd(2010) knowledge relates to “responding to questions; editing questions and responses;
thinking, reasoning, and analyzing information; and helping students to engage in rehearing and retrieving
information in the process of delivering online courses” (p.6).
The role of parents and teachers in a child's education is defined in a study by Swati Sarnobat on online
education. Both parents and teachers should work together to ensure that pupils have a brighter future. In this
study, the researcher stated that teachers should provide content that can fulfill all the necessary pre-requisites
related to the educational needs of the child. Parents should also be aware of what a child is doing or what types
of needs arises in their education. If a child does not learn discipline, then it will harm their future as well. A
parent should be aware of what type of content a child is watching and what should be watched.
According to a study on online education, over 1.2 billion youngsters do not attend school or are disconnected
from their teachers. Because of this Covid-19, all of the school's rules and regulations have been altered. Parents
must supply their children with a phone and a laptop in order for them to attend classes. There has been a shift
in the demand for video conferencing, online teaching, and the development of learning apps, among other
things. The planet has undergone several changes over this time period. Teachers are already teaching online,
despite the fact that internet teaching was once regarded to be ineffective. Teachers have a workload and are
performing well in this. Teaching was not regarded as particularly fruitful. In this scenario, we may claim that
the role of teachers has grown in recent years, and that learning is also taking place online. The importance of
learning apps has grown in recent years, such as BYJU'S, a Bangalore-based startup that was launched in 2011
and is now doing quite well. When learning takes place without any training, it does not take place in the proper
manner, as good planning is required in online learning. All of the teaching-learning processes went smoothly
when proper procedure was followed.
153
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Nowadays school, colleges are providing online learning because physical learning is not possible. Teachers are
performing well and connecting with their students to make the teaching-learning process more effective and
that is possible only due to the hard work of teachers, management, parents as well as students also. There are
also various types of problems faced by them in this teaching-learning process like lack of proper internet
connection, financial situation, remote areas not able to get better connectivity, understanding level of students,
etc.
OBJECTIVES
1. To study the role of technology in students' achievements.
2. To explore the challenges faced by the teachers in providing online education.
3. To study the role of parents as SMC members in online education.
RESEARCH QUESTIONS
1. What is the role of technology in student’s achievements?
2. What type of challenges are faced by teachers in providing online education?
3. How do parents play their role in online education as SMC members?
METHODOLOGY, SAMPLE, TOOL & DATA COLLECTION
In the present study data was collected from primary as well as secondary sources. In the category of primary
sources for data collection were students and teachers of government and private schools that were part of the
online teaching-learning process. Random sampling technique was applied to choose the sample. A total of 100
participants participated in the study. In which 40 students, 30 teachers and 30 were parents. Data was collected
with the help of a questionnaire.
ANALYSIS OF THE DATA & FINDINGS
In this research, the researcher found that due to many reasons teachers are facing any problems in the teaching-
learning process. There are a lot of problems that are creating hindrances between the teaching &learning. Some
of them are the problems were related to network in a remote area and due to the high demand for internet or
usage. The findings of the research work is presented according to the objectives set which are as follows:
1. TO STUDY THE ROLE OF TECHNOLOGY IN STUDENTS' ACHIEVEMENTS.
For the above objective it was found that technology is playing an active role in the teaching-learning process
and student’s achievements. Now when students are taking classes from home and schools are closed
technology played an active role in education. Now a day’s education is not possible in this pandemic time
without the help of technology. So, all teachers, students, management as well as parents are getting linked with
the help of technology only when physical presence is not possible for all.

Sr. no. Various forms of Education with and without technology


technology for education
1. Google meet 80% 20%
2. Microsoft team 70% 30%
3. Zoom app 80% 20%
4. Facebook 85% 15%
5. WhatsApp 90% 10%
6. Phone calls, emails, etc. 75% 25%
154
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The researcher took a sample of 100 participants: 40 students, 30 teachers, and 30 parents. The researcher
collected data using Google form. In this study after analysis of data, the researcher found that technology
played a powerful role in education. Nowadays the physical presence of students in schools is not possible so
technology is playing a vital role in providing and acquiring education. 80% of students, teachers, and their
parents agreed that they could get education with the help of whatsapp, phone calling, Google meet; Microsoft
team, zoom app, etc. and only 20% did not agree with the fact that technology is an effective way to get
education and they were not satisfied. Students and teachers both enhanced their knowledge about the uses of
technology and maximum of them were happy that they were connected and also without wasting any time.
2. To Study the Challenges Faced by the Teachers in Providing Online Education.

In this study, the researcher found that teachers faced many problems getting connected with students in the
teaching-learning process.
Sr. no Types of problems Agreed Disagreed
1. Internet connectivity 60% 40%
2. Lack of system 65% 35%
3. Knowledge about uses of technology 50 50%
4. Students interests and family support 60% 40%
5. Not facing any problem 60% 40%
The problems faced by the teachers were lack of system, smartphone, network problem, economic problem,
knowledge about uses of technology, remote areas of students itself. Out of 20 teachers, 60% of teachers were
using technology for taking classes and enhance the teaching-learning process in a better way and the other 40%
were facing a lot of problems in getting connected with their students. Some of them stated, students were not
properly connected with them and they were not serious about their education also. They said many times due to
poor network problems in mid of their classes they disconnected which hindered the smooth learning process.
3. To Study the Role of Parents as SMC Members in Online Education.
The researcher found that parents play an active role in their child’s education. If a parent is SMC member then
it affects the students learning process and as an SMC member take care of teachers teaching and how students
get facilities in the school. If pupils do not have adequate facilities for their development, SMC members offer
all of them. Parents believe that their children will be able to learn quickly. Teachers undoubtedly played a role,
but parents also play an important role in the teaching-learning process. In this style of learning, parents are also
responsible for their children's learning, including how they communicate with their teachers and what type of
content they will obtain from the internet, as well as how they interact with other students. No one can take the
place of parents or assume the role of parents.
DELIMITATION AND CONCLUSION
This study is limited only to the online education model. In this study, the researcher's basic motive was to
know about the uses of technology and how it helps teachers and students in their teaching-learning process.
The researcher found that the majority of them were happy that they were getting an education in this situation
when students were not able to come to school or face-to-face learning was not possible. A majority of parents
were happy that their ward was developing their learning skills and children in remote areas were also able to
learn with the help of technology.
155
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

REFERENCE
 Alpha Omega Academy(2012). Online learning and the parent’s role.
 Allo G.D. Markus( 2020). Is online learning good during the Covid-19 Pandemic? The case of EFL
learners. Journal Sinestesia, vol 10, no. 1, apr.2020.
 COVID-19 and Children’s Education: The time to plan large-scale summer learning programs is now.
 Kengwe , J., & Kidd , T.T.(2010). Towards best practices in online learnng and teaching in higher
education. MERLOT Journal of online learning and teaching 6(2). 533-541.
 Sun A., & Chen X(2016). Online education and effective practice: A Research Review. Journal of
Information Technology Education: Research, 15, 157-190 Retrieved form.
 http://www.foresttrailacademy.com/what-is-the-role-of-parents-in-a-child-education.html.

AUTHOR DETAILS:
1
MS. RACHANA AND 2DR. HARISH KUMAR
1
Research Scholar, Amity Institute of Education, Amity University, Noida, Uttar Pradesh, India
2
Head, AIBAS, Amity University, Noida, Uttar Pradesh, India

156
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

A SMART MASK WITH SPEECH TO TEXT CONVERSION

SENBAGAVALLI.G, SHASHIDHAR SATISH HEGDE, REVANNARADHYA R, PRAVEEN B AND


SUDEEP V

ABSTRACT
This Paper presents a smart mask that can amplify the user’s speech and generate a clear and loud output
through the speakers integrated into the mask. This mask is helpful to people in carrying out everyday
conversations and communicate clearly and effectively without the mask muffling the user’s speech while also
being protected from airborne infections, allergens, deadly viruses like Corona virus. It also incorporates a
Bluetooth module to collect the voice input of the user in its analog form and transform it into digital form so
that it can be wirelessly transmitted over short distances. The Bluetooth connectivity that the mask provides can
be utilized to connect with other devices such as laptops, Smartphones, Tablets that can convert speech into text
using our web-based application. The mask can also be connected to external speakers to address large
audience. The main aim of the mask is to deal with one of the few problems faced while wearing it, which the
general public have all experienced themselves is that it comes in the way of communication.
Keywords—Smart Mask, COVID 19, Filters, IOT, Voice amplification.

INTRODUCTION
The idea of covering one’s mouth and nose during surgeries was first proposed in the turn of the 20 th century
(made with gauze (Fig. 1(a)) or bandages). It was based on the findings of Carl Friedrich Flugge that was
published in 1897 on development of droplet infections associated with Tuberculosis. It was then that the world
knew that the respiratory system acted as a transmitter for germs and infectious pathogens. The widespread use
of face masks by medical professionals while treating patients did not happen until the 1990s. Still the face
masks have been helpful in preventing communicable and infectious diseases. Its use was suggested by a
Chinese doctor during the Manchurian era to prevent the transmission of the Bubonic plague. It also found use
in 1918 to combat the influenza pandemic or notably known as the Spanish Flu. A millennia later the face mask
is still is used to protect oneself from infectious diseases, as recently experienced during the corona virus
pandemic. Face masks are used on a daily basis in some professions for example Surgical masks (Fig. 1(b)) are
used by doctors while performing surgeries (surgical mask), HEPA filter masks (Fig. 1(c)) used by miners,
people handling hazardous wastes, chemicals (HEPA masks). It is also used by the general public nowadays due
to increased pollution caused due to vehicular emissions, industries and manufacturing plants, forest fires (N95
masks (Fig. 1(d))).
Some of the features that people expect in a face mask are its effectiveness in filtering out dust particles,
infection causing viruses, bacteria and pathogens, blocking out allergens and pollutants in the air, reusability,
comfort, so that it can be worn for a long duration of time and some of the drawbacks or caveats of face masks
is that it muffles the voice of the user, the user can feel suffocated after wearing the mask for extended duration,
there is a chance of CO2 poisoning. In addition to the various types of face masks illustrated above there has
been a recent emergence of Smart masks that comes with technology backed by IOT, Embedded Systems, AI,
machine learning, to provide additional features with the mask such as sensing, monitoring, actuating, data
collection and transmission etc. The proposed Smart mask in this paper also uses these technologies to address
some of the issues faced by the general population in wearing masks in times such as the global pandemic
caused due to COVID 19.

157
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig. 1. (a) Early gauze mask. (b) Surgical mask. (c) HEPA mask. (d) N95 mask. (e) Smart mask.
LITERATURE REVIEW
The Lab on mask is used for real time monitoring of Heart rate (HR), Blood oxygen saturation (SPO2), and
Body temperature(T) associated with symptoms of pneumonia caused by coronavirus and other respiratory
diseases and infections. The electronic components and sensors are constructed using Polydimethylsiloxane
(PDMS) to ensure that the mask is comfortable to wear for long durations. Parameters of interest such as HR,
Blood Pressure (BP) and SPO2 are recorded from arteries through the skin and arteries in the face through
Photodetectormography(PEG) sensor which employs anLED, Photodetector and Preamplifier to measure SpO2
levels, a Green Light Emitting Diode is used for HR and BR measurement, and a Thermistor is used to measure
the skin temperature (T). A Microcontroller unit is used to connect all the sensors and collect the raw data they
send and process it to obtain useful information. The observed parameters are then wirelessly transmitted using
Bluetooth. The users real time vital signs and parameters can be viewed on a mobile app. The values recorded
by the LOM are accurate and stable when compared with conventional monitoring apparatus and the LOM
achieves this while also being contactless so there would be lesser chance of healthcare workers to contract
infectious diseases from patients while treating them[1].
The paper [2] proposes an idea of a smart mask that uses the IOT platform and its ecosystem to combat the
spread of coronavirus and other infectious diseases. The smart mask is also dependent on AI, wireless
technology, IOT and other software to sense and gather data related to the health of the user and also the
environment immediate to the user in real time and provide certain suggestions to improve the user’s quality of
life and help in avoiding coming in contact with an infected person or environment based on AI and networking
capabilities of the IOT platform. The mask is designed to be reusable with interchangeable filters, swappable
electronics etc. The mask is constructed using 3D printing technology and is mainly a shell that can hold the
filters, sensor modules, embedded devices, IOT core, rechargeable secondary batteries, Bluetooth, radio
transmission for wireless data transfer and a mobile application with an edge and cloud computing services
acting in the background for storage of data, data analysis, alerts, notifications and recommendations. The
material used is Flex Fill 98A whichis based on thermoplastic polyurethane (TPU), it is flexible in comparison
topolyactide that is rigid in natureand PLA filaments are cheaper but TPU is preferred overit so that the mask is
comfortable to wear[2].
In recent times, considerable attention has given towards developing comfortable health monitoring electronic
gadgets. Piezoelectricalong with triboelectric substances are utilized in body sensors and wearable devices.In
this paper, the authors propose a smartmask with filter that is replaceable, self powered, filter (respiratory
monitoring) with nanofibers that is based on the workingsbehind TENGs.It is made up of a Poly acrylo nitrile
and a Poly vinylidene fluoride Electrospun nanofiber mat. The reasons for favoring PAN and PVDF are: (i) they
are the most suited materials to make TENGs because of their various abilities to attain electrons ; (ii)
nanofibers are also explored as alternative materials as triboelectrification materials in wearable TENGs owing
158
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

to their added flexibility and textured surface, which can increase the output voltage of the TENG ; (iii)
compared to micro-fibrous filters, nanofibrous filters have high efficiency of filtration, as they capture very
small particles due to the unique properties of nanofibers, such as small pore size, small diameter, and large
specific surface area. The surface arrangement of the nanofiborous membrane was explored with a electron
microscope that is capable of scanning. The surface of the filteris coated with a gold–palladium alloy for
duration of 30 sec before it was examined by SEM. The texture of the PVDFNFM and the Aluminium foil is
identified by AFM, that shows the PVDFNFM with different thicknesses with obvious differences in surface
topology.Results says that the smart mask filter is based on triboelectricisuseful in respiration monitoring for
health care[3].
To avoid the spread of Covid, individuals are advised to wear facemasks across the world. Regardless of the
data supporting the usage of masks in order to circumventthe spread, there is consensus on the possible negative
consequences of their use, which are mostly produced by CO2 rebreathing. In order to slow the further
transmission of COVID-19 that is associated with acute respiratory illness over the world. The described opto-
chemical CO2 sensor consists of a solid inorganic phosphor whose brightness is controlled by an acid base
indicator via an inner filter mechanism that responds to the acidity of atmospheric CO2. The goal of this system
is to measure the gaseous CO2 conc. into the DSV of an FFP2 (N95) facemask. This technique is adaptable;
several curves were examined to see how they affected tag functioning and reading distance. In static settings,
the smart facemask's performance is evaluated for both short durations- and long durations[4].
All preexisting masks are of a passive nature which simply serve as air filters for the nose and mouth this paper
5 introduces a concept of active mask in which the device is wearable are equipped with intelligent sensors and
actuators that identify the presence or absence of airborne pathogens viruses in real time and suggest
appropriate action to overcome the threat in this device an on circuit controller determines the quality of the
surrounding air through a commercially available particulate matter pm sensor and turns on if necessary a
piezoelectric actuator that disperses a mist to these particles heavy dropping them onto ground particulate matter
sensor utilizes laser scattering to accurately count airborne particles in several bins format the mitigation circuit
makes use of a piezoelectric transducerwhich vibrates at a freq of 110 khz the drop in pressure caused by the
vibrations leads to the conversion liquid water into vapor the mitigation device propagates aerosolized mist
whenever required using a piezoelectric transducer a number of liquids that includes pure water or blended
water with many impurities and disinfectants can be utilized to produce mist some of the most common
disinfectants include diluted bleach soap and 70 alcohol solution the control algorithm also utilizes the data of
auxiliary sensors for determining optimum parameters for the mitigation device since the distances to which
aerosols move vary on environmental factors a sensing module included within the mask identifies the presence
of airborne aerosol particles near the users respiratory tract it has a optical detection system as well as humidity
and temperature sensors to count the number of droplets and their overall arrangement by size as they near the
protected area an air quality analyser module processes the outputs of both sensors this uses an algorithm to
assess data from the sensor and differentiate them based on quality of the air stream the quality of the incoming
air stream the active protection system is activated by a high risk output using a tiny nozzle the protective
contraption outputs a mist that is safe on humans this module is activated by an electromechanical relay
controlled by the system controller the smart mask is made up of two wearable components the mask and the
belt device the mask is made up of a fluid reservoir a transducer and a sensor a microprocessor oscillator circuit
relay and battery are all part of the belt unit the gadget communicates with the user via a smart phone
application which gives various notifications such as the necessity for recharging and decontaminating the face
mask before usage if required the programme allows the user to override the on-board controller and manually
operate the mist generator.[5].
The mask is designed to treat air pollution-related disorders such as asthma, as well as serious viruses that
spread through the air, such as COVID-19. The mask is constructed of carbon fabric and has a carbon coating
on the surface capable of filtering dust, smoke, and other chemical vapours, as well as a HEPA layer within
capable of removing mould, dust, and other allergens, all of which work together to enhance inhaled air quality.
The carbonated filter has a thickness of 0.35 microns and can filter out chemical fumes with thicknesses ranging
from 0.5 to 5000 microns. HEPA filters collect dust allergens with diameters of 100 micrometres while
avoiding corona viruses with diameters of 125nm since they lie within the particle-size range captured by
HEPA filters.The mask is coupled to Bluetooth headphones with a charging option, and magnets are installed to
make it reusable and re-washable, so extending its life. With clever technology, the mask serves a practical and
aesthetic purpose [6].

159
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

This paper proposes a smart mask that monitors the wearer’s temperature(T) and breathingRate(BR). The T is
measured using 4 sensors spaced by an insulating material. To estimate the BR, the Tinside the mask is
monitored using a thermistor placed near the nose. The system transmits data through long-distance Radio
(LoRa) ,due to lower average power consult. Both the signal interceptedby 2 receivers located in the inside and
on the outside the door is utilized to identify the smart mask's relative location. Using low-cost LoRa
transceivers with Wi-Fi connectivity, the prototype collects data and uploads it to a server. This mask is used for
long-distance monitoring of T and BR.It makes use of the mask's required use inside the interiors to incorporate
a T and BR monitoring system without the need for extra wearables. It also detects if a person is staying within
or over the control point and functions as a person’s counter and occupancy registration system.[7].
This study [8] serves as the foundation for the development of a personalised smart medical mask system to
monitor the temperature and strain on the face of HCPs (Healthcare Personnel). The suggested design approach
starts with a 3D scanned image of an individual face, then analyses its geometrical properties to find the
appropriate locations for the sensors on the mask and optimise the sensor design settings. The temperature and
strain sensors are made utilising the AJP (Aerosol Jet Print) technique. Temperature monitoring is used to
identify fevers and other respiratory illnesses. Strain monitoring is used to detect mask-related facial discomfort
and injury. The suggested mask design process is divided into three stages: (1) 3D face scanning, (2)
temperature/strain gauge using Aerosol Jet Print (AJP)temperature/strain gauge sensors, and (3) wirelessly
sending real-time sensor data. The face is 3D scanned to obtain geometrical facial information. The results of
3D scanning are employed in two phases: sensor design and mask production. PI is the substrate utilised in this
research for printing the sensor prototypes. PI is employed as the conductive ink over the substrate in this work.
[8].

Fig.2.Design of Proposed System


IMPLEMENTATION
The basic feature of this smart mask is that of air filtering through replaceable HEPA filters. HEPA is an
acronym for High Efficiency Particulate Air. It can theoretically remove up to 99.97% of dust, pollen, mold,
bacteria, and airborne particles. It blocks particles that are larger than its pore size of 0.3 microns and lets air to
pass through without any difficulty.
The mask has 3 modes of operations, the user can change the modes of the mask based on the user’s need and
they are defined as follows. Mode 1 is useful for addressing at most 40 participants or audience. In mode 1, the
voice captured by the microphone is amplified and fed into the speakers within the mask to amplified voice
signals to the immediate surroundings which is useful to conduct every day conversations clearly without
removing the mask and maintaining social distance.Mode 2 is useful for addressing large number of participants
or audience in seminar halls and conferences. In mode 2, the voice captured by the microphone is amplified and
amplified voice signal is sampled to convert from its analog state to digital state and is then wirelessly
160
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

transmitted to a Bluetooth receiver using I2S protocol which is useful to address large crowds and gatherings
through which sharing of common mic is avoided. Mode 3 is for Speech to Text conversion. In mode 3, the
voice captured by the microphone is amplified and amplified voice signal is sampled to convert from its analog
state to digital state and is then wirelessly transmitted from the Bluetooth transmitter in the mask to a Bluetooth
receiver in the device that is connected to the internet that runs the web application. The digital voice received is
then converted to text in the web-based application. This mode is helpful for teachers to recite notes while it is
simultaneously converted to text and displayed for the students to note down.
The system architecture is as follows, the voice of the mask user is captured using a directional electret
microphone, optimally placed to capture only the voice and ignore other noises in the surrounding. The output
of the microphone is connected to a class D amplifier such as PAM8403 to strengthen the weak voice signal.
The PAM8403’s gain can also be controlled to control the volume levels of the mask depending on the need and
environment. The mask is equipped with speakers that are used to produce clear, loud and unmuffled voice to
its immediate surroundings. Useful in everyday conversations while maintaining safe distance. The voice signal
in its analog state is converted into digital state using the ADC converter present in the ESP-32 module which
supports sampling rate upto 16KHz suitable for speech to text conversion. Conversion of speech into text is the
process of converting spoken words into written words. The process of conversion from speech to text takes
place in the device connected to the mask wirelessly with active internet connection to access the web
application and process the speech into text. The text output can be displayed on the paired devices and can also
be saved for documentation. Useful for teachers, professors etc. And the Bluetooth transmitter (master) can
connect to external powerful speakers if the built-in speaker’s output is not sufficient to address a large crowd
or to reach people at a large distance.
DESIGN

161
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

A shell in the shape of a mask to hold all the circuit components used in the project was designed using
Autodesk fusion 360 software. The mask is designed to include the mic, speakers, Bluetooth module, battery,
PAM8403(Fig. 3(b,c,d,e)).The front and rear portion of the mask in some areas areprovided with Small
perforations and behind this perforated area is the space given for the HEPA filter which acts as the primary
defense against airborne pathogens, viruses and allergens. There are 4 supports to hold the micro speakers, one
support to hold the amplifier board and a slot for the electret microphone optimally placed to capture the user’s
voice.
V. CONCLUSION
The proposed objectives of the paper are met successfully. The mask is designed and built with inbuilt speakers
and an amplifier to strengthen the user’s speech, implementation of Bluetooth, development of a speech to text
application and the mask is comfortable to wear for long durations, has sufficient battery capacity to last up to 6
hours with a single charge. Provisions to replace filters easily in order to promote reusability.
VI. DRAWBACKS AND FUTURE ENHANCEMENTS
 There is some latency due to the use of A2DP Bluetooth profile.
 Training and developing a custom machine learning model to the increase accuracy of speech recognition.
REFERENCES
[1] Liang Pan, Cong Wang, Haoran Jin, Jie Li, Le Yang, Yuanjin Zheng, Yonggang Wen, Ban Hock Tan, Xian
Jun Loh, and Xiaodong Chen, “ Lab-on-Mask for Remote Respiratory Monitoring,” ACS Materials Lett.
2020, 2, 1178-1181 (2020).
[2] Jarkko Hyysalo, Sandun Dasanayake, Jari Hanno, Christian Schuss , Mikko Rajanen , Teemu Lepp¨anen ,
David Doermann , Jaakko Sauvola,“Smart mask – Wearable IoT solution for improved protection and
personal health,” Internet of things 18(2022).
[3] Haijun He, Jian Guo, Balazs Illes, Attila Geczy, Balazs Istok, Viktor Hliva, Daniel Torok, Jozsef Gabor
Kovacs, Istvan Harmati, Kolos Molnar,“Monitoring multi-respiratory indices via a smart nanofibrous mask
filter based on a triboelectric nanogenerator,” Nano Energy 89 (2021) 106418
[4] P. Escobedo, M. D. Fernández-Ramos, N. López-Ruiz, O. Moyano-Rodríguez, A. Martínez-Olmos, I. M.
Pérez de Vargas-Sansalvador, M. A. Carvajal, L. F. Capitán-Vallvey & A. J. Palma,“Smart facemask for
wireless CO2 monitoring,” NATURE COMMUNICATIONS https://doi.org/10.1038/s41467-021-27733-3
[5] Rohan Reddy Kalavakonda, Naren Vikram Raj Masna, Anamika Bhuniaroy, Soumyajit Mandal, and
Swarup Bhunia,“A Smart Mask for Active Defense Against Coronaviruses and Other Airborne Pathogens,”
IEEE consumer electronics magazine. doi:10.1109/ MCE.2020.3033270 (2020).
[6] Anitha Sethumadhavan, Divya Mugunthan, Janani Sakthivel, Suchita Venkateshan, Devi Priya Putturaja,
Divya Ganesh, Ram Divakar Seetharam, Chitra Raman, Mithilesh Sathiyanarayanan,“Design of smart air
purifier facial mask,” International conference on smart technologies in computing, electrical and
electronics (ICSTCEE 2020).
[7] Marc Lazaro, Antonio Lazaro, Ramon Villarino and David Girbau,“Smart Face Mask with an Integrated
Heat Flux Sensor for Fast and Remote People’s Healthcare Monitoring” Sensors 2021, 21, 7472 (2021).
[8] Noori Kim, Joslyn Lim Jun Wei, John Ying, Haining Zhang, Seung Ki Moon, Joonphil Choi,“A
Customized Smart Medical Mask for Healthcare Personnel” 978-1-5386-7220-4 2020 IEEE

AUTHOR DETAILS:
SENBAGAVALLI.G, SHASHIDHAR SATISH HEGDE, REVANNARADHYA R, PRAVEEN B AND
SUDEEP V
Department of Electronics and Communications, AMC Engineering College, (Affiliated to VTU)
Bangalore, India

162
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

A NOVELAPPROACH FOR PERFORMANCE-BASED FACULTY CLUSTERING

PREETI JAIN DR. GYANESHSHRIVASTAVA AND DR. UMESH KUMAR PANDEY

ABSTRACT
Faculty performance evaluation is an important task. The decision is always made in the humdrum situation to
decide the number of faculty groups based on performance. The more important task is to establish the level
which separates one faculty from another. It could be possible that the decision to cut off the level of
performance will bias. Another problem is establishing the level or number of levels. Many times performance
levels are static. The presented research work proposes a clustering algorithm that selects multiple levels
without human interference. The algorithm completes the clustering tasks in two-pass. Clustering algorithm
performance tested using silhouette index. In the data set, the second pass gave a better silhouette value. Thus,
the number of clusters identified in pass two is the final cluster number. Upper and lower values in each cluster
define the boundary of that cluster. Faculties score falling in the respective cluster will tell the performance
level.
Keywords: Faculty Performance evaluation; clustering; unsupervised learning

I. INTRODUCTION
Organizational methods also use performance assessment. Performance management software "organize and
control" all of an organization's resources to produce the best possible consequences. The success or failure of the
enterprise is strongly affected by how the output measure within it. As a result, improving physical activity for
everyone should be the most significant concern. In the conventional system, the only way to determine a faculty
member in any institution is to collect input from students, which is wrong. There are a variety of variables that
use to assess faculty. It would be easier to consider other faculty metrics when evaluating them to enhance the
standard of teaching and, as a result, the institute's results. Faculty results, student evaluations, and other actions
such as papers published, lectures, seminars, and conferences attended and held, among others, can all be used to
assess a professor. This research paper proposes an architecture and algorithm to group data into the different
clusters based on performance data without any human/administrative interference.
II. LITERATURE REVIEW
Jindal R and Borah M D [1] research focused on the educational data mining objective and different stakeholder
levels (primary, secondary, hybrid), environment, component, feature, and challenge.
In her research paper, Fatima D et al. [2] discuss data mining tasks and techniques in collaboration across
research, commercial, and education sectors.
Saranya et al.'s [3] research paper studied students in the context of job placement and co-curricular activity for
classification with the objective of performance improvement.
Ma Y et al.'s [4] research study studied the difficulty level of questions and time to solve for predicting the
student's performance.
Bydžovská H [5] research work focused on optional course work selection. This research work proposes two
different algorithms for finding optional courses. The attribute considered for recommending the path studied in
this research work was knowledge level, the student's interest, and availability in the time slots.
Clement B, Oudeyer P, Lopes M [6] utilized features of the markovian process in the decision to find the optimal
long-term path for planning teaching sequences to provide customized coaching.
Klingler S, Käser T, Solenthaler B, Gross M[7] applied regression analysis on different sampling parameters to
study the influence. In addition, they evaluated and compared the various model with data sets.
Paquette L, Rowe J, Baker R, Mott B, Lester J, DeFalco J, Brawner K, Sottilare R, Georgoulas V [8] talked
about Generalized Intelligent Framework for Tutoring (GIFT). GIFT model discusses two modalities for
comparing the predictive performance.
Olsen J K, Aleven V, RummelN[9] included the feature of logistic regression to model individual learners
datasets and tutor log data. The extended model helps in predicting the problem-solving skill of the student.

163
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

III. FACULTY SCORE IN VARIOUS PARAMRTERS


Teaching, research, publication, service, belongingness, ICT mediated education, project, and policy
documents, reaching out of the institution, refer to a group. The teaching group will include various teaching
evaluation methodologies, i.e., student feedback, peer review, refer to evaluation parameters. From the
discussion presented in the literature review, regulation 2018 of UGC and AICTE regulation 2019 following
parameters must study while evaluating the performance of a faculty:
Teaching: Teaching is one of the primary responsibilities of the faculty serving in any institution. Especially for
the self-financed, students are the financial backbone. Evaluation of the teaching process is very complicated.
UGC regulation discusses a ratio that represents classes taken out of allotted classes. However, the teaching
evaluation literature includes delivery effectiveness, effective mentoring, academic advising, and enhanced
teaching service. Still, it is infeasible in many ways. Class counting is a simple task, but other measures'
evaluation is stringent.
A Feedback System could be one solution to cope with this problem. Feedback questions must be prepared to
consult the academic laureates so that respondents never become biased while providing their responses.
Research and Publication: Research and publication are the expected responsibility of any higher education
teaching faculty, irrespective of a research degree. The research publication process must exclude Supervision of
the research scholar number completed, submitted, and continuing. Research and book publishing is an
individual's effort for knowledge up-grading, whereas scholarly research supervision is not the faculty's direct
effort. Thus, faculty performance evaluation utilizes the research and book publication. Research book
publication must classify into various tiers, i.e., international, national reputation, and allocate its weight.
Service: Wisdom, knowledge, and information; all three words are distinct. An individual becomes wise as time
elapses, but it is not valid in all respect. For example, if a person is not actively participating in any activity, this
could leave the individual's negative growth performance. So active service is one of the critical parameters for
faculty evaluation.
Belongingness to the Institution: The institution always looks for faculty's active participation. Thus,
belongingness is an essential parameter for faculty evaluation. SidikaGizir [10] studied a hypothetical model to
understand students' belongingness and four other factors. Other studies also conducted in various domains.
Faculty belongingness factors needed to explore.
ICT Mediated Teaching-Learning: Traditional activities include chalk and board, limited educational on-field
activity, and a resource for visualizing any scenario. ICT-mediated teaching-learning brings the opportunity of
virtualization. The virtual world has the opportunity to grow in diverse ways, and because of this, education has
become everyone's doorstep. ICT also visualizes n-dimensional complex architecture to express knowledge. ICT
also changed the teaching pedagogy. Today we hear about blended learning, flipped classroom, personalized
learning, game-based learning. ICT efficient faculty will increase effective knowledge communication and adopt
modern high-tech teaching pedagogy.
Projects and Policy Documents: Higher education teaching staff relates knowledge with current human life
problems. It is a general perception that laureates will study this problem and identify the best possible solution.
The Government also expects the same from them. The researcher explores issues through project work and
policy documents and suggests possible solutions. All policy documents and projects are high-level knowledge
presentations of teaching faculty.
Reach Out of the Institution: Higher education faculty have depth in their field of knowledge. So, the faculty's
responsibility is to share their experience and familiarity with the community. This knowledge is attained from
their teaching ability improvement, research work, creative work, and/out campus service. Thus, the reach-out
activity becomes another essential parameter to evaluate faculty performance.
Other: Nowadays, various social platforms connect faculty and improve their publication effectiveness. Some
parameters are the H index, i10, journals impact factor. These factors use for evaluating faculty performance.
The above-highlighted points are indicative. The institution may add or remove or both regarding evaluation
parameter selection to enhance the academic capacity. In each evaluation parameter, the faculty's execution
capability stored. For example, for the teaching parameter, if a teacher took 98 classes out of 120 classes assigned
in the specific session, then its score will be 98/120= 0.82 (rounded up to the decimal place of 2). In the same
manner, another parameter calculated. Counting preferred in the parameter where the maximum point is not
mentioned, such as research papers.
164
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

IV. ARCHITECTURE OF THE PROPOSED WORK


The data for all faculty members record in a database in the proposed technique. The productivity of any faculty
member or group of faculty members is studied numerically, causing management to identify quick decisions on
any of the parameters related to faculty.
Figure 1 shows the process flow of faculty performance evaluation. Figure 1 demonstrates five stages. These
stages are faculty score in various parameters, define score in each parameter, calculate the weight, final score,
and apply a clustering algorithm to form the cluster.
Let us elaborate on these stages in detail:

Figure 1: Process flow diagram of Faculty Performance evaluation


Define Score in Each Parameter:
Every evaluation parameter needs a specified score to give constant weight. The University grant commission of
India assigns constant weight to the parameter of faculty performance evaluation in its minimum standard
guideline for faculty recruitment or promotion. This score controls the individual parameter contribution in
faculty performance score. Scores for each parameter are applicable in the standard format. The proposed model
gives flexibility to the institution to establish the new parameters and a constant score. The dataset structure
showed in table 1
Table 1: Structure to Store the Score with Evaluation Scheme of Each Parameter
Parameter Evaluation scheme Maximum Points
. . .
. . .
. . .
. . .
. . .
. . .
. . .
B. Calculate Weight:
Assigning a Score to each parameter gives standard weight in the overall faculty score for every individual to be
assessed. It could be possible that faculty get interest-only into those evaluation parameters, which is high
scoring. This strategy is very similar to the student approach, which always focuses on the question, which is
high scoring and receives at least 50 percent of marks on the partial correct answer. This approach also gets some
points, which could be higher than any evaluation parameter's highest score. One assumption made here is that
score established for each parameter is different from the other and depends on the institutional objective.
A concept of weight has been introduced in this process, to give dynamic change in each parameter, apart from
the institutional set score. In addition, this dynamic change in evaluation parameters will include the concept of
probability.
Inclusion of probability will change the score's weight regarding the number of faculty scores at least any value
in each specific parameter compared to the total number of faculty in that score. One point is essential to know
that few parameters do not apply to all the faculties in a specific scenario, for example, Ph.D. supervision. Ph.D.
supervision will have two cases. The first is not eligible to supervise, and the second, no scholar is assigned or
eligible to submit the thesis. Parameter like Ph.D. supervision must customize while calculating the dynamic
weight of the evaluation parameter. βi
Weight for an evaluation parameter calculates using the following formula:
Sgz
βi = 1 − Efe 1
Where βi is the weight value of the ith parameter
Sgz is the number of faculty Secured value Greater than Zero

165
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Efe is the total number of Eligible Faculty for Evaluation


The data structure to store the weight of each evaluation parameter presented in table 2.
Table 2: Data Structure to Store Weight Value for Each Parameter
Parameter Weight
. .
. .
. .
. .
. .
. .
. .
C. Faculty Score:
The conceptual framework for the problem presents in figure 2:

Fig 2: a conceptual framework for faculty score computation


Pi represents the evaluation category. Getting a value for the evaluation category depends on the value obtained
in the evaluation method. Using only one way could lead to biasness, so multiple methods must utilized for each
evaluation category. In figure 2, M1, M2….Mn represents the method of evaluation for any parameter. The
equation will assign weight for each evaluation category.
All evaluation categoriesis not equally important for faculty performance. The second fact is that few categories
entirely depend on individual faculty effort of performance. These two factors motivate each category group's
weight, so every category must have respective weights. For example, in figure 2, Wi represents the weight of
the ith evaluation category. Thus, mathematically faculty score is computed as:
n

faculty score = ∑ i Pi
i=1
Where
irefers to the weight of that evaluation parameter.
Pi refers to the score obtained in the respective evaluation parameter.
i refer ith the evaluation parameter.
D. Applying Clustering Algorithm:
The first four steps shown in figure 1 are part of the data preparation. The fourth step is the last step and
significant step. This step involves the unbiased grouping of the data and providing aid to the administrative
person. Often, faculty is unsatisfied with the order of the faculty performance. The reason inferred from the
anonymous observation and discussion is irrational criteria for preparing the performance group.
After reviewing the variousliteratures, the number of clusters or group decisions is a wild goose chase. Many
algorithms give the data analyst freedom in deciding the number of clusters.
Some methods like the elbow method are available to find the optimal number of clusters. The Elbow method
improves clustering algorithm performance. The core concept of the elbow method is to find distortion at various

166
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

levels of cluster numbers. Cluster number decided based on distortion level nearest to the threshold level of
acceptance. The Elbow method primarily used with K means clustering algorithm.
Inspired by the elbow method, agglomerative clustering, and nearest neighbor concept of data mining, a novel
approach has been coined to group the data.
The significant steps involved in forming the cluster are finding statistical value from the dataset; Pass 1-
assigning data to different clusters, and Pass 2- Backpass (optimal cluster number). Statistical values will
determine the number of clusters from the dataset. Statistical significance includes Minimum value in Dataset D;
Maximum value in Dataset D, Difference value of maxD and mind, the number of elements in dataset D with the
equation, Calculate density area value for the nearest neighbor, andCalculate minimum data in each cluster.
Pass 1 stage assigns data elements to any cluster with the help of the nearest neighbor. If the value is close to the
previous data element, then it is given to the cluster; otherwise, the new cluster is created and assigned to that
cluster.
Pass2 stage is an essential part of the clustering. In this stage, the agglomerative concept reduces the number of
clusters to receive a higher cluster validation index. The minimum number of points in each cluster plays its role
here. If any cluster does not have the minimum number of points, it assigned to the previous cluster.
V. PROPOSED CLUSTERING ALGORITHM
INPUT:
D : Dataset with the unique value
OUTPUT:
Y : clustered data
Algorithm:
Step 1: Find values:
MinD : Minimum value in Dataset D
MaxD : Maximum value in Dataset D
R : Difference value of maxD and minD
K : number of elements in dataset D with the equation.
T : Calculate density area value in t as
t = log(standard deviation(D)) ∗ (0.5 ∗ r/k)
MinData: Calculate minimum data in each cluster using equation
mindata = r ∗ 0.05
Step 2: Pass1-Place values in a different cluster
Step 2.1: j=0
Step 2.2: Assign data into respective cluster with threshold value t
For i=1 in range of length D
If D[i]-D [i-1] is less than t
D[i] append in Y[j]
Else
j incremented by 1
D[i] appended to Y[j]
Step 3: Pass 2 - Backpass (Optimal number of cluster)
j=1
i=0

167
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

While (j-1) is less than (length of Y -1)


If i=0 and length of NY[i] is less than mindata
Append Y[j] to NY[i]
Increase j in step of 1
Elseif length of Y[j] is less than mindata
Append Y[j] to NY[i]
Increase j in step of 1
Elseif j=length of Y and length of (Y [j-1]) is less than mindata
Append Y[j] to NY[i]
Else
Increase value of i in step of 1
Append Y[j] to NY[i]
Increase j in step of 1.
VI. DATA SET
The data set used to demonstrate performance of the algorithm prepared in Microsoft excel on selected
parameters.

Figure 3: Final Score distribution chart


Figure 3 shows the distribution of the final score value and has four peaks in reference to nearby value in the
histogram thatmean value centralized in four clusters.
VII. RESULT AND DISCUSSION
The final score will use for clustering purposes. Python is the programming language chosen for developing the
algorithm and produces the following output.
1 [46.291304347826085, 40.19826086956522, 37.617391304347834, 26.229565217391304,
23.869565217391305, 39.512173913043476, 39.773043478260874, 24.200000000000003,
50.114782608695656, 32.63652173913044, 24.6895652173913, 19.27130434782609,
28.976521739130437, 27.6504347826087, 28.725217391304348, 41.28521739130434, 20.68,
41.385217391304344, 47.79391304347827, 19.5, 47.39391304347825, 58.69217391304348,
39.705217391304345]
2 [19.5, 19.27130434782609, 20.68, 23.869565217391305, 24.200000000000003, 24.6895652173913,
26.229565217391304, 27.6504347826087, 28.976521739130437, 28.725217391304348,
32.63652173913044, 37.617391304347834, 39.512173913043476, 39.705217391304345,
39.773043478260874, 40.19826086956522, 41.28521739130434, 41.385217391304344,
46.291304347826085, 47.39391304347825, 47.79391304347827, 50.114782608695656,
58.69217391304348]
3 Threshold value to identify the nearest point: 2.036476280584492
4 [19.5, 19.27130434782609, 20.68]

168
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

5 [23.869565217391305, 24.200000000000003, 24.6895652173913, 26.229565217391304,


27.6504347826087, 28.976521739130437, 28.725217391304348]
6 [32.63652173913044]
7 [37.617391304347834, 39.512173913043476, 39.705217391304345, 39.773043478260874,
40.19826086956522, 41.28521739130434, 41.385217391304344]
8 [46.291304347826085, 47.39391304347825, 47.79391304347827]
9 [50.114782608695656]
10 [58.69217391304348]
11 [19.817101449275363, 26.3344099378882, 32.63652173913044, 39.92521739130434,
47.15971014492754, 50.114782608695656, 58.69217391304348]
12 The number of cluster points:7
13 Clusters assigned to the data point: [0, 0, 0, 1, 1, 1, 1, 1, 1, 1, 2, 3, 3, 3, 3, 3, 3, 3, 4, 4, 4, 5, 6]
14 Before back pass silhouette score 0.5501586087520715
15 Minimum data in each cluster: 1.97104347826087
16 Backpaass process start
17 Final cluster and data points are
18 [19.5, 19.27130434782609, 20.68]
19 [23.869565217391305, 24.200000000000003, 24.6895652173913, 26.229565217391304,
27.6504347826087, 28.976521739130437, 28.725217391304348, 32.63652173913044]
20 [37.617391304347834, 39.512173913043476, 39.705217391304345, 39.773043478260874,
40.19826086956522, 41.28521739130434, 41.385217391304344]
21 [46.291304347826085, 47.39391304347825, 47.79391304347827, 50.114782608695656,
58.69217391304348]
22 The number of cluster points:4
23 Clusters assigned to the data point: [0, 0, 0, 1, 1, 1, 1, 1, 1, 1, 1, 2, 2, 2, 2, 2, 2, 2, 3, 3, 3, 3, 3]
24 After back pass silhouette score 0.6149607243415922
Each critical point related to the result has a number which is summarized in the following points:
 Point 1 is the original data shown in Figure 5.3, and the total values are 23.
 Point 2 represents a sorted dataset of the original dataset obtained from figure 5.3 and mentioned in point 1.
 Point 3 represents the threshold value to find the nearest point from the current point. The threshold value
obtained for the dataset is 2.036476280584492. If the distance between the current and next data point is
less than the threshold level, it will be assigned in the same cluster; otherwise, a new cluster will be created.
 Points 4, 5, 6, 7, 8, 9, and 10 represent the different clusters, with the data value falling into the respective
cluster. This grouping is free from human interference. All the values are assigned to the respective cluster
with the help of the threshold value mentioned in point number 3.
 Point 11 represents the centroid value of each cluster obtained after pass 1.
 Point number 12 shows the number of cluster points formed after pass 1. The value is 7 in this case. The
seven clusters are shown in points 4, 5, 6, 7, 8, 9, and 10, and their centroids are mentioned in point 11.
 Point 13 shows the cluster assigned to the data value. Remember that the order must interpret the sorted
data set as shown in point 2. Point 14 shows cluster validation measurement method silhouette value. After
pass 1, 7 clusters formed, whose silhouette value is 0.5501586087520715. This represents the quality of
grouping the dataset.
 Point 15 shows the minimum number of data points which will change to the nearest integer. In this case, its
169
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

value is 1.97104347826087, which is close to the 2. So each cluster must have two-element.
 Point 16 shows the message "Backpaass process start." This tells that pass two starts to reduce the number
of clusters using the minimum number of data (point 15 shows that each cluster must have at least two
elements) in each group.
 Point 17 is a message "Final cluster and data points are." Point 18,19, 20, and 21 shows four different
clusters, and data belong to the cluster created after pass two as proposed in the algorithm.
 Point 22 represents the number of cluster points, and it is 4.
 Point 23 shows the cluster number assigned to the data in reference to sorted data.
 Point 24 shows the cluster validation score (silhouette value) to represent the goodness of the cluster. The
silhouette value is 0.6149607243415922 after pass 2 (refer to the proposed algorithm).
Result obtained using the proposed algorithm gives 4 clusters at the end. In the first pass, initially, it provides 7
clusters with silhouette value 0.5501586087520715. After the second pass silhouette value is
0.6149607243415922. The second silhouette value is more than the first, representing better cluster receives
after pass 2.
Finally, 4 cluster formed using sorted data which creates three decision boundaries as summarized in the
following table 3:
Table 3: Decision Levels and Respective Cluster Number
Decision Levels Cluster Number
Less than or equal to 20.68 1
Greater than or equal to 23.87 and less than or equal to 32.64 2
Greater than or equal to 37.62 and less than or equal to 41.39 3
Greater than or equal to 46.3 and less than or equal to 58.7 4
VIII. ADVANTAGE OF THE PROPOSED ALGORITHM
Deciding the number of clusters is a challenging task of any clustering algorithm. Inappropriate cluster numbers
mislead the interpretation of patterns and give the poor performance of the cluster. The key feature of the
proposed algorithm is to:
 The selection of the number of clusters is self-calculative.
 The appropriate number of clusters is calculated with the help of data distribution.
 Each cluster has the minimum number of data points.
 Minimum data points are the proportion of total data points calculated through the algorithm.
 In the entire process, the user has to provide only the dataset.
IX. LIMITATION OF THE PROPOSED ALGORITHM
The proposed algorithm implements only on sorted data. The algorithm does not have any sorting mechanism.
Thus, before implementing the proposed algorithm, the sorting procedure needs to apply to the dataset so that the
algorithm cluster data.
Another limitation of the proposed algorithm, it is used only for one-dimensional data. In other words, it belongs
to univariate clustering methods.
X. CONCLUSION
Data mining offers a list of clustering methods, but a significant limitation is deciding the number of clusters. In
this research paper, a clustering algorithm is proposed that proposes a methodology to cluster data into a certain
number of groups. The uniqueness of this clustering algorithm is the self-deciding number of clusters using data
distribution. The clusters goodness test uses silhouette index. Table 3 represents the decision boundary to define
the boundary of clusters. Scores falling in the respective level assigned to that cluster.
The institution's decision-makers may utilize the information to take necessary action to identify various groups
of performers in the institution.

170
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

REFERENCES
[1] Jinal Rajani and Borah Malaya Dutta, "A Survey on Educational Data Mining Research Trends,"
International Journal of Database Management System (IJDMS), Vol. 5 NO.3 June 2013.
[2] Fatima D., Fatima S. Prasad V K, "A Survey on Research work in Educational Data Mining," IOSR
Journal of Computer Engineering (IOSR-JCE) Vol 17 Ver II (Mar-Apr 2015) PP 43-49 e-ISSN: 2278-
0661, p-ISSN 2278-8727
[3] Saranya S., Ayappan R., and Kumar N, "Student progress analysis and educational institutional growth
prognosis using data mining," International Journal of Engineering Science and Research Technology,
Vol 3(4) April 2014, pg no. 1982-87, ISSN 2277-9655
[4] Ma Y, Agnihotri L, Baker R and Mojard S, Ëffect of student ability and question difficulty on duration",
Proceedings of 9th International Conference on Educational Data Mining 2016 pg 86-93.
[5] Bydžovská H, "Course Enrollment Recommender System", Proceedings of 9th International conference
on Educational Data Mining 2016 pg 312-17.
[6] Clement B, Oudeyer P, Lopes M, "A Comparison of Automatic Teaching Strategies for Heterogeneous
Student Populations", Proceedings of 9th International conference on Educational Data Mining 2016 pg
330-35.
[7] Klingler S, Käser T, Solenthaler B, Gross M, "On the Performance Characteristics of Latent-Factor and
Knowledge Tracing Models", Proceedings of 8th International conference on Educational Data Mining
2015 pg 37-44.
[8] Paquette L, Rowe J, Baker R, Mott B, Lester J, DeFalco J, Brawner K, Sottilare R, Georgoulas V,
"Sensor-Free or Sensor-Full: A Comparison of Data Modalities in Multi-Channel Affect Detection",
Proceedings of 8th International conference on Educational Data Mining 2015 pg 93-100.
[9] Olsen J K, Aleven V, Rummel N, "Predicting Student Performance In a Collaborative Learning
Environment"", Proceedings of 8th International conference on Educational Data Mining 2015 pg 211-17.
[10] Sidika Gizir, "The Sense of Classroom Belonging Among Pre-Service Teachers: Testing a Theoretical
Model", European Journal of Educational Research 8(1):87-97 ISSN: 2165-8714. DOI: 10.12973/eu-
jer.8.1.87

AUTHOR DETAILS:
1
PREETI JAIN 2DR. GYANESHSHRIVASTAVA AND 3DR. UMESH KUMAR PANDEY
1
Research Scholar and 2Research Supervisor, MSIT, MATS University, Raipur Chhattisgarh India
3
Co-Research Supervisor, United Institute of Technology, Prayagraj Uttar Pradesh India
Orcid id [0000-0002-8828-4719]

171
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

ASTUDY ON ACOUSTICAL PARAMETERS OF NIXCO1-XFE2O4 NANOFERROFLUIDS PREPARED


BY CO-PRECIPITATION METHOD

P. CHITHRALEKHA, K. GANGADEVI R. SRINIVASAN AND R. KARTHICK

ABSTRACT
Nanoferrofluids of NixCo1-xFe2O4(x = 0.1, 0.3, 0.5, 0.7 and 0.9 M)were prepared by chemical co-precipitation
method. The structural and surface morphological investigations were done by XRD and SEM techniques
respectively. The crystallite size calculated from (3 1 1) plane of XRD, revealed that crystallite size decreases
with increase in nickel content and are in the range of 11-5 nm. Ultrasonic waves of various frequencies passed
through nanoferrofluidstravel with different velocities at different temperature helps in studying the chemical
and physical properties of the nanoferrofluid. In the present study, ultrasonic waves are passed through the
aqueous carrier fluid and nickel doped cobalt nanoferrofluids by varying the temperature in the range of 30-70
o
C. From the experimental data, various acoustical parameters such as Rao’s constant, Wada constant and
adiabatic compressibility have been evaluated. The increased ultrasonic velocity of nanoferrofluid than that of
the carrier liquid indicates a strong interaction between the solute and solvent.
Keywords: Co-precipitation, X-ray diffraction, Wada constant, Adiabatic compressibility.

1. INTRODUCTION
Ferrofluids are the magnetic colloid of single domain magnetic particles with typical dimension about 10nm,
dispersed in a liquid carrier [1-3].The small sized magnetic nanoparticles may exhibit single domain state and
possess magnetic moment mp  (d M s ) / 6 , where M s is saturation magnetization of the nanoparticles.
3

Fe3O4 nanoparticles are most widely used because of their high saturation magnetization, susceptibility and
super-paramagnetic property [4, 5].Magnetic nanoparticles in a nanofluid may tend to form conglomerates,
which modify their physical properties such as thermal, optical, magnetic, magneto-optical properties [6-8].
Ultrasonic characterization of ferrofluids is used to study the molecular interaction between nanoparticles and
their conglomerate formation.To prevent the agglomeration of nanoparticles, they are coated with a suitable
choice of surfactants.As magnetic nanofluids have the combined magnetic and fluid properties [9], they find
applications in oil sealing [10], MEMS [11], hard disks [12], biomedical field [13], etc., In order to tailor the
properties, doping can be done in nanoparticles. Two methods are essentially used to prepare nanoparticles
namely, size reduction and bottom-up approach. In this work, chemical precipitation was used because, this
method requires less energyandis cost effective.There are very few works on ultrasonic measurement of
ferrofluids in literature [14-17] besides thermal, electrical, optical, magnetic properties. Ultrasonic and
acoustical parameters of cobalt ferrite nanofluid reveals the interparticle interaction and intermolecular
interactions at various temperature and magnetic fields [18].Yet, the behaviourof magnetic fluids is still unclear
due to lack of explanations in their molecular level interaction. On this basis, the present study is aimed to
investigate acoustic and thermodynamic parameters such as ultrasonic velocity, adiabatic compressibility,
acoustic impedance, Rao’s constant and Wada’s constant. The study of these parameters will reveal the effect of
concentration in molecular and interparticle interaction.
2. MATERIALS AND METHODS
2.1 Materials
Analytical grade chemicals such as Nickel (II) chloride, Cobalt (II) chloride (CoCl 2), Iron (III) chloride
(FeCl3),Sodium hydroxide (NaOH) and Oleic acidwere used as received.
2.2 EXPERIMENTAL
Nanoferrofluids of NixCo1-xFe2O4 were prepared by chemical co-precipitation method by varying the value of x
(0.1, 0.3, 0.5, 0.7 and 0.9 M). Aqueous solution of FeCl3, CoCl2, NiCl2and NaOH were prepared separately in
their respective stoichiometric ratios. NaOH solution is then added dropwise to the mixture of FeCl 3, NiCl2 and
CoCl2 solutionsunder stirring. The precipitates obtained were heated at 80oC for 1 hour and the precipitateswere
isolated by centrifugation and washed several times with deionized water. In order to obtain stabilized
ferrofluid, the nanoparticles which acts as precursor were subjected to addition of surfactant. The magnetic fluid
is then again heated at 80oC for 1 hour under stirring. The resulting product was washed several times with
deionized water to remove impurities and free radicals. The final precipitate is dried at 400 oC for 2 hours. The
172
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

samples were characterized by XRD and SEM. Ultrasonic velocity measurements were carried out
usingnanoferrofluids prepared by dispersing the final product in carrier fluid.
3. RESULTS AND DISCUSSION
3.1 Structural Analysis
Figure 1 shows the XRD spectra of the sample. A series of characteristic peaks in spectrum agree with standard
NixCo1-xFe2O4 XRD spectrum [14]. The average crystalline size ‘D’ of the particles was calculated from the
Scherrer equation: D = Kλ/βcosθ, where K is Scherrer constant, λis the X-ray wavelength, β is the Full width of
half maximum and θ is the Bragg diffraction angle. The crystalline size of the ferrite nanoparticles with nickel
substitution are in the range of 11 to 5 nm. Further, the particle size of the nanoparticles decreases with increase
in cobalt substitution.
The analysis of the diffraction pattern confirms the formation of ferrite structure. The peaks at 29 o (2 2 0), 35o(3
1 1), 42o (4 0 0) reveals the presence of nickel doped cobalt ferrite (22-1086). Strongest reflection from (311)
plane denotes the formation of cubic spinel structure [19]. The intensity of the peak increases with increase in
concentration of cobalt.
With increasing nickel content lattice parameter decreases from 8.38 Å to 8.01 Å. This may be attributed to the
substitution of smaller ionic radius Ni2+ ions (0.69Å) instead of larger ionic radius cobalt (0.82Å), which is
obeying Vegard’s law [20]. Substitution of Ni ions in spinel ferrite causes nickel ions to occupy tetrahedral site
preferably, displacing iron ions to octahedral site [21]. Thus, in octahedral site iron ions replace some cobalt
ions. Therefore, replacements of nickel ions by cobalt ions force the transformation of inverse spinel into
normal spinel structure.
(311)
(220)

(222)

(400)

(511)

(440)
Intensity (counts)

20 30 40 50 60 70
2 (deg)
Fig.1X-ray diffraction pattern ofNixCo1-xFe2O4nanoparticles (a) x = 0.1 M, (b) x = 0.3 M, (c) x = 0.5 M, (d) x =
0.7 M and (e) x = 0.9 M.
3.2 Surface Morphology and Chemical Composition
Scanning electron microscope (SEM) images of NixCo1-xFe2O4 for various values of x are shown in Fig. 2. The
difference in morphology of nanoparticles might be associatedto the changes of their crystallite size and lattice
parameters.

Fig. 2SEM images of NixCo1-xFe2O4nanoparticles (a) x = 0.1 M (b) x = 0.3 M (c) x = 0.5 M (d) x = 0.7 M and
(e) x = 0.9 M
173
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

3.3ultrasonic Velocity Measurements


Ultrasonic velocity of NixCo1-xFe2O4nanoferrofluids was measured by varying temperature in the range of 30 o –
70o C and the variation of ultrasonic velocity with temperature is shown in fig.3

Fig. 3.Plot of Ultrasonic velocity vs Temperature of NixCo1-xFe2O4ferrofluids (a) x = 0.1 M, (b) x = 0.3 M, (c) x
= 0.5 M, (d) x = 0.7 M and (e) x = 0.9 M
The velocity of ferrofluids is lower than that of carrier fluid at all the temperatures.It is found that, the ultrasonic
velocity in ferrofluid decreases with doping of nickel concentration and with temperature. This shows the
influence of dispersed particles on the velocity of ultrasonic propagation. The decrease in ultrasonic velocity
with concentration is the qualitative measure of particle fluid interaction and it shows that the predominance of
particle-fluid interaction over particle-particle interaction in the absence of magnetic field at all temperatures
[22].
Adiabatic compressibility, Wada constant and Rao’s constant are calculated using the formulae given below
[23, 24]

 1 (1)
v 2
M eff
W  1 T (2)

M eff
R v 1 2 (3)

Z  v (4)
Where, β, ρ, v, Meffand Zare adiabatic compressibility, density, ultrasonic velocity,molar mass and acoustic
impedance of fluids respectively.
Doping of nickelincreases the cohesion between molecules in fluids which results in weak interparticle
interaction [25]. The decrease in particle-fluid interaction increases the particle-particle interaction which results
in enhanced adiabatic compressibility [25]. The resistance to ultrasonic wave propagation is known as acoustic
impedance which follows an inverse trend of ultrasonic wave velocity.
The acoustical parameters such as adiabatic compressibility, Wada constant and Rao’s constantwere calculated
from ultrasonic velocity and the variation of these parameters with temperature are shown in Fig.4, 5 and 6
respectively.
Rao’sconstant and Wada constant of the ferrofluid decreases with increase in nickel concentration and
temperature. Ferrofluids with higher concentrations of nickel is less compressible, which in turn reduces its

174
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

density. The adiabatic compressibility increases as a function of temperature and leads to decrease in acoustic
impedance [26].

Fig. 4.Plot of temperature vs adiabatic compressibility of NixCo1-xFe2O4ferrofluids (a) x = 0.1 M, (b) x = 0.3 M,
(c) x = 0.5 M, (d) x = 0.7 M and (e) x = 0.9 M

Fig. 5.Plot of temperature versus Wada constant of NixCo1-xFe2O4ferrofluids (a) x = 0.1 M, (b) x = 0.3 M, (c) x
= 0.5 M, (d) x = 0.7 M and (e) x = 0.9 M
6
2.9x10
6
2.8x10
a
6
2.8x10
6
b
Rao's constant

2.7x10
6
2.6x10 c
6
2.6x10
d
6
2.5x10
6
2.5x10
e
6
2.5x10
6
2.4x10
6
2.4x10

40 50 60 70 80
Temperature (degree)
Fig. 6.Plot of temperature versus Rao constant of NixCo1-xFe2O4ferrofluids (a) x = 0.1 M, (b) x = 0.3 M, (c) x =
0.5 M, (d) x = 0.7 M and (e) x = 0.9 M
175
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

4. CONCLUSIONS
The NixCo1-xFe2O4 nanoparticle was prepared by chemical co-precipitation method. The XRD patterns of all the
samples show a pure-phase with a cubic inverse spinel structure NiFe2O4, CoFe2O4 and Nickel doped cobalt
ferrite. The crystallite size decreases with increase in nickel content and are in the range of 11 – 5 nm. The SEM
data shows variation in surface morphology of the samples. The velocity of ultrasonic wavespassed through
NixCo1-xFe2O4 ferrofluid decreases as a function of dopant (nickel) concentration and decreases as a function of
temperature also. The decrement in ultrasonic velocity with concentration is a qualitative measure of particle
fluid interaction, which shows the predominance of particle-fluid interaction over particle-particle interaction.
The fluid of higher concentration is more compressible than those of lower concentration. The adiabatic
compressibility increases as a function of increasing temperature and leads to decrease in acoustic impedance.
ACKNOWLEDGEMENTS
The authors acknowledge the University Grant Commission (UGC), India, for financial support in the form of
Minor research project (F.No.5885/SERB-UGC).
[1] R E Rosensweig, Ferrohydrodynamics, Cambridge University Press 1985.
[2] B. Berkovski, V. Bashtovoy, Magnetic fluids and applications handbook, Begel House Inc, 1996.
[3] S. W. Charles and J Popplewell, Endeavour, New Series 1982, 6153-6154.
[4] D. Maity, D.C Agarwal, Synthesis of iron oxide nanoparticles under oxidizing environment and their
stabilization in aqueous and non-aqueous media, J. Magn. Mater. 308 (2007) 46.
[5] K. Mandel, F. Hutter, C. Gellermann, G.Sextl, Synthesis and stabilization of superparamgnetic iron oxide
nanoparticle dispersions, Colloids surf., A: Physicochem. Eng. Aspects, 390 (2011) 173.
[6] Swaminathan Ponmani, Jay Karen Maria William, Robello Samuel, R. Nagarajan, Jitendra S. Sangwai,
Formation and characterization of thermal and electrical properties of CuO and ZnO nanofluids in
xanthan gum, Colloids and Surfaces A: Physicochem. Eng. Aspects, 443 (2014) 37.
[7] M. Molcan , V.I. Petrenko, M.V. Avdeev , O.I. Ivankov , V.M. Garamus , A. Skumiel , A.Józefczak, M.
Kubovcikova , P. Kopcansky , M. Timko, Structure characterization of the magnetosome solutions for
hyperthermia study, J. Mol. Liq. 235 (2017) 11.
[8] A.Józefczak, M. Labowski, A. Skumiel, Hysteresis of changes of ultrasonic wave absorption coefficient
in a magnetic fluid caused by the magnetic field, J. Magn. Mater. 252 (2002) 356.
[9] Cjia-Lung Lin, Chia-Fen Lee, Wen-Yen Chiu, Preparation and properties of poly oligomer stabilized
superparamagnetic ferrofluid, J. Colloid Interface Sci. 291 (2005) 411.
[10] Young Sam Kim, Young Han Kim, Application of ferro-cobalt magnetic fluid for oil sealing, J. Magn.
Mater. 267 (2003) 105.
[11] L.M. Fu, C.H. Tsai, K.P. Leong, C.Y. Wen, Rapid micromixer via Ferrofluids, Physics Procedia, 9 (2010)
270.
[12] A. Zeeshan, A. Majeed, R. Ellahi, Effect of magnetic dipole on viscous ferro-fluid past a stretching
surface with thermal radiation, J. Mol. Liq. 215 (2016) 549.
[13] N. Momin, A. Deshmukh, S. Radha, Synthesis and characterization of CoFe2O4 & NiFe2O4 magnetic
nanoparticles for various biomedical applications: cell viability and cell death evaluations, J. Nano Res.
34 (2015) 1.
[14] W.C. Elmore, The magnetization of ferromagnetic colloids, Phys.Rev. 54 (1938) 1092.
[15] R E Rosensweig, J W Nestor and R S Timmins., In Mater. Assoc. Direct Energy Convers. Proc. Symp.
Chem. Eng. Ser. 1965, 5, 104 – 106.
[16] S S. Papell, In U.S. Patent, 1965, 3, 215- 218.
[17] J R Thomas, Preparation and magnetic properties of colloidal cobalt particles, J. Appl. Phys. 37 (1966)
2914.
[18] P H Hess and P H Parker, Polymers for stabilization of colloidal cobalt particles, J. Appl. Polym. Sci. 10
(1966) 1915-1927.

176
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[19] R E Rosensweig, Magnetic Fluids, J. Sci. American 247 4 (1982) 136-138.


[20] M. Motozawa, T. Sawada, Influence of magnetic field on ultrasonic propagation velocity in magnetic
fluids, J. Magn. Mater. 289 (2005) 66 - 68.
[21] M. Motozawa, T. Sawada,Velocity and attenuation of ultrasonic propagation in magnetic fluids under a
uniform magnetic field, Int. J. Appl. Electromagnet. Mech, 28 (2008) 143 - 145.
[22] M.Motozawa, Y. Iizuka, T. Sawada, Experimental measurements of ultrasonic propagation velocity and
attenuation in a magnetic fluid, J. Phys., Condens. Matter, 20 (2008) 204-205.
[23] Gajendra Bedare, Vivek Bhandakkar, Bhagwat Suryavanshi, Study of acoustical parameters of Binary
Liquid mixtures at 298 K, International Journal of Applied Physics and Mathematics, 2 (2012) 197.
[24] Jatinder Pal Singh, Rajesh Sharma, Variation of Wada constant, Rao constant and acoustic impedance of
aqueous Cholesteryl Oleyl carbonate with temperature, International Journal of Engineering Research and
Development, 11 (2013) 48.
[25] K. Anu, J. Hemalatha, Ultrasonic and magnetic investigations of the molecular interactions in zinc doped
magnetite Nanofluids, Journal of Molecular Liquids, 256 92018) 213-223.
[26] K. CheolGi, K. Chong, I. Dumitru, N. Lupu, and H. Chiriac, High Magnetostrictive Cobalt Ferrite for
Sensor Applications, Sensor Letters 5 (2007) 45-47.

AUTHOR DETAILS:
P. CHITHRALEKHA1, K. GANGADEVI2 R. SRINIVASAN3 AND R. KARTHICK4
1
Part Time Research Scholar, Thiagarajar College, Madurai Kamaraj University, Madurai - 625 021, India &
Department of Physics, GVN College, Kovilpatti- 628502, India
2, 3
Department of Physics, Thiagarajar College, Madurai - 625 009, India3
4
Government Higher Secondary School, Poomparai, Dindigul - 624103

177
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

DETERMINANTS OF ONLINE TRAVEL PURCHASE INTENTION: UNDERSTANDING THE


MODERATING ROLES OF SOCIO-DEMOGRAPHIC VARIABLES IN THE CONTEXT OF A
DEVELOPING COUNTRY

SATADRUTI CHAKRABORTY AND DR. DIPA MITRA

ABSTRACT
The influence of website service quality and consumer reviews on online booking for tourism services has been
substantiated by a number of researches, yet there is hardly any research on the influence of socio-demographic
variables on tourism purchase intention. The purchase stage in the online tourism market is heavily influenced
not only by the informational parameters which include extensive and accurate information as well as traveller
reviews, but are also affected by the socio-demographic parameters of the potential travellers. Even though
several studies (Valaei and Jiroudi, 2016; Saleki et al., 2021) have observed that demographic variables act as
moderators on consumer purchasing intentions, relatively little study has been done in the field of online
tourism market, especially in a developing country context like India. Given India's rapidly rising Internet
population, which is on track to overtake China as the world's second-largest e-commerce industry, study into
factors that influence Indian customers' purchasing decisions is long overdue. The principal aim of this
research is to understand the role that socio-demographic factors play on decision-making in the online travel
industry. There has been relatively little study done in this area and given the aforementioned study gap,
understanding the role and impact of these variables on consumer purchase intentions in the online tourism
sector in India is crucial. The study performed Partial Least Squares based Multi Group Analysis to test
whether socio-demographic based groups yield significant differences in their online travel purchase intention.
Here five socio-demographic parameters were undertaken for the current study: gender, age, education, income
and nature of traveller (occasional v/s frequent traveller). Even though gender was not found to act as a
significant moderator on purchase intention, other variables like age, education, income and traveller’s nature
was found to significantly moderate travel purchase intention based on impact of website quality and e-WOM.
This study adds to the growing body of work on the quality of tourism services in a web-based context. The
implications of the research followed by the recommendations that have been provided will prove to be useful
for marketing managers and practitioners who build strategic plans and implement solutions to increase tourist
online shopping through B2C e-commerce.Because the modern day travellers plan their trips via the internet,
the study aims to add to the body of knowledge about the moderating influence of socio-demographic variables
on tourism website quality and e-WOM which ultimately lead to booking/reservation/purchase intention.
Keywords: Tourism Sector; Socio-demographic variables, Travel website quality; e-WOM; Structural Equation
Modelling; Partial Least Squares Multi Group Analysis

INTRODUCTION
The advancement of technology in recent years, notably in the fields of communication and Web technology,
has drastically changed how individuals seek information, make decisions, and acquire goods and services. The
entire digitization process has ushered in a change in the tourism business. According to a report by the Indian
Brand Equity Foundation (2018), India is emerging as one of the most digitally-advanced traveller nation with
more and more citizens opting for digital tools to plan, book and experience a journey. According to the article,
there are high chances of India to reach the top five business travel market globally by 2030. The most sought-
after traditional offline travel agent is also now trying to utilise the online market to maintain its fast losing
segment of potential travellers.Consumers in India generally avail both online and offline sources of
information when planning for a trip. However, according to various survey reports, the majority rely on online
channels as they conceive that online platforms offer better deals, discounts and more convenience than offline
modes. Notwithstanding the fact that the internet has become a boon for the travel industry, certain features of
e-commerce have also led to fierce competition among the online travel agencies. For example, price wars are a
thing of the past now as pricing is now transparent on the internet platforms. The switching cost for customers is
also low hence it becomes hard for the OTAs to retain customer loyalty. Therefore, the only way to differentiate
and create a place in the consumer’s mind is by providing a superior quality of service.
The purchase stage in the online market which comprises of the online booking part is heavily influenced not
only by the informational parameters which include extensive and accurate information as well as availability,
but they are also affected by the socio-demographic parameters of the potential travellers. The influence of
178
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

website service quality on online booking has been substantiated by a number of researches (Dutta et al., 2017;
Li, 2018). The other factor that plays a significant role on purchase intention of travellers is user-generated
content or e-WOM about the potential travel product or service (Xiang and Gretzel, 2010; Choirisa et al., 2021).
Even though several studies (Valaei and Jiroudi, 2016; Saleki et al., 2021) have observed that demographic
variables act as moderators on consumer purchasing intentions, there is hardly any research on the moderating
impact of these variables on tourism purchase intention, especially in a developing country context.
Given India's rapidly rising Internet population, which is on track to overtake China as the world's second-
largest e-commerce industry, study into the factors that influence Indian customers' purchasing decisions is long
overdue.The principal aim of this research is to understand the role that socio-demographic factors play on
decision-making in the online travel industry. There has been relatively little study done in this area and given
the aforementioned study gap, understanding the role and impact of these variableson consumer purchase
intentions in the online tourism sector in India is crucial.
The paper has been structured as follows: the next section gives a detailed literature review on the subject
followed by hypotheses development. The following section presents the methodology followed by analysis and
findings from the study. The last section presents the implications, limitations and the conclusion.
LITERATURE REVIEW AND HYPOTHESES DEVELOPMENT
Impact of Travel Website Qualityon Purchase Intention
Fishbein and Ajzen (1975) were the first to propose that ‘Purchase Intention’ might be utilised as a predictor of
consumer consumption behaviour. Understanding clients' buying intentions is critical since intentions can
predict actual behavior.‘Purchase Intention’ means a consumer’s eagerness for a definite product or brand. The
way to measure purchase intention is to enquire about the possibility of buying the product/service. Various
studies (Lee et al., 2016; Huang et al., 2014) have proved ‘Service quality’ has the strongest effect on ‘Purchase
intention’.Because there is no real context in the online world, an appealing ‘Website design’ is essential for
attracting and engaging clients. Firms that provide high-quality e-services are more likely to gratify their clients,
according to Ataburo et al. (2017), who will then buy and re-buy the product/service. Among the many factors
that influence online travel purchase intent, website design or website quality may be considered the most
important influencer, having a significant impact on consumer satisfaction and trust.Elci et al. (2017) evaluated
the influence of ‘Website Design Quality’ on ‘Bookings and Reservation Intentions’. The model was
empirically evaluated with 700 samples acquired through a survey among internet travellers. The study revealed
that an e-travel site's quality is a critical factor in its success in the tourism business.Several researches
(Purnamasari and Budiatmo, 2019; Illah et al., 2019) believe that perceptions of ‘Service quality’ have a
considerable favourable influence on ‘Visiting decisions’. Therefore, the following hypothesis is formulated:-
H1: There is a significant impact of Travel Website Quality on Purchase Intention of Travel products.
IMPACT OF E-WOM ON PURCHASE INTENTION
For information-driven service industries like music, movies, tourism, etc. the internet is an extremely powerful
medium. The growth and reach of technology have changed the scope and prospects for word-of-mouth
communication. For potential travellers, electronic word-of-mouth has become the most convenient and sought-
after avenue for obtaining accurate information. Gretzel and Yoo (2008) conducted a study to investigate how e-
WOM from online reviews is being used for different parts of travel planning. They are of the opinion that
online reviews are an extremely important source of information for prospective travellers since a majority of
review readers feel that reading reviews increases their confidence levels, reduce risks and makes the decision-
making process easier. Some of them also feel that reading reviews makes the planning process more enjoyable
and aids in imagination.Several scholars (Xiang and Gretzel., 2010; Ye et al., 2012) have noted that testimonials
and endorsements from customers not only help the prospective traveller to plan and search for information on
the internet but also provide certain valuable inputs for travel businesses. Kim et al. (2012) states that potential
tourists are prone to look for ‘Online travel reviews’ before taking any travel decision in order to reduce risk
and get social reassurance especially in accommodation related decisions. Ramanathan (2012) notes online
guest ratings are getting increasingly important for online customers in hotel selection and hotel bookings.Cao
et al. (2017) mentions social media is also highly favoured by tourists. The behaviour of tourists can be heavily
influenced by the communication and discussions available on social media platforms. Choirisa et al. (2021)
notes that WOM affects the consumer’s awareness, beliefs, product evaluations, intentions and expectations in
the decision making process.Therefore, in the online tourism market e-WOM can play a significant role for both
consumers and tourist firms. The consumers can get their share of required information, advice or planning
schedules while the tourist firms can get visibility in the market domain from positive messages by customers.
Therefore, the following hypothesis is proposed:-
179
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

H2: There is a significant impact of electronic word-of-mouth communication on Purchase Intention of


Travel products.
Impact of Socio-Demographic Variables on Travel Decisions
The primarygoal of the research here is to understand the differences of certain socio-demographic variables
(gender, age, education, income and nature of traveller) on travel decisions. Given the complexity of the subject,
the impact of categorical variables on behavioural intentions is essential in theory testing (Cohen, Cohen, West
& Aiken, 2003).
According to some researchers (Bakshi, 2012; Ye and Robertson, 2012), studies on consumer behaviour
generally suggest apparent distinctions between male and female consumers in each stage of the decision-
making process. Men and women have different impressions of travel website functioning and online search
behaviour, according to Kim et al. (2007), who researched gender implications on visitors' information search.
Females are more likely than males to browse travel websites, and they value both online and offline sources of
information while looking for a vacation destination.Okazaki (2007) found that females have a higher
preference towards mobile advertising than males. Meng and Uysal (2008), on the other hand, point out that
findings on the influence of gender differences in tourism studies have been mostly inconsistent.Green and
Singleton(2013) have found significant difference between male and female tourists on their decisional
variables while Lin et al. (2014) observed no difference. Men and women interpret information differently,
according to Kim et al. (2012). Women considered e-WOM to be more convenient than males, according to the
research.
The second demographic variable considered in the research here relates to age of the potential travellers.
Mostaghel (2016) notes that there is a stereotype that older adults are far removed from technology and
services. Age was found to significantly influence technology adoption and usage in a study on mobile banking
adoption in India (Chawla &Joshi,2017).Park et al. (2013) proposes that in the context of the elderly and ICT
adoption, an absence of support, feelings of frustration and nervousness, a perceived lack of benefits, the
complexity of learning, insufficient knowledge or bad prior experience all powerfully influence the elderly
person's decisions about adopting technology.
The third socio-demographic variable, 'Level of income,' is also assumed to have an impact on consumer
preferences. In a study conducted by Boztepe(2012), income was found to moderate consumer behaviours on
purchasing of green products. Consumers with low income levels are affected by promotion activities rather
than price, as is commonly assumed. The middle-income group, on the other hand, is more environmentally
conscious and takes price into account.On the other hand, for the higher income group, promotion and
environmental awareness are extremely important. Another study on consumer attitude towards private label
brands by Shukla et al. (2013) point out that higher-income consumers respond favourably to end-of-aisle
display proneness during physical shopping for branded labelled products. Ali et al. (2020) also noted that
higher-income individuals are more confident of adopting technology compared to people belonging to lower-
income groups.
The fourth variable ‘Education Level’ was found to moderate purchasing of green products in a study by
Boztepe (2012). It was observed that green promotion has an effect on purchase decisions for elementary school
graduates while for high school graduates, price and product features affect purchase of green products. On the
other hand, for graduates and undergraduates, environmental awareness, product features and promotions affect
their purchasing considerations. In another study by Shukla et al. (2013), higher educated consumers show more
affinity towards end-of-aisle display products as it is more convenient to purchase. In a study on consumer
adoption of online food delivery services by Ali et al. (2020), it was observed that less educated people have
less cognitive skills which restrict their capability to learn new technology. Wang et al. (2019) also notes that
higher-educated people show higher environmental concern and subjective norms compared to the low-
education group.
The fifth and final variable for the study related to frequency of travel by the respondents. Woodside et al.
(2016) defines ‘Frequent Travellers’ are the ones reporting four or more trips every year. For a developing
country like India, where the majority of the population belongs to the middle-class segment, here ‘Frequent
travellers’ are hypothesised as those who reported having more than two trips per year, while ‘Occasional
Travellers’ are the ones who reported travelling for twice or less than two times per year. Tan et al. (2007) also
noted differences in perception of preferences among business/leisure and frequent/infrequent travellers on
customers of mobile tourism services. Lubbe et al. (2011) found significant differences in perception of services
offered by airports in South Africa between frequent travellers and infrequent travellers as well as business and
leisure travellers. Woodside et al. (2016) investigated whether heavy users of travel services differ substantially
180
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

from light users and non-users. The findings indicated that they do differ from light and non-users based on
demographic and media behaviour characteristics. They also clarified that it is important to understand this
demarcation as it is useful in planning customer segmentation strategies and loyalty marketing strategies, for
example – special service products, frequent hotel and airline programs etc. Understanding the uniqueness of
each segment is crucial for profitability in travel service industry. The self-perception theory was used by
Woosnam et al. (2018) to explain inhabitants' opinions of the degree of travel. According to the authors,
citizens' sentiments toward tourism development are strongly influenced by their travel past. Infrequent
travellers were found to provide less support on tourism development than frequent travellers. Kim et al. (2021)
observed that international tourists who travel frequently follow recommended bio-security behaviours more
strongly in times of the pandemic compared to the infrequent travellers. Therefore, the following hypotheses are
formulated:-
H3: The impact of (i) website quality and (ii) e-WOM on travel decisions varies across (a) gender, (b) age, (c)
education, (d) income and (e) type of traveller (occasional v/s frequent) demographic groups.
RESEARCH METHODOLOGY
Sampling Design and Data Collection
The primary data was collected by using questionnaires which were designed using Google forms and circulated
through emails and social media channels. A purposive sampling technique was applied to collect data wherein
the following three criteria were made a requirement to qualify the participant for research. The participant
should be an Indian and residing in India, he/she should be above 18 years of age and he/she should have taken
the help of any online travel agency (like Makemytrip, Yatra, Booking.com or any other site) to plan his/her last
trip. The original number of items in the research was 41. For a 5 percent to 10% margin of error in multivariate
research, the sample size necessary should be 5 to 10 times the number of variables (Hair et al., 1998).523
responses were collected for the purpose. The study analysed cross-sectional data from customers of online
travel services in India who are geographically scattered.
Variables and Measures
When using survey methodologies, it is recommended to reuse already validated instruments, as indicated by
Straub (1989). The ‘e-travel service quality scale’ by Ho and Lee (2007) has been adapted for the purpose of
measuring the travel website’s quality. For measuring the construct ‘e-WOM’, the questionnaire from Gretzel
and Yoo (2008) has been adapted. For measuring the endogenous construct ‘Purchase Intention’, 3 items have
been constructed based on several researches (Chen and Kao, 2010; Hsu, Chang and Chen, 2012). A 5-point
Likert scale has been used to measure the response formats for all the statements.
Profile of the Respondents
The socio-demographic profile is presented in Table I. Males make up 58% of the responses, while females
make up 42%. The bulk of respondents (69 %) are in the age bracket of 26-55 years. Graduates make up 43% of
the total while post-graduates comprise of 38 %.48% has an annual income more than 5 lacs/ annum. 66%
belong to the ‘Occasional Traveller’ segment that go for 2 or less than 2 trips per year.
Table: I: Demographic Profile of the Data
Characteristics No. of % of
Respondents Respondents
Gender Male 303 58
FEMALE 220 42
Age (In Years) <25 100 19
26-55 363 69
>55 60 12
Education Under-Graduates 98 19
GRADUATES 225 43
POST-GRADUATES 200 38
Income <5 Lacs/Annum 173 33
Range/Annum (In 5-10 LACS/ANNUM 250 48
Rs.) >10 LACS/ANNUM 100 19
Frequency of Occasional Traveller (2 Or Less 345 66
Travel Trips / Annum)
FREQUENT TRAVELLER (>2 178 34
TRIPS / ANNUM)
181
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

DATA ANALYSIS
The preliminary data analysis which provides the general picture of the respondents was done using the SPSS
software. For the structural evaluation of the model, Partial Least Squares Structural Equation Modelling
Techniques have been employed. The study examinesinternal consistency reliability, convergent validity,
discriminant validity, multi-group analysis and the structural model as recommended by Hair et al. (2017).
COMMON METHOD BIAS
To assess whether the data has Common Method Bias, two approaches were used: Harman's Single Factor Test
(1976) and Kock & Lynn's Full Collinearity Test (2012).The ‘Harman’s Single Factor Test’ conducted through
SPSS revealed that one component accounted for 34% of the variation. This is much below the 50% cut-off. On
the other hand, the Kock & Lynn's Full Collinearity Test (2012)conducted using PLS showedcollinearity values
to be much below the cut-off score of 3.3. Thus, it is concluded that the model is free of common method bias.
STATISTICAL ANALYSIS
Measurement Model
After elimination of several items whose factor loadings did not exceed the recommended value of 0.50 (Hair et
al., 2019), 18 items were retained under ‘Travel Website Quality’ and 9 items were retained under ‘E-WOM’.
Cronbach’s Alpha for all the constructs exceeded the minimum threshold limit of 0.70 (Henseler et al., 2009)
and Composite Reliability exceeded the cut-off value of 0.80 (Chua et al., 2019). Average Variance Extracted
(AVE) exceeded the threshold value of 0.50 (Hair et al., 2017). Thus, the Measurement model reached
satisfactory level in terms of reliability and convergent validity (Table II). Next, discriminant validity is
assessed using HTMT criteria (Henseler et al., 2014). As showed in Table III, all discriminant values are found
to be less than the threshold value of 0.85. Therefore, discriminant validity is established.
TABLE II: ‘Factor Loadings’, ‘Cronbach’s Alpha’, ‘Composite Reliability’ And ‘AVE’
Factor Cronbach’s Composite AVE
Loadings Alpha Reliability
TRAVEL WEBSITE QUALITY 0.919 0.928 0.509
TWQ3 0.649
TWQ4 0.502
TWQ6 0.569
TWQ7 0.643
TWQ8 0.578
TWQ9 0.56
TWQ10 0.635
TWQ11 0.652
TWQ12 0.712
TWQ14 0.802
TWQ16 0.729
TWQ17 0.688
TWQ18 0.609
TWQ20 0.531
TWQ23 0.541
TWQ24 0.637
TWQ25 0.5
TWQ28 0.645
E-WOM 0.912 0.932 0.582
E-WOM_1 0.711
E-WOM_2 0.656
E-WOM_4 0.788
E-WOM_5 0.771
E-WOM_6 0.790
E-WOM_7 0.857
E-WOM_8 0.839
E-WOM_9 0.868
E-WOM_10 0.834

182
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

PURCHASE INTENTION 0.813 0.91 0.76


PI_1 0.867
PI_2 0.9
PI_3 0.854
Table III: HTMT –A Measure of Discriminant Validity
Travel Website Quality E-Wom Purchase Intention
Travel Website Quality
E-Wom 0.632
Purchase Intention 0.618 0.61
Structural Model
The structural model obtained after a bootstrapping procedure consisting of 5000 re-samples (Hair et al., 2017)
explain that the value of R2 i.e. Coefficient of Determination for the construct ‘Purchase Intention’ is 34.9 %
which means Travel Website Quality and E-WOM can explain 34.9 % of the variance in ‘Purchase
Intention’.The Stone-Gaisser Q2 values for the constructs are revealed to be above the minimal criterion of zero
(Q2 = 0.258) using a blindfolding test (omission distance = 7) (Fornell and Cha, 1994). Therefore, the findings
have a high predictive value.The Standardised Root Mean Square Residual (SRMR) value of 0.063 indicates
that the model fits well (SRMR<0.08 criteria) (Henseler et al., 2014). The path coefficients (β) are shown in
Table-IV.Both the paths are found to be significant, however, the highest significant relationship is observed to
be between E-WOM and Purchase Intention (β=0.396 or 39.6% and t= 7.912) followed by Travel Website
Quality (β=0.275 or 27.5% and t= 7.317).The results of bootstrapping and each path’s t-statistics are also
presented in Figure 1.
Table IV: Path Coefficients
Original Standard T Statistics P
Sample (O) Deviation (|O/STDEV|) Values
(STDEV)
H1 : Travel Website Quality -> 0.275 0.04 7.317 0.000
Purchase Intention
H2: E-Wom -> Purchase Intention 0.396 0.052 7.912 0.000
Pls-Multi Group Analysis (Pls-Mga)
The Multi-group analysis (MGA) method is the preferred way of checking and analysing whether the different
groups based on socio-demographic parameters differ amongst themselves on their choice of factors influencing
decisions to purchase (Hair et al., 2017).Table V-IX shows the outcomes of the bootstrapping operation in PLS-
MGA. ‘Gender’is not found to significantly differentiate the individuals on their choice of decision regarding
travel. Hence, H3 (a) is rejected. The second variable ‘Age’is also not found to significantly differentiate the
individuals on influence of travel website quality on purchase decisions, but significant differences could be
observed between two age groups (Less than 25 years and 26-55 years) on impact of e-WOM on their purchase
intentions. The respondents belonging to the age group less than 25 years show a much higher inclination
towards e-WOM on their purchase intentions as compared to the age group 26-55 years (Table VI). Hence, H3
(b) is partially supported. The third socio-demographic variable ‘Education’is found to significantly
differentiate the individuals on influence of travel website quality on purchase decisions (Table VII). Post-
graduates have a much higher reliance on Travel Website Quality than Undergraduates. Also, significant
differences could be observed between all the groups on impact of e-WOM on purchase intentions.
Undergraduates are observed to have the highest reliance on e-WOM compared to graduates and post-graduates
are found to have the lowest reliance on e-WOM. Therefore, H3 (c) is supported. The fourth socio-demographic
parameter that was analysed for differences in perception is based on income of the respondents (Table VIII).
Respondents belonging to the income group less than 5 lacs per annum show a much lesser importance on
Travel website quality as compared to the respondents belonging to higher income categories. However, no
significant difference could be observed between all the groups on impact of e-WOM on purchase intentions.
Therefore, H3 (d) is partially supported. The last socio-demographic parameter that was analysed for
differences in perception is based on frequency of travel by the respondents. Here, two groups are created for
the purpose: Group-1: Frequent Traveller and Group-2: Occasional Traveller. Table IX shows the outcomes.
‘Nature of traveller’is found to significantly differentiate the individuals on influence of website quality on
purchase decisions. Respondents belonging to the group of frequent travellers show a much higher reliance on

183
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

travel site quality, while respondents belonging to the group of Occasional travellers show a higher preference
for E-WOM. Therefore, H3 (e) is supported.
Table V: Results of PLS-MGA (Gender)
Hypotheses Path Male Female (Beta) Path P-Value
(Beta) (B) Coefficients
(A) Diff (A-B)
H3:The impact of (i) Travel Website 0.242 0.374 -0.132 0.08
Travel website Quality-> PI
quality and (ii) e- E-WOM-> PI 0.454 0.288 0.166 0.09
WOM on travel
decisions varies
across (a)genders
Table VI: Results of PLS-MGA (Age)
PATH Age Beta Age Beta Path p-value
group (a1) Group (b1) coefficients
(a) (b) difference
HYPOTHESES (a1-b1)
H3:The impact of (i) Travel Website < 25 0.204 26-55 0.323 0.119 0.282
Travel website quality Quality-> PI < 25 0.204 >55 0.295 -0.091 0.531
and (ii) e-WOM on 26-55 0.323 >55 0.295 0.028 0.856
travel decisions varies E-WOM-> PI < 25 0.693 26-55 0.313 -0.38 0.008
across (b)age groups < 25 0.693 >55 0.489 0.204 0.168
26-55 0.313 >55 0.489 -0.176 0.176
Table VII: Results of PLS-MGA (Education)
PATH Education Beta Education Beta Path p-
group (a1) Group (b1) coefficients valu
(a) (b) difference e
Hypotheses (a1-b1)
H3:The impact Travel Undergraduates 0.256 Graduates 0.467 0.211 0.05
of (i) Travel Website 6
website quality Quality Graduates 0.467 Post- 0.698 -0.231 0.21
and (ii) e- -> PI Graduates
WOM on Post Graduates 0.698 Undergraduat 0.256 0.442 0.01
travel decisions es
varies across E- Undergraduates 0.468 Graduates 0.206 -0.262 0.05
(c)education WOM- Graduates 0.206 Post- -0.283 0.489 0.04
groups > PI Graduates 2
Post Graduates -0.283 Undergraduat 0.468 -0.751 0.00
es
Table VIII: Results of PLS-MGA (Income)
PATH Income Beta Income Group Beta Path p-
group (a1) (b) (b1) coefficients value
(a) difference
HYPOTHESES (a1-b1)
H3:The impact Travel < 5 lacs 0.220 5 lacs- 10 lacs 0.468 0.248 0.008
of (i) Travel Website 5 lacs-10 0.468 >10 lacs 0.261 0.207 0.292
website quality Quality- lacs
and (ii) e-WOM > PI >10 lacs 0.261 < 5 lacs 0.220 0.042 0.708
on travel E- < 5 lacs 0.485 5 lacs- 10 lacs 0.282 -0.204 0.062
decisions varies WOM-> 5 lacs – 10 0.282 >10 lacs 0.146 0.136 0.498
across (d)income PI lacs
groups >10 lacs 0.146 < 5 lacs 0.485 -0.34 0.086

184
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table IX: Result of PLS- Multi Group Analysis for the 2 Groups under ‘Nature of Traveller’
Hypotheses Path Occasional Frequent Path P-Value
Traveller Traveller(Beta) Coefficients
(Beta) (B) Diff (A-B)
(A)
H3:The impact Travel 0.268 0.677 -0.409 0.00
of (i) Travel Website
website quality Quality->
and (ii) e-WOM PI
on travel E-WOM-> 0.432 -0.037 0.469 0.00
decisions varies PI
across (e)type of
traveller
Figure 1: Bootstrapping Results: The Structural Model

IMPLICATIONS AND FUTURE DIRECTION


A growing percentage of travellers are planning their trips online (including tickets, hotel reservations, travel
insurance, and other services). As a result, the number of services offered by India's e-Travel portals has
increased. These portals are evolving from separate entities to ‘one-stop shops’ for all of a traveller's travel
requirements.The findings from the study can be taken as an important frame of reference by online travel
agents who could identify several attributes that might help them in developing appropriate business strategies
and strengthen their competitive position.
It was found in the study that e-WOM has a higher effect on Online Travel Purchase Intention than Travel
Website Quality. Thus, it is critical for tourist locations to remember that providing a nice experience for their
guests has a big influence on the production of positive impressions among non-visitors.Choirisa et al. (2015)
also notes that e-WOM indications such as consulting other visitors to pick an appealing trip and reviewing a
185
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

destination boost travel confidence.Because of the emphasis on involvement, online communities may be
utilised to enhance the knowledge and expertise available to other customers who come to learn.User Generated
Content, on the other hand, might be misrepresented if it is produced by travel operators or community
administrators who are paid by a company rather than by independent users or travellers. How can customers be
certain that the reviews they're reading are truly independent? Is it true that community managers who are
compensated by businesses provide skewed information? Trust in online information sources is essential for the
development of effective social networks.
The study also performed multi-group analysis to test whether socio-demographic based groups yield significant
differences in their online travel purchase intention. No significant difference was observed between males and
females in their perceptions of Travel Website Quality and e-WOM on Online travel Purchase Intentions.This
contrasts with other research (Green and Singleton, 2013; Elci et al.,2017) that found significant variations
between male and female attitudes about the usage of social media and travel websites. However, the
association between TravelWebsite Quality and Purchase Intention, as well as the relationship between E-WOM
and Purchase Intention, is found to be significantly affected by other moderators like age, education, income
and nature of traveller. Respondents belonging to the age group of less than 25 years, undergraduates and
having income less than 5 lacs per annum show a higher inclination towards user generated content. On the
other hand, Post graduates are observed to show the least reliance on e-WOM. This is an interesting observation
and calls for further research on the subject. A possible explanation for this can be that online review impression
and their emotional intensity may be the factors that are assessed by higher educated respondents before travel
decisions are undertaken.It was observed in a research by Su et al. (2021) that online review trustworthiness
moderates the impact on travel intention. Another interesting finding from the study is that the impact of Travel
Website quality on Purchase Intention is stronger in the ‘Frequent Traveller’ than in the ‘Occasional Traveller’,
whereas the impact of E-WOM on Purchase Intention is stronger in the ‘Occasional Traveller’ than in the
‘Frequent Traveller’. The ‘Occasional Traveller’ might be more overwhelmed with decision making, hence
reading other people’s reviews and experiences help them to judge the communications and promises made by
the tourism marketing companies. Therefore, the customers with a high degree of experience in travel may
believe they do not require social reassurance as they are secure in their own knowledge. This group of
‘Frequent Travellers’ are also observed to place a high value on company-sponsored promotions. Companies
may use re-engagement programmes with these types of travellers to build unique connections and deliver
critical follow-up offers, free discounts, extra rewards, or purchase reminders automatically. The firms will also
gain vital information into the problem areas by soliciting comments and surveys from these travellers.
This study adds to the growing body of work on the quality of tourism services in a web-based context.Because
travellers plan their trips via the Internet, the study aims to add to the body of knowledge about the moderating
influence of several socio-demographic variables on tourism website quality and e-WOM which ultimately lead
to booking/reservation/purchase intention. The purpose of this study is to provide tourism enterprises with a
more thorough understanding of how the aforementioned variables interact.The study's findings are applicable
to marketing managers and practitioners who build strategic plans and implement solutions to increase tourist
online shopping through B2C e-commerce.
Despite the fact that the model is based on the results of several researches, there may always be elements
influencing customers' online purchase intentions that have not been addressed here.Because the goal of this
study is to look into how potential travellers make online travel purchase decisions, future research might also
look at risk and its relationship with purchase decisions. The primary research, however, provides valuable
insight into the interplay of several factors that influence purchase intent in the online tourism world in the
context of a developing country like India.
REFERENCES
 Ali, S., Khalid, N., Javed, H. M. U., & Islam, D. M. Z. (2020). Consumer adoption of online food delivery
ordering (OFDO) services in Pakistan: The impact of the COVID-19 pandemic situation. Journal of Open
Innovation: Technology, Market, and Complexity, 7(1), 10.
 Ajzen, I., &Fishbein, M. (1975). A Bayesian analysis of attribution processes. Psychological
bulletin, 82(2), 261.
 Ataburo, H., Muntaka, A. S., &Quansah, E. K. (2017). Linkages among e-service quality, satisfaction, and
usage of e-services within higher educational environments. International Journal of Business and Social
Research, 7(3), 10-26.

186
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Bakshi, S. (2012). Impact of gender on consumer purchase behaviour. Journal of Research in Commerce
and Management, 1(9), 1-8.
 Boztepe, A. (2012). Green marketing and its impact on consumer buying behavior. European Journal of
Economic & Political Studies, 5(1).
 Cao, Qian., Yu, Bin., Tian, Xiao-Xia. (2017). “The Effect of Social Media on Tourism Consumer
Adoption Intention: Evidence from Urumqi”. Journal of Accounting and Marketing. Volume 6, Issue 1.
 Chawla, D., & Joshi, H. (2017). Consumer perspectives about mobile banking adoption in India–a cluster
analysis. International Journal of Bank Marketing.
 Chen, C. F., & Kao, Y. L. (2010). Relationships between process quality, outcome quality, satisfaction,
and behavioural intentions for online travel agencies - evidence from Taiwan. Service Industries Journal,
30(12), 2081–2092. https://doi.org/10.1080/02642060903191108.
 Choirisa, S. F., Purnamaningsih, P., & Alexandra, Y. (2021). The Effect Of E-Wom On Destination Image
And Attitude Towards To The Visit Intention In Komodo National Park, Indonesia. Journal of Tourism
Destination and Attraction, 9(1), 49-60.
 Chua, K. B., Quoquab, F., & Mohammad, J. (2019). Factors affecting environmental citizenship
behaviour: an empirical investigation in Malaysian paddy industry. Asia Pacific Journal of Marketing and
Logistics.
 Cohen, C., & Cohen, P. (2005). West & Aiken (2003). Applied multiple regression/correlation analysis for
the behavioral sciences.
 Dutta, S., Chauhan, R.K., Chauhan, K. (2017). Factors Affecting Customer Satisfaction of Online Travel
Agencies in India. Tourism and Hospitality Management, Vol. 23 (2), pp. 267-277.
 Elci, A., Abubakar, A. M., Ilkan, M., Kolawole, E. K., & Lasisi, T. T. (2017). The Impact of Travel 2.0 on
Travelers Booking and Reservation Behaviors. Business Perspectives and Research, 5(2), 124–136.
https://doi.org/10.1177/2278533717692909.
 Fornell, C., & Cha, J. (1993). Partial least squares (PLS). Unpublished working paper. Ann Arbor:
University of Michigan Business School, 16.
 Green, E., & Singleton, C. (2013). ‘Gendering the digital’: the impact of gender and technology
perspectives on the sociological imagination. In Digital sociology (pp. 34-50). Palgrave Macmillan,
London.
 Gretzel, U., & Yoo, K. H. (2008). Use and Impact of Online Travel Reviews. In Information and
Communication Technologies in Tourism 2008 (pp. 35–46). Springer Vienna. https://doi.org/10.1007/978-
3-211-77280-5_4.
 Hair, J. F., Anderson, R. E, R. L. Tatham, and W. Black (1998). Multivariate Data Analysis. Low Priced
Edition, New Delhi: Prentice-Hall.
 Hair Jr, J. F., Matthews, L. M., Matthews, R. L., &Sarstedt, M. (2017). PLS-SEM or CB-SEM: updated
guidelines on which method to use. International Journal of Multivariate Data Analysis, 1(2), 107-123.
 Hair, Joseph F., Risher, J. J., Sarstedt, M., & Ringle, C. M. (2019). When to use and how to report the
results of PLS-SEM. European Business Review, 31(1), 2–24. https://doi.org/10.1108/EBR-11-2018-0203.
 Harman, H. H. (1976). Modern factor analysis. University of Chicago press.
 Henseler, Jörg, Ringle, C. M., & Sinkovics, R. R. (2009). The use of partial least squares path modeling in
international marketing. Advances in International Marketing, 20, 277–319. https://doi.org/10.1108/S1474-
7979(2009)0000020014.
 Henseler, J., Dijkstra, T. K., Sarstedt, M., Ringle, C. M., Diamantopoulos, A., Straub, D. W.,&Calantone,
R. J. (2014). Common beliefs and reality about PLS: Comments on Rönkkö and Evermann
(2013). Organizational research methods, 17(2), 182-209.
 Ho, C. I., & Lee, Y. L. (2007). The development of an e-travel service quality scale. Tourism
Management, 28(6), 1434–1449. https://doi.org/10.1016/j.tourman.2006.12.002.

187
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Huang, C. C., Yen, S. W., Liu, C. Y., & Huang, P. C. (2014). The relationship among corporate social
responsibility, service quality, corporate image and purchase intention. International Journal of
Organizational Innovation, 6(3).
 Hsu, C. L., Chang, K. C., & Chen, M. C. (2012). The impact of website quality on customer satisfaction
and purchase intention: Perceived playfulness and perceived flow as mediators. Information Systems and
E-Business Management, 10(4), 549–570. https://doi.org/10.1007/s10257-011-0181-5.
 Illah, A. N., Sularso, R. A., &Irawan, B. (2019). Pengaruh Citra Destinasidan E-WOM di Media
SosialInstagramsertaPersepsiKonsumenTerhadapKeputusanBerkunjungkeObjekWisata B29 di
KabupatenLumajang. E-Journal EkonomiBisnis Dan Akuntansi, 6(2), 164-170.
 Kim, D. J. (2012). An investigation of the effect of online consumer trust on expectation, satisfaction, and
post-expectation. Information systems and e-business Management, 10(2), 219-240.
 Kim, D. Y., Lehto, X. Y., & Morrison, A. M. (2007). Gender differences in online travel information
search: Implications for marketing communications on the internet. Tourism management, 28(2), 423-433.
 Kim, M. J., Hall, C. M., & Bonn, M. (2021). Does international travel frequency affect covid-19
biosecurity behavior in the united states?. International Journal of Environmental Research and Public
Health, 18(8), 4111.
 Kock, N., & Lynn, G. (2012). Lateral collinearity and misleading results in variance-based SEM: An
illustration and recommendations. Journal of the Association for information Systems, 13(7).
 Lee, Y. C., Wang, Y. C., Chien, C. H., Wu, C. H., Lu, S. C., Tsai, S. B., & Dong, W. (2016). Applying
revised gap analysis model in measuring hotel service quality. SpringerPlus, 5(1), 1-14.
 Lin, J. H., Lee, S. J., Yeh, C., Lee, W. H., & Wong, J. Y. (2014). Identifying gender differences in
destination decision making. Journal of Tourism & Recreation, 1(1), 1-11.
 Lubbe, B., & Victor, C. (2012). Flight delays: Towards measuring the cost to corporations. Journal of Air
Transport Management, 19, 9-12.
 Meng, F., &Uysal, M. (2008). Effects of gender differences on perceptions of destination attributes,
motivations, and travel values: An examination of a nature-based resort destination. Journal of sustainable
tourism, 16(4), 445-466.
 Mostaghel, R. (2016). Innovation and technology for the elderly: Systematic literature review. Journal of
Business Research, 69(11), 4896-4900.
 Okazaki, S., Katsukura, A., &Nishiyama, M. (2007). How mobile advertising works: The role of trust in
improving attitudes and recall. Journal of advertising research, 47(2), 165-178.
 Park, N., Kim, Y. C., Shon, H. Y., & Shim, H. (2013). Factors influencing smartphone use and
dependency in South Korea. Computers in Human Behavior, 29(4), 1763-1770.
 Purnamasari, M., &Budiatmo, A. (2019). Pengaruh pro mosi dank ualitas pelay anante rhad apkepu asan
pengun jun gden gan kep utus anpeng unjungse baga ivari abel intervening padaobjekwisatacandi
borobudurkab upatenMagelang. JurnalIlmu AdministrasiBisnis, 8(3), 89-96.
 Ramanathan, R. (2012). An exploratory study of marketing, physical and people related performance
criteria in hotels. International Journal of Contemporary Hospitality Management.
 Saleki, R., Quoquab, F., & Mohammad, J. (2021). To buy or not to buy organic food: evaluating the
moderating effect of gender using PLS-MGA. International Journal of Business Governance and
Ethics, 15(1), 106-127.
 Shukla, P., Banerjee, M., &Adidam, P. T. (2013). The moderating influence of socio‐demographic factors
on the relationship between consumer psychographics and the attitude towards private label
brands. Journal of Consumer Behaviour, 12(6), 423-435.
 Su, L., Yang, Q., Swanson, S. R., & Chen, N. C. (2021). The impact of online reviews on destination trust
and travel intention: The moderating role of online review trustworthiness. Journal of Vacation Marketing,
13567667211063207.
188
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Tan, E. M. Y., Goh, D. H. L., Theng, Y. L., & Foo, S. (2007, September). An analysis of services for the
mobile tourist. In Proceedings of the 4th international conference on mobile technology, applications, and
systems and the 1st international symposium on Computer human interaction in mobile technology (pp.
490-494).
 Valaei, N., &Jiroudi, S. (2016). Job satisfaction and job performance in the media industry: A synergistic
application of partial least squares path modelling. Asia Pacific Journal of Marketing and Logistics.
 Wang, B., Li, J., Sun, A., Wang, Y., & Wu, D. (2019). Residents’ green purchasing intentions in a
developing-country context: integrating PLS-SEM and MGA methods. Sustainability, 12(1), 30.
 Woodside, A. G. (2018). Consumer Behaviour in Tourism. The SAGE Handbook of Tourism
Management: Applications of Theories And Concepts to Tourism, 238.
 Woosnam, K. M., Draper, J., Jiang, J. K., Aleshinloye, K. D., &Erul, E. (2018). Applying self-perception
theory to explain residents' attitudes about tourism development through travel histories. Tourism
Management, 64, 357-368.
 Xiang, Z., & Gretzel, U. (2010). Role of social media in online travel information search. Tourism
Management, 31(2), 179–188. https://doi.org/10.1016/j.tourman.2009.02.016.
 Ye, L., & Robertson, T. M. (2012). Gender identity: Does it matter for consumers’ perceptions?. Journal of
business diversity, 12(3), 81-92.https://www.ibef.org/uploads/IBEF_Annual_Report_2019-20.pdf.

AUTHOR DETAILS:
1
SATADRUTI CHAKRABORTY AND 2DR. DIPA MITRA
1
Ph.D. Scholar, Indian Institute of Social Welfare & Business Management, Kolkata
2
Associate Professor & Coordinator, M. Phil & PhD. Programme, Indian Institute of Social Welfare & Business
Management, Kolkata

189
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

A REVIEW ON MACHINE LEARNING APPROACHES FOR NETWORK INTRUSION DETECTION


SYSTEM

SURUCHI GAUTAM, RAVINDER BAHL AND DR. RAMAN CHADHA

ABSTRACT
Rapid advancements in the internet and communication have resulted in a massive expansion of network size
and data. Extensive and global usage of the internetrenderscomputer networksproneto cyber-attacks. In this
scenario, it becomes imperative to develop techniques to identify these intrusions for the sake of data security
and integrity. Researchers have developed several Intrusion Detection techniques.Machine Learning algorithms
likethe Bayesian-based method, nature-inspired meta-heuristic methods, swarm intelligent approach, and
Markov neural net is some of the approaches employed to find the most effective characteristics and thus
improve the effectiveness of Intrusion Detection Systems. However, many new attacks are being developed,
making it difficult for network security to detect intrusions accurately. Furthermore, intruders with the intent of
launching various attacks within the network cannot be overlooked. An intrusion detection system (IDS) is a
tool that inspects network traffic to ensure its confidentiality, integrity, and availability and thus protects the
network from possible intrusions by generating alerts. Over the years, numerous databases have been used to
evaluate various projects. Despite the researchers' best efforts, IDS continues to face difficulties in improving
detection accuracy while lowering false alarm rates and detecting novel intrusions. Machine learning (ML) and
deep learning (DL)-based IDS systems have recently been deployed as potential solutions for quickly detecting
intrusions across the network. This article reviews notable ML and DL techniques used in designing network-
based IDS (NIDS) systems, comparing their strengths and limitations. The proposed methodology, evaluation
metrics, and dataset selection as well as recent trends and advancements in ML and DL-based NIDSare then
discussed. We have highlighted various research challenges and provided future scope for research in
improving ML and DL-based NIDS by taking the shortcomings of the proposed methods into account.
Keywords: Intrusion Detection, Malware detection, Machine learning, Supervised learning, Unsupervised
learning, Cyber-attacks, IDS.

I.INTRODUCTION
An intrusion Detection System (IDS) is a software system that is used to monitor network traffic for
malicious or suspicious activity. When any illegal or aberrant conduct is detected, the system issues alerts. An
alert is initiated in a system that is seen exhibiting unusual activity. Attackers make use of system flaws like
poor security measures and practices, or program defects like buffer overflow, to cause network breaches. The
intruders could be intending to seek more network access or could be black hat hackers accused of stealing data
from ordinary internet users [1].Approaches for identifying intrusion can be centered on identifying misuse or
on detecting anomalies. Misuse-based IDS tracks network traffic andcontrasts it to a database of pre-defined
malicious activity indicators.Attacks are discovered in the method of anomaly detection when they are matched
to activities that depart from typical user activities [2].
Network intrusion detection systems (NIDS)or Host intrusion detection systems (HIDS) are two kinds of IDS.
NIDS has two elements: one for network conversation tracking and the other for general monitoring. NIDS is
installed at a certain point within the network. This system examines traffic from all devices in the network. It
then matches the passing traffic to known attacks. If an attack is identified or any abnormal behaviour is
detected, an alert is sent to the network administrator. The benefit of NIDS is that it only takes a few people to
administer a wide network, and it is frequently camouflaged from various intruders. Thus, products are safe
against attack. Also, it can be set up on the subnet where firewalls are installed. This way, anyone trying to
breach the firewall can be immediately detected. The disadvantage of NIDS is that it makes it hard to identify
an attack during periods of high traffic.
To monitor and assess activity on a given machine, networkmanagers use the HIDS method [3]. HIDS run on
independent devices called hosts. They monitor the incoming and outgoing data packets from the device and
alert the administrator in case of any suspicious activity. When traveling over a system, HIDS offers the
advantage of allowing encrypted information to be collected. It can be employed on mission-critical machines
which run on a fixed layout. Since each host must configure and manage data, HIDS has the drawback of being
hard to maintain. Additionally, certain DOS assaults may be able to wipe out HIDS. A network-based
intelligently deployed software or HIIDS that tracks packets as they transit through the point is called a NIDS.
190
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Many IDS are based on outdated and ancient datasets such as KDD Cup 99, NSL KDD, and many others, which
lack the most recent and up-to-date attack tags. The existing efforts suffer from slow recognition rate. This
occurs as a result of the ability to remove all superfluous and irrelevant columns. High FPR, i.e., legitimate
traffic misidentified and categorized as an assault, reduces the ID’s effectiveness.
The restofthe paper is organized as follows: Section II contains the architecture of IDS. Section III contains an
overview of ML algorithms. Section IV consists of data reduction approaches utilized. Section V elucidates the
work in extant literature. Finally, Section VI concludes the study.
II. Architecture of Ids
In 1986, Dorothy E. Denning, working with the SRI International research group, built the first IDS. The
signature detection element of the double conceptual framework was characterized as containing an attack rule
base and an anomaly identification stage using a statistically based analysis to identify novel attacks. IDS
became an exciting topic of inquiry in the research community thereafter. Signature and anomaly IDS are the
two most popular detection methods.Signature-based IDS compare network traffic to specific patterns, like
number of 0’s or 1’s. It matches malware to previously known malicious instruction sequence. These detected
patterns are called signatures. While signature-based IDS easily detect known malicious patterns, detecting new
malicious attacks is quite difficult as their signature is not known.
Anomaly-based IDS were developed to detect unknown malicious attacks. This system employs a statistical
method to detect actions that differ from typical resource utilization and behavior characteristics. In anomaly-
based detection, the proportion of False Positiveand False Negativeremains high. Figure 1 shows the working of
these IDS.

Fig. 1. Signature and Anomaly IDS[4]


Anomaly-based detection procedures must be devised to identify irregular behaviors and achieve optimal
accuracy. ML approaches use complex equations. If enough training data is provided and well-trained methods
are built, an IDS may even be able to detect zero-day assaults. Cyber security managers could use these
strategies to enhance the security of the system.
III. Overview of Mlapproaches
Machine Learningis a part of Artificial Intelligence thatfocuses on using data to design algorithms that imitate
human learning patterns, gradually improving their accuracy. Thesealgorithms “learn” and develop quality
characteristics using some statistical methods and make classifications and predictions without being explicitly
programmed [2, 5]. This is done by utilizing prior experience or example information. The ML model is
centered on training sets to forecast distinct class labels in accordance with attributes. ML is usually classified
into three categories:

191
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig 2: Block Diagram of Intrusion Detection System[5]


1. Supervised Learning
Supervised learning makes use of labeled datasets which train algorithms to classify data and make accurate
predictions. The model adjusts its weights using the input data that is fed until the model fits appropriately.
Supervised learning is successfully employed in various real-world problems such as ham-spam classification of
mails in inbox, fake news detection, face detection, signature recognition, weather forecasting, stock price
prediction, etc. The input datasetconsists of samples of the input vector, with the corresponding desired output
vectors. Some of the methods used in supervised learning include linear regression, naïve bayes,
logistic regression, random forest, decision tree, support vector machine, neural networks, and many more [3].
2. Unsupervised Learning
Unsupervisedmachine learning uses algorithms to analyze and cluster datasets that have not been previously
labeled. These algorithms aim to discover hidden patterns or inherent groupings in data. This is often referred to
as self-teaching [1]. The ability to discover similarities and differences in information makes it the ideal solution
for clustering, image and pattern recognition, anomaly detection, data visualization, and dimensionality
reduction.Unsupervised methods include SOM, Apriori method, Éclat approach & outlier detection,
Hierarchical clustering, K-means clustering, FCM and others.
2. Reinforcement Learning
This technique is a behavioral ML model which is similar to supervised learning, with the exception that the
model does not use labeled data. Instead, the model is taught by trial-and-error method. The system makes a
series of decisions. Sequence of successful outcomes are used as reinforcement to develop the best solution for
a problem. Various RL techniques include DQN, Q-Learning, SARSA, and DDPG.
IV. Data Reduction Approaches Used in Ids
The enormous size and complexity of data increase the weight of ML and DM algorithms and degrades their
performance. The detection approaches take a long time to categorize assaults, making deployment in real-time
situations more problematic. This is due to the increasing numberof features in-network data that the Malware
Detection system must analyze. Many of these features may be noisy, less informative or redundant.The
quantity and quality of features is important for categorization, as they help us grasp their significance or
association [6]. Therefore, data reduction techniques need to be applied so that noisy and redundant features
may be eliminated, thus improving efficiency and accuracy of classification.Studies showed that using Feature
Extraction methods in IDS improves accuracy and reduces processing costs [8].Asa preprocessing stage,
dimensionality and feature reduction algorithms are utilized to enhance quality and reduce attack identification
time.
A. Feature Selection
Feature Selectiontechniquesselect relevant features according to some criteria. They are used to find a collection
of the attributes that could enhance the performance while generating minimal errors. One objective is to reduce
simulation response time and storage usage. FS approaches are used in IDS to increase attack detection
performance. PCA, IG, and GA are among the most used feature selection approaches [7]. Filter and Wrapper
are two types of feature selection algorithms that combine various FS methods.
 A classifier is used as a black box for analyzing optimal characteristics in the Wrapper approach. Because
of the computational price of developing the classifier, such methods obtain high speculation but may suffer
from excessive complexity.
 Filter approaches don't use classification to evaluate features and are reasonably resistant to overfitting, but
they do so by using autonomous estimating methods such as distance measurements, consistency measures,
and correlation measures.
192
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

A. Feature Extraction
Feature Extraction generates new feature sets based on original features using some techniques such as LDA,
PCA or SVD. Feature extraction is a method for lowering the dimensionality of datato enhance attack detection
accuracy and reduce the time spent on discovery.
C. Clustering
Clustering partitions data samples into different clusters, using some criteria, in such a way that data sets in one
cluster are similar while data sets in different clusters are dissimilar to one another.
V.LITERATURE SURVEY
An IDS is a traffic monitoring networksystem that tracks suspicious behavior and transmits alert notifications
when such behavior is observed. It is a software that investigates computernetworks for malicious activities
or policy violations. In this study, we present various Intrusion Detection techniques used in extant literature
for malware detection.
G. Yedukondalu et al. (2021) executed ML algorithms on the NSL KDD data set, comparing and evaluating
their results. In order to identify intrusion rates, the suggested app uses the SVM & ANN methods. Every
technique is utilized to calculate whether the information being sought is allowed or includes any irregularities.
While the IDS scans the information requested, if it detects any malicious material, the request is dropped.
These techniques used a feature selection method based on correlation and Chi-Squared to minimize the
collection by removing unnecessary data. The preprocessed database is instructed and evaluated with the
algorithms to produce notable findings, which improves predictive performance. The testing was performed
using the NSL KDD database.SVM technique achieved 48% accuracy, while the ANN method achieved 97%
accuracy. In this sample, the ANN performance was better than the SVM [8].
S. Gupta Et Al. (2016)A real-time method for hybrid IDS was proposed, in which signature-based
identification was used to identify well-known intrusions & anomaly detection was used to identify novel
threats. The assaults that eluded the signature-based method may be identified as an intrusion through the
anomaly identification method, resulting in a high proportion of detection value in this study. The system's
precision increased slightly every day until it reached a significant value of 92.65% on the last day of the test,
and the rate of false negatives decreased drastically as the method developed and trained the machine every day.
The problem of slow detection rate appeared when the model was adapted to a large data set, though [9].
W. C. Lin Et Al. (2015) Inboth the FFANN and PRANN were used to develop the ANN-based IDS, which
used scaled conjugate gradient & Bayesian regularization approaches. Particular result measures were utilized
to analyze the quality and competence of the proposed method. The two models have proved to outperform each
other in several output tests on distinct attack observations from the proven effectiveness. Consequently,
FFANN increased precision by 98.0742%. However, the dependability of the model should be enhanced by
testing the design on multiple databases[10].
V. Hajisalem Et Al. (2018)A single ML classifier was used to create an IDS. They used the NSL-KDD
database to test RF and DT methods. The random classifier outperforms the decision tree in accuracy and
produces superior outcomes. Both the detection rate and the FPR were not examined in the study [11].
K. Atefi Et Al. (2016) SVM, LR, RF, andDT classifiers are used to detect attacks. The model was assessed
using the NSL-KDD database. The IDS performs best using the RF classifier, according to the study. They also
discovered that the RF method had the quickest completion time. The study has the disadvantage of only being
able to examine one database efficiently [12].
Ankome Et Al. (2021)proposed for MANET a HCIDM. NS 2.35 was used to create HCIDM. 50 normal MN
and five black hole nodes traveled freely in a 4000 m square grid in the experiment. The authors place the black
hole on the shortest path between the source and DN. The HCIDM's productivity is assessed using measures
such as PDR, packet loss, and throughput. The system with HCIDM had average network congestion of 26.92,
but CCIDM had an average of 19.85, which could be due to HCIDM's maximum bandwidth.Throughout a
BHA, the average total performance of the system with HCIDM is 23.23 Mbps, a 94 percent increase [13].
Nie Et Al. (2021) GAN was used to create a new intrusion detection tool (Generative Adversarial Network).
For feature learning, the GAN-based technique may extract less-dimensional characteristics from actual system
flows. MATLAB was used to develop the suggested GAN-based system. The proposed approach was evaluated
using the CIC-DDoS2019 & CSE-CIC-IDS2018 databases. Their strategy can significantly enhance intrusion
detection accuracy based on the simulation results. The accuracy of both databases was 95.32% for the CSE-
CIC-IDS2018 dataset and 98.53% for the CIC-DDOS2019 dataset[14].

193
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Sankaranarayanan Etal., (2017) suggested Secure Intrusion Detection approach, which uses the RSA
approach. The simulation is run on Ubuntu and the Network Simulator NS2.34 environment. The findings
showed that in the existence of intruders, the suggested secure IDS approach provides a higher PDR. Even when
routing overhead is on the higher side, it is permissible When authors need to detect attackers[15].
Huang Et Al. (2017) presented a traffic pattern learning-based effectiveIDS for VSNs. A traffic model is
constructed in the suggested methodology to characterize the dynamic properties of network traffic in VSNs. To
assess the identified result of our IDS with the created traffic information, utilize Omnet++ to create a VSN
(Visual Sensor Network). The ideal feature set for traffic pattern learning could be retrieved using this
approach. Then, to understand traffic conditions and detect intrusions, an HSOM is utilized. In addition, an
active learning technique is created to speed up the HSOM's training process and better learn assault patterns.
The suggested approach has a high detection accuracy and good real-time efficiency [16].
VI.CONCLUSION
The development of Machine Learning introduces new techniques to Intrusion Detection Systems, with many
researchers and academicians proposing various methods for the construction of IDS. Considering the
expansion and massive use of internet, intrusion detection becomes crucial for information security. ML-based
apps have aided in the recognizing and spotting new assaults. In recent years, several classifiers, hybrid systems
and ensemble learning approacheshave dramatically enhanced the reliability of attack detection strategies.
However, there is still a problem with the proportion of False Positives and False Negatives. Developing
approaches with higher accuracy rate is the need of the hour.
REFERENCES
[1] P. Sangkatsanee, N. Wattanapongsakorn, and C. Charnsripinyo, “Practical real-time intrusion detection
using machine learning approaches,” Comput. Commun., Vol. 34, No. 18, pp. 2227–2235, 2011.
[2] P. Nader, P. Honeine, and P. Beauseroy, “Detection of cyberattacks in a water distribution system using
machine learning techniques”, 6th Int. Conf. Digit. Inf. Process. Commun. IC,2016.
[3] M. A. Jabbar, R. Aluvalu, and S. Sai Satyanarayana Reddy, "Cluster-based ensemble classification for
intrusion detection system," ACM Int. Conf. Proceeding Ser., vol. Part F1283, pp. 253–257, 2017.
[4] D.E. Denning, “An intrusion-detection model," IEEE Symposium on Security and Privacy, pp. 118–131,
1986.
[5] P. Verma, S. Anwar, S. Khan, and S. B. Mane, “Network Intrusion Detection Using Clustering and
Gradient Boosting," 9th Int. Conf. Comput. Commun. Netw. Technol. ICCCNT, pp. 1–7, 2018.
[6] S. Saha, A. S. Sairam, A. Yadav, and A., “Genetic algorithm combined with support vector machine for
building an intrusion detection system,” in Proceedings of the International Conference on Advances in
Computing, Communications and Informatics, ACM, pp. 566–572, 2012.
[7] J. R. Vergara and P. A. Estevez, “A review of feature selection methods based on mutual information,”
Neural Computing and Applications, Vol. 24, No. 1, pp. 175–186, 2014.
[8] G. Yedukondalu, G. Hima Bindu, J. Pavan, G. Venkatesh, A. SaiTeja, “Intrusion Detection System
Framework Using Machine Learning”, Third International Conference on Inventive Research in
Computing Applications (ICIRCA),2021.
[9] S. Gupta, “Analyzing the machine learning algorithms- naïve bayes, random tree, and support vector
machines SVM using the kdd99 data set to predict and classify the”, No. 2, pp. 452– 459, 2016.
[10] W. C. Lin, S. W. Ke, and C. F. Tsai, “CANN: An intrusion detection system based on combining cluster
centers and nearest neighbors," Knowledge-Based Syst., Vol. 78, No. 1, pp. 13–21, 2015.
[11] V. Hajisalem and S. Babaie,, “A hybrid intrusion detection system based on ABC-AFS algorithm for
misuse and anomaly detection,” Comput. Networks, Vol. 136, pp. 37–50, 2018.
[12] K. Atefi, S. Yahya, A. Rezaei, and S. H. B. M. Hashim, “Anomaly detection based on profile signature in
network using machine learning technique," Proc. - 2016 IEEE Reg. 10 Symp. TENSYMP 2016, pp. 71–
76, 2016.

194
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[13] Ankome, T., &LusilaoZodi, G.-A., "Hierarchical Cooperative Intrusion Detection Method for MANETs
(HCIDM)," 15th International Conference on Ubiquitous Information Management and Communication
(IMCOM),2021.
[14] Nie, L., Wu, Y., Wang, X., Guo, L., Wang, G., Gao, X., & Li, S., “Intrusion Detection for Secure Social
Internet of Things Based on Collaborative Edge Computing: A Generative Adversarial Network-Based
Approach”, IEEE Transactions on Computational Social Systems, pp. 1–12,2021.
[15] Sankaranarayanan, S., &Murugaboopathi, G., “Secure Intrusion Detection System in Mobile Ad
HocNetworks Using RSA Algorithm”, Second International Conference on Recent Trends and
Challenges in Computational Models (ICRTCCM),2017.
[16] Huang, K., Zhang, Q., Zhou, C., Xiong, N., & Qin, Y., "An Efficient Intrusion Detection Approach for
Visual Sensor Networks Based on Traffic Pattern Learning," IEEE Transactions on Systems, Man, and
Cybernetics: Systems, Vol. 47, No. 10, pp. 2704–2713,2017.

AUTHOR DETAILS:
1
SURUCHI GAUTAM, 2RAVINDER BAHL AND 3DR. RAMAN CHADHA
1
Associate Professor, Computer Science Department, Rajdhani College, University of Delhi
2
Assistant Professor and 3Professor, CSE, UIE, Chandigarh University, Punjab

195
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

IN VITRO ANALYSIS OF ANTIMICROBIAL ACTIVITY OF SOME INDIAN MEDICINAL PLANTS

VED RAM SHARMA, MOHSIN HASAN KHAN AND SWAPANIL YADAV

ABSTRACT
Herbal treatments can be created from the entire plant or from the leaves, roots, bark, seed, and flowers in
particular. These plants' therapeutic efficacy stems from their bioactive phytochemical contents, which have a
unique physiological effect on the human body. Among the most important bioactive phytochemical constituents
include alkaloids, essential oils, flavonoids, tannins, terpenoids, saponins, phenolic compounds, and many
others. Plant-based remedies have been used to cure a wide range of ailments for as long as human civilization
has existed, and they have been used in all communities at all times. A well-defined herbal pharmacopoeia was
developed by tribal people. In present work plant extract of five medicinal plants were tested against pathogenic
bacteria- P. aeruginosa. Results showed that methanolic extract of clove has the largest inhibitory zone
followed by garlic, guava, black pepper, and cinnamon.
Keywords: Antimicrobial activity, agar well diffusion, clove, methanolic extract, phytochemicals.

INTRODUCTION
Medicinal plants possess immunomodulatory and antioxidant properties, leading to antibacterial activities. They
are known to have versatile immunomodulatory activity by stimulating both non-specific and specific immunity
(Pandey and Chowdhry, 2006). The use of plant extracts and phytochemicals, both with known antimicrobial
properties, can be of great significance in therapeutic treatments. In the last few years, a number of studies have
been conducted in different countries to prove such efficiency. Many plants have been used because of their
antimicrobial traits, which are due to compounds synthesized in the secondary metabolism of the plant
(Nascimento et al., 2000). The plant products are widely known as source for safe antimicrobial agents and used
traditionally for the treatment of various infectious diseases (Lai and Roy, 2004). These microbial inhibitory
activities of plants are attributed due to the presence of various phytocompounds such as phenols, tannins,
terpenoids, alkaloids and flavonoids (Harborne, 1984). The Indian sub-continent is well known for diversity of
plants and herbs of medicinal importance to cure and sustain good health in human beings (Kala et. al., 2006).
As a healthcare formulation, natural resources are in practice since ancient times. Phytocomponds are well
known for their role in traditional as well as modern treatment system. It is already known that microorganisms
play key role for various epidemic diseases such as skin, gastrointestinal, inflammation and immune-deficiency
reported worldwide in human population. However, the resistance of microbial population from drugs is a
dangerously ever more problem to all over the world. So, to overcome the microbial resistant problem new
investigations are to be done. Screening of new antibiotics from plants for novel antimicrobial agents will gain
much attention. Actually, it was known that natural products are of low cost. The natural products are well and
easy remedy to cure the disorders without side effects. Cinnamon, Clove, Garlic, Guava, Black pepper and
various other higher plants have also been reported for the presence of antimicrobial compounds. Due to
emergence of drug resistant strains of pathogenic bacteria, it has become important to investigate sources of
novel anti-microbials agents as plants as they may inhibit bacteria by a mechanism different than that of
currently used antibiotics (Fuller, 1989).
MATERIALS AND METHODS
Reagents: Dimethyl sulfoxide (DMSO), Peptone, Agar powder, Beef Extract, yeast extract, Sodium chloride,
Rifampicin, iodonitrotetrazoleum chloride (INT dye), Mcfarland solution etc.
Preparation of Extracts: Using several solvent systems and a Soxhlet apparatus, extracts were made from all
of the samples Cinnamon, Clove, Garlic, Guava, and Black pepper. The extract stock was made in 5 percent
DMSO at a concentration of 50 mg/ml, and the working solution was prepared according to the test.
Procurement of Bacterial Strains: To examine the antibacterial efficacy of solvent extracts bacterial strain
was purchased from National Chemical laboratory (NCL), Pune.
Sub-Culturing and Maintenance of Culture: All medium pouring and inoculation procedures were carried
out in an aseptic environment with laminar air flow. Purchased bacterial cultures were slant cultured and kept at
-4oC for future use. This sub-culturing was done every 30 days on a regular basis. A nutrient broth medium was

196
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

prepared for the experiment, and inoculums were transferred to it. This infected medium was then incubated at
37°C for another 24 hours.
Preparation of Bacterial Media: The microbiological media was made according to HI-MEDIA Labs. Pvt. Ltd.
Mumbai's standard specifications. For well diffusion antibacterial activity, nutritional agar media (NAM) was
utilised, while nutrient broth medium was used for bacterial inoculation. They were prepped and sterilised in an
autoclave at 121°C and 15 pressure for 15-30 minutes. In table 1.1, the content of Nutrient agar media is listed.
Similarly, nutrient broth medium was made and autoclaved (freshly). All of the ingredients were included in the
broth except agar, which is a hardening agent used in nutritious agar medium. The ingredients needed to make
nutritional broth are mentioned in table 1.2
Table 1.1: Contents of Nutrient Agar Media
Name of Contents Quantity in Grams For One Liter Media
Peptone 5 gm
Agar Powder 20 gm
Beef Extract 1.5 gm
Yeast Extract 1.5 gm
Sodium Chloride 5 gm
pH 7.4± 0.2
Table 1.2: Contents of Nutrient Broth Medium
Name of Contents Quantity in Grams For One Liter Media
Peptone 5 gm
Beef Extract 1.5 gm
Yeast Extract 1.5 gm
Sodium Chloride 5 gm
pH 7.4 ± 0.2
Anti-Bacterial Assay: The anti-bacterial sensitivity of all samples against test bacteria was carried out by
following methods: Using the well diffusion method, the antibacterial potential of all test materials was
determined (Israr et. al. 2012). The stock for the test sample of extracts for antibacterial activity was made by
dissolving 50 mg extracts in 1 ml 5% DMSO (Dimethyl sulfoxide). Stock extract was diluted to the test
concentrations of 5, 10, and 20 mg/ml for the test. As a result, doses of 0.25, 0.5, and 1.0 mg/well were
determined based on test concentration. During the test, a negative control of 5% DMSO was employed,
whereas a positive control of Rifampicin (0.1 mg/well) was used. Microbial broth cultures that have been
freshly prepared Pseudomonas aeruginosa was standardised using the Mcfarland 0.5 standard solution (1x108
cfu/ml) and 0.1 ml culture broth was spread separately over the Nutrient agar media using an L-shaped sterilised
spreader. A cork borer with an 8 mm diameter was used to create the wells. About 50 l of each extract was put
into these wells independently. After loading the extracts, the test plates were kept at 37°C for another 24 hours.
In the wells for the negative and positive controls, 50 l DMSO and Rifampicin were added. The clear zone of
inhibition was evaluated after incubation.
RESULTS AND DISCUSSION
The antibacterial activity of chloroform, methanol, and aqueous extracts of all plant materials against P.
aeruginosa is given in Table 1.3 The results clearly showed that at maximal concentration (1.0 mg/well),
methanolic extract clove has the largest inhibitory zone (2.60±0.35 cm), followed by garlic, guava, black
pepper, and cinnamon. Other solvent extracts of all the samples revealed moderate to considerable inhibition by
chloroform and aqueous extracts, according to the findings (Fig. 1.1). At a dosage of 10 g/well dose, the
positive control Rifampicin showed a 2.8±0.27 cm inhibitory zone against P. aeruginosa.
Table 1.3: Antibacterial activity against P. aeruginosa
Test Samples Extract Zone of inhibition in cm against P.
aeruginosa [Concentration mg/well]
Concentration mg/well 0.25 0.50 1.0
Chloroform 0.8±0.22 1.55±0.21 2.0±0.34
Cinnamon Methanol 1.06±0.20 1.32±0.17 2.15±0.22
Aqueous 0.6±0.18 0.9±0.18 1.0±0.20
Chloroform 1.22±0.22 1.95±0.45 2.5±0.50**
Clove Methanol 1.32±0.26 1.75±0.20 2.60±0.35***
197
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Aqueous 1.0±0.30 1.14±0.25 1.6±0.32**


Chloroform 1.0±0.36 1.65±0.33 2.20±0.48
Garlic Methanol 1.15±0.22 1.51±0.32 2.35±0.44
Aqueous 0.8±0.26 1.05±0.20 1.2±0.31
Chloroform 1.0±0.30 1.62±0.28 2.05±0.35
Guava Methanol 1.12±0.38 1.36±0.22 2.20±0.19
Aqueous 0.9±0.15 1.0±0.16 1.02±0.25
Black Pepper Chloroform 0.7±0.18 1.50±0.18 1.9±0.28
Methanol 1.0±0.16 1.35±0.24 2.15±0.33
Aqueous 0.5±0.14 0.8±0.20 1.2±0.24
Standard Rifampicin at 10 µg/well 2.8±0.27

(Rifampicin used as positive control (+ve), DMSO used as a negative control (–ve)
Figure 1.1: Anti-bacterial activity of selected samples against P. aeruginosa
The observation of present chapter concluded that all the sample extracts showed potential anti-bacterial
properties for both Gram positive bacteria and Gram negative bacteria. It was noted here that, among all extracts
methanol extract of Clove showed maximum inhibition against all the bacterial strains. However, in some
results garlic methanolic extract significantly inhibit the bacterial growth in MIC and well diffusion methods.
On the basis of present results further research was structured to identify most potent bioactive compound. The
natural and plant derived drugs and compounds are widely used as source for safe anti-bacterial agents and used
traditionally (Lai and Roy, 2004). These anti-microbial inhibitions by plants are due to the presence of various
active bio-compounds such as phenols, tannins, terpenoids, alkaloids and flavonoids (Harborne, 1984).
REFERENCES
1. Fuller R. (1989). Probiotics in man and animals. Experientia 35, 406–407.
198
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

2. Harborne, J.B. (1984) Phytochemical Methods. 2nd Edition, Chapman and Hall, New York.
http://dx.doi.org/10.1007/978-94-009-5570-7.
3. Kala CP, Farooquee NA, Dhar U. (2006) Prioritization of medicinal plants on the basis of available
knowledge, existing practices and use value status in Uttaranchal, India. J Biodiver and Conserv. 13:453–
469.
4. Lai P.K., Roy J. (2004) Antimicrobial and chemopreventive properties of herbs and spices. Curr. Med.
Chem. 11:1451–1460. doi: 10.2174/0929867043365107.
5. Nascimento, S.C.; Chiappeta, A.; Lima, R.M.O.C. (2000) Antimicrobial and cytotoxic activities in plants
from Pernambuco, Brazil. Fitoterapia 61, 353-355.
6. Pandey AK, Chowdhry PK. (2006) Propagation techniques and harvesting time on productivity and root
quality of Withania somnifera. J Trop Med Plant. 7:79–81.

AUTHOR DETAILS:
1
VED RAM SHARMA, MOHSIN HASAN KHAN2 AND SWAPANIL YADAV3
1,2
Department of Chemistry, Gandhi Faiz-E-Aam College, Shahjahanpur
3
Department of Biotechnology, Gandhi Faiz-E-Aam College, Shahjahanpur, (Affiliated to MJP Rohilkhand
University, Bareilly, Uttar Pradesh, India)

199
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

FABRICATION OF A TEST RIG FOR EXPERIMENTAL STUDIES ON MISALIGNMENT EFFECT


BETWEEN ROTORS CONNECTED THROUGH FLEXIBLE COUPLING BY TORQUE AND
VIBRATION MEASUREMENTS

MILI HOTA AND V.D.DHIMAN

ABSTRACT
The drive and load are typically connected by mechanical couplings in machines. Shaft misalignment, which
may result from improper machine assembly, thermal deformation, and load asymmetries, is a frequent failure
that follows load unbalance in rotating machines. Care must be taken during assembly to maintain it within a
reasonable range. Because of the asymmetry in loads, thermal distortion, unequal foundation settlement, and
various other static loading, the alignment state of the machines varies.It causes the coupling to create reactive
forces that eventually lead to failure. It is also frequently a major cause of vibration and lowers the efficiency of
spinning machinery. A thorough analysis of the vibration characteristics on misalignments will be useful during
the diagnostic process.To study the misaligned rotors dynamics, a set-up is modelled and fabricated with
flexible coupling. The flexible couplings used in the automations like NC/CNC machines are selected for
extreme misalignment in the perpendicular planes.The couplings are tested under the extreme condition for
each angular misalignment fault, parallel misalignment and both combined making complex fault in the set up.
The novelty of the present study is to focus on measurement of torque variation along with vibration response.
The extreme condition of the misalignment is compared using Rotary torque sensor (0-100 N-m) and Triaxial
Accelerometer (0-20 G). Finally the results are compared for all the three conditions of misalignment. Also the
theoretical torque variation is compare to the experimental variation of torque transmission during combined
misalignment.
Keywords: Rotary torque sensor, Triaxial Accelerometer, Misalignment, flexible couplings.

1INTRODUCTION
When assembling a machine, the rotating centres of two shafts should be positioned so that they are collinear
under normal working conditions. This is known as shaft alignment. The precise alignment of the machine
bearings and shaft centres is described by the Total Indicator Reading (TIR) of coupling hubs or shafts.
Harmonic forces are generated when the shafts are not aligned. High levels of stress are generated by these
forces in both the stationary and spinning machine elements. The severe shaft misalignment scenarios apply
bending force to the shaft, resulting in catastrophic failures in the machineries.
As per “S.R. Bognatz.[1]” and “Gibbons.[2]”, about 70% rotating machine vibration issues are caused by
misalignment. When the distance between the shaft rotational centres is measured on the power transmission
plane, it is referred to as parallel misalignment (PM), which is also referred to as offset misalignment. Typically,
the coupling centre is used to measure it.
The angularity may be expressed in terms of slope or angle in degree. The angle is represented most popularly
in regards to gap per diameter. The gap is calculated by dividing gap by the diameter that is termed as coupling
or working diameter. The relationship among gap and diameter is important.
According to "Robert X. Perez.[3]," vibration is the main sign of any alignment issue. The best indicators of
alignment issues are high axial vibration levels (VL) at the machine's thrust end and high radial vibration levels
(VL) at the machine's coupling end. Typically, vibration-related alignments develop at the 1X or 2X frequency.
“A design aimed at the flexible coupling-rotor-ball bearing system was modelled by Lee [4]. Anisotropies in
bearing stiffness had been proposed as a sign of orbital analysis misalignment. Redmond and Al-Hussain [5]
created a flexible connection in a pinned joint with rotational stiffness and radial firmness.
“Lee et al. [6] analyzed the rotors connected with rigid coupling. The connecting bolts’ kinematics had been
presented instinctively for PM.”.”Redmond and Al-Hussain. [7] stated coupled lateral-torsional 1X vibration
aimed at PM.”
T.H. Patel, A.K. Darpe, [9], [10] discovered the whole spectrum analysis.”Work of “Lee et al. [7] was relevant
in this concern. The major axis inclination of the 2X filtered orbit in the direction of the misalignment had been
suggested for the misalignment's diagnosis. It implies that there is still some ambiguity surrounding the specific

200
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

vibration response intended to correct misalignment. When determining misalignment among the various
vibration symptoms described by various studies, a strong 2X harmonic is anticipated.
The existing literature are either related to theoretical analysis or experimental investigation related to rigid
coupling.The present work focuses on flexible coupling which are the integral part of the highly precise
automated machines like CNC machines, automated storage and retrieval systems (ASRS) systems, majority of
robotic joints, part of automated material handling systems. Attempt is made to carry out experimental
investigation on a setup designed such that to accommodate all the three types of misalignment. The special test
rig that permits the study of misalignment by the measurement of vibration response for all the three kinds of
misalignment (parallel, angular and combined) is presented here. By inducing different amount of misalignment
in the vertical and horizontal plane, the combination of Angular misalignment along with Parallel Misalignment
has been explored.The present study aims to measure the dynamic torque transmission in healthy and faulty
condition using Rotary torque sensor.The study also simultaneously measures vibration levels in all the three
directions (horizontal radial, vertical radial and axial directions).The measurements are done for the extreme
conditions on the selected coupling. The system is tested and conclusion is attempted towards understanding the
harmonics involved due to high speed and extreme misalignment. At the end the torque variation for the various
complex misalignments are bean compared with the theoretical model.
The major gap to be fulfilled by the experimentation is to studies the effect of misalignment on flexible
coupling. The flexible coupling used here are very precise and used in highly precision machines like CNC
machines. Misalignment of shafts causes higher vibrations in the course of work of a large industrial rotating
units that, in its turn, can result in untimely wear of bearings, loosening of different fasteners and breakdown of
the whole installation.
The conclusion is attempted that there are possibility of higher torque requirement with the increase in the
amount of misalignment between the shafts and rise in RPM.Not only the rise in RPM but also the type of
misalignment also studied:
1. Angular misalignment is in horizontal plane.
2. Parallel misalignment is in the vertical plane.
3. A combination of misalignment is also done by angular in the horizontal plane and parallel in the vertical
plane.
2The Test Rig
The tremendous expansion of Turbo Generator (TG) units led to the widespread adoption of machines with
flexible rotors. Machines made of lightweight steel are becoming more popular than ones made of heavy
concrete. The steel foundations are prone to low tuning, which means that their critical speed will be several NF
below the machine's operational speed. By joining together more than two shafts, it is possible to produce a
statically indeterminate rotor bearing system that is compatible with three or more bearings. The bearing
response forces are responsive to both angular and parallel misalignment. To verify these theoretical
predictions, a specialized misalignment rig is being modelled and commissioned.
This test rig can introduce a wide range of lateral alignment along with angular variations, and coupled with its
key characteristics, it can forecast the natural frequency (NF) of vibration in all three directions. The entire
structure is meticulously constructed out of several pieces, including the shaft, rotor, and base plates (BP).
2.1 Descriptionof the Set Up
The testing rig set-up comprises ofcoupled rotor set-up having two rotors both connected through flexible
couplingas depicted in Fig 1. It encompasses vibration-measuring instruments, driving unit, and base plates. The
rotor’s specification and dimensions are mentioned in Table 1. The shaft one which is coupled to the motor,
here is replace by the torque sensor in the later stage.

201
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig.1. The solid model of experimental Set-up


Table 1: Rotor-Bearing-Pedestal Specifications
Shaft length no1,2 600 mm,135mm
Shaft major diameter 15 mm
No. of shafts 2
Shaft material 4137 Alloy Steel
Mass of each shaft 689.10 grams
No. of discs 3
Diameter of each disc 100 mm
Mass of each disc 523.66 grams
Rotor speed 3000 rpm
Bearing diameter 25 mm
Bearing length 9 mm
Length between the bearing pedestals 426 mm
Coupling max diameter 32 mm
Coupling length 41 mm
The secondary base plate's degree of misalignment determines the coupling properties. Further, the coupling
bounds are used to determine the misalignment's inclusion range.
The coupler has the following tolerances:
Lateral dx=1mm(0.5) (Axial Misalignment)
Vertical difference = 0.3 mm (Lateral Misalignment)
Angle = 3.5 degrees (Angular Misalignment)

Fig.2. Selected elastomer type coupling for the experimentation.

202
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The connection is chosen based on the desired offset and angular misalignment ranges in the perpendicular
planes. By correctly rotating the pedestal, the shaft's axis for angular misalignment (AM) is inclined in reference
to the other shaft in the vertical plane. But the offset can be reduced by inserting slip gauges as shown in Fig.3,
filler gauges, or pre-machined shims of a specific thickness between the stoppers attached to the base plates in
both the horizontal and vertical directions.

Fig.3. Inducing misalignment by displacing the secondary base plate


2.2 Caution While Fabricating
All key components of the test equipment are built using high-precision CNC machines in accordance with
VDI/DGQ 3441.Every plate (i.e., the main and secondary BP) as well as spacers are machined and earthed to
achieve flatness and parallelism within 0.02 mm. Positioning Uncertainty (P): 0.01mm. Repeatability (Ps
medium): 0.005mm.
Hardened ground dowel pins and liner bush are used to guarantee test reproducibility. The elements are selected
from the standard catalogue and assembled and examined at the standard metrology lab.
3 Experimentation
Hota, M., Dhiman, V.D.[16], describes the pilot experimentation with the help of hand handled FFT analyzer
with dual channel [VibrasoundProcessor: IMVA-440™].By inducing different amount of misalignment in the
vertical and horizontal plane, the combination of AM along with PM has been explored. The study supports in
the evaluation that merely a strong 2X frequency vibration do not conclude misalignment; and it provides a
well-defined diagnosis technique. The study scrutinizes in which the direction (Radial or Axial) there is high
frequency due to the specific type of misalignment.
Following the same steps of experimentation as, Hota, M., Dhiman, V.D.[16], the selected instrumentation are
tested for the sensitivity analysis.
3.1 Selection of Instrumentation for Data Acquisition:
The main objective is to find the effect of torque and vibration due to misalignment.Further recording the
increase in the amount of torque required by the set up with increase in the amount of misalignment and
speed.A very sensitive Rotary torque sensor is used and mounted long the rotating axis of the motor and
shaft.The objective of this experiment is to mainly check the sensitivity of the sensors procured and its
compatibility with the test rig. The Fig.4. shows the finalized data acquisition system.

203
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig.4. Data acquisition system.

Fig.5. The test rig setting along with the Rotary Torque Sensor (0-100 N-m)and TriaxialAccelerometer (0-20
G).
3.2 Preparation for the Experimentation
The set up mounting was done on vibration absorbing rubber pads. These rubber pads are mounted such that
there is minimum vibration in the completely aligned condition.The torque sensor assembly is done in a very
preventive manner as the rotary torque sensors are sensitive to the pre-torque due to assembly.During the
assembly of torque sensor there were difficulties in making the torque completely zero.The triaxial
accelerometer is also configured with the test rig and the data logger.Programmable frequency drive was
programmed and connected to the motor to control the frequency.
Continuous data logging with a time step of 1 sec is recorded as shown in Fig.6. The data logger channel no 8 is
used for the recording of torque variation.The channel no. 5, 6, 7 for the three axis of acceleration recording.The
triaxial accelerometer is used alternatively on each bearing two bearing of the misaligned rotors. The
characteristics of flexible coupling is to absorb much of vibration, stillthe base is taken in the completely
aligned condition and the further recording is done.

204
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig.5. Data logging from the sensors at a time step of 1 sec.


3.3 Run-Up and Run-Down Analysis:
The test rig is made completely aligned as per Piotrowski in Shaft Alignment Handbook [5] using dial indicator
method about the coupling halves. The shafts and motor are arranged within acceptable alignment tolerances. In
this completely aligned condition the vibration in all the three axis and torque variation with speed is recorded
on all the three bearings. The aligned condition is firstly tested with programmed frequency drive for a run-up
and run down of speed from 500 to 2800 RPM. The shaft, couplings are checked for any permanent
deformation during this test.
The Fi.g.6. shows the graphs almost reflecting mirroring of the recording for the speed variation of 500 to 2800
RPM and 2800 to 500 RPM. These readings are recorded in the completely aligned condition of the test rig.
During the same time a laser RPM sensor is also used for confirming the RPM of the rotating shaft with the
programmable frequency drive. The bellow graphs shows variation of RPM, Torque transmitted by the motor,
V1-Vibration level in radial vertical direction (mm/sec2),V2-Vibration level in radial transverse direction
(mm/sec2),V3-Vibration level in axial direction.

Fig.6. The Run-up and Run-down graphs at Bearing.1,2,3 for (RPM,Torque,V1,V2,V3)

205
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Taking the base values of the torque and acceleration in all three direction the further misalignment with the
same method as it was carried out in the pilot experimentation.The self-aligning characteristics of the test rig
and the design of the test rig is help full in the process aligning and misaligning of the setup from the base. The
design of the set up and also the sturdy base of the set up induces minimum vibration.The preliminary
measurements of the torque and acceleration is done to check the sensitivity of the sensors.The angular
misalignment induced at 2,3,4 degrees ,are induced in the horizontal plane to check the sensitivity.The Fig. 7
shows, recorded mean values for 10 secs are been plotted.

Fig.7. RPM,Torque,V1,V2,V3 readings for 2,3,4 degrees angular misalignment.


The parallel misalignment is created by inserting pre machined sim between the secondary and primary base
plate in the vertical direction.The vertical movement of the base plate is achieved from the vertical jacking bolt
provided at extreme end of the plate for angular misalignment. The 3.5 mm vertical off setting of the axis is
achieved and the readings are recorded to check the sensitivity of the sensors for the vertical misalignment.The
recorded mean values for 10 secs are been plotted.
206
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig.7. RPM,Torque,V1,V2,V3 readings for 3.5 mm parallel misalignment(vertical direction)


3.4 Comparison Between Extreme Degree Angular And Parallelmisalignment.
The test rig is induced with the extreme fault in both the angular and parallel misalignment. The mean peak
values are compared. The recorded mean variation shows clearly that the parallel misalignment in the vertical
direction shows more effect on the coupling.
Table.2. Comparison Between 4 Degree Angular and 3.5 Mm Parallel Recording At Bearing 2 And 3.
BEARING 2 4DEGREES BEARING 2 3.5MM
RPM 500 700 1400 2100 2800 500 700 1400 2100 2800
V1-radial vertical
direction(mm/s2) 98.1 98.1 98.1 98.1 196 196.2 294.3 196.2 294.3 686.7
V2-radial transvers
direction(mm/s2) 0 0 0 0 0 0 0 98.1 196.2 1570
V3-Axial direction
(mm/s2)) 0 0 0 0 0 0 0 490.5 1570 2280
Torque(Nmm) 280 280 280 280 570 1420 1420 1710 1420 2280
BEARING 3 4DEGREES BEARING 3 3.5MM
RPM 500 700 1400 2100 2800 500 700 1400 2100 2800
V1-radial vertical
direction(mm/s2) 196 196 196 196 196 98.1 196.2 98.1 294.3 392.4
V2-radial transvers
direction(mm/s2) 0 0 98.1 98.1 98.1 0 0 98.1 196.2 882.9
V3-Axial direction
(mm/s2)) 98.1 98.1 196 196 196 0 0 294.3 3139 588.6
Torque(Nmm) 280 280 280 280 570 2850 2850 2570 2280 1990
Combined Misalignment 2 Degrees (Horizontal Plane) and 2mm(Parallel Plane)
The test rig is now exposed to complex misalignment in both the plane horizontally at 2 degrees and vertically
2mm. The variations are recorded and plotted as under.

207
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig.8. RPM,Torque,V1,V2,V3 readings for 2 degrees(horizontal plane) and 2mm(parallel Plane)


4 OBSERVATIONS:
The Shaft type Rotary Torque Transducer operating based on the principal of strain gauge, measures RPM and
torque of continuous rotating object. The torque sensor was found to be very sensitive during the
experimentation. It had residual torque after every run so to overcome this limitation the manual freeing of the
torque was required at the first half of the coupling. Any change in the assembly lead to induction of extra
torque. The care was taken to make the torque reading zero at the begging of each run. The continuous logging
of torque data was taken from channel no 8.
4.1 Observations on Torque from the Set of Experiments
 The torque variation is low when the setup is only misaligned in the angular way with reference to the
coupling.
 The higher torque value can be seen only during the parallel misalignment and combined misalignment.
 The flexible coupling allows a greater range of misalignment but the coupling spider fails at extreme
conditions due to heat generate at very high speed.
4.2 Observations on Vibration Level from the Set of Experiments
 This piezoelectric accelerometer may be treated as a charge source. Its sensitivity is expressed in terms of
charge per unit acceleration (pC/g).
 The triaxial accelerometer is mounted on the bearing housing of each bearing for a time step of 10 sec.
 The data logging is continuous on channel no 5,6,7 of the data logger.
 The variation in the acceleration is also seen high during parallel and combined misalignment.
 The variation in the axial direction is seen amplifying in the condition of parallel misalignment.
4. CONCLUTIONS
Measurement of torque along with vibration in the dynamic condition is the a more effective way of detecting
misalignment and from the above experiment it is clear that the rotary torque sensor is more sensitive when the
axis of shaft is misaligned in the vertical plane with offset or parallel misalignment. The above study can be
used for monitoring of precision mechanical machines where highly flexible coupling are used for proper self-
alignment of the rotors. The present study proposes a method for misalignment detection through simultaneous
measurement of torque transmission from the motor shat to load shaft and the bearing vibrations in all the three
directions. Thus it can be helpful for distinguishing the type of misalignment and the severity of the defect
existing at a high speed. The present study can be an alternative to expensive signal processing methodologies.
REFERENCES
1. Bognatz S.R. 1995. Alignment of critical and non-critical machines. Orbit 23Ȃ25.
2. Gibbons C.B. 1976. Coupling misalignment forces. Proceedings of the 5th Turbo Machinery Symposium,
Gas Turbine Laboratory, Texas A & M University, pp. 111Ȃ116.
3. Piotrowski J. 1995. Shaft Alignment Handbook. Marcel Dekker Inc., New York,

208
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

4. Lee Y.S., Lee C.W. 1999. Modelling and analysis of misaligned rotor ball bearing systems. Journal of
Sound and Vibration 224 17Ȃ32.
5. K.M. AL-HUSSAIN,I. REDMOND January 2002 Dynamic response of two rotors connected by rigid
mechanical coupling with parallel misalignment. Journal of Sound and Vibration 249(3):483-498.
6. Lees A. W. 2007. Misalignment in rigidly coupled rotor. Journal of Sound and Vibration 305 261Ȃ271.
7. Piotrowski J. 1995. Shaft Alignment Handbook. Marcel Dekker Inc., New York,
8. Rao S. Singiresu. 2004. Mechanical Vibrations. University of Miami USA. Pearson Education, Inc. Fourth
Edition. International Edition.
9. Wu Fengqi, GuangMeng, November 2006, Compound rub malfunctions feature extraction based on full-
spectrum cascade analysis and SVM, Mechanical Systems and Signal Processing 20(8):2007-2021.
10. Tejas H. Patel and Ashish K. Darpe, Experimental investigations on vibration response of misaligned rotors,
Mechanical Systems and Signal, doi:10.1016/j.ymssp.2009.04.004.
11. Sekhar A.S., Prabhu B.S. 1995. Effects of coupling misalignment on vibration of rotating machines. Journal
of Sound and Vibration 185, 655Ȃ671.
12. Vance JM. 1988. Rotor dynamics of Turbomachinery. New York, John Wiley & Sons.
13. Xu M., R. Marangoni RD. 1994a. Vibration analysis of a motor-flexible coupling-rotor system subjected to
misalignment and unbalance Part I: Theoretical model and analysis. Journal of Sound and Vibration,
176(5), 663Ȃ 679.
14. Deepak P. Hujarea , Madhuri G. Karnik .2018,Vibration responses of parallel misalignment in Al shaft rotor
bearing system with rigid coupling Materials Today: Proceedings 5 ,23863–23871
15. Lal M and Tiwari R 2018 Experimental identification of shaft misalignment in a turbo-generator
system. Sadhana (Acad. Proc. Eng. Sci.) 43: 80
16. Hota, M., Dhiman, V.D. (2022). Design and Manufacturing of a Test Rig for Experimental Studies on
Misalignment Effect Between Rotors. In: Dave, H.K., Dixit, U.S., Nedelcu, D. (eds) Recent Advances in
Manufacturing Processes and Systems. Lecture Notes in Mechanical Engineering. Springer,
Singapore. https://doi.org/10.1007/978-981-16-7787-8_19

AUTHOR DETAILS:
1
MILI HOTA AND 2V.D.DHIMAN
1
Research scholar, Gujarat Technological University, Ahmedabad, Gujarat- 382424, India
2
Professor, Mechanical Engineering Department, Government Engineering College, Valsad

209
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

INTEGRATED WATER RESOURCES MANAGEMENT FOR AYODHYA (FUTURISTIC


APPROACH)

ARUN KUMAR YADAV, RAJIV BANARJEE, MD. SAJID AND DR. SYED AQEEL AHMAD

ABSTRACT
Water strategy and the board need to mirror the according to a general point of view interconnected nature of
hydrological assets, and IWRM is the perceived decision rather than the area by-locale, successive association
style that has regulated the past. The explanation of IWRM is that the various organizations of water assets are
connected. For instance, high water structure requests and dirtied seepage streams from developing mean less
freshwater for drinking or present day use; debased city and momentum wastewater dirties waterways and
undermines conditions; if water ought to be passed on in a stream to get fisheries and conditions, less can be
redirected to encourage harvests. After study and examination of IWRM, our review region is fundamentally
founded on the best way to move toward IWRM in Ayodhya to determine the issue of deficiency of water,
present water accessibility and necessity, gauge populace and request of water in Ayodhya.
Keywords: Water resources, IWRM, Water Demand, Irrigation

INTRODUCTION
Water is a crucial driver of cash related and social new improvement while it besides has a basic cutoff in
remaining mindful of the validity of the standard living space. Anyway water is only one of various dire
conventional assets and fundamental water issues are not viewed as in withdrawal.
Supervisors, whether in the public power or confidential districts, need to go with risky choices on water task.
Continuously more they need to disperse diminishing supplies between dependably broadening requests.
Drivers, for example, part and climatic changes further expansion the heap on water assets. The standard
segregated procedure is at this point not practical and a more careful technique for overseeing water the board is
critical.
This is the reasoning for the Integrated Water Resources Management (IWRM) advance toward that has now
been perceived commonly as the way forward for able, impartial and satisfactory new turn of events and the
heads of the world's bound water assets and for changing in accordance with clashing requesting.
IWRM is an unequivocal idea which was made from the on-the-ground comprehension of prepared experts.
However numerous pieces of the idea have been around for a surprisingly long time - unquestionably since the
focal generally water gathering in Mar del Plata in 1977 - it was shortly after Agenda 21 and the World Summit
on Sustainable Development in 1992 in Rio that the idea was made the object of wide conversations concerning
what it deduces ultimately. The Global Water Partnership's meaning of IWRM is completely perceived. It
states: 'IWRM is a cycle which advances the co-ordinated improvement and the heads of water, land and related
assets, to upgrade the resultant monetary and social government assist with a fair way without compromising
the worthiness of essential circumstances.

Fig.1: Integrated Water Resources Management


[Sources: International Decade of action “Water for life”2005-15]
210
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The Need for an Integrated Approach


Water philosophy and the board need to mirror the according to a general point of view interconnected nature of
hydrological assets, and IWRM is the perceived decision instead of the area by-locale, moderate association
style that has administered the past. The explanation of IWRM is that the various organizations of water assets
are connected. For instance, high water structure requests and dirtied spillage streams from developing mean
less freshwater for drinking or ebb and flow use; corrupted city and present day wastewater dirties streams and
undermines conditions; in case water ought to be passed on in a stream to get fisheries and conditions, less can
be redirected to encourage yields.
The IWRM standards took on at the International Conference on Water and the Environment in Dublin, Ireland,
in 1992, are known as the Dublin Principles:
1. New water is a confined and feeble asset, key to help life, progress and the climate
2. Water improvement and the board ought to be laid out on a participatory methodology, including clients,
organizers and strategy producers at all levels
3. Ladies have a focal impact in the blueprint, the pioneers and protecting of water
4. Water has a financial worth in the entirety of its battling utilizes and ought to be viewed as a cash related
pleasant.
This supplements the importance of a united procedure comparably as obviously articulating the relationship
between water assets the bosses and the "3Es" of reasonable turn of events: financial capacity in water use,
social worth, and normal and environmental authenticity.
An IRWM Approach Bases on three Areas:
• A drawing in climate of fitting procedures, methodologies and approval for useful water assets progress and
the board,
• Putting set up the institutional plan through which to unite the procedures, methodologies and endorsing,
and
• Setting up the association instruments expected by these foundations to manage their business.
IWRM ought to be seen as a joint effort rather a singular shot method - one that is extended length and forward-
moving in any case iterative rather than straight in nature.
There isn't one right regulatory model. The craft of IWRM lies in picking, changing, and applying the right
blend of contraptions for a given circumstance. Picking achievements and time periods is major for progress.
Execution could happen on a bit by bit premise, like geological increase and the social occasion and timing of
changes. Degree, timing, and content of measures can be changed by experience. In empowering a system and
development for change, see that the course of progress is in all probability not going to be quick.

Fig.2 the IWRM Planning Cycle


[Sources: Global water partnership]
211
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

For procedure making and coordinating, applying a solidified way of thinking requires that:
Water movement and the board considers the different organizations of water and the degree of individuals'
water needs;
• Accomplices are given a voice in water coordinating and the board, with unequivocal regard for getting the
relationship of ladies and destitute people;
• Approaches and needs ponder water assets thoughts, including the two-way relationship between
macroeconomic plans and water progress, the board, and use;
• Water-related choices made at adjoining and bowl levels are as indicated by, or possibly don't fight with,
the accomplishment of more prominent public protests; and
• Water organizing and frameworks are consolidated into more noteworthy social, cash related, and
ecological objectives.
BENEFITS FROM IWRM
A. Ecological Advantages
Natural systems can profit from applying a coordinated technique for overseeing water the bosses by giving
ordinary requirements a voice in the water task trade.
IWRM can help the locale by revealing issues among different clients of the necessities of natural structures and
the advantages these make for them. Reliably these are underestimated and not converged into coordinating and
dynamic.
The environment approach gives another development to IWRM that spotlights on a construction technique for
overseeing water the pioneers: - getting upper catchments (for example reforestation, unprecedented land
improvement, soil crumbling control), contamination control (for example point source decline, non-point
source prodding powers, groundwater insistence) and organic streams. It gives a decision as opposed to a sub-
locale conflict viewpoint that can join assistants in developing an ordinary view and joint activity.
B. Agricultural Advantages
• As the single most noteworthy client of water and the major non-point source polluter of surface and
groundwater assets, agribusiness has a vulnerable picture. Taken close by the low worth included common
creation, this as every now and again as possible that, particularly under states of water inadequacy, water is
redirected from developing to other water organizations. In any case, whimsical reduction in water task for
developing could have wide monetary and social outcomes. With IWRM, organizers are approached to look
past the area money related matters and study the results of water the board choices on business, the climate and
social worth.
• By bringing all locales and all associates into the strong cycle, IWRM can mirror the consolidated "respect" of
water to society overall in irritating choices on water scatterings. This could surmise that the obligation of food
creation to flourishing, destitution decline and sexual heading regard, for instance, could nullify outrageous
money related evaluations of rates of return on each cubic meter of water. Also, IWRM can bring into the
situation the reuse limit of developing return streams for different locales and the expansion for country reuse of
metropolitan and present day wastewaters.
• IWRM calls for coordinated putting together so that water, land and different assets are used in a feasible way.
For the green locale IWRM endeavors to develop water capability (for example more yield per drop) inside the
objectives obliged by the financial, social and normal setting of a specific region or country.
C. Water Supply and Cleansing Advantages
• Above all, appropriately applied IWRM would impel the water security of the world's poor and unserved
being guaranteed. The execution of IWRM based methodology should mean broadened security of
neighborhood water supplies, comparatively as diminished expenses of treatment as contamination is dealt with
significantly more reasonably.
• Seeing the distinctions of individuals, and especially ladies and down and out people, to a decent proportion of
water assets for both nearby and family based supportive purposes, drives unpreventably to the need to
guarantee credible portrayal of these get-togethers on the bodies that go with water asset task choices.
• The center around merged association and competent use ought to be a move up to the area to push for
reusing, reuse and squander decreasing. High contamination charges kept up with by unflinching need have
212
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

impelled mind boggling refreshes in present day water-use efficiencies in the industrialized nations, with
benefits for neighborhood water supplies and the climate.
• Past sterilization structures reliably founded on killing the waste issue from the spaces of human occupation,
in this way keeping the human areas extraordinary and solid, yet essentially overriding the waste issue, with
frequently unfortunate normal impacts somewhere else. Show of IWRM will work on the chance for show of
reasonable sterilization approaches that hope to confine squander conveying wellsprings of data, and decreasing
of waste yields, and to manage sanitization issues as close as conceivable to where they happen.
• At a down to earth region level, further made coordination of water asset the pioneers could incite
uncommonly diminished expenses of giving neighborhood water associations, if for 1 Cap-Net. IWRM plans,
Training module 14 model more water system plans were organized with a nearby water part expressly
elaborate from the beginning.
Benefits
• Easy to isolate water by direct siphoning
• Water can be treated after use and put off into a stream
• Dams and supplies can be utilized for hydroelectric power
• Archives can be utilized for redirection
Weaknesses
• Water will require treatment
• Intermittent
• Improvement of over the top and regularly harming dams, may set off shudders
• Flooding of land for arrangements
• Archives will ultimately sediment up
• Requires adequate precipitation and titanic stream catchment.
OBJECTIVE
Objectives are given the following;
• To analyses the present water availability and requirement
• To forecast the future population and demand of water of Ayodhya
• To analyze the water requirement in Ayodhya
STUDY AREA:
Why we are Selecting Ayodhya City and Rural Area of Ayodhya?
Since Ayodhya is strict spot and under development of Ram mandir sanctuary so in future tremendous get-
together of individuals in Ayodhya and it is make of deficiency of drinking water. Provincial area of Ayodhya
dealt with the issue of flood and rural field. So our review and examination depends on the best way to
determine the issue through incorporated water assets the board.
METHODOLOGY

Fig.3: Flow chart diagram of methodology


213
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

DATA COLLECTION
To accomplished our aiml, information assortment is essential phase of the venture. Set up the information as
indicated by our goal:
● To study and investigation of IWRM from numerous public and global diary paper.
● To further develop the satisfactory water prerequisite and counteraction from flood and dry spell, first and
foremost we ought to have information of ebb and flow populace and assets of water.
● Information taken from Ayodhya Development authority (ADA) for centered region.
● Information of populace get from 2011 statistics.
● For topographical information assortment from different diary/research paper, government information like
as "Jal - Vikas".
4.3) Planning Area
The area of interest given for Ayodhya comprehensive system was 388 Sq.Km and out of which Regulated area
of Ayodhya improvement authority is 133.67 Sq.Km. Thusly, orchestrating district considered for the Master
plan is 133.67 Sq.Km.

Fig.4 Ayodhya Faizabad Map


[Sources: Mapsofindia.com]
1. Growth Direction of the City
The possible advancement configuration is found in the southern side of the city. The improvement of the city is
generally seen along the roads like Ayodhya-Azamgadh, Ayodhya - Prayagraj, Ayodhya - Raibareli and
Ayodhya - Lucknow. Ayodhya Municipal Corporation is creating at faster rate. The expressways going through
city is joining Lucknow and Gorakhpur. Straight headway is happening towards Lucknow road. The headway at
speedier rate is seen on Sultanpur road. Direct progression is furthermore seen on Faizabad to Ambedkar nagar
road. On Sultanpur and Raibareli crucial roads business progression and inside area is delivered for private use.
Present day improvement is made on Lucknow road. Institutional improvement is made on Lucknow road, Ram
Manohar school is made on Sultanpur road. K.S.Sanket Mahavidhyala and ITI are made among Ayodhya and
Faizabad. Mix land use is seen towards the National highway and public avenue.
Ayodhya - Azamgarh Marg
The advancement exercises along this street are normal because of Airport is situated on this street.But old turn
of events, new advancement is expect to deter because of limitations.
Ayodhya - Prayagraj
The development of the city is seen along this street because of presence of higher optional school, Sugar plant,
card board industrial facility and Agricultural ranch and so on. There is development potential along this street
because of the Agricultural produce market and private turn of events.

214
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Ayodhya Raibareli Street:


On this street private advancement is expanding because of offices are created along the street.
Ayodhya - Lucknow
Straight advancement should be visible along this street and significantly all the modern improvement has
occurred along this street. Likewise, it ought to be viewed as that as Ayodhya city dwells on the bank of Saryu
River which is a perpetual stream and it's on the northern side of the city. Thus the development of the city
towards northern side is beyond the realm of possibilities and ought to be stayed away from because of
wandering waterway.
2. Population Projection:
People projection is supposed to sort out the authentic advancement heading of the city. The course of action of
Physical establishment and Social structure. This relies upon the drawn out people of the Authority for the
arrangement time period. Any misconstrued worth will make structure lacking for the explanation expected;
nearly, misconceived worth will make it extreme. Change in the quantity of occupants in the city should be
arranged considering of the general population around the completion of the arrangement time span.
The general population projection has been done using Arithmetic Increase Method, Geometrical mean system,
graphical and Incremental augmentation procedure.
Airthmatical Increase Method:
In this strategy the ordinary extension in people every ten still up in the air from the past identification reports.
This addition is added to the ongoing people to sort out the quantity of occupants in the accompanying decade.
In this way, it is acknowledged that the general population is extending at steady rate. Hence, dP/dt = C for
instance speed of progress of people concerning time is reliable.
Along these lines, Population after nth decade will be Pn= P + n.C
Where, Pn is the general population after n decade and P is accessible people. (M.M. Ghangrekar, IIT
Kharagpur)
Table.1
Year Population Increase Population (x)
1981 132373
1991 165079 (1991-1981)X1 =32706
2001 194122 (2001-1991)X2 =29043
2011 221118 (2011-2001)X3 =26996
Total 88745
To determine projected population of Ayodhya (2021,2031) with using Airthmatical increase method:
Sum of event 88745
Average of increase population ( x )= = = 29581.6
No.of event 3

Where,
Pn= P2021, Po=P2011, n =1(Decade), x = Average of increment
P2021 = 221118 + 1×29581
P2021= 250699
Similarly for projected population in 2031,
Where,
Pn= P2031, Po=P2011, n =2( Decade), x = Average of increment
P2031 = 221118 + 2 × 29581
P2031= 280280

215
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig.5 Population Graph


Geometrical Mean Strategy:
Mathematical mean augmentation is used to sort out the future expansion in people. Since this procedure gives
better calibers and consequently should be applied for one more present day town close to the beginning of
progress for simply several numerous years.
The general population close to the completion of nth decade 'Pn' can be surveyed as:
Pn = P (1+ IG/100) n
Where, IG = numerical mean (%) P = Present people N = no. of numerous years. (M.M. Ghangrekar, IIT
Kharagpur)
Table.2
Year Population Increase Population in % (k)
1981 132373
1991 165079 (1991-1981)k1 =24.70
2001 194122 (2001-1991)k2 =17.59
2011 221118 (2011-2001)k3 =13.90
Total 88745
To determine projected population of Ayodhya (2021,2031) with using Geometrical increase method:
Percentage growth population = k = 3√k1 . k 2 . k 3 = 18.21

Where,
Pn= P2021, Po=P2011, n =1( Decade), k = Percentage growth population
18.21 1
P2021 = 221118 + (1+ )
100
P2021= 261383
Similarly for projected population in 2031,
Where,
Pn= P2031, Po=P2011, n =2 ( Decade), x = Average of increment
18.21 2
P2031 = 221118 + (1+ 100
)
P2031= 308981

216
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig.6 Population Graph


Incremental Increase Method:
The consistent not altogether agreed to at regular intervals from the past people and the run of the mill worth is
added to the ongoing people close by the typical speed of augmentation.
Thusly, people after nth decade is Pn = P+ n.X + {n (n+1)/2}. Y
Where, Pn = Population after nth decade X = Average addition Y = Incremental augmentation. (M.M.
Ghangrekar, IIT Kharagpur)
Table.3
Year Population Increase Population Incremental Increase
X Y
1981 132373
1991 165079 X1=32706
2001 194122 X2=29043 Y1= -3663
2011 221118 X3=26996 Y2= -2047
Total 88745 -5710
To Determine Projected Population of Ayodhya (2021,2031) With Using Incremental Increase Method:
Percentage growth population = k = 3√k1 . k 2 . k 3 = 18.21

Sum of event 88745


Average of increase population ( x )= = = 29581.6
No.of event 3
Sum of event −5710
Average of incremental increase population ( Y )= = = −2855
No.of event 2
Where,
Pn= P2021, Po=P2011, n =1(Decade), k = Percentage growth population
1(1+1)
P2021 = 221118 + 1 × 29581.6 + (-2855)
2

P2021= 247844
Similarly for projected population in 2031,
Where,
Pn= P2031, Po=P2011, n =2( Decade), x = Average of increment
2(2+1)
P2031 = 221118 + 2 × 29581.6 + (-2855)
2

P2031= 271715

217
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig.7: Population Graph


Populace of Ayodhya Corporation having 41 towns combined is projected utilizing the techniques depicted
above and normal of the multitude of strategies utilized is thought of.
Table 4. Population Projection of Ayodhya Development Authority Urban Area
Sr. No Methods Population Projection Ayodhya urban area (Average Population)
1981 1991 2001 2011 2021 2031

1. Arithmetic 132373 165,079 194,122 221118 250699 280280


Increase
Method
2. Geometrical 132373 165,079 194,122 331062 261383 308981
Increase
Method
3. Incremental 132373 165,079 194,122 331062 247844 271715
Increase
Method
Average Population Projection 253308 286992
Floating Population 3,50,000
In-Migrants 1,50,000
Total Population in 2031 786992
Goliath intrigues in the city is moving toward future will attract colossal number of capable, semi-skilled and
uncouth laborers. It will be overall goal where heaps of accommodation workplaces by secret executive will be
made. Evaluating the general population for the next decade is very difficult. This can't be answered by a
methodology. Floating people at present visit Ayodhya in a day may be attracted to stay for extra days. An
undertaking is made to check identical people of ADA area will drifters and float.
The quantity of occupants in Ayodhya Development Authority (ADA) district should be around 786992 lakh in
2031. There are 24 towns that are inside as far as possible in this manner the general population projection of
these towns is moreover expected to have been finished, to evaluate the augmentation essentials in 2031.
Likewise, the table under shows the general population projection of 24 towns that are inside orchestrating
cutoff of Ayodhya improvement authority and are fundamental for country district. This general population is
Urbanizable nation people.
The quantity of occupants in common area of ADA should be 93,541 by 2031. In this way, all of the projections
for comforts that will be supposed here are supposed not entirely set in stone as these towns are reasonable
Urbanizable districts.
Table.5 Population Projection Rural Area
Methods Population Projection Rural area
Sr. No. 1991 2001 2011 2021 2031
Arithmetic 35421
1 Increase 49224 57272 76363 95453
Method
218
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Geometrical 35421 49224 57272 67833 80341


2 Increase
Method
Incremental
3 Increase 35421 49224 57272 79045 100819
Method
Population Projection average 73911 93541
Consequently, the complete populace of Ayodhya advancement region is supposed to be 880533 in the year
2031. Every one of the projections for conveniences that will be expected here are expected to be determined
according to the populace projections.
Population Growth Rate
The populace development rate shows the development example of the city in gives us a sign towards the
development in regard of the relative multitude of different things. Populace development rate is the rundown
boundary of patterns in populace thickness. It tells whether thickness and overflow are expanding, steady or
diminishing, and how quick they are evolving. The development pace of ADA is 59.58% according to statistics
2011. Be that as it may, the normal development pace of ADA region in 2031 according to the projected
populace is 45.11%. The table underneath shows the populace development rate in ADA region. For the
development pace of proposed populace of 2031 drifting populace is excluded from the Total populace of 2031
in light of drifting populace is consider as a Tourist inflow.
Table.6 Population Growth Rate
Ayodhya Development Authority area
1991 2001 2011 2021 2031
Growth Rate (%) 21.36 59.58 (41 villages added) 33.20 45.11
Source: Census of India 2011

Graph: Population Growth Rate


The above diagram of development rate shows that in 2011 there was an extraordinary decrease in development
pace of Ayodhya however a while later it has again raised at an exceptionally sluggish rate. From the populace
projection, the development pace of ADA region is determined and it shows that constantly 2031 it will be
around 39%. Subsequently, one might say that to forestall the declination of development rate out-relocation is
required to have been stay away from and financial open doors ought to be expanded and restore.
Migration
Total number of In-Migrants in Ayodhya city as per census 2011 is 64727 out which 40% (26149) are male
and 60% (38578) are female.
Table.7 Migration
Name of 2001 2011
City Persons Male Female Persons Male Female
Ayodhya 44109 20480 23629 64727 26149 38578
Source: Census of India 2001 & 2011
219
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Graph: in Migrants
Tourist Inflow
Table.8 Tourist Inflow In Uttar Pradesh
Sr. No Domestic Tourist Foreign Tourist
1 Uttar Pradesh 285079848 3780752
Source: Tourism Department Ayodhya 2020
Projection of Floating Population of Ayodhya
Table.9
Year Domestic International
2015 15432558 19077
2016 15482456 20979
2017 17549633 23926
2018 19217570 27043
2019 20122436 26956
2020 21622436 27234
2021 23122436 27515
2022 24622436 27799
2023 26122436 28084
2024 27622436 28372
2025 29122436 28663
2025 30622436 28956
2026 32122436 29252
2027 33622436 29551
2028 35122436 29852
2029 36622436 30156
2030 38122436 30462
2031 39622436 31084
Source: Tourism Department Ayodhya 2020 , Primary Survey & Projection 2020
3. WATER RESOURCES:
Saryu River
Ayodhya stays on the bank of Saryu River which has its grand significance from an old-fashioned time and its
depiction is given in Hindu holy works like the Ved and Ramayan.

220
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The Saryu riverfront is generally called Ram ki Pairi, havng a gigantic stretch of ghats and nurseries, stayed
away from by a line of safe-havens. It is visited by many fans generally during that time on various severe
occasions.
The Sarayu River is an unending water resource, it starts from Lake Mansarovar in the Himalayas and is
generally called the Ghaghra and the Manas Nandini. It merges with the Ganga in Bihar's Saran region.
Lower Ghaghra is otherwise called Saryu River and tracks down notice in Ramayana. Area Ayodhya is
arranged on its right bank. The Sarayu stream of India structures at the conjunction of the Karnali (or Ghaghara)
and Mahakali (or Sharda) in Bahraich District at 27°40′27″N 81°16′39″E. It at first streams into south western
bearing till it arrives at Ramnagar, where it takes a go towards the west and streams towards the towns of
Faizabad and Ayodhya. It keeps streaming west wards and goes through the towns of Tanda and Barhalganj
prior to getting the Rapti from its left at 26°16′34.05″N 83°37′49.51″E. It streams into the Ganges close to the
town of Chhapra at 25°44′36″N 84°40′01″E.
The stream water quality examination uncovers that the typical Dissolved Oxygen (D.O.) was found 7.5 and
Biochemical Oxygen Demand (B.O.D.) in the scope of 2.3 mg/l to 4.0 mg/l in the year 2016-18 (B.O.D. is least
atupstream Guptar Ghat, Ayodhya and greatest at-downstream Shamshan Ghat Ayodhya), which goes under
class D according to water quality norms IS 2296-1982, in light of most recent 3 years checking information of
stream water quality in the recognized contaminated stretch of River Saryu, from Ayodhya to Iltifatganj
(District Ambedkar Nagar). The stream gets extensive measures of wastewater consistently from the sewage
framework stream from various Nagar Nigam/Municipal Area of Ayodhya which prompts decay of its water
quality.
In the dirtied stretch of River Saryu, all out release of 24.64 MLD is assessed as sewage through 21 sewage
channels. According to work area stock, around 24.64 MLD of sewage and 7.9 MLD of modern profluent are at
present being released into the stream Saryu through different channels in Ayodhya. 02 ventures
straightforwardly release their treated Industrial emanating in River Saryu dirtied stretch. The treatment of
sewage is a main pressing issue as out of complete 24.64 MLD sewage release, just 6.0 MLD of sewage is dealt
with.
As per the report of Central Pollution Control Board 2016, the water idea of Saryu at Ayodhya is as underneath:
Table. 10 Water Quality of Saryu River
Temperature DO pH BOD Coliform level
Min Max Min Max Min Max Min Max Min Max
>4mg/l 6.5-8.5 <3mg/l <5000MPN/100ml
Saryu 18 25 7.4 9.9 7.8 7.9 2.9 4.1 7000 8000
at
Ayodh
ya
[Source: Central Pollution Control Board 2016]
Separate data for the upstream and downstream is not available with department. But the quality of water of the
Saryu River is well within the permissible limit.
Rainfall and Climate
Ayodhya has a moist subtropical environment, regular of focal India. Summers are long, dry and warm,
enduring from late March to mid-June, with normal day to day temperatures almost 32 C. They are trailed by
the rainstorm season which endures till October, with yearly precipitation of roughly 1,067mm (42.0in) and
normal temperatures around 28 C. Winter begins toward the beginning of November and endures till the finish
of January, trailed by a short spring in February and early March. Normal temperatures are gentle, almost 16 C,
however evenings can be colder.
Sr. No Name of the City Rainfall (in mm) Temperature (In centigrade)
Maximum Minimum
1 Ayodhya 903.5 46 7
Table.11 Climate Table
The typical yearly precipitation is 1034.8 mm. The environment is sub-damp and cold season begins in
November and last till February, the late spring season starts in March and go on till the beginning of rainstorm
by center of June. Around 90% precipitation happens from June to September During rainstorm overflow
221
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

surface water is accessible for profound permeation to ground water. January is by and large the coldest month
with the typical least temperature of 70C and mean month to month greatest temperature is 22.30C. From March
temperature climbs quickly and May and early June day temperature in some cases comes to 47 0C. After
beginning of storm in June, there is calculable decrease in temperature. The mean month to month most extreme
temperature is 320C and mean month to month least temperature is 16.50C.
Month Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
'20 '20 '20 '20 '20 '20 '20 '20 '20 '20 '20 '20
Rainfall 54.9 9.7 48.6 21.6 14.9 184.3 457.3 284.1 181.3 0 2.6 0
(mm)
Table. 12 Rainfall Data
Besides during the storm and early piece of rainstorm period the air is dry .The mean month to month morning
related dampness is 72% and mean month to month evening relative mugginess half. The breezes are for the
most part light besides in summer and storm when they reinforce marginally. The mean breeze speed is 3.2
km/hr. The Potential evapotranspiration is 1660.9 mm.
Other than during the rainstorm and early piece of tempest period the air is dry .The mean month to month
morning related moistness is 72% and mean month to month evening relative moisture half. The breezes are
generally light alongside in summer and tempest when they sustain hardly. The mean breeze speed is 3.2 km/hr.
The Potential evapotranspiration is 1660.9 mm.
GROUND WATER SCENARIO
A. Hydrogeology:
General Geology:
Faizabad region approaches a piece of central Ganga plain and is underlain by a thick stack of alluvium stores
of quarternary age. This alluvium is a store of unconsolidated leftovers involved gathering of mud, buildup,
kankar and different grades of sand. The sands are of moving grade from especially coarse to fine occasionally
ending up being gravelly in nature. Sand mixed in with rock and kankar structure the main springs.
Sub-Surface-Geological Configuration:
To appreciate the subsurface spring structure exploratory borehole data entered by C.G.W.B. at four region and
data from state water framework, tubewell improvement division were utilized and following determinations
have been made.
(I) On regional scale, a various spring bundle connecting down to significance of 745mbgl is existing as seen
from exploratory well data exhausted by C.G.W.B. The thickness of the spring lessens to 60 m and obvious
mud having thickness of 30 to 40m is competent at base. In eastern part, this spring has various mud central
focuses. In general the thickness of sandy layer extension in the western heading. This may be a result of
existing waste plan of the stream Tons, Which streams in the south eastern heading through the central piece of
the district.
(ii) Aquifers structures go about as unconfirmed, semi attested to confined depending on the presence of soil
beds Aquifer material are fine to medium grained.
(iii) The presence of mud beds of variable thickness are predominantly confirmed to district close to critical
leakage structure specifically Tons. The soil beds could contrast with periodical back lowland of earlier
depositional environment. Occasion of Ground Water: Ground water occurs in pore spaces of the
unconsolidated alluvial buildup in the zone of submersion. Buildup from ground level to up to significance/15
to 20.0 m., 8 incorporate fine to medium grained sand with slight earth at top. In this zone ground water occurs
under unconfined condition. The significance of dug wells changes from 3.60 mbgl to 12.50 mgl.
Profundity to Water Level:
An examination of premonsoon water level aide for the year 2007, uncover that the water level movements
from 2.45 mbgl at Bakarganj to 7.80 mgl at Bikapur.
Shallow water table condition is seen in Amaniganj and Milkipur blocks in south western part.
Periodic Fluctuation:
Water table is known to fluctuate concerning:
(a) Replenishable recharge from precipitation
222
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

(b) Seepage from surface water bodies


(c) Inputs to ground water body by applied water framework.
(d) Losses in view of evapotranspiration.
(e) Discharge from ground water reflection structure.
(f) Ground water improvement Annual periodic instability of water level not completely settled from the
premonsoon (May 2007) and post storm (Nov. 2007). The change contrasts from - 0.07 m. to +3.50 m. The
most outrageous climb of water level at Chaure Bazar (+3.50 m). Positive change rise in water level in light of
south west rainstorm is seen by and large around the area including flood plain of Ghaghra stream.
B. Ground Water Resources:
The appraisal of ground water resource capacity of Faizabad area has been worked out on the guidelines of
proposed by Ground Water Estimation Committee and showed in the Table-4. A review of the table of ground
water balance shows that availability of ground water in the district is 110071.99 ham. Various factors, which
are related with ground water recharge like precipitation seepage from stream, spillage from applied water
framework, recharge from surface water bodies like lake, lakes and flood plain have been thought of. The most
vital ground water recharge has been surveyed in Rudauli block which is 19454.10 ham where as least recharge
is 7248.67 ham in Bikapur block. Correspondingly the ground water draft from different ground water
development, for instance, dugwell, shallow and significant tubewells of entire region is 73301.55 ham. Most
outrageous ground water draft still up in the air for Rudauli block which is 11427.89 ham where as least ground
water draft has been shown up for Maya Bazar which is 5000.04 ham. The ground water balance for extra
maltreatment of the area is 33675.20 ham. The best groundwater balance is found in Amaniganj block, which is
8113.91 ham. Where as Bikapur block has a balance of 311.60 ham which is least.
All of the squares of Faizabad region are under safe arrangement except for Hasingteenganj block where
extraordinary stage has achieved 90.45%. The openness of ground water resource potential for water framework
for entire region stay 33675.20 ham for extra ground water improvement. Block wise most outrageous resource
of 8113.91 ham is available in Amaniganj block where the level of headway is simply 40.52%. The base ground
water resource is available in Bikapur block where the level of progress is generally vital for instance 89.70%.
Integrated Water Resources Management:
For all intents and purposes, IWRM approaches integrate applying information from different trains in much the
same way as the snippets of data from gathered accessories to devise and execute valuable, fair and reasonable
answers for water and progress issues. Considering everything, IWRM is a gotten done, participatory getting
sorted out and executioan device for directing and making water assets so much that changes social and cash
related necessities, and that guarantees the security of conditions for people later on. Besides, contemplating
contributing the accomplishment of Sustainable Development targets (SDGs),[5] IWRM has been advancing
into more practical system as it considers the Nexus approach, which is a cross-sectoral water asset the bosses.
The Nexus approach depends upon the assertion that "water, energy and food are firmly related through
generally speaking and nearby water, carbon and energy cycles or chains."
Water's various purposes — for developing, areas of strength for, for individuals and occupations — requests
worked with development. An IWRM approach is thusly cross-sectoral, significance to be an open, adaptable
participation, and offering all assistants that would be important to set method and make sound, changed
choices considering express water difficulties resisted.
An IWRM approach bases on three wanderer pieces and targets keeping away from a disconnected arrangement
of water assets the pioneers by considering the going with perspectives:
1. Empowering Environment: A certifiable empowering climate is fundamental to both confirmation the open
doors and resources, all things considered (people in much the same way as open and classified district
affiliations and affiliations), and besides to ensure public resources like typical normal qualities.
2. Jobs of Institutions: Institutional progress is crucial to the plan and execution of IWRM approaches and
exercises. Weakness to work with liabilities, authority and cutoff points concerning development are by and
large basic explanations behind issue with doing IWRM.
3. The board Instruments: The association instruments for IWRM are the contraptions and methods that draw in
and help managers with pursuing ordinary and informed decisions between elective activities.

223
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

A piece of the cross-cutting conditions that are in this way essential to contemplate while doing IWRM are:
• Political will and commitment
• Limit improvement
• Palatable speculation, monetary strength and commonsense expense recuperation
• Noticing and assessment
IWRM ought to be seen as a cycle rather than a singular shot methodology - one that is extended length and
iterative rather than straight in nature. As an affiliation which desires to move water progress and the board
frameworks from their right now unreasonable plans, IWRM has no decent beginning stages or endings.
Also, there isn't one right managerial model. The specialty of IWRM lies in picking, changing and applying the
right blend of these instruments for a given circumstance.
The yield from this time of the getting sorted out cycle is a water assets the load up system with clear
objectives. The methodology ought to go past the activities expected to manage force issues or accomplish
transient protests and set up an undeniable significant length system to accomplish feasible association and
improvement of water assets. The IWRM plan will then, at that point, be utilized to operationalise the system
starting with one getting sorted out period then onto the accompanying.
Seeing that incorporated water assets the bosses gives rules to the down to earth association of water assets the
solicitation emerges how to close what measures to set up. What ought to be changed in the manner we oversee
water and what are the outcomes of the proposed changes? These are problematic solicitations to address and it
could point of fact require different prior years complete water changes are executed and are working
adequately.
On a fundamental level, an expansive technique that endeavors to deal with water's commitment to judicious
movement in all cases ought to have a more basic effect. At last, beginning with huge issues can yield further
developed results. Being nonsensically energized close to the beginning — dismissing the political, social and
cutoff gives that should be taken care of for persuading execution — can accomplish a technique that looks
phenomenal on paper yet doesn't change over into expected works out. Experience recommends that gigantic
beginning changes are not fundamental to catalyzing change — basic advances that can unquestionably be
finished are consistently adequate to start the most notable way to deal with moving towards more useful water
progress and the board.
Regardless of the fundamental strategy system shouldn't target anything not overall getting sorted out changes
that will drive more key and worked with dynamic on an on-going explanation. Thusly the focuses to be seen as
isn't the very 'thing' should be changed as of now additionally 'when' should the developments occur. As
opposed to trying to complete all that simultaneously the activities should be organized in excess of a truly long
timeframe.
This module will address
• The level of the technique choices
• The plan for settling on framework choices, and
• The IWRM change locale.
The Scope of the Strategy Decision
Objectives drive the choice of technique. Close by the perpetually gives apparent in the circumstance
evaluation, plans are proposed. There might be fluctuating levels of grasping around these proposed blueprints
yet they mirror the desires of the assistants directed. These ideas should be acquainted with a stage where the
objectives behind the IWRM plan are certainly conveyed and concurred.
A course of action (or a fantasy) is routinely the beginning stage being a certification of plan. The essential
contrast in making a comprehension of the strategy to technique a structure is that it desires to meet express
objectives through unequivocal speculations. In a methodology the undertaking assets accessible and choices to
appear at the objectives ought to be outlined and a program envisioned for these assets for be spent in a fair
however monetarily skilled way. Assistants might have significantly more grounded sees they ought to speak
regarding the compromise choices which should be made in organizing a structure, yet it is in a general sense
more astonishing for exhaustive assistant social occasions to occur on approaches than it is on blueprints and
approval.
224
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The central targets depict how the vision may be accomplished. Every objective should cover an offered (issue
or opportunity), address the fundamental changes expected to make the progress to sensible turn of events, be
passed in a way that is satisfactorily wide on to merge all bits of the issue and confirmation 'purchase in' by each
proper assistant, yet moreover enough express to permit quantifiable fixations to be portrayed. The system
should cover adequate focuses to address the standard financial, social and organic worries of OK water assets
the board, yet scarcely any enough to be reachable and legitimate.
Two or three objectives might be concurred as requirements, to be agreed targets (see under) and finished inside
a short period of time range. Different targets, which are not current necessities, may happen when progress has
been made with the prerequisites, then again expecting conditions change and they have happened to higher
need.
Center for every objective portray unequivocal and quantifiable exercises, achievements or edges to be
accomplished by a given date. These development the point of convergence of any activity plan, and actually
concentrate assets and guide the determination of choices for development. Since targets instigate huge
activities and lead changes by unequivocal accessories, they ought to be the delayed consequence of exchange.
Appearing at such objectives will regularly require a genuine and institutional change kept up with by
unequivocal association limits and instruments. Describing the objectives for this change affiliation and finding
and focusing in on the association instruments and limits is a basic piece of the most broadly perceived way to
deal with moving towards IWRM.
Institutional positions covers the positions, affiliations and frameworks expected to execute the technique. This
could incorporate linkage between the IWRM plan and other key plans and between plans at various spatial
levels: public, sub-public, nearby, or for various districts or land regions. It would perceive which
establishments are at risk for what pieces of the structure activity plan, their levels of possibility and where they
have a vow to respect different associates or methodology facilitators. It could likewise flag a reasoning for
smoothing out affiliations (particularly where responsibilities move past or fight) or even propose the basis of
new establishments as critical.
The development plan is produced using the eventual outcome of the strategy and is introduced in the going
with module regardless of how there is a bound together affiliation that hints the game-plan back to framework
as additional evaluation and change happens.
The Framework for Making Strategy
Understanding the issues influencing water assets the bosses is a head starting move towards activity towards
judicious association and improvement of water assets.
Procedure choices ought to be endeavored and taken on considering:
• The perspectives on the accessories, including government specialists;
• The sensibility of the system, including conceivable outcomes;
• The compromises and different variables;
• Likewise, the expense.
This will require a survey of the proposed system for certification by political interests, associates and to the
degree that cash related and focused plausibility. As the affiliation moves to the confirmed wicked good
coordinating stage this cyclic cycle is rehashed until the exercises, organizing and assets are reachable and
leaned to be agreeable to the accessories.

225
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Strength, Weakness, Opportunities, and Threats of IWRM:


Table.13
Strengths Weaknesses
 Invigorated Water Policy and Water Resources • Divided administration of the water
Management Strategy assets area
 Presence of River Basin Committees • Feeble administrative design W3. Low
 Water assessing technique being executed human asset limit working in the water
 Presence of adequate institutional course of action to area organizations
amass data • Inexistence of water assets the board
 Presence of trans limit courses of action of give and take plans at stream bowl level
in the overall stream basin  Absence of common society
cooperation into the water assets the
board W6. Feeble monetary design
Opportunities Threats
• Political will for the powerful execution of the IWRM • Environmental change
• Contributor will to support projects zeroed in on IWRM • Mind channel in the water area
• Supportive of dynamic common society that knows • Region strengthening (absence of
about the significance of a productive water assets the coordination)
board • Worldwide virtual water exchange
• Presence of territorial instructive organizations that  Slow institutional change
offers explicit preparation open doors in IWRM
 Decentralization of political power
RESULT
Water is the center of variety to ecological change, filling in as the essential association among society and the
environment. Further created water resources the leaders and permission to safe water and sanitization for
everything is principal in destroying destitution, assembling tranquil and prosperous social orders, and ensuring
that 'no one is deserted' making the rounds towards sensible new development.
The confirmation and game plan of drinking water is a major need, and many would fight, a typical freedom
considering the way that an adequate reserve of drinking water is crucial for human life and success. Drinking
water is gotten to by individuals and families generally through the world in a grouping of ways, going from
filling containers from surface waters to simply opening a tap from a channeled water supply. In late numerous
years, colossal progress has been made in giving permission to safe drinking water.
Existing Water Supply Status
At present availability of water supply is around 39.55 MLD and as per rules for the quantity of occupants in
221118 (Ayodhya) the need of water supply is 49.68 MLD. Thusly there is an opening of 10.13 MLD water
supply. The amount of ordinary water relationship inside the metropolitan regions are 55 and the length of the
apportionment structure is 254 km. There are outright 14 water supply huge haulers are open and 1939 hand
siphons are Indian Marked-2 Hand siphons.
Table 14. Overhead Tank Details
Sr. No Area Capacity
1 Jalkal colony campus 2000 Kilo liter
2 Ridganj 1000 Kilo liter
3 Ashvini puram 2500 Kilo Liter
4 Anguri Bagh 2000 Kilo Liter
5 Sursuri Colony 25000 Kilo Liter
6 Tedhi bazar 250 Kilo
7 Jalkal Campus 750 Kilo lite
8 Nalkup No.06 1200 Kilo Liter
9 Asharfi Bhawan 1200 Kilo Liter
10 Rajdadar 2200 Kilo Liter
11 Jhunki Ghat 250 Kilo Liter
12 Kashiram colony 750 Kilo Liter
Source: Jalkal Vibhag Ayodhya- 2020

226
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

There are total number of 12 over head tanks in Ayodhya city.

Fig.8
The Above charts show the data collected by primary survey; it can be seen that major water supply source is
ground water that is 58% with an better quality for drinking purpose. The ground water quality is good for
potable purpose and the water supply project based on bore wells is executed.
As per URDPFI Guideline and CPHEEO manual 1999 the maximum quantity of water supply required for the
city is 135 lpcd and for rural areas is 70 lpcd. Hence projections are done accordingly. As per the MOEF
guidelines, waste water needs to be treated and at least 33% water is required to be reused.
Drainage
At present significant region is shrouded by open channel in the Ayodhya region. Faizabad region is covered by
underground waste office. 12 MLD STP is functional in the city. The crude dim water from open channels are
delivered in stream without treatment.
Underground waste undertaking is under plan and finished soon. The STP site isn't chosen at this point. The
STP site planned will be situated at two spots, for which land designation is forthcoming. Whole ADA region is
covered for seepage offices.
Storm Water Drainage
During precipitation periods there can be a lot of tempest water that doesn't invade into the ground surface and
the greater part of this turns into the overabundance overland stream or direct surface spillover. There are many
contributing elements for examining the amount and transient varieties of this stream; these incorporate
geography of the land, geology, topography, precipitation force and example and the land use type. Assessment
of such overflow arriving at the tempest sewers, is reliant upon the force and term of precipitation, qualities of
the feeder region and the time expected for such stream to come to the sewer.1 Therefore an appropriate waste
organization will be required for the stream to arrive at the sewer without logging the region. Similarly structure
the fundamental audit it was found that Ayodhya has both open and closed channels, regardless, underground
leakage systems are normal in the city for staying aware of clean conditions and work on the classy point of
view on the eminent City.
At present the open channels are conveying storm water during deluges. The same storm water divert is laid in
entire ADA district. Under CDP storm water squander game plan is getting checked out.
Clean Strong sterilization and tidiness programs need to join interventions to change lead with the decision of
the right development. Changing approach to acting requires socially delicate and reasonable prosperity
guidance. People need to understand, in phrasing important to their lifestyles and existing conviction structures,
why better prosperity depends upon the gathering of neatness rehearses, for instance, hand-washing (after poop,
ensuing to dealing with youngsters' poo, and before cooking), on the use of bathrooms for safe expulsion of
manure, and on safe limit and treatment of drinking-water and food. Exposing issues of why disinfection and
neatness are huge will regularly assemble motivation to change frightful approaches to acting. Along these
lines, from the above frame it might be seen that Ayodhya is open crap free and from family outline it was
found that most prominent number of family has Separate toilet workplaces and 7% people use public
restrooms.

227
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Water Supply Requirement in Ayodhya Development Area


In past fragment it was seen that there is 10 MLD nonattendance of water supply in the Ayodhya city along
these lines, as per the principles in metropolitan area 135 lpcd is required water supply. Thusly, for the quantity
of occupants in 10.99 lakh in 2031 how much water supply required is shown in the table underneath. As
indicated by MOEF rules, out of 135 LPCD, 90 liters to be new given and 45 lit treated water for each capita is
to be considered for water supply.
Table 15. Projected Water Supply Requirement For Ayodhya Development Area
Sr. No Projected Water Supply 2021 2031 Unit
1. Quantity of Water supply 34.06 107.47 MLD
2. Elevated Service Reservoir 6000 KL
3. Under Ground sump 12000 KL
[Source: URDPFI Guideline 2014]
Thus, the water supply required will be107.47MLD in the year 2031. The upward tanks required is 244 MLD
with an underground sump limit of 489 MLD.
Storm Water Waste:
Storm water squander is the most well-known approach to exhausting excess water out of streets, walkways,
housetops, structures and various areas. The system used to drain storm water are regularly insinuated as
whirlwind exhausts and are similarly called storm sewers and waste wells (Harshil. H. Gajjar, 2006).
A storm water squander system should be planned to accumulate and convey run-off made inside a catchment
district during and after precipitation events, for safe delivery into a getting course or the sea. The degree of
zenith streams that should be obliged will depend basically upon the power of precipitation and the size,
geography, soil type, course of action and land usage of the catchment.
Storm sewers (furthermore storm channels) are tremendous lines or open channels that transport storm water
overflow from streets to normal streams, to avoid street flooding. In Ayodhya sensible whirlwind water
grouping structures can be taken on as not simply it will assist in taking care of the storm with watering yet
moreover it will give an extraordinary character to the city. One of the sensible systems is presenting ground
exhausts or channel along the controls of the road. Direct Drains are available in both slanted and non-skewed
plans. Exactly when the direct is presented in a space where incline at this point exists, a fair-minded or more
humble channel setup may be used to net equivalent execution. Assuming that an abundance of inclination is
accessible, flooding could happen as a result of the wave effect or channel outlet imperatives. The water can be
conveniently drained into either into the sewer line or it might be assembled into a channel and exhausted into
the standard water bodies or kund. A delineation of direct is shown in the image.
Sewage
At present there is one treatment plant with a restriction of 12 mld which is sufficient for 1,11000 people
serving Faizabad locale at this time with extending people the constraint of the sewage treatment plant will be
supposed to increase. As shown by the lengthy people of 2031 a sewage treatment plant of breaking point is
109.95 MLD will be required. DPR for ADA locale is under arranging and will be done soon. The Treatment
objections are not settled at this point, will be done soon.
The best technique to full fill water need:
Strategies:
1. Man-Made Reservoir:
Every so often called counterfeit lakes, are critical water sources in various countries all around the planet.
Rather than typical patterns of lake improvement, stores are phony, commonly outlined by building a dam
across a stream or by diverting a piece of the stream and taking care of the water in a vault. Perpetual inventory
of the dam, the stream pools behind the dam and fills the dishonestly made bowl (UNEP 2000). Infrequent
changes of flood and precipitation feed the storehouse. There are colossal differences in the size of man-made
supplies, for instance, tremendous fake lakes or little lake like water bodies. The set aside water can be used for
water framework, drinking water after filtration or to make energy.
Benefits
• Rapid and basic induction to a water source.
• Making of drinking perpetually water for various purposes.
228
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

• Extended security of downstream stream from flooding events.


• Extended potential for upheld cultivating water framework.
• Formation of energy (hydropower)
• Limit of water for use during low-stream periods.
Weakness
 Beyond preposterous human development into supply region, with related social, monetary and clinical
issues
 Evacuating of neighborhood masses following inundation of supply water basin
 Removing of neighborhood masses following drenching of supply water basin
 Riparian conflicts can happen especially in dried areas
 Dams are expensive being developed and support.
Basic Design Principles
Adapted from UNEP (2000)

Fig.9
Source: Different types of reservoir systems. Source: UNEP (2000])
Like lakes, vaults range in size from lake like to very huge water-bodies (for instance Lake Powell, U.S.A.).
The assortments in type and shape, regardless, are much more significant than for lakes. The term 'storehouse'
consolidates a couple of sorts of fabricated water-bodies or possibly water extra rooms:
• Valley supplies - made by fostering an impediment (dam) inverse to a streaming stream.
• Off-stream limit vaults - made by building a separated region agreed with a stream, and subsequently
furnishing it with water either by gravity or by guiding from the stream.
The last vaults are to a great extent called barrier or restricted supplies, and have controlled inflows and floods
to and from something like one streams. Despite single supplies, store structures in like manner exist, and
consolidate overflowing vaults - containing a movement of provisions created along a lone stream, and between
bowl move plans - planned to move water through a movement of storehouses, tunnels and furthermore
channels beginning with one drainage bowl then onto the following.
2. Ground Water Management Strategy
Faizabad district includes alluvial areas. The cultivators of the area are having little land holding being poor.
The isolated thought of land assets making a trouble to a particular formers to encourage the ground water
resources monetarily. Following procedure may be taken up to further develop the water framework for future
development.
(I) Mass care program should be taken up to teach the clients with respect to declining example of water level.
(ii) Marginal farmers may be given money related guides for encouraging the ground water consultation
structure.

229
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

(iii) Most of the drag wells are fitted with diesel siphon set. The siphoning costs is higher to sad farmers. Power
availability may be overhauled by taking up power projects in future.
(iv) The channels essential branch/distributaries and minors should be lined to restrict the seepage in stream
request districts. Consequently making openness of more water at the last piece of channels.
Agricultural Status
The Economy of Uttar Pradesh is essentially agrarian in nature. Larger piece of the general population in the
state depends upon agribusiness for its work. As high as 65% of the full scale workforce in the state depends
upon agribusiness a huge part of them are underneath destitution line. Cultivation of the state has a chief impact
in the food creation and food security of the country. According to Agriculture concentrate on 2011-12, there
are 233.25 lac farmer in the state. It is the eventual outcome of troublesome work and attempts of the farmers
that the state has become autonomous in the field of food taking care of and progressing towards more than the
essential. In like manner, to realize the agricultural potential inside as far as possible, the cultivating region in
the not entirely settled .
Thus, from the pie chart it can be seen that the net sown area is around 73% and Barren land is around 7% in the
rural areas.
Apmc Market
In Uttar Pradesh agrarian Markets are spread out and coordinated under the UPAPMC Acts. Lately, The Uttar
Pradesh Government has made a modification for discarding focus man and raising farm to Market. In this
farmers will be directly prepared to sell their produce, which is cash respect the customers. At present there are
two APMC market one is at Ayodhya of 39.30 part of land and one at Radauli of 8.00 segment of land.
From the fundamental review it was in like manner seen that Ayodhya is well off in cultivating produce the
Table underneath show the Agricultural Production every year in Ayodhya.
Table 16. Agricultural Commodity Production
Total Agricultural Commodity production Quantity (in Quintal) Value (in Rs)
2015-2016 2412663 215,39,09,100
2016-2017 266129000 222,05,82,950
2017-2018 2746310 313,38,24,316
2018-2019 2494966 319,00,84,000
2019-2020 2616387 294,39,95,060
Source: Nagar Nigam Ayodhya 2020
Explicit Mechanism for Agriculture Sector:
Strong drives ought to be taken for managing the impression of groundwater by the farmers having private
wells. Before long, there is no affirmation count of all water framework wells, but that could connect with no
less than 3,000,000 in India. Same is what is going on with other groundwater wells, being used in
families/local, present day, business regions and other mass clients.
Agricultural Region Needs All out Change in Water Framework Water Use:
Groundwater use in cultivating region is of most outrageous importance, subsequently strong rule over water
framework water (groundwater) is the need critical. In U.P. circumstance, it becomes fundamental to frame
principles for the use of groundwater for different yields, so the ebb and flow extraction rate could be really
overseen and lessened to save and protect it. I. Seat checking for ideal number of water framework (Crop
watering) ought to be delivered for different harvests, seasons and agro-climatic zones. The amount of
waterings expected for different yields should be recognized and coordinated. Division in water ought to
includes in cultivating region needs to examined and logically tended to. ii. Less water finishing harvests should
be controlled and told for pushed districts for planting as indicated by the availability and need of ground water.
For this mediation, farmers should be helped. iii. Headway and gathering of compelling water use methodology
should be upheld. also, farmers should in like manner be supported for embracing such water powerful methods.
Water use efficiency by small water framework including stream water framework is fundamentally essentially
as high as 80 to 90% conversely, with just 30 to 40% in standard rising water framework, achieving saving of
amazing proportion of water framework water, especially groundwater withdrawal, under spill water
framework. iv. Smaller than usual Irrigation (spill/sprinkler) should be generally cutting-edge in the state, as it
is a normal district and capable advancement for controlling and diminishing groundwater drones in
agribusiness region. Regardless, attainability of such designs for different yields and for the little holding size
farmers not altogether permanently established.
230
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

• The huge harvests sensible for smaller than normal water framework system, under different agroclimatic
zones, should be educated for gathering.
• Around 90% farmers are close to nothing and immaterial with land holding size under 1 hectare, thusly this
point is exceptionally basic while propelling stream and 220 sprinkler water framework, in light of the fact that
for the farmers, the help and running cost on such contraptions will be trying to make due. v. The impact of
execution of smaller than usual water framework schemes ought to be evaluated. In Uttar Pradesh, having
around 37 lakhs private water framework wells, simply 0.25% are covered with small water framework, which
is very less at whatever point diverged from the National consideration of 5%.
CONCLUSION
The above study, it was seen that there is 10 MLD absence of water supply in the Ayodhya city in this way,
according to the rules in metropolitan region 135 lpcd is required water supply. Thusly, for the number of
inhabitants in 10.99 lakh in 2031 how much water supply required is 107.47 MLD. According to MOEF rules,
out of 135 LPCD, 90 liters to be new provided and 45 lit treated water for each capita is to be considered for
water supply. Required water can be acquire by fake lake for metropolitan area. Water of lake will be store from
Saryu stream or downpour fall.
Water bodies, incineration and graveyard have been reserved in the draft land use plan for 2031. Anyway
genuine region and area of all water bodies, incineration and cemetery according to the concerned income
records will remain be kept up with next to no charges in their territory use. On the off chance that there is any
distinction in the proposed land use plan, their utilization will be considered according to income records as it
were.
At times metropolitan land use exercises have been proposed in existing plantation regions. Anyway these
proposed land use exercises will be pertinent solely after following the arrangements of Forest Act and
consistence of any heading gave by the concerned Authorities.
Open channels are conveying sullage from the city and encompassing region, taints the ground water and liable
for water borne dieses. Giving underground waste framework in the whole new advancement area is proposed.
For the Sewage treatment plant, a low-lying region admeasuring 10000 sq. m. on south west side close to water
body is proposed. For siphoning stations, the more extensive streets can be utilized. Reuse of treated water is
additionally expected to be reused for metropolitan region. The city region streets are restricted and challenging
to give open tempest water channels. It is proposed to give channeled channel in blocked region and open RCC
box channels on the proposed streets. The water will be gathered in storm water channels and at last delivered in
the stream. It is expected to be intended for 50mm precipitation each hour.
The water bodies are expected to be safeguarded from infringement. For preservation of water bodies, having 9
m is proposed. belt from water bodies as limited zone. For the preservation of Rivers. Stream front
improvement is proposed to give sporting facility to the resident. Limitation of advancement inside 30 m. edge
from stream limit is proposed.
RECOMMENDATION
Faizabad locale has 33675.20 ham of ground water accessibility for future water system. To build the
horticultural efficiency the primary necessity is that the groundwater ought to be created in an arranged and
logical way The suggestion are as per the following:
1. Lack of drinking water can be resolve from counterfeit lake through well water dissemination the board.
2. The genuine usage of ground water accessible for water system is substantially less than potential accessible
.All the blocks aside from "HARIGTEENGANJ" falls under safe classification. Numerous editing example
ought to be embraced to use the potential accessible.
3. Negligible and unfortunate ranchers ought to be given monetary assistance for building ground water
reflection structure so as to draw water for water system.
4. The idea of conjunctive utilization of surface water and ground water in trench order region be embraced.
Conjunctive utilization of ground water can be arranged as given underneath.
(a) Ground water can be utilized in the Kharif seasons to enhance water system prerequisite to the vital degree.
(b) It can be utilized during Rabi season when precipitation commitment is significantly less contrasted with the
water system prerequisite
(c) Ground water can likewise be utilized for meeting its prerequisite of summer crops.

231
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

5. Need for Strict Policy/Regulatory Measures

I. DISCOURAGE INJECTION
Well for Ground Water Recharging In rooftop top downpour water collecting strategy, infusion well, bore well
or re-energize well techniques are for the most part by and by for direct re-energizing of downpour water into
the springs. Geo-deductively, this technique ought to be exactly taken on with all vital safety measures
considering probabilities of contamination chances. It has been an overall perception that the utilization of
infusion well has turned into a typical practice without following the predefined standards which could sully
springs.
ii. Regardless, reused water, treated squander water and downpour water from cleared/unpaved open fields,
garbage removal, spills over ought not be considered direct re-energizing into the springs through infusion well,
shafts, deserted bore wells/hand pumps.(Penal 218 arrangements are conceived in the U.P. Ground Water Act-
2019). Countless such designs previously built ought to be indentified and punished according to the
arrangement of the U.P. Ground Water Act-2019.
ACKNOWLEDGEMENT
In the vibe of extraordinary euphoria and fulfillment I present this try named " Integrated Water Resources
Management For Ayodhya (U.P.).". The finishing of this task is no question an eventual outcome of critical
help and obligation of number of individuals. I ought to give my genuine as a result of my partner Rajiv
Banarjee (Associate Professor) and Md. Sajid (Asst. Teacher, Department of Civil Engineering) for his
ceaseless assistance and decisive considerations furthermore giving empowering climate, without which my
undertaking and its documentation couldn't have ever been conceivable. I'm additionally thankful to my Head of
Department (Civil Department) for his critical assistance, solace and motivation. The satisfaction of any errand
isn't just the honor to the particular movement related with achieving it, yet moreover people attracted with
moving and planning. I'm appreciative to my partners for their consistent inspiration and remarks that has
assisted me with finishing this report.
REFERENCE
1. Asit K. Biswas (2004) “Integrated Water Resources Management: A Reassessment” Water International,
29:2, 248-256, DOI: 10.1080/02508060408691775,Journal homepage: https:// www.tandfonline.com/ loi/
rwin20
2. Muhammad Mizanur Rahaman & Olli Varis (2005)” Integrated water resources management: evolution,
prospects and future challenges” Sustainability: Science, Practice and Policy, 1:1, 15-21, DOI:
10.1080/15487733.2005.11907961. https://doi.org/10.1080/15487733.2005.11907961
3. Hal E. Cardwell, Richard A. Cole, Lauren A. Cartwright, Lynn A. Martin (2006) “Integrated Water
Resources Management: Definitions and Conceptual Musings” Universities Council On Water Resources
Journal Of Contemporary Water Research & Education Issue 135, Pages 8-18 December 2006
4. Clive Lipchin, Eric Pallant, Danielle Saranga, Allyson Amster (2007) “Integrated Water Resources
Management and Security in the Middle East” NATO Science for Peace and Security Series -
C:Environmental Security, Published by Springer, P.O. Box 17, 3300 AA Dordrecht, The
Netherlands,www.springer.com
5. H.H.G. Savenije , P. Van der Zaag (2008) “Integrated water resources management: Concepts and issues”
Science Direct, Physics and Chemistry of the Earth 33 (2008) 290–297, Available online at
www.sciencedirect.com
6. David Ezechiel Rosenberg (2008) “ Integrated Water Management and Modeling at Multiple Spatial
Scales” Civil and Environmental Engineering.
7. Laura E. Higa Eda and Weiqi Chen “Integrated Water Resources Management in Peru” science direct
Procedia Environmental Sciences 2 (2010) 340–348 2009 Published by Elsevier Ltd.
8. Itay Fischhendler and Tanya Heikkila “Does Integrated Water Resources Management Support
Institutional Change? The Case of Water Policy Reform in Israel” Published here under license by the
Resilience Alliance. Fischhendler, I., and T. Heikkila. 2010. Ecology and Society 15(1): 4. [online] URL:
http:// www.ecologyandsociety.org/vol15/iss1/art4/

232
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

9. Christian Jolk , Sandra Greassidis, Sylvia Jaschinski, Harro Stolpe and Björn Zindler (2010 ) “Planning
and Decision Support Tools for the Integrated Water Resources Management in Vietnam” Water 2010, 2,
711-725; doi:10.3390/w2040711, www.mdpi.com/journal/water
10. Per Stalnacke & Geoffrey D. Gooch (18 December 2010) “Integrated Water Resources Management”
Springer Science+Business Media B.V. 2010, Irrig Drainage Syst (2010) 24:155–159 DOI
10.1007/s10795-010-9106-6
11. Derick R. Du Toit, Harry Biggs and Sharon Pollard (2011) “The Potential Role of Mental Model
Methodologies in Multistakeholder Negotiations: Integrated Water Resources Management in South
Africa” Ecology and Society 16(3): 21. http://dx.doi.org/10.5751/ES-04237-160321
12. KV Raju, Clive Lyle, Yasmin Siddiqi “Integrated Water Resources Management in Karnataka, India: A
New Approach” The draft Concept Paper for the Karnataka Integrated and Sustainable Water Resources
Management Investment Program, Prepared for the State Government of Karnataka and the Asian
Development Bank, September, 2012.
13. Sneh Gangwar “Water Resource of India: From Distribution to Management” International Journal of
Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 8 (2013), pp. 845-850 ©
International Research Publications House, http://www. irphouse.com /ijict.htm
14. Geert teisman, Prof. dr. J. Edelenbos, Dr. M.W. van Buuren, Dr. J.F. Warner et al. (2013) “Editorial
Note on Special Issue on Integrated Water Resources Management” Baltzer Science Publishers (2013)
International Journal of Water Governance 1 ISSN 2211-4491

AUTHOR DETAILS:
ARUN KUMAR YADAV1, RAJIV BANARJEE2, MD. SAJID AND DR. SYED AQEEL AHMAD4
1
M.Tech Student, 2Associate Professor, 3Assistant Professor and 4HOD (Department of Civil Engineering),
Integral University, Lucknow

233
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

A STUDY OF CONSUMER BEHAVIOUR AND PREFERENCES TOWARDS FOOD ORDERING AND


DELIVERY PLATFORM / SERVICES AVAILABLE IN INDIA

DR. JAYASHREE MEHTA

ABSTRACT
The purpose of this research is to find consumer behaviour towards Food Delivery Platforms. The study shows
most preferred platforms used by consumer to order food online and factors leading to us consider it the most
preferable platform. There are many factors related to customer’s ordering behaviour- like price, on time
delivery, packaging, peer service provider behaviour, platform design etc. There is gradual shift in way people
order food. The purpose of this research is to know what are factors that defines consumer’s behaviour towards
food ordering and delivery platform of food industry. Report is about a research article “consumer’s behaviour
towards food ordering and delivery platform” where the objectives of this research is to understand study
towards consumer preferences for online food ordering services and understand consumers with respect to
various services offered by online food ordering and delivery platform. And also identify the factors which
influence the consumer decision to orderfood online a survey method was conducted where a questionnaire was
sent to all segments of people like age, gender and income and the questionnaire was designed on the google
form.
Keywords: Consumer behaviour, Food ordering platform, Food delivery platform, Online buying, Digital
Payments,

INTRODUCTION
The second decade of the 21st century witnessed the use of smartphones by the common people hence the Mobile
shopping as the new phenomena in online purchasing. In the food industry, online food delivery platforms such
as Swiggy, Zomato and Food panda have established themselves. They provide a complete food ordering and
delivering solution system. It providesa single window for ordering from a wide range of hotels and restaurants,
and they have their exclusive fleet of delivery personnel to pick up and deliver food to the customers.
These services are very popular with the millennial population as it reduces the time and effort that is spent on
food ordering. Food delivery has become a very competitive market in India.
The demand of online ordering is real. It conveys to the customer base that you are a modern growing restaurant
and very challenging to others that wants to be a convenient and accessible for all the guests who used to order
regularly. The most important that which will always need to contact the quality of enhancing online food
ordering ever is the only one that has to be maintained the customer as a regular customer, In the sense provides
good qualities and quantities of food, time maintain, delivery asap. Online food ordering platform are the media
by which local hotels and restaurants, chefs, canteens are delivering take away and food parcel directly to
consumers footsteps. Due to increase in working young generation in metro cities and hectic work life culture
this type of idea is easily spreading. This system has generated a new dimension to working people’s kitchen.
Now days consumers are getting more attracted towards online ordering platform rather than home delivery of a
specific restaurants. In a process of online food ordering platform there is no human intervention involved
which gives it more privacy. Platforms are having number of restaurants, chefs’ kitchens listed with their menu
specifically. So the consumers need not to carry pamphlets and menu list for further orders. It gives convenience
to order food on click of a button. Downloaded platform used to give some coupons discounts, previous order
history, some palette suggestions, recent customers review on restaurants as well as dishes.
LITERATURE REVIEW
(Vinaik, Goel, Sahai, & Garg, 2021) study reveals the food and service industry requires the preferences of the
customers, to satisfy and identify their needs. According to the research, majority of the respondents were aware
about the food apps and the most used apps are Zomato and Swiggy. The respondents considered various factors
like delivery time, convenience and good customer service as the most important ones.
(Malhotra & Singh, 2020) The research helps find various strategies used by major food delivery companies to
promote their business in India and the effect caused by online food delivery apps on restaurant business.
According to the study, food ordering through apps is growing but still many new start-ups failed to survive in
the competition and faced closure.

234
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

(Kumari, 2020) This study reveals that the relationship between online food service and the facilities provided
and also the factors which influence the buying behaviour of customers. It concludes that as social media has a
great influence on customers, it helps the online service providers advertise their products for greater reach to
the masses.
(Lee, Sung, & Jeon, 2019) This study helps to identify the determinants of continuous use intention for food
delivery software applications. The research findings stated that the users were influenced by peers, indicating
that word of mouth marketing should be pursued by delivery platforms providers.
(Sindhu Kashyap, in 2018) study communicates that the FOOD delivery platform players like Swiggy, Zomato
have made their presence in India and now Uber eats have joined the competition.
(Bhotvawala, Balihallimath, Bidichandani, & Khond, 2017) study reveals aggregator delivery services, as
opposed to ‘Delivery as a Service’ companies, generate a platform for consumers to navigate through a variety of
restaurants hosted on it and placing orders manually.
OBJECTIVES OF STUDY
1. To understand study towards consumer preferences for online food ordering services.
2. To understand consumers with respect to various services offered by online food ordering and delivery
platform.
3. To identify the factors which influence the consumer decision to order food online
RESEARCH METHODOLOGY
The study focuses on an understanding consumer behavior towards food ordering and food delivery platform by
food delivery channels. The perception of consumers vary under different circumstances. The research is based
upon both primary as well as secondary data. The primary data was collected through a questionnaire (Google
form) and Secondary data was collected through Research papers, journals, magazines, and websites. In this
research paper data was collected from 129 respondents who use different food delivery platforms.
ANALYSIS AND FINDINGS
Cross Tabulation of Age by Food Order on Each Week

This table shows that majorly 37.3% and 33.3% respondents use the food delivery platform toorder food once in
in month and less than 3 times in week who are from age group of 18 to 30years old.
Cross Tabulation of Food Order on Each Week by Dinner Time
Dinner
No Yes Total
Food ordered on each week N % N % N %
Less than 3 times per week 16 37.2% 27 62.8% 43 100.0%
3 - 6 times 14 48.3% 15 51.7% 29 100.0%
More than 6 times per week 2 25.0% 6 75.0% 8 100.0%
Once in month 13 26.5% 36 73.5% 49 100.0%
Total 45 34.9% 84 65.1% 129 100.0%

235
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

This table shows that 73.5% respondents who are interested to order food on dinner time from food delivery
platform. 62.8% are like to ordered food less than 3 times per week who are interested to order food on dinner
time.
Cross Tabulation by Age Wise through Zomato Platform Preferred

This study reveals that 84.3% respondents who were from age group of 18 – 30 are mostly preferred Zomato
while ordering food.
Cross Tabulation of Family Income by Payment Mode Option (Google Pay) :

The table shows that majorly 90% and 83.8% respondents who order food online and who having family
income up to 2Lakh and 5.1L – 7.5L want to pay by google pay and spend morethan 200rs.
Cross Tabulation of Food Ordered Weekly Buying on Easy and Convenience Factor:
Easy and convenience
Food ordered on each week Very Important Important Not Important Extremely not important Total
N % N % N % N % N %
Less than 3 times per week 31 72.1% 9 20.9% 2 4.7% 1 2.3% 43 100.0%
3 - 6 times 25 86.2% 4 13.8% 0 0.0% 0 0.0% 29 100.0%
More than 6 times per week 6 75.0% 1 12.5% 1 12.5% 0 0.0% 8 100.0%
once in month 34 69.4% 13 26.5% 1 2.0% 1 2.0% 49 100.0%
Total 96 74.4% 27 20.9% 4 3.1% 2 1.6% 129 100.0%
This table explains that majorly 86.2% respondents are feeling that easy and convenience factor is very
important who order food online for 3 to 6 times from food delivery platform to order food.
236
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Cross Tabulation of Age by Loading and Delivery Time is More Factor

In this table it is observed that majorly 43.1 % respondents of age group of 18 to 30 years old are faced the
problem of loading or delivery time is more while ordering food from food delivery platform. They are highly
dissatisfied because they are facing this problem while ordering foodfrom food delivery platform.
FINDINGS
1) According to this study majorly 37.3% and 33.3% respondents use the food delivery platform to order food
once in in month and less than 3 times in week who are from age group of 18 to 30 years old. 73.5%
respondents who are interested to order food on dinner time from food delivery platform. 62.8% are like to
ordered food less than 3 times per week who are interested to order food on dinner time.
2) This study reveals that 84.3% respondents who were from age group of 18 – 30 are mostly preferred Zomato
while ordering food and majorly 90% and 83.8% respondents who order food online and who having family
income up to 2Lakh and 5.1L – 7.5L want to pay by google payand spend more than 200rs.
3) The table that majorly 86.2% respondents are feeling that easy and convenience factor is very important who
order food online for 3 to 6 times from food delivery platform to order food. In the table it observed that
majorly 43.1 % respondents of age group of 18 to 30 years old are faced the problem of loading or delivery
time is more while ordering food from food delivery platform. They are highly dissatisfied because they are
facing this problem while ordering food from food delivery platform.
CONCLUSION
This study shows people are highly satisfied with online food delivery platform. The further also suggest that
easy and convenience factor and quality of food factor which also affects significantly to consumers intension to
buy food from food delivery platform.
People are highly satisfied with online food delivery platform. Out of food tracking, verity of payment option,
food coupons and offers only people are satisfied with easy and convenient quality of food, price of food, etc.
This study concludes that out of all online food delivery platform only Zomato and swingy are mostly prefer
and also respondents are satisfied with their service.
Since the respondents are satisfied with online food delivery platform when they are not facingany problem while
ordering the food. Out of food tracking, verity of payment option, food coupons and offers only people are
satisfied with easy and convenient quality of food, price of food, etc This study concludes that out of all online
food delivery platform only Zomato and swigy are mostly prefer and also respondents are satisfied with their
service.
RECOMMENDATIONS
As per the study technical glitches are should be remove or should be work on it because respondents faced
Problems like site is slow, site is not opening, loading and delivery time is more, some menu option not
available no refund, changing delivery location, not able to connect delivery person, advertisement on site,
server issue while online payment.
Bringing more good offers and convenient service where respondents can save their time money and respondent
should be satisfied from online food delivery platform.
237
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

BIBLIOGRAPHY
 http://www.jatit.org/volumes/Vol97No16/11Vol97No16.pdf
 http://ijrar.com/upload_issue/ijrar_issue_20542895.pdf
 https://www.imarcgroup.com/india-online-food-delivery-market
 https://www.getfareye.com/insights/blog/food-
delivery#:~:text=As%20per%20Statista%2C%20online%20food,(CAGR%202021%2D2024).
 How is an online food ordering system going to impact the food industries? - Quora
 How meal-delivery apps are hurting your favourite restaurants | TVO.org

AUTHOR DETAILS:
DR. JAYASHREE MEHTA
Associate Professor, Shree M.D Shah Mahila College of Arts and Commerce, Malad West, Mumbai- 400064

238
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

EFFECTIVENESS OF SUNDRY SOLVENTS OVER EROSION RATE IN VIBRO CLEANER USING


ULTRASOUND STATISTICS

VIPULKUMAR ROKAD AND DIVYANG H. PANDYA

ABSTRACT
In modern industries, Cleaning is prima facie need during and after manufacturing processes for eliminating
rust, dirt and other sticky adhesives. Vibro cleaner is developed based on ultrasound statistics in transient form
with sundry solvents. Solvents play an adequate role in cleaning of part surface by acoustic properties. Sundry
Solvents boost the efficiency of cleaning process. This research focuses the effectiveness of different solvents
combinations over the surface cleaning process to get notable erosion rate by experimental investigation. PZT4
piezoelectric transducer has been used to boost the operating process with 40 kHz frequency.
Keywords: Vibro Cleaner, Solvents, Cavitation Effect, Erosion rate. Piezoelectric Transduce cavitation effect,

INTRODUCTION
Industries are suffering with user friendly and eco-friendly processes during manufacturing and after completing
the object while storing. The major contaminations sticked over the object surfaces during the manufacturing
processes and atmospheric effects [1,2]. Vibro Cleaner is one of the effective solutions to overcome many
traditional cleaning methods which are based on thermo-chemical effects [11,12]. Vibro Cleaner is working
based on ultrasonic technique in which transducer has been attached at the bottom of cleaning tank [6,8]. The
transducer transmits electrical signals into sound waves and then pressure acoustic waves in liquid media which
generates micro bubbles known as cavitation bubble. The bubbles strike over the surface of object and explode
to remove the contaminations [5,7]. Solvents play a vital role in cleaning the contaminations like rust, dirt, oil,
grease and other kinds of adhesive materials which has been used during the manufacturing process. Solvents
boost the process of cleaning with its acidic and alkaline properties. Here, three types of solvents have been
taken for investigation like water, isopropyl alcohol (70%) and ethanol and its combinations to improve the
efficiency of surface cleaning process. Water is commonly available with free of cost and other solvents can
also been used based on demand of cleaning process depending on contaminations of the objects. However, this
device requires less quantity of cleaning solvent depending on mass of cleaning objects so it safe for human as
well as non-hazardous and eco-friendly towards the nature. It can be used for cleaning of components like
watch parts, lenses, medical instruments, industrial tools, coins, jewelry, food processing equipments and many
more.
CAVITATION EFFECT
Cavitation phenomenon is the backbone of the study because acoustic cleaning the happening on the principle
of it. According to ASTM standards, it is defined as the formation and subsequent collapse of cavities or bubble
within a liquid. Bubble is a heart of acoustic cleaning. By means of piezoelectric transducer, electrical energy
has been converted into sound waves which further used to form acoustic pressure in liquid through tank wall
transient. Tank is made of stainless steel with high elastic and durable material. Rapid vibration of transducer
over the tank wall creates pressure phase difference in liquid which produces millions of blisters call cavitation
bubbles [3,4]. During the bubble explosion, shock force and micro jet are formed Factors contributing the
phenomenon are pressure drop, acoustic streaming, temperature and chemical reaction of fluid with object
surface material. The continuous rise produces enormous power to remove contaminations which is known as
cavitation effect [10,17].
EROSION PHENOMENON
Erosion is the process of surface wear and material loss due to vacuum pockets generated inside the liquid.
Contaminant materials have been eroded by the cavitation effect form the surface of object so it is known as
cavitation Erosion. [14] Cavitation is a difficult to understand because it depends on may parameters like
kinematic energy, surface area which need to be clean, rate of loading, temperature, operating frequency etc.
Continuous bombarding of micro bubbles due to cyclic loading creates complex stress distribution over the
object surface that undergoes deformation [9]. When stress exceeds endurance limits of contaminant material
that have been removed from the object surface. Thus, Cavitation erosion is time depend and fatigue like
damage. Material degradation terminology is covered by the ASTM G-40 standard related to cavitation and
cavitation erosion. According to ASTM G-32 standard mean depth of erosion is the average thickness of

239
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

material eroded from a specified surface area, usually calculate by the average material loss and dividing that by
density and specified surface area of the material [10].
∆𝑚
𝑀𝐷𝐸 = (𝜌∗𝐴) (1)
Mean Depth of Penetration Rate (MDPR) is the rate of average eroded material volume loss per unit surface
area with respect to time. MDPR is inversely proportional to the ultimate resilience of the material. It is related
with mean depth of erosion penetration [10].
𝑀𝐷𝐸
𝑀𝐷𝑃𝑅 = 𝑡 (2)
THEORETICAL BACKGROUND
Ultrasound Effect
When external filed of electricity has been applied to the piezo of transducer, it changes in its size by
polarization effects. Because of electric field, piezo starts to stain in the direction of electric filed. This creates
changes in the structure of piezo size. The elongated piezo surface stricked over the tank wall and generate
mechanical stresses which are responsible to produce cavitation bubbles in liquid media. [18].
𝑆𝑖 = 𝑆𝑖𝑗𝐸 𝑇𝑗 + 𝑑𝑚𝑖 𝐸𝑖𝑛 (3)
𝑇
𝐷𝑛 = 𝑑𝑛𝑗 𝑇𝑗 + 𝜀𝑛𝑚 𝐸𝑖𝑛 (4)
The Transient Interface
In an ultrasonic tank, Tank wall is reacted as transient between transducer attached at bottom of the tank and
liquid media. Generated ultrasounds from the piezoelectric transducer stricked over the surface of the tank wall
which generate cavitation bubble into liquid media by means of mechanical vibration of tank wall. [16]
𝑝𝑖 = 𝑝𝑎,𝑖 sin(−𝑘𝑥 + 𝜔𝑡) (5)
𝑝𝑟 = −𝑝𝑎,𝑖 sin(𝑘𝑥 + 𝜔𝑡) (6)
Bubble Dynamics
In the transient environment, mechanical stress applied on the tank wall, produces negative and positive phase
change pressure difference which is responsible to produce tiny cavitation bubbles. These bubbles are empty
spaced and gradually increased in its shape which is called bubble growth. When intensity of ultrasound
exceeds over the limit of tensile strength media, the bubble collapsed and release enormous energy. This
happens near the surface of cleaning part and contamination can be removed by the critical pressure developed
by bubble collapse. [15]
3 1 2𝜎 4𝜇𝑅̇
𝑅𝑅̈ + 𝑅̇ 2 = [𝑝𝑔 + 𝑝𝑣 − −
2 𝜌0 𝑅 𝑅
− 𝑝0 − 𝑝𝑠 (𝑡)] (7)

Experimental Investigation
For experimental set-up, A small cylindrical shaped tank of size 170 diameter x 95 mm length with 1 mm wall
thickness has been fabricated. Tank is made from stainless steel material because of its properties like high
elasticity, anti-wear andante-corrosive etc. This tank is fitted well in a suitable stand made of mil steel. A 40
kHz [13] frequency piezoelectric transducer has been attached at the out bottom of the tank. The capacity of
tank is 2 litters has been chosen and experiment has been carried out using 1 liter of solvents to save the
quantity of different solvents. 12 mm Diameter x 40 mm length solid rods have been used as specimens to
carried out experimental tests.

Fig. 1: Experimental Set-up


Basically, three different types of solvents have been used like water, Isopropyl Alcohol (70%) and Ethanol.
Water is commonly used cleaning solvent and it can be used mostly for all types of materials. Isopropyl Alcohol
is the combination of 70% pure alcohol and 30% of water. It can be used mostly for cleaning of components
240
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

with disinfection. Ethanol is mostly used of cleaning of sticky materials like oil, adhesives etc. with disinfection
of parts. Ethanol is quick evaporative solvent so it can be used in combination of water like 50% ethanol with
50% water, 70% ethanol with 30% water and 90% ethanol with 10% water to get controlled results based on
applicability. For properties of solvents. For material properties of tank, specimen and solvent, refer table 1 and
2 and for specification of piezoelectric transducer, refer table 3 respectively.
Table 1. Properties of materials
Materials
Parameters
Stainless Steel Mild Steel
Density (kg/m) 8000 7850
Young’s modulus (Pa) 20.3 x 1010 21 x 1010
Poisson’s Ratio 0.27 0.30
10
Bulk modulus (Pa) 15.1 x 10 14 x 1010
Shear modulus (Pa) 8.1 x 1010 7.0 x 1010
Table 2. Properties of Solvents
Solvents
Parameters
Water Isopropyl Alcohol Ethanol
Density (kg/m) 1000 786 785
Speed of Sound (m/s) 1482 1170 1100
Temperature (°C) 20 20 20
Dynamic Viscosity (Pa*s) 1.0 x 10-3 2.1 x 10-3 1.1 x 10-3
Kinematic Viscosity (m2/s) 1.0 x 10-6 2.5 x 10-6 1.4 x 10-6
Surface tension (N/m) 0.079 0.021 0.022
3
Vapour Pressure (Pa) 2.2 x 10 4.1 x 103 5.3 x 103
Thermo-Conductivity (W/m*K) 0.58 0.137 0.014
Specific heat (J/kg*K) 4183 1540 2400
Volume Expansivity (1/K) 207 x 10-6 1120 x 10-6 1090 x 10-6
Table 3. Specifications of PZT-4 Piezoelectric Transducer
Properties PZT-4 Transducer
Frequency (kHz) 40
Power (W) 60
Radiating Surface (mm) 45
Length (mm) 55
3
Density (kg/m ) 7500
Permittivity Constant (F/m) 8.854 x 10-12
Relative Permittivity ƐT11 = 1475, ƐT12 = 1475, ƐT13 = 1300
RESULTS AND DISCUSSION
Vibro Cleaner is very efficient and has very remarkable impact for cleaning of small as well as big objects.
Practical investigation has been carried out using different solvent to improve the efficacy of cleaning process.
The solvents play vital role in acoustic cleaning process. Here, three solvent, water, isopropyl alcohol (70%)
and ethanol, have been used with same process time as 5 minutes for each process. The various combinations of
ethanol with water have given controlled erosion rate which are helping to reduce the damage of parts. Refer
fig. 2 for understanding the cavitation phenomenon like bubble generation, acoustic pressure waves and bubble
cloud in ethanol which boost the process of cavitation that other solvent to improve the cleaning rate.

Fig. 2. (a) Vibration Effect; (b) Bubble formation; (c) Bubble Cloud

241
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Same size specimens 12 diameter x 40 length have been used for investigation. Cost of solvents and hazardous
properties of solvents are directly affecting parameters to the process. So, minimum use of solvents is required
to protect environment. A small size (2 litter capacity with only 1 litter filled) cylindrical shaped tank has been
taken to carried out the investigation. Refer table 4 for experimental readings.
Table 4. Experimental Results
Experimental Results
Sr No Solvents Weight Before Weight after Weight Less Erosion Rate
Cleaning (grams) Cleaning (grams) (grams) (kg/m2s)
1 34.500 34.450 0.050 1.110 x 10-4
Water
2 34.040 33.992 0.048 1.061 x 10-4
3 Isopropyl 34.100 34.090 0.010 2.211 x 10-5
4 Alcohot (70%) 34.670 34.650 0.020 4.423 x 10-5
5 Ethanol 35.130 35.070 0.065 1.326 x 10-4
6 (50E+50W) 35.110 35.040 0.070 1.548 x 10-4
7 Ethanol 34.850 34.770 0.080 1.769 x 10-4
8 (70E+30W) 34.940 34.855 0.085 1.879 x 10-4
9 Ethanol 35.050 34.950 0.100 2.211 x 10-4
10 (90E+10W) 35.090 34.995 0.095 2.101 x 10-4
From practical, it has been found that various solvents give appreciable results. Water is commonly used for all
kinds of components. It can be easily available and easily dissolved with other solvent to get controlled process.
Water gives moderate erosion rate like 1.110 x 10-4 kg/m2s and 1.061 x 10-4 kg/m2s while isopropyl alcohol
gives lower erosion rate like 2.211 x 10-5 kg/m2s and 4.423 x 10-5 kg/m2s. Isopropyl alcohol, which is
combination of 70% pure alcohol with 30% water, is mostly suitable for disinfect the components. It gives very
low performance for cleaning application. Out of all, Ethanol and its combination with water have given
measurable results than others. Pure ethanol is difficult to use due to high evaporation rate. Here, 50% ethanol
with 50% water gives erosion rates like 1.326 x 10-4 kg/m2s and 1.548 x 10-4 kg/m2s which is little higher than
water and isopropyl alcohol. It is continuously increase with 70% ethanol and 30% water like 1.769 x 10 -4
kg/m2s and 1.879 x 10-4 kg/m2s and subsequently with 90% ethanol and 10% water like 2.211 x 10-4 kg/m2s and
2.201 x 10-4 kg/m2s. The solvent 70% ethanol with 30% water has given double erosion rate than water and
even more than isopropyl alcohol Ethanol can also be used for removal of sticky contaminations like oil, grease
etc. and disinfection components.
CONCLUSION
It has been concluded by experimental investigating the effect of different solvents over the cleaning
performance. Three different solvents like water, isopropyl alcohol (70%), ethanol and its combination with
water have been used in a small cylindrical shaped tank of 2 litters capacity with 1 litter filled solvent. Practical
concludes that water gives moderate erosion rate 1.110 x 10-4 kg/m2s and 1.061 x 10-4 kg/m2s but it is easily
available and widely used for various kinds of components cleaning while isopropyl alcohol gives lower erosion
rate 2.211 x 10-5 kg/m2s and 4.423 x 10-5 kg/m2s which is most suitable for disinfection of parts with lower
cleaning. But 90% ethanol and 10% water (like pure) gives highest erosion rate 2.211 x 10 -4 kg/m2s and 2.201 x
10-4 kg/m2s than others. Also, other combination of ethanol with water gives controlled erosion rates. Ethanol
mostly used for removal of sticky contaminations like grease, oil etc. and disinfection components.
ACKNOWLEDGEMENTS
The authors acknowledge support of Green KSV Skill Development Centre, LDRP-ITR campus, Gandhinagar,
Gujarat, India
REFERENCES
[1] F. Duran, M. Teke, Design and Implementation of an Intelligent Ultrasonic Cleaning Device, Intelligent
Automation and Soft Computing, vol. 25 no.3 (2019) pp. 441.
[2] Vetrimurugan, J. Michael Goodson, Ultrasonic and Megasonic Cleaning to remove Nano-Dimensional
Contaminants from various disk drive components, International Journal of innovative Research in
Science, Engineering and Technology, 2(11) (2013) pp. 5971.
[3] P. Mirek, Field testing of Acoustic cleaning system working in 670MWTH CFB Boiler, Chemical and
processes engineering, 34(2) (2013), pp. 283.

242
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[4] H. Lais, Numerical modelling of acoustic pressure fields to optimize the ultrasonic cleaning technique for
cylinders. Elsevier Ultrasonics – Sonochemistry, 45 (2018), pp 7.
[5] P. Vasiljev, Ultrasonic system for solar panel cleaning, Elsevier Sensors and Acuators A: Physical, 200
(2013), pp. 74.
[6] V. Rokad, D. H. Pandya, Development of 3D improved acoustic transient model for vibro cleaner using
COMSOL Multiphysics. Materials today: Proceedings, Vol. 44-1 (2021), pp.732.
[7] H. Dursun. Experimental Investigation of the Cavitation erosion of a flat aluminum part using a sonotrode
test device. Materials and technology 53(5) (2019), pp.637.
[8] V. Rokad, D. H, Pandya, Development of 2D Axisymmetric Acoustic Transient and CFD Based Erosion
Model for Vibro Cleaner using COMSOL Multiphysics, Mathematical Modeling, Computational
Intelligence Techniques and Renewable Energy-Springer, Vol.2 (2021), pp. 203.
[9] V. Rokad, D. H, Pandya, Erosive investigation of various erosion models for vibro cleaner developed
based on ultrasonic technique using COMSOL Multiphysics, International Journal of Engineering, Science
and Technology, Vol.13, No.2 (2021), pp.33
[10] A. K. Krell, D. E. Zakrzewska, Cavitation erosion-phenomenon and test rings, Advances in Materials
Science, Vol.18; No.2 (2018), p 56.
[11] S. Foroughi, V. Karamzadeh, M. Habibi, M. packirisamy, Numerical Analysis of Acoustic Propogation
inside Multiple liquids, Proceedings of the 5th International Conference of Fluid Flow, Heat and Mass
Transfer, (2018).
[12] I. Tzanakis, G. S. B. Lebon, D. G. Eskin, K. A. Pericleous, Characterizing the cavitation
development and acoustic spectrum in various liquids, Elsevier-Ultrasonics Sonochemistry, 34 (2017), pp.
651.
[13] De Angelis D.A. and Schulze G.W., Performance of PZT8 versus PZT4 piezoceramic materials in
ultrasonic transducers, 44th Annual Symposium of the Ultrasonic Industry Association, Washington, DC,
USA, (2016).
[14] Ibanez I., Zeqiri B., Hodnett M. and Frota M.N., Cavitation-erosion measurements on engineering
materials, Engineering Science and Technology an International Journal, Vol. 23 (2020), pp. 1486-1498.
[15] Abouel-Kasem A. and Ahmed S.M., Bubble structures between two walls in ultrasonic cavitation erosion,
Journal of Tribology, Vol. 134 (2012), pp. 021702-1 to 9.
[16] Arabnejad H., Mansouri A., Shirazi S.A. and McLaury B.S., Evaluation of solid particle erosion equation
and models for oil and gas industry application, Society of Petroleum Engineering Conference, SPE-
174987-MS, (2015).
[17] Virot M., Chave T., Nikitenko S.I., and Shchukin D.G., Acoustic cavitation at the water – glass interface,
Journal of Physical Chemistry-C, Vol. 114 (2010), pp. 13083-13091.
[18] Li Hua Chen, Shou Jie Cui, Shuo Yang and Wei Zhang, Study of Microbistable Piezoelectric Energy
Harvesting, Hindawi-Journal of Nanomaterials, ID 7824685/8, (2018).

AUTHOR DETAILS:
VIPULKUMAR ROKAD AND DIVYANG H. PANDYA
Kadi Sarva Vishwavidhyalaya, Gandhinagar, Gujarat, India

243
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

VALUATING THE IMPACT OF EHRM ON INSTITUTIONAL PERFORMANCE

S. SAKTHI KAMAL NATHAN, DR. D. JAGADEESAN AND DR. R. KARTHI

ABSTRACT
The study was conducted to identify the impact of EHRM on the administrative and operational performance of
the Institutions in Chennai. Also, the study investigates the important changes bought by the EHRM among the
institutional functions. The study used a descriptive research design, wherein the data was collected through
survey methods from Colleges adopting EHRM practices in Tamil Nadu. For the study, the data was collected
from 411 faculties belonging to 22 colleges by adopting a simple random sampling technique. The data was
collected using a structured questionnaire. From the analysis performed, it was found that an almost equal
proportion of male and female faculties are present in educational institutions. Also, most of the faculties were
belonging to the age category between 30- 40 Years with 3 – 7 Years of Experience. Also, it can be perceived
that there is no significant difference in EHRM practices adopted by the educational institution in Tamil Nadu.
Easy Compensation Delivery, Dataset maintenance, Scope for Developments, Increased Operational Control
and Decreased Paperwork was the important functions where the EHRM practices had made a better
contribution over conventional HRM. Also, the study indicates that the respondents ‘Agree’ that EHRM is
helping the educational institution increase their administrative and Operative Functions. Further, the study
exemplifies that there is a significant impact of EHRM practices on administrative and operational functions in
the Institutions in Chennai.
Keywords: EHRM, Educational Institution, Administrative and Operational functions.

INTRODUCTION
Human resource management in the public and private sectors around the world faces great problems as we
enter the twenty-first century, which is characterised by rapid and complex political, economic, social,
technological, and cultural developments. With the advent of the Internet and the evolution of information
technology and communication methods, as well as the transformation of marketing, accounting, and various
operations into electronic business, and the rise in the digital transformation of organisations, it became
necessary to transfer jobs and paper files to electronic files, and relations between the government and business
organisations, trade unions, employees, and customers are thinning.
E-management, e-business, e-marketing, e-HRM, e-recruitment, e-learning, and e-government are examples of
new terminology. There is also a slew of new titles related to this development. The implementation of Web-
based approaches in HR-related systems and operations is referred to as e-HRM or the use of technology in
human resources management. The researchers chose the higher education sector in Gaza to study the impact of
technology on human resource management because higher education institutions represent an ideal model for
studying environmental changes because they contribute primarily to the service and development of society,
Human, taking into account creativity, innovation, and scientific progress based on equality and equality and
promoting it to reach the level of excellence. The researchers identified the community of study by looking at
the higher education sector in Tamil Nadu, which is represented in normal educational institutions.
REVIEW OF LITERATURE
With the advancement of modern technology and computer applications, electronic management in human
resources has become an unavoidable requirement in human resources departments across all industries,
including higher education, to achieve positive results in improving employee performance and increasing
efficiency. Human resources management, as a modern management technique, necessitates a high level of
human resources, as well as a shift in management methods, organisational structures, and the development of
electronic infrastructure, for enterprises to improve their services and staff efficiency.
The higher education sector, which includes universities and colleges, plays a critical role in safeguarding
society and the state. Universities are a crucial component of the state, as they have a direct impact on
Palestinian society and play a significant role in supplying institutions and sectors. Universities are among the
most forward-thinking institutions when it comes to implementing new techniques and concepts in numerous
sectors to gain a competitive advantage. Even professionals who are up to date can contribute to the growth of
human resources and society, and the current study's problem is to find an answer to the following question:
What is the reality of human resources management at normal colleges in Tamil Nadu Strip?
244
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

OBJECTIVES
The study was conducted to identify the impact of EHRM on the administrative and operational performance of
the Institutions in Chennai. Also, the study investigates the important changes bought by the EHRM among the
institutional functions.
METHODOLOGY
The study used a descriptive research design, wherein the data was collected through survey methods from
Colleges adopting EHRM practices in Tamil Nadu. For the study, the data was collected from 411 faculties
belonging to 22 colleges by adopting a simple random sampling technique. The data was collected using a
structured questionnaire.
ANALYSIS AND INTERPRETATION
The analysis was conducted to identify the demographic profile of the respondents considered for the study.
Table No. 1: Percentage Analysis - Demographic Profile
Demographic Profile Frequency Percent
Gender Male 208 50.6
Female 203 49.4
Total 411 100.0
Age Less than 30 Years 81 19.7
30 - 40 Years 131 32.0
41 - 50 Years 107 26.0
Above 50 Years 92 22.3
Total 411 100.0
Experience Less than 3 Years 71 17.3
3 - 5 Years 134 32.6
5 - 7 Years 108 26.3
Above 7 Years 98 23.8
Total 411 100.0
Source: (Primary data)
Using the percentage analysis performed, it was found that an almost equal proportion of male and female
faculties are present in educational institutions. Also, most of the faculties were belonging to the age category
between 30- 40 Years with 3 – 7 Years of Experience.
The below analysis illustrate whether there is a significant difference in EHRM practices adopted by the
educational institution in Tamil Nadu.
Table No. 2: Multi-Variate Analysis – EHRM Practices
Multivariate Tests
Hypothesis
Effect Value F df Error df Sig.
D1 Pillai's Trace .045 1.839b 10 394 .052
Wilks' Lambda .955 1.839b 10 394 .052
Hotelling's Trace .047 1.839b 10 394 .052
b
Roy's Largest Root .047 1.839 10 394 .052
D2 Pillai's Trace .087 1.180 30 1188 .232
Wilks' Lambda .916 1.177 30 1157.144 .235
Hotelling's Trace .090 1.174 30 1178 .238
Roy's Largest Root .045 1.783c 10 396 .062
D3 Pillai's Trace .068 .912 30 1188 .603
Wilks' Lambda .934 .913 30 1157.144 .602
Hotelling's Trace .070 .914 30 1178 .600
Roy's Largest Root .045 1.783c 10 396 .062
Tests of Between-Subjects Effects
Type III Sum of Mean
Source Squares df Square F Sig.
D1 Better HRM Planning .038 1 .038 .051 .822

245
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Easy Compensation Delivery 6.138 1 6.138 12.468 .000


Increased Operational Control .210 1 .210 .263 .608
Reduced Workload .137 1 .137 .155 .694
Decreased Paperwork's 2.096 1 2.096 2.393 .123
Effective Staffing selection from
2.132 1 2.132 2.703 .101
scrutinized resumes
Able to provide Better Motivation to
.421 1 .421 .316 .574
Faculties
Scope for Developments 1.073 1 1.073 2.063 .152
Helps in Organizing the Managerial
.633 1 .633 .723 .396
Functions
Dataset maintenance made simple
2.202 1 2.202 5.219 .023
and effective
D2 Better HRM Planning 2.140 3 .713 .949 .417
Easy Compensation Delivery 2.112 3 .704 1.430 .233
Increased Operational Control 1.960 3 .653 .818 .484
Reduced Workload 2.942 3 .981 1.111 .344
Decreased Paperwork's 1.898 3 .633 .723 .539
Effective Staffing selection from
5.075 3 1.692 2.145 .094
scrutinized resumes
Able to provide Better Motivation to
2.155 3 .718 .539 .656
Faculties
Scope for Developments 1.703 3 .568 1.091 .353
Helps in Organizing the Managerial
2.293 3 .764 .873 .455
Functions
Dataset maintenance made simple
.945 3 .315 .746 .525
and effective
D3 Better HRM Planning 1.408 3 .469 .624 .600
Easy Compensation Delivery .344 3 .115 .233 .873
Increased Operational Control .340 3 .113 .142 .935
Reduced Workload .210 3 .070 .079 .971
Decreased Paperwork's 6.421 3 2.140 2.444 .064
Effective Staffing selection from
3.203 3 1.068 1.354 .257
scrutinized resumes
Able to provide Better Motivation to
.833 3 .278 .209 .890
Faculties
Scope for Developments 1.228 3 .409 .787 .502
Helps in Organizing the Managerial
4.633 3 1.544 1.765 .153
Functions
Dataset maintenance made simple
2.526 3 .842 1.996 .114
and effective
Source: (Primary data)
The significance value calculated using the Multivariate test was found to be greater than 0.05, meaning that,
the null hypothesis is accepted. Hereby, it can be perceived that there is no significant difference in EHRM
practices adopted by the educational institution in Tamil Nadu.
Having identified that there is no significant difference in EHRM practices adopted by the educational
institution in Tamil Nadu. Rank analysis was carried out to identify the importance of EHRM practice in
educational institutions.
Table No. 3: Rank Analysis – EHRM Practices
Rank Analysis
N Mean Rank
Better HRM Planning 411 3.8905 9
Easy Compensation Delivery 411 4.4307 1
Increased Operational Control 411 3.9635 4
246
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Reduced Workload 411 3.9124 7


Decreased Paperwork's 411 3.9562 5
Effective Staffing selection from scrutinized resumes 411 3.9489 6
Able to provide Better Motivation to Faculties 411 3.3747 10
Scope for Developments 411 4.3869 3
Helps in Organizing the Managerial Functions 411 3.8978 8
Dataset maintenance made simple and effective 411 4.4209 2
Source: (Primary data)
The rank analysis carried out using the mean score, it was found that Easy Compensation Delivery, Dataset
maintenance, Scope for Developments, Increased Operational Control and Decreased Paperwork was the
important functions where the EHRM practices had made a better contribution over conventional HRM.
The analysis depicted below indicates the EHRM performance in administrative and operative functions.
Table No. 4: Multi-Variate Analysis – EHRM Performance
Tests of Between-Subjects Effects
Dependent Variable: Administrative Functions
Source Type III Sum of Squares df Mean Square F Sig.
D1 1.510 1 1.510 2.502 .115
D2 1.661 3 .554 .917 .433
D3 1.495 3 .498 .825 .481
Tests of Between-Subjects Effects
Dependent Variable: Operative Functions
Source Type III Sum of Squares df Mean Square F Sig.
D1 .060 1 .060 .131 .718
D2 .575 3 .192 .419 .740
D3 1.791 3 .597 1.304 .273
Descriptive Statistics
N Mean
Administrative Functions 411 4.3820
Operative Functions 411 4.3917
Source: (Primary data)
The significance value calculated using the Multivariate test was found to be greater than 0.05, meaning that,
the null hypothesis is accepted. Hereby, there is no significant difference in opinion of the respondents for
EHRM Performance with administrative and operative functions. The mean score value was estimated to be
greater than 4, meaning the respondents ‘Agree’ that EHRM is helping the educational institution increase their
administrative and Operative Functions.
Herein regression analysis was carried out to identify whether EHRM practices impact the administrative and
operational performance of the Institutions in Chennai.
Table No. 5: Regression Analysis – EHRM Impact on Institutional Performance
Model Summary
Std. Error of the
Model R R Square Adjusted R Square Estimate
1 .498a .248 .244 .32091
a. Predictors: (Constant), Operative Functions, Administrative Functions
ANOVA
Sum of
Model Squares df Mean Square F Sig.
1 Regression 13.835 2 6.917 67.170 .000b
Residual 42.018 408 .103
Total 55.853 410
a. Dependent Variable: EHRM Performance
b. Predictors: (Constant), Operative Functions, Administrative Functions
Coefficientsa
247
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Unstandardized Standardized
Coefficients Coefficients
Std.
Model B Error Beta t Sig.
1 (Constant) 2.694 .120 22.377 .000
Administrative
.186 .021 .389 8.657 .000
Functions
Operative Functions .116 .024 .215 4.783 .000
a. Dependent Variable: EHRM Performance
Source: (Primary data)
The R-value, which is assessed to be 0.498, shows a 49.8 percentage correlation between EHRM practice,
Administrative Functions and Operative Functions. Furthermore, the derived R-Square value of 0.248 indicates
that the regression equation's forecasting accuracy is 24.8 percentage, implying that additional variables must be
addressed for estimating EHRM performance. Also, the coefficient significance value is found to be less than
0.05, this exemplifies that there is a significant impact of EHRM practices on administrative and operational
functions in the Institutions in Chennai.
FINDINGS AND CONCLUSION
From the analysis performed, it was found that an almost equal proportion of male and female faculties are
present in educational institutions. Also, most of the faculties were belonging to the age category between 30-
40 Years with 3 – 7 Years of Experience. Also, it can be perceived that there is no significant difference in
EHRM practices adopted by the educational institution in Tamil Nadu. Easy Compensation Delivery, Dataset
maintenance, Scope for Developments, Increased Operational Control and Decreased Paperwork was the
important functions where the EHRM practices had made a better contribution over conventional HRM. Also,
the study indicates that the respondents ‘Agree’ that EHRM is helping the educational institution increase their
administrative and Operative Functions. Further the study exemplifies that there is a significant impact of
EHRM practices on administrative and operational functions in the Institutions in Chennai.
REFERENCES

AUTHOR DETAILS:
1
S. SAKTHI KAMAL NATHAN, 2DR. D. JAGADEESAN AND 3DR. R. KARTHI
1
Research Scholar, Department of Business Administration, Annamalai University, Chidambaram
2
Assistant professor, Department of Business Administration, Arignar Anna Government Arts College, Attur,
Salem
3
Professor, Department of Management Studies, E.G.S. Pillay Engineering College, Nagapattinam

248
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

POWER DOMINATOR CHROMATIC NUMBER FOR CENTRAL GRAPH, SUBDIVISION GRAPH


FAMILY

A. UMA MAHESWARI, BALA SAMUVEL J* AND S. AZHAGARASI

ABSTRACT
In Graph Theory, an electric power system will be monitored using minimum number of phase measuring units
(PMUs) gave rise to the domination problem in graph theory called power domination. Later dominator
coloring was found by relating coloring problem and domination problem. On linking dominator coloring and
power domination gave rise to power dominator coloring. Here, we investigate the power dominator chromatic
number for central graphs and subdivision graphs such as path, cycle, bipartite graph.
Keywords: Power dominator coloring, Central Graph, Subdivision Graph, Path, Cycle, Star graph
AMS Mathematics Subject Classification (2010): 05C15, 05C69

1 INTRODUCTION
In graph theory, an electric power system will be monitored using minimum number of phase measuring units
(PMUs) gave rise to the domination problem in graph theory called power domination [[1], [2], [3]].
Later dominator coloring [[4], [5]] was found by relating coloring problem and domination problem. On linking
dominator coloring and power domination, K. Sathish Kumar et al found power dominator coloring [6]. A. Uma
Maheswari and Bala Samuvel J. continued to study more about power dominator chromatic number (PDCN) for
various graphs and extended the study in vertex operations of graph [[7], [8]].
The monitoring set of the graph G is defined as, “For a vertex, a monitoring set M(v) [2] is associated as
follows:
Step (i): M (v) = N[v], the closed neighborhood on v
Step (ii): Add a vertex u to M (v), (which is not in M (v)) whenever u has a neighbor w M (v) such that all the
neighbors of w other than u, are already in M (v)
Step (iii): Repeat step (ii) if no other vertex could be added to M (v).”
Then, the vertices in M (v) are power dominated by vertex𝑣.
And if a vertex v dominates [9] another vertex u in the graph G, then u is power dominated by v in G but the
converse need not be true. The graphs we consider in this paper are simple, undirected, loops and without
multiple edges. And the basic definitions required here are used from [10].
In this paper, we investigate the power dominator chromatic number for central graphs and subdivision of
graphs such as path, cycle, bipartite graph. And proper examples are given to illustrate the results
1.1 Preliminaries
The definitions used in this paper are recalled below.
Definition 1: Dominator Coloring
A dominator coloring [[5], [11], [12], [13]] of a graph is a coloring which is proper such that each vertex
dominates every vertex of at least one color class. 𝜒𝑑 (𝐺) the Dominator chromatic number of a graph is the
least number of color classes required in a dominator coloring of G.
Definition 2: Power Dominator Coloring
The power dominator coloring [[6],[7]] of G is a proper coloring of G, such that each vertex of G power
dominates some color class. 𝜒𝑝𝑑 (𝐺) The power dominator chromatic number (PDCN) is the least number of
color classes required in a power dominator coloring.
Definition 3: Subdivision Graph
The subdivision graph is the graph attained by inserting a vertex for each pair of vertices which are adjacent in
graph G. Subdivision of graph G, is represented by S(G)

249
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Definition 4: Central Graph


The central graph of graph G, denoted by C(G) is attained by inserting a vertex for each pair of vertices which
are adjacent in G, and linking all the vertices of G which are non-adjacent in C(G) with an Edge.
2. MAIN RESULTS
2.1 Subdivision of Graphs
Lemma 1: For the subdivision graph of path, the power dominator chromatic number is 2.
Note: The result will follow the procedure in [6], for 𝑃𝑛 has n vertices and 𝑆(𝑃𝑛 ) has 2𝑛 − 1 vertices. Thus,
follow same proof.
The PDCN of the subdivision graph of path is 2
Lemma 2: For the subdivision graph of cycle, the power dominator chromatic number is 𝜒𝑝𝑑 (𝑆(𝐶𝑛 )) =
2, 𝑤ℎ𝑒𝑛 𝑛 𝑖𝑠 𝑒𝑣𝑒𝑛
{ }.
3, 𝑤ℎ𝑒𝑛 𝑛 𝑖𝑠 𝑜𝑑𝑑
Note: The result will follow the procedure in [6], for 𝐶𝑛 has n vertices and 𝑆(𝐶𝑛 ) has 2𝑛 vertices. Thus, follow
same proof.
2, 𝑤ℎ𝑒𝑛 𝑛 𝑖𝑠 𝑒𝑣𝑒𝑛
The PDCN of the subdivision graph of cycle is 𝜒𝑝𝑑 (𝑆(𝐶𝑛 )) = { }
3, 𝑤ℎ𝑒𝑛 𝑛 𝑖𝑠 𝑜𝑑𝑑
Theorem 3: For the subdivision graph of complete graph 𝐾𝑛 , 𝑛 ≥ 3, the power dominator chromatic number is
𝑛.
Proof: Let 𝐾𝑛 be the complete graph with 𝑛 nodes. Let 𝑣1 , 𝑣2 , 𝑣3 , 𝑣4 , … , 𝑣𝑛 be the vertices of complete graph
𝑛(𝑛−1)
𝐾𝑛 . Let vertices {𝑢1′ , 1 ≤ 𝑖 ≤ 2 }. are newly added when subdividing every edge with a new vertex.
𝑛(𝑛−1)
Therefore, total vertices in 𝑆(𝐾𝑛 ) is |𝑉(𝑆(𝐾𝑛 ))| = 𝑛 + 2
.
𝑛(𝑛−1)
For the proper coloring, Assign 𝑐1 to all the newly added vertices {𝑢1′ , 1 ≤ 𝑖 ≤ 2 }. Color the vertices 𝑣1 , 𝑣2
with 𝑐2 , and all the vertices 𝑣𝑖 , 3 ≤ 𝑖 ≤ 𝑛 are colored with 𝑐𝑖 , 3 ≤ 𝑖 ≤ 𝑛. Thus, the coloring is proper. Newly
added vertices will power dominate at least one of the color classes 𝑐𝑖 , 2 ≤ 𝑖 ≤ 𝑛.
For the subdivision graph of complete graph𝑆(𝐾𝑛 ), 𝑛 ≥ 3, Then the PDCN is 𝜒𝑝𝑑 (𝑆(𝐾𝑛 )), 𝑛 ≥ 3 is 𝑛.
Theorem 4: For the subdivision graph of star graph𝐾1,𝑛 , 𝑛 ≥ 2, the power dominator coloring is 3.
Proof: Let 𝐾1,𝑛 be the star graph with 𝑛 nodes. Let 𝑣0 , 𝑣1 , 𝑣2 , 𝑣3 , 𝑣4 , … , 𝑣𝑛 be the vertices of star graph𝐾1,𝑛 . Let
vertices {𝑢1′ , 1 ≤ 𝑖 ≤ 𝑛} are newly added when subdividing every edge with a new vertex. Therefore, total
vertices in 𝑆(𝐾1,𝑛 ) is|𝑉 (𝑆(𝐾1,𝑛 ))| = 2𝑛 + 1.

For the proper coloring, Assign 𝑐2 to all the newly added vertices {𝑢1′ , 1 ≤ 𝑖 ≤ 𝑛}. Color the vertices 𝑣0 , with
𝑐1 , and all the vertices 𝑣𝑖 , 1 ≤ 𝑖 ≤ 𝑛 are colored with 𝑐3 .
Thus, the coloring is proper. Newly added vertices and all pendent vertices will power dominate color classes
𝑐0 , by the given definition of PDC.
For the Subdivision graph of Star graph 𝑆(𝐾1,𝑛 ), 𝑛 ≥ 2, Then the PDCN𝜒𝑝𝑑 (𝑆(𝐾𝑛 )), 𝑛 ≥ 2 is 3 .
Theorem 5: For the Subdivision graph of complete bipartite graph 𝐾𝑚,𝑛 , 𝑚, 𝑛 ≥ 2, the power dominator
𝑚 + 2, 𝑖𝑓 𝑚 ≤ 𝑛
coloring, 𝜒𝑝𝑑 (𝑆(𝐾𝑚,𝑛 )) = {
𝑛 + 2 , 𝑖𝑓 𝑛 < 𝑚
Proof: Let 𝐾𝑚,𝑛 be the complete bipartite graph with 𝑚 + 𝑛 nodes. Let 𝑉1 = {𝑣1 , 𝑣2 , 𝑣3 , … , 𝑣𝑛 } and 𝑉2 =
{𝑣𝑛+1 , 𝑣𝑛+2 , 𝑣𝑛+3 , 𝑣𝑛+4 , … , 𝑣𝑚+𝑛 } be the vertices of complete bipartite graph 𝐾𝑚,,𝑛 . Let vertices {𝑢1′ , 1 ≤ 𝑖 ≤
𝑚𝑛} are newly added when subdividing every edge with a new vertex to get subdivision of complete bipartite
graph 𝐾𝑚,𝑛 . Therefore, total vertices in 𝑆(𝐾𝑚,𝑛 ) is |𝑉 (𝑆(𝐾𝑚,𝑛 ))| = 𝑚 + 𝑛 + 𝑚𝑛. Depending upon number of
vertices in 𝑉1 & 𝑉2 we will have two cases.
Case i: When 𝑚 ≤ 𝑛
250
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

For the proper coloring, Assign 𝑐𝑖 to all the vertices 𝑣𝑖 , 1 ≤ 𝑖 ≤ 𝑚. Color the vertices 𝑣𝑗 , 𝑚 + 1 ≤ 𝑗 ≤ 𝑚 + 𝑛,
with 𝑐𝑚+1 , and all the newly added vertices 𝑢𝑘′ , 1 ≤ 𝑘 ≤ 𝑚𝑛 are colored with 𝑐𝑚+3 .
Thus, the coloring is proper. Newly added vertices and all pendent vertices will power dominate color classes
𝑐𝑖 , by the given definition of PDC. Then the PDCN of the Subdivision graph of complete bipartite graph is
𝑚 + 3.
Case ii: When 𝑛 ≤ 𝑚
For the proper coloring, Assign 𝑐𝑖 to all the vertices 𝑣𝑖 , 1 ≤ 𝑖 ≤ 𝑛. Color the vertices 𝑣𝑗 , 𝑛 + 1 ≤ 𝑗 ≤ 𝑚 + 𝑛,
with 𝑐𝑛+1 , and all the newly added vertices 𝑢𝑘′ , 1 ≤ 𝑘 ≤ 𝑚𝑛 are colored with 𝑐𝑛+3 .
Thus, the coloring is proper. Newly added vertices and all pendent vertices will power dominate color classes
𝑐𝑖 , by the given definition of PDC. Then the PDCN of the Subdivision graph of complete bipartite graph is
𝑛 + 3.
For the Subdivision graph of complete bipartite graph 𝐾𝑚,𝑛 , 𝑚, 𝑛 ≥ 2, Then the PDCN
𝑚 + 2, 𝑖𝑓 𝑚 ≤ 𝑛
𝜒𝑝𝑑 (𝑆(𝐾𝑚,𝑛 )) 𝑖𝑠 {
𝑛 + 2 , 𝑖𝑓 𝑛 < 𝑚
2𝑛
Theorem 6: For the Gear graph 𝐺𝑛 , 𝑛 ≥ 3, the power dominator chromatic number is 𝜒𝑝𝑑 (𝐺𝑛 ) = {⌈ 3 ⌉ + 2

Proof: Let 𝐺𝑛 be the Gear Graph attained when a new vertex added between every pair of adjacent vertices on
the outer cycle of a wheel graph 𝑊1,𝑛 . Let 𝑉(𝐺𝑛 ) = {𝑣𝑖 , 0 ≤ 𝑖 ≤ 2𝑛}, where 𝑣0 is an apex vertex. Let the
|𝑉(𝐺𝑛 )| = 2𝑛 + 1 and |𝐸(𝐺𝑛 )| = 3𝑛. Assignment of colors for proper coloring is as follows
Based on number of vertices 𝑛 we will have three cases.
Case (i): When 𝑛 = 3𝑡, 𝑡 ≥ 1
Color apex vertex 𝑣0 with 𝑐1 and color 𝑐2 will be assigned to vertices of 𝑣1 and 𝑣3 . And the vertices 𝑣2𝑖+2 ,
2𝑛−1
0 ≤ 𝑖 ≤ 𝑛 − 1, are colored by 𝑐3 . Colors 𝑐2𝑖+2 are assigned to the vertices 𝑣6𝑖−1 , 1 ≤ 𝑖 ≤ 6 . The vertices
𝑛−3 𝑖−3 2𝑛
𝑣2𝑖−1 𝑎𝑛𝑑 𝑣2𝑖+1 , 𝑖 = 3𝑘 + 1, 1 ≤ 𝑘 ≤ , are colored by 𝑐𝑖 , 𝑖 = [2 ( )]. and 𝑣2𝑛 is colored by ⌈ 3 ⌉ + 2.
3 3

The coloring is proper as 𝑣1 power dominates its own color class and odd subscripted vertices power dominate
the color class 𝑐1 . The vertices 𝑣𝑖 , 𝑖 = 2, 8, 14, . . . , 2𝑛 − 4 power dominates color class of 𝑣(𝑖−1) and the
vertices 𝑣𝑖 and 𝑣𝑖+2 , 𝑖 = 4, 10, 16, . . ., 2𝑛 − 3 power dominate the color class of 𝑣𝑖 .
2𝑛
Therefore, For the Gear graph 𝐺𝑛 , 𝑛 = 3𝑡, 𝑡 ≥ 1, Then the PDCN 𝜒𝑝𝑑 (𝐺𝑛 ) 𝑖𝑠 {⌈ 3 ⌉ + 2

Case (ii): When 𝑛 = 3𝑡 + 1, 𝑡 ≥ 1


Color apex vertex 𝑣0 with 𝑐1 and color 𝑐2 will be assigned to vertices of 𝑣1 and 𝑣3 . And the vertices 𝑣2𝑖+2 ,
𝑛−1
0 ≤ 𝑖 ≤ 𝑛 − 1, are colored by 𝑐3 . Colors 𝑐2𝑖+2 are assigned to the vertices 𝑣6𝑖−1 , 1 ≤ 𝑖 ≤ 3 . The vertices
𝑛−4 𝑖−3 2𝑛
𝑣2𝑖−1 𝑎𝑛𝑑 𝑣2𝑖+1 , 𝑖 = 3𝑘 + 1, 1 ≤ 𝑘 ≤ 3
, are colored by 𝑐𝑖 , 𝑖 = [2 (
3
)]. and 𝑣2𝑛 is colored by ⌈ 3 ⌉ + 2.

The coloring is proper as 𝑣1 power dominates its own color class and odd subscripted vertices power dominate
the color class 𝑐1 . The vertices 𝑣𝑖 , 𝑖 = 2, 8, 14, . . . , 2𝑛 power dominates color class of 𝑣(𝑖−1) and the vertices
𝑣𝑖 and 𝑣𝑖+2 , 𝑖 = 4, 10, 16, . . ., 2𝑛 − 4 power dominate the color class of 𝑣𝑖+1.
2𝑛
Therefore, for the gear graph 𝐺𝑛 , 𝑛 = 3𝑡 + 1, 𝑡 ≥ 1 Then the PDCN, 𝜒𝑝𝑑 (𝐺𝑛 ) 𝑖𝑠 {⌈ ⌉ + 2
3

Case (iii): When 𝑛 = 3𝑡 + 2, 𝑡 ≥ 1


Color apex vertex 𝑣0 with 𝑐1 and color 𝑐2 will be assigned to vertices of 𝑣1 and 𝑣3 . And the vertices 𝑣2𝑖+2 ,
𝑛−2
0 ≤ 𝑖 ≤ 𝑛 − 2, are colored by 𝑐3 . Colors 𝑐2𝑖+2 are assigned to the vertices 𝑣6𝑖−1 , 1 ≤ 𝑖 ≤ 3 . The vertices
𝑛−3 𝑖−3 2𝑛
𝑣2𝑖−1 𝑎𝑛𝑑 𝑣2𝑖+1 , 𝑖 = 3𝑘 + 1, 1 ≤ 𝑘 ≤ 3
, are colored by 𝑐𝑖 , 𝑖 = [2 ( )]. And 𝑣2𝑛 is colored by ⌈ 3 ⌉ + 2.
3

The coloring is proper as 𝑣1 power dominates its own color class and odd subscripted vertices power dominate
the color class 𝑐1 . The vertices 𝑣𝑖 , 𝑖 = 2, 8, 14, . . . , 2𝑛 − 2 power dominates color class of 𝑣(𝑖−1) and the

251
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

vertices 𝑣𝑖 and 𝑣𝑖+2 , 𝑖 = 4, 10, 16, . . ., 2𝑛 − 4 power dominate the color class of 𝑣𝑖+1. and the vertex 𝑣2𝑛+1
power dominates its own color class. For the Gear graph 𝐺𝑛 , 𝑛 = 3𝑡 + 1, 𝑡 ≥ 1, Then the PDCN,
2𝑛
𝜒𝑝𝑑 (𝐺𝑛 ) 𝑖𝑠 {⌈ 3 ⌉ + 2.
2𝑛
Therefore, for the gear graph 𝐺𝑛 , 𝑛 ≥ 3, the power dominator coloring, 𝜒𝑝𝑑 (𝐺𝑛 ) = {⌈ 3 ⌉ + 2.

Theorem 7: For the Subdivision graph of Wheel graph 𝑆(𝑊1,𝑛 ), 𝑛 ≥ 3, the power dominator chromatic number
2𝑛
𝜒𝑝𝑑 (𝑆(𝑊1,𝑛 )) = {⌈ 3 ⌉ + 2

Proof: Let 𝑊1,𝑛 be the Wheel Graph. Let vertices {𝑣𝑖 , 0 ≤ 𝑖 < 𝑛} be the vertices of Wheel Graph and Vertex 𝑣0
being an apex vertex of a wheel graph. Subdivision Graph of Wheel graph attained when a new vertex {𝑢𝑖′ , 1 ≤
𝑖 ≤ 𝑛} added between every pair of adjacent vertices {𝑣𝑖 𝑎𝑛𝑑 𝑣𝑖+1 , 1 ≤ 𝑖 ≤ 𝑛} and vertex {𝑢𝑖′ /𝑛 + 1 ≤ 𝑖 ≤
2𝑛} added between every pair of adjacent vertices {𝑣0 𝑎𝑛𝑑 𝑣𝑖 , 1 ≤ 𝑖 ≤ 𝑛} and on the wheel graph 𝑊1,𝑛 . Let
𝑉(𝑆(𝑊1𝑛 )) = {𝑣𝑖 , 0 ≤ 𝑖 ≤ 𝑛} ∪ {𝑢𝑖′ , 1 ≤ 𝑖 ≤ 2𝑛}, where 𝑣0 is an apex vertex. Let the |𝑉(𝑆(𝑊1𝑛 ))| =
3𝑛 + 1. Assignment of colors for proper coloring is as follows
Based on number of vertices 𝑛 we will have three cases.
Case (i): When 𝑛 = 3𝑡, 𝑡 ≥ 1
The newly added vertices {𝑢𝑖′ , 1 ≤ 𝑖 ≤ 2𝑛}are colored with the color 𝑐1 . An apex vertex 𝑣0 colored with color
𝑛−3 𝑛−1
𝑐2 . The vertices 𝑣𝑖 and 𝑣𝑖+1 , 𝑖 = 3𝑘 + 1, 0 ≤ 𝑘 ≤ 3 are colored with color 𝑐2𝑘+3 , 0 ≤ 𝑘 ≤ 3 . The other
𝑛
vertices 𝑣𝑙 , 𝑙 = 3𝑘, 1 ≤ 𝑘 ≤ 3 are colored by color 𝑐(2𝑙)+2.
3
𝑛−3
The vertices 𝑣𝑖 and 𝑣𝑖+1 , 𝑖 = 3𝑘 + 1, 0 ≤ 𝑘 ≤ will power dominate the color classes 𝑐2𝑘+3 , 0 ≤ 𝑘 ≤
3
𝑛−1 𝑛−1
. The vertices newly added vertices {𝑢𝑖′ , 1 ≤ 𝑗 ≤ 𝑛}, power dominate the color classes 𝑐2𝑘+3 , 0 ≤ 𝑘 ≤ 3 .
3
Other newly added vertices {𝑢𝑖′ , 𝑛 + 1 ≤ 𝑗 ≤ 2𝑛}, power dominate the color class 𝑐2 . Remaining vertices
𝑛
𝑣𝑙 , 𝑙 = 3𝑘, 1 ≤ 𝑘 ≤ power dominate themselves.
3
2𝑛
For the Subdivision graph of wheel graph 𝑆(𝑊1,𝑛 ), 𝑛 = 3𝑡, 𝑡 ≥ 1, Then the PDCN 𝜒𝑝𝑑 (𝐺𝑛 ) 𝑖𝑠 {⌈ 3 ⌉ + 2

Case (ii) When 𝑛 = 3𝑡 + 1, 𝑡 ≥ 1


The newly added vertices {𝑢𝑖′ , 1 ≤ 𝑖 ≤ 2𝑛}are colored with the color 𝑐1 . An apex vertex 𝑣0 colored with color
𝑛−3 𝑛−4
𝑐2 . The vertices 𝑣𝑖 and 𝑣𝑖+1 , 𝑖 = 3𝑘 + 1, 0 ≤ 𝑘 ≤ 3 are colored with color 𝑐2𝑘+3 , 0 ≤ 𝑘 ≤ 3 . The other
𝑛−1
vertices 𝑣𝑙 , 𝑙 = 3𝑘, 1 ≤ 𝑘 ≤ are colored by color 𝑐(2𝑙)+2 and vertex 𝑣𝑛 is colored by color 𝑐⌈2n⌉ +2 .
3 3 3

𝑛−4
The vertices 𝑣𝑖 and 𝑣𝑖+1 , 𝑖 = 3𝑘 + 1, 0 ≤ 𝑘 ≤ will power dominate the color classes 𝑐2𝑘+3 , 0 ≤ 𝑘 ≤
3
𝑛−2 𝑛−1
3
. The vertices newly added vertices {𝑢𝑖′ , 1 ≤ 𝑗 ≤ 𝑛}, power dominate the color classes 𝑐2𝑘+3 , 0 ≤ 𝑘 ≤ 3 .
Other newly added vertices {𝑢𝑖′ , 𝑛 + 1 ≤ 𝑗 ≤ 2𝑛}, power dominate the color class 𝑐2 . Remaining vertices
𝑛−1
𝑣𝑙 , 𝑙 = 3𝑘, 1 ≤ 𝑘 ≤ 3 and vertex 𝑣𝑛 power dominate themselves.
2𝑛
For the subdivision graph of wheel graph 𝑆(𝑊1,𝑛 ), 𝑛 = 3𝑡 + 1, 𝑡 ≥ 1, Then the PDCN 𝜒𝑝𝑑 (𝐺𝑛 ) 𝑖𝑠 {⌈ ⌉ + 2
3

Case (iii) When 𝑛 = 3𝑡 + 2, 𝑡 ≥ 1


The newly added vertices {𝑢𝑖′ , 1 ≤ 𝑖 ≤ 2𝑛}are colored with the color 𝑐1 . An apex vertex 𝑣0 colored with color
𝑛−5 𝑛−4
𝑐2 . The vertices 𝑣𝑖 and 𝑣𝑖+1 , 𝑖 = 3𝑘 + 1, 0 ≤ 𝑘 ≤ 3 are colored with color 𝑐2𝑘+3 , 0 ≤ 𝑘 ≤ 3 . The other
𝑛−2
vertices 𝑣𝑙 , 𝑙 = 3𝑘, 1 ≤ 𝑘 ≤ are colored by color 𝑐(2𝑙)+2 and vertices 𝑣𝑛−1 , 𝑣𝑛 are colored by color
3 3
𝑐⌈2n⌉ +1 𝑎𝑛𝑑 color 𝑐⌈2n⌉ +2 respectively.
3 3
𝑛−5
The vertices 𝑣𝑖 and 𝑣𝑖+1 , 𝑖 = 3𝑘 + 1, 0 ≤ 𝑘 ≤ will power dominate the color classes 𝑐2𝑘+3 , 0 ≤ 𝑘 ≤
3
𝑛−2 𝑛−4
. The vertices newly added vertices {𝑢𝑖′ , 1 ≤ 𝑗 ≤ 𝑛}, power dominate the color classes 𝑐2𝑘+3 , 0 ≤ 𝑘 ≤ .
3 3
252
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Other newly added vertices {𝑢𝑖′ , 𝑛 + 1 ≤ 𝑗 ≤ 2𝑛}, power dominate the color class 𝑐2 . Remaining vertices
𝑛−2
𝑣𝑙 , 𝑙 = 3𝑘, 1 ≤ 𝑘 ≤ 3 and vertex 𝑣𝑛−1 , 𝑣𝑛 power dominate themselves

For the subdivision graph of wheel graph 𝑆(𝑊1,𝑛 ), 𝑛 = 3𝑡 + 2, 𝑡 ≥ 1, Then the PDCN
2𝑛
𝜒𝑝𝑑 (𝑆(𝑊1,𝑛 )) 𝑖𝑠 {⌈ 3 ⌉ + 2. Thus, every vertex will power dominate vertices some color class.

Therefore, for the subdivision graph of wheel 𝑆(𝑊1𝑛 ), 𝑛 ≥ 3, the power dominator coloring, 𝜒𝑝𝑑 (𝑊1,𝑛 ) =
2𝑛
{⌈ 3 ⌉ + 2.

2.2 Central Graphs


Theorem 8: For the central graph of Path 𝑃𝑛 , 𝑛 ≥ 3, the power dominator coloring, 𝜒𝑝𝑑 (𝐶(𝑃𝑛 )) =
𝑛
⌈2 ⌉ + 1, 𝑖𝑓 𝑛 𝑖𝑠 𝑂𝑑𝑑
{ 𝑛
⌈2 ⌉ + 2, 𝑖𝑓 𝑛 𝑖𝑠 𝐸𝑣𝑒𝑛

Proof: Let path 𝑃𝑛 with n vertices, let the n vertices be 𝑣1 , 𝑣2 , … , 𝑣𝑛 . And |𝑉(𝑃𝑛 )| = 𝑛 and |𝐸(𝑃𝑛 )| = 𝑛 − 1.
For constructing central graph of path 𝐶(𝑃𝑛 ), add a vertex between every pair of adjacent vertices of 𝑃𝑛 . And
join all non-adjacent vertices of 𝑃𝑛 with an edge in 𝐶(𝑃𝑛 ).
Case (i) When 𝑛 = 3
Let 𝐶(𝑃3 ) has 𝑣1 , 𝑣2 , 𝑣3 be vertices of path 𝑃𝑛 and newly added vertices 𝑢1′ , 𝑢2′ be the subdivided vertices. For
the proper power dominator coloring, Assign color 𝑐1 to vertices 𝑣1 , 𝑣2 . Color vertices 𝑢1′ , 𝑢2′ with color 𝑐2 .
Color 𝑣3 with 𝑐3 .
The vertices 𝑣1 & 𝑣2 power dominate the color class 𝑐2 = {𝑢1′ , 𝑢2′ } and 𝑐3 = {𝑣3 }. Vertices 𝑣1′ & 𝑣2′ power
dominate the color class 𝑐1 = {𝑣1 , 𝑣2 } and 𝑐3 = {𝑣3 }. Vertex 𝑣3 will power dominate 𝑐3 = {𝑣3 } , 𝑐1 = {𝑣1 , 𝑣2 }
and 𝑐2 = {𝑢1′ , 𝑢2′ }.
Thus, For the Path 𝑃3 , 𝑛 ≥ 3, the power dominator coloring is 3.
Case (ii) When 𝑛 = 4
Let 𝐶(𝑃3 ) has 𝑣1 , 𝑣2 , 𝑣3 , 𝑣4 be vertices of path 𝑃4 and newly added vertices 𝑢1′ , 𝑢2′ , 𝑢3′ be the subdivided
vertices. For the proper power dominator coloring, Assign color 𝑐1 to vertices 𝑣1 . Color vertices 𝑢1′ with color
𝑐2 . Color vertices 𝑢2′ , 𝑢3′ with color 𝑐1 . Color 𝑣3 with 𝑐2 . Vertices 𝑣2 , 𝑣4 are colored by 𝑐3 & 𝑐4 respectively.
The vertices 𝑣1 power dominate the color class 𝑐4 = {𝑣4 }. Vertices 𝑢1′ & 𝑢2′ power dominate the color class
𝑐3 = {𝑣2 }. Vertex 𝑣2 will power dominate itself and 𝑐4 = {𝑣4 }. Vertex 𝑢3′ will power dominate color class
𝑐1 = {𝑣1 , 𝑢2′ , 𝑢3′ }. Vertex 𝑢3′ will power dominate color class 𝑐4 = {𝑣4 }.
Thus, For the central graph of Path 𝑃4 , Then the PDCN 𝜒𝑝𝑑 (𝐶(𝑃4 )) 𝑖s 4.
Case (iii) When 𝑛 = 5
Let 𝐶(𝑃5 ) has 𝑣1 , 𝑣2 , 𝑣3 , 𝑣4 , 𝑣5 be vertices of path 𝑃5 and newly added vertices 𝑢1′ , 𝑢2′ , 𝑢3′ , 𝑢4′ be the subdivided
vertices. For the proper power dominator coloring, Assign color 𝑐1 to vertices 𝑣1 . Color vertex 𝑣1′ with color
𝑐2 . Color vertices 𝑢2′ , 𝑢3′ , 𝑢4′ with color 𝑐1 . Color vertices 𝑣3 , 𝑣5 with 𝑐2 . Vertices 𝑣2 , 𝑣4 are colored by 𝑐3 & 𝑐4
respectively.
The vertices 𝑣1 power dominate the color class 𝑐4 = {𝑣4 }. Vertices 𝑢1′ & 𝑢2′ power dominate the color class
𝑐3 = {𝑣2 }. Vertex 𝑣2 will power dominate itself and 𝑐4 = {𝑣4 }. Vertex 𝑣3′ will power dominate color class
𝑐1 = {𝑣1 , 𝑢2′ , 𝑢3′ }. Vertex 𝑢3′ , 𝑢4′ , 𝑣5 will power dominate color class 𝑐4 = {𝑣4 }. Thus, for the central graph of
Path 𝑃5 , Then the PDCN 𝜒𝑝𝑑 (𝐶(𝑃5 )) 𝑖s 4.
Case (iv) When 𝑛 ≥ 7, and 𝑛 is 𝑂𝑑𝑑
Let 𝐶(𝑃𝑛 ) has 𝑣1 , 𝑣2 , 𝑣3 , 𝑣4 , … , 𝑣𝑛 be vertices of path 𝑃𝑛 and newly added vertices {𝑢1′ , 1 ≤ 𝑖 ≤ 𝑛 − 1} be the
subdivided vertices. For the proper power dominator coloring, Assign color 𝑐1 to vertices 𝑣1 . Color vertex 𝑢1′
with color 𝑐2 . Color vertices 𝑢2′ , 𝑢3′ , 𝑢4′ , 𝑢6′ , … , 𝑢𝑛−1

with color 𝑐1 . Color vertices 𝑣3 , 𝑣5 , 𝑣7 , . , 𝑣𝑛 with 𝑐2 .
Vertices 𝑣2 , 𝑣4 , 𝑣6 , 𝑣8 , … , 𝑣𝑛−1 are colored by 𝑐3 , 𝑐4 , 𝑐5 , … , 𝑐⌈n⌉+1 respectively.
2

253
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The vertices 𝑣1 power dominate the color class 𝑐4 = {𝑣4 }. Vertices 𝑢𝑖′ & 𝑢𝑖+1

power dominate the color class
𝑐𝑖+3 = {𝑣𝑖 }, 1 ≤ 𝑖 ≤ 𝑛 − 1. Vertex 𝑣2 , 𝑣4 , 𝑣6 will power dominate itself and 𝑐𝑖+3 = {𝑣𝑖+3 } 1 ≤ 𝑖 ≤ 𝑛 − 1.
𝑛
Thus, For the central graph of path 𝑃𝑛 , 𝑛 ≥ 7, and is odd, Then the PDCN 𝜒𝑝𝑑 (𝐶(𝑃𝑛 )) 𝑖𝑠 ⌈2 ⌉ + 1.

Case (v) When 𝑛 ≥ 6, and 𝑛 is 𝐸𝑣𝑒𝑛


Let 𝐶(𝑃𝑛 ) has 𝑣1 , 𝑣2 , 𝑣3 , 𝑣4 , … , 𝑣𝑛 be vertices of path 𝑃𝑛 and newly added vertices {𝑢1′ , 1 ≤ 𝑖 ≤ 𝑛 − 1} be the
subdivided vertices. For the proper power dominator coloring, Assign color 𝑐1 to vertices 𝑣1 . Color vertex 𝑢1′
with color 𝑐2 . Color vertices 𝑢2′ , 𝑢3′ , 𝑢4′ , 𝑢6′ , … , 𝑢𝑛−1

with color 𝑐1 . Color vertices 𝑣3 , 𝑣5 , 𝑣7 , . , 𝑣𝑛 with 𝑐2 .
Vertices 𝑣2 , 𝑣4 , 𝑣6 , 𝑣8 , … , 𝑣𝑛−1 are colored by 𝑐3 , 𝑐4 , 𝑐5 , … , 𝑐⌈n⌉+2 respectively.
2

The vertices 𝑣1 power dominate the color class 𝑐4 = {𝑣4 }. Vertices 𝑢𝑖′ & 𝑢𝑖+1 ′
power dominate the color class
𝑐𝑖+3 = {𝑣𝑖 }, 1 ≤ 𝑖 ≤ 𝑛 − 1. Vertex 𝑣2 , 𝑣4 , 𝑣6 … , 𝑣(𝑛−1) will power dominate itself and 𝑐𝑖+3 = {𝑣𝑖+3 } 1 ≤ 𝑖 ≤
𝑛 − 1. Vertex 𝑣2 , 𝑣4 , 𝑣6 … , 𝑣(𝑛−1) will power dominate itself and 𝑐𝑖+3 = {𝑣𝑖+3 } 1 ≤ 𝑖 ≤ 𝑛 − 1. The
vertex𝑣3 , 𝑣5 , 𝑣7 … , 𝑣𝑛 dominate the color class of either 𝑣𝑖+3 , 𝑣𝑖−3 , 𝑖 = 3,5,7, … 𝑛 or both.
𝑛
Thus, For the central graph of Path 𝑃𝑛 , 𝑛 ≥ 6 the power dominator coloring 𝜒𝑝𝑑 (𝐶(𝑃𝑛 )) = ⌈2 ⌉ + 2.

Theorem 9: For the central graph of cycle 𝐶𝑛 , 𝑛 ≥ 3, the power dominator coloring 𝜒𝑝𝑑 (𝐶(𝐶𝑛 )) =
2, 𝑖𝑓 𝑛 = 3
{ 2n
⌈ ⌉ + 1 , 𝑜𝑡ℎ𝑒𝑟 𝑤𝑖𝑠𝑒
3

Proof: Let Cycle 𝐶𝑛 with n vertices, let the 𝑛 vertices be 𝑣1 , 𝑣2 , … , 𝑣𝑛 . And |𝑉(𝐶𝑛 )| = 𝑛 and |𝐸(𝐶𝑛 )| = 𝑛.
For constructing central graph of cycle (𝐶𝑛 ) , add a vertex {𝑢𝑖′ , 1 ≤ 𝑖 ≤ 𝑛 − 1} between every pair of
adjacent vertices {(𝑣𝑖 , 𝑣𝑖+1 ), 1 ≤ 𝑖 ≤ 𝑛 − 1} of 𝐶𝑛 . Add vertex 𝑢𝑛′ to the pair of adjacent vertices (𝑣𝑛−1 , 𝑣𝑛 ),
And join all non-adjacent vertices of 𝐶𝑛 with an edge in 𝐶(𝐶𝑛 ).
Case (i) When 𝑛 = 3
Let 𝐶(𝐶3 ) has 𝑣1 , 𝑣2 , 𝑣3 be vertices of Cycle 𝐶𝑛 and newly added vertices 𝑢1′ , 𝑢2′ , 𝑢3′ be the subdivided vertices.
For the proper power dominator coloring, Assign color 𝑐1 to vertices 𝑣1 , 𝑣2 , 𝑣3 . Color vertices 𝑢1′ , 𝑢2′ , 𝑢3′ with
color 𝑐2 .
The vertices 𝑣1 , 𝑣2 𝑎𝑛𝑑 𝑣2 power dominate the color class 𝑐2 = {𝑢1′ , 𝑢2′ , 𝑢3′ }. Vertices 𝑢1′ , 𝑢2′ & 𝑢3′ power
dominate the color class 𝑐1 = {𝑣1 , 𝑣2 , 𝑣3 }. Hence every vertex power dominates atleast one color class. Thus,
For the central graph of cycle 𝐶3 , Then the PDCN 𝜒𝑝𝑑 (𝐶(𝐶3 )) is 2.
Case (ii) When 𝑛 = 4
Let 𝐶(𝐶3 ) has 𝑣1 , 𝑣2 , 𝑣3 , 𝑣4 be vertices of Cycle 𝐶𝑛 and newly added vertices 𝑢1′ , 𝑢2′ , 𝑢3′ , 𝑢4′ be the subdivided
vertices. For the proper power dominator coloring, Assign color 𝑐1 to vertices 𝑢1′ , 𝑢2′ , 𝑢3′ , 𝑢4′ . Color vertices
{𝑣1 , 𝑣2 } with color 𝑐2 . Color vertices 𝑣3 & 𝑣4 with color 𝑐3 and color 𝑐4 respectively.
The vertex 𝑣1 , 𝑣2 and 𝑢1′ power dominate the color class 𝑐2 = {𝑣1 , 𝑣2 }. Vertices 𝑣2 𝑎𝑛𝑑 𝑢2′ power dominate the
color class 𝑐3 = {𝑣3 }. Vertex 𝑢3′ power dominate either the color class 𝑐3 = {𝑣3 } 𝑜𝑟𝑐4 = {𝑣4 }. Vertex 𝑢4′
power dominate the color class 𝑐4 = {𝑣4 }. The vertices 𝑣3 , 𝑣4 power dominate themselves. Hence every vertex
power dominates atleast one color class. Thus, For the central graph of cycle 𝐶(𝐶4 ), Then the PDCN
𝜒𝑝𝑑 (𝐶(𝐶4 )) is 4
Case (iii) When 𝑛 = 5
Let 𝐶(𝐶3 ) has 𝑣1 , 𝑣2 , 𝑣3 , 𝑣4 , 𝑣5 be vertices of Cycle 𝐶5 and newly added vertices 𝑢1′ , 𝑢2′ , 𝑢3′ , 𝑢4′ , 𝑢5′ be the
subdivided vertices. For the proper power dominator coloring, Assign color 𝑐1 to vertices 𝑢1′ , 𝑢2′ , 𝑢3′ , 𝑢4′ , 𝑢5′ .
Color vertices {𝑣1 , 𝑣2 } with color 𝑐2 . Color vertices 𝑣3 , 𝑣4 & 𝑣5 with color 𝑐3 , color 𝑐4 and color 𝑐5 resectively.
The vertex 𝑣1 , 𝑣2 and 𝑢1′ power dominate the color class 𝑐2 = {𝑣1 , 𝑣2 }. Vertices 𝑣2 𝑎𝑛𝑑 𝑢2′ power dominate the
color class 𝑐3 = {𝑣3 }. Vertex 𝑢3′ power dominate either the color class 𝑐3 = {𝑣3 } 𝑜𝑟𝑐4 = {𝑣4 }. Vertex 𝑢4′
power dominate either the color class 𝑐4 = {𝑣4 } or 𝑐5 = {𝑣5 }. Vertex 𝑢5′ power dominate the color class
𝑐5 = {𝑣5 }. The vertices 𝑣3 , 𝑣4 , 𝑣5 power dominate themselves. Hence every vertex power dominates atleast one
color class. Thus, For the central graph of cycle 𝐶(𝐶5 ), Then the PDCN 𝜒𝑝𝑑 (𝐶(𝐶5 )) is 5.
254
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Case (iv) When 𝑛 = 3𝑡, 𝑡 ≥ 2


The newly added vertices {𝑢𝑖′ , 1 ≤ 𝑖 ≤ 𝑛}are colored with the color 𝑐1 . The vertices 𝑣𝑖 and 𝑣𝑖+1 , 𝑖 = 3𝑘 +
𝑛−3 𝑛
1, 0 ≤ 𝑘 ≤ 3 are colored with color 𝑐2⌈ 𝑖 ⌉. The other vertices 𝑣𝑙 , 𝑙 = 3𝑘, 0 ≤ 𝑘 ≤ 3 are colored by color
3
𝑐(2𝑙)+1.
3
𝑛−3
The vertices 𝑣𝑖 and 𝑣𝑖+1 , 𝑖 = 3𝑘 + 1, 0 ≤ 𝑘 ≤ will power dominate the color classes 𝑐(2𝑙)+1 =
3 3
𝑛 𝑛−1
{𝑣𝑙 , 𝑙 = 3𝑘, 0 ≤ 𝑘 ≤ 3
}. The vertices newly added vertices {𝑢𝑖′ , 𝑖 = 3𝑗 + 1, 0 ≤ 𝑗 ≤
3
}. The vertices 𝑢𝑖′ and

𝑢𝑖+1 , 𝑖 = 2, 5, 8, … , 𝑛 − 2 dominate the color class of 𝑣𝑖+1.
Thus, For the central graph of cycle 𝐶(𝐶𝑛 ), 𝑛 = 3𝑘, 𝑘 ≥ 2, Then the PDCN 𝜒𝑝𝑑 (𝐶(𝐶𝑛 )), 𝑛 = 3𝑘, 𝑘 ≥ 2 is
2n
⌈ 3 ⌉ + 1.

Case (v) When 𝑛 = 3𝑡 + 1, 𝑡 ≥ 2


The newly added vertices {𝑢𝑖′ , 1 ≤ 𝑖 ≤ 𝑛}are colored with the color 𝑐1 . The vertices 𝑣𝑖 and 𝑣𝑖+1 , 𝑖 = 3𝑘 +
𝑛−4 𝑛−1
1, 0 ≤ 𝑘 ≤ 3 are colored with color 𝑐2⌈ 𝑖 ⌉. The other vertices 𝑣𝑙 , 𝑙 = 3𝑘, 0 ≤ 𝑘 ≤ 3 are colored by color
3
𝑐(2𝑙)+1. and 𝑣𝑛 is colored by color 𝑐⌈2𝑛⌉+1 .
3 3

𝑛−4
The vertices 𝑣𝑖 and 𝑣𝑖+1 , 𝑖 = 3𝑘 + 1, 0 ≤ 𝑘 ≤ will power dominate the color classes 𝑐(2𝑙)+1 =
3 3
𝑛−1 𝑛−1
{𝑣𝑙 , 𝑙 = 3𝑘, 0 ≤ 𝑘 ≤ 3 }. The vertices newly added vertices {𝑢𝑖′ , 𝑖 = 3𝑗 + 1, 0 ≤ 𝑗 ≤ 3 }. The vertices 𝑢𝑖′ and

𝑢𝑖+1 , 𝑖 = 2, 5, 8, … , 𝑛 − 2 dominate the color class of 𝑣𝑖+1. Vertex 𝑣𝑛 is power dominate itself.
Case (vi) When 𝑛 = 3𝑡 + 2, 𝑡 ≥ 2.
The newly added vertices {𝑢𝑖′ , 1 ≤ 𝑖 ≤ 𝑛}are colored with the color 𝑐1 . The vertices 𝑣𝑖 and 𝑣𝑖+1 , 𝑖 = 3𝑘 +
𝑛−5 𝑛−2
1, 0 ≤ 𝑘 ≤ 3 are colored with color 𝑐2⌈ 𝑖 ⌉. The other vertices 𝑣𝑙 , 𝑙 = 3𝑘, 0 ≤ 𝑘 ≤ 3 are colored by color
3
𝑐(2𝑙)+1 . and 𝑣𝑛−1 𝑎𝑛𝑑 𝑣𝑛 is colored by color 𝑐⌈2𝑛⌉ and color 𝑐⌈2𝑛⌉+1respectively.
3 3 3

𝑛−5
The vertices 𝑣𝑖 and 𝑣𝑖+1 , 𝑖 = 3𝑘 + 1, 0 ≤ 𝑘 ≤ 3
will power dominate the color classes 𝑐(2𝑙)+1 =
3
𝑛−2 𝑛−1
{𝑣𝑙 , 𝑙 = 3𝑘, 0 ≤ 𝑘 ≤ 3
}. The vertices newly added vertices {𝑢𝑖′ , 𝑖
= 3𝑗 + 1, 0 ≤ 𝑗 ≤ The vertices 𝑢𝑖′ and
3
}.

𝑢𝑖+1 , 𝑖 = 2, 5, 8, … , 𝑛 − 2 dominate the color class of 𝑣𝑖+1. Vertices 𝑣𝑛−1 𝑎𝑛𝑑 𝑣𝑛 is power dominate
themselves.
Therefore, for 𝑛 ≥ 3, the central graph of cycle 𝐶𝑛 , 𝑛 ≥ 3, the power dominator coloring 𝜒𝑝𝑑 (𝐶(𝐶𝑛 )) =
2, 𝑖𝑓 𝑛 = 3
{ 2n .
⌈ 3 ⌉ + 1 , 𝑜𝑡ℎ𝑒𝑟 𝑤𝑖𝑠𝑒

Theorem 10: For the Central graph of Complete graph 𝐶(𝐾𝑛 ), 𝑛 ≥ 3, the power dominator coloring,
𝜒𝑝𝑑 (𝐶(𝐾𝑛 )) = 𝑛.
Proof: Let 𝐾𝑛 be the complete graph with 𝑛 nodes. Let 𝑣1 , 𝑣2 , 𝑣3 , 𝑣4 , … , 𝑣𝑛 be the vertices of complete graph
𝑛(𝑛−1)
𝐾𝑛 . Let vertices {𝑢𝑖′ , 1 ≤ 𝑖 ≤ } are newly added when subdividing every edge with a new vertex.
2
𝑛(𝑛−1)
Therefore, total vertices in 𝑆(𝐾𝑛 ) is |𝑉(𝑆(𝐾𝑛 ))| = 𝑛 + 2 . Since each pair of vertices are incident by an
edge in complete graph 𝐾𝑛 , then no new edges are added in central Graph of Complete Graph𝐶(𝐾𝑛 )
𝑛(𝑛−1)
For the proper coloring, Assign 𝑐1 to all the newly added vertices {𝑢𝑖′ , 1 ≤ 𝑖 ≤ }. Color the vertices 𝑣1 , 𝑣2
2
with 𝑐2 , and vertices 𝑣𝑖 , 3 ≤ 𝑖 ≤ 𝑛 are colored with 𝑐𝑖 , 3 ≤ 𝑖 ≤ 𝑛.
Thus, the coloring is proper. Newly added vertices will power dominate at least one of the color classes
𝑐𝑖 , 2 ≤ 𝑖 ≤ 𝑛, by the given definition of PDC.

255
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

For the Subdivision graph of Complete graph 𝐾𝑛 , 𝑛 ≥ 3, the power dominator coloring, 𝜒𝑝𝑑 (𝐶(𝐾𝑛 )) = 𝑛.
Theorem 11: For the Central graph of star graph 𝐶(𝐾1,𝑛 ), 𝑛 ≥ 2, the power dominator coloring,
𝜒𝑝𝑑 (𝐶(𝐾1,𝑛 )) = 𝑛 + 1
Proof: Let 𝐾1,𝑛 be the star graph with 𝑛 nodes. Let 𝑣0 , 𝑣1 , 𝑣2 , 𝑣3 , 𝑣4 , … , 𝑣𝑛 be the vertices of star graph 𝐾1,𝑛 . To
construct the Central graph of Star graph 𝐶(𝐾1,𝑛 ), add vertices {𝑢𝑖′ , 1 ≤ 𝑖 ≤ 𝑛} when subdividing every edge
with a new vertex. Therefore, total vertices in 𝑆(𝐾1,𝑛 ) is |𝑉 (𝑆(𝐾1,𝑛 ))| = 2𝑛 + 1. And add new edge between
every pair of non-adjacent vertices in 𝐾1,𝑛
For the proper coloring, Assign 𝑐2 to newly added vertices {𝑢𝑖′ , 1 ≤ 𝑖 ≤ 𝑛}. Color the vertices 𝑣0 , 𝑣1 , with 𝑐1 ,
and all the other pendent vertices 𝑣𝑖 , 2 ≤ 𝑖 ≤ 𝑛 are colored with 𝑐𝑖+1 , 2 ≤ 𝑖 ≤ 𝑛.
Thus, the coloring is proper. Newly added vertices 𝑢′𝑖 , 2 ≤ 𝑖 ≤ 𝑛 will power dominate color classes 𝑐𝑖+1 =
{𝑣𝑖 , 2 ≤ 𝑖 ≤ 𝑛}, by the given definition of PDC. Vertices 𝑣0 and 𝑢1′ will power dominate color class 𝑐1 =
{𝑣0 , 𝑣1 }. Vertices 𝑣𝑖 , 2 ≤ 𝑖 ≤ 𝑛 power dominate themselves.
For the central graph of star graph 𝐶(𝐾1,𝑛 ), 𝑛 ≥ 2, the power dominator coloring, 𝜒𝑝𝑑 (𝐶(𝐾1,𝑛 )) = 𝑛 + 1
Theorem 12: For the Central graph of complete bipartite graph 𝐶(𝐾𝑚,𝑛 ), 𝑚, 𝑛 ≥ 2, the power dominator
coloring, 𝜒𝑝𝑑 (𝐶(𝐾𝑚,𝑛 )) = 𝑚 + 𝑛

Proof: Let 𝐾𝑚,𝑛 be the complete bipartite graph with 𝑚 + 𝑛 nodes. Let 𝑉1 = {𝑣1 , 𝑣2 , 𝑣3 , … , 𝑣𝑛 } and 𝑉2 =
{𝑣𝑛+1 , 𝑣𝑛+2 , 𝑣𝑛+3 , 𝑣𝑛+4 , … , 𝑣𝑚+𝑛 } be the vertices of complete bipartite graph 𝐾𝑚,,𝑛 . Let vertices {𝑢𝑖′ , 1 ≤ 𝑖 ≤
𝑚𝑛} are newly added when subdividing every edge with a new vertex and add new edge between every pair of
non-adjacent vertices in 𝐾1,𝑛 to get central graph of complete bipartite graph 𝐶(𝐾𝑚,𝑛 ). Therefore, total vertices
in 𝐶(𝐾𝑚,𝑛 ) is |𝑉 (𝐶(𝐾𝑚,𝑛 ))| = 𝑚 + 𝑛 + 𝑚𝑛.

For the proper coloring, assign 𝑐2 to all the newly added vertices {𝑢1′ , 1 ≤ 𝑖 ≤ 𝑚𝑛}, Color the vertices 𝑣0 , 𝑣1 ,
with 𝑐1 , and all the other vertices 𝑣𝑖 , 2 ≤ 𝑖 ≤ 𝑚 + 𝑛 are colored with 𝑐𝑖+1 , 2 ≤ 𝑖 ≤ 𝑚 + 𝑛.
Thus, the coloring is proper. Newly added vertices 𝑢′𝑖 , 2 ≤ 𝑖 ≤ 𝑛𝑚 will power dominate color classes 𝑐𝑖+1 =
{𝑣𝑖 , 2 ≤ 𝑖 ≤ 𝑚 + 𝑛 − 1}, by the given definition of PDC. Vertices 𝑣1 , 𝑣𝑛+1 and 𝑢1′ will power dominate color
class 𝑐1 = {𝑣1 , 𝑣𝑛+1 }. Vertices 𝑣𝑖 , 2 ≤ 𝑖 ≤ 𝑚 + 𝑛 except 𝑣𝑛+1 power dominate themselves.
For the central graph of complete bipartite graph 𝐶(𝐾𝑚,𝑛 ), 𝑚, 𝑛 ≥ 2, the power dominator coloring,
𝜒𝑝𝑑 (𝐶(𝐾𝑚,𝑛 )) = 𝑚 + 𝑛.

CONCLUSION
In this paper, we have established the PDCN (Power Dominator Chromatic Number) of Central Graphs and
subdivision Graphs such as path, cycle, bipartite graph. Scope is open for finding power dominator coloring of
total graphs and middle graphs of some graphs in the future.
REFERENCES
[1] T. L. Baldwin, L. Mili, M. B. Boisen, and R. Adapa, “Power System Observability with Minimal Phasor
Measurement Placement,” IEEE Trans. Power Syst., vol. 8, no. 2, pp. 707–715, 1993, doi:
10.1109/59.260810.
[2] T. W. Haynes, S. M. Hedetniemi, S. T. Hedetniemi, and M. A. Henning, “Domination in Graphs Applied
to Electric Power Networks,” SIAM J. Discret. Math., vol. 15, no. 4, pp. 519–529, 2002, doi:
10.1137/S0895480100375831.
[3] B. Thenmozhi and R. Prabha, “Power domination of middle graph of path, cycle and star,” Int. J. pure
Appl. Math., vol. 114, no. 5, pp. 13–19, 2017.
[4] S. H. Ralucca Gera, Craig Rasmussen, “Dominator Colorings and Safe Clique Partitions,” Congr. Numer.,
2006.
[5] K. Kavitha and N. G. David, “Dominator Coloring of Some Classes of Graphs,” Int. J. Math. Arch., vol. 3,
no. 11, pp. 3954–3957, 2012.

256
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[6] K. S. Kumar, N. G. David, and K. G. Subramanian, “Graphs and Power Dominator Colorings,” vol. 11, no.
2, pp. 67–71, 2016.
[7] A. Uma Maheswari and Bala Samuvel J., “Power dominator chromatic number for some special graphs,”
Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 12, pp. 3957–3960, 2019, doi: 10.35940/ ijitee. L3466.
1081219.
[8] A. Uma Maheswari, Bala Samuvel J., and S. Azhagarasi, “Power Dominator Chromatic Number for vertex
duplication of some Graphs,” Des. Eng., vol. 2021, no. 06, pp. 5755–5774, 2021.
[9] T. W. Haynes, S. M. Hedetniemi, S. T. Hedetniemi, and M. A. Henning, Fundamentals of Domination in
Graphs. 1998.
[10] J. A. Bondy and U. S. R. Murty, Graph Theory with Applications, vol. 62, no. 419. 1978.
[11] R. Gera, “On the Dominator Colorings in Bipartite Graphs,” in Fourth International Conference on
Information Technology (ITNG’07), 2007, pp. 947–952.
[12] S. Arumugam and J. A. Y. Bagga, “On dominator colorings in graphs,” vol. 122, no. 4, pp. 561–571, 2012.
[13] S. Anusha and A. Vijayalekshmi, “Dominator and total dominator chromatic number of Mongolian tent
and fire cracker graphs,” Malaya J. Mat., vol. 8, no. 2, pp. 629–632, 2020, doi: 10. 26637/ mjm0802/ 0052.

AUTHOR DETAILS:
A. UMA MAHESWARI, BALA SAMUVEL J* AND S. AZHAGARASI
PG & Research Department of Mathematics, Quaid – E – Millath Government College for Women, Chennai –
600 002, Tamilnadu, India

257
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

FINANCIAL ANALYSIS OF MOTHERSON SUMI SYSTEMS LIMITED, ENDURANCE


TECHNOLOGIES LIMITED AND VARROC ENGINEERING LIMITED WITH REFERENCE TO
PRE AND POST BS VI NORM

DR. BABITA KANOJIA AND CHETAN DEVASHISH BOSE

ABSTRACT
Auto Component companies help in the smooth functioning of Automobile Industry. The research studies the
impact of BS- VI Norm on financial ratios of leading Auto Component companies in Maharashtra. The current
study is Quantitative in nature. It can be further classified as Causal- Comparative research. The study includes
Motherson Sumi Systems Limited, Endurance Technologies Limited and Varroc Engineering Limited based on
their total revenue. The research concludes, there exist a significant difference in Earning Per Share and
Return on Assets (%) of Motherson Sumi Systems Limited and Varroc Engineering Limited between pre and
post BS- VI Norm. The comparative analysis of the selected companies indicates that the Earning Per Share
and Return of Assets (%) of Endurance Technologies Limited is higher than Motherson Sumi Systems Limited
and Varroc Engineering Limited. The study guides government officials, investors, market leaders, competitors
and other stakeholders to adopt strategies which will help to maintain favourable financial ratios
Keywords: BS- VI Norm, Auto Component Companies and Financial Ratios

INTRODUCTION
Automobile Sector is largely depended on Auto Component companies for the smooth functioning of their
various activities. Auto Component companies generate large numbers of employment opportunities. Bharat
Stage VI Norm, which is introduced for reducing harmful pollutants, has brought challenges in front of Auto
Component and Automobile Sector to maintain their financial ratios intact.
BS- VI Norm
Bharat Stage VI Norm is the emission standard which regulate the permission amount of pollutant that a vehicle
can produce. India has taken a bold step of switching BS- IV Norm with BS- VI Norm. However, such step
does have challenging effects on maintaining profit, revenue, sales and employment within the industry, who
are directly or indirectly connected.
Auto Component Industry
The global pandemic was an unexpected thread to all the sectors of an economy. The Auto Component Industry
which is considered as back bone for Automobile Industry has adversely affected by Covid-19. Moreover,
implementation of BS- VI Norm has emerged as a milestone for Auto Component Industry. Balancing revenue
and environment is a challenging for all Auto Component companies, however the effective management of
Financial ratio can help to reduce the unfavourable imbalance.
REVIEW OF LITERATURE
The following review of various research paper and news articles were studied for conducting the research,
Original Equipment Manufacturers (OEM) have to adopt new technology for producing efficient fuel vehicles.
This transition will help to reduce air pollution but it will need Automobile sector and oil companies to change
their ways to make products. (Pothumsetty, Rohan & Thomas, Mary Rani, 2020)
The article points on the pressure of meeting deadline to attain BS- VI emission norm. The shift from BS- IV to
BS- VI norm is historic, as it involves technological leap. The Automobile Industry, oil companies and Auto
Component companies which are the backbone of Automobile Industry need to work together efficiently.
(Parekh, Nishant & Gandhi, Shirish, 2019)
The article highlights that many manufacturers have unsold BS- 4 vehicles. They need to come up with
strategies to build BS- VI vehicles and also to sell out BS- 4 vehicles to reduce their losses. (Abraham, 2019)
BS- VI emission norm will make the diesel vehicles more expensive as compare to petrol vehicles. The
technology will not only increase the cost of the vehicles but only impact the sales, revenue and profit of the
manufacturer. (Cyrus, Dhabhar, 2018)

258
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

RESEARCH GAP
The detailed analysis of literatures reviewhasdirected the researcher to undertake“Financial Analysis of
Motherson Sumi Systems Limited, Endurance Technologies Limited and Varroc Engineering Limited with
reference to Pre and Post BS- VI Norm”
OBJECTIVES OF THE STUDY
The Research Gap Helps to Frame the Following Listed Objectives in the Light of Literatures Review,
1. To analyse the effect of BS- VI Norm on the Earning Per Share of Motherson Sumi Systems Limited,
Endurance Technologies Limited and Varroc Engineering Limited
2. To examine the impact ofBS- VI Norm on the Net Profit Margin (%)of Motherson Sumi Systems Limited,
Endurance Technologies Limited and Varroc Engineering Limited
3. To study the influence of BS- VI Norm on the Return on Assets (%)ofMotherson Sumi Systems Limited,
Endurance Technologies Limited and Varroc Engineering Limited
RESEARCH PROBLEMS OF THE STUDY
The problem framed to study “Financial Analysis of Motherson Sumi Systems Limited, Endurance
Technologies Limited and Varroc Engineering Limited with reference to Pre and Post BS- VI Norm”, is as
follows
1. To study, examine and compare the effect of BS- VI onFinancial ratios of Motherson Sumi Systems Limited,
Endurance Technologies Limited and Varroc Engineering Limited.
HYPOTHESES OF THE STUDY
Review of various literatures, research gap, objects and problem have guided to frame the following hypotheses,
Hypothesis 1
H0: There is no significant difference in Earning Per Share of Motherson Sumi Systems Limited, Endurance
Technologies Limited and Varroc Engineering Limitedbetween per and postBS- VI Norm
H1: There is a significant difference in Earning Per Share of Motherson Sumi Systems Limited, Endurance
Technologies Limited and Varroc Engineering Limitedbetween per and post BS- VI Norm
Hypothesis 2
H0:There is no significant difference in Net Profit Margin (%)of Motherson Sumi Systems Limited, Endurance
Technologies Limited and Varroc Engineering Limited between per and post BS- VI Norm
H1:There is a significant difference in Net Profit Margin (%)of Motherson Sumi Systems Limited, Endurance
Technologies Limited and Varroc Engineering Limited between per and post BS- VI Norm
Hypothesis 3
H0: There is no significant difference in Return on Assets (%)of Motherson Sumi Systems Limited, Endurance
Technologies Limited and Varroc Engineering Limited between per and post BS- VI Norm
H1:There is a significant difference in Return on Assets (%)of Motherson Sumi Systems Limited, Endurance
Technologies Limited and Varroc Engineering Limited between per and post BS- VI Norm
RESEARCH METHODOLOGY OF THE STUDY
Type of Research
The currentwork can be characterised asQuantitative research. Financial data were collected from Trading A/C,
Profit & Loss A/C, & Balance sheet. As the study is concern with BS- VI norm’s effect onEarning Per Share,
Net Profit,& Return on Asset of Motherson Sumi Systems Limited, Endurance Technologies Limited and
Varroc Engineering Limited, the research can be further categorised as Causal-Comparative research.
Sources of Data Collection
Secondary sources were used to collect data for research work.Annual reports from NSE and BSE websites
were used for getting authenticated data. News articles and research papers were also reviewed as secondary
sources.
Sampling
The researcher has selected the leading Auto Component Companies of Maharashtra based on their total
revenue generated. Hence, sampling method is not used.
259
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

SR. NO. Auto Component Companies TOTAL REVENUE (₹ in Crore)


1 MOTHERSON SUMI SYSTEMS LTD. 6,800
2 ENDURANCE TECHNOLOGIES LTD. 4,900
3 VARROC ENGINEERING LTD. 2,300
REFERENCE PERIOD OF THE STUDY
The study includes 5 financial years for collecting and analysing data. 3 years of data is Pre BS- VI norm and
the rest 2 years data is post implementation of BS- VI norm. The study compares the financial data on yearly
basis.
TOOLAND TECHNIQUES OF DATA ANALYSIS
Application of excel sheet as a tool of data recording and collecting were used. However, the techniques
toanalysis includes line graph.
SIGNIFICANCE OF THE STUDY
Auto Component companies help Auto Industries to carry out their manufacturing activities smoothly. Auto
Component companies generate employment opportunities and thus, play a vital role in the economic growth of
any country. The study will guide all the Auto Component companies to follow the right financial practices to
keep their business running in adverse situation created in the form of policy reforms or due to global pandemic.
The study identifies the effect of BS- VI norm on the financial ratios of the top companies.
SCOPE OF THE STUDY
The Research Includes Following Scopes,
1. The research covers top three Auto Component companies based on its total revenue.
2. The study includes 5 years financial report, which consist of 3 years per BS- VI norm and 2 years post
implementation of BS- VI norm.
3. It will help to identify the leading Auto Component company
LIMITATIONS OF THE STUDY
The Following Limitations are Drawn for the Study,
1. The study includes only top 3 Auto Component companies, which are based in Maharashtra
2. The data collected for research are mainly based on secondary sources
3. The research analysis only 3 aspects of financial ratio which are Earning Per Share, Net Profit and Return on
Assets
DATA ANALYSIS AND INTERPRETATION
Motherson Sumi Systems Limited
Mar-18 Mar-19 Mar-20 Mar-21 Mar-22
EARNING PER SHARE 4.18 2.58 2.85 1.65 3.33
NET PROFIT MARGIN (%) 11.79 10.73 22.55 14.19 21.77
RETURN ON ASSETS (%) 9.97 8.99 9.76 3.84 3.08

260
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Endurance Technologies Limited


Mar-18 Mar-19 Mar-20 Mar-21 Mar-22
EARNING PER SHARE 19.31 25.44 30.41 27.88 27.14
NET PROFIT MARGIN (%) 5.85 6.6 8.66 8.21 6.7
RETURN ON ASSETS (%) 10.42 12.09 14.33 11.4 10.2

261
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Varroc Engineering Limited


Mar-18 Mar-19 Mar-20 Mar-21 Mar-22
EARNING PER SHARE 4.96 8.87 7.7 6.82 1.7
NET PROFIT MARGIN (%) 3.41 4.64 4.15 3.59 0.78
RETURN ON ASSETS (%) 3.56 5.86 4.21 2.77 0.61

COMPARATIVE ANALYSIS

262
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

FINDINGS AND CONCLUSIONS


Based on the financial ratio of the studied companies following conclusions can be drawn,
1. There is a significant difference in Earning Per Share of Motherson Sumi Systems Limited, and Varroc
Engineering Limited between per and post BS- VI Norm.
2. There is a significant difference in Net Profit Margin (%)of Varroc Engineering Limited between per and
post BS- VI Norm.
3. There is a significant difference in Return on Assets (%)of Motherson Sumi Systems Limited and Varroc
Engineering Limited between per and post BS- VI Norm.
4. The Earning Per Share of Endurance Technologies Limited is comparatively higher than Motherson Sumi
Systems Limited and Varroc Engineering Limited
5. The Net Profit Margin (%) of Motherson Sumi Systems Limitedis comparatively higher than Endurance
Technologies Limited and Varroc Engineering Limited
6. The Return on Assets (%) of Endurance Technologies Limited is comparatively higher than Motherson Sumi
Systems Limited and Varroc Engineering Limited
REFERENCES
 Abraham, R. (2019). Confused by the SC’s BS6 ruling? Here’s what it means for your existing car. The
Economic Times.https://economictimes.indiatimes.com/magazines/panache/confused-by-the-scs-bs6-
ruling-heres-what-it-means-for-your-existing-car/articleshow/70853624.cms?from=mdr
 Cyrus, Dhabhar. (2018). 4. BS6 Norms In 2020 Will Increase Price Gap Between New Petrol And Diesel
Cars. Carandbike. https://www.carandbike.com/news/bs6-norms-in-2020-will-increase-price-gap-between-
new-petrol-and-diesel-cars-1965628
 Parekh, Nishant & Gandhi, Shirish. (2019). Clearing the air on BS6. Autocar India. https:// www.
autocarindia. com/car-news/bs6-emission-norms-all-you-need-to-know-413968
 Pothumsetty, Rohan & Thomas, Mary Rani. (2020). Bharat Stage IV to VI -Challenges and Strategies.
International Journal of Recent Technology and Engineering (IJRTE), 8(5), 2614–2623. https:// doi.org/
10.35940/ ijrte.E5850.018520

AUTHOR DETAILS:
DR. BABITA KANOJIA1 AND CHETAN DEVASHISH BOSE2
1
Research Guide and 2Research Scholar, Dtss College of Commerce, Kurar Village, Malad East, Mumbai

263
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

AN ANALYTICAL STUDY OF E-COMMERCE IN RATNAGIRI DISTRICT

MRS. SHREEYA VAIBHAV RAUT

ABSTRACT
E-Commerce or E-Business is the largest application of computers and information technology in keeping and
managing business and financial records. It helps in transaction of any amount of money from any part of the
world to other. We can purchase anything online with the help of debit and credit cards. Application of e
commerce are billing to customers, tracing payments received and payments to be made and tracing supplies
needed and items produced, stored, shipped, and sold, etc. E-commerce is the process of buying and selling goods
and services via internet. In other words-commerce is the use of modern day electronic communication
technology in business transactions to generate income.
E-commerce stands for electronic commerce. E-commerce is doing business online and electronically. The E-
commerce has completely revolutionized the conventional concept of business. Ecommerce deals with selling
and purchasing of goods and services through internet and computer networks. This paper attempts to highlight
the different challenges faced by the E-commerce in Ratnagiri District. Understand the essential growth factors
required for E- commerce, describes the prosperity of E-Commerce in Ratnagiri and retail E-Commerce salesin
Ratnagiri. The study found that, in the world of E-commerce, the existence of the wholesalersis at the greatest risk
because the producer can easily ignore them and sell their products to the retailers and the consumers.
Wholesalers can take the advantage of E-commerce in establishing contracts with reputed producers and linking
their business with the online.
Keywords: E-commerce, B2C, Flip kart, sales penetration, Challenges, On Line Shopping, Evolution,
Prosperity

INTRODUCTION
E-Commerce stands for electronic commerce. Dealing in goods and services through the electronic media and
internet is called as E-commerce. E-Commerce or E-business involvescarrying on a business with the help of the
internet and by using the information technology like Electronic Data Interchange (EDI). E-Commerce relates to
the website of the vendor, who sells products or services directly to the customer from the portal using a digital
shopping cartor digital shopping basket system and allows payment through credit card, debit card or electronic
fund transfer payments. E-Commerce is the movement of business onto the World Wide Web (WWW). E-
Commerce facilitates new types of information based business processes for reaching and interacting with
customers. It can also reduce costs in managing orders and interacting with a wide range of suppliers and
trading partners. For developing countries like India, E-Commerce offers considerable opportunities.
Electronic commerce or
E-Commerce refers to a wide range of online business activities for products and services. It also pertains to
“any form of business transaction in which the parties interact electronically rather than by physical exchanges
or direct physical contact.” E-Commerce is the use of electronic communications and digital information
processing technology in business transactions to create, transform and redefine relationships for value creation
between or amongorganizations and between organizations and individuals. Today E-commerce in Indian society
has become an integral part of everyday life. Accessibility to E-commerce platforms is not a privilege but rather
a necessity for most people, particularly in the urban areas. Today the number of internet users in the world is
close to 3 billion, out of this; India has a total of 259.14million internet and broadband subscribers.
This penetration of internet coupled with the increasing confidence of the internet users to purchase on line. This
leads to an enormous growth in the E-commerce space, with an increasing number of customers registering on
E-commerce websites and purchasing productsthrough the use of mobile phones. India is in a prime position for
the growth and development of the E-commerce sector. As per the report, the compound annual growth rates in
the mature E-commerce markets of Japan, South Korea and Australia will run 11% to 12% over the next few
years. In the rapidly growing markets of China and India, these growth rates will be 25% and 57% respectively.
The report also highlights the rapid growth of Ecommerce markets in neighbouring China where, the compound
annual growth rates of over 20% will take the market to over $ 350 billion. A report by the Internet and Mobile
Association of India (IMAI) has revealed that India’s E-commerce market expected to grow by 37% to reach
U.S. Dollar 20 billion by 2015.
264
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

OBJECTIVES OF THE STUDY


1. To study the concept of E-commerce.
2. To study the present status of e-commerce in Ratnagiri District.
3. To study the importance and contribution of e-commerce.
4. To understand the challenges of e-commerce in Ratnagiri District
RESEARCH METHODOLOGY
This research is based on secondary data which are collected from several sources i.e. research papers,
www.statista, publications from Ministry Of Commerce, Govt. of India etc. which is available on the
internet.Data and information presented in the study are collected from various reports and articles published by
national and international agencies of E- commerce. Information is also collected from various authentic
websites. Some journals are also referred related to online educational system are referred.
ANALYSIS OF DATA
Present Market segments of E-commerce
Category Specification
Digital population as of January 2020 687.6 million
E-commerce market size by 2027 200 Billion USD
Active E-commerce penetration 74%
E-commerce share in retail by 2021 7%

Share of online shoppers who prefer mobilewallets 32%


Category of online retail with the highest penetration rate Electronics
Flipkart revenue 436.15 Billion INR
Most popular e-payment service Paytm
Statista 2020
Share of E-commerce to GDP
Year GDP
2016 0.71
2017 0.76
2018 0.9
Statista2020, EPW March 2019
IMPORTANCE OF E-COMMERCE
Through, E‐commerce, and operating efficiency of the business firm will definitely improve and which in turn
strengthen the value and service given to customers and provide a competitive edge over competitors. These
improvements may result in more effective performance. The direct benefit accrue to an organization on
practicing e‐commerce are better quality, greater customer satisfaction, better decision making, low cost, high
speed and real time interaction. More specifically e‐commerce enables executing of information relating to the
transaction between two or more using interconnected networks. From the business perspective with less time
spent during each transaction, more transaction can be achieved on the same day. As for the consumer, they will
save up more time during their transaction. Because of this, E‐commerce steps in and replaced the traditional
commerce method where a single transaction can cost both parties a lot of valuable time. E‐commerce is the
most cost effective compared to traditional commerce method. This is due to the fact where through e‐
commerce, the cost for the middleperson to sell their products can be saved and diverted top another aspect of
their business.
For e‐commerce, the total overheads needed to run the business is significantly much less compared to the
traditional commerce method. The reason due to that is where most of thecost can be reduced in Ecommerce. To
both the consumers and business, connectivity plays an important part as it is the key factor determining the
whole business. From the business point of view, E‐commerce provides better connectivity for its potential
customer as their respectivewebsite can be accessed virtually from anywhere through the Internet. This way, more
potential customers can get in touch with the company’s business and thus, eliminating the limits of
geographical location. From the customer’s standpoint, E‐commerce is much more convenient as they can
browse through a whole directories of catalogues without any hassle, compare prices between products, buying
265
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

from another country and on top of that, they can do it while at home or at work, without any necessity to move
a single inch from their chair. Besides that for both consumers and business, commerce proves to be more
convenient as online trading has less red tape compared to traditional commerce method. Ecommerce itself gives
a boost tothe global market.
In short, if without any major obstacles, E‐commerce will certainly continue to maturein the global; market and
eventually, it will become an essential business plan for a company in order to survive and stay competitive in
the ever changing market. E‐commerce business have numerous advantages over off line retail locations and
catalogue operators consumers browsing online stores can easily search to find exactly what they are looking
for while shopping and can easily comparison of shop with just a few clicks of the mouse. Even the smallest
online retail sites can sell products and turn a profit with a very simple online presence. Web tracking technology
allows e‐commerce sites to closely track customer preferences and deliver highly individualized marketing to
their entire customer base.
Challenges of E-CommerceI. External Challenges
External forces impact how E-commerce companies plan their growth strategy and provide seamless customer
experience onsite and post transaction
1. Product and Market Strategy
E-commerce companies have to address issues pertaining to rapidly evolving customer segments and product
portfolios access information on market intelligence on growth, size and share manage multiple customer
engagement platforms focus on expansion into new geographies, brands and products and simultaneously tackle
a hypercompetitive pricingenvironment.
2. Customer and Digital Experience
Companies have to provide a rich, fresh and simple customer experience not geared towards discovery, manage
inconsistent brand experience across platforms; manage proliferation of technologies; and handle time to market
pressure for new applications. In therecent past, social media has become more influential than paid marketing.
3. Payments and Transactions
E-commerce companies may face issues around security and privacy breach and controlling fictitious
transactions. Further, RBI restrictions for prepaid instruments or E- Wallets act as impediments. From a
transactions perspective cross border tax and regulatory issues and backend service tax and withholding tax can
have serious implications.
4. Fulfilment
Companies will need to check if the physical infrastructure gets affected by the internetspeed. Also the lack of an
integrated end to end logistics platform and innovation focused fulfilment option could cause delivery issues.
Challenges around reverse logistics managementand third party logistics interactions could also act as barriers to
growth.
II. INTERNAL CHALLENGES
Internal forces impact how E-commerce companies can organize to drive and sustain growth.
1. Organization Scaling
E-commerce companies will have to make sure organization design keeps pace with the rapidly evolving
business strategy, along with fluid governance, strong leadership and management development. From a
growth perspective, identifying acquisition opportunities, fund raising and IPO readiness becomes necessary.
From a technology perspective, it is important to transform IT as an innovation hub and address the lack of
synergy between business, technology and operations functions of the enterprise.
2. Tax and Regulatory Structuring
Companies will need to address issues around sub optimal warehouse tax planning imbalance between FDI
norms vis-à-vis adequate entity controls, inefficient holding IPR or entity structure and international tax
inefficiencies. Future challenges include the new companies act, policy on related party transaction pricing and
the uncertainty around GST roadmap.
3. Risk Fraud and Cyber Security
From a risk perspective E-commerce companies could face issues around brand risk, insider threats and website
uptime. Issues around employee vendor nexus, bribery and corruption make companies vulnerable to fines.
Cyber security also raises some concerns around website exploitation by external entities.

266
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

4. Compliance Framework
E-commerce companies have to comply with several laws, many of which are still evolving. Potential issues
around cyber law compliance, inefficient anti-corruption framework, legal exposure in agreements or
arrangements, indirect and direct tax compliance framework and rules and regulations could pose problems.
Uncertainty around VAT implications in different states due to peculiar business modes could cause issues.
SUGGESTIONS
1. An in-depth understanding of the legal regime and the possible issues that an E- commerce business would
face coupled with effective risk management strategies has been the need of the hour for of E-commerce
businesses to thrive in this industry.
2. Intellectual Property Rights (IPR) issues in E-commerce transactions have taken a new formwith users finding
loop holes to not only easily duplicate material but also mislead other users. Hence, much more IPR is needs
to effectively regulate tangled web.
3. The development of educational standards has enabled a great demand in the market.
4. The powerful influence of various social media tools like Facebook allows consumers to organize their
favourite items and segment it into them and collections to share with others.
5. With the increase in small and medium enterprises, foreign direct investment, multinational companies,
creating millions new jobs, a new generation of globally minded consumers. With growing job opportunities,
customers are willingly able to pay for the products online.
6. The website for online shopping should be in understandable language. The language should be kept simple
while making the website.
CONCLUSION
Today E commerce has become an integral part of everyday life. Accessibility to E- commerce platform is not a
privilege but rather a necessity for people, particularly peoples who are staying in urban areas. Due to fast
adoption of internet enabled devices like Smartphone and Tablets, we have seen an unparalleled growth in E-
commerce. The telecommunication technology has completely changed the way of our living, communication
methods, shopping etc. It has a huge impact on how we communicate with friends and relatives how we travel,
how we access the information and the way we buy or sell products and services. The growth of E-commerce
volumes in India is attracting the attention of players around the globe. E- commerce creates new opportunities
for business it also creates new opportunities for education and academics. It appears that there is tremendous
potential for providing E-businesseducation.
REFERENCES
[1]. Nisha Chanana and Sangeeta Goele “Future of E-commerce in India”, International Journalof computing and
business research, 2012.
[2]. Abhijit Mitra “E-Commerce in India-A review”, International Journal of Marketing, Financial services and
Management Research, 2013.
[3]. Sarbapriya Ray “Emerging Trends of E-commerce in India: Some Crucial Issues Prospects and Challenges”,
Journal of Computer Engineering and Intelligent Systems 2011.
[4]. Muhammad Awais and Tanzila Samin “Advances SWOT Analysis of E-commerce”, International Journal
of Computer Science Issues, 2012.
[5]. Mr. Harjot Kaur and Mrs. Daljit Kaur “E-commerce in India - Challenges and Prospects”, International
Journal of Engineering and Techniques, 2015.
[6]. Bhavya Malhotra “E-Business: Issues and Challenges in Indian Perspective”, Global Journal of Business
Management and Information Technology, 2014.
[7]. Tryambak Hiwarkar “E-commerce impact on Indian Market: A Survey on social impact”, International
Journal of Advanced Research in Computer Engineering and Technology, 2013.
[8]. Dr. Anukrati Sharma “A study on E-commerce and Online Shopping: Issues and Influences”, International
Journal of Computer Engineering and Technology (IJCET), 2013
AUTHOR DETAILS:
MRS. SHREEYA VAIBHAV RAUT
Shri Anandrao Pawar Mahavidyalaya, Khend-Kangnewadi, Chiplun, Ratnagiri-415605
267
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

INDIA’S INDUSTRIAL GROWTH SCENARIO DURING COVID-19 PANDEMIC- A TIME


SERIES ANALYSIS

DR. SIDHARTHA SANKAR LAHA

ABSTRACT
Covid-19 pandemic has adversely affected the different industrial sectors of Indian economy. Ithas thus
adversely disturbed the parameters of the sustainable development in this country. Thispaper shows how
different macroeconomic sectors of India have reacted to the adverse impact inthe Indian Economy
differently. Some sectors are highly affected while some sectors are notappreciably affectedby the
pandemic.Few major sectors have been affectedbadly by thepandemic. For example the highest impact on
industrial growth during the pandemic has beenassessed for the sector slike, mining-
26.9%,manufacturing-66.6%,infrastructure-37.9%, steel -65.2%, cement -40%, crude oil -5.22% etc. I
have studied in this paper the impact of Covid-19pandemic on different sectors and got different findings
for different sectors. The study involvedwith the Cointegration and Vector Error Correction Estimation of
Time Series Econometrics. Itmay be noted that the pandemic has been going on for one and half year and
therefore it is expected to beatransitory phenomenon.We, therefore,cannot expectaverylongrun
relationship between pandemic and other sectors of the economy. That’s why, the Cointegration study has
beenin directly established through theestimation of Vector Error Correctionmodel.Inthe estimated VEC
model it has been found that there is a strong relation between changes inmacroeconomic parameters and
the pandemic in the short run. I have found that the growth ratein manufacture, infrastructure and mining
etc have been affected adversely by the pandemic.Growth rate of different sectors have been significantly
related to the 1st and 2nd lag variation ofthe Covid-19 dataset. The Covid-19 dataset have been found to
exert negative impact on thesectorsunderstudy.
Keyword: Covid-19Pandemic, Sustainable Development, Unemployment, Time Series Econometrics,
Cointegration, and Vector Error Correction Estimation

INTRODUCTION
The world has witnessed several epidemics such as the Spanish Flu of 1918, Ebola 1976, MERS(Middle
East Respiratory Syndrome) of 2012 and SARS (Severe Acute Respiratory Syndrome)of 2002. In the past,
India has had to deal with diseases such as the small pox 1972, polio 1985,outbreak of HIV/AIDS of 1986
and Plague 1994 (Kolli, R, &Sinharay, A. 2014). However, theNovel Corona virus Covid-19 which
originated in China in November-December 2019 and overthe next few months rapidly spread to almost
all countries of the world has turned out to be oneof the biggest health and economic crises in our history.
India recorded the first positive case ofthe disease on 30 th January, 2020. Since then the highest new
positive case 414188 has beenfoundon 6th may 2021and stillitis continuing (Source:JHUCSSECOVID-19).
The government of India has been taking different restrictive steps to overcome the situation since the first
case found on January and announced full‘Lockdown’on 25th March 2020. The 1st ‘Lockdown’ had been
continued up to 31st May 2020. This restrictive step is still continuingwith ‘Unlock’ process. There are
four nationwide full ‘Lockdown’ and fifteen ‘Unlock’ alreadyhas been taken but the daily fluctuations of
new cases are still continuing (Source: JHU CSSECOVID-19). Moreover presently it has been further
rnoticed that the few states like Kerala and 7 th sister’s responding in creasing trend daily cases (Source:
JHUCSSECOVID-19).
The outbreak of the Covid-19 pandemic is an unprecedented shock to the Indian economy (Devand
Sengupta2020,FICCI2020).Thisshockhasbeenshownonvarioussectorslikemanufacturing,infrastructure,mini
ng,steel,cementandcrudeoiletc(Kapur,DevandSubramanian, Arvind (2020). There are 83% labour are
involved in informal sectors and 17% are ininvolved in formal sectors who are directly or indirectly involved
with these sectors (IndianEconomic Survey 2019-20). Ongoing this Pandemic the situation of growth rate
of the industrialsectors and the positive growth rate of new cases over the period of study represents the
clearscenarioofIndian economy.

268
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Dataand Different Sources


The monthly time series data of growth rate from January 2020 to March 2021 has been takenfrom the
different sources. The source of the data is Office of the Economic Adviser to theGovernment of India,
Ministry of Statistics and Program Implementation (MOSPI), World Steel Association and
U.S.EnergyInformation Administration.
The monthly average growth rate of Covid- 19 nfectiondata has been taken fromthe source
JHUCSSECOVID-19.
OBJECTIVE OF THE STUDY
Morespecifically, weseektoexamineinthisstudy
1. Ifthereexistsanyuniquelong-runrelationshipbetweentheCovid-19andthedifferentsectorsgrowth
rateovertheperiodofstudy.
2. Iftheshort-runsrelationship, soidentified, werestable.
Figure1.1: Time Ploto fIndustrial Sectorsand Covid-19 Growth Rate [Period: January 2020 to
March2021]

Figure1.2: Time Ploto fIndustrial Sectors Growth Rate [Period: January 2020 to March 2021]

SECTION–1
1.1. Different Test results of Infra structure and Covid-19 Growth Rate
In this section weobserve theexistence of cointegration between infra structure growth rate andCovid-
19growth rate.Thisisshowninthe following table.

269
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table: 1.1: Johansen CointegrationTest of Infra structure and Covid-19 Growth Rate [Period: January
2020 to March 2021

The corresponding regression equationis given below:


Table: 1.2 Regression ofInfrastructureandCovid-19Growth Rate[Period:January2020 toMarch 2021]

Itisobservedthatthecoefficientof‘Covid-19’levelvariableis-1.998914whichissignificantat6% level and the


coefficient is negative. This indicates that the current ‘Covid-19’ growth
rateadverselyaffectedthecurrentgrowthrateoftheinfrastructuresector.
We have also tested if lagged rates of ‘Covid-19’ growth affect infrastructure growth rate.
Theregressionequationsaregiven below.
Table: 1.3 Regression of Infra structure and lagged Covid-19 Growth Rate [Period:January 2020to March
2021]

270
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

It is observed that the coefficients of one-period lagged ‘Covid-19’ growth rate [Covid-19 (-1)]and two-
period lagged ‘Covid-19’ growth rate [Covid-19 (-2)] are not statistically significant.This indicates that
lagged growth rate of ‘Covid-19’ has not statistically significant affects theinfrastructuregrowth rate.
VEC ANALYSIS RESULTS
Short term adjustment of growth rates of the sectors concerned to those in ‘Covid-19’ variable
isrepresentedthrough VECmodel.
TheestimatedVECmodelforinfrastructurevis-à-vis‘Covid-19’variablesisgivenbelow.
Table: 1.4 VEC Results of Infra structure and Covid-19 Growth Rate [Period: January 2020 to March
2021]

It is observed from the table that coefficients of [D Covid-19 (-1)] and [D Covid-19 (-2)] under[D
(infrastructure)] are both statisticallysignificant. This indicates that infrastructure sectordisplays the
significant result in the short run in order to ensure any adjustment to variations inshort-
runvariationsin‘Covid-19’growth rate.
SECTION–2
2.1. Different Testresults of Manu facture and Covid-19 Growth Rate
InthissectionweobservetheexistenceofcointegrationbetweenmanufacturegrowthrateandCovid-
19growthrate.Thisisshownin thefollowingtable.
Table: 2.1 Johansen CointegrationTest of Manu facture and Covid-19GrowthRate [Period: January 2020
toMarch2021

271
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Thecorrespondingregressionequationisgivenbelow:-
Table: 2.2 Regression of Manu facture and Covid-19 GrowthRate [Period:January2020 toMarch2021]

It is observed that the coefficient -1.953159 of ‘Covid-19’ level variable is significant at 7%level and the
coefficient is negative. This indicates that the current ‘Covid-19’ growth
rateadverselyaffectedthecurrentgrowthrateofthemanufacturesector.
We have also tested if lagged rates of ‘Covid-19’ growth affect manufacture growth rate.
Theregressionequationsaregiven below.
Table: 2.3 Regression of Manu facture and lagged Covid-19Growth Rate [Period: January 2020to March
2021]

It is observed that the coefficients of one-period lagged ‘Covid-19’ growth rate [Covid-19 (-1)]and two-
period lagged ‘Covid-19’ growth rate [Covid-19 (-2)] are not statistically significant.This indicates that
lagged growth rate of ‘Covid-19’ has not statistically significant affectsmanufacturegrowth rate.
VEC ANALYSIS RESULTS
The estimated VEC modelis given below.
Table: 2.4 VEC Results of Manu facture and Covid-19 Growth Rate [Period: January 2020 toMarch 2021]

272
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Itisobservedfromthetablethat
(i) The coefficients of [DCovid-19(-1)] and [DCovid-19(-2)] under [D(Manufacture)] is significant
statistically. The coefficientis positive.
Itmeansthatmanufacturingsectordisplayanyshort-runadjustmentagainstshort-runvariationsin‘Covid-19’growth
rate.
SECTION–3
3.1.Different Test results of Mining and Covid-19 Growth Rate
Inthissectorweobservetheexistenceofcointegrationbetweenmininggrowthrateand‘Covid-
19’rate.Thisisshowninthefollowingtable.
Table: 3.1 Johansen CointegrationTestofMiningandCovid-19Growth Rate [Period: January 2020to
March2021

The corresponding regressionequationisgivenbelow.


Table: 3.2 Regression ofMiningand Covid-19Growth Rate[Period:January2020toMarch2021]

It is observed that the coefficient -2.521515 of ‘Covid-19’ level variable is significant at 2%level and the
coefficient is negative. This indicates that the current ‘Covid-19’ growth
rateadverselyaffectedthecurrentgrowthrateofthemining sector.
We have also tested if lagged rates of Covid-19’ growth affect manufacture growth rate. Theregressioneq
uationsaregiven below.

273
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table: 3.3 Regression of Miningandlagged Covid-19Growth Rate [Period: January 2020 to March 2021]

It is observed that the coefficients of one-period lagged ‘Covid-19’ growth rate [Covid-19 (-1)]have
adversely affected tomining growth ratewith 6% levelofsignificantvalue andthecoefficient are negative.
But two-period lagged‘Covid-19’ growth rate [Covid-19 (-2)] are notstatistically significant. This indicates
that 1 lagged growth rate of Covid-19’ has statisticallysignificantaffectsonmining growthrate.
VEC ANALYSIS RESULTS
Inordertoexaminetheshort-runadjustmentprocessweestimatedanappropriateVECmodel.Theestimated
VECmodelisgivenbelow:
Table: 3.4 VEC Results of Mining and Covid-19 Growth Rate [Period: January 2020 to March 2021]

It is observed from the table that the coefficients of [D Covid-19 (-1)] and [D Covid-19 (-2)]under [D
(Mining)] are not statistically significant. This implies that the Mining sector did notdisplay any short-run
adjustment movements against short-run variations in ‘Covid-19’ growthrate.

274
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

SECTION–4
4.1. Different Test results of Cementand Covid-19 Growth Rate
Inthissectorweobservetheexistenceofcointegrationbetweencementgrowthrateandcovid-
19growthrate.Thisisshown inthefollowingtable.
Table: 4.1 Johansen CointegrationTest of Cement and Covid-19 Growth Rate [Period: January 2020 to
March 2021

Thecorrespondingregressionequationisgivenbelow
Table: 4.2 Regression of Cement and Covid-19 Growth Rate[ Period: January 2020 to March 2021]

It is observed that the coefficient of ‘Covid-19’ level variable is statistically not significant atlevel and the
coefficient is negative. This indicates that the current ‘Covid-19’ growth rate is
notadverselyaffectedthecurrentgrowthrateofthecementsector.
Wehave alsotested iflagged rates of‘Covid-19’growthaffectcementgrowth rate. There gressione quation
sare given below.
Table: 4.3 Regression of Cementandlagged Covid-19 Growth Rate [Period: January 2020 to March 2021]

275
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

It is observed that the coefficients of one-period lagged ‘Covid-19’ growth rate [Covid-19 (-1)]and two-
period lagged ‘Covid-19’ growth rate [Covid-19 (-2)] are not statistically significant.This indicates that
lagged growth rate of Covid-19 has not statistically significant affects oncementgrowthrate.
VEC ANALYSIS RESULTS
In order to examine the short-run adjustment process we estimated an appropriate VEC
model.Theestimated VECmodelisgiven below.
Table: 4.4 VEC Results of Cement and Covid-19 Growth Rate [Period: January 2020 to March 2021]

It is observed from the table that the coefficients of [D Covid-19 (-1)] and [D Covid-19 (-2)]under [D
(Cement)] is statistically significant. This implies that the cement sector display ashort-
runadjustmentmovementsagainstshort-runvariationsin‘Covid-19’growthrate.
SECTION–5
5.1. Different Test results of Crude Oil and Covid-19 Growth Rate
In this sector we observe the existence of cointegration between crude oil growth rate and covid-19 growth
rate.This is shown in the following table.
Table: 5.1 Johansen CointegrationTest of Crude Oil and Covid-19 Growth Rate [Period: January 2020 to
March 2021

276
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The corresponding regression equationis given below.

Table: 5.2 Regression of Crude Oil and Covid-19 Growth Rate [Period: January 2020 to March 2021]

It is observed that the coefficient of ‘Covid-19’ level variable is statistically not significant atlevel and the
coefficient is not negative. This indicates that the current ‘Covid-19’ growth rate
isnotadverselyaffectedonthecurrentgrowth rateofthecrudeoilsector.
We have also tested if lagged rates of ‘Covid-19’ growth affect crude oil growth rate.
Theregressionequationsaregiven below.
Table: 5.3 Regression of Crude Oil and lagged Covid-19 Growth Rate [Period: January 2020 to March 2021]

It is observed that the coefficients of one-period lagged ‘Covid-19’ growth rate [Covid-19 (-1)]and two-
period lagged ‘Covid-19’ growth rate [Covid-19 (-2)] are not statistically significant.This indicates that
lagged growth rate of ‘Covid-19’ has not statistically significant affects oncrudeoilgrowth rate.
VEC ANALYSIS RESULTS
In order to examine the short-run adjustment process we estimated an appropriate VEC
model.Theestimated VECmodelisgiven below.
Table: 5.4 VEC Results of Crude Oil and Covid-19Growth Rate [Period: January 2020 to March 2021]

277
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

It is observed from the table that the coefficient -2.49209 of [D Covid-19 (-1)] under [D (Crudeoil)] are
statistically significant and [D Covid-19 (-2)] under [D (Crude oil)] are not statisticallysignificant. This
implies that the Crude oil sector display a short-run adjustment movementsagainstshort-
runvariationsin‘Covid-19’growth rateat[DCovid-19(-1)]lag.
SECTION–6
6.1. Different Test results of Steel and Covid-19 Growth Rate
Inthissectorweobservetheexistenceofcointegrationbetweensteelgrowthrateand‘Covid-
19’rate.Thisisshownin thefollowing table.
Table: 6.1 Johansen CointegrationTest of Steel and Covid-19GrowthRate [Period: January 2020to March
2021

Thecorrespondingregressionequationisgivenbelow.
Table: 6.2 Regression of Steel and Covid-19 Growth Rate [Period:January 2020 to March 2021]

It is observed that the coefficient -2.565999 of Covid-19 level variable is significant at 2% leveland the
coefficient is negative. This indicates that the current Covid-19 growth rate
adverselyaffectedthesteelgrowthrateofthesteelsector.
We have also tested if lagged rates of Covid-19 growth affect steel growth rate. The
regressionequationsaregiven below.

278
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table: 6.3 Regression of Steel and lagged Covid-19 Growth Rate [Period: January 2020 to March 2021]

It isobserved that the coefficients-1.979741 of one-period lagged ‘Covid-19’ growth rate[Covid-19 (-1)] is
statistically significant at 7% and two-period lagged ‘Covid-19’ growth rate[Covid-19 (-2)] are not
statistically significant. This indicates that one lagged growth rate of‘Covid-19’ has affected on steel
growth rate but two lag dose not statistically significant affectssteelgrowthrate.
VEC ANALYSIS RESULTS
In order to examine the short-run adjustment process we estimated an appropriate VEC
model.Theestimated VECmodelisgiven below
Table: 6.4: VEC Results of Steel and Covid-19 Growth Rate [Period: January 2020 to March 2021]

It is observed from the table that the coefficients of [D Covid-19 (-1)] is statistically significantunder [D
(Steel)] and [D Covid-19 (-2)] are not statistically significant. This implies that the Steel sector display
ashort-runadjustmentmovementsagainst short-runvariationsin‘Covid-19’growthrate.
CONCLUSION AND POLICY RECOMMENDATION
Infra Structure
ItisobservedfromtheregressionequationandVECanalysisthat
(i) Thecoefficientoflevel‘Covid-19’dataissignificantat6%level
(ii) Thecoefficientisnegative
(iii) Thecoefficientsof[Covid-19(-1)]and[Covid-19(-2)]isnotstatisticallysignificant.
(iv) Thecoefficientsof[DCovid-19 (-1)]and[DCovid-19(-
2)]under[D(Infrastructure)]aresignificantstatisticallyandcoefficientvalueispositive.
279
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

This indicates that ‘Covid-19’ situation over this period concerned affected the infrastructuregrowth rate
adversely but lagged growth rate of ‘Covid-19’ is not statistically significant
affectsontheinfrastructuregrowthrate.Infrastructuresectoralso displayashort-runadjustmentagainstshort-
runvariationsin‘Covid-19’growth rate.
Manu Facture
ItisobservedfromtheregressionequationandVECanalysisthat
(v) Thecoefficientoflevel‘Covid-19’dataissignificantat7%level
(vi) Thecoefficientisnegative
(vii) Thecoefficientsof[Covid-19(-1)]and[Covid-19(-2)]isnotstatisticallysignificant.
(viii) Thecoefficientsof[DCovid-19(-1)]and[DCovid-19(-
2)]under[D(Manufacture)]aresignificantstatisticallyandthecoefficientispositive.
This indicates that ‘Covid-19’ situation over this period concerned affected the
manufacturegrowthrateadversely.Thelaggedperiodvaluesof‘Covid-
19’datadidnotaffectedthemanufacturesectorgrowthrateatall.Manufacturing sectoralsodisplaytheshort-
runadjustmentagainstshort-runvariationsin‘Covid-19’growth rate.
Mining
ItisobservedfromtheregressionequationandVECanalysisthat
(i) Thecoefficientoflevel‘Covid-19’dataissignificantat2%level
(ii) Thecoefficientisnegative
(iii) Thecoefficientsof[Covid-19(-1)]issignificantat6%levelbut[Covid-19(-2)]isnotstatistically significant.
(iv) Thecoefficientsof[DCovid-19(-1)]and[DCovid-19(-2)]under[D(Mining)]arenotsignificantstatistically.
This indicates that ‘Covid-19’ situation over this period concerned affected the mining growthrate
adversely. The 1st lagged period values of ‘Covid-19’ also affected the mining sector growthrate. Mining
sector does not display any short-run adjustment against short-run variations in‘Covid-19’growthrate.
Cement
ItisobservedfromtheregressionequationandVECanalysisthat
(i) Thecoefficientoflevel‘Covid-19’dataisnotsignificantatanylevel
(ii) Thecoefficientisnegative
(iii) The coefficientsof[Covid-19(-1)]and[Covid-19(-2)]isnotstatisticallysignificant.
(iv) Thecoefficientsof[DCovid-19(-1)]and[DCovid-19(-2)]under[D(Cement)]botharestatisticallysignificant.
This indicates that ‘Covid-19’ situation over this period concerned dose not affected the cementgrowth rate
adversely. Lagged growth rate of ‘Covid-19’ has also not statistically
significantaffectsonthecementgrowthrate.Cementsectordisplayashort-runadjustmentagainstshort-
runvariationsin‘Covid-19’growthrate.
CrudeOil
ItisobservedfromtheregressionequationandVECanalysisthat
(i) Thecoefficientoflevel‘Covid-19’dataisnotsignificantatanylevel
(ii) Thecoefficientispositivebutat2 ndlagitsnegative
(iii) Thecoefficientsof[Covid-19(-1)]and[Covid-19(-2)]isnotstatisticallysignificant
(iv) The coefficients of[ DCovid-19(-1)]arestatisticallysignificantunder [D (Crudeoil)] but [D Covid-19(-
2)]arenotstatisticallysignificantandcoefficientisnegative.
Thisindicatesthat‘Covid-19’situationoverthisperiodconcerneddosenotaffectedthecrudeoilgrowth rate
adversely. Lagged growth rate of ‘Covid-19’ has also not statistically
significantaffectsonthecrudeoilgrowthrate.Crudeoilsector displayashort-runadjustmentagainstshort-
runvariationsin ‘Covid-19’growthrateat[DCovid-19 (-1)].
280
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Steel
ItisobservedfromtheregressionequationandVECanalysisthat
(i) The coefficientoflevel‘Covid-19’dataissignificantat2%level
(ii) The coefficientisnegative
(iii) The coefficientsof [Covid-19(-1)]issignificantat7%levelbut[Covid-19(-2)]isnotstatistically significant.
(v) The coefficients of [D Covid-19(-1) ]arestatisticallysignificantunder[D(Steel)]but[DCovid-19(-
2)]arenotstatisticallysignificant.Thecoefficientisnegative.
This indicates that ‘Covid-19’ situation over this period concerned affected the steel growth rateadversely.
The 1st lagged period values of ‘Covid-19’ also affected the steel sector growth rate at7% level. Steel
sector display a short-run adjustment against short-run variations in ‘Covid-19’growthrateat[DCovid-19 (-
1)].
REFERENCES
1. The New York Times. Here Comes the Coronavirus Pandemic: Now, after Many Fire Drills, the World
May Be Facing a Real Fire. Available online: https:// www. nytimes. com/ 2020/ 02/29/ opinion/ sunday/
corona-virus- usa.html (accessed on 1 March 2020).
2. Scipioni, J. Why There Will Soon Be Tons of Toilet Paper, and What Food May Be Scarce, According to
Supply Chain Experts. Available online: https://www.cnbc.com/2020/03/18/supply-chain-experts-foods-
that-could- be-lessavailable-in-pandemic.html (accessed on 19 March 2020).
3. Asian Development Bank. COVID-19 Economic Impact Assessment Template. Available
online:https://data.adb.org/dataset/covid-19-economic-impact-assessment-template (accessed on 11 April
2020).
4. Asian Development Bank. COVID-19 Outbreak to Have Significant Economic Impact on Developing
Asia. Available online: https://www.adb.org/news/covid-19-outbreak-havesignificant-economic-impact-
developing-asia? (accessed on 6 March 2020).
5. Atlantic Council. South Asia’s Economic Outlook in the Era of COVID-19. Available online:
https://www.nytimes.com/article/cancelled-events-coronavirus.html (accessed on 11 April 2020).
6. Subba, M.B. COVID-19: Immediate Need to Keep Tourism Employees Economically Engaged. Available
online: https://kuenselonline.com/covid-19-immediate-need-to-keeptourism-employees-economically-
engaged/ (accessed on 14 March 2020).
7. Jagadish Prasad Bist. Covid-19, Economic Crisis, and the Nepali Economy. Available online:
https://kathmandupost.com/columns/2020/03/23/covid-19-economic-crisis-andthe-nepali-economy
(accessed on 23 March 2020)
8. Carlsson-Szlezak, Martin Reeves and Paul Swartz “What Coronavirus means for the Global Economy”,
BCG Henderson Institute, https://hbr.org/2020/03/what-coronavirus-could-mean-for-the-global-economy
9. Chaddha, N, A Das, S Gangopadhyay and N Mehta (2017), ‘Reassessing the Impact of Demonetisation on
Agriculture and Informal Sector’, India Development Foundation (IDF), New Delhi, January.
10. Duflo, Esther, Abhijit Banerjee (2020), “A prescription for action: Nine steps after the next 21 days”,
Indian Express, March 29, 2020. Dev, S, Mahendra (2020), “Addressing COVID-19 impacts on
agriculture, food security, and livelihoods in India”, IFPRI Blog, April 8. https:// www ifpri.org/ blog/
addressing-covid-19-impacts-agriculture-food-security-and-livelihoods-india.
11. FAO (2020), “Covid-19 Pandemic: Impact on Food and Agriculture”, Food and Agricultural Organisation,
Rome, http://www.fao.org/2019-ncov/q-and-a/en/
12. Himanshu (2019), “India’s farm crisis: decades old and with deep roots”, The India Forum,
https://www.theindiaforum.in/article/farm-crisis-runs-deep-higher-msps-and-cash-handouts-are-not-
enough.
13. IMF (2020), “Policy responses to Covid-19”, International Monetary Fund, Washington DC.
https://www.imf.org/en/Topics/imf-and-covid19/Policy-Responses-to-COVID-19#I

281
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

14. Kapur, Dev and Subramanian, Arvind (2020), “How coronavirus crisis can be converted to opportunity to
fundamentally strengthen Indian economy”, Indian Express, April 3, 2020.
15. Khera, Reetika (2020) “Covid-19: What can be done immediately to help vulnerable population”, Ideas for
India. https://www.ideasforindia.in/topics/poverty-inequality/covid-19-what-can-be-done-immediately -
tohelp-vulnerable-population.html
16. Krishnan, Deepa and Stephan Siegel (2017), “Survey of the Effects of Demonetisation on 28 Slum
Neighbourhoods in Mumbai”, Economic and Political Weekly, Vol. 52, Issue No. 3.
17. Mehrotra, Santosh, and Jajati K. Parida (2019):India’s Employment Crisis: Rising Education Levels and
Falling Non-agricultural Job Growth. https:// cse. Azimpremji university. edu.in/ wpcontent/ uploads/
2019/10/
18. Mehrotra_Parida_India_Employment_Crisis.pdf Narayanan, Sudha (2020), “Food and agriculture during a
pandemic: Managing the consequence”, https://www.ideasforindia.in/topics/agriculture/food-and-
agriculture-during-a-pandemic-managing-theconsequences.html
19. Rangarajan, C. and S. MahendraDev (2020), “A Safety net: Post-Covid”, Indian Express, July 3, 2020.
20. Ray, Debraj and S. Subramanian (2020), “India’s lockdown: An interim report”, Working Paper Series,
National Bureau of Economic Research (NBER), No. 27282, May 2020.
21. RBI (2020), Monetary Policy Report, Reserve Bank of India, April 2020.
22. Sengupta, Rajeswari and Harsh Vardhan (2017), “This time it is different: Non-performing assets in Indian
banks”, Economic & Political Weekly, 52(12), 25 March 2017.
23. Sengupta, Rajeswari and Harsh Vardhan (2020a), "The pandemic and the package", Ideas for India, 4 June.
https://www.ideasforindia.in/topics/macroeconomics/the-pandemic-and-the-package.html
24. Sengupta, Rajeswari and Harsh Vardhan (2020b), "Policymaking at a time of high risk-aversion", Ideas for
India, 6 April. https://www.ideasforindia.in/topics/money-finance/policymaking-at-a-time-of-high-risk-
aversion.html
25. Sengupta, Rajeswari and Josh Felman (2020), "RBI vs. Covid-19: Understanding the announcements of
March 27", The Leap Blog, 7 April. https://blog.theleap journal.org/ 2020/ 04/ rbi-vs-covid-19-
understanding.html
26. Sengupta, R (2020), "Covid-19: Macroeconomic implications for India, Ideas for India", 24 March.
https://www.ideasforindia.in/topics/macroeconomics/covid-19-macroeconomic-implications-for-india.html
27. Zhang, Xiaobo (2020), “COVID-19s Impact on China’s Small and Medium Size Business”, IFPRI,
Washington, DC, https:// www. ifpri.org/ blog/ covid- 19s- impact-chinas-small-and-medium-sized-
businesses
28. Amit B, Rosa A, Rahul L, Surbhi K, Mrinalini J, Paaritosh N et al. State of Working India 2021: One year
of Covid-19, Centre for Sustainable Employment, AzimPremji University. Available at:
https://cse.azimpremjiuniversity.edu.in/wp-content/uploads/2021/08/SWI2021_August_WEB.pdf.
Accessed on 9 March 2021.
29. WHO. Novel Coronavirus (2019-nCoV) Situation report -1.WHO. 2020. Available at: https://www.
who.int/docs/default-source/coronaviru se/situation-reports/20200121-sitrep-1-2019-
ncov.pdf?sfvrsn=20a99c10_4. Accessed on 14 May 2021.
30. Economic survey 2020-21. New Delhi Department of Economic Affairs Ministry of Finance Government
of India. 2021. Available at: https://www.indiabudget.gov.in/economicsurvey/. Accessed on 14 May 2021.
31. Dev S, Mahendra, Rajeswari S. Covid-19: Impact on the Indian economy. Report. Indira Gandhi institute
of development research. Mumbai. 2020. Available at: https:// ideas. repec. org/ p/ ind/ igiwpp/ 2020-013.
html. Accessed on 14 May 2021.
32. IMF. Policy Responses to COVID19. IMF. Available at: https://www.imf.org/en/Topics/imf-and-
covid19/Policy-Responses-to-COVID-19. Accessed on 18 May 2021.

282
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

33. Maharashtra, Kerala, Punjab, Madhya Pradesh, Tamil Nadu, Gujarat & Chhattisgarh witnesses an upsurge
in Daily New Cases. 2021. Available at: www. pib. gov.in/ Press release share.aspx?PRID= 1700689.
Accessed on 14 May 2021.
34. Maharashtra, Kerala, Punjab, Karnataka, Gujarat and Tamil Nadu continue to report a spike in Daily New
Cases. 2021. Available at: www.pib.gov.in/Pressreleaseshare.aspx?PRID=1703117. Accessed on 14 May
2021.
35. Genome Sequencing by INSACOG shows variants of concern and a Novel variant in India. Available at:
www.pib.gov.in/Pressreleaseshare.aspx?PRID=1707177. Accessed on 17 May 2021.
36. Monthly economic review. April 2021.Department of economic affairs. 2021. Available at:
https://dea.gov.in/sites/default/files/MER%20April%202021_0.pdf. Accessed on 14 May 2021.
37. WHO. Draft landscape and tracker of COVID-19 candidate vaccines. WHO. 2021. Available at:
https://www.who.int/publications/m/item/draft-landscape-of-covid-19-candidate-vaccines. Accessed on 17
May 2021.
38. COVID-19 Vaccine FAQs. Ministry of health and family welfare Government of India. 2021. Available at:
https://www.mohfw.gov.in /covid_vaccination/vaccination/faqs.html. Accessed on 18 May 2021.
39. Indian economy: A snapshot Economic survey 2020-21. Available at: https://pib.gov.in/newsite/
infographicss.aspx?mincode=15&Event_Code=14. Accessed on 18 May 2021.
40. Second Advance Estimates of National Income, 2020-21. Ministry of statistics and programme
implementation. 2021. Available at: https://pib.gov.in/Pressreleaseshare.aspx?PRID=1701119. Accessed
on 19 May 2021.
41. Mehrotra, Santosh, and Jajati K. Parida (2019): India’s Employment Crisis: Rising Education Levels and
Falling Non-agricultural Job Growth. https:// cse.azimpremji university. edu.in/ wpcontent/ uploads/ 2019/
10/Mehrotra_Parida_IndiaEmployment_Crisis.pdf
42. Chakraborty, L. ,& Thomas, E. (2020). COVID‐19 and Macroeconomic Uncertainty: Fiscal and Monetary
Policy Response (Working Paper No. 20/302). NIPFP, New Delhi. https:// www. nipfp. org.in/
media/medialibrary/2020/04/WP_302_2020.pdf.
43. Chidambaram, P. (2020, May 4). We will never know how many people died of starvation, because no
state government will admit to starvation deaths. The Indian Express. https:// indianexpress. com/
article/opinion/columns/p-chidambaram-india-coronavirus-lockdown-migrants-hunger-6390882/
44. Kumar, A. ,Nayar, K. R. , &Koya, S. F. (2020). COVID‐19: Challenges and its consequences for
ruralhealth care in India. Public Health in Practice, 1, 100009.
45. Mukhopadhyay, B. R. (2020). COVID‐19 and the Indian farm sector: Ensuring everyone's seat at the
table. Agriculture and Human Values, 37, 549–550. 10.1007/s10460-020-10076-y.
46. Rele, S. (2020). Emerging outbreaks and epidemic threats: The practicalityand limitations in the
development and manufacturing oftreatments for Coronavirus (COVID‐19). Polymorphism, 4, 45–52.
47. Trivedi, U. ,&Beniwal, V. (2020). World's Biggest Lockdown to Push 12 Million Into Extreme Poverty in
India. Bloomberg. https:// www. bloomberg. com/ news/ articles/ 2020‐ 05‐27/ world‐s‐ biggest‐
lockdown‐ to‐push‐12‐million‐into‐extreme‐poverty
48. Uppal, P. (2020). Covid‐19 will Lead to increased crime rates in India. International Journal of
Research‐GRANTHAALAYAH, 8(4), 72–78.
49. Brooks, S. K., Webster, R. K. , Smith, L. E. , Woodland, L. , Wessely, S. , Greenberg, N. , & Rubin, G. J.
(2020). The psychological impact of quarantine and how to reduce it: A rapid review of the evidence. The
Lancet, 395, 912–92

AUTHOR DETAILS:
DR. SIDHARTHA SANKAR LAHA
Associate Professor, Department of Lifelong Learning & Extension, University of North Bengal, Dist:
Darjeeling, West Bengal
283
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

A NEW GENERALIZATION OF TBS-g¨-SPACES

K. GOWRI, T. RAMACHANDRAN AND V. SANGEETHASUBHA

1. ABSTRACT
In 2004, Lellis Thivagar and Ravi introduced a new form of open sets in bitopo- logical spaces. They
investigated the basic properties and characterizations of the new sets in detail. In 2006, Ravi [13]
submitted the aforesaid work for his Ph. D. From his Thesis, the following properties and definitions are
used to pursue further research. Throughout the paper, (X, τ1, τ2), (Y, σ1, σ2) and (Z, U1, U2) or
(simply X, Y and Z) denote bitopological spaces. We introduce a new type of weaker form of open sets in
bitopological space as follows.
0
2010 Mathematics Subject Classification: 54E55
Keywords and phrases. bitopological space, BS-g̈-open, BS-g*p-open, BS-Tω -space.

2. INTRODUCTION
Levine introduced the notion of T1/2-spaces which properly lies between T1-spaces and T0-spaces. Many
authors studied properties of T1/2-spaces: Dunham, Arenas et al. etc. In this paper, we introduce the
notions called TBS -g̈-spaces, g TBS -g̈-spaces and α TBS -g̈-spaces and obtain their properties and
characterizations.
3. PRELIMINARIES
Definition 3.1. A subset M of a bitopological space X is called a BS-preopen set if M ⊆ BS-int(BS-
cl(M)).
The complement of a BS-pre-open set is called BS-preclosed.
The BS-preclosure of a subset M of X, denoted by BS-pcl(M) is defined to be the intersection of all BS-
preclosed sets of X containing M. It is known that BS-pcl(M) is a preclosed set. For any subset M of an
arbitrarily chosen bitopological space, the BS-semi-interior (resp. BS-α-interior, BS-preinterior) of M,
denoted by BS-sint(M)
(resp. BS-α int(M), BS-pint(M)), is defined to be the union of all BS-semi-open
(resp. BS-α-open, BS-preopen) sets of X contained in M.
Remark 3.2. The collection of all BS-g̈-open (resp. BS-ω-open, BS-αg-open, BS- gsp-open, BS-gs-
open, BS-α-open, BS-g*p-open) sets is denoted by BS-G̈O(X) (resp. BS-ωO(X), BS-αGO(X), BS-
GSPO(X), BS-GSO(X), BS-αO(X), BS-G∗PO(X)).
We denote the power set of X by P(X).
Definition 3.3. A bitopological space X is called
(1) BS-T1/2-space if every BS-g-closed subset of X is BS-closed in X.
(2) BS-Tb-space if every BS-gs-closed subset of X is BS-closed in X.
Definition 3.4. Let X be a bitopological space and M ⊆ X. We define the BS-sg- closure of M
(briefly BS-sg-cl(M)) to be the intersection of all BS-sg-closed sets containing M.
Proposition 3.5. Every BS-closed set is BS-g̈-closed.
Proof. If M is a BS-closed subset of X and N is any BS-sg-open set containing M, then N ⊇ M =
BS-cl(M). Hence M is BS-g̈-closed in X.
The converse of Proposition 3.5 need not be true as seen from the following example.
Example 3.6. Let X = {α, β, γ}, τ1 = {φ, X, {α, β}} and τ2 = {φ, X, {β, γ}}. Then the sets in {φ,
X, {α, β}, {β, γ}} are called BS-open and the sets in {φ, X, {α}, {γ}} are called BS-closed. Then
BS-G̈C(X) = {φ, {α}, {γ}, {α, γ}, X}. Clearly, the set {α, γ} is a BS-g̈-closed set but it is not a
BS -closed set in X.
284
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Proposition 3.7. Every BS-g̈-closed set is BS-g̈α -closed.


Proof. If M is a BS-g̈-closed subset of X and N is any BS -sg-open set containing M, then N ⊇ BS-
cl(M) ⊇ BS-αcl(M). Hence M is BS-g̈α -closed in X.
The converse of Proposition 3.7 need not be true as seen from the following example.
Example 3.8. Let X = {α, β, γ}, τ1 = { φ, X, {β}} and τ2 = {φ, X}. Then the sets in {φ, X,
{β}} are called BS-open and the sets in {φ, X, {α, γ}} are called BS- closed. Then BS-G̈C(X) =
{φ, {α, γ}, X} and BS-G̈α C(X) = {φ, {α}, {γ}, {α, γ}, X}. Clearly, the set{α} is an BS-g̈α -
closed set but not a BS-g̈-closed set in X.
Example 3.9. Let X = {α, β, γ}, τ1 = {φ, X,{α}} and τ2 = {φ, X}. Then the sets in {φ, X,
{α}} are called BS-open and the sets in{φ, X, {β, γ}} are called BS- closed. Then BS-G̈C(X) =
{φ, {β, γ}, X} and BS-ψC(X) = {φ, {β}, {γ}, {β, γ}, X}. Clearly, the set {β} is a BS-ψ-
closed set but it is not a BS-g̈-closed set in X.
Proposition 3.10. Every BS-g̈-closed set is BS-ĝ-closed.
Proof. Suppose that M ⊆ N and N is BS-semi-open in X. Since every BS-semi-open set is BS -sg-open
and M is BS-g̈-closed, therefore BS-cl(M) ⊆ N. Hence M is BS-ĝ- closed in X.
The converse of Proposition 3.10 need not be true as seen from the following example.
Example 3.11. Let X = {α, β, γ, δ}, τ1 ={φ, X, {δ}, {β, γ, δ}} and τ2 = {φ, X, {β, γ}}. Then
the sets in {φ, X, {δ}, {β, γ}, {β, γ, δ}} are called BS-open and the sets in {φ, X, {α}, {α, δ}, {α,
β, γ}} are called BS-closed. Clearly, the set {α, γ, δ} is a BS-ĝ-closed set but it is not a BS-g̈-closed set
in X.
Proposition 3.12. Every BS-g̈-closed set is BS-g-closed.
Proof. If M is a BS-g̈-closed subset of X and N is any BS-open set containing M, since every BS-open set
is BS-sg-open, we have N ⊇ BS-cl(M). Hence M is BS-g-closed in X.
The converse of Proposition 3.12 need not be true as seen from the following example.
Example 3.13. Let X = {α, β, γ}, τ1 = {φ, X, {α}} and τ2 = {φ, X, {β, γ}}. Then the sets
in {φ, X, {α}, {β, γ}} are called BS-open and BS -closed. Then BS- G̈C(X) = {φ, {α}, {β, γ},
X} and BS-GC(X) = P(X). Clearly, the set {α, β} is a BS-g-closed set but it is not a BS-g̈-closed
set in X.
Proposition 3.14. Every BS-g̈-closed set is BS-gs-closed.
Proof. If M is a BS-g̈-closed subset of X and N is any BS-open set containing M, since every BS-
open set is BS-sg-open, we have N ⊇ BS-cl(M) ⊇ BS-scl(M). Hence M is BS-gs-closed in X.
The converse of Proposition 3.14 need not be true as seen from the following example.
Example 3.15. In Example 3.9, we have BS-G̈C(X) = {φ, {β, γ}, X} and BS- GSC(X) =
{φ, {β}, {γ}, {α, β}, {α, γ}, {β, γ}, X}. Clearly, the set {γ} is a BS -gs-closed set but it is
not a BS-g̈-closed set in X.
Proposition 3.16. Every BS-g̈-closed set is BS-gsp-closed.
Proof. If M is a BS-g̈-closed subset of X and N is any BS-open set containing M, since every BS-
open set is BS-sg-open, we have N ⊇ BS-cl(M) ⊇ BS-spcl(M). HenceM is BS-gsp-closed in X.
The converse of Proposition 3.16 need not be true as seen from the following example.
Example 3.17. In Example 3.8, we have BS-G̈C(X) = {φ, {α, γ}, X} and BS- GSPC(X) =
{φ, {α}, {γ}, {α, β}, {α, γ}, {β, γ}, X}. Clearly, the set {γ} is a BS -gsp-closed set but it is
not a BS-g̈-closed set in X.
Theorem 3.18. If a set M is BS-g̈-closed in X then BS-cl(M) − M contains no nonempty BS-sg-
closed set.

285
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

4. PROPERTIES OF TBS-G¨-SPACES
We introduce the following definition:
Definition 4.1. (1) A bitopological space X is called BS-semi generalized-R0 (briefly BS-sg-R0) if
and only if for each BS-sg-open set G and x ∈ G implies BS- sg-cl({x}) ⊂ G.
(2) A subset M of a bitopological space X is called a BS-g*-preclosed (briefly BS- g*p-closed) set if BS-
pcl(M) ⊆ U whenever M ⊆ U and U is BS-g-open in X. The complement of a BS-g*p-closed set is
called BS-g*p-open.
Definition 4.2. A bitopological space X is called
(1) BS-semi generalized-T0 (briefly BS-sg-T0) if and only if to each pair of dis- tinct points x, y of X,
there exists a BS-sg-open set containing one but notthe other.
(2) BS-semi generalized-T1 (briefly BS-sg-T1) if and only if to each pair of dis- tinct points x, y of X, there
exist a pair of BS-sg-open sets, one containing x but not y, and the other containing y but not x.
Definition 4.3. A bitopological space X is called
(1) a BS-αTb-space if every BS-αg-closed subset of X is BS-closed in X.
(2) a BS-Tω-space if every BS-ω-closed subset of X is BS-closed in X.
(3) a BS-Tp*-space if every BS-g*p-closed subset of X is BS-closed in X.
(4) a BS-*sTp-space if every BS-gsp-closed subset of X is BS-g*p-closed in X.
(5) a BS-αTd-space if every BS-αg-closed subset of X is BS-g-closed in X.
(6) a BS-α-space if every BS-α-closed subset of X is BS-closed in X.
Theorem 4.4. For a bitopological space X, each of the following statements areequivalent:
(1) X is a BS-sg-T1.
(2) Each one point set is BS-sg-closed set in X.
Definition 4.5. A bitopological space X is called a TBS -g̈-space if every BS-g̈-closed subset of X is
BS-closed in X.
Example 4.6. Let X = {α, β, γ}, τ1 = {φ, X, {β}} and τ2 = {φ, X}. Then the sets in {φ, X,
{β}} are called BS-open and the sets in {φ, X, {α, γ}} are called BS-closed. Then BS-G̈C(X)
= {φ, {α, γ}, X}. Thus X is an TBS -g̈-space.
Example 4.7. Let X = {α, β, γ}, τ1 = {φ, X, {α, γ}} and τ2 = {φ, X}. Then the sets in {φ, X, {α,
γ}} are called BS-open and the sets in {φ, X, {β}} are called BS-closed. Then BS-G̈C(X) = {φ,
{β}, {α, β}, {β, γ}, X}. Thus X is not an TBS -g̈-space.
Proposition 4.8. Every BS-T1/2 -space is TBS -g̈-space but not conversely. Proof. Follows from
Proposition 3.7
The converse of Proposition 4.8 need not be true as seen from the following example.
Example 4.9. In the Example 4.6, BS-GC(X) = {φ, {α}, {γ}, {α, β}, {α, γ}, {β, γ}, X}.
Thus X is not an BS-T1/2 -space.
Proposition 4.10. Every BS-Tω -space is TBS -g̈-space but not conversely. Proof. Follows from
Proposition 3.10.
The converse of Proposition 4.10 need not be true as seen from the following example.
Example 4.11. Let X = {α, β, γ}, τ1 = {φ, X, {α, γ}} and τ2 = {φ, X, {β}}. Then the sets in {φ,
X, {β}, {α, γ}} are called BS-open and the sets in {φ, X, {β}, {α, γ}} are called BS -closed. Then
BS-ωC(X) = P(X) and BS-G̈C(X) = {φ, {β}, {α, γ}, X}. Thus X is an TBS -g̈-space but not
an BS-Tω -space.
Proposition 4.12. Every BS-α Tb -space is TBS -g̈-space but not conversely.
Proof. Follows from Proposition 3.10.
The converse of Proposition 4.12 need not be true as seen from the following example.
286
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Example 4.13. In the Example 4.6, BS-αGC(X) = {φ, {α}, {γ}, {α, β}, {α, γ}, {β, γ}, X}.
Thus X is not an BS-α Tb -space.
Proposition 4.14. Every BS-*s Tp -space and BS-Tp *-space is TBS -g̈-space but not conversely.
Proof. Follows from Proposition 3.16 and Definition 4.3 (3) and (6).
The converse of Proposition 4.14 need not be true as seen from the following example.
Example 4.15. In the Example 4.6, BS-GSP C(X) = {φ, {α}, {γ}, {α, β}, {α, γ}, {β, γ}, X}
and BS-G∗ P C(X) = {φ, {α}, {γ}, {α, γ}, X}. Thus X is neither an BS-*sTp-space nor an
BS-Tp*-space.
Proposition 4.16. Every BS-Tb -space is TBS -g̈-space but not conversely. Proof. Follows from
Proposition 3.14.
The converse of Proposition 4.16 need not be true as seen from the followingexample.
Example 4.17. In the Example 4.6, BS-GSC(X) = {φ, {α}, {γ}, {α, β}, {α, γ}, {β, γ}, X}.
Thus X is not an BS-Tb -space.
Remark 4.18. We conclude from the next two examples that TBS -g̈-spaces and BS- α-spaces are
independent.
Example 4.19. In the Example 4.6, BS-αC(X) = {φ, {α}, {γ}, {α, γ}, X}. Thus X is an TBS -
g̈-space but not an BS-α-space.
Example 4.20. In the Example 4.7, BS-αC(X) = {φ, {β}, X}. Thus X is an BS-α-space but
not an TBS -g̈-space.
Theorem 4.21. For a bitopological space X the following properties are equivalent:
(1) X is a TBS -g̈-space.
(2) Every singleton subset of X is either BS-sg-closed or BS-open.
Proof. (i) ⇒ (ii). Assume that for some x ∈ X, the set {x} is not a BS-sg-closed set in X. Then the
only BS -sg-open set containing {x}c is X and so {x}c is BS-g̈-closed in X. By assumption {x}c is
BS-closed in X or equivalently {x} is BS-open. (ii) ⇒ (i). Let M be a BS-g̈-closed subset of X and
let x ∈ BS-cl(M). By assumption {x} is either BS-sg-closed or BS-open.
Case (a) Suppose that {x} is BS -sg-closed. If x ∈ / M, then BS-cl(M) − M contains a nonempty BS-sg-
closed set {x}, which is a contradiction to Theorem 3.18. Therefore x ∈ M.
Case (b) Suppose that {x} is BS-open. Since x ∈ BS-cl(M), {x} ∩ M /= φ and sox ∈ M. Thus in both
case, x ∈ M and therefore BS-cl(M) ⊆ M or equivalently M isa BS-closed set of X.
Theorem 4.22. For a bitopological space X the following properties hold:
(1) If X is BS-sg-T1 , then it is TBS -g̈.
(2) If X is TBS -g̈, then it is BS-sg-T0 .
Proof. (i) The proof is obvious from Theorem 4.4. (ii) Let x and y be two distinct elements of X. Since the
space X is TBS -g̈, we have that {x} is BS -sg-closed or BS- open. Suppose that {x} is BS-open. Then
the singleton {x} is a BS-sg-open set such that x ∈ {x}and y ∈ / {x}. Also, if {x} is BS-sg-closed,
then X \ {x} is BS -sg-open such that y ∈ X \ {x} and x ∈ / X \ {x}. Thus, in the above two cases,
there exists a BS-sg-open set U of X such that x ∈ U and y ∈ / U or x ∈
/ U and y ∈ U. Thus, the space X
is BS-sg-T0.
Theorem 4.23. For a BS-sg-R0 bitopological space X the following properties areequivalent:
(1) X is BS-sg-T0.
(2) X is TBS -g̈.
(3) X is BS-sg-T1.
Proof. It suffices to prove only (i) ⇒ (iii). Let x /= y and since X is BS-sg-T0, wemay assume that x
∈ U ⊆ X \ {y} for some BS-sg-open set U. Then x ∈ X \ BS-sg-cl({y}) and X \ BS-sg-cl({y}) is BS-sg-

287
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

open. Since X is BS-sg-R0, we have BS-sg-cl({x}) ⊆ X \ BS-sg-cl({y}) ⊆ X \ {y} and hence y ∈/


BS-sg-cl({x}). There exists a BS-sg-open set V such that y ∈ V ⊆ X \ {x} and X is BS-sg-T1.
5. GTBS-G¨-SPACES
Definition 5.1. A bitopological space X is called a g TBS -g̈-space if every BS-g-closed set in it is BS-g̈-
closed.
Example 5.2. In the Example 4.7, X is an g TBS -g̈-space and the space X in the Example 4.6, is
not a g TBS -g̈-space.
Proposition 5.3. Every BS-T1/2 -space is g TBS -g̈-space but not conversely.
Proof. Follows from Proposition 3.5.
The converse of Proposition 5.3 need not be true as seen from the following example.
Example 5.4. In the Example 4.7, X is a g TBS -g̈-space but not an BS-T1/2 -space.
Remark 5.5. TBS -g̈-spaces and g TBS -g̈-spaces are independent.
Example 5.6. The bitopological space X in the Example 4.7, is a g TBS -g̈-space but not a TBS -g̈-space
and the bitopological space X in the Example 4.6, is a TBS -g̈-space but not a g TBS -g̈-space.
Theorem 5.7. If X is a g TBS -g̈-space, then every singleton subset of X is either BS -g-closed or
BS-g̈-open.
Proof. Assume that for some x ∈ X, the set {x} is not a BS-g-closed set in X. Then {x} is not a BS-
closed set, since every BS-closed set is BS-g-closed. So {x}c is not BS- open and the only BS-open set
containing {x}c is X itself. Therefore {x}c is trivially a BS -g-closed set and by assumption, {x}c is
a BS-g̈-closed set or equivalently {x} is BS-g̈-open.
The converse of Theorem 5.7 need not be true as seen from the following example.
Example 5.8. In the Example 4.6, the sets {α} and {γ} are BS-g-closed in X and the set {β} is BS-g̈-
open. But the space X is not a g TBS -g̈-space.
Theorem 5.9. A space X is BS-T1/2 if and only if it is both TBS -g̈ and g TBS -g̈.
Proof. Necessity. Follows from Propositions 4.8 and 5.3.
Sufficiency. Assume that X is both TBS -g̈ and g TBS -g̈. Let M be a BS-g-closed set of X. Then M
is BS-g̈-closed, since X is g TBS -g̈. Again since X is TBS -g̈, M is a BS-closed set in X and so X is
BS-T1/2.
6. ΑTBS-G¨-SPACES
Definition 6.1. A bitopological space X is called a α TBS -g̈-space if every BS-αg- closed subset of
X is BS-g̈-closed in X.
Example 6.2. In the Example 4.7, X is a α TBS -g̈-space and the space X in the Example 4.6, is
not a α TBS -g̈-space.
Proposition 6.3. Every BS-α Tb -space is α TBS -g̈-space but not conversely.
Proof. Follows from Proposition 3.5.
The converse of Proposition 6.3 need not be true as seen from the following example.
Example 6.4. In the Example 4.7, X is a α TBS -g̈-space but not a BS-α Tb -space.
Proposition 6.5. Every α TBS -g̈-space is a BS-α Td -space but not conversely.
Proof. Let X be a α TBS -g̈-space and let M be a BS-αg-closed set of X. Then M is a BS-g̈-closed
subset of X and by Proposition 3.12, M is BS -g-closed. Therefore X is a BS-αTd-space.
The converse of Proposition 6.5 need not be true as seen from the following example.
Example 6.6. In the Example 4.6, X is a BS-α Td -space but not a α TBS -g̈-space.

288
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Theorem 6.7. If X is a α TBS -g̈-space, then every singleton subset of X is either BS-αg-closed or
BS-g̈-open.
Proof. Similar to Theorem 5.7.
The converse of Theorem 6.7 need not be true as seen from the following example.
Example 6.8. In the Example 4.6, the sets {α} and {γ} are BS-αg-closed in X and the set {β} is BS-
g̈-open. But the space X is not a α TBS -g̈-space.
REFERENCES
[1] S. P. Arya and T. Nour, Characterizations of S-normal spaces, Indian J.Pure.Appl. Math. 21
(8)(1990), 717-719.
[2] P. Bhattacharyya and B. K. Lahiri, Semi-generalized closed sets in topology. Indian J.Math.
29(1987), 375-382.
[3] S. G. Crossley and S. K. Hildebrand, Semi-closure. Texas J.Sci. 22(1971), 99- 112.
[4] R. Devi, K. Balachandran and H. Maki, Generalized α-closed maps and α-generalized closed
maps, Indian J.Pure. Appl. Math. 29(1)(1998), 37-49.
[5] R. Devi, H. Maki and K. Balachandran, Semi-generalized closed maps and generalized semi-
closed maps. Mem. Fac. Sci. Kochi. Univ. Ser. A. Math. 14(1993), 41-54.
[6] N. Levine, Semi-open sets and semi-continuity in topological spaces. Amer. Math. Monthly,
70(1963), 36-41.
[7] N. Levine, Generalized closed sets in topology. Rend. Circ. Mat. Palermo, 19(1970), 89-96.
[8] H. Maki, R. Devi and K. Balachandran, Generalized α-closed sets in topology. Bull. Fukuoka
Univ. Ed. Part III, 42(1993), 13-21.
[9] H. Maki, R. Devi and K. Balachandran, Associated topologies of generalized α-closed sets and α-
generalized closed sets. Mem.Fac. Sci. Kochi. Univ. Ser. A. Math. 15(1994), 57-63.
[10] H. Maki On generalizing semi-open sets and preopen sets. Report for meeting on Topological
spaces Theory and its Applications, 24-25 August 1996, Yatsushiro Coll. Tech., 13-18.
[11] O. Njastad, on some classes of nearly open sets. Pacific J.Math. 15(1965), 961-970.
[12] V. Popa and T. Noiri, On M-continuous functions. Analele Univ. Dunãrea De Jos din Galati Fase II, an.
XVIII (XXIII), (2000), 31-41.
[13] Ravi, O: Studies on new class of functions in bitopological spaces, Ph. D., Thesis, Madurai
Kamaraj University, Madurai (2006).
[14] O. Ravi, M. L. Thivagar, and Jinjinli, Remarks on extensions of (1,2)٨-g-closed mappings in
bitopology. (Submitted).
[15] O. Ravi, M. L. Thivagar, and E. Hatir, Decompositions of (1,2)٨-continuity and (1,2)٨-α-
continuity. (To appear in the Miskolc Mathematical Notes).
[16] O. Ravi, M. L. Thivagar, and E. Ekici, On bitopological (1,2)٨-preclosed mappings. (To appear in
the Analele Sti. Univ. Ovidius Constanta).
[17] O. Ravi, M. L. Thivagar, and A. Nagarajan, (1,2)٨-αg-closed sets and (1,2)٨-gα-closed sets.
[18] S. Rose Mary, M. L. Thivagar and M. E. Abd El-Monsef, αĝ closed sets in topological spaces.
Assiut Univ. J.Math. Comp. Sci. 36(1)(2007), 43-51.
[19] M. K. R. S. Veera Kumar, ĝ-closed sets in topological spaces. Bull. Allah. Math. Soc. 18(2003),
99-112.
AUTHOR DETAILS:
1
K. GOWRI, 2T. RAMACHANDRAN AND 3V. SANGEETHASUBHA
1
Ph. D Research Scholar, Department of Mathematics, Mother Terasa Women’s University, Kodaikanal,
Tamil Nadu, India
2
HOD, Department of Mathematics, M. V. Muthiah Govt Arts College for Women, Dindigul, Tamil
Nadu, India
3
Department of Mathematics, The Madura College (Autonomous), Madurai, Tamil Nadu, India

289
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

ON SOLVING SOLID ASSIGNMENT PROBLEM WITH APPLICATION TO REAL LIFE

DHANASHRI A. MUNOT* AND DR. KIRTIWANT P. GHADLE

Graphical Abstract:

ABSTRACT
A novel way which uses the concept of modular arithmetic is proposed to solve SolidAssignment Problem. SAP is
a special case of STP where the quantities corresponding to supply, demand and conveyance are assumed to be
one and hence one to one allocation is required. In this method given problem with three constraints is solved
by considering threedifferent forms and minimal answer (maximal answer) from all answers of possible forms is
considered as best settlement solution of given minimization (maximization) SAP. Proposed way of solving SAP
is also organized in the form of an algorithm and illustrated by real life numerical example where aim is to
assign a teacher to a class for a time slot with minimum cost of assignment. Proposed algorithm is also coded in
MATLAB for the user to use it withease.
Keywords: Solid Assignment Problem, Solid Transportation Problem, MATLAB, Modular Arithmetic, Online
Teaching Platform.

INTRODUCTION
AP is special case of TP studied in the area of optimization where aim is to assign a set of k elements to another
set of k elements. For instance assigning job to men, teacher to class, driver to bus, satellite to orbit and so on. In
all such situations one more constraint can be considered for more perfection like assigning job to men in
particular branch of company, teacher to class for definite time period, driver to bus along a specified route,
satellite to orbitfor particular time with the aim of minimizing cost. All such cases are tackled in SAP first stated
by Pierskalla [9], the name Solid Assignment Problem itself states that it has 3 constraints to deal with at once.
Magos and Miliotis [8] used branch and bound technique to find an optimal solution of the planar three-index
AP. Anuradha and Pandian [2] got the optimal solution of SAP by using one-to-one fixed method. Anuradha [1]
solved FSAP by optimum assignment schedule, in another work Anuradha, Jayalakshmi, Kavitha, Basit, and
Raza [3] obtained an optimal solution for SAP by using reduction method. Kumar [7] have solved Intuitionistic
Fuzzy Solid Assignment Problem by using LINGO 17 software. Sobana and Anuradha [10] have solved multi
objective unbalanced SAP with triangular type 2 fuzzy parameters. Ghadle and Munot [4] has studied recent
approaches to solve TP and FTP. Ghadle and Munot [5, 6] have developed an innovative way to solve TP and is
further extended to solve AP, BCTP, FrTP , STP as well. In this paper, author have used the concept of modular
arithmetic to solve SAP, herein the problem with all given three constraints is solved by considering three
different forms satisfying all 3 assignments at once and minimalanswer from all is considered as best settlement
solution of given SAP. Proposed method is illustrated by real life example in which assigning teacher to online
class for given time slot is considered, where aim is to minimize the cost of assignment and thereby maximizing
the profit of corresponding online platform.

290
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Mathematical Model
A mathematical model for SAP can be given as

𝑥𝑎𝑏𝑓 = 0; 𝑂𝑅 𝑥𝑎𝑏𝑓 = 1; ∀ 𝑎 = 1,2, … , 𝑚; 𝑏 = 1,2, … , 𝑛; 𝑓 = 1,2, … , 𝑘. ---------------------- (iv)


Where,
𝑥𝑎𝑏𝑓 = 1, if job b is assigned to man a in the factory f
𝑥𝑎𝑏𝑓 = 0, otherwise.
𝑐𝑎𝑏𝑓 - Cost of assigning job b to man a in the factory f
Here, our aim is to minimize the cost of SAP having objective function S(x) and satisfying (i) to (iv)
Proposed method to solve SAP:
I. Let A(x) be given SAP. Solve it by considering all three different possible forms so as to get all possible
solutions.
II. First consider given problem in the form of Men-Job-Factory and solve it by “Ghadle-Munot Algorithm For
AP”. Let A1 be the solution obtained in this step.
III. Now reform the table of given SAP in the form of Men-Factory-Job and solve it by “Ghadle-Munot
Algorithm for AP”. Let A2 be the solution obtained in this step.
IV. Again reform the table of given SAP in the form of Factory-Job-Men and solve it by “Ghadle-Munot
Algorithm for AP”. Let A3 be the solution obtained in this step.
V. Let A= min { A1, A2, A3}
VI. A would be best settlement solution of given SAP.
Proposed algorithm is illustrated through following numerical examples.
Example:
Suppose for an online teaching forum (like Byju, White-Hat Junior or Vedantu), there are three teachers T1, T2
and T3 for three classes (like fifth, sixth, seventh) K 1, K2 and K3 to be allotted in three different time slots S1,
S2 and S3. Obviously one teacher could be assignedto only one class for one time slot. The assignment cost of a
teacher for a class and time slotis given in the following table. Assign the teachers so as to minimize the cost.
S1 S1 S1
Time Slot S2 S2 S2
S3 S3 S3
Classes
K1 K2 K3
Teacher
T1 10 8 12 9 10 27 15 10 13
T2 8 6 7 9 6 12 7 11 12
T3 9 7 6 10 7 12 8 6 8
Here, while solving this problem classes are considered as jobs, teachers are as menand time slot as factory.

291
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

First consider given problem in the form of Teacher-Class-Time slot and solve it by“Ghadle-Munot Algorithm
For AP”. Given table is already in specified format so we solve it and get the solution as

Step II.
Now reform the table of given SAP in the form of Teacher-Time slot-Classroom and solve it by “Ghadle-Munot
Algorithm for AP”. Let A2 be the solution obtained in this step.
K1 K1 K1
Classroom K2 K2 K2
K3 K3 K3
Time Slot
S1 S2 S3
Teacher
T1 10 9 15 8 10 10 12 27 13
T2 8 9 7 6 6 11 7 12 12
T3 9 10 8 7 7 6 6 12 8

After solving we get the allocations as with minimum


assignment cost 22 say A2.
Step III.
Now reform the table of given SAP in the form of Time slot-Classroom-Teacher and solve it by “Ghadle-
Munot Algorithm for AP”. Let A3 be solution obtained in this step.
T1 T1 T1
Teacher T2 T2 T2
T3 T3 T3
Classroom
K1 K2 K3
Time Slot
S1 10 8 9 9 9 10 15 7 8
S2 8 6 7 10 6 7 10 11 6
S3 12 7 6 27 12 12 13 12 8

After solving we get the allocations as with minimum


assignment cost 26 say A3.
Step V.
Let A = min {A1, A2, A3}
Here, A = min {22, 22, 26} = 22
So, best settlement solution of given SAP is with minimal cost 22 and allocations arecorresponding to A1
or A2.
RESULT
Proficiency of the proposed algorithm is investigated through real life examples. In Today’s digital era SAP is
widely applicable in many decision making situations of real life like online teaching platforms along with many
more three dimensions related assignment problems. This approach of solving SAP minimizes complexity and
time to solve the example; its MATLAB coding makes it more-handy for the user. This method can be extended
to multi objective SAP.
292
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

CONCLUSION
We have developed an efficient and novel way to solve SAP which uses Ghadle-Munot algorithm for AP and is
extended to obtain best settlement solution of given SAP. Applicationof SAP to real life situation and its solution
indicates the importance of SAP It will help decision maker to take appropriate decision about assignment
related issues in real life.
REFERENCES
1. Anuradha, D.: On solving fuzzy solid assignment problems, Int. Re. J of Eng. and Tech, 2 (2015),322-325.
2. Anuradha, D., & Pandian, P.: A new method for finding an optimal solution to solid assignment problems.
Int. J of Eng. Re. and App., 2 (2012), 1614-1618.
3. Anuradha, D., Jayalakshmi M., Kavitha K., Basit S., and Raza K.: Solid assignment problem in
manufacturing logistics, Int. J of Civil Eng. and Tech., 10(2019), 1846- 1850.
4. Ghadle K. and Munot D.: Recent advances on reliable methods for solving Transportation Problem and
Fuzzy Transportation Problem, Asian J of Math & comp.research, 26 (2019), 95-107.
5. Ghadle K. and Munot D.: A new approach to solve assignment problem using congruence modulo and its
coding in MATLAB, Adv in Maths: Sci J, 9 (2020), 9551-9557.
6. Ghadle K. and Munot D.: A freezing method for solving Bottleneck-Cost Transportation Problem, Turk J
of Maths and Comp Edu,12(2021), 3551-3556.
7. Kumar, P. S.: Intuitionistic fuzzy solid assignment problems: a software-based Approach. Int J of Sys Assu
Eng and Mgmt, 10(2019), 661-675.
8. Magos, D., & Miliotis, P.: An algorithm for the planar three-index assignmentproblem. Euro J of Op
Res, 77(1994), 141-153.
9. Pierskalla W.: The tri-substitution method for the three dimensional assignment problem, J of Can Op
Res Soc., 5(1967), 71–81.
10. Sobana V. and Anuradha D.: Multi-objective Unbalanced Solid Assignment Problemwith Triangular Type-2
Fuzzy Parameter, J of Xi'an Uni. of Arch. & Tech., 12(2020),4518-4527.

AUTHOR DETAILS:

DHANASHRI A. MUNOT1* AND DR. KIRTIWANT P. GHADLE2


1
Department of Mathematics, SAJVPM’S Gandhi College, Kada, 414001 (MS) India
2
Department of Mathematics, Dr. Babasaheb Ambedkar Marathawada University, Aurangabad, 431004 (MS)
India

293
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

RELATIONSHIP ORIENTATION OF B2B SALES THAT ENABLES RECIPROCATION IN


ENGAGEMENT

KUNAL R JOSHI AND DR. D ANAND

1. INTRODUCTION:
Business to Business Buying (Also referred to as Organizational Buying): In this process one organization buys
goods and services from other organization. It is formally defined as a problem solving and decision making
process where in one organization creates a buying situation when it perceives a business problem and
understands that the problem could be solved by creating a buying decision. Organizational buying includes all
the activities where organizational members defined the buying situation and then executes the buying decision
by critically evaluating goods and services out of selected brands and suppliers Webster, et al, (1972).
Many detailed studies and research have been conducted in the field of Sales relationships and their influence in
winning B2B businesses.
The concept of B2B sales engagement has been continuously evolving over time, and has seen significant
improvement in the last few decades. We would like to first understand the evolution of the process over time
before studying its way forward.
2. B2B SALES AND EVOLUTION.
Business to Business (B2B) selling is a process in which one business entity commercially transacts with
another for exchanging goods and services. B2B sales have evolved over time. Let us take a quick recap of the
process. As we try to learn the evolution of B2B sales, it becomes critical to follow the evolution of purchasing
function over time.
Evolution of B2B Sales approach: According to Arli and others Arli, et al, (2018), B2B Sales timeline of
relational selling over the years have undergone an evolution. And B2B Selling can be broadly classified into
the following four phases:
2.1 Selling to Individuals.
2.2 Selling to a Buying center.
2.3 Selling in Adaptive mode.
2.4 Selling focused on positioning solutions as per client’s needs.
2.1 Selling to Individuals: This phase of Sales was seen in the age before industrialization up to the decade of
the 1970s. During this phase, sales approaches predominantly transitioned from Supplier centric sales approach
to blossoming of Buyer seller Relational approach. The Author takes references from many papers to explain
individual selling approach. (Powers, et al, (1988), Bonoma, et al, (1978), Borg, et al, (2014), Evans, (1963),
Parvatiyar, et al, (2000)).
2.2 Selling to a Buying Center: during the subsequent decade of the 1980s, as the industrial marketing grew well
together with the advent of Information technology and systems, purchasing departments started becoming more
sophisticated. It was during this phase that experts started considering buying models that included
environmental, organizational and individual perspectives and thereby evolve the Buying center approach. In
this approach buying process was evolved with more stake holders to evaluate a purchase critically. During this
phase relational selling was getting improvised to consultative selling (Dwyer, Schurr, & Oh, (1987); Hutt,
Johnston,& Ronchetto, (1985) Anderson & Narus, (1990) Möller & Halinen, (2000) Schurr, et al, (1987)).
Buying Center approach consist of Stages of organizational purchase process like – need identification,
requirement specification, Identifying potential vendors, evaluating Vendors and selecting vendors. This process
also helps in organizing purchase teams Webster, et al, (1972).
2.3 Selling in Adaptive mode: In the decade of the 1990s, as the businesses started growing to global levels
rapidly, Sales processes started to adapt to rapidly changing business requirements. This led to high level of
collaborative adaption between sellers and buyers to work closely in order to achieve superior cost benefits
without any compromise on quality of products or services. This era also opened doors for online media and
ecommerce to further influence the buying behaviors [DeCormier and Jobber's (1993), Borg & Young, (2014),
Reichheld & Sasser, (1990), Terbeek (1996)].
294
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

2.4 Selling focused on positioning solutions as per client’s needs: From 2000 onwards, Customer centricity and
selling solutions to clients expanded phenomenally. Focus of sellers shifted from selling standardized products
and services to packaging bespoke solutions to the customers. The orientation of buyers and sellers focused on
partnership approach where both parties could endure a long term mutually beneficial association which would
result in improved profitability of both parties. The approach also focused on evolution of complex CRM
applications. Growth of social media and omnichannel online marketing led to companies expanding their
marketing budgets to online media (Moncrief and Marshall, (2005), Franke and Park, (2006), Weitz and
Bradford (1999), Borg & Young, (2014)).
There have been various discussions on the most appropriate method for successful Business engagements.
Business Marketing strategies include – Transactional / Relationship based and Value based business
engagements. We would look at relationship based B2B engagements and closely.
3. B2B Theories and concepts for Relationship based sales practices.
3.1 Social exchange Theory: This is a very important sociological phenomenon. The theory identifies exchange
as a behaviour that brings out favorable economic and social outcomes. These studies are based on comparing
human interaction with market place Lambe, et al, (2001). This Phenomenon is also called Reciprocation.
Cost: in includes the effort put into a relationship and negatives of partner (cost could be time, money, effort
etc.)
Reward: elements of relationship that have positive value. People measure the overall value / worth of a
relationship based on the rewards the relationship provides after subtracting the costs associated (Turner, et al,
(2007) Monge, et al, (2003)).
Worth outcome = Rewards – Cost.
Norm of Reciprocity Gouldner, et al, (1960): This is defined by interrelated demands –
(i) People should help those who have helped them.
(ii) People should not injure those who have helped them.
3.2 Emotional responses of Buyers, while awarding very large contracts (Curasi, et al, 2016):
According to (Curasi, et al, 2016) buyers undergo various emotional phases when they are engaged in Multi
million contract transactions. In this paper we are exploring the emotional aspects (Anderson, et al, (2006),
Verville, et al, (2011), Valtakoski, et al, (2015)).
Findings: Negative emotions dominated the research. Emotions like – worry, discontent anger and shame were
predominantly experienced in the event of such transactions. Some positive emotions like confidence, surprise
and contentment were also observed. According to this paper the emotions play a vital role in large business
transactions. (Ingram, et al, (2015) Lawler, et al, (2001) Wood, et al, (2008)).
3.3 Study on Communication, Satisfaction and interaction observed during relationships in B2B scenarios
(Murphy, et al, 2017).
This study focuses on Reciprocal Feedback for and its importance in B2B relationships. According to the
authors (Murphy, et al, 2017):
 Reciprocal feedback measures the frequency of responses to previous messages rather than frequency of
initiating communications (Joshi, et al, 2009).
 With increase in the frequency of contact, the bond between buyers and suppliers strengthen thereby their
relationships improve (Hung, et al, (2013), Mason, et al, (2012), Dagger, et al, (2009), Davies, et al,
(1999)).
 Reciprocal feedback is critical in maintaining positive relationships between buyers and sellers with
Satisfaction. Bidirectional communication helps in enhancing reciprocal feedback between buyers and
sellers Mohr, et al, (1995).
 Mode of communication – Personal, impersonal, digital, dyadic etc. would depend on number of parties
that have to be managed for bidirectional communication
3.4 Significance of partner relations in B2B Ecosystem (Barac, et al, 2017).
The author (Barac, et al, (2017)) begins the discussions by quoting some very important concepts which are as
follows:
295
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Relationship Marketing: The author tries to explain that the principal function of Marketing is to set up, manage
and improve relationship with the customers and other stake holders at an economic gain, so that the objectives
of all the stake holders involved are achieved. This can be accomplished by mutual exchange and delivering on
business commitments Gronroos, (1990, 1994a, 1994b).
Relationship Quality: The author defines that Quality of Relationship between two Business entities depends on
factors such as Commitments honoured, Client satisfaction experienced and Trust enjoyed between the entities
Richard J, (2008).
Relationship capabilities: Author describes capabilities as a set of activities, facilities, and resources that
companies can deploy to keep up with partner relations. (Miterga, et al 2012).
Rest of the paper explores and discusses the use of technological tools like CRM and adaption of CRM with
other collaborative tech tools to maintain continuous bilateral communications between the B2B customers,
suppliers and partners so that seamless communications can have very positive impact in the relationships of
suppliers, partners and customers.
3.5 Understanding the relevance of sales control and its effect on performance of sales person
(Constantin, et al, (2018)):
This study interestingly outlines some innovative constructs which are as follows:
Exploratory learning: According to the Author, Exploratory learning is the ability of ability of a Sales person’s
self-regulated promotion focused behaviour that searches for, experiments with, and discovers new and
innovative sales techniques.
Exploitative learning: This paper also explains the concept of Exploitative learning. This is considered to be a
Sales person’s self-regulated prevention focused approach and adheres to proven and well established selling
techniques and skillset that leverage on known knowledge and capability (Tuncdogan, et al, (2015) March, et al,
(1991) Higgins, et al, (1997)).
Outcome control: This is a method in which sales person uses which ever methods he prefers to achieve the
desired goal.
Activity control: This is a method where a more controlled effort from management which sales person is not
responsible for outcomes as long as certain procedures and routines are followed.
Capability control: It is a developmental and nurturing control in which management provides training and
guidance to develop and improve a sales person’s sill set and abilities.
(Oliver and Anderson, (1987) Kohli, et al, (1998))
Preference for sales predictability: A salesperson’s trait like disposition that favors prompt, expected and results
over opaque, surprising and delayed outcomes. Sales people who prefer high sales predictability use more
exploitative knowledge to reduce uncertainty (Webster, et al, (1994), Cesario, et al, (2004)).
Customer’s Purchase decision making complexity: Extent to which customer’s purchase decision making
involves time, information, multiple parties and new process. Sales person is likely to use more exploitative
techniques in order to reduce uncertainty of complicated Customer decision making process (March, et al,
(1991) Jaworski, et al, (1988)).
Using the above outlined constructs, the author discusses the following points:
1. When Outcome control is used more exploitative and less exploratory learning occurs.
2. When activity control is used exploitative learning occurs
3. When capability control is used more exploratory and less exploitative learning occurs.
Thus, this paper outlines some of the best practices that help Sales person enhance his skills towards
achievement of sales goals and thereby sharpening his customer relationship skills.
3.6 Critical element in relationship between buyer and seller (Dion, et al, (1995)).
The Author (Dion, et al, (1995)) stresses that TRUST plays an important role in long term sustained Buyer –
Seller relationships. One of the key implications that the author tries to convey is that Sales person’s Personality
alone does not drive sales performance. Trust between buyers and sellers are key to driving sales performance.
Trust is also considered to be reciprocal in nature (Schurr, et al, (1985), Swan, et al, (1988)).
296
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

3.7 (Liu, et al, 2018): Effects of Reciprocity in bilateral asset specificity on trust in international B2B
partnerships:
According to the author, in B2B relationships, duration of the relationship does not matter to determine the
performance of the relationship. Trust is very critical in maintaining long term business relationships. Based on
Social exchange theory (SET), reciprocity between buyers and sellers ensure exchange, stability and reliability.
Long term views should guide strategy (Dwyer, et al, (1987) Blau, et al, (1964) Fichman, et al, (1991) Ganesan,
et al, (1991) Gouldner, et al, (1960) Anderson, et al, (1989)).
3.8 (Keranen, et al, 2018): Reciprocal adaptions for successful value driven exchange in business markets.
This paper tries to explore reciprocal adaptions required for a successful value driven exchange in business
markets. VDE (Value driven exchange) refers to specific type of business exchanges that explicitly focus on
advancing customer organizations. Value in use related to strategic goals concerning their competitiveness
(Uluga, et al, (2006) Terho, et al (2012) Viio and Gronroos, (2012, 2014)).
This paper further studies the VDE concept under the following three functions:
1. Sales and marketing
2. Supply chain (purchase function)
3. Dyadic (Value co-creation)
Sales and Marketing: According to this, the suppliers should focus on supporting customer’s business to realize
quantifiable cost reductions or increased revenue generation effects to be able to sell higher value, higher priced
offerings. Customers are likely to realize value during consumption of services and they experience uncertainty,
ambiguity about expected value in use. Hence suppliers should reduce customers perceived risks by
communicating transparently how potential value in use is going to be realized and / or how suppler will
guarantee or share risk of potential outcomes (Anderson, et al, (1998) Terho, et al, (2012) Uluga, et al, (2011)).
VDE in Purchase function: in this function it becomes difficult for buyer to understand and pre specify
requirements and maintain liner purchase process without help of supplier Selviaridis, et al, (2013).
Dyadic perspective: in this, value is co-created by equal participation and partnership of buyer and seller to
achieve common goals (Gronroos, et al, (2011) Tuli, et al, (2017)).
By the above points, the author stresses on the fact that managers have to work towards key adaptions in their
organization to align to the processes of mutual benefit for both buyers and suppliers to achieve common
business goals.
3.9 (Nyadzayo, et al, 2018): B2B Purchase engagement – examining the key drivers and outcomes in
professional services.
The authors narrate their concepts by defining the following constructs:
WTP (Willingness to pay premium): Customer is willing to pay premium to a supplier based on the relationship,
loyalty and dependence s (Netemeyer, et al., (2004) Moliner-Velazquezet, et al, (2014) Dwyer, et al, (2013)
Persson, (2010)).
CSZ (Consideration set size): This is defined as the number of brands or alternative vendors available in same
service category, which a customer can consider, while making purchase decision (He, et al, (2016) van Nierop,
et al, (2010) Desai, et al, (2000) Nyffenegger, et al, (2015)).
Dependence: This acts as key mediator between CSZ and WTP. The study brings out this concept (Bonner, et
al, (2005) Hibbard, et al, (2001) Palmatier, et al, (2006) Heide, et al, (1990) Morgan, et al, (1994) Bendapudi, et
al, (1997) Ganesh, et al, (2000)).
Some of the key learning that the paper brings out are as follows:
 This paper explores important antecedents and results of purchase engagement in Business services from
Small business owner/manager perspective.
 Since PURCHASE ENAGAGEMENT concept is new, authors encourage more research on the subject.
 It is observed that there are a number of challenges in developing B2B marketing theory. Contextual
complexity as one of the challenges observed.
 The study attempts to build on fundamental tenets of SET in order understand the mechanism of purchase
engagement in Business markets.

297
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The results of the study are in line with the tenets of Social Exchange Theory:
 Business to Business stake holders are entities whose behaviour are motivated by need or desire to obtain
mutual benefits.
 Resources in and engagement, are assets or capabilities that are valued by stakeholders involved.
 Social exchange reduces resources and increases cost.
 Social exchange comes with some opportunity costs.
3.10 Robert Cialdini: Book on Influence
Dr. Robert Cialdini, has authored a very great work on Influence and Persuasion in his book – “INFLUENCE –
THE PSHYCHOLOGY OF PERSUASION”. In this book he brings out the following principles:
1. Reciprocation: It is based on the principle that we have to repay the favor that we would have sought from
others.
2. Commitment and consistency: Consistency is a very powerful principle. It is capable to direct human action
and compel people to do things against their will. People try to remain consistent to their actions in order to
maintain their self-image.
Commitment: it is a process of getting a person commit to a stand they take.
3. Social proof: According to this principle, People think of what is correct based on what others perceive is
correct. This is because people are uncertain on some aspects and would want to depend on other people’s
response to the same aspect.
4. Liking: People are more likely to yield to the requests of someone they like. This affinity could be as a
result of physical attraction, similarity (native origin, hobbies etc.), complement, old associations or
acquaintances.
5. Authority: As per this concept, it becomes easy for us to act on a given situation if we have information
coming from a recognized authority. People would be almost willing to go to any lengths to obey the
command of a competent authority.
6. Scarcity: This principle tries to explain that when resources/opportunities are scarce, people are more likely
to take a decision of acquiring them as delay or non-action would result in potential losses.
4 CONCLUSION AND FURTHER SCOPE OF STUDY
This paper attempts to stitch the concepts of Relationship and Social exchange with B2B Sales process and
engagements. We have described works of various scientists and authors in who have provided valuable insights
in understanding the role of relationship and Social exchange in B2B Sales context.
We can agree based on the various findings of the authors mentioned in the paper, that Social exchange and
Norm of reciprocity plays key role in influencing B2B Purchase decisions. It can be deduced the Social
exchanges and reciprocation helps in forging strong and long term relationships between the buyer and the
seller. The buyer would become obliged to award contract to the seller under such relationship.
However, strong relationships cannot be the only decisive factor in awarding large contracts. The business
engagements between large scale buyers and sellers are more complicated and interwoven. There could be other
predominant factors like vendor’s capability and technical expertise of the vendor that could be critically
evaluated by the buyers to awarding contract. This paper proposed follow up study on the Vendor capability and
critical evaluation and compare its influence on buying process vis-a-vis the relationship phenomenon
associated with B2B purchase.
REFERENCES
 Arli, D., Bauer, C., and Palmatier, R.W. (2018), “Relational selling: Past, present and future.”, Industrial
Marketing Management, 69 (2018), pp. 169-184
 Powers, T. L., Koehler, W. F., & Martin, W. S. (1988). Selling from 1900 to 1949: A historical perspective.
Journal of Personal Selling&Sales Management, 8(3), 11–21.
 Bonoma, T. V., Bagozzi, R., & Zaltman, G. (1978). The dyadic paradigm with specific application toward
industrial marketing. Organizational Buying Behavior, 49–66.

298
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Borg, S. W., & Young, L. (2014). Continuing the evolution of the selling process: A multilevel perspective.
Industrial Marketing Management, 43(4), 543–552.
 Parvatiyar, A., & Sheth, J. N. (2000). The domain of conceptual foundations relationship marketing.
Handbook of relationship marketing. Thousand Oaks: Sage Publications.
 Dwyer,F.R.,Schurr,P.H.,&Oh,S.(1987).Developingbuyer-sellerrelationships. Journal of Marketing, 51(2),
11–27.
 Hutt, M. D., Johnston, W. J., & Ronchetto, J. R., Jr. (1985). Selling centers and buying centers. Journal of
Personal Selling & Sales Management, 5(1), 32–40.
 Möller, K., & Halinen, A. (2000). Relationship marketing theory: Its roots and direction. Journal of
Marketing Management, 16(1–3), 29–54.
 Anderson, J. C., & Narus, J. A. (1990). A model of distributor firm and manufacturer firm working
partnerships. Journal of Marketing, 54(1), 42–58.
 Dwyer,F.R.,Schurr,P.H.,&Oh,S.(1987).Developingbuyer-sellerrelationships. Journal of Marketing, 51(2),
11–27.
 Webster, Fredrick E,Jr., and Wind, Yoram, (1972), A General Model for Understanding Organizational
Buying Behavior. Journal of Marketing 36 (April 1972): 12-19.
 DeCormier, R. A., & Jobber, D. (1993). The counsellor selling method: Concepts and constructs. Journal of
Personal Selling&Sales Management, 13(4), 39–59.
 Reichheld, F., & Sasser, W. E., Jr. (1990). Zero defections: Quality comes to services. Harvard Business
Review, 68(September/October), 105–111.
 Terbeek, G. A. (1996). Key to marketing productivity: Meet consumers at moment of value. International
Trends in Retailing, 13, 35 –46.
 Weitz, B. A., & Bradford, K. D. (1999). Personal selling and sales management. Journal of the Academy of
Marketing Science, 27(2), 241–254.
 Moncrief, W. C., & Marshall, G. W. (2005). The evolution of the seven steps of selling. Industrial
Marketing Management, 34(1), 13–22.
 Franke, G. R., & Park, J. E. (2006). Salesperson adaptive selling behavior and customer orientation: A
meta-analysis. Journal of Marketing Research, 43(4), 693–702.
 Lambe, C. Jay; Wittmann, C. Michael; Spekman, Robert E. (2001). "Social Exchange Theory and Research
on Business-to-Business Relational Exchange". Journal of Business-to-Business Marketing. 8 (3): 1–36
 Monge, P.R, Contractor, N., (2003). Theories of communication networks. Oxford University Press
 Gouldner, Alwin, W. (1961), "The norm of reciprocity: A preliminary statement". American Sociological
Review. 25 (2): 161–178.
 Andersen, P., & Kumar, R. (2006). Emotions, trust and relationship development in buyer–seller dyads.
Industrial Marketing Management, 35(4), 522–535
 Stuart, F.I., Verville, J. and Taskin, N. (2012), “Trust in buyer-supplier relationships: supplier competency,
interpersonal relationships and performance outcomes”, Journal of Enterprise Information Management,
Vol. 25 No. 4, pp. 392-412
 Valtakoski A., (2015), “Initiation of buyer–seller relationships: The impact of intangibility, trust and
mitigation strategies”, Industrial Marketing Management, Vol. 44, pp. 107-118
 Wood, J. A., Boles, J. S., and Babin, B. J., (2008). “The Formation of Buyer’s Trust of the Seller in an
Initial Sales Encounter.” Journal of Marketing Theory & Practice, Vol. 16, Iss. 1, pp. 27-39.
 Lawler, Edward J. (2001). "An Affect Theory of Social Exchange". American Journal of Sociology. 107
(2): 321–352.
 (Ingram, et al, 2015): SELL. Mason, OH: South-Western Cengage Learning.
299
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Ingram, T.N., LaForge, R.W., Schwepker, C.H. and Williams, M.R. (2015), Sales Management: Analysis
and Decision Making, 8th ed., Routledge, Abingdon.
 Joshi, A.W., 2009. Continuous supplier performance improvement: effects of collaborative communication
and control. Journal of Marketing 73 (1), 133–150.
 Hung, K.P., Lin, C.K., ( 2013) “More communication is not always better? The interplay between effective
communication and interpersonal conflict in influencing satisfaction.” Industrial Marketing Management,
42(8), 1223–1232.
 Mason, K., Leek, S., (2012), “Communication practices in a business relationship: Creating, relating and
adapting communication artifacts through time.” Industrial Marketing Management, 41(2), 319–332.
 Dagger, T.S., Danaher, P.J., Gibbs, B.J., (2009). “How often versus how long: the interplay of contact
frequency and relationship duration in customer-reported service relationship strength.” Journal of service
research, 11 (4), 371–388
 Davies, G., and Treadgold, A., (2008), “Buyer attitudes and the continuity of manufacturer/ retailer
relationships. Journal of Marketing Channels.”, Journal of Marketing channels, Volume 7(1/2), 79–94.
 Mohr, J.J., and Sohi, R.S., (1995), Communication flows in distribution channels: Impact on assessments of
communication quality and satisfaction. Journal of Retailing, 71(4), 393–416.
 Grönroos, C. (1990), Service Management and Marketing, Lexington Books, Toronto.
 Grönroos, C., (1994), “From marketing mix to relationship marketing: towards a paradigm shift in
marketing”, Management Decision, Vol. 32 No. 2, pp. 4-32.
 Grönroos, C., ( 1994), “Quo Vadis, marketing? Toward a relationship marketing paradigm”, Journal of
Marketing Management, Vol. 10 No. 5, pp. 347-360.
 Richard, J.E., (2008), “The impact of Customer Relationship Management (CRM) technology on business-
to-business customer relationships”, Phd dissertation, Victoria University of Wellington, Wellington.
 Miterga, M., Forkmann, S., Ramos, C., (2012), “Networking capability in business relationships concept
and scale development”, Industrial Marketing Management, Vol. 41 No. 5, pp. 739-751.
 Tuncdogan, A, Van Den Bosch, F, Volberda H, (2015) “Regulatory Focus as a Psychological Micro-
Foundation of Leaders’ Exploration and Exploitation Activities,” Leadership Quarterly, 26 (5), 838–50.
 Higgins, E.T., (1997), “Beyond Pleasure and Pain,” American Psychologist, 52 (12), 1280–300.
 March, J.G., (1991), “Exploration and Exploitation in Organizational Learning,” Organization Science, 2
(1), 71–87.
 Oliver, R.L., and Anderson, E., (1994), “An Empirical Test of the Consequences of Behavior-Based and
Outcome-Based Sales Control Systems,” Journal of Marketing, 58 (4), 53–67.
 Kohli, A.K., Shervani, T.A., Challagalla, G.N., (1998) “Learning and Performance Orientation of
Salespeople: The Role of Supervisors,” Journal of Marketing Research,35(2),263–274.
 Webster, D. M., & Kruglanski, A. W. (1994). Individual differences in need for cognitive closure. Journal
of Personality and Social Psychology, 67(6), 1049–1062.
 Cesario, J., Grant, H., Higgins, E.T., (2004), “Regulatory Fit and Persuasion: Transfer from ‘Feeling
Right,’” Journal of Personality and Social Psychology, 86 (3), 388–404.
 March, G.J., (1991), “Exploration and Exploitation in Organizational Learning,” Organization Science, 2
(1), 71–87
 Jaworski, B.J., (1988), “Toward a Theory of Marketing Control: Environmental Contexts, Control Types,
and Consequences,” Journal of Marketing, 52 (3), 23–39.
 Schurr, P.H., Ozanne, J.L., (1985), Influences on Exchange Processes: Buyers Preconceptions of a Seller's
Trust worthiness and Bargaining Tough- ness, Journal of Consumer Research 14, 939-953

300
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Swan, J.E., Trawick, I.F., Jr. Rink, D.R., Roberts, J.J, (1988), Measuring Dimensions of Purchaser Trust of
Industrial Salespeople, Journal of Personal Selling and Sales Management VIII, 1-9.
 Blau, P.M., (1964), Exchange and power in social life. Transaction Publishers, Social Forces, Volume 44,
Issue 1, Page 128.
 Fichman, M., Levinthal, D.A., (1991), “Honeymoons and the liability of adolescence: A new perspective
on duration dependence in social and organizational relationships”. Academy of Management Review,
16(2), 442–468.
 Ganesan, S., (1991), “Determinants of long-term orientation in buyer-seller relationships.” The Journal of
Marketing, 1–19.
 Anderson, E., (1989) “Determinants of continuity in conventional industrial channel dyads”. Marketing
Science, 8(4), 310–323.
 Uluga, W., Eggert. A., (2006), “Value-based differentiation in business relationships: Gaining and
sustaining key supplier status.”, Journal of Marketing, 70(1), 119–136
 Terho, H., Haas, A., Eggert, A., Uluga, W., (2012), “It's almost like taking the sales out of selling: Towards
a conceptualization of value-based selling in business markets.”, Industrial Marketing Management, 41(1),
174–185.
 Viio, P., and Gronroos, C., (2014), “Value-based sales process adaptation in business relationships.”,
Industrial Marketing Management, 43(6), 1085–1095.
 Anderson, J.C., and Narus, J.A., (1998), “Business Marketing: Understand What Customers Value.”,
Harvard Business Review, 76, 53–67.
 Uluga, W., Reinartz, W. J, (2011), “Hybrid offerings: How manufacturing firms combine goods and
services successfully.” Journal of Marketing, 75, 5–23.
 Selviaridis, K., Spring, M., and Araujo, L., (2013), “Provider involvement in business service definition: A
typology.”, Industrial marketing management, 42(8), 1398-1410.
 Gronroos, C., (2011), “A Service Perspective on Business Relationships: The Value Creation, Interaction
and Marketing Interface.”, Industrial Marketing Management, 40(2), 240–247.
 Tuli, K.R., Braradwaj, S., and Kohli, A,, (2017), “Rethinking customer solutions: From product bundles to
relational processes.”, Journal of Marketing, 71(3), 1-17.
 Netemeyer, R.G., Krishnan, B., Pullig, C., Wang, G., Yagci, M., Dean, D., Ricks, J., and Wirth, F., (2004),
“Developing and validating measures of facets of customer-based brand equity.”, Journal of Business
Research, 57 (2), 209–224.
 Velazquez, B.M., Blasco, M.F., Saura, I.G., (2014) “Value antecedents in relationship between tourism
companies.”, The Journal of Business and Industrial Marketing, 29(3), 215–226.
 Dwyer, F.R., Schertzer, C.B., Schertzer, S.M.B., (2013): Value in professional service relationships. The
Journal of Business and Industrial Marketing, 28(8), 607–619.
 Persson, N., (2010), “An exploratory investigation of the elements of B2B brand image and its relationship
to price premium.”, Industrial Marketing Management. 39(8), 1269–1277.
 He, Y., Chen, Q., Tam, L., and Lee, R.P., (2016), Managing sub-branding affect transfer: The role of
consideration set size and brand loyalty. Marketing Letters, 27(1), 103–113.
 Nierop, E.V., Bronnenberg, B., Paap, R., Wedel, M., Franses, P.H., (2010), “Retrieving unobserved
consideration sets from household panel data.”, Journal of Marketing Research, 47(1), 63–74.
 Desai, K.K, Hoyer, W.D., (2000), “Descriptive characteristics of memory-based consideration sets:
Influence of usage occasion frequency and usage location familiarity.”, Journal of Consumer Research,
27(3), 309–323.
 Nyffenegger, B., Krohmer, H.,Hoyer, W.D., Malaer, L., (2015), “Service brand relationship quality hot or
cold?”, Journal of Service Research, 18(1), 90–106.
301
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Bonner, J.M., Calontone, R.J., (2005), “Buyer attentiveness in buyer–supplier relationships”., Industrial
Marketing Management, 34(1), 53–61.
 Hibbard, J.D., Kumar, N., and Stern, L, W., (2001), “Examining the impact of destructive acts in
marketing channel relationships.” Journal of Marketing Research, 38(1), 45–61.
 Palmatier, R.W., Dant, R.P., Grewal, D., and Evans, K.R., (2006), “Factors influencing the effectiveness
of relationship marketing: A meta-analysis.” Journal of Marketing, 70(4), 136–153.
 Heide, J.B., John, G., (1990), “Alliances in industrial purchasing: The determinants of joint action in buyer-
supplier relationships.” Journal of Marketing Research, 27(1), 24–36.
 Morgan, R.M., Hunt, S.D., (1994), “The commitment–trust theory of relationship marketing.” Journal of
Marketing, 58(3), 20–38.
 Bendapudi, N, Berry L.L., (1997), “Customers’ motivations for maintaining relationships with service
providers.” Journal of Retailing, 73(1), 15–37.
 Ganesh,J., Arnold, M.J., Reynolds, K.E., (2000), “Understanding the customer base of service providers:
An examination of the differences between switchers and stayers.” Journal of Marketing, 64(3), 65–87.
 Brehmer, P., and Rehme, J., (2009), “Proactive and reactive: drivers for key account management
programmes”, European Journal of Marketing, Vol.43 Nos7/8, pp.961-984.
 Guenzi, P., Pardo, C., Georges, L., (2007): “Relational selling strategy and key account managers’
relational behaviors: an exploratory study”, Industrial Marketing Management, Vol.36 No.1, pp.121-133.
 Hald, K.S., Cordon, C., Vollmann, T.E., (2009): “Towards an understanding of attraction in buyer-supplier
relationships”, Industrial Marketing Management, Vol. 38 No.8, pp. 960-970.
 Tzempelikos, N., Gounaris, S., (2015), “Linking key account management practices to performance
outcomes”, Industrial Marketing Management, Vol. 45, pp.22-34.
 Storbacka, K., (2012), “Strategic account management programs: alignment of design elements and
management practices”, Journal of Business & Industrial Marketing, Vol.27 No.4, pp. 259-274.
 Guenzi, P., Storbacka, K., (2015), “The organizational implications of implementing key account
management: a case-based examination”, Industrial Marketing Management, Vol.45, pp. 84-97.
 AlHussan, F.B., Al-Husan, F.B., Alhesan, L., (2017), “The role of senior executives in managing key
customers in Arab context”, Journal of Business & Industrial Marketing, Vol.32, No.6, pp. 825-835
 Gueselega, R., (2014) “Top management involvement with key accounts: the concept, its dimensions, and
strategic outcomes”, Industrial Marketing Management, Vol. 43 No. 7, pp.1146-1156.
 Cialdini, R.B., (2007), “Influence: The Psychology of Persuasion.”, The Business Library, New York
 Book - Influence: The Psychology of Persuasion, Robert V Cialdini 2007 Edition.
a. Influence: The Psychology of Persuasion, Robert V Cialdini 2007 Edition; Chapter 2, Pages 17, 21, 30, 33.
b. Influence: The Psychology of Persuasion, Robert V Cialdini 2007 Edition; Chapter 3, page 92, 76, 85.
c. Influence: The Psychology of Persuasion, Robert V Cialdini 2007 Edition; Chapter 4, pages 116, 140.
d. Influence: The Psychology of Persuasion, Robert V Cialdini 2007 Edition; Chapter 5.
e. Influence: The Psychology of Persuasion, Robert V Cialdini 2007 Edition; Chapter 6, page 215.
f. Influence: The Psychology of Persuasion, Robert V Cialdini 2007 Edition; Chapter 7, page 238.

AUTHOR DETAILS:

KUNAL R JOSHI AND DR. D ANAND


University of Mysore

302
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

STUDY AND PREDICTION OF SCOURING NEAR THE BRIDGE PILLAR IN THE RIVER

ALOK KUMAR YADAV, MD. SAJID AND DR. SYED AQEEL AHMAD

ABSTRACT
Civil infrastructure is the artery of social and economic activities and an essential element of human well-being.
Designs of bridges vary depending on the function of the bridge, the nature of the terrain where the bridge is
constructed and anchored, the material used to make it, and the funds available to build it.Effect of Scouring
Near Bridge Pillars Due to Variation of Discharge is 3.00 mm to 81.60 mm. Effect of Scouring Near Bridge
Pillars with Different Grade of Material is 19.44 cm to 38.48 cm. Comparison of Souring Depth of Gomti River
Sediments with Other Fine Aggregates is 7.41 cm to 25.31 cm.

INTRODUCTION
Flow distribution that occurs around the pier bring scouring effect in which this scouring is influenced by the
presence of very large shear stress at the front and sides of pier. High scouring is also affected by the number of
sediments around pier, and process of scouring that happen around this pier called local scouring.
General Scour is the removal of sediment from the river bottom by the flow of the river. The sediment removal
and the resultant lowering of the river bottom is a natural process, but may remove huge amount of sediment
over time. General scour is referred as degradation scour in some papers.
Contraction Scour is the removal of sediment from the bottom and side of the river. The increase in velocity
causes additional tractive shear stress on the bed surface, resulting in an increase in bed scour in the area of
contraction.
Local Scour is removal of sediment from around bridge piers or abutments. As the local scour bring more
damage to the bridges, researchers did a lot of work about this kind of scour.
The main cause of bridge scour is produced by discrete vortices formed aroundunprotected piers (left above)
and abutments (right).Water normally flows faster around piers and abutments making them susceptible to local
scour.
At the obstruction in form of pier or abutment, the unidirectional flow changes into threedimensional as the
water pileup in front face of the obstruction and the flow accelerates around the nose. This phenomenon results
in formation of vortex at the base of the pier known as horseshoe vortex and the vortex form in the vertical
direction downstream of the pier known as wake vortex as shown in figure 1 taken from Kim et al. (2015).
PROBLEM STATEMENT
 Generally During the rainy season all the rivers are full with water but after monsoon decrease the Discharge
of the river also decrease.
 Flow velocity is very high in rainy season or at the time of flood.
OBJECTIVES
The Main Objectives of this Study are As Follows:
1. To find the effect of scouring near bridge pillars due to variation of discharge.
2. To find the effect of scouring near bridge pillars with different grade of material.
3. Comparison of Souring Depth of Gomti River Sediments with Other Fine Aggregates.
METHODOLOGY
The methodology contains with case study of Gomti Riverat Lucknow, Uttar Pradesh, India. Methodology
includes: Selection of Site, Data Collection of Site Location, Analysis of Data,Creating a Prototype in
Lab.,Conducting Experimental Work, Analysis of Experimental Results, Providing Optimal Solution to Prevent
Scouring, Results, Conclusion and Future Scope.
Selection of Site Location of Gomti River
A visit to the Gomti river was made along with concerned team of the LDA, Lucknow.

303
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

About Pipra Ghat Gomti River Bridge, Lucknow


 Consequent to the ever-maximum flood in Gomti river in 1960, flood embankments were constructed along
both the banks of the river up to 7 km upstream of the bridge. The distance between these two embankments
varies from 250 m to 450 m.
 The Gomti river has narrow cross section downstream of the Hanuman Setu particularly near the Moti
Mahal, where river has been encroached from its right bank.
Data Collection at Site Location
The major sources of pollution are industrial waste and effluent from sugar factories and distilleries and
residential wastewater and sewage. The following data were made Gomti river at Lucknow are as follows:
Table No. 1 Parameters Collected from Site
S.No. List of Parameters Values
1. Average Velocity (U) 2.78 m/s
2. Average depth of flow (y) 3.12 m
3. Diameter of Circular Column (D) 3.00 m
4. Acceleration due to gravity (g) 9.81 m/s2
5. Silt Factor (f) 0.88
6. Particle size of river sediment (d) 0.25
The annual maximum flood, recorded at Gomti bridge site by Central Flood Forecasting unit of C.W.C, are
available from 1970 to 2011 and given in table no. 3.2. During the period 1970 to 2011, the maximum annual
flood = 3860 m3/s was recorded on 2008.
Table No. 2 Calculation of Sour Depth in Gomti River
Scour Depth Analysis of Gomti River
U Y g F D d84 d16 𝛔 Scour Depth (ds)
2.78 m/sec. 3.12 m 9.81 m /sec2 0.88 0.25 Mm 0.412 0.19 0.301 306.21 mm
Expermental Setup
This objective is performed in laboratory for the analysis of scour depth by variation of discharge in open
channel flume. Laboratory experiments are carried out on a rectangular open channel flume 5 m long and a
basic hydraulic bench as shown in fig. 3.10. The open channel width is 30 cm, whereas the maximum water
depth can reach about 60 cm. The transparent side walls of channel are made of acrylic glass, whereas the
bottom is made of stainless steel. The flume is provided with a digital flow meter for discharge measurement.
Also, a point gauge is implemented for measuring water depth. An over-shot weir is installed at the end of the
channel to control water depth while a sluice gate is installed in the open channel to form the hydraulic jump.
The basic hydraulic bench includes a submersible pump that supplies the flume with the required discharge
controlled by a valve. The water flows through a connected pipe beneath the flume where flow returns back to
the hydraulic bench in a closed cycle flow. Several experimental runs are performed by varying the discharge
and measuring the corresponding conjugate depths. Accordingly, Froude number can be indicated for both sub-
critical and super-critical flows. Also, the length of jump can be measured by a calibrated scale on the top of
channel.

Fig. 1: University Open Channel Flume Setup


304
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig. 2: University Open Channel Flume Setup


Effect of Scouring Near Bridge Pillars Due To Variation of Discharge
In order to analyze the scouring depth, experiment is performed by taking 60 mm dia. &600 mm long M-40
cylinder in Open Channel Flume (OCF). Same bed sediment is transferred from Gomti river to laboratory.
Scour depth is measured at different values of discharge by keeping other factors constant like depth of water is
kept 150 mm, wetted cross sectional area is kept 0.045 m2, standard deviation is 0.301, silt factor is kept 0.88 &
gravitation value as 9.81 m/s2. By varying the discharge linearly, it is found that scour depth also varieswith
constant factor.
Table No. 3 Scour Depth Analysis on Variation of Discharge
No. Depth Discharge X- Velocity Standard Silt Acceleration Scour Depth
of of (Q) Section of Deviation Factor Due to (ds) (mm)
Run Water Area Flow (σ) (f) Gravity (g) Per Hour
(y) (A’) (U) (m/s) (m/s2)
2
1 150 100 LPM 0.15 m 0.04 0.301 0.88 9.81 3.00
mm
2 150 200 LPM 0.15 m2 0.07 0.301 0.88 9.81 13.20
mm
3 150 300 LPM 0.15 m2 0.11 0.301 0.88 9.81 29.40
mm
4 150 400 LPM 0.15 m2 0.15 0.301 0.88 9.81 52.20
mm
5 150 500 LPM 0.15 m2 0.19 0.301 0.88 9.81 81.60
mm

Fig. 3 Discharge Vs Scour Depth


305
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Effect of Scouring Near Bridge Pillars with Different Grade of Material


In order to fulfil this objective various bed material is collected from the river bed, after that some sample is
dried in oven for sieve analysis. Gradation of soil is done, % finer is calculated as shown in table no. 3, and rest
of the sample is laid in OCF around 400 mm thick, 300 mm wideand 5 m long, the calculated volume of river
sediment is 0.6 m3 required to conduct the experiment.

Fig. 4 Scour Depth Analysis with Variation of Sediment Property


From Sample 1, 2 & 3 scour depth is found to be 19.44 cm, 28.51 cm& 38.48 cm, per hour. As the bed material
property is changed the scour depth varies from 19.44 cm to 38.48 cm. The comparison is shown in fig. 4. as
particle size decreases the scour depth increases.
Comparison of Souring Depth of Gomti River Sediments with Other Fine Aggregates
As discussed in previous point the scouring depth was analyze on the coarse sand of Gomti river whose mean
size particle varies from 0.56 mm to 0.72 mm. To achieve this objective a small study is conducted by
considering very coarse sand (01 mm to 02 mm).
Table No. 4 Particle Size of Sand
Types of Sand Sample Particle Size Range (mm)
Gravel 02-04
Very Coarse Sand 01-02
Coarse Sand 0.5-01
Medium Sand 0.25-0.5
Fine Sand 0.1-0.25
Very Fine Sand 0.05 – 0.1

Fig 5: Scour Depth Summary of Coarse Sand


From the above summary it is found that as the particle sizes decreases the scour depth is increases for very
coarse sand. Scour depth is found to be 7.41 cm, 16.29 cm &25.31 cm, per hour. As the bed material property
is changed the scour depth varies from 7.41 cm to 25.31 cm. The comparison is shown in fig. 5. as particle size
decreases the scour depth increases. Scour depth of coarse sand is very high as compared to very coarse sand,
from this we can conclude that very coarse sand should be provided near the bridge columns.
306
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

RESULT & DISCUSSION


The three main objectives are achieved successfully; various conditions are kept constant for the analysis of
scour depth. Summary of scour depth is shown in table no. 3.9.
Table No. 5: Scour Depth Summary
S.No. Objective Description Scour Depth (mm) Per Hour or (cm) Per Hour
1. Effect of Scouring Near Bridge Pillars Due to 3.00 mm to 81.60 mm
Variation of Discharge
2. Effect of Scouring Near Bridge Pillars with 19.44 cm to 38.48 cm
Different Grade of Material.
3. Comparison of Souring Depth of Gomti River 7.41 cm to 25.31 cm
Sediments with Other Fine Aggregates.
Providing Optimal Solution
 The present study examines the use of very coarse sand for reducing local scour around bridge piles. The
efficiency of very coarse sand is studied experimentally. The data from the experiments were compared with
data from earlier studies on the use of single piles with a river bed material & river discharge.
 The results showed that using very coarse sand yields the most significant scour reduction for the bridge
columns, respectively.
CONCLUSIONS
Following main conclusion were made from present analysis of bridge pier against scour in non-uniform
sediments.
Very coarse sand found to be safer than coarse sand; In order to prevent the scouring concrete structure
should be made around the piers, which consist of proper combination of fine aggregates and coarse
aggregates.
For safety purpose for existing bridges time to time inspection should be done, if any bridge column found
be in high scour depth additional aggregate should be poured.
FUTURE SCOPE
 An attempt should also be made to find the actual uncertainty of different parameters.
 Other parameters can be studied for reducing scouring in piers.
REFRENCES
[1] Briaud J L, Ting F C K, Chen H C, et al(2001) “Erosion Function Apparatus for Scour Rate Predictions [J].
Journal of Geotechnical and Environmental Engineering”127(2): 105-113.
[2] Wardhana K, Hadipriono F C, (2003),“Analysis of Recent Bridge Failures in the United States [J]. Journal
of Performance of Constructed Facilities”,17(3):144-150.
[3] Dongol D M S. Local scour at bridge abutments.Rep.No.544,(1984),“School of Engineering, University of
Auckland, Auckland, New Zealand”.
[4] Wang Shunyi, Mou Li, Wei Kai, et al. Experimental Study on Local Scour of Cylindrical Pier under
Different Hydraulic Conditions [J/OL]. Journal of Disaster Prevention and Mitigation Engineering, 2019:
1-7 [2019-12-14].
[5] Raudkiv A J, Ettema R. Clear-water scour at cylindrical piers [J]. Journal of Hydraulic Engineering, 1983,
109(3):338-350
[6] Dey S, Barbhuiya A K. Clear-water scour at abutments in thinly armored beds [J]. Journal of Hydraulic
Engineering.2004, 130(7): 622-634.
[7] Tian Yong, Hou Zhijun, Hou Jiaojian. Study on the Morphology of Local Erosion in Oblique Piers [J].
Yellow River, 2018, 40(2): 39-45.
[8] Zhang Xinyan, LvHongxing, Shen Bo. Experimental studies on local scour mechanism of cylinder bridge
piers [J]. Hydro-Science and Engineering, 2012, (2):34-40.
[9] Santos J S, Cardoso A H. Time evolution of local scour at obstacles protruding from channel side walls [J].
International Journal of Sediment Research, 2001, 16(4):460-472.
307
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[10] Gill M A. Erosion of sand beds around spur dikes [J]. Journal of the Hydraulics Division, 1972,
[11] Ang, H.S. and Tang, W.H. (1984) Probability concepts in engineering planning and design. V01.2. -
Decision, risk act) reliability, Wiley, New York.
[12] Low, B.K„ and Tang, Wilson I. (1997). "Efficient reliability evaluation using spreadsheet." .1. of Eng.
Mech., 123(7), 749-752.
[13] Low, B.K., and Tang, Wilson H. (1997a). Efficient reliability evaluation using spreadsheet. .1. of Engg.
Mech., ASCE, New York, 123(7), 749-752.
[14] Low, B.K., and Tang, Wilson 11. (2007). "Efficient Spreadsheet Algorithm for First —order Reliability
Method." J. of Engg. Mech., ASCE, New York, 133(12), 1378-1387
[15]. Low, B.K. and Wilson H. Tang (2002). Reliability analysis using object-oriented constrained optimization,
Structural Safety 26(2004), 69-89.
[16] Johnson, P.A. (1996) "Uncertainty of hydraulic parameters." Journal of hydraulic engineering, ASCE,
122(2), 112-115.
[17] Johnson, P.A., Dock, D. A. (1998). Probabilistic bridge scours estimates. Journal of Hydraulic Engineering
124(7), 750-754.
[18] Johnson, P.A. (1992), Reliability-based pier scour engineering, Journal of Hydraulic Engineering. ASCE,
118(10), 1344-1358.
[19] Johnson. P.A., And Ayyub, B.M., (1992),. Assessing time-variant bridge reliability due to pier scour.
Journal of Hydraulic Engineering, ASCE, 118(6), 887-136.
[20] Johnson, P.A., And Ayyub, B.M, B.M., (1996), Modeling uncertainties in prediction of pier scour, Journal
of Hydraulic Engineering, ASCE,.122(2), 66-72.
[21] Johnson, P.A., and Dock, D. A. (1998), Probabilistic bridge scour estimates, Journal of Hydraulic
Engineering, ASCE, 124(7), 750-755.
[22] Johnson. P.A. and Niezgoda. S.L... (2003), Probabilistic Bridge scours estimates, Journal of Hydraulic
Engineering, ASCE, 130(2), 121-128.
[23] Johnson, P.A., Duck, D. A. (1998). Probabilistic bridge scours estimates. Journal of Hydraulic Engineering
124(7), 750-754.
[24] Google Images.

AUTHOR DETAILS:
1
ALOK KUMAR YADAV, 2MD. SAJID AND 3DR. SYED AQEEL AHMAD
1
M. Tech Student and 2Assistant Professor, Integral University, Lucknow, UP
3
HOD, Department of Civil Engineering, Integral University, Lucknow, UP

308
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

ANALYSIS OF SOCIAL MATURITY AND ITS RELATIONSHIP WITH ACADEMIC


PERFORMANCE IN CHEMISTRYAMONG HIGHER SECONDARY STUDENTS

S. UMAMAHESWARI AND DR. P. KARTHIKEYAN

ABSTRACT
The present study was undertaken with the purpose of Analysis of Social Maturity and its Relationship with
Academic Performance in Chemistry among Higher Secondary Students and to find out the difference in
Analysis of Social Maturity and its Relationship with Academic Performance in Chemistry among Higher
Secondary Students on the basis of gender, medium of instruction, and type of management. This study was
conducted on a sample of 950 students studying in higher secondary schools of Dharmapuri district. The
researcher used stratified random sampling technique for selecting the sample. The Normative Survey method
was used in the study. For analyzing data Percentage Analysis, ’t’ test, ANOVA and Pearson's product moment
co-efficient correlation were the statistical techniques used. The result shows that the that there is no significant
difference between the mean Social Maturity scores of male and female Higher Secondary Students studying in
schools, there is no significant difference betweenthe mean Social Maturity scores of Tamil medium and English
medium of Higher Secondary Students studying in schools, there is no significant difference between the mean
Social Maturity scores of government schools and private schools of Higher Secondary Students studying in
schools. The results also inferred from the above table that Social Maturity and Achievement in Chemistry is
significant and positively correlated.
Keywords: social maturity, academic performance in chemistry, higher secondary students

SOCIAL MATURITY
Social maturity, like physical maturity, is often the subject of discussion among concerned adults because it
can be so obvious. The five-year-old who reaches out to shake your hand or the eight-year-old who makes
eye contact and says “please” and “thank you “or the twelve-year-old who does none of these things each is
likely to earn some comment about his or her “maturity.” Social maturity is, of course, a matter of experience
and choice. The child who has been exposed to these finer points of etiquette (as when parents model such
behaviors) and who chooses to exercise them (as when your teenager wants something), may seem socially
mature. Are you old enough to remember Eddie Haskell, the manipulative neighbor from “Leave it to Beaver”?
Ward and June (the parents) frequently commented on how “mature” Eddie seemed because he knew how to
turn on the charm when, in fact, we viewers knew that Eddie was a mischievous trouble maker. “Maturation
means the growth and development that is necessary either before any unlearned behavior can occur or before
learning of any particular can take place.” The compelling need for a practical measure to assess the maturity
outcomes of school going population can best be estimated in the light of paucity of such essential measuring
instruments. The social maturity scale was developed with a view to achieve two practical goals. The first was
attain a theoretical backdrop which has the prospect of ensuring an operational concept of social maturity with
its social and individual relevance.
The second and the more pragmatic goal has been to evolve a precise and dependable measure of social
maturity applicable to the normal school child. Vineland social maturity scale and Napery Adaptation by Malin
(2019) are one of the earliest attempts in this direction, have been designed for clinical purposes. The second
cause therefore was derived more out of the specific need for identifying this phenomenon of social maturity
more as a natural and inevitably essential outcome of child growth and development rather than a mere
pathological symptom. In general, social maturity is defined as the willingness of an individual to take
responsibility for developing his/her community. Social identification with broad social communities is an
integral component of social maturity. Social maturity becomes currently more and more important, because
egoism, pursuit of wealth, shoddy and unscrupulous people are today dominating. A man becomes social
mature through qualities that he receives either through genetic heritability or the environment in which he
raises and educates.
Academic Performance
Academic achievement is related to the acquisition of principles and generalizations and the capacity to perform
efficiently certain manipulations of objects, symbols and ideals. Assessment of academic performance has been
largely confined to an evaluation in terms of information, knowledge and understanding. It is universally

309
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

accepted that the acquisition of actual data, is not an end in itself but an individual who has received
education should show evidence of having understood them. But for obvious reasons the examinations
are largelyconfined to the measurement of the amount of information which students have acquired.
Achievement in terms of subject matter is conventionally assessed in our institutions by employing a system of
marks or grades. It has been strongly argued that marks are necessary for effective teaching-learning. Irabue
(1920) felt that for classification, guidance and evidence of effort, marks are necessary. A committee in
California listed the purposes of marks as the indication of the degree of mastery of subject matter and the
prediction of further success. Madsen (1930) points out that marks set goals and motivate the students. It
is universally accepted that marks serve for the basis of classification and certification, motivation and
measurement of educational performance.
Review of Related Studies on Social Maturity and Academic Performance in Chemistry
Sodhi (2010) assessed the social maturity as related to gender, anxiety and adjustment of the adolescents. The
study results found no significant difference between three dimensions of social maturity as personal adequacy,
interpersonal adequacy, and social adequacy of male and female adolescent. And also, not found significant
difference in social maturity of adolescents pursuing humanities as well as science as streams. Athanimath and
Yenagi (2011) in their study entitled an expost-facto study conducted to know the relation between the social
maturity and depression among the II PUC students. The result reveled that, there was negative but non-
significant relation between social maturity and depression among the students. Thus, it revealed that the
students with high social maturity were less depressed. Nagra and Kaur (2013) examined the social maturity
teacher educators in relation to locality and subject stream. Results of the study expose that teacher educators
have high level of social maturity though there is no significant difference was observed in social maturity of
teacher educators in relation to locality and subject streams. The analysis of variance results was also showed
that there was no interaction effect of locality and subject stream on social maturity of teacher educators. Kumar
and Rittu (2013) investigated social maturity of senior secondary school students with personality. There exists
no significant difference between social maturity and personality of male and female senior secondary school
students. It was found that there was a significant relationship between personality and social maturity of senior
secondary school students. Kumar (2013) studied the factor of social isolation; a dimension of social maturity
had exposed that the problems of adolescent girls in such as a way that the girls with a higher degree
of social isolation are found to face more intensity of the problems than those with lesser degree of social
isolation.
Senthilnathan and Minnelkodi (2014) assisted the relationship between political knowledge and social maturity.
It was found that higher secondary school students have average political knowledge. The modest social
maturity of higher secondary school students is found. There exists a significant difference between rural and
urban students’ political knowledge but in social maturity of rural and urban students of higher secondary
standard have no significant difference. And significant relationship was found between political knowledge
and social maturity of higher secondary school students. Manju (2016) the research work deals with social
maturity of B. Ed Student teachers. The sample of 150 B. Ed student Teachers from Mysore City was selected
and collected the data through Stratified random sampling technique. Social maturity of B.Ed students was
accessed with the help of social maturity scale developed by Nalini Rao. Major objectives were formulated as
to assess the level of Social Maturity of the B. Ed student teachers. To study the significant difference between
governments, aided and Un aided colleges students of B.Ed. Results of the study are maturity level of majority
B. Ed student teachers in Mysore city was found (45%) average and (26 %) were found to possess low
level, only (29%) of the B. Ed students possess high level Social Maturity. It is found that the female student
teachers have High Social Maturity than their male counterparts and no significant difference was found
between Arts and science B. Ed student teachers in their Social Maturity. Aided B. Ed College student teachers
have High Social Maturity comparing than their Government and Unaided College counter parts.
Chand (2017) in his he assessed the social maturity of students in relation to their sex and locality. The findings
of the study point out that there is no significant difference between students in relation to gender and residence
on the personal adequacy and inter-personal adequacy. The male and female students were found differ on the
component of social competency. The female students are more socially mature than male, interaction effects of
sex and locality, on personal adequacy, inter-personal adequacy, social adequacy and total social maturity were
found significance different.
Kalyanidevi and Chaitanya (2018) in this work they inspected social maturity of scheduled tribes’ adolescents
in scheduled tribes and non-tribes and also the grade and gender differences. The results are no significant
310
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

difference was found between social maturity of tribal and non-tribal adolescents. Significant differences were
found between the tribes and non-tribes in the dimensions of interpersonal adequacy and social adequacy. No
grade and gender difference were observed in the social maturity of adolescents of scheduled tribes and non-
tribes. Ramalingam and Mani (2019) in their study they surveyed social maturity of D.T.Ed., students. In this
work they revealed that the social maturity of D.T.Ed., students is highly positive. Kannan and Pillai (2020)
investigated the social maturity and adjustment of higher secondary students of Cuddalore district, Tamil Nadu,
India. Results prove that there is no significance relationship between the social maturity and adjustment of
higher secondary students on the basis of gender, locality, private school students, community, religion, parental
qualification and parental occupation. It is also established that there is a significant relation between the social
maturity and adjustment of higher secondary students on the basis of government school students.
OBJECTIVES OF THE PRESENT STUDY
The following are the objectives of the present study:
1. To find out the significant difference in the social maturity of higher secondary students with respect to the
sub samples like gender, medium of instruction, and type of management.
2. To find out the significant difference in the achievement in chemistry of higher secondary students with
respect to the sub sample like gender, medium of instruction and type of management.
3. To find out if there is any relationship between social maturity and achievement in chemistry of higher
secondary students.
HYPOTHESES OF THE STUDY
The following hypotheses are formulated to give a specific direction to the study.
1. There is no significant difference in the social maturity of higher secondary students with respect to the
sub samples like gender, medium of instruction, and type ofmanagement.
2. There is no significant difference in the achievement in chemistry of higher secondary students with respect
to the sub sample like gender, medium of instruction and type of management.
3. There is no relationship between social maturity and achievement in chemistry of higher secondary
students.
METHOD OF THE STUDY
Normative Survey method used in this study its main highlights and interprets what already exists in the
present-existing conditions or relations, prevailing practices, beliefs and attitudes, etc. The personal data sheet is
designed by the investigator to find the demographical variables in the present study. It is used to collect the
details regarding the higher secondary students which include the following variables. The reasons for inclusion
of the different variables are also explained below. The population for the present study was used Higher
secondary students of Tamil Nadu state. A total of 950 higher secondary students studying in the government,
aided and private schools, situated in the district of Dharmapuri, were selected as samples using the Random
Sampling Technique.
Social Maturity scale was constructed and validated by the Investigator and the Research Guide (2019). These
tools have satisfactory indices of reliability and validity and used to assess and analyze the Achievement Test in
Chemistry, Emotional Intelligence and Social Maturity of higher secondary students. Achievement Test
inventory for higher secondary school students has been constructed by the investigator. The test has been
prepared with multiple choice items. Initially 60 items were prepared in both Tamil and English. The scoring
procedure for correct answer the score is 1 and for wrong answer 0. The minimum score for the test is ‘0’ and
maximum score of the test is 60. Method of Reliability-Test-retest (Repetition) value is 0.89 and Split – Half
value is 0.74.
DATA ANALYSIS
H01: There is no significant difference between the mean Social Maturity scores of Male and Female Higher
Secondary Students studying in schools.
Table -1 Comparison of Social Maturity between School Higher Secondary Students With Regard To Gender
Gender N Mean S.D t- Value Significant/
Not Significant
Male 543 302.15 30.140
311
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Female 407 301.00 30.168 0.321 Not Significant


The details of the calculation are given in the Table-1. The 't' value is found to be 0.321, which is not significant
at the 0.05 level. Therefore, the null hypothesis is accepted.
It is concluded that there is no significant difference between the mean Social Maturity scores of male and
female Higher Secondary Students studying in schools. Male Higher Secondary Students have higher Social
Maturity than the Female Higher Secondary Students studying in schools.
H02: There is no significant difference between the mean Social Maturity scores of Tamil medium and English
medium of Higher Secondary Students studying in schools.
Table -2: Comparison of Social Maturity between School Higher Secondary Students With Regard ToMedium
of Instruction
Medium of N Mean S.D t- Value Significant/Not
Instruction Significant
Tamil 432 301.74 30.188 0.215 Not Significant
English 518 302.16 29.906
The details of the calculation are given in the Table-2. The’t’ value is found to be 0.215, which is not significant
at the 0.05 level. Therefore, the null hypothesis is accepted. It isconcluded that there is no significant difference
between the mean Social Maturity scores of Tamil medium and English medium of Higher Secondary Students
studying in schools. English medium Higher Secondary Students have higher Social Maturity than the Tamil
medium Higher Secondary Students studying in schools.
H03: There is no significant difference between the mean Social Maturity scores of government schools and
private schools of Higher Secondary Students studying in schools.
Table -3 Comparison of Social Maturity between School Higher Secondary Students With Regard To Type of
School.
Type of school N Mean S.D t- Value Significant/Not
Significant
Government 541 302.03 30.195 0.110 Not Significant
Private 409 301.21 30.086
The details of the calculation are given in the Table-3. The 't' value is found to be 0.110, which is not significant
at the 0.05 level. Therefore the null hypothesis is accepted. It is concluded that there is no significant difference
between the mean Social Maturity scores of government schools and private schools of Higher Secondary
Students studying in schools. Government Schools Higher Secondary Students have higher Social Maturity than
the Private Schools Higher Secondary Students.
H04: There is no significant relationship among Social Maturity and Achievement in Chemistry
Table- 4 Correlation Co-Efficient (R) Among Social Maturity and Achievement in Chemistry
Variables N ‘r’ value Remarks
Social Maturity
Achievement in
Chemistry 950 .068* S
S=Significant
For this purpose, Pearson’s product moment 'r' was computed and the details are given in table – 4. It is seen
from table – 4 that the correlation co efficient among the Social Maturity and Achievement in Chemistry in
Higher Secondary Students is positive and significant at 0.05 level. It is inferred from the above table that Social
Maturity and Achievement in Chemistry is significant and positively correlated. It means if the Social Maturity
is high, the Higher Secondary Students Achievement in Chemistry is high.
CONCLUSION
The main aim of the study is to find out the significant difference between the Analysis of Social Maturity and
its Relationship with Academic Performance in Chemistry among Higher Secondary Students. The major
findings of the study are Male Higher Secondary Students have higher Social Maturity than the Female Higher
Secondary Students, English medium Higher Secondary Students have higher Social Maturity than the Tamil
medium Higher Secondary Students, Government Schools Higher Secondary Students have higher Social
312
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Maturity than the Private Schools Higher Secondary Students. The results also showed that Social Maturity and
Achievement in Chemistry is significant and positively correlated. It means if the Social Maturity is high, the
Higher Secondary Students Achievement in Chemistry is high.
REFERENCES
 Athanimath, J. S., & Yenagi, G. (2012). Social maturity and depression levels among II PUC science
students. Karnataka Journal of Agricultural Sciences, 24(4).
 Chand, R. (2017). Social maturity among student teachers. Education New Horizons, 4 (14), 18-25.
 Irabue (1920). A survey of the academic students in the Wyoming State Training School, with special
reference to intelligence, achievement and personality. University of Wyoming.
 Kalyanidevi, T. and Prathima Chaitanya, N.2008. Social maturity of scheduled tribes’ adolescents, Psycho-
lingua, 38 (2), 147-151, Agra: Psycho linguistics association of India.
 Kumar, S., & Pandey, A. K. (2013). Chemistry and biological activities of flavonoids: an overview.
The scientific world journal, 2013.
 Madsen, I. N. (1930). Educational measurement in the elementary grades.
 Malin, F. (2019). Accident risk of road and weather conditions on different road types. Accident Analysis &
Prevention, 122, 181-188.
 Nagra, V., & Kaur, B. (2013). Environmental education awareness among senior secondary school
students. ZENITH International Journal of Business Economics & Management Research, 3(1), 133-141.
 Ratukondla, B., Prakash, S., Reddy, S., Puthuran, G. V., Kannan, N. B., & Pillai, M. R. (2020). A rare case
report of frank ter haar syndrome in a sibling pair presenting with congenital glaucoma. Journal of
Glaucoma, 29(3), 236-238.
 Rittu, R., & Kumar, A. (2021). Comparison of Immediate Effect of Plantar Fascia Release by Roller
Massager and Transverse Friction Massage on Hamstring Flexibility in Desk Job Workers. Int J Physiother
Res, 9(4), 3954-59.
 Senthilnathan,T. and Minnelkodi, B. (2014) relationship between political knowledge and social maturity.
Doctoral thesis, Annamalai University.
 Sodhi, N. S., Posa, M. R. C., Lee, T. M., Bickford, D., Koh, L. P., & Brook, B. W. (2010). The state and
conservation of Southeast Asian biodiversity. Biodiversity and Conservation, 19(2), 317-328.
 Sravanthi, T. V., & Manju, S. L. (2016). Indoles a promising scaffold for drug development. European
Journal of Pharmaceutical Sciences, 91, 1-10.

AUTHOR DETAILS:
1
S. UMAMAHESWARI AND 2DR. P. KARTHIKEYAN
1
Ph.D. Research Scholar and 2Principal, Government College of Arts & Science, Papireddipatti, Dharamapuri,
Tamil Nadu, India

313
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

ANALYTICAL SOLUTION OF THERMAL RADIATION, CHEMICAL REACTION AND VISCOUS


DISSIPATION EFFECTS ON MHD FREE CONVECTION FLUID FLOW PAST A VERTICAL
PLATE IN THE PRESENCE OF DIFFUSION-THERMO

S. RAMA MOHAN AND N. MAHESHBABU

ABSTRACT
The aim of the paper is to study an unsteady MHD free convection fluid flow past a vertical plate with effects of
chemical reaction, viscous dissipation, thermal radiation and diffusion-thermo. The flow is induced due to
periodic oscillation of the plate along its length and a uniform transverse magnetic field is applied normal to
the flow direction. The resulting sets of partial differential equations are transformed into ordinary differential
equations solved analytically by using regular perturbation technique. The effect of different flow parameters
on velocity, temperature and concentration, as well as the skin-friction coefficient and the rate of heat and mass
transfer coefficients are derived and discussed through graphs and tables.
Keywords: MHD, thermal radiation, chemical reaction, viscous dissipation and diffusion-thermo.

INTRODUCTION
The study of MHD free convection flows through a vertical plate is of considerable interest in many industrial
applicationstechnology and science, such as oceanography, drying processes,geophysics and solidification of
binary alloy. The behavior of the magnetic field on flow of free convection is an important in electrolytes, liquid
metals and ionized gases. In many researchers have to studied the problems of free convection flow with
heatand mass transfer. Soundalgekar V.M. et.al. [1] Identifiedviscous dissipation effects on the unsteady free
convective flow of an elastico-viscous fluid past an infinite vertical plate with constant suction. Basantkumar
Jha. et.al. [2] were identified the mass transfer effects on the flow past an accelerated infinite vertical plate with
heat sources. Free convection effects on the flow past an accelerated vertical plate in an incompressible
dissipative fluid was discussed by Gupta A.S, et.al. [3]. Soundalgekar.VM. [4] Found the effects of mass
transfer on free convective flow of a dissipative, incompressible fluid past an infinite vertical porous plate with
suction. Soundalgekar.V.M. [5] studied the effects of mass transfer on flow past a uniformly accelerated vertical
plate. Transient free convection past a sem-infinite vertical plate with variable surface temperature was
researched by Takhar et.al. [6]. Raptis et.al. [7] Wereanalyzed by radiation and free convection flow past a
moving plate. Effects of mass transfer on flow past an infinite vertical plate with constant heat flux and
chemical reaction was derived by Das, U.N. et.al. [8].Raju, M.C. et.al. [9] Has analyzedan unsteady MHD free
convection flow past an infinite vertical porous plate. Thermo diffusion and chemical effects with simultaneous
mass and thermal diffusion in MHD mixed convection flow with Ohmic heating was observed by Reddy,
N.A.et.al. [10]. Ogulu.A. et.al. [11] has done the research of Unsteady MHD free convective flow past a
Moving vertical plate. The transient free convection flow of a viscous dissipative fluid past a semi-infinite
vertical plate was investigated by V. M. Soundalgekar, et.al. [12]. B.Seshaiahet.al.[13] was analysed the effects
of chemical reaction and radiation on unsteady MHD free convection fluid flow embedded in a porous medium
with time dependent suction with temperature gradient heat source are studied. The Soret Effect on free
convective unsteady MHD Flow over a vertical plate with Heat Source was found by M Bhavana et.al. [14].
Raju M.C, et.al. [15] Has researched Unsteady MHD free convection oscillatory Couette flow through a porous
medium with periodic wall temperature. Alao, F. I., et.al.[16] were analyzed the effects of thermal radiation,
Soret and Dufour on an unsteady mass and heat transfer flow of a chemically reacting fluid past a semi-infinite
vertical plate. The effects of heat source and thermal radiation on an unsteady MHD free convection flow past
an infinite vertical plate with thermal diffusion and diffusion thermo was found by Raju, R. S., et.al.[17].
Rajakumar, K. V. B., et.al. [18] were discussed Radiation, Dufour and dissipation effects on MHD free
convection flow of Casson fluid through a vertical oscillatory porous plate with ion-slip current. Diffusion
thermoThermal diffusion impact on chemical reacted MHD free convection from an infinite vertical plate
embedded in a porous medium using FEM was identifed by Reddy, G. J., et.al.[19]. Mohan, S. R., et.al.[20]
were studied the effects of chemical reaction and aligned magnetic field on unsteady MHD casson fluid flow
past a moving an infinite plate through a porous medium in the presence of thermal radiation and heat
absorption. MHD Free Convection from a Semi-infinite Vertical Porous Plate with Diffusion-Thermo Effect
was found by Bordoloi, R., et.al. [21]. Raju, M. C., et.al.[22] were researched Analytical study of MHD free
convective, dissipative boundary layer flow past a porous vertical surface with constant suction.Impacts of
314
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

diffusion-thermo, radiation and chemical reaction on unsteady natural convective flow past an inclined vertical
plate under aligned magnetic field was investigated by Ramakrishna, S. B.,et.al. [23].Mohan, S., et.al.[24] were
researched the effects of chemical reaction, radiation and aligned magnetic field on unsteady MHD Casson fluid
flow past a moving an infinite plate through porous medium in heat absorption. Effects of time dependent
variable on MHD free convection flow past a vertical porous plate in the presence of thermal radiation and
chemical reaction was analyzed by Umamaheswar, M., et.al.[25].Mohan, S. R., et.al.[26] were discussed Soret
and aligned magnetic field effects on an unsteady MHD free convection casson fluid flow past an exponentially
infinite vertical plate through porous medium in the presence of thermal radiation, chemical reaction and heat
source or sink.Srinivasa Raju, R. [27] found the combined influence of thermal diffusion and diffusion thermo
on unsteady MHD free convective fluid flow past an infinite vertical porous plate in presence of chemical
reaction. Radiation and heat source effects on MHD free convection flow over an inclined porous plate in the
presence of viscous dissipation was derived by Omamoke, E., et.al. [28].Oscillatory chemically-reacting MHD
free convection in a porous medium with Soret and Dufour effects: finite element modelingwas researched by
Bhargava, R., et.al. [29]. Rallabandi, S. R. [30] analyzed Finite element solutions of non-Newtonian dissipative
Casson fluid flow past a vertically inclined surface surrounded by porous medium including constant heat flux.
Diffusion-thermo and thermo-diffusion effects on MHD boundary layer flow past in stretching sheet with
thermal radiation and viscous dissipation was identified by Sreenivasulu, P.,et.al.[31].Anwar, T.,et.al.[32] has
done the unsteady MHD natural convection flow of Casson fluid incorporating thermal radiative flux and heat
injection/suction mechanism under variable wall conditions.
Aim of the paper is to investigate the effects of periodic oscillation on free convection flow of a viscous
incompressible electrically conducting heat and mass transfer along a vertical plate in the presence of thermal
radiation, chemical reaction, viscous dissipation, Schmidt number, Dufour number, temperature gradient heat
source and transverse magnetic field.
MATHEMATICAL FORMULATION
An unsteady MHD free convection heattransfer and mass transfer of a viscous, incompressibleflow, electrically,
conducting, chemically reacting and radiating fluid past a vertical plate in the presence of uniform magnetic
field 𝐵0 applied in a transverse fluid flow direction. Let 𝑥 ∗ -axis is taken along thevertical platein the upward
direction to the flow of fluid and 𝑦 ∗ -axis is taken perpendicular to it in applied transverse magnetic
fielddirection. Initially, when𝑡 ∗ ≤ 0,both the fluid and plate are at stationary condition and having constant
temperature and constant concentration. When𝑡 ∗ >0, the plate begins to oscillate in its plane having the velocity
z=𝑍𝑜 𝑐𝑜𝑠(𝑤 ∗ 𝑡 ∗ )against the gravitational field, wherew*denote the amplitude of the plate oscillations. At the
same time, the plate temperature and concentration of the plate are raisedto𝜃𝑤∗ 𝑎𝑛𝑑 ∅∗𝑤 .A uniform magnetic
field𝐵0 is assumed to be applied normal to the flow. For flow of free convection, it is also thatthe induced
magnetic field is assumed to be negligible as the magnetic Reynoldsnumber of the flow is taken to be very
small.In the energy equationviscous dissipation is considered.
The following governing equations are
Momentum Equation:
z *  2 z*  B02 *
 v  g  ( *
  *
 )  g  *
( *
 
*
)  z
t * 
2
y* (1)
Energy Equation:
2
 *   2 * 1 qr v  z *  Dm K  2 * 
       Q* ( *   * )
t *
 CP y  CP y *
CP  y 
*
y
2 2
*
Cs C p y *
(2)
Diffusion Equation:
 *  2 *
 Dm *2  Kr ( *  * )
t *
y (3)
Initially boundary Conditions:
t *  0, z *  0,  *   * ,  *  * for all y* ,
t *  0, z *  Z 0 cos( wt ),  *   w* ,  *  w* at y *  o,
z *  0,  *   * ,  *  * as y   . (4)
315
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Wherez*,β, β∗ , B0 , v, qr , Q, σ, Dm , t,  , ρ, θ∗ , ∅∗ , Cp , Cs, K T , wandK rare respectively the Velocity of the fluid in


the x*- direction, coefficient of thermal expansion, coefficient of expansion with concentration, external
magnetic field, kinematic viscosity,radiative heat flux, heat source, electric conductivity, Coefficient of mass
diffusivity ,time, thermal conductivity, fluid density, temperature of the fluid near the plate, Species
concentration, Specific heat at constant pressure, Concentration susceptibility, periodicity parameter and
chemical reaction parameter.
The radiative heat flux qr , under Rosseland approximation of the form

4 *  *
qr   * *
3k y (5)
Where σ*is the Stefan-Boltzmann constant and is k* the mean absorption coefficient.
*4
It is assumed that the temperature differences within the flow are sufficiently small and that  may be
expressed as a linear function of the temperature. This is obtained by expanding 
*4
in a Taylor series about
 *
and neglecting the higher order terms, thus we get
*4 3 4
  4* T *  3* . (6)
From equations (5) and (6) in equation (2) reduces to
2
 *   2 * 16 * *  2 * v  z*  Dm KT  2 * 
 2  2   *   Q* ( *   * )
t *  CP y* 3 CP k * y* CP  y  Cs y *2
y
(7)
On introducing the following non- dimensional quantities
z* Z Z2  B02 v Z 02
z , y  0 y* , t  0 t * , M  , Ec  ,
Z0 v v  Z 02 CP (W *   * )
( *   * ) ( *  
*
) vg  (W*   * ) vg  * (W*  * )
 * ,  * , Gr  , Gm  ,
(W   * ) (W  * ) Z 03 Z 03
 v CP DmKT (w*  * ) Q *v k *k v
Pr  , Du  , Q  , R  , w  w* 2 .
 Cs v( w    )
* *
Z0 2
4  
* *
Z0
(8)
Using the above non-dimensional variables and parameters, the governing equations (1), (7) and (3) are reduced
to the following non-dimensional form
z 2 z
 Gr   Gm   Mz  2
t y (9)
2
  2  z   1  4   2
 Du 2  Ec    Q  1  
t y  y  y Pr  3R  y 2 (10)
 1  2
  Kr  
t Sc y 2 (11)
The corresponding boundary conditions reduce to
z  0,   0,   0 for all y, t  0,
z  cos( wt ),   1,   1 at y  0, t  0,
z  0,   0,   0 as y  , t  0. (12)

316
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

SOLUTION OF THE PROBLEM:


The governing equations of momentum (9), along with the energy equation (10) and diffusion equation (11), are
to be solved subject to the boundary conditions (12),for the velocity, the temperature and concentrations. The
equations are nonlinear and coupledand because of buoyancy force and the inclusion of the dissipation terms in
the temperature equation. In most of the practical problems the Eckert number is very small and is of order 10-5.
Thus the fact that the product Pr.Ec(=𝜀 ) is very small can be exploited to use regular perturbation method. It is
assumed the solutions of the form

z ( y, t )  z0 ( y )  Ec ent z1 ( y )  O( Ec 2 ),
 ( y, t )   ( y )  Ec ent ( y )  O( Ec 2 ),
0 1

 ( y, t )  0 ( y )  Ec ent1 ( y )  O( Ec 2 ). (13)
We now substitute equations (13) in to equations (9)-(11) and equating the coefficient of the same degree terms
and neglecting term o( Ec 2 ) , the following ODE is

z0"  Mz0'  Gm o  Gr  0


(14)
z1"   M  n  z1'  Gm1  Gr 1
(15)
1  4 
1    0  Q  0   Du 0
Pr  3R  (16)
1  4 
 1 Q 1  n 1    z0  e  Du 1
' 2 nt
1 
Pr  3R  (17)
0  Kr Sc 0  0 (18)
1 Sc ( Kr  n) 1  0 (19)
The Corresponding Boundary Conditions Are
z0  0, z1  0, 0  0, 1  0, 0  0, 1  0 for all y, t  0,
z0  cos( wt ), z1  0, 0  1, 1  0, 0  1, 1  0 at y  0, t  0,
z0  0, z1  0, 0  0, 1  0, 0  0, 1  0 as y  , t  0. (20)
The Solutions Are
z  y, t   I 5 e  J1 y  I 3 e  J 4 y  I 4 e  J9 y  Ec ent ( I 20 e  J 2 y  I13 e  J11 y  I14 e 2 J1 y
 I15 e2 J 4 y  I16 e2 J9 y  I17 e ( J1  J 4 ) y  I18 e  ( J 4  J9 ) y  I19 e  ( J1  J9 ) y )
(21)

 ( y, t )  I 2 e  J y  I1 e  J y  Ec ent ( I12 e  J y  I 6 e 2 J y  I 7 e 2 J
4 9 11 1 4y

 I8 e 2 J9 y  I 9 e  ( J1  J 4 ) y  I10 e  ( J 4  J9 ) y  I11 e  ( J1  J 9 ) y )
(22)
 ( y, t )  e  J y9

(23)
Skin-friction, Nusselt Number, Sherwood Number:
(a) Skin-friction:
The rate of change of velocity
𝜕𝑢
𝜏=− (𝜕𝑦) (24)
𝑦=0

317
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

  I5 J1  I3 J 4  I 4 J 9  Ec ent ( I 20 J 2e  I13 J11  2I14 J1


 2I15 J 4  2I16 J 9  I17 ( J1  J 4 )  I18 ( J 4  J 9 )  I19 ( J1  J 9 ) )
(b) Nusselt Number:
The rate of change of heat transfer
𝜕𝜃
𝑁𝑢=− (𝜕𝑦) (25)
𝑦=0

Nu  I 2 J 4  I1 J 9  Ec ent ( I12 J11  2I 6 J1  2I 7 J 4


 2 I8 J 9  I 9 ( J1  J 4 )  I10 ( J 4  J 9 )  I11 ( J1  J 9 ) )
(c). Sherwood Number:
The rate of change of mass transfer
𝜕𝜑
𝑆ℎ=− ( 𝜕𝑦 ) (26)
𝑦=0

Sh  J 9 .
RESULTS AND DISCUSSION
In view of this physical problem, the velocity, temperature, concentration, the rate of velocity the rate of heat
transfer and the rate of mass transfer have been discussed through graphs and tables by assigning numerical
values to the parameters likethermal Grashof number(𝐺𝑟), mass Grashof number(𝐺𝑚), magnetic
parameter(𝑀), Eckert number(𝐸𝑐), timeparameter(𝑡), Prandtl number(𝑃𝑟),Schmidt number(𝑆𝑐),Chemical
reaction parameter(𝐾𝑟),Heatsource parameter (Q>0), Thermal radiation parameter(𝑅), Periodicity parameter
(w) and Dufour number (𝐷𝑢) are studied numerically by choosing arbitrary values are M=2, Pr=0.71, Gr=5,
𝝅
Gm=3, t=1, n=1, Q=2, R=2, Sc=0.22, Kr=2, Ec=0.001, Du=0.03, w=𝟔 .
The effect ofmagnetic parameter(𝑀)on the velocity presented in the figure (1), we observed that the velocity
decreases as M increases. Physically this is true as an increase in magnetic field results a Lorentz’s force which
has the tendency of retarding the flow. Therefore velocity obviously decreases with an increase in magnetic
parameter. The velocity for different values of Prandtl number(𝑃𝑟) and Thermal radiation parameter(𝑅) are
shown in figures (2) and (3), from this, it is seen that initially the velocityincreases and then slowly decreases
asPr or R increases. From figure (4), depict that the velocity for different values of thermal Grashof
number(𝐺𝑟), it is clear that the velocity increases asGrincreases. The influences of mass Grashof
number(𝐺𝑚),timeparameter(𝑡), Heatsource parameter (Q>0) on the velocity in figures from (5) to (7), we get
the results in graph the velocity decreases asGm,t or Q increases. The velocity forSchmidt number(𝑆𝑐) and
Chemical reaction parameter(𝐾𝑟) on the figures (8) and (9), we can see that the velocity decreases as Sc or
Krincreases.The behavior of Eckert number(𝐸𝑐) in the figure (10), just seen that the velocity increases asEc
increases. The effects of Periodicity parameter (w) and Dufour number (𝐷𝑢)on the velocity field is presented in
Figures (11) and (12), it can be observed that the velocity decreases asw or Duincreases.
The influences of Prandtl number(𝑃𝑟), Heatsource parameter (Q>0) and Thermal radiation parameter(𝑅) on the
temperature in the figures from (13) to (15), we observed that the temperature decreases as Pr, Q or Rincreases.
The effect of Dufour number on the temperature in figure (16), it shows that the temperature decreases
asDuincreases. Figures from (17) and (18), depicts the behavior ofSchmidt number(𝑆𝑐) and Chemical reaction
parameter(Kr) on the concentration profiles, it can be observed that the concentration decreases asSc or Kr
increase.Schmidt number is defined as the ratio of kinematic viscosity to the thermal diffusivity. As Schmidt
number increases, usually viscosity increases and subsequently thermal diffusion decreases. It is seen that
velocity attains maximum near the plate and it reaches the free stream near the vicinity of the either side of the
plate. This is due to the concentration buoyancy effect that decreases the fluid velocity. From the table, the
results of Skin-friction coefficient increaseswith the values of M, Pr,Q, Sc or Krincreases and reduces when Gr,
Gm, t, R, Ec, Du or wincreases. The Nusselt number increases with the values of M, Pr or Q increases and
reduces when Gr, Gm, t, R, Ec,Sc, Kr, Du or wincreases. The Sherwood number increases with the values ofSc
or Krincreases.

318
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

1.8

1.6

1.4

1.2

1
Velacity

0.8

0.6

0.4
M=2,3,4
0.2

0
0 1 2 3 4 5 6 7 8
y

Fig.1. Velocity for different values of M


2.5

2
Pr=0.71, 1.01

1.5
Velocity

0.5

0
0 1 2 3 4 5 6 7 8
y

Fig.2. Velocity for different values of Pr


2.5

2 R=2,4,6

1.5

0.5

0
0 1 2 3 4 5 6 7 8
y

Fig.3. Velocity for different values of R

319
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

2.5
Gr=5,7,9

2
Velocity

1.5

0.5

0
0 1 2 3 4 5 6 7 8
y

Fig.4. Velocity for different values of Gr

1.5

0.5
Gm=3,5,7

0
Velocity

-0.5

-1

-1.5

-2

-2.5
0 1 2 3 4 5 6 7 8
y

Fig.5. Velocity for different values of Gm

1.5

1
t=1,2,3
Velocity

0.5

-0.5

-1
0 1 2 3 4 5 6 7 8
y

Fig.6.Velocityfor different values of t

320
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

2.5

2
Velocity

1.5
Q=0.2,0.4,0.6

0.5

0
0 1 2 3 4 5 6 7 8
y

Fig.7. Velocity for different values of Q

1.5

1
Velocity

Sc=0.22,0.27,0.37
0.5

-0.5
0 1 2 3 4 5 6 7 8
y

Fig.8. Velocityfor different values of Sc

1.5

1
Velocity

0.5 Kr=1,2,3

-0.5
0 1 2 3 4 5 6 7 8
y

Fig.9. Velocity for different values of Kr

321
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

1.8

1.6 1.055

1.05
1.4

1.045
1.2 1.94 1.95 1.96 1.97 1.98 1.99

1
Velocity

Ec=0.001,0.003,0.005
0.8

0.6

0.4

0.2

0
0 1 2 3 4 5 6 7 8
y

Fig.10. Velocity for different values of Ec

1.8

1.6

1.4

1.2

1
Velocity

0.8 Du=0.03,0.05,0.07

0.6

0.4

0.2

0
0 1 2 3 4 5 6 7 8
y

Fig.11. Velocityfor different values of Du

1.5

1
Velocity

w= /6, /4, /3


0.5

-0.5
0 1 2 3 4 5 6 7 8
y

Fig.12. Velocity for different values of w

322
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

0.9

0.8

0.7

0.6
Temparature

0.5

0.4 Pr=0.71,1.01,7.0

0.3

0.2

0.1

0
0 1 2 3 4 5 6 7 8
y

Fig.13. Temperature for different in Pr

0.9

0.8

0.7

0.6
Temparature

0.5

0.4 Q=2,3,4

0.3

0.2

0.1

0
0 1 2 3 4 5 6 7 8
y

Fig.14. Temperature for different in Q

0.9

0.8

0.7

0.6
Temparature

0.5

0.4
R=2,3,4
0.3

0.2

0.1

0
0 1 2 3 4 5 6 7 8
y

Fig.15. Temperature for different in R

323
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

1
data1
0.9 0.25 data2
data3
0.8 0.24

0.7 0.23
1.6 1.65 1.7 1.75 1.8
0.6
Temparature

0.5

0.4 Du=0.03,0.05,0.07

0.3

0.2

0.1

0
0 1 2 3 4 5 6 7 8
y

Fig.16.Temperature for different in Du

0.9

0.8

0.7

0.6
Concentration

0.5

0.4

0.3

0.2

0.1 Sc=0.22,0.27,0.34

0
0 1 2 3 4 5 6 7 8
y

Fig.17. Concentration for different Sc

0.9

0.8

0.7

0.6
Concentration

0.5

0.4

0.3

0.2

0.1
Kr=2,3,4

0
0 1 2 3 4 5 6 7 8
y

Fig.18.Concentrationfor different Kr
Table: Skin-friction coefficient, Nusselt number and Sherwood number:
𝐌 𝐏𝐫 𝐆𝐫 𝐆𝐦 𝐐 t Du 𝐰 𝐊𝐫 𝐑 𝐒𝐜 𝐄𝐜 𝛕 𝐍𝐮 𝐒𝐡
2 0.71 5 3 2 1 0.03 𝛑 0.5 2 0.22 0.001 -5.7027 0.8474 0.1100
𝟔
3 -5.1096 0.8489

324
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

4 -4.2377 0.8496
1.01 -8.1965 1.2009
7 -1.6504 8.3831
6 -6.6189 0.8464
7 -7.5411 0.8453
4 -6.7104 0.8461
5 -7.7186 0.8445
3 -11.5837 1.2668
4 0.4339 1.7030
2 -6.4481 0.8466
3 -7.4729 0.8454
0.05 -5.7035 0.8469
0.07 -5.7042 0.8464
π -6.0223 0.8471
4
π -6.4378 0.8466
3
0.7 -5.6751 0.8470 0.1320
0.9 -5.6536 0.8467 0.1540
3 -6.1187 1.0582
4 -6.5988 1.1529
0.62 -5.6275 0.8442 0.3100
0.96 -5.5784 0.8418 0.4800
0.002 -5.7236 0.8442
0.003 -5.7437 0.8410
6. CONCLUSION
From the above work the following conclusions are
 Velocity decreases asM, Gm, t, Q, Ec, Sc, Kr, Du or wincrease and it is increases as Gr or Ec increases. But
the velocity initially increases and slowly reduces as Pr or R increases.
 Temperature decreases as Pr, Q or R increase and it increases asDu increases.
 Concentration decreases asSc or Krincreases.
 Skin-friction coefficient and Nusselt number increases with the values of M, Pr or Q increases and reduces
when Gr, Gm, t, R, Ec, Du or w increases. But the opposite phenomenon when Sc or Krincreases.
 Sherwood number increases with the values of Sc or Kr increases.
REFERENCES
1. Soundalgekar V.M. and Desai. G.A.“Viscous dissipation effects on the unsteady free convective flow of an
elastico-viscous fluid past an infinite vertical plate with constant suction” Indian J. pure Appl. Math., 10
(11), 1397-1404,(1979)
2. Bhasantkumar Jha and Ravindra Prasad ., Free convection and mass transfer effects on the flow past an
accelerated vertical plate with heat sources, Mechanics research communications, Vol-17, pp. 143-148.
3. Gupta A.S, Pop.I, Soundalgekar V.M., Free convection effects on the flow past an accelerated vertical
plate in a incompressible dissipative fluid, Rev. Roum. Sci. Techn. Mec. Apl., Vol.24, pp.561-568, 1979.
4. Soundalgekar VM (1976) Effects of mass transfer on free convective flow of a dissipative, incompressible
fluid past an infinite vertical porous plate with suction. Proc Indian AcadSci 84A:194–203
5. Soundalgekar.V.M., Effects of mass transfer on flow past a uniformly accelerated vertical plate., Letters in
Heat and mass transfer, Vol.9, pp.65-72, 1982.
6. Takhar, H.S, Ganesan, P., Ekambavahar, K. and Soundalgekar, V.M. (1997) Transient Free Convection
past a Sem-Infinite Vertical Plate with Variable Surface Temperature. International Journal of Numerical
Methods for Heat &Fluid Flow, 7, 280-296.
7. Raptis, A. and Perdikis, C. (1999) Radiation and Free Convection Flow past a Moving Plate. Applied
Mechanics and Engineering, 14, 817-821.

325
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

8. Das, U.N., Dekha, R.K. and Soundalgekar, V.M. (1994) Effects of Mass Transfer on Flow Past an
Impulsively Started Infinite Vertical Plate with Constant Heat Flux and Chemical Reaction. Forschung in
Ingenieurwsen, 60, 284-287.
9. Raju, M.C., Varma, S.V.K. and Rao, R.R.K. (2013) Unsteady MHD Free Convection and Chemically
Reactive Flow past an Infinite Vertical Porous Plate. I-Manager Journal of Future Engineering and
Technology, 8, 35-40.
10. Reddy, N.A., Raju, M.C. and Varma, S.V.K. (2009) Thermo Diffusion and Chemical Effects with
Simultaneous Thermal and Mass Diffusion in MHD Mixed Convection Flow with Ohmic Heating. Journal
of Naval Architecture and Marine Engineering, 6, 84-93.
11. Ogulu.A, Amikiri. A.R & Mbeledogu.I.U, (2007)., Unsteady MHD free convective flow past a Moving
vertical plate, International Journal of Heat Mass Transfer, Vol-50.
12. V. M. Soundalgekar, B. S. Jaisawal, A. G. Uplekar and H. S. Takhar, “The transient free convection flow
of a viscous dissipative fluid past a semi-infinite vertical plate.” J. Appl.Mech. Engng.4, 203-218, 1999.
13. B.Seshaiah, S.V.K.Varma, M.C.Raju, the effects of chemical reaction and radiation on unsteady MHD free
convection fluid flow embedded in a porous medium with time dependant suction with temperature
gradient heat source are studied. June 2013. Vol. 3, No.2 ISSN 2305-1493 International Journal of
Scientific Knowledge Computing and Information Technology © 2012 IJSK & K.A.J.
14. M Bhavana, D Chenna Kesavaish “The Soret Effect on free convective unsteady MHD Flow over a
vertical plate with Heat Source.” Int. Journal of Innovative Research in science and technology, Vol. 2,
May 2013.
15. Raju M.C, Varma S.V.K, (2011), Unsteady MHD free convection oscillatory Couette flow through a
porous medium with periodic wall temperature, Journal on Future Engineering and Technology, Vol.6,
No.4. Pp.7-12.
16. Alao, F. I., Fagbade, A. I., &Falodun, B. O. (2016). Effects of thermal radiation, Soret and Dufour on an
unsteady heat and mass transfer flow of a chemically reacting fluid past a semi-infinite vertical plate with
viscous dissipation. Journal of the Nigerian Mathematical Society, 35(1), 142-158.
17. Raju, R. S., Sudhakar, K., & Rangamma, M. (2013). The effects of thermal radiation and Heat source on an
unsteady MHD free convection flow past an infinite vertical plate with thermal diffusion and diffusion
thermo. Journal of The Institution of Engineers (India): Series C, 94(2), 175-186.
18. Rajakumar, K. V. B., Balamurugan, K. S., Reddy, M. U., & Murthy, C. V. R. (2018). Radiation,
dissipation and Dufour effects on MHD free convection Casson fluid flow through a vertical oscillatory
porous plate with ion-slip current. International Journal of Heat and Technology, 36(2), 494-508.
19. Reddy, G. J., Raju, R. S., & Rao, J. A. (2017). Thermal diffusion and diffusion thermo impact on chemical
reacted MHD free convection from an impulsively started infinite vertical plate embedded in a porous
medium using FEM. Journal of Porous Media, 20(12).
20. Mohan, S. R., Reddy, G. V., & Varma, S. V. K. (2019). Effects of chemical reaction and aligned magnetic
field on unsteady MHD casson fluid flow past a moving an infinite plate through a porous medium in the
presence of thermal radiation and heat absorption. International Journal of Advanced and Innovative
Research, 8(1), 1-15.
21. Bordoloi, R., & Ahmed, N. (2021). MHD Free Convection from a Semi-infinite Vertical Porous Plate with
Diffusion-Thermo Effect.
22. Raju, M. C., Reddy, N. A., & Varma, S. V. K. (2014). Analytical study of MHD free convective,
dissipative boundary layer flow past a porous vertical surface in the presence of thermal radiation,
chemical reaction and constant suction. Ain Shams Engineering Journal, 5(4), 1361-1369.
23. Ramakrishna, S. B., Thavada, S. K., Venkatachala, G. M., &Bandaru, M. (2021). Impacts of Chemical
Reaction, Diffusion-Thermo and Radiation on Unsteady Natural Convective Flow past an Inclined Vertical
Plate under Aligned Magnetic Field. Biointerface Research in applied Chemistry, 11(5), 13252-13267.
24. Mohan, S., Reddy, G. V., & Varma, S. V. K. (2019). Effects of Chemical Reaction, Radiation And Aligned
Magnetic Field on Unsteady MHD Casson Fluid Flow Past A Moving An Infinite Vertical Plate Through
Porous Medium In Presence of Heat Absorption. Journal on Future Engineering & Technology, 14(4).
326
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

25. Umamaheswar, M., Raju, M. C., & Varma, S. V. K. (2017). Effects of time dependent variable
Temperature and concentration boundary layer on MHD free convection flow past a vertical porous plate
in the presence of thermal radiation and chemical reaction. International Journal of Applied and
Computational Mathematics, 3(2), 679-692.
26. Mohan, S. R., Reddy, G. V., & Varma, S. V. K. (2019). Soret and aligned magnetic field effects on an
unsteady MHD free convection casson fluid flow past an exponentially infinite vertical plate through
porous medium in the presence of thermal radiation, chemical reaction and heat source or sink. Advanced
Science, Engineering and Medicine, 11(5), 336-345.
27. Srinivasa Raju, R. (2016). Combined influence of thermal diffusion and diffusion thermo on unsteady
MHD free convective fluid flow past an infinite vertical porous plate in presence of chemical
reaction. Journal of The Institution of Engineers (India): Series C, 97(4), 505-515.
28. Omamoke, E., Amos, E., & Bunonyo, K. W. (2020). Radiation and heat source effects on MHD free
convection flow over an inclined porous plate in the presence of viscous dissipation. American Journal of
Applied Mathematics, 8(4), 190-206.
29. Bhargava, R., Sharma, R., & Bég, O. A. (2009). Oscillatory chemically-reacting MHD free convection heat
and mass transfer in a porous medium with Soret and Dufour effects: finite element modeling. Int. J. Appl.
Math. Mech, 5(6), 15-37.
30. Rallabandi, S. R. (2021). Finite element solutions of non-Newtonian dissipative Casson fluid flow past a
vertically inclined surface surrounded by porous medium including constant heat flux, thermal diffusion,
and diffusion thermo. International Journal for Computational Methods in Engineering Science and
Mechanics, 1-15.
31. Sreenivasulu, P., & Reddy, N. B. (2012). Thermo-diffusion and diffusion-thermo effects on MHD
boundary layer flow past an exponential stretching sheet with thermal radiation and viscous
dissipation. Advances in Applied Science Research, 3(6), 3890-3901.
32. Anwar, T., Kumam, P., & Watthayu, W. (2021). Unsteady MHD natural convection flow of Casson fluid
incorporating thermal radiative flux and heat injection/suction mechanism under variable wall
conditions. Scientific Reports, 11(1), 1-15.
APPENDIX
4 Pr Q Pr Du Pr n Pr ent
J 1  M , J 2  J 1  n, J 3  1  , J4  , J5  , J6  , J7  , J 9  Sc Kr ,
3R J3 J3 J3 J3
J 4  J 42  4 J 6 J5 J9 Gr I Gr I1  Gm
J10  Sc ( Kr  n), J11  , I1 = , I 2  1  I 2 , I3  2 2 , I 4  ,
2 J9  J 4 J 4  J1 J 92  J1
J 7 J12 I 52 J 7 J 42 I 32 J 7 J 92 I 42
I 5  cos( wt )  I 3  I 4 , I 6  , I 7  , I 8  ,
4 J12  2 J1 J 4  J 6 4 J 42  2 J 42  J 6 4 J 92  2 J 9 J 4  J 6
J 7 J1 I 5 J 4 I 3 J 7 J 4 I3 J 9 I 4 J 7 J1 I 5 J 9 I 4
I9  , I10  , I11  ,
( J1  J 4 )  ( J1  J 4 ) J 4  J 6
2
( J9  J 4 )  ( J9  J 4 ) J 4  J6
2
( J1  J 9 )  ( J 1  J 9 ) J 4  J 6
2

Gr I12 Gr I Gr I Gr I
I12  I 6  I 7  I8  I 9  I10  I11 , I13  , I14  2 6 , I15  2 7 , I16  2 8 ,
J11  J 2
2
4 J1  J 2 4J4  J2 4J9  J 2
Gr I 9 Gr I10 Gr I11
I17  , I18  , I19  , I 20  I13  I14  I15  I16  I17  I18  I19 .
( J1  J 4 )  J 2
2
( J9  J 4 )  J 2
2
( J1  J 9 ) 2  J 2

AUTHOR DETAILS:
S. RAMA MOHAN1 AND N.MAHESHBABU2
1
Department of Mathematics, QIS College of Engineering & Technology (Autonomous), Ongole, A.P. India
2
Department of Mathematics, Dr. S.R.K. Govt Arts College, Yanam, U.T of Puducherry, India

327
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

MODIFIED NEW GENERAL INTEGRAL ADOMIAN DECOMPOSITION METHOD TO SOLVE


RICCATI DIFFERENTIAL EQUATION IN QUADRATIC FORM BASED ONNEWTON - RAPHSON
METHOD

K. N. VABLE AND DR. D. P. PATIL

ABSTRACT
For approximating the solution of the Riccati differential equation in quadratic form, a new general integral
transform method is applied, numerically in combination with the Adomian decomposition method. In this
method the function which is unknown is replaced by a Newton - Raphson formula in the Adomian polynomial
is introduced. The solutions of Riccati differential equations in the quadratic form are exhibited in terms of an
infinite series, which are obtained by the iterative algorithm. Comparisons made among the exact solution, the
Taylor series method, and the new method clearly indicate the simplicity and the effectiveness of this new
method.
Keywords: Quadratic Riccati Differential Equation, New general integral transform, Adomian decomposition
method, Newton - Raphson formula.

INTRODUCTION
Integral transforms play a very important role in the field of differential and integral equations. Many
researchers are engaged in developing and introducing the new integral transforms, like Laplace transform [4],
Fourier transform [4], Mellin transform [4], Hankel transform [4], Sumudu Transform [11], Sawi transform [7],
Shehu transform [8]. Recently Kushare developed Kushare transform [6] and Khakale developed Soham
transform [10].
To solve ordinary differential equations and partial differential equations George Adomian [2] developed the
Adomian decomposition method. This method is extended to solve stochastic systems [1]. The employment of
Adomian polynomials is the crucial aspect of this method. Without simply linearizing the system it allows the
convergence of the solution of the nonlinear part of the equation.
Riccati differential equation (RDE) is the most important class of a nonlinear differential equation. It is named
in honor of Italian count Jacopo Francesco Riccati [3]. Mishra et al [9] used a numerical technique of Laplace
transform Adomian decomposition method to solve Riccati differential equations in quadratic form in this
methodology. In Adomian polynomial he replaces the function 𝑣𝑖 which is unknown, with the Newton Raphson
formula.
In this paper, we use a numerical technique of the general integral transform Adomian decomposition method to
solve RDE in quadratic form. This paper is organized as Section (2) is devoted to preliminaries. Section (3) is
devoted to the analysis of the method. Section (4) is reserved for solving numerical examples and the
conclusion is in the last section(5).
2. PRELIMINARIES
The following are the basic definitions and results related to the new general integral transform.
Definition 1 [5]
Let 𝑢(𝑡) be an integrable function defined for 𝑡 ≥ 0, 𝑝(𝑠) ≠ 0 𝑎𝑛𝑑 𝑞(𝑠) are positive real functions, we define
the general integral transform 𝒰 of 𝑢(𝑡) by the formula

𝒯{𝑢(𝑡); 𝑠} = 𝒰(𝑠) = 𝑝(𝑠) ∫0 𝑢(𝑡)𝑒 −𝑞(𝑠)𝑡 𝑑𝑡 (1)
provided the integral exists for some q(s).
Theorem 1 [5]
Let u(t) is differentiable and p(s) and q(s) are positive real functions, then
1. 𝒯{𝑢′(𝑡); 𝑠} = 𝑞(𝑠)𝒰(𝑠) − 𝑝(𝑠)𝑢(0),
2. 𝒯{𝑢′′(𝑡); 𝑠} = 𝑞 2 (𝑠)𝒯{𝑢(𝑡); 𝑠} − 𝑞(𝑠)𝑝(𝑠)𝑢(0) − 𝑝(𝑠)𝑢′(0),
3. 𝒯{𝑢(𝑛) (𝑡); 𝑠} = 𝑞 𝑛 (𝑠)𝒯{𝑢(𝑡); 𝑠} − 𝑝(𝑠) ∑𝑛−1
𝑘=0 𝑞
𝑛−1−𝑘
(𝑠)𝑢(𝑘) (0).

328
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Definition 2 [5] Quadratic Riccati Differential Equation:


𝑑𝑣
= 𝑎(𝑡)𝑣(𝑡) + 𝑏(𝑡)𝑣 2 (𝑡) + 𝑐(𝑡), 𝑣(0) = 𝑑 (2)
𝑑𝑡

where, the number 𝑑 is constant, 𝑣(𝑡) is an unknown function, 𝑎(𝑡), 𝑏(𝑡), 𝑐(𝑡) are the known functions that are
scalars.
3. ANALYSIS OF METHOD [9]
We apply a new general integral transform method to both sides of RDE in quadratic form with the given initial
condition (2),
𝑑𝑣
] = 𝒯[𝑎(𝑡)𝑣(𝑡) + 𝑏(𝑡)𝑣 2 (𝑡) + 𝑐(𝑡)]
𝒯[
𝑑𝑡
We apply the linear property and differential property of the new general integral transform,
𝑝(𝑠) 1 1 1
𝒯{𝑣(𝑡)} = 𝑞(𝑠) 𝑑 + 𝑞(𝑠) 𝒯{𝑎(𝑡)𝑣(𝑡)} + 𝑞(𝑠) 𝒯{𝑏(𝑡)𝑣 2 (𝑡)} + 𝑞(𝑠) 𝒯{𝑐(𝑡)} (3)

In this method, the solutions are expressed in terms of an infinite series as


𝑣(𝑡) = ∑∞
𝑛=0 𝑣𝑛 (𝑡) (4)
Here the terms 𝑣𝑛 are computed recursively and the nonlinear term 𝑁(𝑣(𝑡)) = 𝑣 2 (𝑡) is decomposed as,
𝑁(𝑣(𝑡)) = 𝑣 2 (𝑡) = ∑∞
𝑛=0 𝐴𝑛 (𝑡) (5)
Where, 𝐴𝑛 ′𝑠 are the adomian polynomials.
The standard Adomian polynomial’s are,
1 𝑑𝑛
𝑛! 𝑑𝜆𝑛
[𝑁{∑𝑛𝑖=0 𝜆𝑖 𝑣𝑖 }] (6)
Here we find the modified Adomian polynomials by replacing the term 𝑣𝑖 in equation (6) with Newton -
Raphson formula as,
1 𝑑𝑛 𝑁(𝑣 )
𝐴𝑛 = 𝑛! 𝑑𝜆𝑛 [𝑁 {∑𝑛𝑖=0 𝜆𝑖 (𝑣𝑖 − 𝑁′ (𝑣𝑖 ))}] (7)
𝑖 𝜆=0

A few terms of 𝐴𝑛 are as follows


1 2 2
𝐴0 = ( ) 𝑣0
2
1 2
𝐴1 = ( ) (2𝑣0 𝑣1 )
2
1 2
𝐴2 = ( ) (2𝑣0 𝑣2 + 𝑣12 )
2
1 2
𝐴3 = ( ) (2𝑣0 𝑣3 + 2𝑣1 𝑣2 )
2
Using equations (4), (5) in (3) and the linearity property of a new general integral transform, we get
𝑝(𝑠) 1 1 1
∑∞ ∞ ∞
𝑛=0 𝒯{𝑣𝑛 (𝑡)} = 𝑞(𝑠) 𝑑 + 𝑞(𝑠) ∑𝑛=0 𝒯{𝑎(𝑡)𝑣𝑛 (𝑡)} + 𝑞(𝑠) ∑𝑛=0 𝒯{𝑏(𝑡)𝐴𝑛 (𝑡)} + 𝑞(𝑠) 𝒯{𝑐(𝑡)} (8)

We get the following recursive relation by comparing both sides of equation (8),
𝑝(𝑠) 1
𝒯{𝑣0 (𝑡)} = 𝑞(𝑠) 𝑑 + 𝑞(𝑠) 𝒯{𝑐(𝑡)} (9)
1 1
𝒯{v1 (t)} = q(s) 𝒯{a(t)v0 (t)} + q(s) 𝒯{b(t)A0 (t)} (10)
1 1
𝒯{v2 (t)} = q(s) 𝒯{a(t)v1 (t)} + 𝒯{b(t)A1 (t)} (11)
q(s)

329
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

In, general, the relation is given by


1 1
𝒯{vn (t)} = q(s) 𝒯{a(t)vn−1 (t)} + q(s) 𝒯{b(t)An−1 (t)}, n ≥ 1. (12)

To find the values of v0 , v1 , v2 , . . ., apply the inverse of a new general integral transform to the above equations
p(s) 1
v0 (t) = 𝒯 −1 [ d+ 𝒯{c(t)}]
q(s) q(s)
Substitute the value of v0 in equation (10), find the value of R.H.S. after that take the inverse of the new
general integral transform then we will get the value of v1 . Continuing similarly we obtain the terms v2 , v3 , v4 . ..
recursively and then put these terms in equation (4) to get the solution to the problem.
4. PROBLEMS
Example 1 Consider the following
v′(t) = 2 + 2v 2 (t), v(0) = 0 (13)
having the exact solution as v = tan(2t).
For distinct values of t, we get the solution and the solution represented in Table 1. From Table 1 our
observation is that this method gives a very close solution to the exact solution. The superiorness of this
methodology is demonstrated by the figure.1
T Approximatesolution Exact solution Absolute error
0 0 0 0
0.01 0.020000667 0.020002667 2.0004E-06
0.02 0.040005334 0.040021347 1.60128E-05
0.03 0.060018006 0.060072104 5.40974E-05
0.04 0.080042694 0.080171105 0.000128411
0.05 0.100083417 0.100334672 0.000251255
0.06 0.120144207 0.120579337 0.00043513
0.07 0.140229115 0.140921895 0.00069278
0.08 0.160342207 0.161379461 0.001037254
0.09 0.180487575 0.181969529 0.001481954
0.1 0.200669333 0.202710036 0.002040702
Table 1: Computed Approximate and Exact solutionfor Example 1

Figure 1: Comparison of Approximate solution and Exact solution for Example1


Example 2 Consider the following
v′(t) = 1 − v 2 (t) + 2v(t), v(0) = 0 (14)

330
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

e2√2t −1
Which has the solution as v = .
(√2−1)e2√2t +1+√2

For distinct values of t, we get the solution and the solution represented in Table 2. From Table 2 our
observation is that this method gives a very close solution to the Taylor series solution. The superiorness of this
methodology is demonstrated by the figure.2
T Approximate solution TaylorSeries solution Absolute error
0 0 0 0
0.01 0.010100585 0.01010033 2.55042E-07
0.02 0.020404693 0.020402612 2.08134E-06
0.03 0.030915884 0.030908719 7.16516E-06
0.04 0.041637754 0.041620432 1.73229E-05
0.05 0.052573941 0.052539435 3.45059E-05
0.06 0.063728116 0.06366731 6.08059E-05
0.07 0.075103989 0.075005529 9.84596E-05
0.08 0.086705302 0.086555447 0.000149854
0.09 0.098535833 0.098318301 0.000217532
0.1 0.110599392 0.110295197 0.000304195
Table 2: Computed Approximate and Exact solutionforExample 2

Figure 2: Comparison of Approximate solution and Exact solution for Example 2


5. CONCLUSION
A modification of the new general integral transform combined with the Adomian decomposition method is
discussed, in this paper. In Adomian polynomial the function vi which is unknown is replaced by the Newton -
Raphson formula and we get a numerical methodology to solve Riccati differential equations of quadratic type.
Through the tables and figures the numerical results show that the determination of approximate solution of
Riccati differential equation of quadratic type is effective and simple by using this new method.
REFERENCES
[1] Adomian, G. (1986). Nonlinear Stochastic Operator Equations. Kluwer Academic Publishers. ISBN 978-0-
12-044375-8.
[2] Adomian, G. (1994). Solving Frontier problems of Physics: The decomposition method. Kluwer Academic
Publishers.
[3] J. Bizzar and M. Eslami, Int. J. of Nonlinear Sci.9,444-447(2010).
[4] Lokenath Debnath and Dambaru Bhatta, Integral Transform and their applications, third edition, CRC
Press, Taylor and Francis Group, Boca Raton, London, Newyork.

331
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[5] Hossein Jafari a,b,c,d,*, A New general integral transform for solving integral equations, Journal of
Advanced Research 32 (2021) 133-138..
[6] Sachin Kushare, Dinkar Patil and Archana Takate, The New Integral Transform ‘KUSHARE Transform’
International Journal of Advances in Engineering and Management (IJAEM) Volume 3, Issue 9 Sep 2021,
pp: 1589-1592.
[7] Mohand M. Abdelrahim Mahgoub, The New Integral Transform ”Sawi Transform”, Advances in
Theoretical and Applied Mathematics, Volume 14, Number 1 (2019), pp. 81-87.
[8] Shehu Maitama, Weidong Zhao, New integral transform: Shehu transform a generalization of Sumudu and
Laplace transform for solving differential equations, International Journal of Analysis and Applications;
17(2) 2019.
[9] Vinod Mishra 1 and Dimple Rani 2, Newton - Raphson based modified Laplace Adomian decomposition
method for solving quadratic Riccati differential equations, MATEC Web of Conferences 57,05001(2016),
ICAET - 2016.
[10] D.P.Patil, Savita Santu Khakale, The New Integral Transform “Soham Transform”, International Journal of
Advances in Engineering and Management (IJAEM) Volume 3, Issue 10 Oct 2021, pp: 126-132.
[11] G. K. Watugala, Sumudu transform: a new integral transform to solve differential equations and control
engineering problems, International Journal of Mathematical Education in Science and Technology
Volume 24, 1993 - Issue 1, Pages 35-43.

AUTHOR DETAILS:
1
K. N. VABLE AND 2DR. D. P. PATIL
1
Assistant Professor and 2Professor & HOD, Department of Mathematics, K.R.T. Arts, B. H. Commerce and A.
M. Science, College, Nashik

332
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

HARMONIOUS COLORING ON STAR GRAPH

N. ANANTHI AND V. T. CHANDRASEKARAN

ABSTRACT
A harmonious coloring of a graph G is a proper vertex coloring of G in which every pair of colors appears on
adjacent vertices at most once. The harmonious chromatic number, denoted  h  G  is the minimum number of
colors in a harmonious coloring. In this paper we find h  2n Sn   2n  1 , using this result the lower bound of
harmonious chromatic number for corona product of graphs and join of graphs is analysed.
Keywords: Coloring, Harmonious coloring, Corona product, Star graph.

1. INTRODUCTION
Harmonious graph coloring was introduced by Frank Harary and M. J. Plantholt in 1982 and it stated that
A harmonious coloring of a simple graph G is a proper vertex coloring such that each pair of colors appears
together on at most one edge [1]. The harmonious chromatic number  h  G  is the least integer k for which
G admits a harmonious coloring with k colors.
Hopcroft and Krishnamoorthy [2] shown that the problem of determining the harmonious chromatic number of
a graph is NP-hard.
C. J. H. McDiarmid and Luo Xinhua [3] gave the upper bounds for harmonious colourings in 1991. In 1993
Zhikang Lu [4] determined on the harmonious chromatic number of a complete binary and trinary tree.
Zhikang Lu [5, 6] found the exact value of the harmonious chromatic number of a complete binary tree in 1997
and trinary tree in 1998.
K. Thilagavathi et.al. [7, 8] in 2007, gave the results of harmonious chromatic number of line graph of central
graph of cycle, complete graph, star graph and complete bipartite graph and in 2009 for central graph of path.
Harmonious Coloring on double star graph families and triple star graph families were discussed by
Venkatachalam et.al.[9] in 2012 and Akhlak Mansuri[11] in 2016 respectively. In 2014, Vernold Vivin[10]
found the bounds for the harmonious coloring of Myceilskians.
In 2019, Francesc Antoni Muntaner-Batle et. al.[12] established the harmonious chromatic number of multicopy
of complete graphs K n .

2. HARMONIOUS COLORING ON STAR GRAPH


Theorem 2.1: Let S n be a star graph and let k Sn denote the union of k number of star graphs then
h  k Sn   n  k ,1  k  n.

Proof. When k  1 then we have a single star graph and h  Sn   n  1 .


1  2
When k  2 , then 2 Sn  Sn  Sn . Let us label the vertices of Sn
1
as v1, v11, v12 , , v1n  and S n 2 as
v2 , v21, v22 , , v2n  where deg  vij   1, i  1, 2 and 1  j  n and deg  vi   n, i  1, 2 .

Let us color the vertex v1 as 1 , since v1 is adjacent to all the vertices v1 , v11 , v12 , , v1n , they must all have
unique colors. So 2,3, , n  1 are the respective colors of the vertices v1 , v11 , v12 , , v1n .
Now let us color the vertex v2 as 2 . Similar to previous argument, vertices v2 , v21 , v22 , , v2 n must have
unique color and none of them can be color as 1 . Therefore the vertices v2 , v21 , v22 , , v2 n are colored as
3, 4, , n  2 . Hence h  2 Sn   n  2 .

333
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

In similar manner we can show  h   n  1 S   n  n  1.


n

Now let us show for n Sn graph, h  n Sn   n  n . n Sn  Sn   Sn    Sn n and let us label the vertices of
1 2

each Sn  as vi , vi1 , vi 2 , , vin  for i  1, 2, ,n.


i

The vertices of Sn  are colored as 1, 2,3, , n 1.


1

Now let us color the vertices of S n  . v2 Cannot be colored 1 , if so v21 , v22 ,


2
, v2 n cannot be colored with any of
the colors 2,3, , n  1 . So v2 is colored 2 and v21 as 3 , v22 as 4 , , v2n as n  2 .

3, 4, , n  3 are the colors allotted to the vertices v3 , v31 , v32 , , v3n of the graph S n 3 . Similarly Sni  , the
vertices vi , vi1 , vi 2 , , vin are colored as i, i  1, ,i  n .

Proceeding in this way the vertices vn , vn1 , vn 2 , , vnn of Sn n  are colored as n, n  1, , 2n . Hence
h  n Sn   2n .

Thus h  k Sn   n  k ,1  k  n .

Note:
th
The following martrix corresponds to harmonious coloring of n Sn , where i column denote the colors of the
vertices vi , vi1 , vi 2 , , vin of Sni  and 1st row denote the colors of the vertices v1 , v2 , , vn .

 1 2 3 n 
 2 3 4 n  1 

 3 4 5 n2
 
 
 n n 1 n  2 2n  1
 
n  1 n  2 n  3 2n 

Theorem 2.2:  h   n  k  S   2n, k  1, 2,


n , n 1

Proof.

 n  k  Sn  Sn1  Sn 2   Sn n   Sn n 1   Sn n  k 


 n Sn n   Sn n 1   Sn n  k 

Therefore  h   n  k  S     n S   2n .
n h n

For k  1 , the matrix representation of harmonious coloring of  n  1 Sn is

 1 2 3 n  2
n
 2 3 4 n  1 n  1 

 3 4 5 n  2 n  3
 
 
 n n 1 n  2 2n  1 2n 
 
n  1 n  2 n  3 2n 1 

334
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Therefore  h   n  1 S   2n .
n

For k  2 ,
 1 2 3 n n2
n  3
 2 3 4 n  1 n  1 n  1 

 3 4 5 n  2 n  3 n  4
 
 
n 1 n n 1 2n  2 2n  1 2n 
 
 n n 1 n  2 2n  1 2n 1 
n  1 n  2 n  3 2n 1 2 

is the matrix representation of harmonious coloring of  n  2 Sn . Therefore  h   n  2  S   2n .
n

Similarly for k  n 1 , the matrix representation of harmonious coloring of  2n  1 Sn is

 1 2 3 n n2 n3 n4 n5 2n 


 2 3 4 n 1 n 1 n 1 n 1 n 1 n  1 

 3 4 5 n2 n3 n4 n5 n6 1 
 
 4 5 6 n3 n4 n5 n6 n7 2 
 
 
n 1 n n 1 2n  2 2n  1 2n 1 2 n  3
 n n 1 n  2 2n  1 2n 1 2 3 n  2
 
 n  1 n  2 n  3 2n 1 2 3 4 n  1 

Hence  h   2n  1 S   2n .
n

Theorem 2.3: h  2n Sn   2n  1

Proof. Since 2n Sn   2n 1 Sn ,  h  2n S n    h   2n  1 S   2n


n

With 2n colors, the number of unique pairs of colors can be formed is


n
C2  n  2n  1
 2n 2  n

The number of edges in 2n Sn graph is 2n 2 . Therefore with 2n colors it is impossible to have harmonious
coloring for 2n Sn graph. thus h  2n Sn   2n . The matrix representation of harmonious coloring of 2n Sn is
given below:
 1 2 3 n n2 n3 n4 2n 2n  1
 2 3 4 n 1 n 1 n 1 n 1 n 1 1 

 3 4 5 n2 n3 n4 n5 1 2 
 
 4 5 6 n3 n4 n5 n6 2 3 
 
 
n 1 n n 1 2n  2 2n  1 2n 1 n3 n2
 n n 1 n  2 2n  1 2n 1 2 n2 n 1 
 
 n  1 n  2 n  3 2n 1 2 3 n 1 n 

335
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Remark:  h   2n  1 S   2n  1 with harmonious coloring matrix as


n

 1 2 3 n n2 n3 n4 2n 2n  1 2n  1 


 2 3 4 n 1 n 1 n 1 n 1 n 1 1 n  1 

 3 4 5 n2 n3 n4 n5 1 2 n2 
 
 4 5 6 n3 n4 n5 n6 2 3 n3 
 
 
n 1 n n 1 2n  2 2n  1 2n 1 n 3 n  2 2n  2 
 n n 1 n  2 2n  1 2n 1 2 n2 n  1 2n  1 
 
 n  1 n  2 n  3 2n 1 2 3 n 1 n 2n 

Example: For the graph k S4 ,1  k  9 the matrices correspond to harmonious coloring and its harmonious
chromatic number are given below:

Graph G Matrices correspond to Harmonious Coloring h  G 


1 
2
 
S4 3  h  S4   5
 
4
 5 
1 2 
2 3
 
2 S4 3 4  h  2 S4   6
 
4 5
 5 6 
1 2 3
2 3 4
 
3 S4 3 4 5  h  3 S4   7
 
4 5 6
 5 6 7 
1 2 3 4 
2 3 4 5
 
4 S4 3 4 5 6  h  4 S4   8
 
4 5 6 7
 5 6 7 8 
1 2 3 4 6 
2 3 4 5 5
 
5 S4 3 4 5 6 7   h  5 S4   8
 
4 5 6 7 8 
 5 6 7 8 1 

336
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

1 2 3 4 6 7 
2 3 4 5 5 5
 
6 S4 3 4 5 6 7 8   h  6 S4   8
 
4 5 6 7 8 1 
 5 6 7 8 1 2 
1 2 3 4 6 7 8 
2 3 4 5 5 5 5
 
7 S4 3 4 5 6 7 8 1   h  7 S4   8
 
4 5 6 7 8 1 2
 5 6 7 8 1 2 3 
1 2 3 4 6 7 8 9 
2 3 4 5 5 5 5 1 
 
8 S4 3 4 5 6 7 8 1 2  h  8 S4   9
 
4 5 6 7 8 1 2 3
 5 6 7 8 1 2 3 4 
1 2 3 4 6 7 8 9 9 
2 3 4 5 5 5 5 1 5
 
3 4 5 6 7 8 1 2 6  h  9 S4   9
 
4 5 6 7 8 1 2 3 7 
 5 6 7 8 1 2 3 4 8 

In Figure 1, the harmonious coloring of the graph 9 S4 is given.

Figure 1: Graph 9 S4 with h  9 S4   9

337
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Theorem 2.4: Let G and H be any two graph of order m and n , where 1  m  2n 1 . Then
 n  m, if 1  m  n

h G H    2n, if n  1  m  2n  1
2n  1, if m  2n, 2n  1

Proof. K m  G and K n  H for any graph G and H with order m and n respectively. The minimal
corona product graph is obtained when taking G  K m and H  K n . So

Km Kn  G H

But K m K n  m Sn , hence  h  m S n    h  K m Kn   h G H.

i.e h  G H    h  m Sn  .
 n  m, if 1  m  n
Hence  h  G 
H    2n, if n  1  m  2n  1
2n  1, if m  2n, 2n  1

3. HARMONIOUS COLORING ON SOME MORE GRAPHS
 
Theorem 3.1: For any complete bipartite graph K m , n ,  h K m ,n  m  n .

Proof. Let V1  u1 , u2 , , um  and V2  v1 , v2 , , vn  be the bipartition of the vertex set of K m ,n .
Consider the vertex u1 , it is adjacent to all the vertices in V2 . So if vertex u1 is colored 1 then all the vertices in
V2 must have n unique distinct colors other than 1 . And these n distinct colors cannot be assigned for any
vertices in V1 .

Similarly, consider the vertex v1 , it is adjacent to all the vertices in V1 . So all the vertices in V1 must have m
distinct color other than n colors needed for coloring the vertices of V2 .

 
Hence  h K m ,n  m  n .

Theorem 3.2: Let G be any graph of order n . Suppose G has a complete bipartite graph K l , m as subgraph
then
l  m  h  G   n
Proof. By hypothesis of the theorem, we have Kl ,m  G  K n .

 
Therefore  h K l ,m   h  G    h  K n  .

Thus l  m  h  G   n .
Theorem 3.3: Let G be any connected graph of order n . If G has a spanning complete bipartite subgraph,
then
h  G   n
Proof. Suppose G has a spanning complete bipartite graph K l , m , where l  m  n . Then
K l ,m  G  K n
 h  K l ,m    h  G    h  K n 
n  h G   n
 h G   n

338
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Remark: Converse is not true. i.e. for any connected graph G of order n with h  G   n doesn't implies that
G has a spanning complete bipartite subgraph.

Figure 2: Graph G with h  G   7

Graph G in Figure 2 doesn't have a spanning complete bipartite subgraph but having  h  G   V  G   7 .

Theorem 3.4: Let G and H be any two graphs of order m and n . Then

h  G  H   m  n
Proof. By definition of join of graphs, we have
K m,n  G  H  K m n

i.e.  h  K m,n    h  G  H    h  K m n 
m  n  h G  H   m  n

Therefore h  G  H   m  n .

4. CONCLUSION
In this paper we have found harmonious chromatic number of 2n Sn . using this result the lower bound of
harmonious chromatic number for corona product of graphs is determined. And found that if, graph with order
n has a spanning complete bipartite subgraph then its harmonious chromatic number is n .
REFERENCES
[1] Frank O, Harary F, Plantholt M (1982) The line distinguishing chromatic number of a graph. Ars Comb
14:241–252
[2] Hopcroft, J. and Krishnamoorthy, M.S., (1983), On the harmonious coloring of graphs, SIAM Journal of
Algebra Discrete Mathematics, 4, pp. 306-311
[3] C. J. H. McDiarmid and Luo Xinhua, (1991), Upper bounds for harmonious colorings, Journal of Graph
Theory, 15, pp. 629–636.
[4] Zhikang Lu, (1993), The harmonious chromatic number of a complete binary and trinary tree, Discrete
Mathematics, 118, pp. 165–172.
[5] Zhikang Lu, (1997), The exact value of the harmonious chromatic number of a complete binary tree,
Discrete Mathematics, 172, pp. 93–101.

339
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[6] Zhikang Lu, (1998), Exact value of the harmonious chromatic number of a complete trinary tree, Systems
Science and Mathematical Sciences, 11, pp. 26– 31.
[7] Thilagavathi. K and Vernold Vivin.J, (2007), Harmonious colouring of cycles, regular graphs, star n-leaf,
festoon trees and bigraphs, Far East J. Math. Sci. (FJMS), 26 (3), pp.779-788.
[8] Vernold Vivin J And Thilagavathi. K, (2009), On Harmonious Colouring of Line Graph of Central Graph
of Paths, App. Math. Sc., 3 (5), pp. 205-214.
[9] Venkatachalam M, Vernold Vivin J and Kaliraj K, (2012), Harmonious Coloring On double star Graph
Families, Tamkang J. of Mathematics, 43 (2), pp. 153-158.
[10] Vernold Vivin.J, (2014), Bounds for the Harmonious Coloring of Myceilskians, International J.Math.
Combin., 1, pp. 102-108
[11] Akhlak Mansuri, (2016), On Harmonious Chromatic Number of Triple Star Graph, J. Hyperstructures, 5
(1), pp. 26-32.
[12] Francesc Antoni Muntaner-Batle, Vernold Vivin J. ,Venkatachalam M, (2019), Harmonious Coloring of
Multicopy of Complete Graphs, TWMS J. App. Eng. Math., 9 (2), pp. 384-395.

AUTHOR DETAILS:
1
N. ANANTHI AND 2V. T. CHANDRASEKARAN
1
Research Scholar Thiruvalluvar University, Vellore, India
2
Associate Professor, Jawahar Science College Neyveli, (Affiliated to Thiruvalluvar University-Vellore, India)

340
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

REVIEWS ON BRAIN TUMOUR SEGMENTATION AND CLASSIFICATION USING


CONVENTIONAL MACHINE LEARNING AND DEEP-LEARNING APPROACH

DEBENDRA KUMAR SAHOO*, SATYASIS MISHRA AND MIHIR NARAYAN MOHANTY

ABSTRACT
The fast detection of brain-tumourplays a vital role in further developing therapeutic outcomes and hence
functioning in endurance tolerance. There is a significant need for PC-assisted strategies with improved
accuracy for early detection of cancer. PC-backed brain cancer detection from MRI images including growth
location, division, and order processes. In recent years, many inquiries have turned to zero in traditional or
outdated AI procedures for brain development findings. Presently, there has been an interest in using in-depth
learning strategies to detect cerebral growths with excellent accuracy and heart rate. This review presents a
far-reaching audit of traditional AI strategies and in-depth study methods for diagnosing brain cancer. This
survey paper distinguishes the main benefits reflected in the exhibition estimation measurements of the
calculations applied in the three detection processes.
Keywords: Brain Tumor, MRI, CT scan, Glioma analysis, Deep learning approach.

1. INTRODUCTION
Cancers develop as an unmanageable and unusual expansion of cells in the parts of the body. The development
of unusual growth of cells inside the brain is said to be brain-tumour which is the most common cancer of all
types [1]. It is defined as a primary or metastatic tumour based on the origin of the tumor. When primary
tumours develop from tissues, metastatic cells develop and spread from a single part of the body to other parts.
Glioma tumour is an important area for tumour-detection in brain cancer. It is defined as the most effective
hostile primary brain tumors, astro-cytomas, oligodendro-gliomas, and high-grade gliobl-astoma multiform
(GBM) [2]. Chemotherapy and radiotherapy are some of the methods used to treat gliomas[3]. Various medical
applications like computerizedtomo-graphy (CT), magnetic-resonance spectroscopy (MRS), positron-emission
tomographies (PET) with magnetic-resonance imaging (MRI) have been used. For early prognosis of cancer in
patients, various computer-aided diagnosis (CAD) systems have previously been introduced for the automatic
diagnosis of a scan image for early detection of brain-tumours[4-5]. Gliomas are the primary sort of cancer at
present drawing in light of a legitimate concern for cerebrum growth analysts[6].
Early tumour detection is critical in the development of therapeutic options.The different brain imaging-
techniques viz.positron-emission tomo-graphy (PET), (MRI),(CT), (SPECT) have been used forsupplyof details
aboutshape, size location as well ascategoriesof brain-tumour which helps to diagnose. MRI bestowsa detail
about the anatomy of human-tissue, as well as considered a common technique because of its wide accessibility
with soft-tissue contrast. MRI uses powerful magnetic field of radio frequency signals to obtain images taken
from of human brain cells [7-8].On MRI scans, the brain tumour partitioning algorithms have been employed to
localize and distinguish different tumour tissues.Notable work is done by several researchers over the past few
decades in the field of brain tumor recognition with the division as well as classification of tumors. The clinical-
acceptance of diagnostic system depends upon the extent of the user's observation and calculations [9].The
study contributes an outline of the most key methods currently available to diagnose brain tumors. The survey
pivots on the diagnosis of brain tumors using MRI with traditional methods of machine learning and deep
learning study. Though there are numerous literature reviews, special attention is paid to a specific process, such
as segmentation, classification, or diagnostics [10, 11-13]. The present article provides a complete overview to
diagnose brain tumor detection and classifications. Additionally, the study involves the application of theclassic
machine learning and deep learning algorithms.
There are several aspects of the contribution of this study. Firstly, the study reviews the whole brain-tumor
diagnostic networkby using MRI-images and examines existing traditional machine-learning and deep learning
study approaches for diagnosing this. Secondly, it provides a full picture of the similarities and differences
between the different methods based on the performance of the brain-tumor diagnostic process. Thirdly, it
presents the available MR-image database used to evaluate the presentation of claimed technologies. Fourthly, it
provides an in-depth current study findings, as well as possible improvements and trends in the future. Finally,
it describes a potential test for combining three diagnostic processes and a single automated system or paradigm
for future research.A summary of the progress of the survey is appeared in Figure 1.

341
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Figure 1: Tumor detection, division, and information-level classification processes.


2. GROUNDWORK
Un-sharp masking, median filters, and wiener filters are examples of preprocessing techniques. To safeguard the
borders of an image, median filters are typically utilized in the pre-processing step. [14].As shown in Figure 2,
the general structure of the CAD (computer-aided-design) system for diagnosing brain tumors using MRI-
images includes data acquisition, pre-processing, segmentation, feature exclusion, and feature selection.Data-
collection is an activityfor obtaining images in the brain necessary for the diagnosis, which can be achieved
using diagnostic methods. The pre-processing step is simple and essential step in brain-image analysis. Pre-
processing is generally used to reduce the noise and enhancing the image resolution and contrast. Many pre-
processing approaches are used, like un-sharp masking, veneer-filters as well asmedian-filters. Median-filters
are usually utilized during pre-processing phase to protect the boundaries of an image[15].Deep learning
algorithms are capable of achieving great performance through other segmentation techniques and methods like
area-based algorithms, edge-based algorithms and cluster algorithms. Fuzzy C-means pooling (FCM), median
shiftas well as expectation maximization algorithms are examples of such algorithms. The various extraction
techniques such as violet transform, Gabor features, texture-features, boundary-feature extraction,principal
component analysis (PCA) and spectroscopy are also used for segmentation of the tumor analysis as described
in [16-20].Increasing the size of the feature vector significantly reduces the system accuracy. Therefore, feature
selection methods have been used in the literature to select the most important features likeGenetic Algorithm
(GA),Particle Swarm Optimization (PSO), Sequential Inverse Selection (SBS), Principal Component Analysis
(PCA) and Sequential Forward Selection (SFS) [21-30].

Figure 2: Flowchart for a Computer-Aided Diagnosis (CAD) System for Brain Tumours.

342
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Many researchers are used the sorting stepsviz. Support Vector Machine (SVM), Kernel SVM, Feed-forward
Propagation Neural Network (FFPNN), Artificial Neural Network (ANN),Auto-Mapping Neural Network
(AMNN).Back-Propagation Neural Network (BPNN), Probabilistic Neural Network (PNN), Probabilistic
Neural Network-Radial Base Function (PNNRBF), Normalized PSOC Optimization, Multi-layer Perceptron
(MLP), K-Near Neighbour, Genetic Algorithm (GA), Least Square Feature Transformation (LSFT), Fuse Hope-
field Neural Network algorithm, Supervised Linear Discrimination Analysis as well
asConvolutionalNeuralNetwork (CNN). Most of these tools have been utilized effectively; whereas, better
performance can be achieved using deep-learning algorithms.
2.1 A Clinicalperspective on Machine Learning
Machine learning has ignited a considerable interest in modern computers in the field ofmedicine. In the area of
brain-tumour recognition, a variety of advanced machine learning approaches are applied[31]. As a result,
machine learning has enabled clinics, engineers, and computer scientists to collaborate to develop semi-
automated and eventually completely automated tumor diagnostic systems with improved accuracy and
processing speed.The diagnosis of a semi-automated brain tumor frequently necessitates the manual
intervention of radiologists and clinics to start the technology, analyze the results, and fix flaws in the procedure
outcomes. Fully automated brain tumor diagnosis, on the other hand, relies on computers systems that employ
prior information and human intelligence to complete tumor diagnosis procedures without the need for human
interaction[32]. These findings show that machine learning diagnostics outperform manual diagnoses in terms
of processing interval,accuracy with efforts of radiologists.Figure 3 displays an example of manual
segmentation of a brain tumor by four separate specialists on the same MRI and in the same patient to
demonstrate this point.

Figure 3:Four independent technicians manually segmented glioma on MRI scans.


2.2 Brain Mri
A multitude of techniques like MRI, SPECT,CT and PET has been used to see the brain images. MRI,
which was first used for medical imaging of the brain in 1970, is now the most widely utilized imaging
modality which offers a number of advantages over other visualization techniques, including the ability to
provide dependable and rich information.The benefits of MRI in allowing clinicians to diagnose physical
problems in the brain are well established. Each MRI approach contributes to the diagnosis in a different
way. Edematous regions are identified using T2-images. On T1 scans, healthy tissues can be recognized.
The tumor's boundary is defined using T1-Gd images. Edematous areas could be differentiated from
cerebro-spinal fluid (CSF) with fluid attenuated inversion repair (FLAIR) images. Different types of
contrast images can be created using differences between images produced by these MRI techniques. The
different MRI techniques utilized for the diagnosis i.e.gadolinium contrast enhancement is observed in
Figure 4.

Figure 4: MRI m odalities registered to HG gliom a: T1 - MRI im age, T1- Gd MRI im age,
T 2- MRI image, and F LAI R - MRI im age.
2.3 Mridatabase Available
The AANLIB data set accessible from Harvard Medical School contains six principle areas: a neuro-imaging
preliminary with segments of typical life structures, cerebro-vascular infection, neo-plastic illness, de-
generative sickness and provocative illness. The Biomedical Image Analysis (SBIA) is utilized in creating PC
based picture examination strategies with diagnosing brain infections like schizophrenia, Alzheimer's illness,
343
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

chemical imbalance with horrible cerebrum injury. New techniques can be assessed byradiologists and doctors
by utilizing engineered pictures.The different data bases used for the above models are AANLIB, ADNI,
Allen Brain Atlas, Brain Web etc.
2.4 Deep Learning Model
Research on Deep Learning (DL) uses a Multilayer Neural Network with multiple hidden layers and
independent parameters to conduct research. In contrast, in the repeatedly used MNN, each MRIs input has been
passed via a convolutional layer, filters, fully connected (FC) layers, pooling layers and ultimately Soft-max to
get the final judgment process. Although both the deep learning and regular machine learning belongs to AI
technologies, deep learning has some advantages over traditional machine learning methodologies[33]. As
shown in Figure 5, deep learning network structures come in a variety of shapes and names, including
convolutional neural networks, deep residual networks, deep feed forward networks, deep belief networks as
well as de-convolutional networks. In the realm of image processing, The Convolutional Neural Network
(CNN)became frequently used architecture in the area of image processing. The majority of its structure is made
up of an input layers, feature extraction levels, convolutional layers, pooling layers with classification layers.

Figure 5: Neural network common charts.


Deep learning techniques, particularly CNNs, have grown in favourof diagnosing brain imaging, As a result,
deep learning is preferred over traditional machine learning methodologies. From brain MRI data, CNN learns
recurring complicated properties, letting the focus to shift away from identifying and minimizing elements and
onto network architecture design. Patches extracted from brain MRIs have been fed to the Convolutional Neural
Network as inputwith representative complex features are recovered using local sub-amplification and bespoke
filtering filters.
3. Diagnosis of A Brain Tumour
Many experts in the field of medical tomography made tremendous progress in the identification of brain
tumours in recent years with both fully automatic and semi-automatic tactics. Diagnostic strategies' clinical
acceptance is determined by their ease of computation with degree of monitoring. As appeared in Figure 2,
brain tumour recognition could be divided into three stages: tumour detection, differentiation as well as
classification that have all been clarified in detail in this section. There are additional performance distinctions
for the given technology.
3.1 Detection Oftumour
The method of recognizing the absence or presence of tumor from MRI data base is called tumor detection.
Diagnosis of brain tumour for its abnormality leads to benign and malignant typesplays anessential role in
medical field. Different techniques like ANN, SVM, KNN, and FFBPNN are adopted to recognize the abnormal
and normal tumor by using MRI image.
Table 3compares different segmentation strategies and methodologies depending on their performance and
constraints. To improve segmentation performance, preliminary knowledge and artificial-intelligence are
required. Deep learning approaches deliver the highest performances.

344
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

3.2 Classification of Tumours


The way of allocating different input information elements into various groups is classification.Highlight
extraction with choice became vital in classification, especially cerebrum growth classification that need
numerous MRI checks collected from various database for preparation. The primary goal of the brain tumour
categorization is to establish whether a tumour is benign or malignant, as well as its grade, utilizing MRI
imaging. Brain tumours can also be classified using supervised techniques like SVM,KNN and ANN, as well as
unsupervised techniques like FCM and SOM. The most often used strategies are summarized in Figure 2. Brain
tumours can be classified in a variety of ways using magnetic resonance imaging (MRI).Table 4 examines the
feature types, classification procedure, and performance of several classification strategies and approaches. The
extraction of an optimal classification feature set, which is a difficult task procedure that involves the selection
of the best classifier, is required to obtain the best classification.
Table 3: Different MRI Approaches for Classification Of Brain Tumours.
Reviewextraction Methods of Used data Limitations
detection
GLCM LVQ, UKMMedical Due to the intricacy of the system, it takes
SOM,MLPand a long time to compute.
RBFclassifiers
ICA SOMneuralnet Randomlyselected A smaller dataset may yield better results.
work
DWT KNN,Parzenwi AANLIBandLONI The method can only be used on T2
ndowandANN pictures and has a high level of
classification difficulty.
Gabor-wavelets CCANN Diagnosticcenters The database is quite modest.
Intensity- texture PCNN, BPN - The system has a high level of complexity
due to the training and testing.
CNN ECOC-SVM RIDER There are several layers, which adds to the
system's complexity.
DWT DNN AANLIB The database is quite modest.
3.3 Tumor Classification Using Traditional Machine Learning
For brain tumour classification using MRI scans, a variety of machine learning approaches and methodologies
are available. In MRI scans, used a software approach to distinguish between metastatic and basic brain cancers.
The authors used a nonlinear LSFT in conjunction with a probabilistic neural-network-classifier(MPNN) that
has been modified. To improve the contour of the tumour zone, the distance and greatest probability
measurements are used.For feature extraction in brain MRI image categorization the GLCM and fast discrete
curve let transform (FDCT). A PNN-RBF is used to classify MRIs as benign, malignant. It has 3 layers: input,
hidden, and output. The properties have been extracted by DWT using Daubechies wavelets. The SVM employs
the selected characteristics during the classification and training stages. The first makes use of a single-layer
perceptron artificial neural network with supervised feature selection (FS) (SLPANN). The second approach
combines a novel linear dimensionality reduction algorithm with ANN.
3.4 Tumor Categorization With Deep Learning
A deep-learning method for brain-tumour classification is a very young field of study, with little contributions
to date. A CNN's performance is compared to that of a back propagation neural network in terms of sensitivity
and specificity. According to the findings, utilising the CNN enhanced the outcomes by 18-20%.
4. RESULTAND DISCUSSION
4.1 Results
In the domain of medical imaging, brain tumours are still a popular issue. This research gives a thorough
summary of the most up-to-date technology for diagnosing brain tumours. The tumor detection is the method
for detecting the absence or presence of brain tumours applying MRI-scans. Multiple pictures require further
examination using tumour segmentation and classification approaches as a result of the finding process. Tumor
classification involves using HG or LG or tissue analysis to determine whether a tumour is malignant or a
specific type of malignant tumour.The majority of the methods considered are for semi-automated and
automated tumour diagnosis.

345
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Methods for classifying MRI-pictures as normal or ab-normal can be found in brain MRI image detection
software. Tumors can then be classed as benign, malignant, or malignant tumours based on the abnormal
images. Area approaches, range based, clustering, statistical edge detection, ANNs, and deep learning methods
are the six basic groups of segmentation methods. Choosing the accurate technology for a specific application
may be difficult but several methods can be blended together to achieve the desired classification,detection and
or segmentation. As a result of using hybrid-methods eliminates the drawbacks of each method alone.GLCM
and DWT are commonly applied for feature-extraction. PCA and GA scores are commonly used to reduce
dimensionality. SVM, PNN, MRF, ANN, SOM, Fuse, RF and CNN are the most regularly used detection and
classification algorithms, with hybrid classification methods providing higher accuracy. The most common
methods for tumour division are SVM and CNN. The best results come from CNN-based algorithms, especially
on 2D data. Machine learning methods (e.g. ANN) and deep learning methods (e.g. CNN) are ultimately used to
detect, segment, and classify data. In the segmentation of brain tumours, deep learning algorithms outperform
traditional machine learning methods.
The four main standard databases were described, as well as the shortage of resources, which led to a variety of
methods based on pictures obtained from various medical facilities. The MICCAI Challenge-BRATS is a well-
known bench-mark for segmenting tumour databases. To solve this problem, several researchers used a
combination of bothstatisticalandphysical modeling to construct multi-modal 3-D brain MRIs that mimic of the
major effects of aberrant MRI images. Pathology and diffusion tensor-imaging (DTI) are used to create
anartificial foundation for MRI-images of tumour tissues and edema. Table 2 shows the best results with respect
to tumour detection versus efficacy. The best tumour detection versus efficacy scores was acquired and
employed standard machine learning techniques to achieve excellent tumour segmentation results. As
demonstrated in Table 3 and 4, the best classification results for brain tumours, with 100% classification
accuracy. In comparison to the preceding methods, this one suffers from a lack of uniform datasets, particularly
for tumour recognition and classificationand a single application structure.
The deep-learning models have recently shown to be effective in the interpretation of medical images,
particularly in the identification of brain-cancers. Deep learning net-works have outperformed traditional
machine learning methods in terms of accuracy. Furthermore, deep learning networks outperform classical
machine learning with sophisticated algorithms when dealing with massive amounts of data. Traditional
machine learning methods necessitate sophisticated feature extraction and reduction techniques, which deep
learning methods do not.
4.2 DISCUSSION
The primary goal of this analysis was to identify the most significant advances in brain tumour diagnosis to date
in terms of tumour detection, differentiation, and categorization. Recognizing and improving the stated benefits
and drawbacks could pave the way for future advancements in tumour diagnostics. Metrics like sensitivity,
specificity, accuracy, and score will represent how well each approach is performing. Unbalanced research
efforts in tumour diagnosis methods were discovered in this study. The majority of research is focused on
tumour segmentation and categorization. However, some researches have looked into using MRI imaging to
detect tumours.
Deep learning algorithm is a type of machine-learning process that has more sophisticated-potentialities than
typical approaches to machine learning. Deep learning is a novel and crucial research-tool that was identified to
increase the performance of classic machine learning approaches. An in-depth examination of MRI images and
their features is possible thanks to several layers of representation and abstraction. The current study discovered
a scarcity of in-depth tumour detection research, few tumour classification implementations, and more in-depth
tumour segmentation training applications. This issue is also depicted in Figure 1.This review shows how the
correctness of certain scientists in characterising the dataset, tumour type, and functional parameters of the
algorithm, as well as measurements of accuracy, specificity and sensitivity,may be extrapolated in the tables
provided. Many data-bases are listed in the Table 1, which contain multiple sorts of photos (normal and
abnormal), while others only contain images. There are no databases that contain the fundamental realities of
segmentation, typical photos, and all types of tumour images, as shown in Tables 2, 3, and 4, forcing by many
researchers to collect photographs from different hospitals and medical facilities.The need of large database
from all sorts of brain imaging, including images havingbothHG and LG glioblastomas as well as different
categories of tumours that can be verified as a standard criterion of tumour diagnosis. Overall, the massive
MRI-database mentioned earlier, as well as the technology and instruments used in the various states of brain-
tumour diagnosis using MRIs, are required to support correct diagnosis. For building competition for the best
tools and technologies that can be utilised in a number of ways, a large database is required.
346
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

5. CONCLUSION
The three steps of brain tumour detection, segmentation, and classification can be used to construct
computational systems for diagnosing cancers from MRI images. When compared to manual procedures, these
technologies give enhanced accuracy, volume reduction, and speed. As a result, these techniques have been
thoroughly investigated in comparison to classic machine-learning applications and deep-learning
methodologies. Various diagnostic applications for MRI-imaging of the brain were investigated in this work
study. In addition, based on restrictions and performance criteria, a comparison study was done between
traditional machine-learning and deep-learning. Across the three processes, the analysis discovered an im-
balance in the utilization of databases and benchmarks. Tumors are separated and classified using standard
databases.Traditional machine-learning approaches are being employed to detect cancers; however,
incorporating deep-learning technologies into these processes is expected to produce favorable results, as seen
below.
 In segmentation, many standard machine learning algorithms have achieved 100 percentmaximum accuracy
whereas deep-learning methods have achieved a maximum score of 96.8%.
 Deep learning algorithms should not be evaluated with glasses at this time. To classify tumours, researchers
used both traditional machine learning and deep learning methods, however both studies achieved 100%
accuracy.
 However, in order to minimize computing time, the pros and disadvantages of each approach, as well as the
complexity and size of the network, must be considered. Machine learning deployments are generally
preferred over deep learning deployments.
 While there is a desire to broaden the use of advanced tumour detection and classification studies, standard
tumour detection and classification databases are required.
 Furthermore, all three brain tumour diagnostic methods must be linked into a completely automated system
for clinical benefit.
REFERENCE
[1] Van Tellingen, O, Yetkin-Arik B, De Gooijer M C, Wesseling P, Wurdinger T, De Vries H E.
Overcoming the blood–brain tumor barrier for effective glioblastoma treatment. Drug Resistance Updates
2015; 19: 1-12.
[2] Davis, Elizabeth M. Glioblastoma: overview of disease and treatment. Clinical journal of oncology
nursing 2016; 20 (5): S2.
[3] Logeswari T, Karnan M. An improved implementation of brain tumor detectionusing segmentation based
on hierarchical self organizing map. Int. J. Comput.Theory Eng. 2010; 2(4):591–598.
[4] Abd-Ellah MK, Awad AI, Khalaf AAM, Hamed HFA. Classification of brain tumor MRIs using a kernel
support vector machine. Building Sustainable Health Ecosystems: 6th International Conference on Well-
Being in the Information Society, WIS 2016, CCIS vol. 636. 2016. p. 151–160. https:// doi.org/ 10.1007/
978-3-319-44672-1_13.
[5] Sasank, V. V. S., &Venkateswarlu, S. (2022). An automatic tumour growth prediction based
segmentation using full resolution convolutional network for brain tumour. Biomedical Signal Processing
and Control, 71, 103090. doi:10.1016/j.bspc.2021.103090
[6] Chandra, Saroj Kumar; Bajpai, Manish Kumar (2020). Fractional Crank-Nicolson finite difference
method for benign brain tumor detection and segmentation. Biomedical Signal Processing and Control,
60(), 102002–. doi:10.1016/j.bspc.2020.102002
[7] Nema, Shubhangi; Dudhane, Akshay; Murala, Subrahmanyam; Naidu, Srivatsava (2020). RescueNet: An
unpaired GAN for brain tumor segmentation. Biomedical Signal Processing and Control, 55(), 101641–
. doi:10.1016/j.bspc.2019.101641
[8] Liu J, Li M, Wang J, Wu F, Liu T. A survey of MRI-based brain tumor segmentation methods. Tsinghua
Sci. Technol. 2014;19(6):578–95. https://doi.org/10.1109/TST.2014.6961028.
[9] Bauer S, Wiest R, Nolte LP, Reyes M. A survey of MRI-based medical image analysis for brain tumor
studies. Phys. Med. Biol. 2013;58(13):R97. https://doi.org/10.1088/0031-9155/58/13/R97.

347
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[10] Mohan G, Subashini MM. MRI based medical image analysis: survey on brain tumor grade classification.
Biomed. Signal Process. Control 2018;39(Supplement C):139–61. https:// doi.org/ 10.1016/
j.bspc.2017.07.007.
[11] Litjens G, Kooi T, Bejnordi BE, Setio AAA, Ciompi F, Ghafoorian M. A survey on deep learning in
medical image analysis. Med. Image Anal. 2017;42:60–88. https://doi.org/10.1016/j.media.2017.07.005.
[12] Saini M, Tripathi P, Nath M. A survey on brain tumor identification through medical images. Int. J. Adv.
Res. Comput. Sci. 2017;8(7):406–8. https://doi.org/10.26483/ijarcs.v8i7.4296.
[13] Logeswari T. Automatic brain tumor detection through MRI — a survey. Digit.Image Process. 2016;8(9).
[14] RebouçasFilho PP, Rebouças E d S, Marinho LB, Sarmento RM, Tavares JMR, de Albuquerque VHC.
Analysis of human tissue densities: a new approach to extract features from medical image. Pattern
Recogn. Lett. 2017;94:211–8. https://doi.org/10.1016/j.patrec.2017.02.005.
[15] Yuan J, Wang J. Compressive sensing based on L1 and Hessian regularizations for MRI denoising.
Magn. Reson. Imaging 2018;51:79–86. https://doi.org/10.1016/j.mri.2018.04.015.
[16] Hu J, Zhou J, Wu X. Non-local MRI denoising using random sampling. Magn. Reson. Imaging
2016;34(7):990–9. https://doi.org/10.1016/j.mri.2016.04.008.
[17] Huang J, Chen C, Axel L. Fast multi-contrast MRI reconstruction. Magn. Reson. Imaging
2014;32(10):1344–52. https://doi.org/10.1016/j.mri.2014.08.025.
[18] Qu X, Guo D, Ning B, Hou Y, Lin Y, Cai S. Undersampled MRI reconstruction with patch-based
directional wavelets. Magn. Reson. Imaging 2012;30 (7):964–77. https:// doi.org/ 10.1016/
j.mri.2012.02.019.
[19] Kayvanrad MH, McLeod AJ, Baxter JS, McKenzie CA, Peters TM. Stationary wavelet transform for
under-sampled MRI reconstruction. Magn. Reson. Imaging 2014; 32(10):1353–64. https:// doi.org/
10.1016/ j.mri.2014.08.004.
[20] Xing XX, Zhou YL, Adelstein JS, Zuo X-N. PDE-based spatial smoothing: a practical demonstration of
impacts on MRI brain extraction, tissue segmentation and registration. Magn. Reson. Imaging 2011;
29(5):731–8. https://doi.org/10.1016/j.mri.2011.02.007.
[21] Soto-Romero G, Escriba C, Acco P, Fourniols JY. Artificial intelligence for health: towards more
intelligence or more artificial medicine? Curr. Trends Biomed. Eng. Biosci. 2018;16(5):1–2.
https://doi.org/10.19080/CTBEB.2018.16.555947.
[22] Khayati R, Vafadust M, Towhidkhah F, Nabavi SM. A novel method for auto-matic determination of
different stages of multiples clerosis lesions in brain MRFLAIR images. Comput. Med. Imaging Graph.
2008; 32(2):124–33. https://doi.org/10.1016/j.compmedimag.2007.10.003.
[23] SachdevaJ, Kumar V, Gupta I, Khandelwal N, Ahuja CK. Segmentation, feature extraction, and multi
class brain tumor classification. J. Digit. Imaging 2013; 26(6):1141–50. https://doi.org/10.1007/s10278-
013-9600-0.
[24] Wu W, Chen AYC, Zhao L, Corso JJ. Brain tumor detection and segmentation in a CRF (conditional
random fields) framework with pixel-pair wise affinity and super pixel-level features. Int. J. Comput.
Assist. Radiol. Surg. Mar 2014;9(2):241–53.https://doi.org/10.1007/s11548-013-0922-7.
[25] Li Y, Jia F, Qin J. Brain tumor segmentation from multi modal magnetic resonance images via sparse
representation. Artif. Intell. Med. 2016; 73(Supplement C):1–13. https:// doi.org/10.1016/ j.artmed.
2016.08.004.
[26] Megersa Y, Alemu G. Brain tumor detection and segmentation using hybrid in-telligent algorithms.
AFRICON 2015 Sept 2015. p.1–8. https://doi.org/10.1109/AFRCON.2015.7331938.
[27] Rajendran A, Dhanasekaran R. Enhanced possibilistic fuzzy means algorithm for normal and pathological
brain tissue segmentation on magnetic resonance brain image. Arab. J.Sci.Eng.2013; 38(9):2375–88.
https://doi.org/10.1007/s13369-013-0559-4.
[28] Pinheiro PR, Tamanini I, Pinheiro MCD, de Albuquerque VHC. Evaluation of the Alzheimer's disease
clinical stages under the optics of hybrid approaches in verbal decision analysis. Telematics Inform.
2018; 35(4):776–89. https://doi.org/10.1016/j.tele.2017.04.008.

348
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[29] Prastawa M, Bullitt E, Gerig G. Simulation of brain tumors in MR images for evaluation of segmentation
efficacy. Med. Image Anal. 2009;13(2):297-311.https://doi.org/10.1016/j.media.2008.11.002.
[30] N. Abiwinanda, M. Hanif, S.T. Hesaputra, A. Handayani, T.R. Mengko, Brain tumor classification using
convolutional neural network, in: World Congress on Medical Physics and Biomedical Engineering 2018,
Springer, 2019, pp.183–189, http://dx.doi.org/10.1007/978-981-10-9035-6 33.
[31] B. Tahir, S. Iqbal, M.U.G. Khan, T. Saba, Z. Mehmood, A. Anjum, T. Mahmood, Feature enhancement
framework for brain tumor segmentation and classification, Microsc. Res. Tech. 82 (6) (2019) 803–811,
http://dx.doi.org/10. 1002/jemt.23224.
[32] M.R. Ismael, I. Abdel-Qader, Brain tumor classification via statistical features and back-propagation
neural network, in: 2018 IEEE International Conference on Electro/Information Technology (EIT), IEEE,
2018, pp. 0252–0257, http://dx.doi.org/10.1109/eit.2018.8500308.
[33] S. Hussain, S.M. Anwar, M. Majid, Segmentation of glioma tumors in brain using deep convolutional
neural network, Neurocomputing 282 (2018) 248–261. A. Hekmatnia, M. Sabouri,

AUTHOR DETAILS:
1
DEBENDRA KUMAR SAHOO*, 2SATYASIS MISHRA AND 3MIHIR NARAYAN MOHANTY
1,2
Department of Electronics & Communication Engineering, Centurion University of Technology and
Management, Odisha, India
3
Department of Electronics & Communication Engineering, SOA University, Odisha, India

349
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

SPATIAL AND TEMPORAL ANALYSIS OF DIASPORA IN SOUTH ASIA

ABHISHEK SINGH AND DR. SUNIL KUMAR JHA

ABSTRACT
Today, due to the increasing population in the world, the expansion of migration is happening very fast because
human beings of one country migrates to another country to answer their generally faced problems of
education, employment, business etc. From a commercial point of view, today many countries of the world keep
importing and exporting their resources. Thus migration is increasing rapidly in those countries where the
density of population is high. People from developing countries migrate more to developed countries. Major
Countries in South Asia are India, Pakistan, Afghanistan, Nepal, Bangladesh, Myanmar, Thailand, Vietnam, Sri
Lanka etc. So, the migration within these countries has also been studied to solve the purpose of the given
paper. Under China and India, migration is more due to the greater effect of population, even it has been found
that different cultures are affected by migration and even gets intermixed within the prolonged migrators.
Index Terms: South Asian Diaspora, Sensibility, First gen. and second gen. diaspora.

I.OBJECTIVE OF THE STUDY


In the present paper, the cause and role of migration has been analyzed in the context of South Asia. South Asia
is a landmass where two-thirds of the world's population resides, that is, more than four billion (including
neighbor country China) of the world's population.For this reason, the problem of migration has arisen in many
countries.Under this, along with the introduction of migration, the features of diasporic sensibility have been
analyzed and what is the reason for sensibility has also been shown. A brief explanation of the causes,
sensibility and problems of the first generation and second generation migrant people in South Asia,
highlighting the present scenario related to diaspora in various countries of South Asia as well as the pragmatic
problems related to the migrants.
II. INTRODUCTION
The initial and ancient dispersion that came into existence was of the merchant who started departing the
subcontinent of South Asia to various other landsand are still pursuing the same until today in quest of finding
better place, business and opportunity.
East Asia, Central Asia and East Africa were already collaborated and had commercial link with the cities or
states situated at the coastline of India before colonialism existed. It can be asserted as the trade route for
diaspora which was interim or non-permanent or orbital movement of a diaspora constituting a key factor in
diaspora regarding trade. During the same instance of time, Indians moved to abroad in order to serve them as
teachers and clerks and came in the light of migrated one’s following their government’s rules and norms. After
the Second World War various dispersions or migrations can be sighted which upholds the third migrants
existence which were the Muslims that moved or migrated from India to East and West region of Pakistan,
whereas the people belonging to Hindu community migrated or departed from Pakistan in order to settle in
India, but both had questions in mind that whether the new government will be able to maintain their democratic
and majority rights.
In the interim, an exodus can be seen who were eminently educated professionals and started leaving India so as
to abode abroad in Europe, Canada and the USA with respect to their professions of lawyers, teachers and
doctors in order to get better place, opportunity or due the fact of brain drain.While since 1970’s in the Middle
East another set of few migrators as construction or site workers and servants has been analyzed. Amongst them
some belongs to the category of “short term or non-permanent migrants”, while others undeliberately or
deliberately didn’t return.The fourth pattern of migrants can also be observed in between the phase of post war
related to the twice or thrice times migrated people. These were basically the people of Indian community who
settled in Surinam, known to be as indentured laborers and gradually aboded in Netherlands and amongst them
some were expatriated or deported from East Africa who found their place of living in Canada and UK. It was
due the fact of both political as well as economic reason, basically comprising of traders, laborers as well as
professionals.
India is a place of diverse people as well as community and hence gives rise to diverse migrants. It has been
conceded that migrated Indians overseas want to generate orpropagate theirown religions, family patterns and

350
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

cultures as much as possible and where language and social division are not a matter of concerns and are kept
aside in fresh ambiences.Locality and region seem to bring up a key feature in identities formation regarding the
migrated people leaving behind the basis of nationality and religion, they specify themselves as Telugus,
Biharis, Bengalis, Gujaratis etc. or either specifying as Brahmins, Pandits, Jains etc. So, it all emphasizes that
Indians overseas do not lay emphasis on nation India but to their native land or i.e. to the region where they
belong to.
Claude Markovits appropriately emphasizes that the people who are migrated from Gujarat, belonging either to
Muslim community or Hindu community or any other had more common experiences in comparison with the
Gujarati Muslims with Bihari Muslims when subjected to migration. Although, in the case of indentured
laborers who are the twice migrants, the descendants or successors, this kind of pattern has not been observed.
They are hardly acquainted with the religion to which they originated, whether it was Bengal, Bihar, MP, for
many of them India an obscure term. So, there arises a question, Indian diaspora and its comparative structure
can lead us to what parameters and to what extent? But South Asian diaspora will be taken up as a term of
reference in the course of this study.
Approx. 20 million people of Bangladesh, India and Pakistan have found their livelihood outside their native
lands with the maximum number of people have dispersed to the Caribbean Sea Oceania and Africa showing
monotony in sensibility and identity of Indians. However, being displaced to such places and in a new
environment, wants to produce such circumstances in which they might be able to preserve and propagate their
Indian custom, moral values, culture, native tongue, worship etc. profoundly. It has been speculated by some
researchers and authors during examination found that some of the people living outside their homelands were
not at all intending to reunite to their native lands with a sense of feeling that the Indian government was
refraining them to connect to their respective patriarchal roots such as, happened to many Muslims migrated
after independence from India. The researchers and authors while exploring the trajectories of various dispersed
people perceived that amongst there were few who do not want to get reconnected to their homelands. Hence, it
becomes mandatory to discuss about the diasporic sensibility features before making advances in the study.
III. FEATURES OF DIASPORIC SENSIBILITY
While embarking upon the world of diaspora, we should be able to elucidate the vital as well as the peculiar
feature of diaspora that can adhere to comprise a precise sensibility accordingly. It sometimes becomes quite
intricated which makes it elusive to severals, thus, the importance to understanding of the features of diasporic
sensibility.
Diasporic sensibility becomes poignant when it comes to the terms of reminiscence. For some it becomes
exultation and for few its revulsion. Therefore, it shows the contrasting ideologies apparently.It is different for
various incumbents dispersed such as lawyers, doctors, teachers and different for authors or novelists. While for
indentured laborers it is much more complex. The highly educated professionals left India to find jobs so as to
gain much more wealth as they were not stipend in their respective homelands, which in turn led them to surge
for more wages and seemingly dispersion. Authors or novelists moved for profound knowledge so as to clear
vague opinions.
On the other hand, the third kind of migrants or the indentured laborers who resided in the Netherlands and also
the ones who got evicted or total expulsion out of East Africa, ended settling in the U.K. and Canada. The
reason for all these migrations was both political as well as economic. Despite all this, there was still the sense
of returning to their homelands alongside with the common consent. This innate desire was unrequited and
shows the diasporic sensibility amongst the major of the Diasporas.
There is a natural difference between the diaspora condition and the reactions of the migrants to that situation of
such reactions. The difference resolves around the response of the FIRST GEN. and their SECOND
GEN.Diasporas.
IV. FIRST GENERATION AND SECOND GENERATION DIASPORAS:
The world first means thesects that have actually immigrated to a host country. On the other hand, the second
generation diaspora usually means the children who are born in a host country to immigrant parents.
Alba and Waters contends that the generation of second era generally categories the children who groom in
immigrant homelands, either being part of it at a young age or took birth in the respective society.
So, from the above cited description we can speculate that the children born outside the encompassing
federation or at quite a young age immigrate i.e. twelve years or earlier receiving education abroad.
351
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Those children, who are born outside, hardly have sense of their homelands and don’t even know that they are
emigrants because they have never made their way to homelands but knew what it means to be an inhabited
migrant.(Hirji p.3-11)
4.1 First Generation Diaspora in America:
The first generation Indian Americans are always acutely aware of the apparent cultural differences between
India and America. There are approx. 1.8 million people who were resident of India have migrated to the U.S.,
illustrating U.S. to be the third largest group of immigrants followed by the Chinese born and Mexican born
immigrants. This is basically the young generation of the first era and comprisingthe age group of 38. Amongst,
Eighty four percent were the maximum number of migrantsfrom India that belonged to the working class i.e. the
age group of 18 to 64 which was even way higher than the United States accumulated population nationally
(63%) or even the population of the first generation as shown in the series of RAD. People with 65 years and
older were nine percent and under 18 years of age lie in 7 percent.
4.2 Second Generation Diaspora in America:
While evaluating the generation of second era than around 80 lakhs individuals of the United States has one
parent as an Indian amongst which under 18 years old were about 69 percent having eleven years of age as a
median. Holistically, maximum diasporas tend to marry within the community only, fourteen percent only had
married the outsiders. Thus, around Eighty four percent have Indian fathers and mothers. Diaspora depends
upon the present global conditions too to decide their actions.
V. THE PRESENT GLOBAL SCENARIO RELATED TO DIASPORAS:
There are several reasons which perturb the diaspora in the present day globalized world but prevailing sense of
insecurity amongst the diasporas is a big reason to worry. Various things can be accounted for insecurity, which
include:
5.1 Human Terror and Anti-Social Elements:
One of the most vital concerns is of the security before leaving their homelands. Highly intellect professionals
bifurcates Nations on the basis of wealth as well as security. Nations are prioritized which are highly bothered
of such issues. Emigrants want to reside in such ambience where they should be quite far away from the
periphery of the anti-social elements such as, terrorists, graffiti, groupism, drug active people etc. The mobility
is less likely in Libya, Somalia, Syria, Afghanistan, Iraq etc. Henceforth, human terror and anti-social elements
are an obsession when it comes to the ground of dispersion.
5.2 Prejudice:
Prejudice is traditionally theemotion that depicts the negativity towards a group or a particular person arising a
thought which are different for different groups comprising emotional components too. As for an instance, it is
sometimes marked by a sense of aversion or revulsion for some specific section of society, ill temper by others
and else by apprehension. Hence, aspects related to nations towards migration plays a vital role too.
5.3 Less Job Opportunities:
Generally people are less inclined to such Nations which are not sufficed with adequate job opportunities, so the
migrants’ lures towards that which affords to provide proper facilitation.
5.4 Natural Calamity:
The milieu also determines the abode factor for the immigrants. If they find the ambience in accord with their
lifestyle then the migrants find it difficult to sustain to such environment and hence succumbs.
The above cited points are some reasons that tend an individual to explore his/her needs accordingly in order to
fulfill what they desire hopefully as a prominent positive prospect, migration is not limited to South Asian
people only but to the civilization of entire world laying emphasis that needs are what that everyone is after up
to and that even can be voluntarily and in some cases forcefully too.
From the above analysis it is concluded that due to the high density of population in South Asia, human beings
migrate more to meet their needs.Migration from a populated country like India is increasing at mass level.
VI. REVIEW OF LITERATURE
Literature of the diasporas comprises works on and by various writers and critics taking into consideration
different theoretical and conceptual frameworks which can be applied to such writings. The people displaced
out of their fantasies of new lands, imagination of a better future, along with the nostalgia of the homeland come
across a feeling of alienation when they are living as expatriates. The same notions have been explored by some
critics in the novels of Khaled Hosseini. We witness that the term diaspora is sorely described as the People
352
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

living outside their original homeland. Amongst these some are writers or authors composing various books and
novels and so, rising with a notable literature. Hosseini is amongst such remarkable literature seekers.
Devyani Agarwal in Writing of Khaled Hosseini: depicts that Hosseini, being an author in a non homely
environment has kept his remembrance alive of his native land which is seen in his writings and that’s what we
seek in a diaspora.The main concerns of Hosseini is the exodus of Afghan people in order to protect them and
families against the torments, lynching, brutality, hanging, rape etc.
Divakaruni's works are to a great extent set in India and the United States. It frequently centers around the
encounters of South Asian diasporas. She composes for kids as well as grown-ups and has distributed books in
various types, including practical fiction, verifiable fiction, enchanted authenticity, legend and dream.Alexendra
Andrews in his thesis (Re)Defining Afghan Women Characters as Modern Archetypes using Khaled Hosseini’s
A Thousand Splendid Suns and Asne Seierstad’s The Bookseller of Kabul.describesthat howThat how thirty
three years of turbulence has been depicted by Khaled hosseini during the phase of insurgence in Afghanistan
through A Thousand Splendid Sun. The story revolves around two prime women characters Laila and Mariam
and how the culture of Afghanistan and war affected their lives has been shown by Hosseini. The words and
sentences have been used in such a way that it gives a live experience or to be a part of the story while reading.
The entire struggle to survive and interconnected lives of the two women leaves the reader to the sentimental
grounds.
Thus, the reviews range between the ideas taking various South Asian diaspora in general and only in a limited
sense taking up works of Khaled Hosseini for investigation.
REFERENCES
[1] Faiza Hirji. Dreaming in Canadian: South Asian Youth Bollywood and Belonging University of British
ColumbiaPress 2010.
[2] Appadurai, Arjun. Modernity at Large: Cultural Dimensions of Globalisation. Minneapolis: U of
Minnesota, 1996. Print
[3] Mishra, Vijay. The diasporic imaginary: theorizing the Indian diaspora. Textual Practice 10(3): 421-47.
1996. Print
[4] Mishra, Vijay. “Bordering Naipaul: Indenture History and Diasporic Poetics.”Diaspora: A Journal of
Transnational Studies 5.2: 189-37. 1996. Print

AUTHOR DETAILS:
1
ABHISHEK SINGH AND 2DR. SUNIL KUMAR JHA (Assistant Professor)
1
Research Scholar, Department of English, Banasthali Vidyapeeth, Tonk, India

353
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

STRUCTURAL AND OPTICAL ANALYSIS OF GLYCINE SUBSTITUTED SULPHAMIC ACID

FREDSELIN R.S VITHEL AND R. MANIMEKALAI*

ABSTRACT
The pure sulphamic acid (SA) and glycine added sulphamic acid (GSA) single crystals were grown successfully
by slow evaporation technique at room temperature. The structural studies revealed that both SA and GSA
crystals possessed orthorhombic crystal structure. The presence of various vibrational modes was confirmed.
The existence of carbon in the system was also confirmed. The surface morphology of crystals was studied. The
optical transparency and band gap of the grown crystals were calculated. The hardness value of GSA crystal is
relatively higher than that of the pure SA crystals. The thermal stability of the grown crystals were analyzed by
thermo gravimetric and differential thermal analysis (TGA/DTA) and revealed that the grown crystals were
thermally stable up to 261oC, 278oC for pure SA and GSA single crystals. The photoluminescence emission
studies of grown crystals indicated the blue and green emission at 491 nm and 542nm, which is due to a
transition from the 5D4 excited state to 7F6 and 7F5 ground states respectively. The antibacterial activity studies
showed that the grown crystals were more effective in killing pathogenic bacteria’s which affect the human
beings. The third order nonlinear of the grown crystal was made with z-scan technique.
Keywords: Sulphamic acid, XRD, FTIR, EDAX, SEM.

1. INTRODUCTION
The innumerable numbers of bulk single crystals play a major role in modern technological devices because of
their excellent physical and chemical properties. Therefore a vast majority of research activities have been
concentrated on growth and characterization of pure and additive single crystals for identifying new
applications in the modern world. To enhance the physical properties of crystals usually dopants have been
added [1-4]. Because of the high speed information processing, high optical data disk storage, frequency
conversion, colour display, ultra compact lasers, and optical communication, the inorganic crystals are used in
the field of photonics [5-10].Among all inorganic crystals, sulphamic acid
Has drawn great attention owing to its high stability, better transmittance and excellent optical and nonlinear
properties [11-14].
As everyone knows sulphamic acid (H2NSO3H, SA) and its derivatives got special attention in NLO property
because of its two planar rings which originate from the strong donor-acceptor intermolecular interaction and
delocalized π-electron configuration [15-16].Among all inorganic acids, sulphamic acid is relatively stable and
crystallizes in non-centro symmetric structure which gives rise to excellent NLO property. The sulphamic acid
is a white crystalline solid, which is odorless, non-volatile, non- hygroscopic, inexpensive and non-corrosive.
Also it acts as an efficient green catalyst in organic synthesis [8, 17-19]. Interestingly, sulphamic acid is a
sulphur-containing amino acid with mild acidity and also exists as H3N+SO3-zwitter ionic units, which is
immiscible with commonly employed non-polar organic solvents [19-22].Recent studies revealed that
sulphamic acid can be used as a best substitute for conventional Bronsted and Lewis acid catalysts [18].
Due to high thermal stability, enhanced catalytic behavior and excellent optical properties numerous research
activities have been done based on sulphamic acid with different dopants and additives. The previous studies
revealed that various dopants like lanthanum[23],copper, manganese, nickel [24],dysprosium[10], terbium[8],
thiourea[25], neodymium[26],Cesium[14], ferrous sulphate[27], urea[28], Gudolinium[29], Ammonium
chloride[15],cerium[14], Lithium chloride[9],NaCl&KCl[11], Mg2+& Fe2+[30], NaCl[13], Yttrium[31], ZnSo4&
MnSo4[32], Nitric acid[7] have been added to sulphamic acid and their structural properties have been
investigated.In the present work sulphamic acid and glycine added sulphamic acid crystals were grown by slow
evaporation method and its structural,mechanical and optical properties were investigated.
2. EXPERIMENTAL METHODS
The pure sulphamic acid and glycine added sulphamic acid crystals were grownby slow evaporation method
from the AR grade sulphamic acid and glycine powders. Glycine added sulphamic acid was grown by adding
AR grade sulphamic acid and glycine in the molar ratio 3:1 in deionized water. The mixture was stirred well
using magnetic stirrer for four hours at room temperature to get the clear saturated solution. The well saturated
solution was then filtered using a filter paper to remove any immiscible and unstirred chemicals and to get clear

354
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

solution. The filtered solution was then transferred to crystal growth vessels, covered by aluminum foil sheet
with some punched holes and kept in a dust free atmosphere. At room temperature the solution was allowed for
crystallization. Good transparent and colorless crystals were harvested after 20 days. Fig 1 shows the
photograph of the grown sulphamic acid (named as SA) and glycine added sulphamic acid (named as GSA)
crystals.

Fig 1. Photographs of the grown (a) SA crystal (b) GSA crystal


3. RESULTS AND DISCUSSIONS
Single Crystal X-Ray Diffraction
Single crystal X-ray Diffraction is carried out using BRUKER AXS KAPPA APEX 11 CCD Diffractometer.
The single crystal XRD study reveals that the grown crystal belong to orthorhombic crystal system and the
obtained lattice parameters for SA and GSA are a=8.10 Ao, b=8.17 Ao , c=9.29 Ao and a=8.135 Ao, b=8.167 Ao ,
c=9.297 Ao. From the XRD analysis, it is confirmed that the grown crystal crystallizes to orthorhombic crystal
structure with pbca space group. The unit cell volume for SA and GSA are 614 A3 and 616 A3. The density is
found to be 2.129mg/m3 and the Z number is 8. The calculated lattice parameters and volume of the cell for
grown crystal is slightly deviated from the pure sulphamic acid single crystal, which confirms the glycine is
incorporated in to sulphamic acid.
Powder X-Ray Diffraction
The indexed powder x-ray diffraction (PXRD) pattern of sulphamic acid and glycine added sulphamic acid are
shown in Fig 2, and it is fitted with orthorhombic crystal system.All the diffraction peaks were well matched
with the standard ICDD pattern (JCPDS Card No.: 70-0060).No unindexed peaks have been identified. The
strong intensity peak (221) was obtained for pure sulphamic acid (Fig 2a). Therefore most of the grains will be
oriented in the [221] direction. The intense peaks (021), (210) and (211) belonging to orthorhombic structure
was also identified. Hence the synthesized crystals were phase pure and possessed orthorhombic structure
[5].Upon addition of glycine with sulphamic acid the crystal structure was not changed. Only intensity
modification was observed. In GSA sample the most intense peak was (211). Moreover (221) peak also has
almost same intensity. Comparing to pure SA crystal, in glycine added crystal the intensity of intense peaks was
increased. Also the intensity of (211) peak was enhanced. Further the intensity of (021) and (210) were reduced
drastically. Therefore the preferred grain orientation was along [211] plane. However, no impurity peaks were
noticed. All the peaks were well fitted to the orthorhombic crystal structure [24]. Hence the same crystal system
was maintained on glycine addition. Using unit cell software package the unit cell parameters were calculated
and tabulated. From the Table 1, it was found that cell parameters were in good fit to standard lattice parameters
of sulphamic acid. Addition of glycine to sulphamic acid elongated the c-axis of the orthorhombic cell, whereas
meager variation was seen in b-axis. But due to elongation of c-axis, the volume of the lattice has been
increased.

Fig 2. Powder X-ray diffraction patterns of (a) SA and (b) GSA crystals

355
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table 1. Structure And Lattice Parameters of Pure SA and GSA Single Crystals.
Crystal Structure a(A°) b(A°) c(A°) Volume

(A3)
SA Orthorhombic 8.1266 8.0928 9.2298 607.0166
GSA Orthorhombic 8.1262 8.0944 9.2408 607.8366
Fourier Transform Infrared Analysis
The recorded FTIR spectra of pure SA and GSA crystals are presented in Fig 3. The FTIR spectrum of SA
showed the characteristic bonding of all the functional groups. The functional groups were assigned and
summarized in Table 2. The IR band appeared at 1002 cm-1 was related to the rocking mode vibration of NH3+
ion thus confirmed the zwitterionic nature of sulphamic acid crystal. The bands observed at frequencies around
2873cm-1 and 3153 cm-1 respectively was due to NH3+ vibrations correlated to symmetric as well as
degenerative stretching modes. Moreover, the bands noticed at 1447 cm-1, 1806 cm-1 and 1541 cm-1 successively
were affirmed to symmetric and degenerated modes of vibration related to NH3+ deformation. The vibration
bands observed at 1267 cm-1 and 1068 cm-1 are relatively due to degenerated and symmetric SO3- stretching
modes [24]. The band occurred at 548 cm-1 was also assigned to degenerated SO3-deformation. The N-S,N-H
and S-H stretching vibrations were seen at frequencies 690cm-1, 2023cm-1 and 2458 cm-1 respectively [33]. All
the observed IR bands are in good agreement the recorded FTIR spectrum of SA it was found that all the
characteristic IR bands of functional groups as well as zwitterions were observed. Hence the synthesized SA
crystal was phase pure and exhibited orthorhombic structure[12, 34].However in glycine added sulphamic acid
the band intensities were decreased drastically. Only weak peaks were seen and some peaks related to NH3+
vibrations have been disappeared.

Fig 3. FTIR spectra of (a) pure SA crystal (b) GSA crystal


Table 2.Vibrational Assignment of the Pure and Glycine Added SA Single Crystal
Wave number(cm-1) Assignment
Pure SA GSA
548 530 Degen. SO3-deformation
690 691 N-S stretching
1002 1002 Rocking mode NH3+
1068 - Symmetric SO3-Stretching
1267 - Degen.SO3- stretching
1447 - Sym. NH3+ deformation
1541 - Degen. NH3+ deformation
1806 1807 Symmetric NH3+ deformation
2023 2018 N-H Stretching
2458 2449 S-H Stretching
2873 - Symmetric NH3+Stretching
3153 3138 Degen.NH3+ Stretching
Raman Analysis
The Raman spectra of SA and GSA crystals are shown in Fig 4. The high intensity vibration band occurred in
the frequency region near 1059cm-1 was due to symmetric SO3-stretching vibration. The vibrations appeared at

356
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

1281 cm-1 and 1345 cm-1 were related to degenerated SO3-stretching modes. The band seen at 1017 cm-1 was
assigned to degenerated NH3+ rocking vibration .The N-S stretching vibration was observed at 682 cm-1[35].The
vibration bands observed at 543 cm-1 was assigned to degenerated SO3- deformation and vibration band
observed at 363 cm-1 was due to the presence of SO3- rocking vibrations. The vibration bands noticed at 256 cm-
1
was assigned to N-S torsion [36-39]. All the Raman modes attributed to the orthorhombic structure of SA
crystal was displayed in the Raman spectra. Hence the structure of SA crystal was confirmed. In glycine added
sulphamic acid major changes in vibration bands were not observed. Only slight shift in peak positions were
noticed and the intensity of the peaks were increased. The main observation from the Raman spectra was the
intensity of the high intense vibration band associated to symmetric SO3-stretching was improved and was
moved to higher wave number. All the other peaks were almost remained in the same peak positions. Therefore
it was confirmed that the
Addition of glycine to sulphamic acid never disturbed the structure of sulphamic acid, however subtle changes
have been happened in the geometry of the structure. Hence it was confirmed that the orthorhombic crystal
system was still retained in the synthesized glycine added crystals.

Fig 4. Raman spectra of (a) SA crystal (b) GSA crystal


Morphology and Compositional Analysis
SEM micrographs of SA and GSA crystals are shown in Fig 5. From the micrographs it was found that the
grains were non uniform in size and shape. Non-uniformity in shape and size may be due to uneven distribution
of temperature during the growth process [8]. On close examination of the micrographs it was noticed that that
crystals were agglomerated as clusters and voids.
The EDAX spectra of SA and GSA crystals are shown in Fig 5. The spectra showed the presence of constituent
elements sulphur (S), nitrogen (N) as well as oxygen (O) respectively. In glycine added sulphamic acid the peak
linked to carbon was noticed along with other elements. This confirmed the incorporation of carbon into the
lattice. The elemental compositions were represented in Table 3a & 3b.
Table 3 a. Elemental Composition of Pure SA
Element Atomic weight (%) Molecular weight (%)
Sulphur 12.37 22.51
Oxygen 69.71 63.26
Nitrogen 17.91 14.23
Table 3 b. Elemental composition of GSA
Element Atomic weight (%) Molecular weight (%)
Sulphur 10.53 19.75
Oxygen 64.77 60.65
Nitrogen 19.16 15.70
Carbon 5.54 3.90

357
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig 5. SEM and EDAX analysis of (a) SA and (b) GSA crystals
UV-VIS Studies
UV-VIS analysis of the grown crystals recorded in the wavelength range from 200nm to 800nm is shown in Fig
6.The transmission graph shows that both SA and GSA crystal has wide range of transparency window
approximately above 360nm. The transmission of SA and GSA were found to be 86% and 91% respectively.
Enlargement of transmission was observed for glycine addition in sulphamic acid. The more transmittance has
been noticed in the entire visible region and verified that the crystals are having good quality[40].The
absorption spectrum of SA crystals shown in Fig 7. The figure showed the lower cut-off wavelength of SA is
at 226 nm whereas for GSA crystal it was 230nm.To calculate the energy band gap values, the Tauc’s plot
was drawn and was shown in Fig 8. From the plot it was evaluated that the optical band gap for SA and GSA
crystals were 3.7eV and 3.2eV respectively.

Fig 6. UV Transmission spectra of pure SA and GSA crystal.

358
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig 7. UV Absorption spectra of pure SA and GSA crystal.

Fig 8.Tauc’s plot for pure SA and GSA crystal.


Vickers’s Hardness Test:
Hardness of a material is usually calculated as a measure of the resistance it offers to local deformation. To
determine the mechanical behavior of the materials, hardness measurement was done. In order to measure the
hardness, different loads of magnitudes varying from 25gm to 100gm was applied for a fixed interval of time
over a well-polished grown crystal and the Vickers microhardness number (Hv)was calculated using the
formula Hv=1.8544P/d2kgmm-2 where P is the applied load(kg) and d is the average diagonal length of
indentation(mm). A graph between Hardness number (Hv) and applied load (P) is shown in Fig 9. From the graph
it was found that the hardness of the crystal was increased with increase in load. Up to 100 g no cracks have been
noticed. Also the hardness of SA was increased upon glycine addition which demonstrated that the addition of glycine
improve the hardness of SA[8]. Similar behavior has been reported for metal ion doped SA crystals[24].According to
Onitsch and Hannemann, a crystal can be defined as hard or soft based on the hardening coefficient. The plot
between log p versus log d gives the hardening coefficient. If the coefficient lies between 1and 1.6 then they are
listed under hard materials and for soft materials it is above 1.6 [8, 41]. Fig 10 shows the graph of log p versus
log d. The slope of both SA and GSA were above 1.6 and so they were considered as soft crystals.

359
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig. 9 Plot of Load (P) VsHardness number(Hv) for SA and GSA

Fig 10. Log p Vs Log d for (a)SA and (b) GSA crystal.
Tg-Dta Analysis
The thermal behavior of the synthesized crystals was studied using TG and DTA analysis. The thermo
gravimetric analysis was done in the temperature range 27oCto 800oC at a heating rate of 10oC/min in the N2
atmosphere. The observed TG-DTA curves of SA and GSA samples are shown in Fig 11. From the graph it was
clear that no weight loss occurred up to 261oC for SA crystal. An abrupt loss in weight has been occurred from
261 to 448oC as a sharp steep peak was observed at 448oC for SA crystal which confirmed the decomposing
nature of the crystal at that temperature as reported by Brahmaji et al [8].In
DTA curve, endothermic peaks were seen at 212oC and 261oC which correspond to the evaporation of water and
solvent molecules completely. Further increase of temperature led to weight loss of the material and related to
decomposition temperature of the crystal due to the occurrence of sharp endothermic peak at 448 oC for SA
crystal similar to TGA curve [14]. Similar changes have been observed in GSA crystals, but the temperatures
have been shifted to the higher end. This predicts that glycine added sulphamic acid attains more stability than
pure sulphamic acid. Hence the synthesized crystals possess good thermal stability approximately up to
275oCand suitable for applications under this temperature range.

360
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig.11.TG-DTA curves of (a) SA and (b) GSA crystal


Photoluminescence Studies:
Fig 12. Shows the emission spectra of SA and GSA crystals. The emission spectra exhibited emission in the
ultraviolet and visible regions. In the visible region violet, blue and green emissions were observed. Among the
observed emissions, the strongest emission was occurred at 490nm related to blue emission. The peaks observed
below 400 nm observed in the ultra violet region were due to electronic transition π- π+as reported by
Arumugam et al [13]. The peaks observed below 500 nm were related to blue emission [42]. Due to transition
between the energy levels 5D4 to 7F6 , these emissions were occurred. The peak noticed at 530 was correlated to
green emission due to transition from 5D4 to 7F5 energy levels [8]. The property of having strong emission in
this range may prime to potential application of this material in optoelectronic devices [43].

Fig.12. Photoluminescence spectra of pure SA and GSA crystal.


Antibacterial Activity
The antibacterial activity of SA and GSA was investigated against gram positive bacteria(Bacillus,
staphylococcus aureus) and gram negative bacteria(Escherichia coli, klbsiela, serattia) using Disk Diffusion
Method – Kirby – Bauer method. Reagents for the Disk Diffusion Test is Mueller-Hinton Agar medium. Of the
many media available, Mueller-Hinton agar is considered to be the best for routine susceptibility testing of non-
fastidious bacteria for the following reasons:
* It shows acceptable batch-to-batch reproducibility for susceptibility testing.
* It is low in sulphonamide, trime thoprim, and tetracycline inhibitors.
* It gives satisfactory growth of most non fastidious pathogens.
361
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

* A large body of data and experience has been collected concerning susceptibility tests performed with this
medium.
Although Mueller-Hinton agar is reliable generally for susceptibility testing, results obtained with some batches
may, on occasion, vary significantly. If a batch of medium does not support adequate growth of a test organism,
zones obtained in a disk diffusion test will usually be larger than expected and may exceed the acceptable
quality control limits. Only Mueller-Hinton medium formulations that have been tested according to, and that
meet the acceptance limits described in, NCCLS Protocols for Evaluating Dehydrated Mueller-Hinton Agar
should be used.
While absorbing the zone of inhibition E.coli have 22mm of half life’s for known standard antibiotic, whereas
for my study it was increased. Similarly in klebsiella, bacillus, staphyloc occusaures and serattia, the absorbed
zone of inhibition was increased when comparing with standard antibiotic zone of inhibition. Table .4 shows the
antibacterial activity of SA and GSA. From this we concluded that the grown crystals are more effective than
standard antibiotic.
Table 4. Antibacterial Effect of Pure SA and G SA Crystal.
SA GSA Standard antibiotic
AMIKACIN
Bacteria name Zone of inhibition[mm] Zone of inhibition[mm] Zone of inhibition[
mm ]
E.COLI 28 32 22
KLEBSIELLA 30 31 19
BACILLUS 29 33 20
STAPHYLOCOCCUS
AUREUS 26 31 22
SERATTIA 33 33 19
Z-Scan Measurements:
Z-scan is a very eminent technology to examine the third order nonlinear refractive index (n 2) and nonlinear
absorption coefficient (β). The graph obtained for the open aperture and closed aperture method of pure SA and
GSA is illustrated in Fig. 13(a) and 13(b). In this study, to calculate the nonlinear absorption coeffcient (β), an
open aperture Z-scan method was carried out. From the assembled data, we examined the maximum absorption
at focus which obtained in a shape of the valley that shows the reverse saturable absorption (RSA) along with
positive absorption coeffcient (β) shows two-photon absorption (TPA), occurs in the grown crystal of SA and
GSA. This is a very essential characteristic for getting any optical limiting applications. The calculated values
of third order nonlinear refractive index (n2) is 4.72 x 10-9 cm2/w and 2.44 x 10-9 cm2/w, nonlinear absorption
coefficient (β)= 2.79 x 10-4 cm/w and 2.60 x 10-4 cm/w, the positive value of nonlinear refraction reveals the
self-focusing nature. Real and imaginary value of third order susceptibility of SA and GSA are 5.48 x 10 -6
cm2/w, 1.09 x 10-6 cm/w and 2.34 x 10-6 cm2/w ,1.47 x 10-6 cm/w respectively. The third order susceptibility
(ꭕ ) of SA and GSA are 5.58 x 10-6esu and 2.76 x 10-6esu.
(3)

Z-scan open aperture of SA and GSA crystal


362
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Z-scan closed aperture of SA and GSA crystal


IV. CONCLUSION
SA and GSA single crystals were grown successfully by slow evaporation method at room temperature. Single
crystal and Powder X-ray diffraction studies confirm the crystalline nature and orthorhombic structure of the
crystals. FTIR analysis revealed the stretching and deformation vibrational modes of NH3+ and SO3-. EDAX
analysis confirmed the presence of all constituent elments. Vicker’s microhardness studies proved that the
grown crystals belong to soft material and the hardness of the material increased with load. Thermal stability
was confirmed by thermal analysis and found that the synthesized SA and GSA crystals are thermally stable up
to 261oC and 278oC. The photoluminescence studies showed the SA and GSA crystals emit UV and visible
radiations. The most prominent emission was in the blue region due to transition from 5D4 to 7F6 energy levels.
Since these crystals may find application in optoelectronic devices. The antibacterial activity showed that upon
addition of glycin in pure SA the antibacterial activity was enhanced, which will be helpful for killing
pathogenic bacterias. The third order nonlinear refractive index, absorption coefficient and optical susceptibility
was calculated by the Z-scan technique and it reveals that the SA and GSA cystal possess self foussing and two-
photon absotption process.
V. REFERENCES
[1] SangwalK 1996Prog.Cryst.GrowthCharact.Mater323
[2] Veintemillas-Verdaguer S 1996 Prog.Cryst. Growth Charact. Mater 32 75
[3] Kubota N, Katagiri K, Yokota,Sato A, Yashiro H, and Itai K1999J.Cryst.Growth 196156
[4] MurugakoothanP Mohan Kumar R, Ushasree P M, Jayavel R, Dhanasekaran R andRamasamy P1999 J.
Cryst. Growth 207 325
[5] Shakir M, Riscob B,Ganesh V, Vijayan N, Gupta R, Plaza J, Dieguez E andBhagavannarayana G
2013J.Cryst.Growth 380228
[6] GuohuiLi,LipingXue,GenboSu,ZhengdongLi,Xinxin Zhuang andYouping He
2005 Cryst. Res.Technol.40867
[7] Samson Yesuvadiana, AnbarasuSelvaraj, Martina Mejeba Xavier Methodius,
BhagavannarayanaGodavarti, VijayanNarayanasamy and PremAnandDevarajan, 2015 Optik 126 95
[8] Brahmaji B,Rajyalakshmi S,Visweswara Rao T K,Srinivasa Rao Valluru,EsubBasha S
K,SatyakamalCh,Veeraiah V and Ramachandra Rao K2018Journal of science:Advanced Materials and
devices 368
[9] Indumathi N, Chinnasamy E, Arulmani S, Venkatesan A, Raja Saravanan M E, Deepa K, Inmozhi C,
Senthil S,Kaviyarasu K andUthrakumar R2020 Materials Today: Proceedings1

363
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[10] Budhendra Sing,Mohd.Shkir,Alfaiyb S,AjayKaushal,NarendarNasani,Igor Bdikin,Shoukry H,Yahia I S


andAlgarni H2016Journal of Molecular structure 1119365
[11] Thaila T andKumararaman S, 2011 SpectrochimicaActa Part A 82 20
[12] Jaishree D, Kanchana G andKesavasamy R2014Adv.Condens.Matter phys.2014 1
[13] Arumugam J,Suresh N,Selvapandiyan M,Sudhakar S andPrasath M2019 Heliyon 5 1
[14] BrahmajiB,Rajyalakshmi S,SatyakamalCh,Veeraiah V,Ramachandra RaoK,Veerendraatla and
Venkateswara Rao K,2017Optical Materials 64100
[15] Rafi AhamedS and Srinivasan 2012Elixir Crystal Growth 5010628
[16] Anupriya K G andHemalatha P,2017IJCMS 3842
[17] Bo Wang Synlett8 (2005) 1342.
[18] Wang Bo, Ming Y L and Shuan S J2003TetrahedronLett. 445037
[19] Marcelo G, Montes D’Oca, Rafael MarinhoSoares, Renata Rodrigues de Moura and Vinicius de
FreitasGranjao, 2012 Fuel 97 884.
[20] Harbison GS,Kye Y S,Penner GH,Grandin M,MonetteM2002J. Phys.Chem B106 10285
[21] Canagaratna M, Philips J A, Goodfriend H and Leopold K R1996J.Am.Chem.Soc. 1185290
[22] Wong M W, Wiberg K B and Frisch M J,1992J.Am.Chem.Soc.114523
[23] Kannan B,Seshadri P R,Murugakoothan P and Illangovan K 2013Indian journal of science and
technology 6 4358
[24] Ramesh Babu R, RameshR, Gopalkrishnan R, Ramamurthi K, and
Bhagavanarayana G2010 Spectrochim. Acta part A Mol. Biomol. Spectrosc. 76470
[25] Kannan B,Seshadri P R,Illangovan K and Murugakoothan 2013 Indian journal of science and technology
64908
[26] Kannan B,Seshadri P R,Illangovan K,Murugakoothan and IllangovanK 2014Indian Journal of science
and Technology 7221
[27] Anupriya K G and Hemalatha P,2017International of Innovative Research in science,Engineering and
Technology 68254

[28] Rajyalakshmi S,Brahmaji B,Samatha K,Ramachandra Rao K andRao M C2015 Journal of


Optoelectronics and Biomedical Materials 7 93
[29] Kannan B,Seshadri P R, Murugakoothan and Illangovan K2014 Int. J. ChemTech Res 6 1168
[30] Rajyalakshmi S, Brahmaji B, Samuel T, Samatha K, Ramakrishna Y and Ramachandra Rao K, 2015 Int.
J. ChemTech Res. 8 599
[31] Kannan B, Seshadri P R, MurugakoothanP andIllangovan K2014 Arch. Phy. Res. 5 79
[32] Anupriya K G and Hemalatha P 2018Mat. Sci. Res. India, 15 151
[33] Valluvan R, Selvaraju K andKumararaman S2006Mater.Chem.Phys.9781
[34] Haupa K, Bil A andMielke Z2015J.phys.Chem.A 11910724
[35] Muthusubramanian P and Raj A S 1982J.Mol.Struct8425
[36] Lenin M, Balamurugan N andRamasamy P2007Cryst.Res.Technol.42 39
[37] Philip D, Eapen A andAruldhas G 1995J.Solid State Chem.116217
[38] Vuagnat A M and Wagner E 1957J.Chem.Phys.2677
[39] Qian Li, Shourui Li, KaiWang, Xiaodong Li, JingLiu, BingbingLiu, GuangtianZou and Bo Zou
2013J. Chem.Phys.138214505.

364
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[40] Rajesh P andRamasamy P2009 Materials Letters 63 2260


[41] Esthaku Peter M andRamasamy P 2016 Adv. Mater. Lett. 783
[42] Sonia,Vijayan N,MedhaBhushan,KanikaThukral,Rishabh Raj,Manurya K.K,HaranathD and Martin
BrittoDhas S A2017 J. Appl.Cryst. 50 763
[43] Mansour N,Momeni A,Karimzadeh R andAmini M2012 Optical materials express 2 740

AUTHOR DETAILS:
FREDSELIN R. S VITHEL1 AND R. MANIMEKALAI2*
1
Research Scholar and 2PG and Research, Department of Physics, A.V.V.M Sripushpam College, Poondi,
Thanjavur, Affliated to Bharathidasan University, Tamil Nadu, India

365
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

TRANSLATIONSOF BIPOLARVALUED MULTI FUZZY SUBNEARRING OF A NEARRING

S. MUTHU KUMAR AN AND B. ANANDH

ABSTRACT
In this paper, some translations of bipolar valued multi fuzzy subnearring of a nearing are introduced and using
these translations, some theorems are stated and proved.
Subject Classification. 97H40, 03B52, 03E72.
Keywords: Bipolar valued fuzzy subset, bipolar valued multi fuzzy subset, bipolar valued multi fuzzy
subnearring, translations, intersection.

INTRODUCTION
In 1965, Zadeh [9] introduced the notion of a fuzzy subset of a set, fuzzy sets are a kind of useful mathematical
structure to represent a collection of objects whose boundary is vague. Since then it has become a vigorous area
of research in different domains, there have been a number of generalizations of this fundamental concept such
as intuitionistic fuzzy sets, interval-valued fuzzy sets, vague sets, soft sets etc. W.R.Zhang [10, 11] introduced
an extension of fuzzy sets named bipolar valued fuzzy sets in 1994 and bipolar valued fuzzy set was developed
by Lee [2, 3]. Bipolar valued fuzzy sets are an extension of fuzzy sets whose membership degree range is
enlarged from the interval [0, 1] to [1, 1]. In a bipolar valued fuzzy set, the membership degree 0 means that
elements are irrelevant to the corresponding property, the membership degree (0, 1] indicates that elements
somewhat satisfy the property and the membership degree [1, 0 ) indicates that elements somewhat satisfy the
implicit counter property. Bipolar valued fuzzy sets and intuitionistic fuzzy sets look similar each other.
However, they are different each other [3]. Vasantha kandasamy.W.B[7] introduced the basic idea about the
fuzzy group and fuzzy bigroup. M.S.Anithat et.al [1] introduced the bipolar valued fuzzy subgroup. Sheena. K.
P and K.Uma Devi [6] have introduced the bipolar valued fuzzy subbigroup of a bigroup. Shanthi.V.K and
G.Shyamala[5] have introduced the bipolar valued multi fuzzy subgroups of a group. Yasodara.S, KE.
Sathappan [8] defined the bipolar valued multi fuzzy subsemirings of a semiring. Bipolar valued multi fuzzy
subnearring of a nearing has been introduced by S.Muthukumaran and B.Anandh [4]. In this paper, the concept
of translationsof bipolar valued multi fuzzy subnearring of a nearing is introduced and established some results.
1. PRELIMINARIES
Definition 1.1. ([11])A bipolar valued fuzzy set (BVFS) B in X is defined as an object of the form B = { < x,
B+(u), B(u) >/ xX}, where B+: X [0, 1] and B: X [1, 0]. The positive membership degree B+(u) denotes
the satisfaction degree of an element x to the property corresponding to a bipolar valued fuzzy set B and the
negative membership degree B(u) denotes the satisfaction degree of an element x to some implicit counter-
property corresponding to a bipolar valued fuzzy set B.
Definition 1.2. ([8]A bipolar valued multi fuzzy set (BVMFS) A in X is defined as an object of the form B = { 
x, B1+(u), B2+(u), …, Bn+(u), B1(u), B2(u), …, Bn(u)  / xX }, where Bi+: X [0, 1] and Bi: X [1, 0], for
all i. The positive membership degrees Bi+(u) denote the satisfaction degree of an element x to the property
corresponding to a bipolar valued multi fuzzy set B and the negative membership degrees B i(u) denote the
satisfaction degree of an element x to some implicit counter-property corresponding to a bipolar valued multi
fuzzy set B.
Definition 1.3. ([4])Let (N, +, ) be a nearring. A BVMFS B of N is said to be a bipolar valued multi fuzzy
subnearring of N (BVMFSNR) if the following conditions are satisfied, for all i,
(i) Bi+(uv)  min{ Bi+(u), Bi+(v) }
(ii) Bi+(uv)  min{ Bi+(u), Bi+(v) }
(iii) Bi(uv)  max{ Bi(u), Bi(v) }
(iv) Bi(uv)  max{ Bi(u), Bi(v) },  u, vN.
Definition 1.4. ( [8] ) Let A =  A1+, A2+, …, An+, A1, A2, …, An and B =  B1+, B2+, …, Bn+, B1, B2, …,
Bn be two bipolar valued multi fuzzy subsets with degree n of a set X. We define the following relations and
operations:
366
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

(i) A  B if and only if for all i, Ai+(u) ≤ Bi+(u) and Ai(u) ≥ Bi(u),  uX.
(ii) AB = {  u, min(A1+(u), B1+(u)), min(A2+(u), B2+(u)), …, min(An+(u), Bn+(u)), max (A1(u),
B1(u) ), max (A2(u), B2(u) ), …, max (An(u), Bn(u) )  / uX }.
Definition 1.5. Let C =  C1+, C2+, …, Cn+, C1, C2, …, Cn be a bipolar valued multi fuzzy subnearring of a
nearring R and sR. Then the pseudo bipolar valued multi fuzzy coset (sC)p =  (sC1+)p1+, (sC2+)p2+, …,
(sCn+)pn+, (sC1)p1, (sC2)p2, …, (sCn)pn is defined by (sCi+)pi+(a) = pi+(s) Ci+(a) and (sCi)pi(a) =  pi(s)
Ci(a), for all i and every aR and pP, where P is a collection of bipolar valued multi fuzzy subsets of R.
Definition 1.6. [8] Let A =  A1+, A2+, …, An+, A1, A2, …, An be a bipolar valued multi fuzzy subset of X.
Then the height H(A) =  H(A1+), H(A2+), …, H(An+), H(A1), H(A2), …, H(An)  is defined for all i as H(Ai+)
= sup Ai+(x) for all xX and H(Ai) = inf Ai(x) for all xX.
Definition 1.7. [6]Let A =  A1+, A2+, …, Ai+, A1, A2, …, Ai be a bipolar valued multi fuzzy subset of X.
Then 0A = 0A1+, 0A2+, …, 0An+, 0A1, 0A2, …, 0Anis defined for all i as 0Ai+(x) = Ai+(x)H(Ai+) for all xX and
0 
Ai (x) = Ai(x)H(Ai) for all xX.
Definition 1.8. [6] Let A =  A1+, A2+, …, An+, A1, A2, …, An be a bipolar valued multi fuzzy subset of X.
Then A = A1+, A2+, …, An+, A1, A2, …, Anis defined for all i as Ai+(x) = Ai+(x) / H(Ai+) for all xX
and Ai(x) = Ai(x) / H(Ai) for all xX.
Definition 1.9. [6] Let A =  A1+, A2+, …, An+, A1, A2, …, An be a bipolar valued multi fuzzy subset of X.
Then A = A1+, A2+, …, An+, A1, A2, …, Anis defined for all i as Ai+(x) = Ai+(x) + 1 H(Ai+) for all
xX and Ai(x) = Ai(x) 1H(Ai) for all xX.
Definition 1.10. [6] Let A =  A1+, A2+, …, An+, A1, A2, …, An be a bipolar valued multi fuzzy subset of X.
Then A is called bipolar valued normal multi fuzzy subset of X if H(Ai+) = 1 and H(Ai) = 1 for all I.
2.PROPERTIES.
Theorem 2.1.([4]) If B =  B1+, B2+, …, Bn+, B1, B2, …, Bnand C =  C1+, C2+, …, Cn+, C1, C2, …, Cn are
two bipolar valued multi fuzzy subnearrings with degree n of a nearring R, then their intersection BC is a
bipolar valued multi fuzzy subnearring of R.
Theorem 2.2.Let K =  K1+, K2+, …, Kn+, K1, K2, …, Kn be a bipolar valued multi fuzzy subnearring with
degree n of a nearringR. Then the pseudo bipolar valued multi fuzzy coset (a1K)m is a bipolar valued multi fuzzy
subnearring of the nearringR, for every a1 in R and m in M, where M is a collection of bipolar valued multi
fuzzy subset of R.

Proof. Let b1, c1 in R and a1R. For each i,then a1 K i  


mi 
(b1  c1 )  mi (a1 ) K i (b1  c1 ) ≥ mi+(a1) min{Ki+(b1),
Ki+(c1)} = min{mi+(a1)Ki+(b1), mi+(a1)Ki+(c1)}= 
min{ a1 K i mi

(b1 ) , a1 K i 
mi
(c1 ) }. Therefore

a K 
1 i
 mi
(b1  c1 ) ≥ 
min{ a1 K i

mi
(b1 ) , a K 
1 i
 mi
(c1 ) }, for b1, c1R.And for each i,then

a K 

 mi
1 i (b1c1 )  mi (a1 ) K i (b1c1 ) ≥ mi+(a1) min{Ki+(b1), Ki+(c1)} = min{mi+(a1)Ki+(b1), mi+(a1)Ki+(c1)}= min{
a K         

 mi mi mi mi mi
1 i (b1 ) , a1 K i (c1 ) }. Therefore a1 K i (b1c1 ) ≥ min{ a1 K i (b1 ) , a1 K i (c1 ) }, for all b1,
a K 

 mi
c1R.For each i, 1 i (b1  c1 )  mi (a1 ) K i (b1  c1 )  mi(a1) max { Ki(b1), Ki(c1) } =
max{mi(a1)Ki(b1), mi(a1)Ki(c1)}= max{ a1 K i

  mi

(b1 ) , a1 K i mi
(c1 ) }. Therefore a1 K i   mi
(b1  c1 )  max{
a K     

 mi mi mi
1 i (b1 ) , a1 K i (c1 ) }, for b1, c1R.Also for each i, then a1 K i (b1c1 )  mi (a1 ) K i (b1c1 )  mi(a1)
max{Ki(b1), Ki(c1)} = max{mi(a1)Ki(b1), mi(a1)Ki(c1)}= max{ a1 K i

  mi

(b1 ) , a1 K i 
mi
(c1 ) }. Therefore
a K 
1 i
 mi
(b1c1 ) max{ a1 K i   mi

(b1 ) , a1 K i 
mi
(c1 ) }, for all b1, c1R.Hence (a1K)m is a bipolar valued multi
fuzzy subnearring of the nearring R.

367
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Theorem 2.3. If K =  K1+, K2+, …, Kn+, K1, K2, …, Kn is a bipolar valued multi fuzzy subnearring with
degree n of a nearring R, thenK = K1+, K2+, …, Kn+, K1, K2, …, Knis a bipolar valued multi fuzzy
subnearring of R.
Proof. Let a1, b1 in R. For each i, Ki+(a1 b1) = Ki+(a1 b1)+1–H(Ki+) min{Ki+(a1), Ki+(b1)}+1–H(Ki+)=
min{Ki+(a1)+1–H(Ki+), Ki+(b1)+1–H(Ki+)}= min{Ki+(a1), Ki+(b1)}implies Ki+(a1 b1)  min{Ki+(a1),
 +
Ki (b1) } for all a1, b1R. And for all i, Ki+( a1b1) = Ki+(a1b1)+1–H(Ki+) min{Ki+(a1), Ki+(b1) }+1–H(Ki+) =
min{Ki+(a1)+1–H(Ki+), Ki+(b1)+1–H(Ki+)}= min{Ki+(a1), Ki+(b1)}which implies Ki+(a1b1)  min{Ki+(a1),
 +
Ki (b1) } for all a1, b1R. Also for all i, Ki(a1 b1) = Ki(a1 b1)1–H(Ki) max{Ki(a1), Ki(b1) }1–H(Ki)
= max{Ki(a1)1–H(Ki), Ki(b1)1–H(Ki)}= max{Ki(a1), Ki(b1)}implies Ki(a1 b1)  max{Ki(a1),
 
Ki (b1) } for all a1, b1R. And for all i, Ki(a1b1) = Ki(a1b1)1–H(Ki) max{Ki(a1), Ki(b1)}1–H(Ki)=
max{Ki(a1)1–H(Ki), Ki(b1)1–H(Ki)}= max{Ki(a1), Ki(b1)}implies Ki(a1b1)  max{Ki(a1), Ki(b1)
} for all a1, b1R. Hence K is abipolar valued multi fuzzy subnearring of R.
Corollary 2.4. LetK =  K1+, K2+, …, Kn+, K1, K2, …, Kn is a bipolar valued multi fuzzy subnearring with
degree n of a nearring R.
(i) If eR, then for each i, Ki+(e) = 1 and Ki(e) = 1, where e is an identity element of R;
(ii)For each i, there exists eR such that Ki+(e) = 1 and Ki(e) = 1 if and only if Ki+(a1) = Ki+(a1) and Ki(a1)
= Ki(a1) for all a1R;
(iii)For each i, there exists a1R such that Ki+(a1) = Ki+(e) and Ki(a1) = Ki(e) if and only if Ki+(a1) = 1 and

Ki(a1) = 1, for somea1R;
(iv)For each i, if there exists a1R such that Ki+(a1) = 1 and Ki(a1) = 1, then Ki+(a1) = 1 and Ki(a1) = 1;
(v)For each i, if Ki+(e) = 1, Ki(e) = 1, Ki+(a1) = 0 and Ki(a1) = 0, then Ki+(a1) = 0, Ki(a1) = 0;
(Vi) (K)= K,
(vii)K is a bipolar valued normal multi fuzzy subnearring of R containing K;
(viii) K is a bipolar valued normal multi fuzzy subnearring of R if and only if K = K;
(ix)If there exists a bipolar valued multi fuzzy subnearring P of R satisfying P  K; then K is a bipolar valued
normal fuzzy subnearring of R;
(x)If there exists a bipolar valued multi fuzzy subnearring P of R satisfying P  K, then K = K.
Proof. (i), (ii), (iii), (iv), (v) and (x) are trivial.(vi) Let a1, b1R. For each i, then (Ki+)+(a1) = Ki+(a1)+1–

Ki+(e)= { Ki+(e)+1–Ki+(e) }+1–{Ki+(e)+1–Ki+(e)}= Ki+(a1)+1–Ki+(e) = Ki+(a1). Also for each i, (Ki)(a1) =
 
Ki (a1) –1–Ki(e)= {Ki(a1)–1–Ki(e)}–1–{Ki(e)–1–Ki(e)} = Ki(a1)–1–Ki(e) = Ki(a1).Hence  (K)=

K.(vii) Let eR. Clearly Ki+(e) = 1 and Ki(e) = 1. Thus K is a bipolar valued normal multi fuzzy
subnearring of R and K K.(viii) If K = K, then it is obvious that K is a bipolar valued normal multi fuzzy
subnearring of R. Assume that K is a bipolar valued normal multi fuzzy subnearring of R. Let a 1R.Then
 +
Ki (a1) = Ki+(a1)+1–Ki+(e) = Ki+(a1) and Ki(a1) = Ki(a1)1–Ki(e) = Ki(a1). Hence K = K.(ix) Suppose there
exists a bipolar valued multi fuzzy subnearring P of H such that P  K.Then 1 = Pi+(e) ≤ Ki+(e) and 1 =
 
Pi (e) ≥ Ki(e). Hence Ki+(e) =1 and Ki(e) = 1.
Theorem 2.5. If K =  K1+, K2+, …, Kn+, K1, K2, …, Kn is a bipolar valued multi fuzzy subnearring with
degree n of a nearring R, then0K = 0K1+, 0K2+, …, 0Kn+, 0K1, 0K2, …, 0Knis a bipolar valued multi fuzzy
subnearring of R.
Proof. Let a1, b1 in R. For each i,0Ki+(a1 b1) = Ki+(a1b1)H(Ki+) min{Ki+(a1), Ki+(b1)}H(Ki+) =
min{Ki+(a1)H(Ki+), Ki+(b1)H(Ki+)}= min{0Ki+(a1), 0Ki+(b1)}implies 0Ki+(a1b1)  min{0Ki+(a1), 0Ki+(b1)} for all
a1, b1R.And for all i, 0Ki+(a1b1) = Ki+(a1b1)H(Ki+)  min{Ki+(a1), Ki+(b1)} H(Ki+)= min{Ki+(a1)H(Ki+),
Ki+(b1)H(Ki+)}= min{0Ki+(a1), 0Ki+(b1)}. Thus 0Ki+(a1b1) min{0Ki+(a1), 0Ki+(b1)} for all a1, b1R.Also for all i,
0 
Ki (a1b1) = K(a1 b1)H(Ki) max{Ki(a1), Ki(b1)}H(Ki)= max{Ki(a1)H(Ki), Ki(b1)H(Ki)} =
max{0Ki(a1), 0Ki(b1)}implies 0Ki(a1 b1)  max{0Ki(a1), 0Ki(b1)} for all a1, b1R. And for all i, 0Ki(a1b1) =
Ki(a1b1)H(Ki)max{Ki(a1), Ki(b1)} H(Ki) = max{Ki(a1)H(Ki), Ki(b1)H(Ki)} =

368
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

max{0Ki(a1), 0Ki(b1)}.Therefore 0Ki(a1b1) max{0Ki(a1), 0Ki(b1)} for all a1, b1R. Hence 0Kis a bipolar
valued multi fuzzy subnearring of R.
Theorem 2.6. If K =  K1+, K2+, …, Kn+, K1, K2, …, Kn is a bipolar valued multi fuzzy subnearring with
degree n of a nearring R, thenK = K1+, K2+, …, Kn+, K1, K2, …, Knis a bipolar valued multi fuzzy
subnearring of R.
Proof. Let a1, b1 in R. For each i, then Ki+(a1 b1) = Ki+(a1 b1) / H(Ki+) min{Ki+(a1), Ki+(b1)} / H(Ki+) =
min{Ki+(a1) / H(Ki+), Ki+(b1) / H(Ki+)}= min{Ki+(a1), Ki+(b1)}implies Ki+(a1 b1)  min{Ki+(a1), Ki+(b1)} for
all a1, b1R. And for all i, Ki+(a1b1) = Ki+(a1b1) / H(Ki+)  min{Ki+(a1), Ki+(b1)} / H(Ki+)= min{Ki+(a1) / H(Ki+),
Ki+(b1) / H(Ki+)}= min{Ki+(a1), Ki+(b1)}. Therefore Ki+(a1b1) min{Ki+(a1), Ki+(b1)} for all a1, b1R.Also
for all i, Ki(a1 b1) = Ki(a1 b1) / H(Ki)  max{Ki(a1), Ki(b1)} / H(Ki)= max{Ki(a1) / H(Ki), Ki(a1) /
H(Ki)} = max{Ki(a1), Ki(b1)}implies Ki(a1 b1)  max{Ki(a1), Ki(b1)} for all a1, b1R. And for all i,
 
Ki (a1b1) = Ki(a1b1) / H(Ki)max{Ki(a1), Ki(b1)} / H(Ki) = max{Ki(a1) / H(Ki), Ki(b1) / H(Ki)}=
max{Ki(a1), Ki(b1)}. Therefore Ki(a1b1) max{Ki(a1), Ki(b1)}, for all a1, b1R. Hence K is a bipolar
valued multi fuzzy subnearring of R.
Corollary 2.7. Let K =  K1+, K2+, …, Kn+, K1, K2, …, Kn be a bipolar valued multi fuzzy subnearring with
degree n of a nearring R.
(i) If for each i, H(Ki+) < 1, then 0Ki+< Ki+;
(ii) If for each i, H(Ki) 1, then 0Ki Ki,
(iii) If for each i, H(Ki+) < 1 and H(Ki) 1, then 0K< K;
(iv) If for each i, H(Ki+) < 1, then Ki+ Ki+;
(v) If for each i, H(Ki) 1, then Ki Ki;
(vi) If for each i, H(Ki+) < 1 and H(Ki) 1, thenK K;
(vii) If for each i, H(Ki+) < 1 and H(Ki) 1, thenK is a bipolar valued normal multi fuzzy subnearring of R.
Proof. (i), (ii), (iii), (iv), (v), (vi) and (vii) are trivial.
Corollary 2.8. If K is a bipolar valued normal multi fuzzy subnearring of a nearringR, then (i) 0K = K, (ii) K =
K.
Proof. The proof follows from Definitions 1.8, 1.9 and 1.11.
Theorem 2.9.Let K =  K1+, K2+, …, Kn+, K1, K2, …, Kn be a bipolar valued multi fuzzy subnearring with
degree n of a nearring R. If (a1K)m and (b1K)m are two pseudo bipolar valued multi fuzzy coset of K, then their
intersection (a1K)m (b1K)m is also a bipolar valued multi fuzzy subnearring of the nearring R, for every a 1,
b1R and m in M, where M is a collection of bipolar valued multi fuzzy subset of R.
Proof. The proof follows from the theorem 2.1 and 2.2.
Theorem 2.10.Let K =  K1+, K2+, …, Kn+, K1, K2, …, Kn be a bipolar valued multi fuzzy subnearring with
degree n of a nearring R. If (a1K)m and (b1K)m are two pseudo bipolar valued multi fuzzy coset of K and m(a1)
m(b1) or m(a1)  m(b1), then their union (a1K)m(b1K)m is also a bipolar valued multi fuzzy subnearring of the
nearring R, for every a1, b1R and m in M, where M is a collection of bipolar valued multi fuzzy subset of R.
Proof. The proof follows from the theorem 2.2.
Theorem 2.11. Let K =  K1+, K2+, …, Kn+, K1, K2, …, Kn be a bipolar valued multi fuzzy subnearring with
degree n of a nearring R. Then K is a bipolar valued multi fuzzy subnearring of R if and only if each (K i+, Ki) is
a bipolar valued fuzzy subnearring of R.
Proof.Let a1, b1 in R. Suppose K is a bipolar valued multi fuzzy subnearring of R, for each i, K i+(a1b1) 
min{Ki+(a1), Ki+(b1)}, Ki+(a1b1)  min{Ki+(a1), Ki+(b1)},Ki(a1 b1) ≤ max{Ki(a1), Ki(b1)} and Ki(a1b1) ≤
max{Ki(a1), Ki(b1)}. Hence each (Ki+, Ki) is bipolar valued fuzzy subnearring of R.Conversely, assume that
each (Ki+, Ki) is bipolar valued fuzzy subnearring of R. As per the definition of bipolar valued multi fuzzy
subnearring of R, K is a bipolar valued multi fuzzy subnearring of R.

369
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

REFERENCES
1. Anitha.M.S., Muruganantha Prasad &Arjunan. K, “Notes on Bipolar valued fuzzy subgroups of a group”,
Bulletin of Society for Mathematical Services and Standards, Vol. 2 No. 3 (2013), 52 59.
2. Lee K.M., “Bipolar valued fuzzy sets and their operations”, Proc. Int. Conf. on Intelligent Technologies,
Bangkok, Thailand, (2000), 307  312.
3. Lee K.M.., “Comparison of interval-valued fuzzy sets, intuitionistic fuzzy sets and bipolarvalued fuzzy
sets”, J. fuzzy Logic Intelligent Systems, 14(2) (2004), 125 129.
4. Muthukumaran.S & B.Anandh, “Some theorems in bipolar valued multi fuzzy subnearring of a nearing”,
Infokara, Vol.8, Iss. 11 (2019).
5. Sheena. K. P and K.Uma Devi, “Bipolar valued fuzzy subbigroup of a bigroup” Wutan Huatan Jisuan
Jishu, Vol. XVII, Issue III (2021), 134 -138.
6. Shyamala.G and Santhi.V.K “Some translations of bipolar valued multi fuzzy subgroups of a group”,
Adalya journal, volume 9,Issue7(2020), 111 -115.
7. Vasantha kandasamy.W.B, Smarandache fuzzy algebra, American research press, Rehoboth -2003.
8. Yasodara.S, KE. Sathappan, “Bipolar valued multi fuzzy subsemirings of a semiring”, International Journal
of Mathematical Archive, 6(9) (2015), 75 80.
9. Zadeh.L.A , “Fuzzy sets”, Information and control , Vol.8, 338-353 (1965).
10. W.R.Zhang, Bipolar Fuzzy sets and Relations, a computational Frame work for cognitive modeling and
multiple decision Analysis, proceedings of Fuzzy IEEE conferences, (1994), 305 309.
11. W.R.Zhang, Bipolar Fuzzy sets, proceedings of Fuzzy IEEE conferences, (1998), 835 840.

AUTHOR DETAILS:
S. MUTHU KUMAR AN AND B. ANANDH
Department of Mathematics, H.H.The Rajah’s College, Pudukkottai, Tamilnadu, India

370
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

A COMPARATIVE ANALYSIS OF FOOD GRAIN PACKAGING BASED ON CONSUMER


PERCEPTION BY USING NOVEL, NEW NOVEL AND IMPROVED ACCURACY FUNCTIONS
UNDER INTERVAL-VALUED INTUITIONISTIC FUZZY SETTING

C. GLADIA VINCY AND M. MARY MEJRULLO MERLIN *

ABSTRACT
The aim of this paper is to select the customer desirable food grain packaging bycomparingnovel, new novel
and improved accuracy functions in interval-valued intuitionistic fuzzy setting. In the current scenario,
cherishing the intake of packed food grains are the instant sources to yields the luxuriance amount of energy for
every human being.Packaging is a key factor to maintain the shelf-life of food items. Nowadays, packaging
becomes an enormous challenge in the current civilization. Food grain packaging is a tremendous mechanism
that has to satisfy the customer needs and also does not harmful to the environment. But nowadays, due to the
shortage of awareness and time period it is difficult to choose the best option for the decision maker. To
handlemulticriteria decision making problems there is a need to utilize themulticriteria decision making method
based on weighted geometric aggregation operator to obtain the desirable alternative.
Keywords: Food grain packaging, Improved accuracy function, Novel accuracy function, Interval-valued
intuitionistic fuzzy set, Aggregation operators

INTRODUCTION
The food grain packaging, handling and processing achieving multi-trillion dollars in worldwide business.
Nowadays people are more securing and mindful about their health in the aspects of packed food. The food
grain packaging is more indispensible and it should take the health aspects, hygienic factors, balanced nutrition,
food quality and safety into consideration. In the food processing industry, packaging is considered as the
centerpiece of transforming the food grain [13, 14]. There is a need to take decision to reduce the grain losses at
the stage of packaging by choosing the best alternative.
In the field of medical sciences, engineering, environment and economics several problems have deal with
vagueness. In some places the classical mathematical approaches could not effectively solve the highly
problematic difficulties in real life situations [12]. In 1965, the notion of fuzzy set was initiated by Zadeh which
was a very fruitful mathematical ideal to deal with vagueness in various fields [8]. In 1983, 1986 the idea of
intuitionistic fuzzy set was established by Atanassov which is described by a membership degree and a non-
membership degree [2]. The theory of intuitionistic fuzzy set is an extension of zadeh’s fuzzy set theory. In
1986 and 1987, the ideaof interval-valued fuzzy set was introduced byTurksen and Gorzaleczany which is also
theextension of fuzzy set. In 1989, the interval-valued intuitionistic fuzzy set (IVIFSs) was described by
Atanassov and Gargov which are an additional extension of IFSs.The value of IVIFS is illustrated by
membership degree and non-membership degree which are in form of intervals instead of exact numbers [4].
Decision making is the technique to construct the decision outcome more acceptable by selecting the best
alternative among the set of alternatives [5]. In human actions, multicriteria decision making (MCDM) is
determined as usual task. Over the last few years, several researchers have broadly used multicriteria decision
making problems with interval-valued intuitionistic fuzzy set in distinct fields.In 2006, Xu and Yager advanced
some geometric aggregation operators which are called as the intuitionistic fuzzy weighted geometric (IFWG)
operator, the intuitionistic fuzzy ordered weighted geometric (IFOWG) operator, and the intuitionistic fuzzy
hybrid geometric (IFHG) operator for decision making process based on intuitionistic fuzzy set [9]. Later Xu
advanced the interval-valued intuitionistic fuzzy weighted averaging (IIFWA) operator and the interval-valued
intuitionistic fuzzy weighted geometric aggregation (IIFWGA) operator. The score function and the accuracy
function are highly useful to choose the desirable alternatives for multicriteria decision making problems under
interval-valued intuitionistic fuzzy environment.
This study aims to select the best alternative in food grain packaging based on consumer perception by using the
values of novel accuracy functions, new novel accuracy functions and improved accuracy functions based on
interval-valued intuitionistic fuzzy weighted geometric aggregation (IIFWGA) operator under interval-valued
intuitionistic fuzzy information.

371
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

2. PRELIMINARIES
Definition 2.1 (Interval-Valued Intuitionistic Fuzzy Set)
Let the set of all closed subintervals of the interval [0,1] be denoted as D[0,1] and E(   ). Then an interval-
valued intuitionistic fuzzy set (IVIFS) in E is defined as follows: [3, 4, 10]
A   x,  A ( x), A ( x) / x  X 

Where  A : E  D [0, 1] and A : E  D [0, 1]

With the constraint 0  sup(  A ( x))  sup( A ( x))  1

Definition 2.2 (Interval-Valued Intuitionistic Fuzzy Weighted Geometric Aggregation (IIFWGA)


Operator)
Let Aj ( j  1, 2,.....n)  IVIFS (E). The weighted geometric average operator is identified as

Follows: [1]
n
Gw ( A1 , A2 ,..... An ) = A
wj
j
j 1

 n n   n n wj

 
=  A L ( x),   A U ( x)  , 1   (1  A L ( x)) ,  (1  A U ( x))   ,
wj wj wj
(1)
  
j j j j
 j 1 j 1  j 1 j 1 
n
With the condition that w j  [0, 1] and w
j 1
j  1 , where w j is the weight of Aj ( j  1, 2,.....n)

In other words,suppose w j  1/ n j  (1, 2,....., n) , then Gw is called a geometric average operator for the
IVIFS.
Definition 2.3 (Novelaccuracy Function)
A novel accuracy function M of an interval-valued intuitionistic fuzzy value is identified as follows: [1, 7]
cd
M ( A)  a  b  1 
2 (2)
Where A  ([ a, b],[c, d ]) is an interval value intuitionistic fuzzy number and M(A)  [-1, 1]
Definition 2.4 (New Novel Accuracy Function)
A new novel accuracy function L of an intuitionistic fuzzy value A is identified as follows: [7,12]
a  b  d (1  b)  c(1  a)
L( A) 
2 (3)
Where A  ([ a, b],[c, d ]) is an interval value intuitionistic fuzzy number and L(A)  [-1, 1]
Definition2.5 (Improved Accuracy Function)
An improved accuracy function K of an intuitionistic fuzzy value A is identified as follows:[11]
a  b(1  a  c)  b  a (1  b  d )
K ( A) 
2 (4)
Where A  ([ a, b],[c, d ]) is an interval value intuitionistic fuzzy number and K (A)  [0, 1].
An Approach for Multicriteria Decision Making With Interval-Valued Intuitionistic Fuzzy Set
A comparative study on interval-valued intuitionistic fuzzy set by using novel, new novel and improved
accuracy functions are presented. The procedural steps are given as follows:

372
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

METHODOLOGY I
The following steps are calculated to obtain the desirable based on consumer perception by using novel
accuracy function
Step 1
The weightedgeometric average values are computed by utilizing equation (1)
Step 2
The novel accuracy M ( i ) of interval-valued intuitionistic fuzzy value  i ( i  1, 2,....., m ) is computed by
utilizing equation (2)
Step 3
Sorting the alternatives Ai (i  1, 2,.....m) and chose the desirable one(s) based on M ( i ) (i  1, 2,....., m)

METHODOLOGY II
The following steps are calculated to obtain the desirable based on consumer perception by using new novel
accuracy function
Step 1
Step 1 is same as method I
Step 2
The new novel accuracy L( i ) of interval-valued intuitionistic fuzzy value  i ( i  1, 2,....., m ) is computed by
utilizing equation (3)
Step 3
Step 3 is same as method I
METHODOLOGY III
The following steps are calculated to obtain the desirable alternative based on consumer perception by using
improved accuracy function
Step 1
Step 1 is same as method I
Step 2
The improved accuracy K ( i ) of interval-valued intuitionistic fuzzy value  i ( i  1, 2,....., m ) is computed by
utilizing equation (4)
Step 3
Step 3 is same as method I
PROBLEM DESCRIPTION
Suppose a person needs to buy a food grain with safety packaging material, the person should know the existing
packaging material available in the storage process which is also satisfies his/her requirement. Here, the
available food grain packagings like Jute bag, Cotton bag and High density polyethylene (HDPE) are
considered as alternatives which arebased on certain criteria likeMaintain the quality of food grain, Ease of
access, Eco-friendly, Harmless to human. The decision matrix of interval-valued intuitionistic fuzzy and the
criteria weights are given by the decision maker in which the weight for each criteria are completely unknown
as follows.
The set of alternatives and criteria are given below:
Alternatives:
A1  Jute Bag
A2  Cotton Bag
A3  HDPE

373
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Criteria:
C1  Maintain the quality of food grain
C2  Ease of access
C3  Cost
C4  Eco-friendly
Interval-Valued Intuitionistic Fuzzy Decision Matrix
Alternatives Criteria
Maintain the quality Ease of access Cost Eco-friendly
of food grain
Jute Bag [0.5, 0.6],[0.3, 0.4] [0.6, 0.7],[0.2,0.3] [0.3,0.4],[0.4,0.5] [0.7,0.8],[0.1,0.2]
Cotton Bag [0.6, 0.7],[0.2, 0.3] [0.6, 0.7],[0.2,0.3] [0.6,0.7],[0.2,0.3] [0.7,0.8],[0.1,0.2]
High density [0.7, 0.8],[0.1, 0.2] [0.5, 0.6],[0.3,0.4] [0.6,0.7],[0.2,0.3] [0.1, 0.3],[0.6,0.7]
polyethylene
(HDPE)
Normalization of Interval-valued intuitionist fuzzy decision matrix
Alternatives Criteria
Maintain the quality Ease of access Cost Eco-friendly
of food grain
Jute Bag [0.5, 0.6],[0.3, 0.4] [0.6, 0.7],[0.2,0.3] [0.4,0.5],[0.3,0.4] [0.7,0.8],[0.1,0.2]
Cotton Bag [0.6, 0.7],[0.2, 0.3] [0.6, 0.7],[0.2,0.3] [0.2,0.3],[0.6,0.7] [0.7,0.8],[0.1,0.2]
High density [0.7, 0.8],[0.1, 0.2] [0.5, 0.6],[0.3,0.4] [0.2,0.3],[0.6,0.7] [0.1, 0.3],[0.6,0.7]
polyethylene
(HDPE)
The criteria weights are w1 = 0.30, w2 = 0.20, w3 = 0.40, w4 = 0.1

METHODOLOGY I
Step 1
The weighted geometric average value  i for Ai are computed by utilizing equation (1)

1 = ([0.4905, 0.5920], [0.2628, 0.3632])


 2 = ([0.3927, 0.5054], [0.3866, 0.4946])
 3 = ([0.3264, 0.4625], [0.4295, 0.5375])
Step 2
By utilizing equation (2), the value of M ( i ) for i  1, 2,3 is calculated as follows:

M (1 ) = 0.3955
M ( 2 ) = 0.3387
M (3 ) = 0.2724
Step 3
Sorting the alternatives based on the accuracy degrees of M ( i ) (i  1, 2,3) A1 A2 A3 and therefore, A1 is
the most acceptable alternative.
METHODOLOGY II
374
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Step 1
Step 1 is same as method I
Step 2
By utilizing equation (3), the value of L( i ) for i  1, 2,3 is calculated as follows:

L(1 ) = 0.4002
L( 2 ) = 0.2094
L(3 ) = 0.1054
Step 3
Sorting the alternatives based on the accuracy degrees of L( i ) (i  1, 2,3) A1 A2 A3 and therefore, A1 is
the most acceptable alternative.
METHODOLOGY III
Step 1
Step 1 is same as method I
Step 2
By utilizing equation (4), the value of K ( i ) for i  1, 2,3 is calculated as follows:

K (1 ) = 0.6033
K ( 2 ) = 0.5048
K (3 ) = 0.4509
Step 3
Sorting the alternatives based on the accuracy degrees of K ( i ) (i  1, 2,3) A1 A2 A3 and therefore, A1 is
the most acceptable alternative.
Comparative study with some existing approaches
Existing methods Accuracy values Rankings
A1 A2 A3
Ye 2009 0.3955 0.3387 0.2724 A1 A2 A3
Nayagam et al. 2011 0.4002 0.2094 0.1054 A1 A2 A3
Sahin 2016 0.6033 0.5048 0.4509 A1 A2 A3
CONCLUSION
Multicriteria decision making method is an eminent tool which is used to choose the desirable alternative
among a definite number of alternatives. A geometric aggregation operator is used to multicriteria decision
making process in interval-valued intuitionistic fuzzy set which is highly useful to deal with real life problems.
In such cases, to deal with difficulties the accuracy functions are applicable to rank the alternatives in a reliable
way. In this paper, the real life problem of food grain packaging is analysed by utilizing the interval-valued
intuitionistic fuzzy weighted geometric (IIFWGA) aggregation operator and rank the alternatives based on
novel accuracy function, new novel accuracy function and improved accuracy function. Finally, the cotton bag
is selected as the preferable alternative by comparing all the three values of accuracy functions.
REFERENCES
[1] Jun Ye, Multicriteria fuzzy decision-making method based on a novel accuracy function under interval-
valued intuitionistic fuzzy environment, Expert Systems with Applications 36 (2009) 6899–6902.
[2] Atanassov K, Intuitionistic fuzzy sets, Fuzzy Sets Syst 20 (1986) 87–96.
[3] Atanassov K, Operators over interval-valued intuitionistic fuzzy sets, Fuzzy Sets Syst 64 (1994) 159–174.
375
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[4] Atanassov K, Gargov G, Interval-valued intuitionistic fuzzy sets, Fuzzy Sets Syst 31(3) (1989) 343–349.
[5] RishuArora, Harish Garg, Group decision-making method based on prioritized linguistic intuitionistic
fuzzy aggregation operators and its fundamental properties, Computational and Applied Mathematics,
[6] Weiwei Huang, Fangwei Zhang, ShiheXu, A complete ranking method for interval-valued intuitionistic
fuzzy numbers and its applications to multicriteria decision making,
[7] V. LakshmanaGomathiNayagam, S. Muralikrishnan, GeethaSivaraman, Multi-criteria decision-making
method based on interval-valued intuitionistic fuzzy sets, Expert Systems with Applications 38 (2011)
1464 - 1467
[8] G. Beliakov, H. Bustince, D. P. Goswami, U. K. Mukherjee, N. R. Pal, On averaging operators for
Atanassov’s intuitionistic fuzzy sets, Information Sciences 181 (2011) 1116 –1124.
[9] Guiwu Wei, Some induced geometric aggregation operators with intuitionistic fuzzy information and their
application to group decision making, Applied Soft Computing 10 (2010) 423-431
[10] V. LakshmanaGomathiNayagam, GeethaSivaraman, Ranking of interval-valued intuitionistic fuzzy sets,
Applied Soft Computing 11 (2011) 3368-3372.
[11] RidvanSahin, Fuzzy multicriteria decision making method based on the improved accuracy function for
interval-valued intuitionistic fuzzy sets.
[12] Deepa Joshi, Sanjay Kumar, Improved Accuracy Function for Interval-Valued Intuitionistic Fuzzy Sets and
Its Application to Multi–Attributes Group Decision Making,
[13] Valentina Siracusaa, Pietro Rocculib, Santina Romanib and Marco Dalla Rosa, Biodegradable polymers
for food packaging: a review, Trends in Food Science &Technology 19 (2008) 634-643.
[14] Helen Williams, Fredrik Wikstrom, Environmental impact of packaging and food losses in a life cycle
perspective: a comparative analysis of five food items, Journal of Cleaner Production 19 (2011) 43-48
[15] Zeshui Xu, Some similarity measures of intuitionistic fuzzy sets and their applications to multiple attribute
decision making, Fuzzy Optim Decis Making 6 (2007) 109–121
[16] Arunodaya Raj Mishra a, Pratibha Rani b, R. Krishankumar c, K.S. Ravichandran c, Samarjit Kar d, An
extended fuzzy decision-making framework using hesitant fuzzy setsfor the drug selection to treat the mild
symptoms of Coronavirus Disease 2019 (COVID-19), Applied Soft Computing Journal 103 (2021) 107-155
[17] Gulsun Nakiboglu and Berna Bulgurcu, Supplier selection in a Turkish textile company by using
intuitionistic fuzzy decision-making, The Journal of The Textile Institute
[18] Banu F. Ozeny and John D. Floros, Effects of emerging food processing techniques on the packaging
materials, Trends in Food Science & Technology 12 (2001) 60–67
[19] Eulalia Szmidtand Janusz Kacprzyk, Distances between intuitionistic fuzzy sets, Fuzzy Sets and Systems
114 (2000) 505–518

AUTHOR DETAILS:
C. GLADIA VINCY AND M. MARY MEJRULLO MERLIN *
PG & Research Department of Mathematics, Holy Cross College (Autonomous), Affiliated to Bharathidasan
University, Tiruchirappalli-620002, Tamil Nadu, India

376
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

TEST CASE PRIORITIZATION WITH ENHANCED METAHEURISTIC ALGORITHM:


‘AMBHA_GWO’

BHAWNA JYOTI AND AMAN KUMAR SHARMA

ABSTRACT
Background: Due to resource and time constraints forretesting the modified software, it is really necessary as
well as an important issue to search for techniques that maintains software quality without hampering the
actual performance of modified software. Regression testing is very beneficial to meet time deadlines for
retesting modified software. In order to meet regression testing objective, test case suites are designed to verify
exactness of changed functions in a software.
Aim: In regression testing, test case suite Prioritization technique aims to identify the order of execution of test
cases so that early uncovering of faults can be maximized in the software. Our aim is to develop an algorithm to
find optimized test case suite used in regression testing in order to increase fault detection ratio metric as well
as to reduce time constraints.
Method: In this paper, we proposed Ambha_GWO which is an enhanced metaheuristic, test case prioritization
algorithm established on Grey Wolf optimization. Grey wolves are used as search agents to find optimal test
cases and assigning priority ranks to test cases.
Results: The proposed algorithm (Ambha_GWO) is implemented on 12 test case suites taken from GitHub and
SIR repository. Comparative analysis of Ambha_GWO is done with GWO by taking performance evaluation
metrics like Average Percentage of Fault Detection metric, Classification Accuracy, Execution time, Fault
Detection ratio, Recall value(R), Precision value (P) and F-measure. It is observed that Ambha_GWO gives
good results as compared to classical GWO for test case prioritization problem.
Conclusion: Metaheuristic algorithm give global optimal solution to NP-hard combinatorial real-world
problems as compared to heuristic algorithms. By using regression testing technique, resource and time
constraints of retesting modified software can be dealt efficiently. The proposed Ambha_GWO prioritization
technique gave promising results in reducing execution time and also in other metrices as compared to classical
GWO prioritization algorithm.
Keywords : Grey Wolf optimization algorithm, Test case prioritization, Average Percentage of fault Detection,
Code coverage, software testing, regression testing.
NOMENCLATURE
Grey Wolf Optimization (GWO), Average Percentage of Fault Detection (APFD), Fault Detection Ratio (FDR),
Classification Accuracy (CA). Nondeterministic Polynomial (NP), Test Case Prioritization (TCP).

1. INTRODUCTION
In technical software related applications, quality of software is maintained to set harmony with customer’s
expectations. Software testing is an important as well as expensive activity to evaluate the quality of software
[2][11]. When there is any modification in software due to changing needs of customers, test case suites are run
to assure that modifications have not introduced any adverse effect in the normal functioning of the software
[29]. It can’t be denied that higher expenditure and more time constraints are involved when complete test case
suites are run [1][8][12]. There is a strong need of implementing regression testing techniques to overcome cost
coupled with time constraints. Test case prioritization make use of priority assigning to test cases that enhances
fault recognition skill and shrug off the running time of test case suite.
TCP is defined as [1] [10] [12]:
Definition “A test_case suite TS, the collective group of permutations of P(TS), a function f’ that converges to
real number R,
𝑓′: 𝑃(𝑇𝑆) → 𝑅′′
Statement: “To find TS’ Ɛ P (TS) such that ( TS’’) (TS’’ Ɛ P (TS)) (TS’’≠ TS’) [if f (TS’) ≥ f (TS’’)].”

377
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

It states that a permuted combination of test cases is found by using a function f that maps value of f (TS’) with
higher value of f (TS”) to listing test cases in a test case suite [1][19].
Current state- of- art test case suite prioritization practices have mainly focused on source-code coverage based
on traditional techniques that explore a smaller search space within local optima to give best ranking to test
cases in a test case suite [5][8][9]. Hence, there is a strong need of modern metaheuristic algorithms for global
optimization to demonstrate their power in dealing with difficult optimization problems as well as NP-hard
(non-deterministic Polynomial) problems [8][9][10][42].
Optimal solutions can be provided by exploring global search space and further intensified by picking best
solution to local optimum with implementation of meta-heuristic algorithms [10][13][14][15] in the test case
prioritization problem.
The paper is organized into five sections. Section II provides the motivation of the research in using Grey Wolf
Optimization algorithm for test case prioritization work. Section III describes the basic idea about Grey Wolf
Optimization and proposed Ambha_GWO work. Section IV explains experimental study as well as performance
metrices taken for subject programs. Comparative analysis of performance parameters of GWO with
Ambha_GWO is explained in Section V. Lastly, Section IV concludes the paper work along with some
potential research issues.
2. BASIC MOTIVATION
The motivation behind using Grey Wolf Optimization (a metaheuristic algorithm) for test case prioritization is
its abilityto solve NP-hard combinatorial problems in real-world applications scenario. E. Mary et al. [6] applied
Grey Wolf Optimization (GWO) in attribute reduction of noisy data and results show that there is increase in
classification performance by using GWO as compared to genetic algorithm as well as particle swarm
optimization algorithm. The following Table1, highlights research gaps in existing literature:
Table 1: Research gaps
Prioritization Criteria taken benefits Shortcomings
Technique Proposed
Data mining with Most frequent test APFD metric is improved Small test case suite is
Genetic algorithm [9] selection is used in considered
addition to genetic
algorithm for ranking test
cases in a test case suite.
Software Software requirements APFD metric is improved A small project
development life covered, source code and (Academic Time
cycle [16] test suites as inputs. Synchronization Project)
Service layer contains having ten distinct test
processing units of cases is chosen having
software requirement seven requirements and
specification. prioritization technique is
implemented.
Metaheuristic Artificial bee colony, Genetic algorithm has Small test case suite (nine
algorithm [15] Cuscuta search and good value of APFD test cases) is considered
genetic algorithm is metric than other two.
implemented.
Ant colony Pheromone concentration APFD metric is increased Small test case suite (eight
optimization [14] and heuristic value and reduction in execution test cases with ten faults)
function of ants are used time. is taken for their study
as well as faults
revealing capability by
test cases.
Test factors-based Importance, volatility, Very good idea and can be No source code programs
Ant colony complexity, Fault rate, used as a basic guideline are considered for
optimization [13] time and coverage are for prioritizing test cases. implementing their
used as test vectors. proposed work.
Algorithm is proposed
based on ant colony
378
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

optimization
Genetic algorithm [8] Code coverage and A prioritized test case suite Less attention is paid on
execution time of test is obtained as compared to fault detection capability.
cases random order of execution.
Clustering approach Code coverage, code Execution time is reduced Microsoft Dynamics Ax
[2] complexity and historical and fault revealing ability (small test case suite of 15
data. is increased. test cases) is taken.
Bayesian network [4] Source code coverage. Good APFD metric is All faults are hand seeded
obtained. and long interference time
is observed.
Particle Swarm Source code coverage Execution time is reduced Only 20 test cases are
optimization [3] considered.
Cuckoos Search [5] Source code coverage Execution time is reduced Small test case suite (six
test cases with five faults
L. Korayem et al. [21] solve the capacitated vehicle routing problem by means of GWO. Shankar et al. [22]
have implemented GWO in encapsulated image cryptography. Chantar et al. [7] have employed GWO for
Arabic text data classification. Jingwei et al. [17] applied GWO in classifying EMG based signals. Karkoyun et
al. [19] have hooked GWO in partitional clustering problem. Researchers also practiced GWO in stochastic
fractal search [23], improving convergence performance [24], diagnosis of breast cancer [25], terrorism
prediction [26] and big data classification in health care [43]. Due to flexibility of GWO, it has been used to
solve many engineering domains like design controller tuning, scheduling problem in welding production,
robotic, path planning, optimal power dispatch problems and image processing [5] [27][28].
Although GWO has many advantages, but this algorithm has shortcomings of poor exploitation and late
convergence. In classical GWO algorithm, populations of alpha, beta and delta wolves stuck to local optima for
long time [20][25]. So, to overcome its limitations, there is a need to propose an enhanced GWO algorithm.
3. PROPOSED WORK
We proposed Ambha_GWO test case prioritization algorithm for test case suite optimisation.
3.1 Basic Idea of Grey Wolf Optimization Algorithm
Mirjalili and his colleagues [25] in 2014, developed a metaheuristic algorithm named Grey Wolf Optimizer
(GWO) [25][26][43].The GWO includes the following pseudocode [19] [20][25]:

Fig 1: pseudocode of Grey Wolf Optimization Technique


3.2 Ambha_GWO Test Case Prioritization Algorithm
In the proposed Ambha_GWO algorithm, we consider crossover operator to update the positions of wolf.
𝐴(𝑡 + 1) = 𝑐𝑟𝑜𝑠𝑠𝑜𝑣𝑒𝑟(𝑌1 , 𝑌2 , 𝑌3 ) (1)
Here 𝑌1 , 𝑌2 , 𝑌3 are binary vectors used in crossover operation and moving positions of alpha, beta and delta
wolves affect the results.
1, 𝑖𝑓(𝐴𝑑𝛼 + 𝑏𝑠𝑡𝑒𝑝𝛼𝑑 ) ≥ 0
𝑌1𝑑 = {
0, 0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒

379
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

1, 𝑖𝑓(𝐴𝑑𝛽 + 𝑏𝑠𝑡𝑒𝑝𝛽𝑑 ) ≥ 1
𝑌2𝑑 = {
0, 0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
1, 𝑖𝑓(𝐴𝑑𝛿 + 𝑏𝑠𝑡𝑒𝑝𝛿𝑑 ) ≥ 1
𝑌3𝑑 = { (2)
0, 0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
here 𝐴𝑑𝛼 is the moving position vector of alpha wolf, 𝐴𝛽𝑑 is the moving position vector of beta wolf and 𝐴𝑑𝛿 is the
moving position vector of delta wolf. And d is the search space dimension whereas 𝑏𝑠𝑡𝑒𝑝𝛼𝑑 represents binary
step and can be vented as:
𝑑
𝑑 1, 𝑖𝑓𝑐𝑠𝑡𝑒𝑝𝛼,𝛽,𝛿 ≥𝑟
𝑏𝑠𝑡𝑒𝑝𝛼,𝛽,𝛿 ={ (3)
0, 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
𝑑 1
𝑐𝑠𝑡𝑒𝑝𝛼,𝛽,𝛿 = (4)
1+exp(−10(𝐴𝑑 𝑑
1 .𝑍𝛼 −0.5))

New position of wolf is given by:


1
𝑌1𝑑 , 𝑖𝑓𝑟 < 3
𝐴𝑑 (𝑡 + 1) = 𝑌2𝑑 , 𝑖𝑓 1 < 𝑟 < 2 , (5)
3 3
{ 𝑌3𝑑 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 .
Here 𝑌1𝑑 ,𝑌2𝑑 and 𝑌3𝑑 embodies 1st ,2nd, 3rd best values in dimensional space (d). In eq (12), 𝐴𝑑 (𝑡 + 1) denotes
output of crossover operator indicating new positions of wolves. It provides more stability in exploiting of
search space solutions. To implement Ambha_GWO, test case suites of different domains are taken. Test cases
are classified by using KNN classifier and then prioritization based Ambha_GWO algorithm is implemented.
The pseudocode of Ambha_GWO is described as:

Fig. 2: pseudocode of proposed Ambha_GWO algorithm


4. EXPERIMENTAL SETUP
We have used java eclipse IDE version 2021-12(4.22.0) for algorithm implementation setup on HP laptop, intel
i5 processor, windows 11. For test case suite prioritization work, we considered three criteria-Fault revealing
potential, statement code coverage and modification code coverage of test cases in a test case suite. EclEmma
tool is used for code coverage. Test cases are converted into feature vector representation (instances*features).
Feature vector can be represented as numerical or categorical data. In this study, we considered all features as
numerical values. More closely, we have used three features namely: statement coverage, modification coverage

380
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

and Fault revealing potential of a test case and a table is formulated by taking their values ranging in [0.1].
MATLAB 2016b is used to implement Ambha_GWO to assign priority number to test cases in a test suite.
Parameters taken for Ambha_GWO:
Number of solutions: 10,
Number of iterations=100,
Lower bound for search agents=10,
Upper bound for search agents=10.
The proposed algorithm is implemented on junit test case suites taken from [38][39][40][41] and detailed
description of test case suites is given in Table 2.
Table 2: Test case suites having junit test cases ranging from 100-400.
Sr no. Subject program branches methods test classes test cases
1 apex_hosp 665 313 74 156
2 st_travis 715 318 55 165
3 student-service 746 256 56 188
4 reg_prt_wes 806 248 96 159
5 user_interaction 806 266 81 170
6 beta_lib 830 298 89 178
7 sin_hosp 794 232 90 220
8 lid_ctu 841 242 91 262
9 webtesting 241 282 15 350
10 nf_core 225 311 28 322
11 work_lambda_health 229 345 35 359
12 Alpha_lib 339 368 42 358
For evaluation purpose of prioritized test case suite, test cases are classified into four categories: True test-case
Positive (TP), False test-case Positive (FP), True test-case Negative (TN) and False test-case Negative (FN).We
considered seven metrics which are explained as follows:
1) Fault Detection Ratio (FDR): It is defined as-
𝑵𝒖𝒎𝒃𝒆𝒓𝒐𝒇𝒇𝒂𝒖𝒍𝒕𝒔𝒅𝒆𝒕𝒆𝒄𝒕𝒆𝒅𝒃𝒚𝒂𝒕𝒆𝒔𝒕𝒄𝒂𝒔𝒆𝒔𝒖𝒊𝒕𝒆
𝑭𝑫𝑹 = ∗ 𝟏𝟎𝟎
𝑻𝒐𝒕𝒂𝒍𝒏𝒖𝒎𝒃𝒆𝒓𝒐𝒇𝒇𝒂𝒖𝒍𝒕𝒔𝒑𝒓𝒆𝒔𝒆𝒏𝒕𝒊𝒏𝒔𝒖𝒃𝒋𝒆𝒄𝒕𝒑𝒓𝒐𝒈𝒓𝒂𝒎
2) Average Percentage of Faults detection (APFD): For a given test case suite enclosing test cases(n) used to
uncover faults(m), APFD can be calculated by using the formula:
𝑚
1 1
𝐴𝑃𝐹𝐷 = 1 − ∑ TF +
𝑚∗𝑛 2𝑛
𝑖=𝑛
3) Classification Accuracy: It measures the ratio of precisely classified test cases over number of test cases
present in a test case suite.
𝑇𝑃 + 𝑇𝑁
𝐶𝑙𝑎𝑠𝑠𝑖𝑓𝑖𝑐𝑎𝑡𝑖𝑜𝑛 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 =
𝑇𝑃 + 𝐹𝑃 + 𝑇𝑁 + 𝐹𝑁
4) Execution Time: It is used to calculate the duration time (in seconds) of execution of a test case suite.
5) Precision: It is measured as:
𝑇𝑃
𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 =
𝑇𝑃 + 𝐹𝑁
6) Recall: It can be defined as
𝑇𝑒𝑠𝑡 𝑐𝑎𝑠𝑒𝑠 𝑡ℎ𝑎𝑡 been correctly classified to a class P
𝑅𝑒𝑐𝑎𝑙𝑙 =
𝐴𝑙𝑙 𝑡ℎ𝑒 𝑡𝑒𝑠𝑡 𝑐𝑎𝑠𝑒𝑠 𝑡ℎ𝑎𝑡 𝑠ℎ𝑜𝑢𝑙𝑑 ℎ𝑎𝑣𝑒 𝑏𝑒𝑒𝑛 𝑐𝑙𝑎𝑠𝑠𝑖𝑓𝑖𝑒𝑑 𝑡𝑜 𝑡ℎ𝑖𝑠 𝑐𝑙𝑎𝑠𝑠

381
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

7) F-measure: It can be defined as:


2 ∗ 𝑟𝑒𝑐𝑎𝑙𝑙 ∗ 𝑝𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛
𝐹 − 𝑚𝑒𝑎𝑠𝑢𝑟𝑒 =
𝑟𝑒𝑐𝑎𝑙𝑙 + 𝑝𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛
5. RESULTS
The performance parameters of GWO and Ambha_GWO are taken for comparative analysis. These are
explained as follows:
1 Fault Detection Ratio: In Table 3, fault detection ratio of GWO and Ambha_GWO is given:
Table 3: Fault detection Ratio
Sr no. Subject program FDR(GWO) FDR(Ambha_GWO) Increase (%)
1 apex_hosp 77.9 91.6 17.5
2 st_travis 71.6 90 25.6
3 student-service 61.1 87.5 43.2
4 reg_prt_wes 68.9 95.7 38.8
5 user_interaction 71.5 91.6 28.1
6 beta_lib 82.7 92.3 11.6
7 sin_hosp 79.8 90 12.7
8 lid_ctu 76.8 100 30.2
9 webtesting 73.8 92.5 25.3
10 nf_core 79.1 90.7 14.6
11 work_lambda_health 74.6 93.3 25.0
12 Alpha_lib 71.1 94.4 32.7
It is observed in Table 3, Fault detection ratio of all the subject programs especially in lid_ctu (100 %) have
shown good results by using Ambha_GWO test case prioritization algorithm as compared to GWO test case
prioritization algorithm. Subject programs i.e., student-service and reg_prt_wes have shown increase in
percentage of 43.2% and 38.8% respectively. Graphically, it is represented as follows:

Fig 3: Comparison of Fault Detection Ratio


2 Average Percentage of Faults Detection: In Table 4, values of APFD metric of GWO and Ambha_GWO
describe that there is increase (APFD metric) of 72.5% in case of st_travis and 56.4% in case of student-
service program.
Table 4: APFD metric
Sr no. Subject program APFD (random APFD(GWO) APFD(Ambha_ Increase (%) GWO
order) GWO) /Ambha_GWO
1 apex_hosp 0.456 0.751 0.912 21.4
2 st_travis 0.457 0.521 0.899 72.5
3 student-service 0.458 0.567 0.887 56.4
382
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

4 reg_prt_wes 0.432 0.657 0.891 35.6


5 user_interaction 0.468 0.675 0.822 21.7
6 beta_lib 0.498 0.536 0.836 55.9
7 sin_hosp 0.412 0.599 0.898 49.7
8 lid_ctu 0.437 0.611 0.811 32.7
9 webtesting 0.456 0.654 0.854 30.5
10 nf_core 0.465 0.675 0.875 29.6
11 work_lambda_health 0.455 0.679 0.872 28.4
12 Alpha_lib 0.466 0.673 0.873 29.7
Furthermore, it is observed that APFD metric of all the subject programs especially in apex_hosp (0.912) of
Ambha_GWO test case prioritization algorithm is higher as compared to GWO test case prioritization
algorithm. Graphical comparison of APFD metric is given in following Figure 4:

Fig 4: Comparison of APFD metric


3 Classification Accuracy: The values of classification accuracy are described in Table 5:
Table 5: Classification Accuracy
Sr no. Subject program GWO Ambha_GWO Increase (%)
1 apex_hosp 89.6 99.1 10.6
2 st_travis 81.3 95.3 17.2
3 student-service 85.5 98.8 15.5
4 reg_prt_wes 82.5 98.4 19.2
5 user_interaction 80 95.6 19.5
6 beta_lib 82 96.5 17.6
7 sin_hosp 89 96.5 8.4
8 lid_ctu 86.5 96.4 11.4
9 webtesting 84.3 93.5 10.9
10 nf_core 76.3 96.8 26.8
11 work_lambda_health 79.5 96.5 21.3
12 Alpha_lib 78.6 96.5 22.7
Table 5 represents that Classification Accuracy of all the subject programs especially in apex_hosp,
student_service and reg_prt_wes have shown good results. There is good increase of classification accuracy i.e.,
26.8 in nf_core program.

383
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig 5: Comparison of Classification Accuracy


4 Execution Time
In the following Table 6, comparative values of execution time are given:
Table 6: Execution time of test case suites
Sr no. Subject program GWO Ambha_GWO Decrease (%)
1 apex_hosp 31.1 23.9 23.1
2 st_travis 21.5 11.9 44.6
3 student-service 28.9 11.6 59.8
4 reg_prt_wes 23.8 9.8 58.8
5 user_interaction 22.4 9.7 56.6
6 beta_lib 26.7 10.9 59.1
7 sin_hosp 18.8 12.9 31.3
8 lid_ctu 19.8 11.7 40.9
9 webtesting 21.3 12.9 39.4
10 nf_core 22.3 12.9 42.1
11 work_lambda_health 24.5 14.7 40
12 Alpha_lib 24.5 10.2 58.3
It is observed that execution time of all the subject programs especially in reg_prt_wes and user_interaction is
significantly reduced. There is significant decrease of execution time in st_travis (44.6%), reg_prt_wes (58.8%),
user_interaction (56.6%) and beta_lib (59.1%). Graphically, it is shown in Figure 3.

Fig 6: Comparison of Execution Time


384
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

5 Precision
In the following Table 7, comparative performance values of precision are given:
Table 7: Precision values
Sr no. Subject program GWO Ambha_GWO Increase (%)
1 apex_hosp 0.671 0.762 13.5
2 st_travis 0.621 0.821 32.2
3 student-service 0.665 0.761 14.4
4 reg_prt_wes 0.778 0.871 11.9
5 user_interaction 0.665 0.761 14.4
6 beta_lib 0.761 0.891 17.0
7 sin_hosp 0.671 0.782 16.5
8 lid_ctu 0.712 0.962 35.1
9 webtesting 0.698 0.821 17.6
10 nf_core 0.712 0.961 34.9
11 work_lambda_health 0.776 0.971 25.1
12 Alpha_lib 0.778 0.891 14.5
It is observed that Precision of subject programs lid_ctu (0.962) and nf_core (0.961) is better in case of
Ambha_GWO as compared to GWO. There is increase of precision value of 32.2% in st_travis, 35.1% in
lid_ctu and 34.9% in nf_core by implementing Ambha_GWO for prioritization work as compared to GWO. It
can be shown graphically as:

Fig 7: Comparison of Precision


6 Recall
The values of performance parameter recall are given in Table 8 described below:
Table 8: Recall values of different subject programs
Sr no. Subject program GWO Ambha_GWO Increase (%)
1 apex_hosp 0.761 0.981 28.9
2 st_travis 0.791 0.91 15.1
3 student-service 0.682 0.881 29.1
4 reg_prt_wes 0.762 0.911 19.5
5 user_interaction 0.721 0.9 24.8
6 beta_lib 0.661 0.892 10.8
7 sin_hosp 0.671 0.989 47.3
8 lid_ctu 0.791 0.911 15.1
9 webtesting 0.611 0.923 51.0
10 nf_core 0.787 0.991 25.9
11 work_lambda_health 0.767 0.977 27.3
12 Alpha_lib 0.765 0.989 29.2
It is observed from the Table 8, Recall values of apex_hosp, sin_hosp, student-service, nf_core,
work_lambda_health and Alpha_lib has shown good results in Ambha_GWO as compared to GWO. There is
remarkable increase in percentage of recall values of sin_hosp (47.3 %), webtesting (51.0%) of Ambha_GWO

385
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

as compared to GWO for test case prioritization technique. Graphically, the performance of GWO and
Ambha_GWO can be represented as:

Fig 8: Comparison of Recall


7 F-measure
The calculated values of F-measure are given in the Table 9.
Table 9: F-measure values of different subject programs
Sr no. Subject program GWO Ambha_GWO Increase (%)
1 apex_hosp 0.621 0.821 32.2
2 st_travis 0.665 0.761 14.2
3 student-service 0.778 0.871 11.9
4 reg_prt_wes 0.665 0.761 14.4
5 user_interaction 0.761 0.891 17.0
6 beta_lib 0.771 0.882 14.3
7 sin_hosp 0.712 0.862 21.0
8 lid_ctu 0.798 0.921 15.4
9 webtesting 0.712 0.961 34.9
10 nf_core 0.676 0.921 36.2
11 work_lambda_health 0.678 0.891 31.4
12 Alpha_lib 0.791 0.911 15.1
Subject programs i.e., apex_hosp, webtesting, nf_core and work_lambda_health have shown good results in
case of Ambha_GWO as compared to GWO test case prioritization technique. Good percentage increase is
observed in work_lambda_health (31.4%) and nf_core (36.2%) programs for Ambha_GWO as compared to
GWO test case prioritization technique. It can be represented graphically as:

Fig 9: Comparison of F-measure


6. CONCLUSION
Quality software can be maintained by using good regression testing techniques. Test case prioritization
practices provide a proficient way to overcome issues of resource and time constraints in regression testing of
modified software. Grey Wolf Optimization algorithm has been widely used in solving NP-hard combinatorial
386
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

optimization issues in real-world scenario. To overcome the issue of poor exploitation rate of Grey Wolf
Optimization algorithm, we proposed an enhanced Grey Wolf Optimization Algorithm for assigning priority
number to test cases based on hunting behavior as well as search positions of Grey Wolves. This algorithm is
able to search best positions of test cases in accordance with fault detection features. Twelve subject programs
were taken for benchmarking the functioning of Ambha_GWO algorithm in relation to Fault Detection Ratio,
Average Percentage of Fault detection, Classification Accuracy, Execution time, Precision, Recall and F-
measure. The results showed that Ambha_GWO gave better performance in subject programs student-service,
reg_prt_wes, lid_ctu, webtesting and nf_core as compared to GWO test case prioritization algorithm in all the
evaluation metrics. As a future work, Ambha_GWO prioritization algorithm can be applied on real-time
software retesting in embedded systems.
REFERENCES
1. S. Yoo and M. Harman (2012) “Regression Testing Minimization, Selection and Prioritization: A Survey”
2. R. Carlson, H. Do and A. Dento (2011) “A clustering Approach to improving test case prioritization: An
Industrial Case study”
3. K.H. Hla, Y. Choi and J.S. Park (2008)“Applying Particle Swarm Optimization to prioritizing test cases for
embedded real time software retesting”
4. S. Mirarab and L. Tahvildari (2007) "A prioritization approach for software test cases based on Bayesian
networks”
5. R. Nagar, A. Kumar, G. P. Singh and S. Kumar (2015) “Test case selection and prioritization using
cuckoos search algorithm”
6. E. Emary, W. Yamany, A. E. Hassanien and V. Snasel (2015) “multi-objective gray-wolf optimization for
attribute reduction”
7. H. Chantar, M. Mafarja, H. Alsawalqah, A.A. Heidari, I. Aljarah and H. Faris (2020) “Feature selection
using binary grey wolf optimizer with elite-based crossover for Arabic text classification”
8. S. K. Mohapatra and S. Prasad (2013) “Evolutionary search algorithms for test case prioritization”
9. C. P. Indumathi and S. Madhumathi (2017) “Cost Aware Test case suite Reduction Algorithm for
Regression Testing”
10. B. Prakash and V. Viswanathan (2020) “A comparative study of meta-heuristic optimization techniques for
prioritization of risks in agile software development”
11. D. Gupta and V. Gupta (2016) “Test suite prioritization using nature inspired meta-heuristic algorithms”
12. R. Huang, Q Zhang, D. Towey, W. Sun, and J. Chen (2020) “Regression test case prioritization by code
combinations coverage”
13. S. F. Ahmad, D. K. Singh and P. Suman (2018) “Prioritization for regression testing using ant colony
optimization based on test factors”
14. Y. Singh, A. Kaur, B. Suri (2010) “Test case prioritization using ant colony optimization”
15. S. Mittal and O. P. Sangwan (2018) “Prioritizing test cases for regression techniques using metaheuristic
techniques”
16. M. S. Siddik, K. Sakib (2014) “RDCC: An Effective Test Case Prioritization Framework using Software
Requirements, Design and Source Code Collaboration”
17. J. Too, A. R. Abdullah, N. M. Saad, N. M. Ali and W. Tee, W (2018) “A new competitive binary grey wolf
optimizer to solve the feature selection problem in EMG signals classification”
18. S. Dhargupta, M. Ghosh, S. Mirjalili, and R. Sarkar (2020) “Selective opposition based grey wolf
optimization”
19. M. Karakoyun, I. Onur and A. Ihtisam (2019) “Grey Wolf Optimizer (GWO) Algorithm to Solve the
Partitional Clustering Problem”
20. Q. Al-Tashi, S. J. Abdulkadir, H. M. Rais, S. Mirjalili, H. Alhussian (2020) “Approaches to multi-
objective feature selection: A systematic literature review”
387
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

21. L. Korayem, M. Khorsid and S. S. Kassem (2015) “Using grey wolf algorithm to solve the capacitated
vehicle routing problem”
22. K. Shankar and P. Eswaran (2015) “Sharing a secret image with encapsulated shares in visual
cryptography.
23. El-Kenawy, M. El-Sayed, M. M. Eid, M. Saber, and A. Ibrahim (2020) "MbGWO-SFS: Modified binary
grey wolf optimizer based on stochastic fractal search for feature selection”
24. N. Singh, S. B. Singh (2017) “Hybrid algorithm of particle swarm optimization and grey wolf optimizer for
improving convergence performance”
25. S. Mirjalili, S. M. Mirjalili, and A. Lewis (2014) "Grey wolf optimizer”
26. G. M. Soliman, M. M. Khorshid and T. H. Abou-El-Enien (2016) “A hybrid ensemble classification
algorithm using grey wolf optimizer for terrorism prediction”
27. P. Sharma, and A. L. Sangal (2022) "Examining the predictive capability of advanced software defect
prediction models –an experimental investigation using combination metrics”
28. D. Emmanuel, S. Joseph, D. Oyewala, A. A. Fadele and H. Chiroma (2022) "Application of Grey Wolf
Optimization Algorithm: Recent Trends, Issues, and Possible Horizons”
29. Y. Lu, Y. Lou, S. Cheng, L. Zhang, D. Hao, Y. Zhou, and L. Zhang (2016) “How does regression test
prioritization perform in real-world software evolution?”
30. Q. Luo, K. Moran, L. Zhang and D. Poshyvanyk (2017) “How do static and dynamic test case prioritization
techniques perform on modern software systems? An extensive study on GitHub projects”
31. S. Kapoor, I. Zeya, C. Singhal and S. J. Nanda (2017) “A grey wolf optimizer based automatic clustering
algorithm for satellite image segmentation”
32. M. Panda, B. Das (2019) “Grey wolf optimizer and its applications: a survey”
33. P. Saraswat and A. Singhal (2016) “A hybrid approach for test case prioritization and optimization using
meta-heuristics techniques”
34. Li, Yu, Xiaoxiao Lin, and Jingsen Liu (2021) "An improved gray wolf optimization algorithm to solve
engineering problems”
35. G. Rothermel, R. H. Untch, C. Chu, and M. J. Harrold (2001) "Prioritizing test cases for regression testing”
36. R. Masadeh, A. Alzaqebah, A. Hudaib, and A. A. Rahman (2018) "Grey wolf algorithm for requirements
prioritization”
37. S. R. Kamel, R. YaghoubZadeh, M. Kheirabadi (2019) “Improving the performance of support-vector
machine by selecting the best features by Gray Wolf algorithm to increase the accuracy of diagnosis of
breast cancer”
38. http://travis.ci.com
39. http://spring.io.projects
40. http://github.com
41. http://sir.csc.ncsu.edu
42. P. Sharma and A. L. Sangal (2019) “Investigating the factors which impact SPI implementation initiatives
in software SMEs- A systematic map and review”
43. P. S. Game, V. Vaze, M. Emmanuel (2019) “Optimized Decision tree rules using divergence based grey
wolf optimization for big data classification in health care”

AUTHOR DETAILS:
BHAWNA JYOTI1 AND AMAN KUMAR SHARMA2
1
Research Scholar and 2Professor, Himachal Pradesh University, Shimla, India, Branch-Computer Science
Department
388
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

EXPORTING FISH SEEDS USING MULTI-OBJECTIVE TRANSPORTATION MODELS

T. LENIN AND K. SUNDAR*

ABSTRACT
In this paper, the transport of catch fishes living in fresh water is analyzed using MOTP for a certain distance
within the stipulated time. It also attempts to consider several other parameters, such as speed and spoilage
percentage. Moreover, a technique is delivered to find the optimal solution of Multi-Objective Transportation
Problem with linear constraints. Here, the problem is solved using Russell’s Approximation Method (RAM)
and also finding optimal solution using stepping stone method. This study will be helpful for all manufactures,
and exporters who are all doing transportation business for decision-making, planning, budgeting, time
scheduling, and resource allocation.
Keywords: Multi-Objective Transportation Problem (MOTP), Russell’s Approximation Method (RAM),
Stepping stone method, Heuristic method, Spoilage percentage.

INTRODUCTION
Many researchers are very much interested in pursuing about transportation and in particular the main
inspirations are as follows: Ahlfeldt, et. al. (2014) analyzed MOTP and given a solved example of real life
application. Ali, et. al. (2008) has given an economic analysis of fresh fish marketing in Maiduguri Gamboru
market and Kachallari Alau dam landing site of North eastern. Dinham, (2003) analyzed growing vegetables in
developing countries for local urban populations and export markets. Kamala Lakshmi (2017) explained
elaborately about the effect of transportation on the marketing of agricultural products in North side of India.
Kumar, et. al. (2008) analyzed and developed the transportation problem and also structured the domestic fish
marketing in India. Li, and Leung (2011) presented the multi-objective route planning for dangerous goods
using compromise programming. Milan, et. al. (2006) studied sugar cane transportation in Cuba. Mohammed
(2013) had given a case study of transportation of eggs using multi-objective transportation problem.
Narayanakumar, and Sathiadhas (2006) presented the domestic fish marketing opportunities for marine fisheries
sector in India. Peregreen, and Govindan (1969) solved the transportation of fish problems. Pramanik, et. al.
(2013) explained the multi-objective solid transportation problem in imprecise environments. Sahin (2009) has
given an new approach for analyzing transportation costs with a case study.
Following the introduction, section 2, deals with MOTP technique, which is applied to the application of fish
seeds export. Section 3, contain the comparison analysis and result. Finally conclusion is given in section 4.
2. Transporting Fish Seeds Using Multi-Objective Transportation Model
This section deals with transporting fish seeds using multi-objective transportation problem. In aquaculture
farming, a small-scale farmer doesn’t get a profit in export market and they are struggling in exporting because
even a packing charge is high for too far distance. When stocking fish larvae, they have to be very careful while
transporting from different sources to different destination. In most of the fish landing centers, they concentrate
more in controlling of spoilage of fish seeds in transport to obtain the profit. Before fishes are loaded into
transport, seller must check whether fish seeds are in good condition, before it loaded into transport. Due to
poor condition of fish, it may die during transportation.
In this section, the problem of transportation of fish seeds has been successfully solved. Based on the
information gathered related to these analysis, distance, and spoilage percentage is collected from farm visits.
2.1 Application of Multi-Objective Transportation Problem (MOTP)
In this section, we have compared the results of same problem with different techniques. The problem was taken
from the reference [13].
The problem is to minimize total distance, cost, time and spoilage percentage. A supplier supplies fish seeds,
each packet of one kg from different sources to different destinations. A survey is conducted in Nagapattinam
and Thiruvarur district, Tamil Nadu, India and the data was collected using questionnaire from whole sellers.
There are three different suppliers (𝑆1, 𝑆2, 𝑆3) and three destinations (𝐷1, 𝐷2, 𝐷3). The distance of transporting
fishes from i𝑡ℎ source to j𝑡ℎ destination is given in the following Table 1.

389
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Origin (i) Destination (j) Supply (in lakhs)


𝐷1 𝐷2 𝐷3
𝑆1 53 76 75 7
𝑆2 42 62 65 5
𝑆3 85 100 78 4
Demand (in lakhs) 3 4 6 -
Table 1: Data for Distance (𝑑ij)
Here Total Demand = 13, it is less than the total supply = 16. So, we add a dummy demand constraint with zero
(0) unit cost and with allocation 3.
Now, The modified table is
𝐷1 𝐷2 𝐷3 D dummy Supply (in lakhs)
𝑆1 53 76 75 0 7
𝑆2 42 62 65 0 5
𝑆3 85 100 78 0 4
Demand(in lakhs) 3 4 6 3
Table 2: Distance Matrix- Balanced
We use Russell’s Approximation Method (RAM) to find an initial basic feasiblesolution given in the following
table 3.
𝐷1 𝐷2 𝐷3 D dummy Supply (in lakhs)
𝑆1 53 76 (2) 75 (5) 0 7
𝑆2 42 (3) 62 (2) 65 0 5
𝑆3 85 100 78 (1) 0 (3) 4
Demand(in lakhs) 3 4 6 3
Table 3: Initial feasible solution
The minimum total transportation cost is 76×2+75×5+42×3+62×2+78×1+0×3=855. Here, the number of
allocated cell is 6 and it is equal to m+n-1=3+4-1=6. Therefore, this solution is non-degenerate. Now,
Optimality test is done using stepping stone method.
Iteration-1 of Optimality Test: From table 3, Create closed loop for unoccupied cells, we get
Unoccupied cell Closed path Net cost change
𝑆1 D1 𝑆1 D1→ 𝑆1 D2→ 𝑆2 D2→ 𝑆2 D1 53 - 76 + 62 - 42=-3
𝑆1D dummy 𝑆1D dummy → 𝑆1 D3→ 𝑆3 D3→ 𝑆3D dummy 0 - 75 + 78 - 0=3
𝑆2 D3 𝑆2 D3→ 𝑆2 D2→ 𝑆1 D2→ 𝑆1 D3 65 - 62 + 76 - 75=4
𝑆2D dummy 𝑆2D dummy → 𝑆2 D2→ 𝑆1 D2→ 𝑆1 D3→ 𝑆3 D3→ 𝑆3D dummy 0 - 62 + 76 - 75 + 78 - 0=17
𝑆3 D1 𝑆3 D1→ 𝑆3 D3→ 𝑆1 D3→ 𝑆1 D2→ 𝑆2 D2→ 𝑆2 D1 85 - 78 + 75 - 76 + 62 - 42=26
𝑆3 D2 𝑆3 D2→ 𝑆3 D3→ 𝑆1 D3→ 𝑆1 D2 100 - 78 + 75 - 76=21
Table 4: Closed Path
Then, Select the unoccupied cell having the highest negative net cost change i.e. cell 𝑆1 D1=-3 and draw a
closed path from 𝑆1 D1. Closed path is 𝑆1 D1→ 𝑆1 D2→ 𝑆2 D2→ 𝑆2 D.
𝐷1 𝐷2 𝐷3 D dummy Supply (in lakhs)
𝑆1 53 [-3] (+) 76 (2) (-) 75 (5) 0 [3] 7
𝑆2 42 (3) (-) 62 (2) (+) 65 [4] 0 [17] 5
𝑆3 85 [26] 100 [21] 78 (1) 0 (3) 4
Demand(in lakhs) 3 4 6 3
Table 5: Closed path and plus/minus allocation for current unoccupied cell 𝑆1 D1
Minimum allocated value among all negative position (-) on closed path = 2. Substract 2 from all (-) and Add it
to all (+)
𝐷1 𝐷2 𝐷3 D dummy Supply (in lakhs)
𝑆1 53 (2) 76 75 (5) 0 7
𝑆2 42 (1) 62 (4) 65 0 5
390
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

𝑆3 85 100 78 (1) 0 (3) 4


Demand(in lakhs) 3 4 6 3
Table 6: Iteration 1
Repeat the step 1 to 3, until an optimal solution is obtained.
Iteration-2 of optimality test
From table 6, Create closed loop for unoccupied cells, we get
Unoccupied cell Closed path Net cost change
𝑆1 D2 𝑆1 D2→ 𝑆1 D1→ 𝑆2 D1→ 𝑆2 D2 76 - 53 + 42 - 62=3
𝑆1 D dummy 𝑆1 D dummy → 𝑆1 D3→ 𝑆3 D3→ 𝑆3 D dummy 0 - 75 + 78 - 0=3
𝑆2 D3 𝑆2 D3→ 𝑆2 D1→ 𝑆1 D1→ 𝑆1 D3 65 - 42 + 53 - 75=1
𝑆2 D dummy 𝑆2 D dummy → 𝑆2 D1→ 𝑆1 D1→ 𝑆1 D3→ 𝑆3 D3→ 𝑆3 D dummy 0 - 42 + 53 - 75 + 78 - 0=14
𝑆3 D1 𝑆3 D1→ 𝑆3 D3→ 𝑆1 D3→ 𝑆1 D1 85 - 78 + 75 - 53=29
𝑆3 D2 𝑆3 D2→ 𝑆3 D3→ 𝑆1 D3→ 𝑆1 D1→ 𝑆2 D1→ 𝑆2 D2 100 - 78 + 75 - 53 + 42 - 62=24
Table 7: Closed path
Since, all net cost change as ≥ 0. Hence, final optimal solution is arrived and the solution is 𝑥11 = 2, 𝑥13 = 5 ,
𝑥21 = 1 , 𝑥22 = 4 , 𝑥33 = 1, 𝑥34 = 3.
53 + 75 + 42 + 62 + 78 = 310.
𝐷1 𝐷2 𝐷3 D dummy Supply (in lakhs)
𝑆1 53 (2) 76 75 (5) 0 7
𝑆2 42 (1) 62 (4) 65 0 5
𝑆3 85 100 78 (1) 0 (3) 4
Demand(in lakhs) 3 4 6 3
Table 8: Optimal Solution
Transportation cost (by road) for each fish per kilometre is 𝑅𝑠. 0.0015 and thereforetransportation cost per fish
is Rs. 0.0015 × 310 = Rs. 0. 465.
Transportation cost for total quantity = 13, 00,000 (minimum requirement) × 0.465
= Rs. 6, 04,500.
𝐷1 𝐷2 𝐷3 D dummy Supply (in lakhs)
𝑆1 2.12 3.04 3 0 7
𝑆2 1.68 2.48 2.6 0 5
𝑆3 3.4 4 3.12 0 4
Demand(in lakhs) 3 4 6 3
Table 9: Time Matrix speed 25 𝑘𝑚/ℎ
The initial basic feasible solution for (table 9) is obtained by Heuristic method,
𝑥12 = 2, 𝑥13 = 2 , 𝑥14 = 3 , 𝑥21 = 3 , 𝑥22 = 2, 𝑥33 = 4.
Now applying Stepping Stone method, the optimum solution of travelling time for speed 25 𝑘𝑚/ℎ is:
𝑥11 = 2, 𝑥13 = 5 , 𝑥21 = 1 , 𝑥22 = 4 , 𝑥33 = 1, 𝑥34 = 3.
Hence, minimum travelling time (speed 25 𝑘𝑚/ℎ) = 2.12 + 3.00 + 1.68 + 2.48 + 3
= 12.4 hours.
𝐷1 𝐷2 𝐷3 D dummy Supply (in lakhs)
𝑆1 1.77 2.53 2.5 0 7
𝑆2 1.4 2.07 2.17 0 5
𝑆3 2.83 3.33 2.6 0 4
Demand(in lakhs) 3 4 6 3
Table 10: Time Matrix speed 30 𝑘𝑚/ℎ
From (table 8), optimum solution of travelling time (speed 30 𝑘𝑚/ℎ) is: 𝑥11 = 3, 𝑥13 = 4 , 𝑥22 = 4 ,
𝑥23 = 1 , 𝑥33 = 1 , 𝑥34 = 3.
391
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The minimum travelling time (speed 30 𝑘𝑚/ℎ) = 1.77 + 2.50 + 2.07 + 2.17+ 2.60
= 11.11 hours
𝐷1 𝐷2 𝐷3 D dummy Supply (in lakhs)
𝑆1 1.51 2.17 2.14 0 7
𝑆2 1.2 177 1.86 0 5
𝑆3 2.43 2.86 2.33 0 4
Demand(in lakhs) 3 4 6 3
Table 11: Time Matrix speed 35 𝑘𝑚/ℎ
From (table 11), optimum solution of travelling time (speed 35 𝑘𝑚/ℎ) is:
𝑥12 = 4, 𝑥13 = 3, 𝑥21 = 3, 𝑥23 = 2, 𝑥33 = 1, 𝑥34 = 3
The minimum travelling time (speed 35 𝑘𝑚/ℎ) = 2.17 + 2.14 + 1.2 + 1.86 + 2.23
= 9.6 hours.
𝐷1 𝐷2 𝐷3 D dummy Supply (in lakhs)
𝑆1 1.33 1.9 1.88 0 7
𝑆2 1.05 1.38 1.63 0 5
𝑆3 2.13 2.5 1.95 0 4
Demand(in lakhs) 3 4 6 3
Table 12: Time Matrix speed 40 𝑘𝑚/ℎ
From (table 12), optimum solution of travelling time (speed 40 𝑘𝑚 /ℎ) is
𝑥11 = 2, 𝑥13 = 5 , 𝑥21 = 1 , 𝑥22 = 4 , 𝑥33 = 1 , 𝑥34 = 3 .
The minimum travelling time (speed 40 𝑘𝑚/ℎ) = 1.33 + 1.88 + 1.05 + 1.38 + 1.95
= 7.59 ℎ𝑜𝑢𝑟𝑠.
The spoilage percentages are calculated below:
𝐷1 𝐷2 𝐷3 D dummy Supply (in lakhs)
𝑆1 2.28 4.02 3.71 0 7
𝑆2 1.68 3.15 3.3 0 5
𝑆3 6.15 6.5 4.67 0 4
Demand(in lakhs) 3 4 6 3
Table 13: Percent Spoilage Matrix speed 40 𝑘𝑚/ℎ
From (table 13), optimum solution of spoilage percentage (speed 40 𝑘𝑚/ℎ) is
𝑥11 = 2, 𝑥13 = 5, 𝑥21 = 1, 𝑥22 = 4, 𝑥33 = 1, 𝑥34 = 3
2.28+3.71+1.68+3.15+4.67
The minimum spoilage with speed 40 𝑘𝑚⁄ℎ = = 3.1%
5

𝐷1 𝐷2 𝐷3 D dummy Supply (in lakhs)


𝑆1 2.1 3.71 3.42 0 7
𝑆2 1.55 2.91 3.05 0 5
𝑆3 5.67 6 4.13 0 4
Demand(in lakhs) 3 4 6 3
Table 14: Percent Spoilage Matrix speed 35 𝑘𝑚/ℎ
From (table 14), optimum solution of spoilage percentage (speed 40 𝑘𝑚/ℎ) is
𝑥11 = 2, 𝑥13 = 5, 𝑥21 = 1, 𝑥22 = 4, 𝑥33 = 1, 𝑥34 = 3
2.1+3.42+1.55+3.05+4.13
The minimum spoilage with speed 35 𝑘𝑚⁄ℎ = 5
= 2.9%

𝐷1 𝐷2 𝐷3 D dummy Supply (in lakhs)


𝑆1 1.93 3.4 3.13 0 7
𝑆2 1.42 2.66 2.8 0 5
392
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

𝑆3 5.2 5.5 3.95 0 4


Demand(in lakhs) 3 4 6 3
Table 15: Percent Spoilage Matrix speed 30 𝑘𝑚/ℎ
From (table 15), optimum solution of spoilage percentage (speed 40 𝑘𝑚/ℎ) is
𝑥11 = 2, 𝑥13 = 5, 𝑥21 = 1, 𝑥22 = 4, 𝑥33 = 1, 𝑥34 = 3
1.93+3.13+1.42+2.66+3.95
The minimum spoilage with speed 30 𝑘𝑚⁄ℎ = = 2.6%
5

𝐷1 𝐷2 𝐷3 D dummy Supply (in lakhs)


𝑆1 1.75 3.1 2.85 0 7
𝑆2 1.29 2.42 2.54 0 5
𝑆3 4.77 5 3.61 0 4
Demand(in lakhs) 3 4 6 3
Table 16: Percent Spoilage Matrix speed 25 𝑘𝑚/ℎ
From (table 16), optimum solution of spoilage percentage (speed 40 𝑘𝑚/ℎ) is
𝑥11 = 2, 𝑥13 = 5, 𝑥21 = 1, 𝑥22 = 4, 𝑥33 = 1, 𝑥34 = 3
1.75+2.85+1.29+2.42+3.61
The minimum spoilage with speed 25 𝑘𝑚⁄ℎ= = 2.4%
5

3. COMPARISON ANALYSIS
Result of Vogel’s Approximation Method (VAM) and MODI Method [13]
Results obtained for minimization of distance, cost, time and spoilage percentage: Minimum distance = 310
kilometers.
Transportation cost for total quantity = 𝑅𝑠. 6,04,500
Results obtained for Minimization of travelling time:
Minimum travelling time (𝑠𝑝𝑒𝑒𝑑 25𝑘𝑚/ℎ) = 12.4 hours
Minimum travelling time (𝑠𝑝𝑒𝑒𝑑 30𝑘𝑚/ℎ) = 10.34 hours
Minimum travelling time (𝑠𝑝𝑒𝑒𝑑 35𝑘𝑚/ℎ) = 8.85 hours Minimum travelling time (𝑠𝑝𝑒𝑒𝑑 40𝑘𝑚/ℎ) = 7.59
hours
Results obtained for Minimization of Spoilage percentage:
Minimum spoilage percentage (𝑠𝑝𝑒𝑒𝑑 25𝑘𝑚/ℎ) = 2.4%
Minimum spoilage percentage (𝑠𝑝𝑒𝑒𝑑 30𝑘𝑚/ℎ) = 2.6%
Minimum spoilage percentage (𝑠𝑝𝑒𝑒𝑑 35𝑘𝑚/ℎ) = 2.8%
Minimum spoilage percentage (𝑠𝑝𝑒𝑒𝑑 40𝑘𝑚/ℎ) = 3.1%
Result of Russell’s Approximation Method (RAM), Heuristic method and Stepping Stone Method:
Results obtained for minimization of distance, cost, time and spoilage percentage: Minimum distance = 310
kilometers.
Transportation cost for total quantity = 𝑅𝑠. 6, 04,500
Results obtained for Minimization of travelling time:
Minimum travelling time (𝑠𝑝𝑒𝑒𝑑 25𝑘𝑚/ℎ) = 12.4 hours
Minimum travelling time (𝑠𝑝𝑒𝑒𝑑 30𝑘𝑚/ℎ) = 11.11 hours
Minimum travelling time (𝑠𝑝𝑒𝑒𝑑 35𝑘𝑚/ℎ) = 9.6 hours
Minimum travelling time (𝑠𝑝𝑒𝑒𝑑 40𝑘𝑚/ℎ) = 7.59 hours
Results obtained for Minimization of Spoilage percentage:
Minimum spoilage percentage (𝑠𝑝𝑒𝑒𝑑 25𝑘𝑚/ℎ) = 2.4%
Minimum spoilage percentage (𝑠𝑝𝑒𝑒𝑑 30𝑘𝑚/ℎ) = 2.6%
Minimum spoilage percentage (𝑠𝑝𝑒𝑒𝑑 35𝑘𝑚/ℎ) = 2.9%
393
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Minimum spoilage percentage (𝑠𝑝𝑒𝑒𝑑 40𝑘𝑚/ℎ) = 3.1%


From the results, we can clearly see that, if the speed increases then spoilage also increases and if the speed
decreases therefore spoilage also decreases. Hence, speed is directly proportional to spoilage.
4. CONCLUSION
This technique is most appropriate for small-scale holders, who have less limited cash income. Spoilage of
fishes makes its value zero, which will be loss to manufacturer. So in such a case, minimizing spoilage of seeds
will give profit to suppliers. In this analysis, we not only involve reducing spoilage of fish seeds, it will also
minimize the consumption of fuel, transporting time and transportation cost.
Conflict of interests: The author declared no conflict of interests
REFERENCES
1 Ahlfeldt, G. M., Moeller, K., & Wendland, N. (2014). Chicken or egg? The PVAR econometrics of
transportation. Journal of Economic Geography, 15(6), 1169-1193.
2 Ali, E. A., Gaya, H. I. M., & Jampada, T. N. (2008). Economic analysis of fresh fish marketing in
Maiduguri Gamboru market and Kachallari Alau dam landing site of Northeastern, Nigeria. J. Agric. Soc.
Sci, 4, 23-26.
3 Dinham, B. (2003). Growing vegetables in developing countries for local urban populations and export
markets: problems confronting small‐scale producers. Pest Management Science, 59(5), 575-582.
4 Kamala Lakshmi, N. (2017). Effect of Transportation on the Marketing of Agricultural Products in Jos
North .Quest Journals: Journal of Research in Business and Management, 5 (2), 99-106.
5 Kumar, B. G., Datta, K. K., Joshi, P. K., Katiha, P. K., Suresh, R., Ravisankar, T., Ravindranath, K. &
Menon, M. (2008). Domestic fish marketing in India–changing structure, conduct, performance and
policies, Agricultural Economics Research Review, Volume 21, 345-354.
6 Li, R., & Leung, Y. (2011). Multi-objective route planning for dangerous goods using compromise
programming. Journal of Geographical Systems, 13(3), 249-271.
7 Milan, E. L., Fernandez, S. M., & Aragones, L. M. P. (2006). Sugar cane transportation in Cuba, a case
study. European Journal of Operational Research, 174(1), 374-386.
8 Mohammed N.A.R., Lahji A.A. and Syed J.K. (2013) Transportation of Eggs: A Case Study Using Multi-
Objective Transportation Problem (MOTP). Journal of Information and Operations, Management, 4(1),
327-330.
9 Narayanakumar, R., & Sathiadhas, R. (2006). Domestic fish marketing opportunities for marine fisheries
sector in India. In National Workshop on Post-harvest Methods and Domestic Fish Marketing
Opportunities .State Institute of Fisheries Technology, 59-67.
10 Peregreen, P. A., & Govindan, T. K. (1969). Transportation of fish in India: problems and prospects.
Fishery Technology, 6(2), 74-78.
11 Pramanik, S., Jana, D. K., & Maiti, M. (2013). Multi-objective solid transportation problem in imprecise
environments. Journal of Transportation Security, 6(2), 131-150.
12 Sahin, B., Yilmaz, H., Ust, Y., Guneri, A. F., & Gulsun, B. (2009). An approach for analysing
transportation costs and a case study. European Journal of Operational Research, 193(1), 1-11.
13 Irine. J., Sophia Porchelvi. R., Regupathi. R. & Balasubramanian. S. (2018). Transportation of Fresh water
Fishes: A case study using Multi-Objective Transportation Problem. International Journal of Research and
Analytical Reviews,5(4), 115-121.

AUTHOR DETAILS:

T. LENIN1 AND K. SUNDAR2*


1
Associate Professor, Department of Mathematics, Khadir Mohideen College, (Affiliated to Bharathidasan
University), Adirampattinam, Tamil Nadu, India
2*
Assistant Professor, Department of Mathematics, St. Joseph College of Engineering and Technology,
(Affiliated to Anna University), Thanjavur, Tamil Nadu, India
394
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

ANALYTICAL SOLUTION OF A FRACTIONAL ORDER BIOLOGICAL POPULATION MODEL


USING LAPLACE ADOMIAN DECOMPOSITION METHOD

PRADIP R. BHADANE AND KIRTIWANT P. GHADLE

ABSTRACT
We proposed a solid mix of Adomian Decomposition technique and Laplace transform called as Laplace
Adomian Decomposition Method is intended to get an accurate solution for the Fractional order Biological
Population Model with limit conditions. The Fractional subsidiary is in Caputo sense and the nonlinear terms
in Fractional order Biological Population Model can be taken care of by utilizing Adomian Decomposition
Method. The techniques give an insightful arrangement of the Fractional order Biological Population Model in
the form of a convergent series. The technique is described and illustrated with numerical example. A few plots
are introduced to show the unwavering quality and straightforwardness of the techniques
Keywords: Analytical Solution, Adomian Decomposition method (ADM), Biological Population Model (BPM),
Caputo Fractional derivatives, Laplace transform (LT).
2010 MSC: 92B05,49M27,26A33,44A10

INTRODUCTION
Fractional calculus is a piece of the investigation of mathematics and the Basic ideas of Fractional calculus are
not new [1-3]. The possibility of FC at first found by G. W. Leibniz in 1965 Later on, the hypothesis of FC
grew quickly. The utilizations of FC have productive applications can be discovered these days in designing and
science. Yet, some Fractional differential equations don't have accurate arrangements, so we require new
strategies and Integral transforms [20-21].
The ADM was presented by Adomian in 1991 [5-6] and has been applied to a wide class of issues in many
fields. The strategy gives the solution in a rapid convergent series with calculable terms. The basic thought of
the technique is to expect an infinite solution of the structure = ∑∞
𝒏=𝟎 𝒏 , then, at that point, apply LT [4] to the
differential equation. The nonlinear terms are then deteriorated as far as Adomian polynomials and an iterative
algorithm is developed for the determination of the 𝒏 in a recursive way.
The proficient computational devices are needed for logical and mathematical approximations of such models.
The Laplace Adomian Decomposition Method is a blend of the ADM and LT. This technique was effectively
utilized for tackling various issues [8-10].
In 2011 M.Y.Ongun, utilized the mixture of LT and ADM for addressing a model for HIV infection of CD +T
cells [7]. Later on numerous analysts utilized this blend for addressing SEIR epidemic Model of Measles with
non-integer time fractional derivatives [8] and afterward it is likewise utilized for settling fractional order
smoking model [10]. Recently, in 2021, M.Z. Mohamed and others, utilized the mixture of LT and ADM for
settling Time-Partial Fractional Differential Equations [11].
For most recent couple of years’ numerous analysts have been giving their consideration on the presence of
arrangement of the Fractional order BPM [12-19].
In this article, we consider the nonlinear time fractional order Biological Population Model in the structure
𝝏𝝁  𝝏𝟐  𝝏𝟐 
= + + 𝒇(), 𝟎<𝝁≤𝟏 (𝟏)
𝝏𝒕𝝁 𝝏𝒙𝟐 𝝏𝒚𝟐
With the underlying condition (x, y, 0) = 0(x, y, 0),
Where  signifies the population density and f addresses the population supply because of birth and death. This
model considered concerning model in the number of inhabitants in creatures. The developments are made by
and large either by mature creatures driven out by trespassers or by youthful creatures simply arriving at
development moving out of their parental domain to build up their very own rearing area. In both cases, it is
significantly more conceivable to assume that they will be coordinated towards an adjacent empty area.
In this model, therefore, development will occur only "down" the population thickness inclination, and will be
considerably faster at high population densities than at low ones. While trying to display the present
395
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

circumstance, they thought about a walk through a rectangular grid, in which at each stage a creature may either
remain at its current area or may move toward most minimal population thickness.
The point of this article is to concentrate on the utilization of LADM, to acquire estimated arrangement of time
fractional order BPM with initial conditions of the structure by taking
f()= 𝒉𝒂 (𝟏 − 𝒓𝒃 ) ,Where a ,b, h are real constants ,as
𝝁
𝑫𝒕  = (𝟐 )𝒙𝒙 + (𝟐 )𝒚𝒚 + 𝒉𝒂 (𝟏 − 𝒓𝒃 ); 𝟎 ≤ 𝝁 < 𝟏. (2)
and the outcome is introduced.
Fundamental Facts of the Fractional Calculus
Definition 1:- The Riemann-Liouville fractional integral operator of order µ≥0, of a function
𝒇 ∈ 𝑪𝝁 , 𝝁 ≥ −𝟏, is defined as
x
1
(  ) 0
J  f ( x)  ( x  t )  1 f (t ) dt ,   0, x  0,

J 0 f ( x)  f ( x).
Properties of the operator Jµ can be found, we mention only the following

f  C ,   1 ,  ,   0, and   1,

J  J  f ( x)  J    f ( x),

J  J  f ( x)  J  J  f ( x),
(  1)
J  x  x  ,
(    1)
The Riemann-Liouville derivative has certain disadvantage, when trying to model real world phenomenon with
Dt
fractional differential equations. Therefore, we shall introduce a modified fractional differential operator
proposed by Caputo in his work.
Definition 2:- The fractional derivative of f(x) in the Caputo sense is defined as
𝒙
𝝁 𝒎−𝝁 𝒎
𝟏
𝑫𝒕 𝒇(𝒙) =𝑱 𝑫 𝒇(𝒙) = ∫(𝒙 − 𝒕)𝒎−𝝁−𝟏 𝒇𝒎 (𝒕) 𝒅𝒕,
𝜞(𝒎 − 𝝁)
𝟎

For m-1< µ ≤ m, m  N, x > 0, For the Riemann-Liouville fractional integral and the Caputo fractional
derivative, we have the following relation:
𝒎−𝟏

𝝁 𝝁 𝒙𝒌
𝑱𝑻 𝑫𝒕 𝒇(𝒙) = 𝒇(𝒙) − ∑ 𝒇(𝒌) (𝒐 +) , 𝒙 > 𝟎,
𝒌!
𝒌=𝟎
Definition 3:- The Laplace transform of the Caputo fractional derivative is defined as
𝒏−𝟏
𝝁
𝑳[𝑫𝒕 𝒇(𝒕)] = 𝒔 {𝑭(𝒔) − ∑ 𝒔𝝁−𝒌−𝟏 [𝒇𝑲 (𝟎+ )|𝒕= ]} , 𝒕 > 𝟎, 𝒏 − 𝟏 < 𝝁 ≤ 𝒏, 𝒏 ∈ 𝑵,
𝝁

𝒌=𝟎

Laplace Adomian Decomposition Method


Consider a general nonlinear non-homogeneous partial fractional differential equation with starting state of the
structure.

396
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

𝜇
𝐷𝑡 (𝑥, 𝑦, 𝑡) + 𝑅(𝑥, 𝑦, 𝑡) + 𝑁(𝑥, 𝑦, 𝑡) = 𝑔(𝑥, 𝑦, 𝑡), 𝑡 ≥ 0, 𝑛 − 1 < 𝑥 < 𝑛. (3)
(𝑥, 𝑦, 0) = ℎ(𝑥, 𝑦), 𝑡 (𝑥, 𝑦, 𝑜) = 𝑓(𝑥, 𝑦) (4)
0 <   1 , (x ,y, t) 
𝜇
Where 𝐷𝑡 (𝑥, 𝑦, 𝑡) is the Caputo fractional derivative of the function (x, y, t), R is linear differential operator,
N is the general nonlinear differential operator and g(x , t) is the source term.
Taking Laplace transform on the two sides of equation (3), to get
𝜇
𝐿[𝐷𝑡 (𝑥, 𝑦, 𝑡)] + 𝐿[𝑅(𝑥, 𝑦, 𝑡)] + 𝐿[𝑁(𝑥, 𝑦, 𝑡)] = 𝐿[𝑔(𝑥, 𝑦, 𝑡)] (5)
Utilizing the differentiation property of LT and introductory conditions (4), we have
𝜇 𝜇−1 𝜇−2
𝑠 (𝑥, 𝑦, 𝑡) − 𝑠 (𝑥, 𝑦, 0) − 𝑠 𝑡 (𝑥, 𝑦, 0) + 𝐿[𝑅(𝑥, 𝑦, 𝑡) + 𝑁(𝑥, 𝑦, 𝑡)] = 𝐿[𝑔(𝑥, 𝑦, 𝑡)]
(𝑥, 𝑦, 𝑡) = 𝑠 −1 ℎ(𝑥, 𝑦) + 𝑠 −2 𝑓(𝑥, 𝑦) + 𝑠 −𝜇 𝐿[𝑔(𝑥, 𝑦, 𝑡)] − 𝑠 −𝜇 𝐿[(𝑥, 𝑦, 𝑡) + 𝑁(𝑥, 𝑦, 𝑡)] (6)
Where g(x, y, t) is emerging from the source term and the prescribed initial condition,
By standard LTADM characterizes the arrangement (x, y, t) known by the series

(𝑥, 𝑦, 𝑡) = ∑ 𝑛 (𝑥, 𝑦, 𝑡) (7)


𝑛=0

The nonlinear operator is 𝑁(𝑥, 𝑦, 𝑡) = ∑∞𝑛=0 𝐴𝑛 () (8)


Where An are the Adomian polynomials and is given by

1 𝜕𝑛
𝐴𝑛 (𝑜 , 1 , . . . . 𝑢𝑛 ) = [𝑁 (∑ 𝑝𝑖 𝑖 )] , 𝑛 = 0,1,2. ..
𝑛! 𝜕𝑝𝑛
𝑛=0 𝑝=0

Subbing (7) and (8) in (6), we get


∞ ∞ ∞
−1 −2 −𝜇 −𝜇
∑ 𝑛 (𝑥, 𝑦, 𝑡) = 𝑠 ℎ(𝑥, 𝑦) + 𝑠 𝑓(𝑥, 𝑦) + 𝑠 𝐿[𝑔(𝑥, 𝑦, 𝑡)] − 𝑠 𝐿 [𝑅 ∑ 𝑛 (𝑥, 𝑦, 𝑡) + ∑ 𝐴𝑛 ()]
𝑛=0 𝑛=0 𝑛=0

this is the coupling of the LT and ADM, looking at the coefficients of like forces of the above condition are
acquired.
𝑜 (𝑥, 𝑦, 𝑡) = 𝑠 −1 ℎ(𝑥, 𝑦) + 𝑠 −2 𝑓(𝑥, 𝑦) + 𝑠 −𝜇 𝐿[𝑔(𝑥, 𝑦, 𝑡)] = 𝑔(𝑥, 𝑦, 𝑡)
1 (𝑥, 𝑦, 𝑡) = −𝑠 −𝜇 𝐿[𝑅𝑜 (𝑥, 𝑦, 𝑡) + 𝐴𝑜 ()],
2 (𝑥, 𝑦, 𝑡) = −𝑠 −𝜇 𝐿[𝑅1 (𝑥, 𝑦, 𝑡) + 𝐴1 ()],
.
.
𝑛+1 (𝑥, 𝑦, 𝑡) = −𝑠 −𝜇 𝐿[𝑅𝑛 (𝑥, 𝑦, 𝑡) + 𝐴𝑛 ()],
Appling Inverse LT, condition becomes
𝑜 (𝑥, 𝑦, 𝑡) = 𝑔(𝑥, 𝑦, 𝑡)
𝑛+1 (𝑥, 𝑦, 𝑡) = −𝐿−1 [𝑠 −𝜇 𝐿[𝑅𝑛 (𝑥, 𝑦, 𝑡) + 𝐴𝑛 ()]], 𝑛 ≥ 1
At last we approximate the analytical (𝑥, 𝑦, 𝑡) as

(𝑥, 𝑦, 𝑡) = ∑ 𝑛 (𝑥, 𝑦, 𝑡)
𝑛=0

(𝑥, 𝑦, 𝑡) = 𝑜 (𝑥, 𝑦, 𝑡) + 1 (𝑥, 𝑦, 𝑡) + 𝑢2 (𝑥, 𝑦, 𝑡) + 3 (𝑥, 𝑦, 𝑡)+. . . . . . . ..


APPLICATION
Example (1)
Consider the following time fractional biological population model’s equation as
397
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

𝜕𝜇  𝜕 2  𝜕 2  8
𝜇
= 2 + 2 − (𝑥, 𝑦, 𝑡)(1 + (𝑥, 𝑦, 𝑡))0 < 𝜇 ≤ 1 (9)
𝜕𝑡 𝜕𝑥 𝜕𝑦 9
Dependent upon the condition
𝑥+𝑦
(𝑥, 𝑦, 𝑜) = 𝑒 3 (10)
Employing LT to the two sides of equation (9) dependent upon the underlying condition (10), we get
𝑥+𝑦
8
𝐿[(𝑥, 𝑦, 𝑡)] = 𝑠 −1 𝑒 3 + 𝑠 −𝜇 𝐿 [𝑥𝑥 + 𝑦𝑦 −  (1 + 9 )] (11)
Utilizing the converse LT to the two sides of (11)
𝑥+𝑦 8
(𝑥, 𝑦, 𝑡) = 𝑒 3 + 𝐿−1 {𝑠 −𝜇 𝐿[𝑥𝑥 + 𝑢𝑦𝑦 − (1 + )]} (12)
9
𝒙+𝒚
Where 𝒆 𝟑 address the term emerging from the source term.
Presently on Appling AD technique

(𝑥, 𝑦, 𝑡) = ∑ 𝑛 (𝑥, 𝑦, 𝑡) (13)


𝑛=0

the nonlinear operator is due


𝑁(𝑥, 𝑦, 𝑡) = ∑ 𝐴𝑛 () (14)


𝑛=0
Where an are the AD and is given by

1 𝜕𝑛
𝐴𝑛 (0 1 , 2 . . . . . . . . . . 𝑛 ) = {∑ 𝑛 𝑁[𝑝𝑖 𝑖 (𝑥, 𝑦, 𝑡)]} , 𝑛 = 0,1,2. . . . . .
𝑛! 𝜕𝑝
𝑛=0

Substituting (13) and (14) in equation (12), we obtain


𝑥+𝑦
∞ ∞
∑𝑛=0 𝑛 (𝑥, 𝑦, 𝑡) = 𝑒 3 + 𝐿−1 {𝑠 −𝜇 𝐿[∑𝑛=0 𝐴𝑛 () − ∑∞
𝑛=0 𝑛 ]} (15) Where
8
𝐴𝑛 = 2𝑛𝑥𝑥 + 2𝑛𝑦𝑦 − 2𝑛 , 𝑛 ∈ 𝑁
9
8
𝐴0 = 20𝑥𝑥 + 20𝑦𝑦 − 20
9
16
𝐴1 = 2(0 1 )𝑥𝑥 + 2(0 1 )𝑦𝑦 − 0 1
9
16 8
𝐴2 = 2(0 2 )𝑥𝑥 + (12 )𝑥𝑥 + 2(0 2 )𝑦𝑦 + (12 )𝑦𝑦 − 0 2 − 12
9 9
.
.
.
This is mixture of the LT and Adomian polynomial strategy looking at the like forces of the above condition are
gotten
𝑥+𝑦
0 (𝑥, 𝑦, 𝑡) = 𝑒 3 (16)
1 (𝑥, 𝑦, 𝑡) = 𝐿−1 {𝑠 −𝜇 𝐿[𝐴0 () − 0 ]}
8
= 𝐿−1 {𝑠 −𝜇 𝐿 [20𝑥𝑥 + 20𝑦𝑦 − 20 − 0 ]}
9
398
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

𝑥+𝑦 2 𝑥+𝑦 2 8 𝑥+𝑦 2 𝑥+𝑦


= 𝐿−1 {𝑠 −𝜇 𝐿 [(𝑒 3 ) + (𝑒 3 ) − (𝑒 3 ) − 𝑒 3 ]}
𝑥𝑥 𝑦𝑦 9
𝑥+𝑦
= 𝐿−1 {𝑠 −𝜇 𝐿 [−𝑒 3 ]}

𝑥+𝑦
= −𝑒 3 𝐿−1 {𝑠 −𝜇 𝐿[1]}

𝑥+𝑦 𝑡𝜇
1 (𝑥, 𝑦, 𝑡) = −𝑒 3 (17)
𝜇!
2 (𝑥, 𝑦, 𝑡) = 𝐿−1 {𝑠 −𝜇 𝐿[𝐴1 () − 1 ]}
16
= 𝐿−1 {𝑠 −𝜇 𝐿 [2(0 1 )𝑥𝑥 + 2(0 1 )𝑦𝑦 −   − 1 ]}
9 0 1
𝑥+𝑦 2 𝑡𝜇 𝑥+𝑦 2 𝑡𝜇 16 𝑥+𝑦 2 𝑡𝜇 𝑥+𝑦 𝑡𝜇
= 𝐿−1 {𝑠 −𝜇 𝐿 [−2 ((𝑒 3 ) ) − 2 ((𝑒 3 ) ) + (𝑒 3 ) +𝑒 3 ]}
𝜇! 𝑥𝑥
𝜇! 𝑦𝑦
9 𝜇! 𝜇!
𝜇
𝑥+𝑦 𝑡
=𝑒 3 𝐿−1 {𝑠 −𝜇 𝐿 [ ]}
𝜇!
𝑥+𝑦 𝑡 2𝜇
2 (𝑥, 𝑦, 𝑡) = 𝑒 3 (18)
(2𝜇)!
𝑥+𝑦 𝑡 3𝜇
3 (𝑥, 𝑦, 𝑡) = −𝑒 3 (19)
(3𝜇)!
Continuing thusly, the rest terms of 𝑛 (𝑥, 𝑦, 𝑡) can be found.
The solution (𝑥, 𝑦, 𝑡)of equation (9) by using (16),(17),(18)and(19), as

(𝑥, 𝑦, 𝑡) = ∑ 𝑛 (𝑥, 𝑦, 𝑡)
𝑛=0

(𝑥, 𝑦, 𝑡) = 𝑜 (𝑥, 𝑦, 𝑡) + 1 (𝑥, 𝑦, 𝑡) + 2 (𝑥, 𝑦, 𝑡) + 3 (𝑥, 𝑦, 𝑡)+. . . . . . . ..


𝑥+𝑦 𝑥+𝑦 𝑡 2𝜇 𝑥+𝑦 𝑡 2𝜇 𝑥+𝑦 𝑡 3𝜇
(𝑥, 𝑦, 𝑡) = 𝑒 3 −𝑒 3 +𝑒 3 −𝑒 3 +. . . . . . . ..
(2𝜇)! (2𝜇)! (3𝜇)!
𝑥+𝑦 𝑡𝜇 𝑡 2𝜇 𝑡 3𝜇
(𝑥, 𝑦, 𝑡) = 𝑒 3 [1 − + − +. . . . . . . . . ]
𝜇! (2𝜇)! (3𝜇)!
𝑥+𝑦
(𝑥, 𝑦, 𝑡) = 𝑒 3 𝐸𝜇 (−𝑡𝜇 )

Where Eµ(t) is Mittag-Leffler function in one parameter.


When µ = 1, then
𝑥+𝑦
(𝑥, 𝑦, 𝑡) = 𝑒 3 𝑒 −𝑡 (20)
Which is exact Solution of (9).

399
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Figure-1: Comparison between  for different fractional orders.

Figure-2,3D behavior of an approximate solution for 𝜇 = 0.35 Figure-3,3D behavior of an approximate


solution for 𝜇 = 0.65
Example (2)
Consider the following time fractional biological population model’s equation as
𝜕𝜇  𝜕 2  𝜕 2  1
= + + (𝑥, 𝑦, 𝑡) ,0 < 𝜇 ≤ 1 (21)
𝜕𝑡𝜇 𝜕𝑥 2 𝜕𝑦 2 4
Dependent upon the condition
(𝑥, 𝑦, 𝑜)
= √𝑥𝑦 (22)
Employing LT to the two sides of equation (21) dependent upon the underlying condition (22), we get
1
𝐿[(𝑥, 𝑦, 𝑡)] = 𝑠 −1 √𝑥𝑦 + 𝑠 −𝜇 𝐿[𝑥𝑥 + 𝑦𝑦 + ] (23)
4
Utilizing the converse LT to the two sides of (23)
1
(𝑥, 𝑦, 𝑡) = √𝑥𝑦 + 𝐿−1 {𝑠 −𝜇 𝐿[𝑥𝑥 + 𝑦𝑦 + )]} (24)
4
Where √𝑥𝑦 address the term emerging from the source term.
Presently on Appling AD technique

(𝑥, 𝑦, 𝑡) = ∑ 𝑛 (𝑥, 𝑦, 𝑡) (25)


𝑛=0
400
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

the nonlinear operator is due


𝑁(𝑥, 𝑦, 𝑡) = ∑ 𝐴𝑛 () (26)


𝑛=0

Where An are the AD and is given by



1 𝜕𝑛
𝐴𝑛 (0, 1 , 2 . . . . . . . . . . 𝑛 ) = {∑ 𝑛 𝑁[𝑝𝑖 𝑖 (𝑥, 𝑦, 𝑡)]} , 𝑛 = 0,1,2. . . . . .
𝑛! 𝜕𝑝
𝑛=0

Substituting (25) and (26) in equation (24), we obtain


Where
𝐴𝑛 = 2𝑛𝑥𝑥 + 2𝑛𝑦𝑦 , 𝑛 ∈ 𝑁
𝐴0 = 20𝑥𝑥 + 20𝑦𝑦
𝐴1 = 2(0 1 )𝑥𝑥 + 2(0 1 )𝑦𝑦
𝐴2 = 2(0 2 )𝑥𝑥 + (12 )𝑥𝑥 + 2(0 2 )𝑦𝑦 + (12 )𝑦𝑦

.
.
This is mixture of the LT and Adomian polynomial strategy looking at the like forces of the above condition are
gotten
0 (𝑥, 𝑦, 𝑡) = √𝑥𝑦 (27)
1
1 (𝑥, 𝑦, 𝑡) = 𝐿−1 {𝑠 −𝜇 𝐿 [𝐴0 () + 0 ]}
4
1
= 𝐿−1 {𝑠 −𝜇 𝐿 [20𝑥𝑥 + 20𝑦𝑦 + 0 ]}
4
2 2 1
= 𝐿−1 {𝑠 −𝜇 𝐿 [(√𝑥𝑦) + (√𝑥𝑦) + √𝑥𝑦]}
𝑥𝑥 𝑦𝑦 4
1
= 𝐿−1 {𝑠 −𝜇 𝐿 [ √𝑥𝑦]}
4
1
= √𝑥𝑦𝐿−1 {𝑠 −𝜇 𝐿[1]}
4
1 𝑡𝜇
1 (𝑥, 𝑦, 𝑡) = √𝑥𝑦 (28)
4 𝜇!
1
2 (𝑥, 𝑦, 𝑡) = 𝐿−1 {𝑠 −𝜇 𝐿 [𝐴1 () + 1 ]}
4
1
= 𝐿−1 {𝑠 −𝜇 𝐿 [2(0 1 )𝑥𝑥 + 2(0 1 )𝑦𝑦 + 1 ]}
4
1 𝑡𝜇 1 𝑡𝜇 1 𝑡𝜇
= 𝐿−1 {𝑠 −𝜇 𝐿 [2 ( (𝑥𝑦) ) + 2 ( (𝑥𝑦) ) + √𝑥𝑦 ]}
4 𝜇! 𝑥𝑥 4 𝜇! 𝑦𝑦 16 𝜇!
1 −1 −𝜇
𝑡𝜇
= √𝑥𝑦 𝐿 {𝑠 𝐿 [ ]}
16 𝜇!
1 𝑡 2𝜇
2 (𝑥, 𝑦, 𝑡) = √𝑥𝑦 (29)
16 (2𝜇)!

401
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

1
3 (𝑥, 𝑦, 𝑡) = 𝐿−1 {𝑠 −𝜇 𝐿 [𝐴2 () + 2 ]}
4
1
= 𝐿−1 {𝑠 −𝜇 𝐿 [2(0 2 )𝑥𝑥 + (12 )𝑥𝑥 + 2(0 2 )𝑦𝑦 + (12 )𝑦𝑦 + 2 ]}
4
1 𝑡 2𝜇 1 𝑡 2𝜇 1 𝑡 2𝜇 1 𝑡 2𝜇
= 𝐿−1 {𝑠 −𝜇 𝐿 [2 ( (𝑥𝑦) ) + ( (𝑥𝑦) ) + 2 ( (𝑥𝑦) ) + ( (𝑥𝑦) )
16 (2𝜇)! 16 (𝜇!)2 16 (2𝜇)! 16 (𝜇!)2
𝑥𝑥 𝑥𝑥 𝑦𝑦 𝑦𝑦
1 𝑡 2𝜇
+ √𝑥𝑦 ]}
64 (2𝜇)!

1 𝑡 3𝜇
3 (𝑥, 𝑦, 𝑡) = √𝑥𝑦 (30)
64 (3𝜇)!
Continuing thusly, the rest terms of 𝑛 (𝑥, 𝑦, 𝑡) can be found.
The solution (x, y, t) of equation (21) by using (27),(28),(29)and (30), as

(𝑥, 𝑦, 𝑡) = lim ∑ 𝑛 (𝑥, 𝑦, 𝑡)


𝑝→1
𝑛=0

(𝑥, 𝑦, 𝑡) = 𝑜 (𝑥, 𝑦, 𝑡) + 1 (𝑥, 𝑦, 𝑡) + 2 (𝑥, 𝑦, 𝑡) + 3 (𝑥, 𝑦, 𝑡)+. . . . . . . ..


1 𝑡𝜇 1 𝑡 2𝜇 1 𝑡 3𝜇
(𝑥, 𝑦, 𝑡) = √𝑥𝑦 + √𝑥𝑦 + √𝑥𝑦 + √𝑥𝑦 +. . . . . . . ..
4 (𝜇)! 16 (2𝜇)! 64 (3𝜇)!
1 𝑡𝜇 1 2 𝑡 2𝜇 1 3 𝑡 3𝜇
(𝑥, 𝑦, 𝑡) = √𝑥𝑦 [1 + +( ) +( ) +. . . . . . . . . ]
4 𝜇! 4 (2𝜇)! 4 (3𝜇)!
1
(𝑥, 𝑦, 𝑡) = √𝑥𝑦 𝐸𝜇 ( 𝑡𝜇 )
4
Where Eµ(t) is Mittag-Leffler function in one parameter.
When µ = 1, then
𝑡
(𝑥, 𝑦, 𝑡) = √𝑥𝑦 𝑒 4 (31)
Which is exact Solution of (21).

Figure-4: Comparison between  for different fractional orders.

402
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Figure-5,3D behavior of an approximate solution for 𝜇 = 0.35 Figure-6,3D behavior of an approximate


solution for 𝜇 = 0.65
Example (3)
Consider the following time fractional biological population model’s equation as
𝜕𝜇  𝜕 2  𝜕 2 
= + + (𝑥, 𝑦, 𝑡),0 < 𝜇 ≤ 1 (32)
𝜕𝑡𝜇 𝜕𝑥 2 𝜕𝑦 2
Dependent upon the condition
(𝑥, 𝑦, 𝑜) = √sin𝑥. sinh𝑦 (33)
Employing LT to both sides of equation (32) subject to the initial condition (33), we get
𝐿[(𝑥, 𝑦, 𝑡)] = 𝑠 −1 √sin𝑥. sinh𝑦 + 𝑠 −𝜇 𝐿[𝑥𝑥 + 𝑦𝑦 + )] (34)
Utilizing the converse LT to the two sides of (34)
(𝑥, 𝑦, 𝑡) = √sin𝑥. sinh𝑦 + 𝐿−1 {𝑠 −𝜇 𝐿[𝑥𝑥 + 𝑦𝑦 + ]} (35)

Where √sin𝑥. sinh𝑦 address the term emerging from the source term.
Presently on Appling AD technique

(𝑥, 𝑦, 𝑡) = lim ∑𝑛=0 𝑛 (𝑥, 𝑦, 𝑡) (36)
𝑝→1

The Nonlinear operator is due


𝑁(𝑥, 𝑦, 𝑡) = ∑ 𝐴𝑛 () (37)


𝑛=0

Where 𝐴𝑛 are the AD and is given by !



1 𝜕𝑛
𝐴𝑛 (0 , 1 , 2 . . . . . . . . . . 𝑛 ) = {∑ 𝑛 𝑁[𝑝𝑖 𝑖 (𝑥, 𝑦, 𝑡)]} , 𝑛 = 0,1,2. . . . . .
𝑛! 𝜕𝑝
𝑛=0

Substituting (36) and (37) in equation (35), we obtain



∞ ∞
−1 −𝜇
∑ 𝑛 (𝑥, 𝑦, 𝑡) = √sin𝑥. sinh𝑦. 𝐿 {𝑠 𝐿 [∑ 𝐴𝑛 () + ∑ 𝑛 ]} (38)
𝑛=0 𝑛=0
𝑛=0

Where
403
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

𝐴𝑛 = 2𝑛𝑥𝑥 + 2𝑛𝑦𝑦 , 𝑛 ∈ 𝑁
8
𝐴0 = 20𝑥𝑥 + 20𝑦𝑦 − 20
9
𝐴1 = 2(0 1 )𝑥𝑥 + 2(0 1 )𝑦𝑦
𝐴2 = 2(0 2 )𝑥𝑥 + (12 )𝑥𝑥 + 2(0 2 )𝑦𝑦 + (12 )𝑦𝑦

.
.
.
This is mixture of the LT and Adomian polynomial strategy looking at the like forces of the above condition are
gotten
0 (𝑥, 𝑦, 𝑡)
= √sin𝑥. sinh𝑦 (39)
1 (𝑥, 𝑦, 𝑡) = 𝐿−1 {𝑠 −𝜇 𝐿[𝐴0 () + 0 ]}
= 𝐿−1 {𝑠 −𝜇 𝐿[20𝑥𝑥 + 20𝑦𝑦 + 0 ]}
2 2
= 𝐿−1 {𝑠 −𝜇 𝐿 [(√sin𝑥. sinh𝑦)𝑥𝑥 + (√sin𝑥. sinh𝑦)𝑦𝑦 + √sin𝑥. sinh𝑦]}

= 𝐿−1 {𝑠 −𝜇 𝐿[√sin𝑥. sinh𝑦]}

= √sin𝑥. sinh𝑦 𝐿−1 {𝑠 −𝜇 𝐿[1]}


𝑡𝜇
1 (𝑥, 𝑦, 𝑡) = √sin𝑥. sinh𝑦 (40)
𝜇!
2 (𝑥, 𝑦, 𝑡) = 𝐿−1 {𝑠 −𝜇 𝐿[𝐴1 () + 1 ]}
= 𝐿−1 {𝑠 −𝜇 𝐿[2(0 1 )𝑥𝑥 + 2(0 1 )𝑦𝑦 + 1 ]}
𝑡𝜇 𝑡𝜇 𝑡𝜇
= 𝐿−1 {𝑠 −𝜇 𝐿 [2 (sin𝑥. sinh𝑦 ) + 2 (sin𝑥. sinh𝑦 ) + √sin𝑥. sinh𝑦 ]}
𝜇! 𝑥𝑥 𝜇! 𝑦𝑦 𝜇!

−1 −𝜇
𝑡𝜇
= √sin𝑥sinh𝑦 𝐿 {𝑠 𝐿 [ ]}
𝜇!
𝑡 2𝜇
2 (𝑥, 𝑦, 𝑡) = √sin𝑥sinh𝑦 (41)
(2𝜇)!
3 (𝑥, 𝑦, 𝑡) = 𝐿−1 {𝑠 −𝜇 𝐿[𝐴2 () + 2 ]}

= 𝐿−1 {𝑠 −𝜇 𝐿 [2(0 2 )𝑥𝑥 + (12 )𝑥𝑥 + 2(0 2 )𝑦𝑦 + (12 )𝑦𝑦 + 2 ]}

𝑡 3𝜇
3 (𝑥, 𝑦, 𝑡) = √sin𝑥sinh𝑦 (42)
(3𝜇)!
Continuing thusly, the rest terms of 𝑛 (𝑥, 𝑦, 𝑡) can be found.
The solution (𝑥, 𝑦, 𝑡)of equation (32) by using (39),(40),(41)and(42), as

(𝑥, 𝑦, 𝑡) = lim ∑ 𝑛 (𝑥, 𝑦, 𝑡)


𝑝→1
𝑛=0

(𝑥, 𝑦, 𝑡) = 𝑜 (𝑥, 𝑦, 𝑡) + 1 (𝑥, 𝑦, 𝑡) + 2 (𝑥, 𝑦, 𝑡) + 3 (𝑥, 𝑦, 𝑡)+. . . . . . . ..


𝑡 2𝜇 𝑡 2𝜇 𝑡 3𝜇
(𝑥, 𝑦, 𝑡) = √sin𝑥sinh𝑦 + √sin𝑥sinh𝑦 + √sin𝑥sinh𝑦 + √sin𝑥sinh𝑦 +. . . . . . . ..
(2𝜇)! (2𝜇)! (3𝜇)!
404
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

𝑡𝜇 𝑡 2𝜇 𝑡 3𝜇
(𝑥, 𝑦, 𝑡) = √sin𝑥sinh𝑦 [1 + + + +. . . . . . . . . ]
𝜇! (2𝜇)! (3𝜇)!
(𝑥, 𝑦, 𝑡) = √sin𝑥sinh𝑦𝐸𝜇 (𝑡𝜇 )
Where Eµ(t) is Mittag-Leffler function in one parameter.
When µ = 1, then
(𝑥, 𝑦, 𝑡) = √sin𝑥. sinh𝑦 . 𝑒 𝑡 (43)
Which is exact Solution of (32).

Figure-7: Comparison between  for different fractional orders.

Figure-8,3D behavior of an approximate solution for 𝜇 = 0.35 Figure-9,3D behavior of an approximate


solution for 𝜇 = 0.65
CONCLUSION
This paper intends to show the applicability of the LADM to obtain an analytical solution in terms of
convergent series for nonlinear time fractional order biological population Model. The evaluations show that the
proposed method (LADM) is extremely successful and suitable and is an influential and professional tool for
fractional order biological population Model. Because the obtained results using proposed techniques are in an
excellent agreement with the exact solution. We also conclude that the complete territory of population density
is shown in different plotted graphs.
ACKNOWLEDGEMENT
The author offers his grateful thanks to friends and the referee for their help and active guidance in the
preparation of this revised paper.
REFERENCES
[1] I. Podlubny, Fractional Differential Equations Calculus, Academic, Press, New York; 1999.

405
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[2] G.Samko, A. A. Kilbas, O.I. Marichev, Fractional Integrals and Derivatives: Theory and Applications,
Gordon and Breach Publishers;1993.
[3] K.B. Oldham, J. Spanier, The Fractional Calculus, Academic Press, New York; 1974.
[4] Joel L. Schiff, The Laplace transform: Theory and Applications, Springer, New Yark 1988.
[5] G.Adomian, A review of the decomposition method and some recent results for nonlinear equations,
Comput. Math. Appl.21(5),101–127,1991.
[6] G.Adomian, Solving Frontier Problems of Physics: The Decomposition Method, Kluwer, Dordrecht,1994.
[7] M.Y.Ongun, The Laplace Adomian Decomposition Method for solving a model for HIV Infection of
CD+T cells, Mathematical and Comp. Modelling, 53, 597-603,2011.
[8] M. Farman, M.U. Saleem, Analysis and Numerical solution of SEIR epidemic Model of Measles with non-
integer time fractional derivatives by using Laplace Adomian decomposition Method, Ain Shams Engg.
Journal, 9, 3391-3397, 2018.
[9] Yunqi Xu, D.Lu, Study on approximate solution of fractional order biological population Model, Archives
of Current Res. Int., 15(4), 1-11, 2018.
[10] Fazzal Haq, K.Shah, Numerical solution of fractional order smoking model via Laplace Adomian
decomposition method, Alexandria Eng. Journal, 57, 1061-1069, 2018.
[11] M.Z. Mohamed, T.M. Elzaki, New Modified Variational Iteration Compares Laplace Adomain
Decomposition Method for Solutions Time- Partial Fractional Differential Equations, J. of Applied
Mathematics, Article ID 6662645, 1-10, 2021.
[12] M.E. Gurtin, Richard C. On the diffusion of biological populations, Mathematical Biosciences, 33(1-2), 35-
49,1977.
[13] Yun –Guang Lu, Holder Estimates of solutions of biological population equations, Applied Mathematics
Letters, 13(6), 123-126, 2000.
[14] F.Shakeri , M.Dehghan, Numerical solution of a biological population model using He’s Variational
Iteration Method, Computer’s and Mathematics with applications, 54(7-8), 1197-1209,2007.
[15] A.M.A. El- Sayed, S.Z. Rida, Exact Solution of Fractional Order Biological Population Model,
Communication in therotical Physics, 52(6), 992-996, 2009.
[16] R.N. Prajapati, R.Mohan A Coupling Technique for analytical solution of Time Fractional Biological
Population Model, J.of Engg., Computers and App. Sci, 2(2), 30-38, 2013.
[17] Devendra Kumar, J. Singh, Application of Homotopy Analysis Transform Method to Fractional Biological
Population Model, Romanian Reports in Phys,65(1), 63-75, 2013.
[18] V. G. Gupta, P. Kumar, Approximate solutions of fractional biological Population model by homotopy
analysis Sumudu transform method, Int. J. Sci. and Res, 5(5),908-916, 2016.
[19] Samia Bushanaq, Sajjad Ali, Exact Solution to Non-linear biological population model with Fractional
Order, Thermal Science, 22(1),317-327, 2018.
[20] P. R. Bhadane, K P Ghadle, Approximate Analytical Solution of Fractional Gas Dynamic Equation By
ETHPM, J. of Basic and App. Res. Int., 20(1), 29-36, 2017.
[21] P.R. Bhadane, K P Ghadle, Approximate solution of Fractional Black-Schole’s European option pricing
equation by using ETHPM, Nonlinear Functional Analysis and Appl’s, 25(2),331-344,2020.

AUTHOR DETAILS:

PRADIP R. BHADANE1 AND KIRTIWANT P. GHADLE2


1
Assistant Professor, Department of Mathematics, Arts, Commerce and Science College Ozar (Mig) Nasik-
424008(MS) India
2
Professors, Department of Mathematics, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad-
431004 (MS) India
406
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

INTUITIONISTIC FUZZY PRIME BI-IDEALS IN NEAR-SUBTRACTION SEMIGROUPS

K. MUMTHA AND V. MAHALAKSHMI

ABSTRACT
The concept of prime fuzzy and prime anti-fuzzy bi-ideals in near-subtraction semigroups has been already
examined in our previous research. As a continuation to it, in this paper, we introduce a new concept such as
intuitionistic fuzzy prime bi-ideals in near-subtraction semigroups. We also try to characterize some of its
results.
Keywords: Bi-ideal, Prime bi-ideal, Prime fuzzy bi-ideal and Prime anti-fuzzy bi-ideal.
Mathematics subject classification Code: 03E72 and 06F35.

6. INTRODUCTION
In 1965, fuzzy set was first introduced by L.A.Zadeh. The notion of Near-subtraction semigroup was studied by
B.M.Schein. K.H.Kim et al. and they established the concept of Ideals in near-subtraction semigroup & fuzzy
set. A study on fuzzy bi-ideals in near-subtraction semigroup was analysed by V.Chnnadurai and S.Kadalarasi
et., al. The notion of Intuitionististic fuzzy prime bi-ideals in near-subtraction semigroup was introduced by
T.Nagaiah Thandu.A study on prime fuzzy bi-ideals and prime anti-fuzzy bi-ideals and was discussed by
Mumtha.K & Mahalakshmi.V and characterize some of its properties. Further references, we have to explore
the concept of intuitionistic fuzzy prime bi-ideals in near-subtraction semigroups.
7. Preliminaries
Definition: 2.1
A fuzzy subset is the mapping 𝜇 from the non-empty set X into the unit interval [0,1].
Definition: 2.2
A fuzzy subset  of X is called a primefuzzy bi-ideal of X if 𝑔. ℎ ≤ 𝑓 implies either
𝑔 ≤ 𝑓 (or) ℎ ≤ 𝑓.
Definition: 2.2
A fuzzy subset  of X is called a prime anti-fuzzy bi-ideal of X if 𝑔. ℎ ≥ 𝑓 implies either
𝑔 ≥ 𝑓 (or) ℎ ≥ 𝑓.
Definition: 2.3
An intuitionistic fuzzy set (IFS) defined on a non-empty set X having the form
A = {〈𝑥, 𝜇𝐴 (𝑥), 𝛾𝐴 (𝑥)〉/ 𝑥 ∈ 𝑋} where the functions 𝜇𝐴 : 𝑋 → [0,1] and 𝛾𝐴 : 𝑋 → [0,1] denote the degree of
membership function (namely 𝜇𝐴 ) and the degree of non-membership function (namely 𝛾𝐴 ) of each element
𝑥 ∈ 𝑋 to the set A respectively, and 0 ≤ 𝜇𝐴 (𝑥) + 𝛾𝐴 (𝑥) ≤ 1, for all 𝑥 ∈ 𝑋.
Definition: 2.4
An intuitionistic fuzzy set 𝐴 = (𝜇𝐴 , 𝛾𝐴 ) ∈ 𝑋 is called an intuitionistic fuzzy subalgebra of X if it satisfies the
following:
 𝜇𝐴 (𝑥𝑦) ≤ 𝑚𝑖𝑛 { 𝜇𝐴 (𝑥), 𝜇𝐴 (𝑦) }
 𝛾𝐴 (𝑥𝑦) ≥ 𝑚𝑎𝑥{ 𝛾𝐴 (𝑥), 𝛾𝐴 (𝑦) }, for all 𝑥, 𝑦 ∈ 𝑋.
Definition: 2.5
An intuitionistic fuzzy set 𝐴 = (𝜇𝐴 , 𝛾𝐴 ) ∈ 𝑋 is called an intuitionistic fuzzy ideal of X if it satisfies
 A is an intuitionistic fuzzy subalgebra of X.
 𝜇𝐴 (𝑎𝑥 − 𝑎(𝑏 − 𝑥)) ≤ 𝜇𝐴 (𝑥) and 𝛾𝐴 (𝑎𝑥 − 𝑎(𝑏 − 𝑥)) ≥ 𝛾𝐴 (𝑥).
 𝜇𝐴 (𝑥𝑦) ≤ 𝜇𝐴 (𝑥) and𝛾𝐴 (𝑥𝑦) ≥ 𝛾𝐴 (𝑥), for all 𝑎, 𝑏, 𝑥, 𝑦 ∈ 𝑋.
An intuitionistic fuzzy subset with (i) and (ii) are called an intuitionistic fuzzy left ideal of X where as with (i)
and (iii) are called an intuitionistic fuzzy right ideal of X.
407
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Definition: 2.6
An intuitionistic fuzzy set 𝐴 = (𝜇𝐴 , 𝛾𝐴 ) ∈ 𝑋 is called an intuitionistic fuzzy bi-ideal of X if it satisfies:
 A is an intuitionistic fuzzy subalgebra of X.
 𝜇𝐴 (𝑥𝑦𝑧) ≤ 𝑚𝑖𝑛 { 𝜇𝐴 (𝑥), 𝜇𝐴 (𝑧) }
 𝛾𝐴 (𝑥𝑦𝑧) ≥ 𝑚𝑎𝑥{ 𝛾𝐴 (𝑥), 𝛾𝐴 (𝑧) }, for all 𝑥, 𝑦, 𝑧 ∈ 𝑋.
Definition: 2.7
Let A be an intuitionistic fuzzy bi-ideal of X. Then the finitely generated set,
𝑋𝐴 = {𝑥 ∈ 𝑋 /𝐴(𝑥) = 𝐴(0)} is an bi-ideal of X.
Definition: 2.8
Let 𝐼 be a non-empty subset and 𝐴𝐼 be an intuitionistic fuzzy set in 𝑋 defined by,
1 𝑖𝑓 𝑥 ∈ 𝐴
𝐴𝐼 (𝑥) = { , for all 𝑥 ∈ 𝑋 and 𝑠 ∈ [0,1). Then 𝐴𝐼 is intuitionistic fuzzy bi-ideal of X if and only
𝑠 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
if A is an bi-ideal of X. Moreover, 𝑋𝐴𝐼 = 𝐼.
Definition: 2.9
Let 𝜒𝐴 be the characteristic function of a subset 𝐴 ⊆ 𝑋. Then 𝜒𝐴 is an intuitionistic fuzzy bi-ideal of X if and
only if A is an bi-ideal of X.
8. Intuitionistic Fuzzy Prime bi-ideals
Definition: 3.1.1
A IF bi-ideal 𝐴 of X is called anIF prime bi-ideal of 𝑋 if 𝐶. 𝐷 ⊆ 𝐴 which implies either
𝐶 ⊆ 𝐴(or)𝐷 ⊆ 𝐴, for all IF bi-ideals 𝐶 & 𝐷 of X.
E.g: 3.1.1.1
Let 𝑋 = {0, 𝑎, 𝑏, 𝑐} with “ − ”&“. ” are defined as
- 0 a b c ∙ 0 a b c
0 0 0 0 0 0 0 0 0 0
a a 0 c b a 0 a b c
b b 0 0 b b 0 0 0 0
c c 0 c 0 c 0 a b c
Define an IF sets, 𝐴 = (𝜇𝐴 , 𝛾𝐴 )𝐶 = (𝜇𝐶 , 𝛾𝐶 )𝐷 = (𝜇𝐷 , 𝛾𝐷 )
1 𝑖𝑓 𝑥 ∈ {0, 𝑐} 0.7 𝑖𝑓 𝑥 ∈ {𝑏}
𝜇𝐴 (𝑥) = { 𝛾𝐴 (𝑥) = {
0.3 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
0.7 𝑖𝑓 𝑥 ∈ {0, 𝑐} 0.2 𝑖𝑓 𝑥 ∈ {0, 𝑐}
𝜇𝐶 (𝑥) = { 𝛾 (𝑥) = {
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 𝐶 1 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
0.7 𝑖𝑓 𝑥 ∈ {0, 𝑐} 0.2 𝑖𝑓 𝑥 ∈ {0, 𝑐}
𝜇𝐷 (𝑥) = { 𝛾 (𝑥) = {
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 𝐷 0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
Clearly, 𝐴 is an IF prime bi-ideal of X.
E.g: 3.1.1.2
Let 𝑋 = {0, 𝑎, 𝑏, 𝑐} with “ − ”&“. ” are defined as,
- 0 a b c ∙ 0 a b c
0 0 0 0 0 0 0 0 0 0
a a 0 c b a 0 0 0 0
b b 0 0 b b 0 a c b
c c 0 c 0 c 0 a b c
Define an IF sets, 𝐴 = (𝜇𝐴 , 𝛾𝐴 )𝐶 = (𝜇𝐶 , 𝛾𝐶 )𝐷 = (𝜇𝐷 , 𝛾𝐷 )
1 𝑖𝑓 𝑥 ∈ {0, 𝑐}
𝜇𝐴 (𝑥) = { 𝛾 (𝑥) = 0, ∀ 𝑥 ∈ 𝑋
0.2 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 𝐴
408
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

0.8 𝑖𝑓 𝑥 ∈ {0, 𝑏} (𝑥) 0.1 𝑖𝑓 𝑥 ∈ {0, 𝑏}


𝜇𝐶 (𝑥) = { 𝛾 ={
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 𝐶 0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
0.8 𝑖𝑓 𝑥 ∈ {0, 𝑏} 0.1 𝑖𝑓 𝑥 ∈ {0, 𝑏}
𝜇𝐷 (𝑥) = { 𝛾 (𝑥) = {
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 𝐷 0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
Clearly, 𝐴 is not an IF prime bi-ideal of X.
Theorem: 3.1.2
Arbitaray intersection of all IF prime bi-ideals of X is also an IF prime bi-ideal of X.
Proof:
Let {𝐴𝑖 /𝑖 ∈ Ω} be a family of an IF prime bi-ideals of X.
To prove: 𝐴 = ⋂𝑖∈Ω 𝐴𝑖 is also an IF prime bi-ideal.
Let 𝐶 & 𝐷 be any IF bi-ideals of X such that 𝐶. 𝐷 ⊆ ⋂𝑖∈Ω 𝐴𝑖 ⟹ 𝐶. 𝐷 ⊆ 𝐴𝑖 , for all 𝑖 ∈ Ω.
Since each 𝐴𝑖 is an IF prime b-ideal, therefore, 𝐶 ⊆ 𝐴𝑖 (or) 𝐷 ⊆ 𝐴𝑖 , for all 𝑖 ∈ Ω.
(i.e) 𝐶 ⊆ ⋂𝑖∈Ω 𝐴𝑖 (or) 𝐷 ⊆ ⋂𝑖∈Ω 𝐴𝑖 .
Note: 3.1.3
Every IF prime ideal is an IF prime bi-ideal but the converse need not be true in general.
Theorem: 3.1.4
If 𝐴 is an IF prime bi-ideal of X then the finitely generated set is a prime bi-ideal of X.
Proof:
Assume that 𝐴 is an IF prime bi-ideal of X.
By Theorem 2.7, 𝑋𝐴 is a bi-ideal of X. To prove: 𝑋𝐴 is a prime bi-ideal of X.
Let 𝐺&𝐻 be any two IF bi-ideals in X such that 𝐺. 𝐻 ⊆ 𝑋𝐴 . We have to prove 𝐺 ⊆ 𝑋𝐴 or 𝐻 ⊆ 𝑋𝐴 .
𝐴(0) 𝑖𝑓 𝑦 ∈ 𝐻
Define an IF subsets 𝐶 & 𝐷 as,𝐶(𝑥) = (𝜇𝐶 , 𝛾𝐶 )(𝑥) = 𝐴(0)and 𝐷(𝑥) = (𝜇𝐷 , 𝛾𝐷 )(𝑥) = {
0 𝑖𝑓 𝑦 ∉ 𝐻
By Theorem 2.8, 𝐶 & 𝐷 are IF bi-ideals. Next we verify that 𝐶. 𝐷 ⊆ 𝐴.
𝑠𝑢𝑝
{min{𝜇𝐶 (𝑦), 𝜇𝐷 (𝑧)}} 𝑖𝑓 𝑎 = 𝑦𝑧
Since 𝜇𝐶.𝐷 (𝑎) = { 𝑎=𝑦𝑧 and
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
𝑖𝑛𝑓
(𝑦), 𝛾𝐷 (𝑧)}}
𝛾𝐶.𝐷 (𝑎) = { 𝑎=𝑦𝑧 {max{𝛾𝐶 𝑖𝑓 𝑎 = 𝑦𝑧
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
⟹ (𝜇𝐶 , 𝛾𝐶 )(𝑦) = (𝜇𝐷 , 𝛾𝐷 )(𝑧) = (𝜇𝐴 , 𝛾𝐴 )(0) = 𝑓(0). So 𝑦 ∈ 𝐴 & 𝑧 ∈ 𝐵.
Now, 𝑎 = 𝑦𝑧 ∈ 𝐺. 𝐻 ⊆ 𝑋𝐴 . (i.e) 𝑎 ∈ 𝑋𝐴 ⟹ 𝐴(𝑎) = 𝐴(0). (i.e) (𝜇𝐴 , 𝛾𝐴 )(𝑎) = (𝜇𝐴 , 𝛾𝐴 )(0)
Hence, 𝐶. 𝐷(𝑎) = (𝜇𝐶.𝐷 , 𝛾𝐶.𝐷 )(𝑎) ≤ (𝜇𝐴 , 𝛾𝐴 )(𝑎) = 𝐴(𝑎), ∀ 𝑎 ∈ 𝑋. Thus 𝐶. 𝐷 ⊆ 𝐴.
Since 𝐴 is an IF prime bi-ideal, So we have that 𝐶 ⊆ 𝐴 (or) 𝐷 ⊆ 𝐴.
Suppose 𝐶 ⊆ 𝐴. If 𝐺 ⊈ 𝑋𝐴 , then there exists 𝑎 ∈ 𝐺 such that 𝑎 ∉ 𝑋𝐴 .
This means that 𝐴(𝑎) ≠ 𝐴(0). Already We know that, 𝐴(0) ≥ 𝐴(𝑎). But 𝐴(0) ≠ 𝐴(𝑎) andso 𝐴(0) > 𝐴(𝑎).
Now, 𝐶(𝑎) = 𝐴(0) > 𝐴(𝑎). Which is a contradiction to 𝐶 ⊆ 𝐴. Hence 𝐺 ⊆ 𝑋𝐴 .
Similarly, If 𝐷 ⊆ 𝐴, then we can show that 𝐻 ⊆ 𝑋𝐴 .This shows that 𝑋𝐴 is a prime bi-ideal of X.
Theorem: 3.1.5
(1,0) 𝑖𝑓 𝑥 ∈ 𝐵
Let B be an bi-ideal of X and 𝐴 be an IF set in X defined by,𝐴(𝑥) = { ′ , for all 𝑥 ∈ 𝑋 &𝑠, 𝑠′ ∈
(𝑠, 𝑠 ) 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
[0,1). If B is a prime bi-ideal of X then A is an IF prime bi-ideal of X.
Proof:
Suppose B is a prime ideal of X. To prove: 𝐴 is an IF prime bi-ideal of X.
By Theorem 2.8, A is an IF bi-ideal of X. Let 𝐶 & 𝐷 be two IF bi-ideals of X such that 𝐶. 𝐷 ⊆ 𝐴.
409
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

To prove: 𝐶 ⊆ 𝐴 (or)𝐷 ⊆ 𝐴. Suppose not, (i.e) 𝐶 ⊈ 𝐴 and 𝐷 ⊈ 𝐴.


Then 𝐶(𝑦) > 𝐴(𝑦) and 𝐷(𝑧) > 𝐴(𝑧), ∀ 𝑦, 𝑧 ∈ 𝑋.
Therefore we have, 𝐴(𝑦) ≠ 1 and 𝐴(𝑧) ≠ 1 ⟹ 𝐴(𝑦) = 𝐴(𝑧) = 𝑠 andso 𝑦, 𝑧 ∉ 𝐵.
Since B is a prime bi-ideal, we have that 〈𝑦〉〈𝑧〉 ⊈ 𝐵. Then 𝐴(𝑎) = 𝑠 = (𝜇𝐴 , 𝛾𝐴 )(𝑎).
We have, 𝜇𝐶.𝐷 (𝑎) ≤ 𝜇𝐴 (𝑎) = 𝑠 and 𝛾𝐶.𝐷 (𝑎) ≥ 𝛾𝐴 (𝑎) = 𝑠. Hence 𝐶. 𝐷 ⊆ 𝐴.
Since 𝑎 = 𝑙𝑚, where 𝑙 = 〈𝑦〉& 𝑚 = 〈𝑧〉. Then, 𝑠 = 𝜇𝐴 (𝑎) ≥ 𝜇𝐶.𝐷 (𝑎) and 𝑠 = 𝛾𝐴 (𝑎) ≤ 𝛾𝐶.𝐷 (𝑎)
𝑠𝑢𝑝
but 𝜇𝐶.𝐷 (𝑎) = 𝑎=𝑙𝑚 {min{𝜇𝐶 (𝑙), 𝜇𝐷 (𝑚)}} ≥ min{𝜇𝐶 (𝑙), 𝜇𝐷 (𝑚)} ≥ min{𝜇𝐶 (𝑦), 𝜇𝐷 (𝑧)}
> min{𝜇𝐴 (𝑦), 𝜇𝐴 (𝑧)} = 𝑠 = 𝐴(𝑎)
𝑖𝑛𝑓
And 𝛾𝐶.𝐷 (𝑎) = 𝑎=𝑙𝑚 {max{𝛾𝐶 (𝑙), 𝛾𝐷 (𝑚)}} ≤ max{𝛾𝐶 (𝑙), 𝛾𝐷 (𝑚)} ≤ max{𝛾𝐶 (𝑦), 𝛾𝐷 (𝑧)}
< max{𝛾𝐴 (𝑦), 𝛾𝐴 (𝑧)} = 𝑠 = 𝐴(𝑎)
Therefore we get 𝜇𝐶.𝐷 > 𝜇𝐴 and𝛾𝐶.𝐷 < 𝛾𝐴 . (i.e) 𝐶. 𝐷 ⊃ 𝐴. Which is a contradiction to 𝐶. 𝐷 ⊆ 𝐴.
Hence, A is an IF prime bi-ideal of X.
Corollary: 3.1.6
Let 𝜒𝐵 be the characteristic function of a subset 𝐵 ⊆ 𝑋. Then 𝜒𝐵 is an IF prime bi-ideal if and only if B is a
prime bi-ideal of X.
Theorem: 3.1.7
If 𝐴 is an IF prime bi-ideal of X then, 𝐴(0) = (𝜇𝐴 , 𝛾𝐴 ) = (1,0).
Proof:
Suppose 𝐴 is an IF prime bi-ideal of X.
To prove: 𝐴(0) = (1,0). Suppose not, (i.e) 𝐴(0) = (𝜇𝐴 , 𝛾𝐴 )(0) < (1,0).
Since 𝐴 is not a constant, then there exists 𝑎 ∈ 𝑋 such that 𝐴(𝑎) < 𝐴(0). (i.e) (𝜇𝐴 , 𝛾𝐴 )(𝑎) < (𝜇𝐴 , 𝛾𝐴 )(0).
Define the IF subsets 𝐶 & 𝐷 as, ∀ 𝑥 ∈ 𝑋
(1,0) 𝑖𝑓 𝐴(𝑥) = 𝐴(0)
𝐶(𝑥) = (𝜇𝐶 , 𝛾𝐶 ) = 𝐴(0) and 𝐷(𝑥) = (𝜇𝐷 , 𝛾𝐷 ) = {
(0,1) 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
Since 𝐶 is a constant function which impies 𝐶 is an IF bi-ideal.
Note that, 𝐷 is the characteristics function of 𝑋𝐴 . Now, by Theorem: 2.8, 𝐷 is an IF bi-ideal of X.
Since 𝐷(0) = (1,0) > 𝐴(0)and 𝐶( ) = 𝐴(0) > 𝐴(𝑎). We have that, 𝐶 ⊈ 𝐴 and 𝐷 ⊈ 𝐴.
𝑠𝑢𝑝
{min{𝜇𝐶 (𝑥), 𝜇𝐷 (𝑦)}} 𝑖𝑓 𝑏 = 𝑥𝑦
Let ∈ 𝑋. Since, 𝜇𝐶.𝐷 (𝑏) = { 𝑏=𝑥𝑦
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
𝑖𝑛𝑓
{max{𝛾𝐶 (𝑥), 𝛾𝐷 (𝑦)}} 𝑖𝑓 𝑏 = 𝑥𝑦
And 𝛾𝐶.𝐷 (𝑏) = { 𝑏=𝑥𝑦
1 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
Now, we prove, 𝐶. 𝐷 ⊆ 𝐴.For this, we consider two cases, 𝐷(𝑥) = (0,1) & 𝐷(𝑥) = (1,0) in the following:
Case - (i)
Suppose𝐷(𝑥) = (0,1).
Now, 𝜇𝐶.𝐷 (𝑏) = min{𝜇𝐶 (𝑥), 𝜇𝐷 (𝑦)} = min{𝜇𝐴 (0), 0} = 0 ≤ 𝜇𝐴 (𝑥𝑦) = 𝜇𝐴 (𝑏).
𝛾𝐶.𝐷 (𝑏) = max{𝛾𝐶 (𝑥), 𝛾𝐷 (𝑦)} = max{𝛾𝐴 (0), 1} = 1 ≥ 𝛾𝐴 (𝑥𝑦) = 𝛾𝐴 (𝑏).
Case - (ii)
Suppose𝐷(𝑥) = (1,0).
Now,𝜇𝐶.𝐷 (𝑏) = min{𝜇𝐶 (𝑥), 𝜇𝐷 (𝑦)} = min{𝜇𝐴 (0), 1} = 𝜇𝐴 (0) = 𝜇𝐴 (𝑥) ≤ 𝜇𝐴 (𝑥𝑦) = 𝜇𝐴 (𝑏).
𝛾𝐶.𝐷 (𝑏) = max{𝛾𝐶 (𝑥), 𝛾𝐷 (𝑦)} = max{𝛾𝐴 (0), 0} = 𝛾𝐴 (0) = 𝛾𝐴 (𝑥) ≥ 𝛾𝐴 (𝑥𝑦) = 𝛾𝐴 (𝑏).

410
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

From this, we conclude that, 𝜇𝐶.𝐷 (𝑏) ≤ 𝜇𝐴 (𝑏) andso 𝛾𝐶.𝐷 (𝑏) ≥ 𝛾𝐴 (𝑏). (i.e) 𝐶. 𝐷 ⊆ 𝐴.
Since, 𝐴 is an IF prime bi-ideal, we have 𝐶 ⊆ 𝐴 or 𝐷 ⊆ 𝐴.
Which is a contradiction to 𝐶 ⊈ 𝐴 and 𝐷 ⊈ 𝐴. Hence, 𝐴(0) = 1.
Theorem: 3.1.8
Every IF prime bi-ideal is normal.
Proof:
By Previous Theorem 3.1.7, it is obviously true.
Theorem: 3.1.9
Every IF prime bi-ideal is weakly completely normal.
Proof:
Let 𝐴 be an IF prime bi-ideal. Then 𝐴 is normal and 𝐴 lies between the values 0 & 1.
It follows that, 𝐴(0) = (𝜇𝐴 , 𝛾𝐴 )(0) = 1 & 𝐴(𝑥) = (𝜇𝐴 , 𝛾𝐴 )(𝑥) < 1, for all 𝑥 ∈ 𝑋.
Therefore, 𝑓 is weakly completely normal.
Theorem: 3.1.10
If 𝐴 is an IF prime bi-ideal of X then, |𝐼𝑚(𝐴)| = 2. Moreover, 𝐼𝑚(𝐴) = {(1,0), (𝑠, 𝑠′)}, with
𝑠 + 𝑠 ′ ≤ 1 where (1,0) > (𝑠, 𝑠 ′ ) ≥ (0,1).
Proof:
Suppose 𝐴 is an IF prime fuzzy bi-ideal of X.
To prove: 𝐼𝑚(𝐴) contains exactly two values. By previous Theorem 3.1.7, 𝐴(0) = (1,0).
Let 𝑎 & 𝑏 be two elements of X such that,𝐴(𝑎) = (𝜇𝐴 , 𝛾𝐴 )(𝑎) < (1,0) and 𝐴(𝑏) = (𝜇𝐴 , 𝛾𝐴 )(𝑏) < (1,0).
Enough to prove: 𝐴(𝑎) = 𝐴(𝑏). (i.e) (𝜇𝐴 , 𝛾𝐴 )(𝑎) = (𝜇𝐴 , 𝛾𝐴 )(𝑏)
Part-(i)
Define an IF subsets 𝐶 and 𝐷 as, ∀ 𝑥 ∈ 𝑋 and 𝑎 ∈ 𝑋
(1,0) 𝑖𝑓 𝑥 ∈ < 𝑎 >
𝐶(𝑥) = 𝐴(𝑎) = (𝜇𝐴 , 𝛾𝐴 )(𝑎) and 𝐷(𝑥) = {
(0,1) 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
By Theorem: 2.8, 𝐶 & 𝐷 are fuzzy bi-ideals of X.
Since 𝑎 ∈< 𝑎 >, we have 𝐷(𝑎) = (1,0) > 𝐴(𝑎) andso 𝐷 ⊈ 𝐴.
𝑠𝑢𝑝
{min{𝜇𝐶 (𝑎), 𝜇𝐷 (𝑏)}} 𝑖𝑓 𝑘 = 𝑎𝑏
Let 𝑘 ∈ 𝑋. Since, 𝜇𝐶.𝐷 (𝑘) = { 𝑘=𝑎𝑏
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
𝑖𝑛𝑓
And 𝛾𝐶.𝐷 (𝑘) = { 𝑘=𝑎𝑏{max{𝜇𝐶 (𝑦), 𝜇𝐷 (𝑧)}} 𝑖𝑓 𝑘 = 𝑎𝑏
1 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
If 𝑥 ∉ < 𝑎 >, then 𝐷(𝑥) = (𝜇𝐷 , 𝜇𝐷 )(𝑥) = (0,1)
⟹ min{𝜇𝐶 (𝑦), 𝜇𝐷 (𝑧)} = min{𝜇𝐴 (𝑎), 0} = 0 ≤ 𝜇𝐴 (𝑎𝑏) = 𝜇𝐴 (𝑘)
⟹ max{𝛾𝐶 (𝑦), 𝛾𝐷 (𝑧)} = max{𝛾𝐴 (𝑎), 1} = 1 ≥ 𝛾𝐴 (𝑎𝑏) = 𝛾𝐴 (𝑘)
If 𝑥 ∈ < 𝑎 >, then 𝐷(𝑥) = (𝜇𝐷 , 𝜇𝐷 )(𝑥) = (1,0)
⟹ min{𝜇𝐶 (𝑦), 𝜇𝐷 (𝑧)} = min{𝜇𝐴 (𝑎), 1} = 𝜇𝐴 (𝑎) ≤ 𝜇𝐴 (𝑎𝑏) = 𝜇𝐴 (𝑘)
⟹ max{𝛾𝐶 (𝑦), 𝛾𝐷 (𝑧)} = max{𝛾𝐴 (𝑎), 0} = 𝛾𝐴 (𝑎) ≥ 𝛾𝐴 (𝑎𝑏) = 𝛾𝐴 (𝑘)
From these, we conclude that, 𝐶. 𝐷 ⊆ 𝐴.Since 𝐴 is an IF prime bi-ideal, we have 𝐶 ⊆ 𝐴 (𝑜𝑟) 𝐷 ⊆ 𝐴.
Since 𝐷 ⊈ 𝐴. It follows that 𝐶 ⊆ 𝐴 .We get, 𝐴(𝑥) ≥ 𝐶(𝑎), for all 𝑥 ∈ 〈𝑎〉.
Now, 𝐴(𝑏) ≥ 𝐶(𝑏) = 𝐴(𝑎).
Part-(ii)
Now, we construct fuzzy bi-ideals 𝐸 & 𝐹 of X,
411
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

(1,0) 𝑖𝑓 𝑥 ∈ < 𝑏 >


𝐸(𝑥) = 𝐴(𝑏) and 𝐹(𝑥) = { ,∀𝑥 ∈𝑋
(0,1) 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
As in part-(i), we can verify that 𝐴(𝑎) ≥ 𝐴(𝑏).
Thus from parts-(i) & (ii), it follows that 𝐴(𝑎) = 𝐴(𝑏).
Theorem: 3.1.11
Let 𝐴 be an IF bi-ideal in X. Then 𝐴 is an IF prime bi-ideal of X iff each level subset 𝐴(𝑡,𝑡 ′ ) , is a prime bi-ideal
of X, ∀ (𝑡, 𝑡 ′ ) ∈ [0,1]2 with 𝑡 + 𝑡′ ≤ 1 whenever non-empty.
Proof:
Assume that 𝐴 is an IF prime bi-ideal of X.
By Theorem 2.8, 𝐴(𝑡,𝑡 ′ )is a bi-ideal of X. To prove: 𝐴(𝑡,𝑡 ′ )is a prime bi-ideal of X.
Let 𝐺 & 𝐻 be two bi-ideals in X such that 𝐺. 𝐻 ⊆ 𝐴(𝑡,𝑡 ′ ) .
(1,0) 𝑖𝑓 𝑥 ∈ 𝐺 (1,0) 𝑖𝑓 𝑥 ∈ 𝐻
Define an IF subsets 𝐶 & 𝐷 of X as,𝐶(𝑥) = { and 𝐷(𝑥) = {
(𝑡, 𝑡 ′ ) 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 (𝑡, 𝑡 ′ ) 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
By Theorem 2.8, 𝐶 & 𝐷 are IF bi-ideals of X. Next we verify that, 𝐶. 𝐷 ⊆ 𝐴.
𝑠𝑢𝑝
{min{𝜇𝐶 (𝑎), 𝜇𝐷 (𝑏)}} 𝑖𝑓 𝑘 = 𝑎𝑏
Since, , 𝜇𝐶.𝐷 (𝑘) = { 𝑘=𝑎𝑏
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
𝑖𝑛𝑓
And 𝛾𝐶.𝐷 (𝑘) = { 𝑘=𝑎𝑏{max{𝜇𝐶 (𝑎), 𝜇𝐷 (𝑏)}} 𝑖𝑓 𝑘 = 𝑎𝑏
1 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
We conclude that, (𝜇𝐶 , 𝛾𝐶 )(𝑎) = (𝜇𝐷 , 𝛾𝐷 )(𝑏) ≥ (𝑡, 𝑡 ′ ). So 𝑎 ∈ 𝐺 & 𝑏 ∈ 𝐻.
Now, 𝑘 = 𝑎𝑏 ∈ 𝐺. 𝐻 ⊆ 𝐴(𝑡,𝑡 ′ ) . (i.e) 𝑎 ∈ 𝐴(𝑡,𝑡 ′ ) ⟹ (𝜇𝐴 , 𝛾𝐴 )(𝑎) ≥ (𝑡, 𝑡 ′ ).
Hence 𝐶. 𝐷(𝑎) = (𝜇𝐶.𝐷 , 𝛾𝐶.𝐷 )(𝑎) ≤ (𝜇𝐴 , 𝛾𝐴 )(𝑎) = 𝐴(𝑎), ∀ 𝑎 ∈ 𝑋. Thus 𝐶. 𝐷 ⊆ 𝐴.
Since 𝐴 is an IF prime bi-ideal, we have 𝐶 ⊆ 𝐴 or 𝐷 ⊆ 𝐴.
Suppose 𝐶 ⊆ 𝐴. If 𝐺 ⊈ 𝐴(𝑡,𝑡 ′ ), then there exists 𝑎 ∈ 𝐺 such that 𝑎 ∉ 𝐴(𝑡,𝑡 ′ ) .
This means that 𝐴(𝑎) ≱ (𝑡, 𝑡 ′ ). (i.e) 𝐴(𝑎) < (𝑡, 𝑡 ′ ).
Now, 𝐶(𝑎) ≥ 𝑡 > 𝐴(𝑎). Which is a contradiction to 𝐶 ⊆ 𝐴.
Similarly, If 𝐷 ≤ 𝐴, then we can show that 𝐻 ⊆ 𝐴(𝑡,𝑡 ′ ) .
This shows that 𝐴(𝑡,𝑡 ′ ) is a prime bi-ideal of X.
Conversely,
Assume that 𝐴(𝑡,𝑡 ′ ) , (𝑡, 𝑡 ′ ) ∈ 𝐼𝑚(𝐴) is a prime bi-ideal of X.
To prove: 𝐴 is an IF prime bi-ideal of X.
(1,0) 𝑖𝑓 𝑥 ∈ 𝐴(𝑡,𝑡 ′ )
Let 𝐴 be an IF subset in X defined by, 𝐴(𝑥) = (𝜇𝐴 , 𝛾𝐴 )(𝑥) = {
(𝑠, 𝑠 ′ ) 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
By Theorem 2.8, 𝐴 is an IF fuzzy bi-ideal of X. To prove: 𝐴 is prime.
Let 𝐶 & 𝐷 be two IF bi-ideals of X such that 𝐶. 𝐷 ⊆ 𝐴.
Enough To prove: 𝐶 ⊆ 𝐴 (𝑜𝑟) 𝐷 ⊆ 𝐴. Suppose 𝐶 ⊈ 𝐴 and 𝐷 ⊈ 𝐴.
Then 𝐶(𝑥) > 𝐴(𝑥) and 𝐷(𝑦) > 𝐴(𝑦), ∀ 𝑥, 𝑦 ∈ 𝑋.
Now, 𝐴(𝑥) ≠ (1,0) and 𝐴(𝑦) ≠ (1,0) ⟹ 𝐴(𝑥) = 𝐴(𝑦) = (𝑠, 𝑠 ′ ) and also 𝑥, 𝑦 ∉ 𝐴(𝑡,𝑡 ′ ).
Since 𝐴(𝑡,𝑡 ′ ) is a prime bi-ideal, we have that 〈𝑥〉〈𝑦〉 ⊄ 𝐴(𝑡,𝑡 ′ ) .
Since 𝑎 = 𝑙𝑚, 𝑐 = 〈𝑥〉& 𝑑 = 〈𝑦〉. Then 𝐴(𝑎) = (𝑠, 𝑠 ′ ) and also 𝐶. 𝐷(𝑎) ≤ 𝐴(𝑎) = (𝑠, 𝑠 ′ )

412
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

𝑠𝑢𝑝
But 𝜇𝐶.𝐷 (𝑎) = 𝑎=𝑙𝑚min{𝜇𝐶 (𝑙), 𝜇𝐷 (𝑚)} ≥ min{𝜇𝐶 (𝑙), 𝜇𝐷 (𝑚)} ≥ 𝑚𝑖𝑛{𝜇𝐶 (𝑥), 𝜇𝐷 (𝑦)}
> 𝑚𝑖𝑛{𝜇𝐴 (𝑥), 𝜇𝐴 (𝑦)} = (𝑠, 𝑠 ′ ) = 𝜇𝐴 (𝑎).
𝑖𝑛𝑓
𝛾𝐶.𝐷 (𝑎) = 𝑎=𝑙𝑚max{𝛾𝐶 (𝑙), 𝛾𝐷 (𝑚)} ≤ max{𝛾𝐶 (𝑙), 𝛾𝐷 (𝑚)} ≤ 𝑚𝑎𝑥{𝛾𝐶 (𝑥), 𝛾𝐷 (𝑦)}
< 𝑚𝑖𝑛{𝛾𝐴 (𝑥), 𝛾𝐴 (𝑦)} = (𝑠, 𝑠 ′ ) = 𝛾𝐴 (𝑎).
Therefore, {0} ≠ 𝐶. 𝐷 ⊃ 𝐴(𝑡,𝑡 ′ ) . Which is a contradiction to 𝐴(𝑡,𝑡 ′ ) is a prime bi-ideal.
Hence 𝐴 is an IF prime bi-ideal of X.
Theorem: 3.1.12
Let P be a prime bi-ideal of X and 𝛼 be a prime element of 𝐿, 𝐿 ∈ [0,1]. Let 𝐴 be an IF subset of X defined by,
1 𝑖𝑓 𝑥 ∈ 𝑃
𝐴(𝑥) = { if and only if 𝐴 is an IF prime bi-ideal of X.
𝛼 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
Proof:
Clearly, 𝐴 is a non-constant IF bi-ideal. To prove: 𝐴 is prime.
Let 𝐶 & 𝐷 be two IF bi-ideals such that, 𝐶 ⊈ 𝐴 and 𝐷 ⊈ 𝐴.
Then there exists 𝑥, 𝑦 ∈ 𝑋 such that 𝐶(𝑥) ≰ 𝐴(𝑥) and 𝐷(𝑦) ≰ 𝐴(𝑦).
This implies that 𝐴(𝑥) = (𝜇𝐴 , 𝛾𝐴 )(𝑥) = 𝐴(𝑦) = (𝜇𝐴 , 𝛾𝐴 )(𝑦) = 𝛼 and hence 𝑥, 𝑦 ∉ 𝑃.
Since P is prime, then there exists an element r in X such that 𝑥𝑟𝑦 ∉ 𝑃.
Now, we have 𝐴(𝑥) ≰ 𝛼 and 𝐴(𝑟𝑦) ≰ 𝛼 (otherwise 𝐷(𝑦) ≰ 𝛼 ) and since 𝛼 is prime,
𝐶(𝑥). 𝐷(𝑥𝑦) ≰ 𝛼 and hence 𝐶. 𝐷(𝑥𝑟𝑦) ≰ 𝛼 = 𝐴(𝑥𝑟𝑦) so that {0} ≠ 𝐶. 𝐷 ⊈ 𝐴.
Hence 𝐴 is an IF prime bi-ideal.
Conversely,
Let 𝐴 be an IF prime bi-ideal. Then, 𝐴(0) = 1.
Next, we observe that 𝐴 assumes exactly two values.
Let 𝑎 & 𝑏 be elements of X such that 𝐴(𝑎) < 1 & 𝐴(𝑏) < 1 .
1 𝑖𝑓 𝑥 ∈ 〈𝑎〉
Define 𝐶 & 𝐷 as, 𝐶(𝑥) = { and 𝐷(𝑥) = 𝐴(𝑎), ∀ 𝑥 ∈ 𝑋.
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
By Theorem: 2.8, 𝐶 & 𝐷 are IF bi-ideals. And also we have 𝐶. 𝐷(𝑥𝑦) ≤ 𝐴(𝑥𝑦), ∀ 𝑥, 𝑦 ∈ 𝑋.
And hence 𝐶. 𝐷 ⊆ 𝐴. Put 𝐶 ⊈ 𝐴. Since 𝐶(𝑎) = 1 > 𝐴(𝑎).
Since 𝐴 is an IF prime bi-ideal andso 𝐷 ⊆ 𝐴 so that 𝐷(𝑏) ≤ 𝐴(𝑏) hence 𝐴(𝑎) ≤ 𝐴(𝑏).
Thus 𝐴 assumes only one value, say 𝛼 other than 1. Let 𝑃 = {𝑥 ∈ 𝑋/𝑓(𝑥) = 1}.
1 𝑖𝑓 𝑥 ∈ 𝑃
Then clearly, P is a proper bi-ideal of X and for 𝑥 ∈ 𝑋, 𝐴(𝑥) = { .
𝛼 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
Now, to prove: P is a prime bi-ideal of X &𝛼 is a prime element in L.
That 𝛼 is prime follows that the fact that for any 𝑎 ∈ 𝐿 & for the constant map𝑎̅ ≤ 𝑃 iff 𝑎 ≤ 𝛼.
Let 𝐽 & 𝐾 be two bi-ideals of X such that 𝐽𝐾 ⊆ 𝑃.Then 𝜒𝐽 𝜒𝐾 = 𝜒𝐽𝐾 ⊆ 𝜒𝐼 ⊆ 𝐴 so that 𝜒𝐽 ⊆ 𝐴 𝑜𝑟 𝜒𝐾 ⊆ 𝐴.
Which implies that 𝐽 ⊆ 𝐴 (𝑜𝑟) 𝐾 ⊆ 𝐴.
Corollary: 3.1.13
Let L be a complete chain and P is a bi-ideal of X. Then P is a prime bi-ideal of X iff 𝜒𝑃 is an IF prime bi-ideal
of X.
Theorem: 3.1.14
Let 𝐴 be an IF bi-ideal of X. Then the following are equivalent:
(i). 𝐴 is prime

413
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

(ii). For any two IF bi-ideals 𝐶 & 𝐷 of X such that 𝐶 ⊈ 𝐴 & 𝐷 ⊈ 𝐴 ⟹ 𝐶. 𝐷 ⊈ 𝐴.


(iii). For any two elements 𝑥, 𝑦 ∈ 𝑋 such that 𝑥 ∉ 𝐴 & 𝑦 ∉ 𝐴 ⟹ 〈𝑥〉. 〈𝑦〉 ≰ 𝐴.
Proof:
(i)⟹ (ii):
Proof is obvious.
(ii)⟹ (iii):
Suppose (ii) is true.
Let 𝑥 & 𝑦 be any elements of X such that 𝑥 ∉ 𝐴 & 𝑦 ∉ 𝐴.
Hence 〈𝑥〉 ≰ 𝐴 &〈𝑦〉 ≰ 𝐴 ⟹ 〈𝑥〉. 〈𝑦〉 ≰ 𝐴 ( By (ii)).
(iii)⟹ (i):
Suppose (iii) is true.
To Prove: 𝐴 is prime. Suppose 𝐴 is not prime.
Then there exists 𝑥, 𝑦 ∈ 𝐴 such that〈𝑥〉. 〈𝑦〉 ∈ 𝐴 ⟹ neither 𝑥 ∉ 𝐴 nor 𝑦 ∉ 𝐴.
Which is a contradiction to (iii).
REFERENCES
[1] Chinnadurai.V, Kadalarasi.S, Fuzzy bi-ideals in near-subtraction semigroups, Annals of fuzzy mathematics
and information, 12 (6) (2016) pp. [781-790].
[2] Kim K.H & Jun Y.B, “On ideals in subtraction algebras”, Sc. Math. Jpn. 65 (2007), [pp. 129-134].
[3] K.Mumtha & V.Mahalakshmi, Fuzzy weak bi-ideals in near-subtraction semigroups, JETIR 6 (2) (2019).
659-664.
[4] Mumtha.K and Mahalakshmi.V, Weak prime bi-ideals & weak prime fuzzy bi-ideals in near-rings, Adv.
Math. Sci. Journal 8, (2019) [pp. 162-170].
[5] Mumtha.K and Mahalakshmi.V, Fuzzy prime ideals in near-subtraction semigroups, Alochana Chakra
Journal 5, (2020) [pp. 269-277].
[6] Mumtha.K and Mahalakshmi.V, Prime fuzzy bi-ideals in near-subtraction semigroups, International
Journal of Fuzzy Systems and Advanced Applications 7 (2020) [pp. 29-33].
[7] K.Mumtha & V.Mahalakshmi, Prime anti-fuzzy bi-ideals in near-subtraction semigroups, Advances and
Applications in Mathematical Sciences 21 (2) (2021) [pp. 555-563].
[8] Prince Williams.D.R, Fuzzy ideals in near-subtraction semigroups, International Journal of Computational
& Mathematical Sciences, 2 (2008) [pp. 39-46].
[9] Schein.B.M, Difference semigroups, Communications in Algebra 20 (1992) [pp. 2153-2169]
[10] L.A.Zadeh, Fuzzy sets, Information and control 8 (1965) 338-353.

AUTHOR DETAILS:

K. MUMTHA1 AND V. MAHALAKSHMI2


1
Research Scholar, P.G & Research Department of Mathematics, A.P.C.Mahalaxmi College for Women,
Thoothukudi, Affiliated to Manonmaniam Sundaranar University, Abishekapatti, Tirunelveli, Tamilnadu, India
2
Assistant Professor, P.G & Research Department of Mathematics, A.P.C.Mahalaxmi College for Women,
Thoothukudi, Tamilnadu, India

414
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

RENDEZVOUS POINT SELECTION WITH MULTIPLE MOBILE SINKS IN WSN BY USING


ENHANCED CLUSTERING AND ANT COLONY ALGORITHM

DEEPAK KUMAR SINGH, DHIRENDAR KUMAR AND SAURABH JHA

ABSTRACT
This article proposed an enhanced metaheuristic optimization algorithm that is inspired by nature. In the
Wireless sensor network mobile sink WSNMS is used to collect data from each sensor and send it to the base
station. To avoid delay in visiting all the sensor nodes, MS can allow only some locations or points, known as
rendezvous points. Most current techniques employ static sinks, which can result in data losses and sensor node
premature death, resulting in energy hole issues and poor data gathering. We proposed an improved clustering
approach with multiple mobile sinks and enhanced ant colony optimization ACO algorithm for effective data
collection to solve data loss and network lifetime reduction. The proposed method's efficiency is evaluated and
compared to current algorithms. The procedure of multiple mobile sinks is adapted so that the first MS visits a
cluster of heads CHs, followed by the second MS visits a group of unvisited CHs. As a result, all the CHs were
visited by a set of MSs. The simulation outcomes show that the suggested approach successfully increases the
network lifespan and decreases the loss of data.
Keywords: ACO, Clustering, Multiple mobile sinks, WSNMS.

1. INTRODUCTION
In a transmission scheme, network sensor nodes send their data to the base station, but a mobile sink has been
proposed as a mechanism for information gathering in WSN to manage energy consumption geographically
among the sensors in the network. WSN sensor nodes are battery-powered devices that gather data from the
atmosphere and transmit those to a sink for assessment.WSNs are essential components for wireless networking
because they collect data from the atmosphere and transmit it to the sink node (s). The bulk of WSN-based IoT
(Internet of Things) applications are delay-sensitive real-time programmes. Consequently, having a solid
database is crucial. A variety of data collection methods have been used by WSNs, including mobile sensors,
mobility-based systems, and static sinks. Any data gathering methods that are transmitted can help WSNs
decrease latency, battery usage, and data management.
In wireless sensor networks, several sensing devices are linked together to carry out shared or cooperative tasks.
Generally, these nodes are connected to a multi-hop network. WSNs are being used to monitor the environment,
medical monitoring and health, industrial monitoring, and many other applications.
In WSNs, data from sensor nodes are normally transferred to the discharge via multi-hop communication, to
reduce the node's energy consumption. While the data-transmission method improves the network's overall life,
it also causes energy issues and the premature death of sensor nodes. The next aim is to determine the best route
for the MS covering this Routing Protocol, once the best Routing Protocols have been selected from the
network. Artificial intelligence techniques have recently been used to establish solutions to complex computer
challenges. The organically-inspired swarm intelligence algorithms are a class of artificial intelligence
techniques that aim at solving optimization problems in particular. The solutions are stochastically determined
by using a set of parameters based on a pheromone model according to their variables. Because the load
parameter has been included, RPs with greater load will be given more priority during data collection, which
can solve buffer overflow problems and reduce energy expenditure in data retention in node buffers for a long
time, thus improving the life of WSN. The MS then passes the defined data collection course, visits every RP
exactly once, and returns to the point of departure.
Self-configured and infrastructure networks for physical or environmental conditions, such as temperature,
sound, vibration, pressure, motion, or pollutants can be defined as Wi-Fi Sensor Networks (WSN), and their
data can collaboratively be passed through the network on to the main site or sink, where the information can be
identified and evaluated.
The Wireless Sensor Network (WSN) is made up of a large number of small and low-cost sensor nodes which
are outfitted with various electronic gadgets that can interact with their surroundings by sensing or controlling
physical parameters. These sensor nodes must collaborate for a specific application because a single node is
incompetent of doing so, and they communicate wirelessly among themselves.
415
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

In WSNs, information collected from sensor nodes is normally transferred to the sink via multi-hop
connectivity, to reduce the nodes' energy usage. While a data-transmission method enhances the network's
overall life, it also triggers energy problems and the premature killing of sensor nodes.
While this method of data transfer enhances the network's life, it also tends to cause energy-withstanding
problems and the early death of sensor nodes. The sensor nodes near the sink forward not only their information
to the sink but also information from their nearby nodes with this methodology. In particular, Therefore, the
nodes close to the sink sooner will release power and die. This makes it extremely difficult to transmit the
information from other nodes to the base station, leading to network distribution problems, deteriorating service
quality, and reducing system capacity. Several techniques, such as clustering and routing, were proposed in the
literature to minimize the above-mentioned problems; some of them will be discussed below. As in the case of
Rendezvous point head selection.
Currently, the most difficult unresolved challenges in the process include: (1) the energy hole problem, where
data streams follow a multifunctional mode, which causes nodes close to the Sink to increase traffic loads,
resulting in premature energy depletion and creation of a power hole around the Sink.
Due to many constraints of WSNs on various applications, most existing algorithms to balance the energy usage
of sensors are too hard to implement. These limitations have significant consequences for the success of existing
algorithms in many practical uses. Assume in this paper that a sensor network with multiple mobile sinks is to
be deployed for monitoring a mobile region and that the mobile sinks in the supervised region have a local
linked route map. The problem is how these mobile plumbing devices are programmed for as much information
as possible from sensor devices to extend the life of the network. In the article, the issue of energy efficiency of
several mobile sinks for sensor networks is a novel restricted optimization issue. We then propose an effective
algorithm, called the mobile sink movement algorithm Artificial Bee Colony, for the problem that maintains not
only the workload between the mobile sinks as well as the energy consumption between the sensor nodes.
This paper presents the MWSN data collection strategy focused on the artificial colony algorithm as a reliable
and efficient information gathering mechanism. These papers can summaries the main contributions as follows:
(1) Compilation of mobile Sink data, selection flaws with cluster, and enhancement of mobile Sink paths. (2)
Mobile Sink path efficiency can be formulated as a short path problem finding; the bee colony technique can be
utilized to optimize the solution's features and the shortest distance of the mobile Sink to improve network data
collection efficiency Honey bees are nature experiencing several complicated behavior patterns, including
matting, breeding, and foraging. These conducts were mimed by several optimization techniques focused on
honey bees. Because of the complicated behavior, the proposed study chose bee colony optimization for path
optimization. The sequence of this paper is structured as follows: The introduction is developed in Section 1.
Section 2 contains a review of the research literature. Section 3 proposed work done. Sections 4 and 5 present
numerical results and conclusions, respectively.
2. RELATED WORK
In this article, many studies have been published in the past few years on various MS processes. We have some
discussion of the literature on MMS in wireless sensor networks.
Many writers have examined various data collection methods for WSNs that use static sinks or MS in previous
years. In static sink data collecting, non-uniform energy loss reduces efficiency and shortens the network's life.
The drawbacks of static sink-based data collecting have led to the development of mobility-based approaches
that leverage MS to achieve energy balance and dependability. Using the direct strategy, an MS-based data
collecting method visits each node to get the sensed data. The final data collecting process would be greatly
delayed, which is undesirable for time-sensitive applications because this method requires time. The ideal
amount of sinks in a WSN should be deployed and repositioned using a hybrid method, according to the
authors.
The authors proposed MS going in a limited direction as a data collecting method for big data gathering in a
delay-sensitive environment [1]. A journey plan algorithm for mobile collection was described by the author,
with minimum coverage as an objective. To extend network lifetime and prevent energy gaps, the authors
suggested weighted rendezvous planning (WRP) as a technique for choosing the best RPs in a WSN [3]. We
looked into the energy optimization problem with rendezvous nodes and MS by accepting an ACO-based inter-
cluster data aggregation system. To determine trajectories among the RP in the aforementioned approach, the
authors employed the travelling salesman problem technique. The sensor nodes closest to the RP in WRP use
the most energy when transferring data in a multi-hop kind.
416
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

An approach to choose the RP group in a sensor network and minimise travelling length has been reported by
authors [2]. For the WSN, they have suggested a particle swarm-based clustering approach. The method finds
the most efficient movement of the mobile sink using a virtual clustering technique to increase network
efficiency. The best RPs are chosen in this procedure based on the sensor nodes' location and remaining energy.
The MS is only permitted to gather data from the cluster heads (CHs), and the authors used a k-dimensional
cluster-based approach. Because of the forwarding load, nodes near to CHs take maximum energy in this
process. So, the author proposed a TCBDGA algorithm for data collection and also for the enhancement of
network lifetime. In this algorithm, a tree is constructed by a clustering mechanism and the tree’s root is used as
RPs. As the height of the tree increase so then, the forwarding load of the sensor node close to RPs is also
increasing and it takes us to the hot-spot problem. Due to this sub-RPs came into existence to balance the height
of the tree.
Sharma et al. published a rendezvous-based routing protocol (RRP) that satisfies the need for energy efficiency
and low end-to-end latency [6]. In this protocol, there are two distinct data transfer modes. The above protocol
speaks about other protocols in terms of energy consumption, and network lifetime.
Deng et al. looked at the issue of multiple sinks collecting data and came up with a sub-optimal online
algorithm using a primal-dual solution that required very little a priori knowledge [5]. The authors technically
calculated the online algorithm's competitive ratio and then improved it by finding the best sink position using
an approximation ratio.
Mottaghi and Zahabi proposed a minimal LEACH clustering algorithm for MS and rendezvous sensor nodes.
This algorithm incorporated the use of LEACH, rendezvous points, mobile sinks, and to boost the CH selection
process while preserving LEACH's benefits [7]. In comparison to regular LEACH, the algorithm used the least
amount of network resources.
3. Proposed Work
In this, firstly we have a discussion on route formation in which we will have some discussion on the work of
MS and Cluster head selection and secondly, we will use EMMS (Enhanced Multiple mobile sinks) path
formation algorithm and MMSBACO (Multiple mobile sinks based Ant colony optimization) to achieve energy-
efficient data collection.
3.1 Clustering Head Selection
In the proposed clustering strategy, the modified LEACH algorithm is applied. Sensors are installed in the
tracked area and then partitioned into a series of clusters using the steps below. The network's cumulative
residual capacity, 𝐾𝑡 , is measured as
𝑚

𝐾𝑡 = ∑ 𝐾𝑟𝑠
𝑟=1
where 𝐾𝑟𝑠 (𝑟) states the node r's residual capacity. The total residual energy of the sensors is then calculated to
find a threshold value:
𝑃𝑟𝑐 𝐾𝑡
.
𝐸ℎ = {1 − 𝑃𝑟𝑐 ( 𝑟𝑜𝑛 𝑚𝑜𝑑 1/ 𝑃𝑟𝑐 ) 𝐾𝑟
0
If h ∈ S, otherwise, (2)
As 𝑃𝑟𝑐 is the percentage of cluster heads, S is the set of all nodes that are not chosen as a cluster head in the
most recent 1/ 𝑃𝑟𝑐 rounds, 𝑘𝑟 is the total initial energy of all the nodes in S, and 𝑟𝑜𝑛 is the current rounds
numbers.
In each round, each sensor creates a random number between 0 and 1. The created number of all sensor is
compared with the already defined threshold 𝐸ℎ . As the generated value of the sensor, Sr is less that 𝐸ℎ , Sr is
going to be selected as a CH. So then when more than one sensor gives the same value, the node with the
maximum residual energy is carried as CH for that specific cluster. Once CH is selected, then they send a
message to each sensor node. Finally, to prevent data clashes in the network, the cluster heads transmit time-
division multiple access (TDMA) signal messages to their participants with schedule information for data
transmission.

417
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

3.2 Path Formation


Currently, as we have seen that Multiple mobile sink (MMS) methods are attracting a lot of interest from WSN
researchers, Because of their ability to help achieve successful network lifespan and efficient data gathering. In
a WSN atmosphere, we have an MMS network with K cluster heads and N MSs. Every Mobile sink is given to
a subset of CH having one initial point. In every round, one of the MSs should have to visit all cluster heads at
least once, and every MS should visit at least one CH. One of the key goals of the proposed solution is to reduce
the MS's tour distance without sacrificing data. The dilemma of data gathering with MS is near to that of the
traveling salesman problem (TSP). It's an NP-hard problem, but a heuristic algorithm can help to find near-
optimal solutions.
The introduced routing method is having below steps: (i). A disjoint subset of cluster heads is assigned to each
MS. (ii) Identifying the MS's visit order. An average number of CHs is allocated to every MS to obtain better
energy consumption and to obtain a minimal path for each MS, as follows:
Kch (MS) = e (CH) /e (MS) (3)
Where Kch is the number of CH as- signed to an MS, e (CH) defines the number of CHs, and e (MS) introduced
is the number of MSs.
For all MS, the MS member (CH) is issued based on a path matrix, where entries have distance between the
CHs and MSs in the network. The distance matrix is introduced as:-
l11 l12 … l1p
D (MS, CH) = l21 l22 … . l2p (4)
lm1 lm2 … . lmp
Where the row indicates the MS number and the column indicates the CH number. All MS is assigned by CH
which is calculated by the minimum value in the concordant column of the above matrix. The below is a more
comprehensive explanation.
The member of rah MS where MSr can be given as a subset of K, Which is Kr ⊂ K ……. (5)
In this r is the index of MS and r = 1, 2, 3, m. Based on the conditions below, a subset of CHs (Kr) is generated
and given to. The gap between the CH and MSs d (, CHc) in the sensor network is compared. CHc is assigned to
the subset of, if d (, CHc) value is minimal in r = 1, 2, 3, ···, m. For example, if the gap between MS 2 and the
CH1 is less than other MSs, CH1 will be assigned to MS2. So then, all the CH are reported to their corresponding
MSs. If a CH has the optimal gap with MMS, then the CH is assigned to any one of the MS.
minr=1,..m d( MSr , CH1 ) , minr=1,..m d( MSr , CHp ) (6)
For every MSs, MSr a finite number of disjoint subsets of cluster heads CHc is formed using (6). So K is
partitioned into several disjoint subsets Kr r = 1, m, in which Kr= {Kr1, 𝐾𝑟𝑙𝑟 }
The nth path of the rth MS MSr is given as
S r,n = { Posini (MSr ) , Pos (Pr ) , Posini (MSr) } (7)
In this Posini ( MSr ) indicates the first position of MSr and Pos( Pr ) represents the CH positions in Pr.
To evaluate the total path gap pG traveled by MSr, we compute the following:
𝑙 −1
pG(S r,n) = d(MSr, Pr1 ) + ∑𝑐=1
𝑟
𝑑(𝐾𝑟𝑐 , 𝐾𝑟,𝑐+1 ) + d(𝐾𝑟𝑙𝑟 , MSr ) ……..(8)
Whereas, d ( .., ..) indicates the gap between CHs and between a CH and MS. The MS MSr initiate from the
first point, Returns to the starting point after visiting all CHs in Pr in increasing order of indices.
The better sequencing of Krc in Kr is one with less travel length pG(S r,n). Therefore, to find the sequence of Krc
in Kr for every n, now we have given below optimization problem:
Min𝑆𝑟,𝑛 pG (𝑆𝑟,𝑛 ) (9)
So this is a Travelling salesman problem, that is NP-hard. To overcome this problem, we adopt MMSBACO,
and which is explained in Section 3.3. and the algorithm below describes the multiple MS path formation.

418
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Algorithm: EMMS Path Formation.


Given: MS coordinate, CH coordinate
Output: Travelling route for MMSs
1: Percentage evaluate average number of CHs assign to MS:
2: Kch (MS) = e (CH) /e (MS)
3: Formation of distance matrix dMatr(.., ..) for MSs and CHs by (9)
4: Percentage assignment of CH to the nearby MS
5: using loop c: = 1 to m
6: A= armindMatr (:, c)
7: end loop
8: If |A| == 1 it is then
9: Allocate CHc to MSA
10: else
11: Assign CHc to MSr, r ∈ I
12: end if
13: Call MMSBACO for routing
14: Preparing data gathering
15: Repeat the procedure until the MSs Path is established.
3.3 Ant Colony Optimization (IACO)
The Ant Colony Optimization (ACO) algorithm, which was modelled after the behaviour of actual ants, was a
metaheuristic challenge for optimization algorithms in the early 1990s. This approach was initially developed to
address the Traveling Salesman Problem (TSP), which required identifying the cities along the shortest path.
The ACO has attracted a lot of interest in popular applications including network communication, screensavers,
cardinality trees, Bayesian networks, serial ordering and rating standards, etc. The ACO algorithm creates the
solution iteratively, with numerous artificial ants constructing a fix at each step of the process. Each ant in TSP
constructs a solution by travelling to a single city at a time until it has seen every one of them. The pheromone
concentration or value determines which cities an ant will visit next.
Compared to other algorithms, ACO can produce better results. In order to discover the optimal path from CHs
with energy-efficient data collection, we can use MMSBACO. The MS method was used to fix the hop-spot
issues, prevent data loss, and extend the life of WSNs. This base station uses ACO to locate CHs and determine
the path for MSs. The first MS iterations have therefore been finished, or an acceptable solution has been found,
according to the MMSBACO. The final product might be viewed as the ideal route for an MS. travel to a group
of CHs, and the second MS travel to a group of CHs that have not yet been visited. in this manner, all the CHs.

419
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

3.4. Algorithm Flow Diagram:-

(Figure 1: MMSBACO steps for ant colony optimization.)


3.5. Path Optimization
In this, for ant colony-based path minimization, every ant finds the new CH appropriately. The given below
formula is used for the probability Pro(𝑡)𝑛𝑟𝑐 of the nth ant moving from the CH r to the CH c:
[𝜌𝑟𝑐 (𝑡)]𝛽 [𝜏𝑟𝑐 ]𝛾
Pro(𝑡)𝑛𝑟𝑐 = { 𝛽
, c ∈ allowedn
∑[𝜌𝑟𝑙 ] . [𝜏𝑟𝑙 ]𝛾
0
So that ρrc (t) is the pheromone stored on the route from the rth CH to cth CH., which is expressed from the
strength of the pheromone in between the rth CH and cth CH. τrc can be calculated by the 1/drc, in which drc is
gap between the CH r to CH c. and the allowedn indicates the CH that unvisited by ant n. Then β and γ are the
constant parameters, and this parameter also suggests the ants in decision making.
So to achieve good output, the pheromone values of the ants are updated in every step. Which helps ant
performance and gives a better solution. The trail updating method has local and global updation. The local
update can be carried out by given below equation:
𝜌𝑟𝑐 (𝑡 + 1) = (1- η). 𝜌𝑟𝑐 (𝑡) + ∆𝜌𝑟𝑐
In which η indicates the rate of pheromone evaporation, which can manage the speed of evaporation, t tells the
number of steps counter, η∈[0,1] is a value that controls the degradation of 𝜌𝑟𝑐 and it is the pheromone count in
the present step, that is distributed on the edges. and ∆𝜌𝑟𝑐 can be calculated as :
∆𝜌𝑟𝑐 = ∑𝑀 𝑛
𝑛=1 ∆𝜌𝑟𝑐

In this each ant n left behind the rth CH and reached the cth CH leaves a certain amount of pheromone behind is
evaluated by
𝑛 𝑉
∆𝜌𝑟𝑐 =𝐿 ,
𝑟𝑐

In the above equation V is constant and 𝐿𝑟𝑐 is the distance in which ant n moves from the CHr to the CHc.
This upgrade mechanism allows it to find a shorter path and improves the chances of finding the best optimal
path. This method is replicated before the predetermined amount.
420
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

4 PERFORMANCE ANALYSES
This section goes over the experimental setup and performance of the proposed method. The performance of
cluster-based routing is evaluated using various metrics such as alive nodes, dead nodes, average energy
consumption, delay, total packet sent, throughput, FND, HND, and LND. Where FND denotes the number of
rounds until the network's first node dies. This FND specifies the length of time that all nodes are fully
operational.
ACO can give better output than any other algorithms. So that we can apply MMSBACO that optimize path
from CHs with energy-efficient data gathering.
5 CONCLUSION
To increase the data gathering performance and network lifespan of WSNs, we introduce a new MMS-based
solution. To group the sensor nodes and pick cluster heads, a revised LEACH-based clustering technique was
used. MS functioned like a robot in this situation, gathering data from the network's CHs. Routing becomes
more appropriate and adaptable to changes in the WSN topology with the ACO-based MS solution. MMS
reduced the time it took to collect data from both clusters, extended the network's existence, and prevented data
loss. When opposed to current algorithms, simulation findings showed that the new routing scheme significantly
decreased overall travel distance. Furthermore, as opposed to existing systems that only use a static sink, it has
the potential to greatly extend the network's lifespan. MS may be combined with another bio-inspired algorithm
in the future to test their usefulness, and the sensor nodes' mobility will be taken into account.
6. REFERENCES
[1] Prachi Maheshwari, Ajay K.Sharma, KaranVerma “Energy efficient cluster based routing protocol for
WSN using butterfly optimization algorithm and ant colony optimization” Ad Hoc Network Volume 110, 1
January 2021, 102317.
[2] S.-K. Yang, C.-G. Liu and T.-L. Lee, "AN EFFICIENT USER AUTHENTICATICATION SCHEME FOR
MULTIPLE ACCESSES SCENARIO IN WSN BASED IN IOT NOTION The International Journal of
Organizational Innovation," 2020.
[3] Yu Gao1, Jin Wang 1,2,3,*, Wenbing Wu 2, Arun Kumar Sangaiah 4 and Se‐Jung Lim 5”
Travel Route Planning with Optimal Coverage in
Difficult Wireless Sensor Network Environment “19, 1838; doi:10.3390/s19081838, Sensors 2019.
[4] G. Eason, B. Noble, and I.N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products
of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529-551, April 1955.
[5] Deng et al., Wireless Algorithms, Systems, and Applications, 4th International Conference, WASA 2009,
Boston, MA, USA, August 16-18, 2009. Proceedings.
[6] Sharma, Suraj & Puthal, Deepak & Jena, Sanjay & Zomaya, Albert & Ranjan, R.. (2017). Rendezvous
based routing protocol for wireless sensor networks with mobile sink. The Journal of Supercomputing. 73.
10.1007/s11227-016-1801-0.
[7] Mottaghi, Saeid and Mohammad Reza Zahabi. “Optimizing LEACH clustering algorithm with mobile sink
and rendezvous nodes.” Aeu-international Journal of Electronics and Communications 69 (2015): 507-514.
[8] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media
and plastic substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740-741, August 1987 [Digests
9th Annual Conf. Magnetics Japan, p. 301, 1982].

AUTHOR DETAILS:

DEEPAK KUMAR SINGH, DHIRENDAR KUMAR AND SAURABH JHA


Department of Computer Science, PSIT College of Higher Education, Bhauti-Kanpur, India

421
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

POLICE REFORMS IN INDIA- A CRITICAL ANALYSIS

TANISHA GUNIYAL AND DR. LAKSHMI PRIYA VINJAMURI

ABSTRACT
The police force is an integral part of the state's justice system. The term "police" refers to state agents whose
primary responsibility is to maintain law and order, particularly through the enforcement of the regular
criminal code. In today's world, the police are responsible for not only the prevention of crimes and the
detection of criminals, but also for other social services such as assisting in the enforcement of traffic laws,
crowd control at public meetings and fairs, assisting the fire department and flood rescue teams, and assisting
the public in resolving minor disputes. However, the research paper is not limited to the definitional element of
police but police reforms in India, the obstacles faced by police in their administrative functions, the strategies
that are supposed to be used to address these issues of operability and feasibility of operation, and the legal
position in this regard.
Keywords: Police System, police reforms, Insight into the Indian Perspective

INTRODUCTION
The police in this country are the instrumental in enforcing the Rule of Law; they are how civilized society
maintains peace and order so that people may live safely in their homes and go freely about their lawful
business. Thus, police are the law enforcement agency whose fundamental duty is to serve mankind, safeguard
people'slives and property, to protect the innocent against deception, the weak against oppression or
intimidation, peaceful against violence and disorder and to respect constitutional rights of all men to liberty,
equality, and justice. Discussion on police is insufficient without its origin. In a wider sense the word Police was
used to connote the management of internal economy and the enforcement of government regulations of a
particular country.
The word ‘Police’ is derived from the Greek word ‘Polietia’ or its Latin equivalent ‘Politia.’ Theterm ‘Police’
connotes a body of Civil servants whose primary duties are preservation of order, prevention and detection of
crimes and enforcement of law. In India the great ancient law giver Manu emphasised the need of the Police
force for maintenance of law and order. He suggested that Police functions could be entrusted to only those who
were well acquainted with the local people and were dedicated to the cause of protection of society against law
violators. Though it can be traced that in India Police prevailed in the reigns of Hindu rulers and in Mughal
rulers, the British Government enacted the codified Police Law and as a result the Police Act, 1861 in India
which prevailed for the whole of India as the holy Bible for Police organisations. The State Police Acts were
drafted after Honourable Supreme Court of India directives inPrakash Singh and others v. Union of India and
otherscase in the year 2006 and the central government’s Model Police Act (2006) came into being in Assam
also the Assam Police Act, 2007 was enacted and enforced in the State of Assam. The understanding ofpolice
functions and their very requirements has its basis in the Indian Constitution.
The Constitution of a state is a core document having a special legal sanctity which sets out the framework and
the principal functions of the organs of the Government of the State and declares the principles governing the
operation of those organs. The Constitution is the foremost law of the country, and all the laws of the country
are enacted under the constitution. This constitution in its 7th schedule placed Police in Entry 2 of List II- in
State List. Police as a complete State subject must be governed under State Police Acts and Rules through the
act of 1861prevailedacross India till recent times.
Police Reforms in India
India's police are governed by archaic and colonial police laws dating back to 1861. Under the Indian
Constitution, policing is a state power, which means that state governments have the responsibility to provide
their communities with a police service (the national government has the responsibility for policing in union
territories). Most state governments have a police law that adopts or reflects the basic ideas of the 1861
legislation. There has been almost 30 years of debate on policing and reform in India, with commission after
commission submitting reports and recommendations to governments. Each report has gone unimplemented.

422
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Comparison of the Police Act 1861 and Model Police Act, 1861:
The Police Act 1861is not the sole or only law in relation to police functions.The maintenance of public order
and the criminal justice system are based on the Indian Penal Code (IPC) 1860, Criminal Procedure Code (Cr
PC 1973), Indian Evidence Act, 1872as well as a large number of special legislations including special laws
including Prevention of Terrorism Act (POTA 2002, repealed Act 2004) or Unlawful Activities Prevention Act
(in which many of the provisions of repealed POTA have been incorporated) or Control of Organized Crimes
Act (COCA 1999) as in Maharashtra or Scheduled Castes and Scheduled Tribes (Prevention of Atrocities) Act
1989, apart from the provisions of the Indian Constitution itself .In addition to the laws, there are Police
Regulations (e.g. PRB in West Bengal) and Police Manuals (e.g. Tamil Nadu) in every state laying down clear
guidelines and instructions in regard to the exercise of police powers and duties.
The Model Police Act seeks to cover the entire field of police administration. It is self-sufficient in nature and
does not draw any support from the other substantive law for the purpose of administration. It is an act in the
right direction which can be a good alternative to the archaic Act of 1861.
Police Reforms After 1861
The mutiny of 1857 shook the very roots of the administration of law and order in India. The diversity and
inadequacy of the police machine to deal with the increasing problems of violence and disorder made the
imperial government realise the urgency of a unified and re-organized police system for the entire country. The
heavy expenditure involved in maintaining military-like police to prevent disorder and civil police to detect
disaffection in advance during the days of 1857 upheaval and after compelled the government to appoint an All-
India Police Commission in 1860 to investigate the problems of police administration, and to suggest ways and
means for an increase in police efficiency and to reduce excessive expenditure involved in maintaining the
police force. The terms of reference of the Commission also included a quest for uniformity in the police system
as it obtained in British India.
JUDICIAL APPROACH
Government Exercising General Power of Superintendence
State Of Bihar and Anr vs J.A.C. Saldanha and Ors on 13 November, 1979the StateGovernment this Court held
that as rule 851 (b) provides for appeal and disciplinary proceedings, presumably both, at the instance of the
officer punished or the Department and the rule being statutory having been framed in exercise of powers
conferred by Section 46(2) of the Police Act, there would be no question of the State Government exercising
general power of superintendence under s.3 of the Act. It was further observed that the exercise of such power is
ordinarily possible when there is no provision for an appeal unless there are other provisions providing for it. It
would thus transpire that where the power is limited or fettered or taken away by some specific provision to the
contrary, the general power of superintendence would comprehend power to issue directions, orders for
performance of duty in a certain manner, directing someone else to discharge certain function, refrain from
performing certain duty, etc. Superintendence connotes supervision which implies a hierarchy, viz., supervisor
and the one supervised.
Insurance Coverage for All Police Officers against Injury, Disability, or Death Caused While on Duty
Arun Kumar Bhadauria vs State of Uttarakhand and Others on 15 May 2018The present petition has been filed
in Public Litigation Interest (PIL) seeking better conditions of service for the Police Force in the State of
Uttarakhand.
According to the averments made in the petition, the conditions of service of the police officers and police
personnel should be made humane. The information was sought by the petitioner on various issues of conditions
of service of the police officers and police personnel on 05.11.2011. The information was supplied on
16.01.2013. Petitioner made a representation to Hon'ble the Chief Minister, State of Uttarakhand, on 13.03.2013
for improving the conditions of
service of the police force. The representation was also made to Hon'ble the Chief Justice of this Court on
02.08.2014. Petitioner has approached the State Human Rights Commission. The Commission passed the order
on 18.12.2014. The State Human Rights Commission was informed via letter dated 30.06.2015 that as per the
directions issued by the Hon'ble Supreme Court of India, the Uttarakhand Police Act, 2007 was enacted. The
reply has been filed by the respondent nos.1 and 3. It is highlighted that as per Section 42 of Clause No.1 of the
Uttarakhand Police Act, 2007, the police officers are supposed to work for 24 hours. It is further averred in the
reply that police officers get one month's additional salary as per Govt. Order dated 09.09.1979 in lieu of not
availing the Gazetted Holidays.
423
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

In the case of Arun Kumar Bhadoria v State of Uttarakhand (2018) it was held that the Police Act of 1861
should be replaced by a new Police Act, which not only changes the system of superintendence and control over
the police but also enlarges the role of the police to make it function as an agency that promotes the rule of law
in the country and renders impartial service to the community.
C.E.S.C. Ltd. Etc. vs Subhash Chandra Bose and Ors on 15 November 1991the Judgment of the Court was
delivered by Rangnath Misra, CJ. In which he stated, I have had the advantage of perusing the draft judgments
prepared by my learned brethren Punchhi and Ramaswamy, JJ. While Justice Punchhi has gone by the literal
construction of the statute, brother Ramaswamy has tried to find out the spirit of the legislation and with a view
to conferring the benefit on the workmen, has adopted a construction different from the reported decision of
this) Court.
I agree with Justice Punchhi that the appeals should be dismissed, and the judgement of the Division Bench
should be sustained. At the same time, I would like to add that the legislative intention should have been
brought out more clearly by undertaking appropriate legislation once this Court took a different view in the
decision referred to in brother Punchhi's judgement. The legislation is beneficial and if by interpretation put by
the Court the intention is not properly brought out it becomes a matter for the legislature to attend to Punchhi., J.
The sole question which falls for determination in these appeals is, whether on the facts found, the right of the
principal employer to reject or accept work on completion, on scrutinising compliance with job requirements, as
accomplished by a contractor, the immediate employer, through his employees. is an effective and meaningful
"supervision" as envisaged under Section 2(9) of the Employees' State Insurance Act, 1948 the said provision,
as it stood at the relevant time, is set out below, as is relevant for our purpose.
Appointment National Police Commission
Prakash Singh &Ors vs Union Of India And Ors on 22 September, 2006Considering the far reaching changes
that had taken place in the country after the enactment of the Indian Police Act, 1861 and absence of any
comprehensive review at the national level of the police system after independence despite radical changes in
the political, social and economic situation in the country, the Government of India, on 15th November, 1977,
appointed a National Police Commission (hereinafter referred to as 'the Commission'). The commission was
appointed for fresh examination of the role and performance of the police both as a law enforcing agency and as
an institution to protect the rights of the citizens enshrined in the Constitution.
The terms and references of the Commission were wide ranging. The terms of reference, inter alia, required the
Commission to redefine the role, duties, powers and responsibilities of the police with special reference to
prevention and control of crime and maintenance of public order, evaluate the performance of the system,
identify the basic weaknesses or inadequacies, examine if any changes necessary in the method of
administration, disciplinary control and accountability, inquire into the system of investigation and prosecution,
the reasons for delay and failure and suggest how the system may be modified or changed and made efficient,
scientific and consistent with human dignity, examine the nature and extent of the special responsibilities of the
police towards the weaker sections of the community and suggest steps and to ensure prompt action on their
complaints for the safeguard of their rights and interests.
Problems with Existing Policing System
The police do not have functional responsibility while remaining under the supervision of the political executive
and the internal management systems are not fair and transparent. The policing efficiencies have decreased in
terms of their core functions, also public complaints are not addressed properly, and police accountability is
comparatively less.
Challenges Faced by the Police in the Country
Lack of effective means to collect and analyse the intelligence data collected, deteriorating quality of state
investigation departments, many apex organisations continue to have huge vacancies, outdated arms and
equipment, lack of coordination within the police departments, lack of proper training, political interferenceare
the challenges faced by the police in the country besides the issues like police training and quantity of force
along with the quality, the long working hours as well as the isolation of police force from the public in the
form of separate living quarters should be looked into. Police should be made an integral part of the society they
live in. Police reforms should no longer be delayed, and the civil society should play its role for faster action by
the government.

424
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Scope for Improvement


It is true that many young IPS officers lose their idealism early in their careers, because of fear of vengeful
politicians or disloyal subordinates. They, therefore, become deadwood, which the force cannot get rid of
without prolonged litigation. The ears of proactive and dedicated officers about reprisal over honest action
against powerful men in society and politics are well-known. But how long will the citizens be satisfied with a
non-performing police force? This is the question we should ask ourselves while discussing police reforms. It is
not as if this is a problem that has suddenly come upon the police. It has only ballooned in recent times because
of growing lawlessness promoted by big money and all that goes with it. Unless there is self-correction within
the police, a process initiated by the DGP and his aides, we cannot see a perceptible change in the way policing
is carried out in most parts of the country. Just as there are many bright spots in the police forces, there are an
equal number of enlightened elements in our polity, who are willing to listen to police woes. There is here a
symbiotic relationshipwithout activating which our police forces will remain condemned and shunned by the
law-abiding citizen.
Role of Paramilitary Forces
The Ministry of Home Affairs maintains sevenCentral Armed Police Forces (CAPFs) namely:
The Central Reserve Police Force (CRPF), which assists in internal security and counterinsurgency,
theCentral Industrial Security Force (CISF), which protects vital installations (like airports) and public sector
undertakings, theNational Security Guards (NSG), which is a special counterterrorism force and four border
guarding forces, which are the Border Security Force(BSF), Indo-Tibetan Border Police (ITBP), Sashastra
Seema Bal (SSB), and Assam Rifles (AR).
Modernising the CAPFs:
MHA should ensure the bottlenecks in procurement should be identified and corrective action should be
taken. Moreover, given the evolution of hybrid warfare, the contents of training should be a mix of
conventional matters as well as latest technologies such as ICT, and cyber security.
Augmenting States’ Capacity:
States must develop their own systems and augment their police forces by providing adequate training and
equipment. The central government should supplement the efforts of state governments by providing financial
assistance and other help needed by states for capacity building of their forces.
Corrective Measures in Cadre Policy:
Citing the dissatisfaction in Cadre policy, Joshi Committee recommended that top positions should be filled
from the respective cadre of the CAPF. Further, the Committee recommended that cadre review of all the
CAPFs should be carried out within a defined timeline. It is high time to implement these recommendations as
soon as possible.
Personnel Reforms
Workshops on stress management should regularly be undertaken, and yoga and meditation be made part of
the daily exercise for CAPF personnel. Further, the provision of accommodation near the deployment of the
respective force, to enable personnel to meet their family members, can also be explored.
SUGGESTIONS
Following are the recommendations to improve the police administration.
Healthy Police Public Relations: Good Police-Public Relations is the need of the hour. Police should work as
a public servant; it must work for the welfare of people and not a director. Police must work as a friend and
helper of people. A could be introduced all over the country as it is working in Uttarakhand and found
enthusiastic public response it forms part of the policing paradigm for future. In this way, they get more
publicity. Therefore, 209 police administration would be improved by Community Policing.
Selection of Able Candidates: In the coming time for the improvement of the Police administration, the
candidates selected in police must be capable. Selection process should be made more objective, scientific;
qualification emoluments of the policemen must be substantially reversed to attract better people. They can
meet the demands of society and they must be aware of their duties; it can be possible only if the selection
procedure is changed.
Use of Scientific Methods: One of the major reasons which are responsible for the bad reputation of police is
the methods which are used during investigations by the Police. They are very cruel and inhuman. Those
methods must be changed, and scientific methods must be used like mind mapping, Narcos Test etc. The
425
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

investigation should be conducted in a transparent way. For a top-class investigation, there is need to develop
specialized cells to deal with each type of the major crimes like kidnapping, extortion, murder, car thefts,
organized cyber Therefore, a credible, transparent, and effective methods should be evolved to make
accountable police towards public.
Modernization: Police must use new methods, new sources, modern means of transport and modern arms etc.
So that the efficiency of police is improved by controlling crime and by that trust of the people can be won.
There should be more modernised police forces on the lines of foreign countries and for this purpose; the State
Government should properly allocate the trends per modernization in each district for modernising police
stations by introducing science technology in their work. Funds assessing the civilization committee should be
set up for assessing the proper channelization of the modernization process. Science must be fully invoked to
act as a dual-purpose option as a check on the use of unjustified force on one hand and on the other hand,
documentary proof of police desires to pursue the actions strictly within the bounds of law. So, audio and video
technology during police interrogation must be used. Another problem faced by 210 is the rural areas from
urban one. Due to non-access of wireless equipment, the police department suffers a lot. So, remote control
devices should be brought to improve police administration in the rural areas. By increasing the efficiency of
the police by modernization, its reputation can also be improved.
CONCLUSION
A close study of police behaviour shows that the Indian police has become unruly and turbulent. A policeman
often lacks an expected attitude of sympathy and consideration towards the public at large. There is dire need
today to identify the factors behind policemen erratic attitude and to take initiative to rectify the aberration in
police behaviour and help them to achieve the ideal police culture. There is a change in the methodology of
crime and terrorism. Police are interestingly becoming weak and vulnerable because events have outstripped its
professional ability to handle them or even learn from them. When new problems engulf the society, new
challenges are faced by the state, new demands are made of it and it is exposed to new threats, the police
organisation needs to be reformed. It is revealed during the study that the police organisation strongly indicated
that no serious effort has ever been launched to reform the police and there is need to change the entire system.
The coordination of the International Police organisation with various countries helps to control the increasing
rate of crime. The following areas conclude the whole study which revolves around the police department and
further demands more initiatives and thorough study to launch police reform as a serious, political and
infiltrative agenda. Taking into consideration the prevailing gap between the police and the public which is very
wide despite the concept of Community Policing. It is quite hopeful that these blueprints of proposals will go a
long way in strengthening the relationship between the two and thus, achieving the desired goal of a society
which is free from crime with the mutual help of the police and public in a true sense. Police Administration is a
complex and sensitive field of public administration in India. Its dimensions are multi-faced and varied. It
would not be out of tune to say that a 204 effective police system existed in India in ancient times;yet, it
suffered a setback during the mediaeval period due to foreign invasions, subjugations and over tunes. The
advent of the company in trying to consolidate the administration destroyed the moral and social set-up of the
Indian Society and it was only under the British crown that any sincere attempt was made to give a proper
police set-up. Police perform various functions in their routine work. It is pertinent to mention that the police
believe on the view that it is only meant to deal with crime, criminals without realising any relationship between
cause and effect, the criminogenic factors, various other irresistible and irreversible changes in society and
social order. Nowadays, police work has been claimed as one of the most stressful occupations. Recent
development in the field of political, socio-cultural, and economic has affected the role, functions and manner of
then performance. Police should be given full autonomy and made an autonomous agency in conducting their
functions efficiently in investigation and detection of crime, interrogation, and search. There should not be any
political pressure on the mind of the police. Scientific investigation of crime needs strengthening which cannot
be done without forensic science support service.
BIBLIOGRAPHY
1. Paranjape N.V. Criminology & Penology with Victimology (CLP, Delhi 2011.)
2. Verma, Arvind the Indian Police, A critical Evaluation, (Regency Publications, 2006, Delhi.)
3. Nomani, A.M The Assam Police Laws, 17 (Regional Law House Delhi 2010)
4. Crime in India, national crime record Bureau 2006-2016
5. PIB press release dated 22.07.2015 on Model Police Act.
426
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

6. Royal Commission on the Police in India, 1962


7. N.V. Paranjape - Criminology & Penology with Victimology 85, (CLP, Delhi 2011.)
8. 2006 (6) Suppl. SCR 473,2006 (8) SCC 1, 2006 (9) SCALE 444, 2006 (12) JT 225
9. Arvind Verma, The Indian Police, A critical Evaluation, 26(Regency Publications, 2006 Delhi.)
10. Police Act 1861
11. Indian Penal Code (IPC) 1860
12. Criminal Procedure Code (Cr PC 1973)
13. Indian Evidence Act, 1872
14. Prevention of Terrorism Act (POTA 2002)
15. Prevention of Terrorism Act (POTA repealed Act 2004)
16. Control of Organised Crimes Act (COCA 1999)
17. Scheduled Castes and Scheduled Tribes (Prevention of Atrocities) Act 1989
18. Sections 2A, 2B, 2C and 2D were inserted by section 3 and 2nd Schedule of the Laws (Revision and
Declaration) Act, 1973 (Act No. VIII of 1973)
19. Subs. by Act 8 of 1895, s. 15, for the original section
20. 1975 AIR 326, 1975 SCR (2) 16
21. Uttarakhand Police Act, 2007
22. Ibid sec. 42
23. Available at: https://indiankanoon.org/doc/168199343/ last visited on 20 June 2022.
24. 1992 AIR 573, 1991 SCR Supl. (2) 267
25. 2006 (6) Suppl. SCR 473,2006 (8) SCC 1, 2006 (9) SCALE 444, 2006 (12) JT
26. Ibid, Sec.4.
27. Crime in India, national crime record Bureau 2006-2016
28. PIB press release dated 22.07.2015 on Model Police Act.
29. A.M Nomani. -The Assam Police Laws, 17 (Regional Law House Delhi 2010)

AUTHOR DETAILS:

TANISHA GUNIYAL1 AND DR. LAKSHMI PRIYA VINJAMURI2


1
10th Semester BBA LLB (Hons) and 2Associate Professor, Law College Dehradun, Uttaranchal University,
Dehradun-248007, Uttarakhand, India

427
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

HOMOMORPHISM IN BIPOLAR VALUED I-FUZZY IDEAL OF A RING

PANCHAL CHETNA SHAILESH, M. PALANIVELRAJAN AND K. ARJUNAN

ABSTRACT
In this paper, homomorphism and anti homomorphism is applied in bipolar valued I-fuzzy ideal of a ring and
using these functions some theorems are stated and proved. These theorems will be useful to further research
work. Bipolar valued I-fuzzy ideal of a ring is a generalized form of bipolar valued fuzzy ideal of a ring.
Keywords: Interval valued fuzzy subset, bipolar valued fuzzy subset, bipolar valued I-fuzzy subset, bipolar
valued I-fuzzy ideal, bipolar valued I-fuzzy normal ideal, anti homorphism, image and preimage.

INTRODUCTION
In 1965, Zadeh [13] introduced the notion of a fuzzy subset of a set, fuzzy sets are a kind of useful mathematical
structure to represent a collection of objects whose boundary is vague. Since then it has become a vigorous area
of research in different domains, there have been a number of Reneralizations of this fundamental concept such
as intuitionistic fuzzy sets, interval valued fuzzy sets, vague sets, soft sets etc. Lee [5] introduced the notion of
bipolar valued fuzzy sets. Bipolar valued fuzzy sets are an extension of fuzzy sets whose membership degree
range is enlarged from the interval [0, 1] to [1, 1]. In a bipolar valued fuzzy set, the membership degree 0
means that elements are irrelevant to the corresponding property, the membership degree (0, 1] indicates that
elements somewhat satisfy the property and the membership degree [1, 0 ) indicates that elements somewhat
satisfy the implicit counter property. Bipolar valued fuzzy sets and intuitionistic fuzzy sets look similar each
other. However, they are different each other [5, 6]. Fuzzy subgroup was introduced by Azriel Rosenfeld [2].
Anitha.M.S., et.al.[1] defined the bipolar valued fuzzy subgroups of a group and Balasubramanian.A et.al.[3]
introduced about bipolar valued I-fuzzy ideals of a group. Grattan-Guiness had introduced about fuzzy
membership mapped onto interval and many valued quantities. Palaniappan. N & K. Arjunan[8] defined the
operation on fuzzy and anti fuzzy ideals. Santhi.V.K and K. Anbarasi,[9] have introduced about bipolar valued
multi fuzzy subhemirings of a hemiring. A study on interval valued fuzzy, anti fuzzy, intuitionistic fuzzy
subrings of a ring by Somasundra Moorthy.M.G[10], the thesis was useful to write the paper. Anti
homomorphism concept was discussed by Somasundra Moorthy.M.G[11]. Yasodara.B and KE.Sathappan,[12]
defined the bipolar valued multi fuzzy subsemirings of a semiring. After that K.Murugalingam and
K.Arjunan[7] have discussed about interval valued fuzzy subsemiring of a semiring. Here, the concept of
homomorphism in bipolar valued I-fuzzy ideal of a ring is introduced and established some results.
1. PRELIMINARIES
Definition 1.1. [13] Let X be any nonempty set. A mapping [M] : X  D[0, 1] is called an interval valued
fuzzy subset ( I-fuzzy subset) of X, where D[0, 1] denotes the family of all closed subintervals of [0, 1] and
[M](p) = [M(p), M+(p)], for all p in X, where M and M+ are fuzzy subsets of X such that M(p) ≤ M+(p), for all
p in X. Thus M(p) is an interval (a closed subset of [0, 1] ) and not a number from the interval [0, 1] as in the
case of fuzzy subset. Note that [0] = [0, 0] and [1] = [1, 1].
Definition 1.2. [6] A bipolar valued fuzzy set (BVFS) A in X is defined as an object of the form A = { < p,
A+(p), A(p) >/ pX}, where A+ : X [0, 1] and A : X [1, 0]. The positive membership degree A+(p)
denotes the satisfaction degree of an element p to the property corresponding to a bipolar valued fuzzy set A and
the negative membership degree A(p) denotes the satisfaction degree of an element p to some implicit counter-
property corresponding to a bipolar valued fuzzy set A.
Definition 1.3. [3] A bipolar interval valued fuzzy subset ( bipolar valued I-fuzzy subset ) [A] in X is defined as
an object of the form [A] = { < p, [A]+(p), [A](p) > / pX }, where [A]+ : X D[0, 1] and [A] : X D[1, 0],
where D[0, 1] denotes the family of all closed subintervals of [0, 1] and D[1, 0] denotes the family of all
closed subintervals of [1, 0]. The positive interval membership degree [A]+(p) denotes the satisfaction degree
of an element p to the property corresponding to a bipolar valued I-fuzzy subset [A] and the negative interval
membership degree [A](p) denotes the satisfaction degree of an element p to some implicit counter-property
corresponding to a bipolar valued I-fuzzy subset [A]. Note that [0] = [0, 0], [1] = [1, 1] and [1] = [1, 1].

428
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Example 1.4. [A] = { < a, [0.6, 0,7], [0.4, 0.3] >, < b, [0.4, 0.6], [0.9, 0.4] >, < c, [0.8,
0.9], [ 0.6, 0.3] > } is a bipolar valued I-fuzzy subset of X = {a, b, c }.
Definition 1.5. Let R be a ring. A bipolar valued I-fuzzy subset [A] of R is said to be a bipolar valued I-fuzzy
ideal of R (BVI-FI) if the following conditions are satisfied,
(i) [A]+(pq)  rmin{ [A]+(p), [A]+(q) }
(ii) [A]+(pq)  rmax{ [A]+ (p), [A]+ (q) }
(iii) [A] (pq)  rmax { [A] (p), [A] (q) }
(iv) [A] (pq)  rmin { [A] (p), [A] (q) } for all p and q in R.
Example 1.6. Let R = Z3 = { 0, 1, 2 } be a ring with respect to the ordinary addition and multiplication. Then
[A] = { <0, [0.8, 0.9], [ 0.8,  0.6] >, <1, [0.6, 0.7], [ 0.7,  0.6] >, < 2, [0.6, 0.7], [ 0.7,  0.6] >
} is a bipolar valued I-fuzzy ideal of R.
Definition 1.7. Let R be a ring. A bipolar valued I-fuzzy ideal [A] of R is said to be a bipolar valued I-fuzzy
normal ideal of R (BVI-FNI) if the following conditions are satisfied,
(i) [A]+(p+q) = [A]+(q+p) (It is trivial),
(ii) [A]+(pq) = [A]+(qp),
(iii) [A](p+q) = [A](q+p) (It is trivial),
(iv) [A](pq) = [A](qp), for all p and q in R.
Definition 1.8. Let R and R‫ ׀‬be any two rings. Then the function f: R → R‫ ׀‬is said to be an anti-homomorphism
if f(p+q) = f(q)+f(p) and f(pq) = f(q)f(p) for all p and q in R.
Definition 1.9. Let X and X‫ ׀‬be any two sets. Let f : X→ X‫ ׀‬be any function and let [A] be a bipolar valued I-
fuzzy subset in X, [V] be a bipolar valued I-fuzzy subset in f(X) = X‫׀‬, defined by [V]+(q) = sup
[A]+(p) and
p f 1 ( q )

[V](q) = inf [A](p) for all p in X and q in X‫׀‬. [A] is called a pre-image of [V] under f and is denoted by f-
p f 1 ( q )
1
([V]).
2. SOME THEOREMS.
2.1 Theorem: Let (R, +, . ) and ( R‫׀‬, +, . ) be any two rings. The homomorphic image of a bipolar valued I-
fuzzy ideal of R is a bipolar valued I-fuzzy ideal of R‫׀‬.
Proof. Let f : R  R‫ ׀‬be a homomorphism. Let [V] = f([A]) where [A] is a bipolar valued I-fuzzy ideal of R.
We have to prove that [V] is a bipolar valued I-fuzzy ideal of R‫׀‬. Let f(p) and f(q) in R‫׀‬. Then [V]+(f(p)f(q)) =
[V]+(f(pq)) ≥ [A]+(pq) ≥ rmin{ [A]+(p), [A]+(q) } = rmin {[V]+(f(p)), [V]+(f(q)) } which implies that
[V]+(f(p)f(q)) ≥ rmin {[V]+(f(p)), [V]+(f(q)) }. And [V]+(f(p)f(q)) = [V]+(f(pq)) ≥ [A]+(pq) ≥ rmax{ [A]+(p),
[A]+(q) } = rmax {[V]+(f(p)), [V]+(f(q)) } which implies that [V]+(f(p)f(q)) ≥ rmax { [V] +(f(p)),
+     
[V] (f(q)) }. Also [V] (f(p)f(q)) = [V] (f(pq))  [A] (pq)  rmax { [A] (p), [A] (q) } = rmax{
[V] (f(p)), [V] (f(q)) } which implies that [V] (f(p)f(q))  rmax{ [V] (f(p)), [V] (f(q)) }. And [V]( f(p)f(q) ) =
    

[V](f(pq))  [A](pq)  rmin {[A](p), [A](q) } = rmin{ [V](f(p)), [V](f(q))} which implies that
[V] (f(p)f(q))  rmin{ [V] (f(p)), [V] (f(q)) }. Hence [V] is a bipolar valued I-fuzzy ideal of R‫׀‬.
  

2.2 Theorem: Let (R, +,. ) and ( R‫׀‬, +, . ) be any two rings. The homomorphic preimage of a bipolar valued I-
fuzzy ideal of R‫ ׀‬is a bipolar valued I-fuzzy ideal of R.
Proof: Let f : R  R‫ ׀‬be a homomorphism. Let [V] = f([A]) where [V] is a bipolar valued I-fuzzy ideal of R‫׀‬.
We have to prove that [A] is a bipolar valued I-fuzzy ideal of R. Let p and q in R. Then [A]+(pq) =
[V]+(f(pq)) = [V]+(f(p)f(q))  rmin{ [V]+(f(p)), [V]+(f(q)) } = rmin{ [A]+(p), [A]+(q) } which implies that
[A]+(pq) ≥ rmin{ [A]+(p), [A]+(q) }. And [A]+(pq) = [V]+(f(pq)) = [V]+(f(p)f(q))  rmax{ [V]+(f(p)), [V]+(f(q))
} = rmax{ [A]+(p), [A]+(q)} which implies that [A]+(pq) ≥ rmax{ [A]+(p), [A]+(q) }. Also [A](pq) =
[V](f(pq)) = [V](f(p)f(q))  rmax{ [V](f(p)), [V](f(q)) } = rmax { [A] (p), [A](q)} which
implies that [A] (pq)  rmax{ [A] (p), [A] (q) }. And [A] (pq) = [V] (f(pq)) = [V](f(p)f(q))  rmin{
    

429
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[V](f(p)), [V](f(q)) } = rmin{ [A](p), [A](q)} which implies that [A](pq)  rmin{ [A](p), [A](q) }. Hence
[A] is a bipolar valued I-fuzzy ideal of R.
2.3 Theorem: Let (R, +, . ) and ( R‫׀‬, +, . ) be any two rings. The antihomomorphic image of a bipolar valued I-
fuzzy ideal of R is a bipolar valued I-fuzzy ideal of R‫׀‬.
Proof: Let f: R  R‫ ׀‬be an anti-homomorphism. Let [V] = f([A]) where [A] is a bipolar valued I-fuzzy ideal of
R. We have to prove that [V] is a bipolar valued I-fuzzy ideal of R‫׀‬. Let f(p) and f(q) in R‫׀‬. Then [V]+(f(p)f(q))
= [V]+(f(qp)) ≥ [A]+(qp) ≥ rmin {[A]+(p), [A]+(q)} = rmin {[V]+( f(p) ), [V]+( f(q) ) } which implies that
[V]+(f(p)f(q)) ≥ rmin {[V]+(f(p)), [V]+(f(q)) }. And [V]+(f(p)f(q)) = [V]+(f(qp)) ≥ [A]+(qp) ≥ rmax {[A]+(p),
[A]+(q)} = rmax {[V]+(f(p)), [V]+(f(q)) } which implies that [V]+(f(p)f(q)) ≥ rmax{[V]+(f(p)), [V]+(f(q)) }. Also
[V](f(p)f(q)) = [V](f(qp))  [A](qp)  rmax {[A](p), [A](q)} = rmax{ [V](f(p)), [V](f(q))} which
implies that [V](f(p)f(q))  rmax{[V](f(p)), [V](f(q))}. And [V](f(p)f(q)) = [V](f(qp))  [A](qp)  rmin
{[A](p), [A](q)} = rmin{ [V](f(p)), [V](f(q))} which implies that [V](f(p)f(q))  rmin {[V](f(p)),
[V](f(q))}. Hence [V] is a bipolar valued I-fuzzy ideal of R‫׀‬.
2.4 Theorem: Let (R, +, . ) and ( R‫׀‬, +, . ) be any two rings. The anti-homomorphic preimage of a bipolar
valued I-fuzzy ideal of R‫ ׀‬is a bipolar valued I-fuzzy ideal of R.
Proof: Let f: R  R‫ ׀‬be an anti-homomorphism. Let [V] = f([A]) where [V] is a bipolar valued I-fuzzy ideal of
R‫׀‬. We have to prove that [A] is a bipolar valued I-fuzzy ideal of R. Let p and q in R. Then [A]+(pq) =
[V]+(f(pq)) = [V]+(f(q)f(p))  rmin {[V]+(f(p)), [V]+(f(q))} = rmin {[A]+(p), [A]+(q) } which implies that
[A]+(pq) ≥ rmin { [A]+(p), [A]+(q) }. And [A]+(pq) = [V]+(f(pq)) = [V]+(f(q)f(p))  rmax {[V]+(f(p)), [V]+( f(q)
)} = rmax{[A]+(p), [A]+(q) } which implies that [A]+(pq) ≥ rmax { [A]+(p), [A]+(q) }. Also [A](pq) =
[V](f(pq)) = [V](f(q)f(p))  rmax{ [V](f(p)), [V](f(q))} = rmax {[A](p), [A](q) } which implies that
[A](pq)  rmax{ [A](p), [A](q)}. And [A](pq) = [V](f(pq)) = [V](f(q)f(p))  rmin{ [V](f(p)), [V](f(q))
} = rmin{ [A](p), [A](q) } which implies that [A](pq)  rmin{ [A](p), [A](q) }. Hence [A] is a bipolar
valued I-fuzzy ideal of R.
2.5 Theorem: Let (R, +, . ) and ( R‫׀‬, +, . ) be any two rings. The homomorphic image of a bipolar valued I-
fuzzy normal ideal of R is a bipolar valued I-fuzzy normal ideal of R‫׀‬.
Proof: Let f : R  R‫ ׀‬be a homomorphism. Let [V] = f([A]) where [A] is a bipolar valued I-fuzzy normal ideal
of R. We have to prove that [V] is a bipolar valued I-fuzzy normal ideal of R‫׀‬. By theorem 2.1, [V] is a bipolar
valued I-fuzzy ideal of R‫׀‬. Let f(p) and f(q) in R‫׀‬. Then [V]+(f(p)f(q)) = [V]+(f(pq))  [A]+(pq) = [A]+(qp) 
[V]+(f(qp)) = [V]+(f(q)f(p)) which implies that [V]+(f(p)f(q)) = [V]+(f(q)f(p)). And [V](f(p)f(q)) = [V](f(pq)) 
[A](pq) = [A](qp)  [V](f(qp)) = [V](f(q)f(p) which implies that [V](f(p)f(q)) = [V](f(q)f(p) ). Hence [V]
is a bipolar valued I-fuzzy normal ideal of R‫׀‬.
2.6 Theorem: Let (R, +, . ) and ( R‫׀‬, +, . ) be any two rings. The homomorphic preimage of a bipolar valued I-
fuzzy normal ideal of R‫ ׀‬is a bipolar valued I-fuzzy normal ideal of R.
Proof: Let f : R  R‫ ׀‬be a homomorphism. Let [V] = f([A]) where [V] is a bipolar valued I-fuzzy normal ideal
of R‫׀‬. We have to prove that [A] is a bipolar valued I-fuzzy normal ideal of R. By theorem 2.2, [A] is a bipolar
valued I-fuzzy ideal of R. Let p and q in R. Then [A] +(pq) = [V]+(f(pq)) = [V]+(f(p)f(q)) = [V]+(f(q)f(p)) =
[V]+(f(qp)) = [A] +(qp) which implies that [A]+(pq) = [A]+(qp). And [A](pq) = [V](f(pq))
= [V](f(p)f(q)) = [V](f(q)f(p)) = [V](f(qp)) = [A](qp) which implies that [A](pq) = [A](qp).
Hence [A] is a bipolar valued I-fuzzy normal ideal of R.
2.7 Theorem: Let (R, +, . ) and ( R‫׀‬, +, . ) be any two rings. The anti-homomorphic image of a bipolar valued I-
fuzzy normal ideal of R is a bipolar valued I-fuzzy normal ideal of R‫׀‬.
Proof: Let f : R  R‫ ׀‬be an anti-homomorphism. Let [V] = f([A]) where [A] is a bipolar valued I-fuzzy normal
ideal of R. We have to prove that [V] is a bipolar valued I-fuzzy normal ideal of R‫׀‬. By theorem 2.3, [V] is a
bipolar valued I-fuzzy ideal of R‫׀‬. Let f(p) and f(q) in R‫׀‬. Then [V]+(f(p)f(q)) = [V]+(f(qp)) ≥ [A]+(qp) =
[A]+(pq) ≤ [V]+(f(pq)) = [V]+(f(q)f(p)) which implies that [V]+(f(p)f(q)) = [V]+(f(q)f(p)). And

[V] (f(p)f(q)) = [V] (f(qp)) ≤ [A](qp) = [A](pq) ≥ [V](f(pq)) = [V](f(q)f(p)) which implies that

[V](f(p)f(q)) = [V](f(q)f(p)). Hence [V] is a bipolar valued I-fuzzy normal ideal of R‫׀‬.

430
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

2.8 Theorem: Let (R, +, . ) and ( R‫׀‬, +, . ) be any two rings. The anti-homomorphic preimage of a bipolar
valued I-fuzzy normal ideal of R‫ ׀‬is a bipolar valued I-fuzzy normal ideal of R.
Proof: Let f : R  R‫ ׀‬be an anti-homomorphism. Let [V] = f([A]) where [V] is a bipolar valued I-fuzzy normal
ideal of R‫׀‬. We have to prove that [A] is a bipolar valued I-fuzzy normal ideal of R. By theorem 2.4, [A] is a
bipolar valued I-fuzzy ideal of R. Let p and q in R. Then [A]+(pq) = [V]+(f(pq)) = [V]+(f(q)f(p)) = [V]+(f(p)f(q))
= [V]+(f(qp)) = [A] +(qp) which implies that [A]+(pq) = [A]+(qp). And [A](pq) = [V](f(pq))
= [V](f(q)f(p)) = [V](f(p)f(q)) = [V](f(qp)) = [A](qp) which implies that [A](pq) = [A](qp).
Hence [A] is a bipolar valued I-fuzzy normal ideal of R.
REFERENCES
12. Anitha.M.S. Muruganantha Prasad & K.Arjunan, Notes on bipolar valued fuzzy subgroups of a group,
Bulletin of Society for Mathematical Services and Standards, Vol. 2 No. 3 (2013), pp. 52-59.
13. Azriel Rosenfeld, fuzzy groups, Journal of mathematical analysis and applications 35(1971), 512-517.
14. Balasubramanian.A, K.L.Muruganantha Prasad & K.Arjunan, “Properties of Bipolar interval valued fuzzy
subgroups of a group”, International Journal of Scientific Research, Vol. 4, Iss. 4 (2015), 262 - 268.
15. Grattan-Guiness, “Fuzzy membership mapped onto interval and many valued quantities”, Z.Math.Logik.
Grundladen Math. 22 (1975), 149  160.
16. K.M.Lee, bipolar valued fuzzy sets and their operations. Proc. Int. Conf. on Intelligent Technologies,
Bangkok, Thailand, (2000), 307-312.
17. K.M.Lee, Comparison of interval valued fuzzy sets, intuitionistic fuzzy sets and bipolar valued fuzzy sets.
J. fuzzy Logic Intelligent Systems, 14 (2) (2004), 125-129.
18. K.Murugalingam & K.Arjunan, A study on interval valued fuzzy subsemiring of a semiring, International
Journal of Applied Mathematics Modeling, Vol.1, No.5, 1-6, (2013)
19. Palaniappan. N & K. Arjunan, 2007. Operation on fuzzy and anti fuzzy ideals, Antartica J. Math., 4(1):
59-64.
20. Santhi.V.K and K. Anbarasi, “Bipolar valued multi fuzzy subhemirings of a hemiring”, Advances in Fuzzy
Mathematics, Volume 10, Number 1 (2015), 55 62.
21. Somasundra Moorthy.M.G., “A study on interval valued fuzzy, anti fuzzy, intuitionistic fuzzy subrings of a
ring”, Ph.D Thesis, Bharathidasan University, Trichy, Tamilnadu, India (2014).
22. Somasundara Moorthy.M.G & K.Arjunan, Interval valued fuzzy subrings of a ring under homomorphism,
International Journal of Scientific Research, Vol. 3, Iss. 4, 292-296 (2014).
23. Yasodara.B and KE.Sathappan, “Bipolar-valued multi fuzzy subsemirings of a semiring”, International
Journal of Mathematical Archive, 6(9) (2015), 75  80.
24. L.A.Zadeh, fuzzy sets, Inform. And Control, 8(1965), 338-353.

AUTHOR DETAILS:
1
PANCHAL CHETNA SHAILESH, 2M. PALANIVELRAJAN AND 3K. ARJUNAN
1
Department of Mathematics, Gurvkul College Commerce, Ghatkopar, Mumbai – 400 077, Maharashtra, India
2
Department of Mathematics, Government Arts College, Melur-625106, Tamilnadu, India
3
Department of Mathematics, Alagappa Government Arts College, Karaikudi-630003, Tamilnadu, India

431
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

CUSTOMER PERCEPTION TOWARDS ONLINE BIKE-TAXI SERVICES: AN EMPIRICAL STUDY

SYED MOHAMMED ABUL WASEEM AND DR. RESHMA NIKHAT

ABSTRACT
India's e-commerce industry has grown at an exceptional rate in recent years. The Overseas corporations made
a substantial investment in the e-commerce sector, and foreign investors are interested in e-business start-ups.
The entrance of international e-tailing conglomerates boosted competitiveness among domestic firms. The
progress of online apps in today's digital environment has increased the demand for bike taxi services in India.
Ola, Rapido, and Uber are some of the service providers in India. Bike taxi providers are expanding their
operations in both metro and Urban cities. Commuters can utilize a service, which will pick them up at their
current location and drop them at their final destination. The Purpose of the research is to examine how the
customers perceive app-based bike taxi services, and important aspects influencing consumer's perception. The
findings of the research reveal that time-saving and discounts have a positive effect on customers perception.
Keywords: customer perception, discount, bike-taxi, Rapido.

1. INTRODUCTION
Over the previous span of time, mobile phones have surpassed PCs and laptops as the primary means of
accessing the internet. Reduced smartphone pricing, lower data charges, and more availability of regional
languages all contribute to India's technological boom (Sanghi & Jain, 2018). The rise of technology has
reshaped the way businesses operate (Xu & Huang, 2019). Google Inc. invested in the Dunzo daily task
management app (Chanchani, 2017). Indian tech startups are bringing unique services to customers as a result
of digital expansion. Myntra, Paytm, redbus, Rapido, Zomato, and Unacademy are examples of well-liked
Indian tech startups. Due to increased traffic congestion and long urban trip duration, people are looking for
alternate means to get to their destination in the most comfortable, cost-effective, and time-efficient manner.
Public transportation in Indian cities improves, businesses are coming up with innovative ways to provide
effective last-mile connectivity for commuters.
Online bike taxi is a unique kind of transportation that allows users to simply ride from a pickup place to their
final destination. There are several bike taxi services on the market, including Rapido, OLA bike, UberMOTO.
Consumers can pay for the journey using a variety of payment methods, including the company's wallet (like
Ola money), different debit/credit cards, UPI, and cash. Live tracking systems presented on the service app of
bike taxi services are a significant driver for consumer convenience and safety. Consumers have the option to
rate the service, which contains the driver's performance, and satisfaction level with the journey. A feedback
system helps in identifying the level of satisfaction towards the company. Bike-sharing companies are giving
numerous perks such as deductions, redeem coupons, free rides, referral benefits to attract new customers and
maintain existing ones.
The promotion of bike taxi apps has been greatly aided by digital marketing, addition to promotional benefits,
bike-hailing companies used distinctive communicating strategies like YouTube advertisements and online Ads
to promote service offerings and influence the potential customers.
App-Based Bike-Sharing Services in Different Countries:
Country Operator
India Ola-bike, UberMOTO, Rapido, Baxi, Bikxie
Bangladesh UberMOTO, Pathao, Lily, Obhai
Indonesia Go-Jeck, GrabBike
Malaysia GrabBike, DegoRide
Vietnam GrabBike, Go-Viet
Philippines GrabBike, Angkas
Online Bike Taxi Services in India:
Operator Year of launch
Rapido 2015
Baxi 2015

432
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Ola Bike 2016


Ubermoto 2016
Bikxie 2016
Rapido is the market leader in the bike taxi market, having established an idea in 2015. Rapido is India's first
and prime service provider, operating in over 100 locations and boasting 25 million App downloads and ten
million customers (Rapido). Similarly, one year after Rapido started bike-sharing services, cab-hailing giants
OLA and Uber launched bike taxi services on their platforms.UberMOTO Uber's bike-taxi division has
completed two million journeys in the year since its inception in India. According to data from Uber, an
UberMOTO is demanded every eighteen seconds in Hyderabad city (The Economic Times,2017). India is the
global largest bike market, and Bike-Taxi services have the potential to generate nearly two million job
opportunities and $4.5 billion in revenue in India (Raman, 2020).
OBJECTIVES
1. To find out the most preferred bike-taxi service.
2. To study the demographics have any association with customer perception
3. To examine the elements that influence customers' decisions to use an online bike taxi service.
2. REVIEW OF LITERATURE
Singh & Sinha (2013) found that convenience, low price, easy availability of services, reliable information are
the major attributes that attract customers towards online businesses. Consumers are more concerned about the
reliability of e-tailors and the performance of the products.
Manjunath (2015) found that OLA has placed its service reputation in the consumer's mind, compared to the
other cab services. Most of the customers were aware of cab-hailing services through their family members and
friends followed by social media. Customers preferred the online services due to affordable prices and easy
booking.
Kumar & Kumar (2016) felt that commuters are more innovative in today's digital world, and they are more
conscious about the prices of service. Coupons have positively influenced the purchase decision of customers.
Sharma & Das (2017) felt that prompt customer support, the behavior of cab driver, and trust plays a vital role
in satisfying consumers, a study suggested that companies need to deliver the service on time and respond to
queries of customers quickly, which leads to customer satisfaction.
Pandya and Rungta (2017) taxi operators have superiority over traditional cab providers. Companies reached
their objectives by effectively utilizing new technology advancements like designed mobile apps for bookings,
an online tracking system that improved consumer security, and assurance.
(Prava et al., 2017) reported that Uber obtained feedback from drivers as well as passengers to analyze the
performance of service and behaviour of customers and drivers. Uber Inc used several strategies to attract
potential customers and retain existing ones like referral schemes, premium benefits, and distinct offers
depending upon the season.
(Kalla prohit 2017)felt that customer perception plays a vital role in the shared mobility industry, positive
comments and reviews help in maintaining a good relationship with customers, similarly, negative feedback and
reviews help in improving the service. Ola offers a variety of promotional perks such as discounts, trail rides,
and vouchers for attracting customers.
Kashyaap (2018) noticed that the e-bike sharing business began with the aim of connecting commuters from
their current location to dropping points in a particular city. Customers can quickly schedule trips easily on the
company's apps, and the sharing economy will help in reducing traffic on roadways. Globally, gojeck is one of
the leading service providers, in the same way, UberMOTO by Uber and the OLA started bike taxi services.
Shivangi & Priyanka (2018) reported that most commuters chose the ride using the app. The customer's
purchasing decision was influenced by the performance of the driver, brand, and safety of the journey.
Thakur et al., (2020) poised that lack of public transport in narrow lines, congested roads, and high ownership is
the important encouraging attribute for the advent of new techno-based two-wheeler rental services.
Panigrahi et al., (2021) Rapido engage a range of strategies to attract potential customers and retain existing
customers. Rapido excels in providing low-cost fares and different offers for using its service.
433
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Karthik & Sinha (2021) indicated that e-bike taxi businesses adopted a distributed economic system model in
which resources are shared rather than owned. The benefits of shared mobility include lower travel expenses,
lower fuel use, lower pollutants, and more secure connectivity.
2.1 RESEARCH GAP
Few studies on online bike taxi applications in India have been studied. Significant research on perception had
been done in several industries, which includes beverage, retail, electronic-business, banking, online payment
system, and cab-hailing. Nevertheless, more scope for research in terms of consumer's perception of bike-
sharing services. This research will disclose the current state of two-wheeler taxi services and numerous
elements influencing consumer perception while booking an online bike taxi service. This study will bring
significant knowledge to the extant literature on consumer perception.
3. RESEARCH DESIGN
For the study, both primary, and secondary data were gathered. A systematic survey with a sample of
respondents was used to acquire data from users of online bike taxi apps. Secondary data was acquired for the
study from past studies in the field. A Standard "Questionnaire" was utilized for the study to obtain primary data
from respondents.
3.1 Sample Size
This research includes 100 customers of e-bike sharing apps, consisting of different demographic attributes with
varied educational levels. Customers from Hyderabad and Bangalore were chosen for the study, and a
convenient sample technique was adopted.
The Statistical Techniques Utilized to Examine the Data are as Follows:
 To assess reliability, the Cronbach's Alpha test was used. The Cronbach's Alpha coefficient measures the
scale's internal consistency.
 To test the hypotheses, a chi-square approach was used.
4. Data Analysis
Cronbach's
No. of Items
Alpha
.800 27
Table 1.1 Reliability test
The Cronbach's alpha value is 80 percent. As a result, the data is valid and dependable for analysis.
4.1 Preffered Service

According to the graph above, the Majority of the customers preferred Rapido, 14% preferred OLA, and 11%
opted for Uber for transit, while minimal percent chose any other service. As a result, Rapido is the most
favored service to travel.

434
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

4.2 Factors Affecting Buying Behavior

According to the graph, 45 percent of customers prefer to travel using bike taxis to save time, while 29 percent
choose online bike taxis to receive affordable trip rates. Similarly, 24 percent of respondents utilize bike taxis to
confront traffic, while only 2 percent take a trip for the convenience of the payment mechanism. Bike-sharing
companies need to quickly connect the customers with riders and also decrease the chances of canceling the trip
from the rider side, this saves the time of consumers when scheduling a ride and encourages them to become
loyal to the brand. Additionally, in order to increase customer loyalty, more promotional perks should be
provided.
4.3 Preferred Payment Option

The above chart depicts that 51 percent of customers select an online payment method, remaining to prefer to
pay in cash while using a bike taxi.
4.4 Need of Service

Source: Primary Data


435
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The above bar graph shows that 39 percent of customers require a service in the forenoon and evening, with 24
percent requiring a service in the forenoon and 22 percent requiring a ride in the evening, 9 percent requiring an
online bike taxi late at night, and 6 percent requiring a bike in the afternoon. Service providers should increase
bike availability during the forenoon and end of the day hours to suit consumer demand.
4.5 Demographic Profile Association
H1: There is no association between demographic variables and consumer preference.
Demographic(Predictors) Bike Taxi Chi-Square Significance Null
Preference(Outcome) Hypothesis
Gender Bike Taxi Preference 8.8 0.31 Rejected
Age Bike Taxi Preference 25 0.13 Rejected
Education Bike Taxi Preference 10 .344 Accepted
Marital Status Bike Taxi Preference 5.0 .167 Accepted
Occupation Bike Taxi Preference 27 .006 Rejected
Income Bike Taxi Preference 19.5 .075 Accepted
The table above demonstrates that the P-value is smaller than.05, implying that characteristics such as Gender,
Age, and Occupation have an association with consumer preferences for various bike-sharing services. The
remaining factors, such as Education, Marital Status, and Income, have a value larger than.05, implying that the
variables have no relationship with customer perception.
5. RESULT AND DISCUSSION
 The findings indicate that characteristics such as Gender, Age, and Occupation have a substantial impact on
the perception of online bike taxi consumers.
 According to the analysis, Rapido is the most preferred service, with 69 percent of users, followed by OLA
and Uber.
 The most compelling reasons for choosing a bike taxi are the savings in time and the low cost of journeys.
 More than half of respondents prefer the digital payments option to pay the trip amount.
 The majority of customers require a bike during morning and evening hours.
6. IMPLICATIONS OF THE STUDY
Consumer behaviour is a broad subject, research has been done in diverse sectors. However, there is a lot more
research to be done on bike taxi, and the current research filled a few gaps with new intuition. This research will
assists marketers in developing strategies. This research will also help businesses understand the requirements
and desires of the customers.
7. RESEARCH LIMITATION
This research is limited to the Hyderabad and Bangalore cities, and the study is impounded by the current
customers of various e-bike sharing services.
8. SCOPE FOR FURTHER RESEARCH
Future research could employ a variety of approaches to learn more about the behaviour of bike taxi users such
like impact of service mix on customer satisfaction, influence of service quality towards customer loyalty and
the significance of brand, etc.,
9. CONCLUSION
Digitization and technology have a significant impact on customer perception and behaviour. Due to their
convenience, time savings, and flexibleness, online bike-taxi services are well liked among Indian customers.
10. REFERENCES
 Chanchani, M. (2017). Google makes first direct investment in India, funds hyperlocal startup Dunzo. The
Economic Times. https://economictimes.indiatimes.com/small-biz/startups/newsbuzz
 G, M. (2015). Brand Awareness and Customers Satisfaction towards OLA Cabs in Bengaluru North and
South Region. Research Journal of Social Science & Management, 5.
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3358304
 Kalla, N., & Purohit, H. (2017). Designing Service Offering in the E-Marketing Era: A Case Study of
OLA Cabs. International Journal on Customer Relations, 5(1).
436
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Karthik, K. A., & Sinha, M. (2021). The impact of physical distancing on the sharing economy.
Australasian Accounting, Business and Finance Journal, 15(1), 22–36.
https://doi.org/10.14453/aabfj.v15i1.3
 Kashyaap, S. (2018). Top bike-taxi startups in India that are riding the wave of sharing economy.
YOURSTORY. https://yourstory.com/2018/08/top-bike-taxi-startups-in-india-that-are-riding-the-wave-of-
sharing-economy/amp
 Kumar, P. K., & p, N. R. (2016). A Study on Factors Influencing the Consumers in Selection of Cab
Services. International Journal of Social Science and Humanities Research, 4(3).
https://www.researchgate.net/publication/308214151
 Pandya, U., & Rungta, R. (2017). Impact of use of Mobile Apps of Ola Cabs and Taxi for Sure on Yellow
and Black Cabs. Pacific Business Review International, 9(9), 91–105.
 Panigrahi, A. K., Darda, M., & Ahmed, I. (2021). A case study on Rapido: India’s largest online bike
service provider. Journal of Management Research and Analysis, 8(1), 44–50.
https://doi.org/10.18231/j.jmra.2021.011
 Prava, D. S., Dhaval, B., & Sailaja, R. (2017). Transformation of urban transportation-strategic perspective
a case of uber technologies inc. International Journal of Research in Business Management, 5(3).
https://www.researchgate.net/publication/315807476
 Raman, A. (2020). The power of Two Wheels Bike-Taxi: India’s New Shared Mobility Frontier.
https://olawebcdn.com/ola-institute/bike-taxi-report.pdf
 Rapido. India’s largest bike taxi service. https://www.rapido.bike/
 Sanghi, K., & Jain, N. (2018). Digital Consumer Spending in India: A $100 Bn Opportunity. Google and
BCG. https://www.bcg.com/en-in/digital-consumer-spending-in-india-a-100-bn-opportunity
 Sharma, K., & Das, S. (2017). Service Quality and Customer Satisfaction - With Special focus on the
Online Cab Industry in India. International Journal of Business and Management, 12(7), 192–200.
https://doi.org/10.5539/ijbm.v12n7p192
 Shivangi, D., & Priyanka, Y. (2018). E- cab hailing: a study on consumer behaviour. Elk asia pacific
journal of marketing & retail management, 9(3).
 Singh, S., & Sinha, P. (2013). Consumer Buying Behaviour and E-Commerce – An Indian Perspective.
Journal of Advance Management Science, 1(2). https://doi.org/https://doi.org/10.12720/joams.1.2.250-254
 Thakur, P., Jain, A., & Harikumar, A. (2020). Emerging Role of Bike (Motorcycle) Taxis in Urban
Mobility (Issue January). https://www.teriin.org/policy-brief/emerging-role-bike-motorcycle-taxis-urban-
mobility
 Xu, X., & Huang, Y. (2019). Restaurant information cues, Diners’ expectations, and need for cognition:
Experimental studies of online-to-offline mobile food ordering. Journal of Retailing and Consumer
Services, 51, 231–241. https://doi.org/10.1016/j.jretconser.2019.06.010

AUTHOR DETAILS:
1
SYED MOHAMMED ABUL WASEEM AND 2DR. RESHMA NIKHAT
1
Research Scholar 2Assistant Professor, Department of Management and commerce, Maulana Azad National
Urdu University, Hyderabad, India

437
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

EFFECT OF ADVERTISEMENT ON PURCHASE BEHAVIOUR OF CONSUMER DURING COVID-19

N. PRABHAKARAN

INTRODUCTION
In 2020, the COVID-19 pandemic brought negative economic and social disturbance in many countries and also
these leads to poverty and the reduction in source of revenue to majority of people globally, there were trade
restrictions and movement of goods were restrained in many places except the essential commodities. Due to
COVID-19, after months of lockdown and social distancing, consumers around the world is forced to shop in a
different way by reprioritizing what is essential and preferring through online shopping. COVID-19 has
changed every aspect of our day-to-day lives, and also consumer buying behaviour.
In this article, the focus is on primary changes in the consumer behaviour during Pandemic. Due to pandemic,
the consumers around the world are not spending their wealth unless consumers are convinced that they are
spending for what is expected during this tough period. Consumers focused only on essential products and
reduced non-essential costs.
The economic and social crises, such as inflation, unemployment, reduction in salary, and hike in essential
prices has resulted in turn down the purchasing power of consumers which has heavily impacted in the decision
making process, and influenced the buying behaviour of the consumer. In the time of crisis, the consumers
make compromises in terms of personal comfort due to the result of awareness towards the value of money but
not compromised on brand, quality etc.,
This Research determines the influence of advertisement on purchase behaviour of consumers during COVID-
19. Most consumers buy the product either for their requirement or get influenced by the advertisement based
on brand, free gifts or discount etc. Consumer purchases their product just for daily survival during pandemic
where advertisement plays a critical role by influencing their buying decision.
REVIEW OF LITERATURE
Akter, S., et al. (2021) in their article titled “Changes in Consumer Purchasing Behaviour Due to COVID- 19
Pandemic”. This article studies the impact of the COVID-19 outbreak on consumers’ purchasing and
consumption behaviour. 200 respondents were targeted during this research in a developing country like
Bangladesh. Respondents belong to different age and different gender groups, household monthly income,
qualifications and occupations. The study may contribute to our understanding of this remarkable and on-going
pandemic by offering marketing recommendations, important guidance for policy initiatives, and business
continuity plans for both during and after the CVOID-19 pandemic.
Taha, V. A., et al. (2021) in their article titled “The Use of Social Media and Its Impact on Shopping Behaviour
of Slovak and Italian Consumers during COVID-19 Pandemic”. The study is how COVID-19 affected
behaviour of consumer in shopping in Italy and Slovakia. This research is about to discover the impact of
consumer behaviour in social media, more particularly, it studies the influence of social media on the preference
of specific electronic-shops during the COVID-19. The research has a total of 937 respondents from Italy and
Slovakia, which examined how the COVID-19 affected behaviour of consumer during shopping. The outcome
exposed the existence of statistically significant dissimilarity during the first wave of the COVID-19 in the
make use of social media between the two county of consumers
OBJECTIVES OF THE STUDY
 To identify the perception of consumers on the impact of advertisement in buying behaviour
 To investigate the relationship between certain demographic variables and perception on advertisement
SCOPE OF THE STUDY
An effort is made to identify the level of perception amongst consumers on factor influencing buying behaviour
during COVID-19. The study also investigates the relationship between demographic variables and the level of
perception on advertisement.
NEED FOR THE STUDY
The explosion of aggressive media and advertisement campaigns, there is a need to have stringent norms for
both regulations and measures. Transparency required at all levels so that the final outcome of the content

438
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

should truly reflect the character/functional benefits of the products. Some of the researchers conducted in the
past reveal that consumer place high value in honest and ethical advertising, level the advertisers and media
managers should ensure to deliver quality content all through the campaigns. In particular, this study would
cover the impact of advertisement during COVID-19 in purchasing behaviour of consumers (both positive and
negative).
LIMITATIONS OF THE STUDY
 The study was carried in Chennai city
 The study was conducted during pandemic period
 The sample size was limited to 204 due to limited time period.
 The finding of the study is based on respondents biased information.
RESEARCH METHODOLOGY
Sample Size
The sample size of the research is limited 204 respondents. The questionnaire method is used to select the
sample to make an equal representation of the population. The respondents are selected in such a way that in
includes the respondents of age, different education streams and cover all income groups. A total of 50
questionnaires were distributed to the respondents directly, out of 50 only 39 was only found to completed in all
aspects and found suitable for analysis.
Directly Issued
Issued Filled Partly Filled Valid
50 50 11 39
A total of 165 questionnaires were filled by the respondents through online forms, all 165 questionnaires were
found to completed in all aspects and found suitable for analysis.
Online Forms
Filled Partly Filled Valid
165 - 165
Study Area
The study was conducted in Chennai only.
QUESTIONNAIRE CONSTRUCTION
The questionnaire was structured and questions were closed ended in nature. the questions had three parts. The
first part of the questionnaire was designed to collect demographic information of the respondents. This covered
age, gender, marital status, education, salary, income. The second part of the questionnaire had elicited
information about awareness of advertisement. The third part had questions designed to find out impact of
advertisement on buying behaviour of consumers.
Sample size 204
Sampling technique Convenience sampling
Study area Chennai
Survey instrument Questionnaire
Measures and Scales
Depending on the nature of the questions the following was adopted in the questionnaire.
 Dichotomous
 Ranking and
 5 point Likert scales (Strongly Agree, Agree, Neutral, Disagree and strongly disagree)
Data Analysis
Data has been processed using Microsoft excel 2007.SPSS23.0 software was used for statistical analysis and the
results obtained thereby were analysed and interpreted. The analysed of data has been presented in the following
order:
 Percentage analysis

439
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Factor Analysis
 Correlation
Demographic Profile
52.5% of the respondents’ age group is from 18-24 years.
32.4% of the respondents’ family monthly income Before COVID-19 are 10K-20K.
31.9% of the respondents’ family monthly income After COVID-19 are below 10K.
41.7% of the respondents are under graduatesand 40.2% are post graduates.
42.6% of respondents are employed.
65.7% of respondents are unmarried.
40% and 35% of respondents agree and strongly agree respectively that Advertising is necessary for Consumers
even in Pandemic Situations, 41% agree that Advertising is a major source of information about the availability
of goods and services, 46% of respondents agree that Advertising is an important source of decision making for
consumers on products & services
47% of respondents agree that Advertisement attracts the attention of consumers in Pandemic Situations, 40%
of respondents agree that Advertisements uses the celebrities for greater acceptance of brand, 48% agree that
Advertisements stimulates the action in the minds of consumers.36% of respondents agree that the
Advertisements creates an unrealistic social environment that affect consumer
34% of respondents agree that Advertisements produces negative emotional appeals during COVID-19, 41% of
respondents agree Advertisements has increased the entertainment expenses, 42% of respondents agree that
Advertisements creates significant changes in family ideologies that affect culture
Advertisement that Influenced Purchase of the Products during Covid-19
Category No. of Responses
Mask / Sanitizer / Hand Wash 83 (41%)
Health care products 50 (25%)
Vaccine 16 (8%)
Luxury Items 14 (7%)
Eatable / Food Product 12 (6%)
Others 11 (5%)
Mobile 11 (5%)
Clothes / Footwear 7 (3%)
Grand Total 204
During COVID-19,41% respondents agrees that advertisement impacted consumers to buy Mask / Sanitizer /
Hand Wash, 25% respondents agrees that advertisement impacted consumers to buy Health care
products,advertisement helped 8% of consumers to know about vaccine details through advertisement and
Interestingly 7% respondent’sstates that S has impacted them to buy luxury items like Jewel, TV etc., during
pandemic times.
Factor Analysis
In this factor analysis, influence of advertisement is classified as cultural, desire, and awareness of buying
behaviour of customers during COVID-19.

IDENTIFIED FACTORS THAT INFLUENCED ADVERTISEMENT


Rotation Rotated
Dimension Items Communalities sums of squared component
loading matrix
Advertisements produces negative
.642 .785
emotional appeals during COVID-19
Cultural Advertisements creates an unrealistic 2.269
.554 .733
social environment that affect customer
Advertisements influence the customers .594 .682
440
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

to buy the product during COVID-19


significant changes in family ideologies
.519 .638
that affect culture
Advertising is an important source of
decision making for customers on .597 .770
products & services
Advertising is necessary for Customers
.572 .753
even in Pandemic Situations
Awareness 2.106
Advertising is a major source of
.511
information about the availability of .663
goods and services
Advertisement attracts the attention of
.564 .623
customers in pandemic situations
Advertisements uses the celebrities for
.652 .767
greater acceptance of brand
Advertisements has increased the
Desire .589 1.829 .755
entertainment expenses
Advertisements stimulates the action in
.410 .504
the minds of customers
Kaiser-Meyer-Olkin Measure of Sampling Adequacy = 0.792
Bartlett's Test of Sphericity = 0.000
INFERENCE
From the above table, it is found that KMO measures of sampling adequacy is 0.792, Bartlett’s test of sphericity
with appropriate value 0.000 are statistically significant at 5% level. Therefore, it can be concluded that the
variables considered for factor analysis from normal distribution to represent the factor emerged. The implies
that the sample size is adequate for reduction process and creates a conductive situation to ascertain the cultural
factors based on factor influencing impact of advertisement on women and children which are classified as
follows such has awareness factor, desire factor, attention factor.
The table also depicts that 11 variables exhibit the variance from 0.410 to 0.652 the adequate for factor
segmentation for variables. This implies that range of variations defined which is statistically significant to go
ahead for meaningful data deduction process
The rotated component matrix in the factor analysis grouped variables follows
The cultural factor consists Four variables having the variance of 2.269 which represent changes in family
ideologies that affect consumers, advertisement produces an negative emotional appeals during COVID-19,
advertisements influence the customers to buy the product during COVID-19 and advertisements creates an
unrealistic social environment that affect consumers
The awareness factor consists of four variables having the variance of 2.106 which represent the advertisement
is a necessary even in Pandemic Situations, Is an important source of decision making for customers on
products & services, Is a major source of information about the availability of goods and services and
advertisement attracts the attention of customers in pandemic situations.
The desire factor consists of three variables having the variance of 1.829 which represent the advertisements has
increased the entertainment expenses, advertisements stimulates the action in the minds of customers and
advertisements uses the celebrities for greater acceptance of brand.
Correalation
Correlation analysis shows that there is a degree relationship between the impact of advertisement as perceived
by customers with different selected variables such as desire, awareness and cultural as per the above mentioned
result.
Cultural Awareness Desire
Pearson Correlation 1.00 0.210** 0.439**
Cultural Sig. (2-tailed) 0.003 0.000
N 204 204 204
Awareness Pearson Correlation 0.210** 1.00 0.349**
441
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Sig. (2-tailed) 0.003 0.000


N 204 204 204
Pearson Correlation 0.439** 0.349** 1.00
Desire Sig. (2-tailed) 0.000 0.000
N 204 204 204
**. Correlation is significant at the 0.01 level (2-tailed).
INFERENCE
Correlation analysis shows that there is a degree of relationship between the impact of advertisement with
different selected variables such as desire, awareness and cultural as per the below mentioned result.
Relationship between desire with awareness, cultural rs is (0.439), (0.349) and significant value is (0.000),
(0.000) it means there is a significant positive correlation between desire and awareness, cultural.
Relationship between awareness with desire, cultural rs (0.210), (0.349) and significant value is (0.003), (0.000)
it means there is a significant positive correlation between awareness and cultural, desire.
Relationship between cultural with desire, attention, rs (0.210), (0.439) and significant value is (0.003), (0.000)
it means there is a significant positive correlation between cultural and desire, awareness.
CONCLUSIONS
Advertisements not only help in AIDA model (Attention, Interest, Desire and Action) for a product instead it
brings out a great image in consumer’s segments. COVID-19 pandemic has essentially changed people around
the world to live in a different way, buying in a different way, thinking in a different way Consumers around the
world are approaching brands and products through a modern approach.
The COVID-19 pandemic is reshaping the industries in the production of consumer goods in real time and
permanently shifting what consumers will value, how and where consumers shop. Consumers are more afraid of
their health than the economic impact of COVID-19. During pandemic Consumers are watchful of what they’re
buying. They became more responsible to limit food waste, shop consciously and buy more sustainable items.
In the future brands need to make this a key factor while selling the commodities. The study could be used as a
base for further research on how buying behaviour of customers changes during pandemic situations
irrespective of advertisements.
During the initial stages of the pandemic, a large number of consumers were either in containment zones or
there were restrictions for making their essential and flexible purchases. This situation shows the path to
consumers trying new products and brands, which in turn has resulted in changes to consumer’s shopping habits
and their corridor to purchase. Advertisement is the only key for the consumers to choose the best and essential
items to purchase during pandemic times. Even advertisement has a remarkable impact on the Vaccination drive
in India.
This study also concludes that there is a huge impact in respondent’s minds that most of the respondents are
neutral to buy things through advertisement and also even in Pandemic Situations 75% of respondents agree that
advertisement is necessary and 72% of respondents agree that advertisement attracts the attention of
respondents even during pandemic situations. Interestingly most of the respondents agree that advertisement has
increased the entertainment expenses.
REFERENCES
1. Viktória Ali Taha , Tonino Pencarelli , Veronika Škerháková , Richard Fedorko and Martina Košíková
(2021) The Use of Social Media and Its Impact on Shopping Behavior of Slovak and Italian Consumers
during COVID-19 Pandemic. Sustainability 2021, 13, 1710
2. .Dr. Salma. Akter, Taj Ashrafi, Dr. Victoria Waligo(2021) Changes in Consumer Purchasing Behavior Due
to COVID- 19 Pandemic. Journal of Marketing and Consumer Research www.iiste.org ISSN 2422-8451
An International Peer-reviewed Journal Vol.77, 2021
3. Impact of the COVID-19 pandemic on consumer behaviour. (Available online
https://timesofindia.indiatimes.com/readersblog/thoughtfulness/impact-of-the-covid-19-pandemic-on-
consumer-behavior-25899/ (Accessed on 27.08.2021)
4. Ali Taha, V.; Pencarelli, T.; Škerháková, V.; Fedorko, R.; Košíková, M. The Use of Social Media and Its
Impact on Shopping Behavior of Slovak and Italian Consumers during COVID-19 Pandemic.
Sustainability 2021, 13, 1710. https://doi.org/10.3390/su13041710
442
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

5. How COVID–19 Has Transformed Consumer Spending Habits: Available online


https://www.jpmorgan.com/solutions/cib/research/covid-spending-habits (accessed on 25 August 2021).
6. Poornima, V.; Saumya, R.; Umesh, M. Impact of Online Advertising on Consumers Buying Behaviour: A
Study with Reference to Karkala Taluk. Int. J. Adv. Innov. Res. 2019, 16, 74–77.
7. Fedorko, I.; Baˇcík, R.; Gavurová, B. Technology acceptance model in e-commerce segment. Manag.
Mark. Chall. Knowl. Soc. 2018, 13, 1242–1256
8. The Impact of COVID-19 On Global Ad Spend. (Available Online) https://pubmatic.com/covid-19/
(Accessed on 29.08.2021)
9. https://www.financialexpress.com/brandwagon/covid-19-records-a-high-spend-by-states-and-centre-
government-adex-stood-at-rs-165-crore-between-march-2020-june-2021/2277192/ (Accessed on
28.08.2021)
10. "Consumer sentiment and behavior continue to reflect the uncertainty of the COVID-19 crisis", McKinsey,
26 October 2020, https://www.mckinsey.com/business-functions/marketing-and-sales/our-insights/a-
global-view-of-how-consumer-behavior-is-changing-amid-covid-19;

AUTHOR DETAILS:

N. PRABHAKARAN
Ph.D. Research Scholar, Commerce, Presidency College, Chennai – 05

443
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

A CONCEPTUAL STUDY ON THE TRENDS OF KNOWLEDGE AND KNOWLEDGE


MANAGEMENT

SUMAN BALA, NEETU RANI AND POOJA

ABSTRACT
Knowledge plays a vital role in our lives; what you perceive and how much you understand depend upon your
knowledge. Knowledge understands rationally verifiable facts, so knowledge is valid and justifiable. Knowledge
is defensible to say its explicit knowledge, and knowledge in people's minds is tacit knowledge, its internal
knowledge. With the help of a literature review, we study the relationship between knowledge and knowledge
management that knowledge is the first step of rationality, and knowledge Management is decision-making as
the outcome of this process. The study clarifies the concept of knowledge and knowledge management.
Knowledge management collects, shares, uses, maintains, and organizes information. It was found that it is
essential not in the education sector but every organization. Different determinants affect knowledge
management. Some problems are faced while managing knowledge in this process. The study clarifies the
meaning of knowledge and knowledge management. Knowledge management is the ability to control the
knowledge consumed for better decision-making. Knowledge management is a process through which we can
create, capture, organize, store, dissemination, and application. It's observed that knowledge management is
essential in all types of organizations, whether they are education or others. All need to follow this process for
better reasoning and decision-making. Knowledge management distribution and evaluation are additional parts
of the process, making this process more effective and providing efficient results.
Keywords: knowledge, knowledge management, rationality, process.

INTRODUCTION
Knowledge is a condition of knowing something through experience from the surrounding. Information
generally shares and carries facts, data flows, and knowledge is the outcome of information. Knowledge is valid
information. Knowledge is the mixture of a framework for evaluating and incorporating new experience and
information in your existing pool of knowledge: (mc gill & Montreal, 2002). To know is one of the unique
processes of human behavior, and knowledge is the outcome of this process. Plato is a philosopher who argues
that knowledge is the outcome of the reasoning process. It's different from our opinion because it's just a
product of our senses. He also supported that knowledge reflects what you learned but not the perception of
anything. Aristotle scholar under Plato idea and thoughts cannot be separated from physical objects and sensory
information. He said that knowledge is created with the interaction of our sense organ with the natural world,
and finally, it is possessed by our mind. Japanese view knowledge as rooted in the sensory system only in its
final processing stage. They said that there is no need to appeal to any eternal or metaphysics world to
understand the nature of knowledge. In the Japanese view, "knowledge is wisdom acquired through the
perspective of the entire personality. Samurai also supported this view and said internal meditation was used
with physical training and knowledge management practices. Metaphorical thinking says knowledge is a
conceptual process, not just linguistic expression. They are involved in our thinking process (Ettore & Bratianu
et.al., 2018).
Knowledge is of two types: implicit, which is in mind or your inner self, not written or printed. It's total with
individual, and a different kind of knowledge is explicit, written in printed form, presented as evidence that can
be generated whenever you want. It can be sorted in repositories and indexing for its identification.
Knowledge management is basically a rational decision-making process. It's an interdisciplinary process for
creating, sharing, using, and maintaining organizational information. Its basically
 Knowledge management is your ability to manage.
 Knowledge used is not the consumption of knowledge.
 If you use your knowledge, that does not mean you lose knowledge.
 The knowledge is available in abandoned, but we recognize the right one and use it effectively.
 At the end of the day, most of the valuable knowledge walks out of the door.
MEANING OF KNOWLEDGE
Hunt. et al. (1996), a person's knowledge is what he wants to acquire from facts they ascertain. The points are

444
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

developed by expert advice, which he wanted to seek knowledge for them (Tuomi, 1999). Knowledge is a
hierarchy between data and information. In this first, information is processed after data, and at last, knowledge
is concluded as a cognitive process (Alavi, M., & Leidner, D. 1999). knowledge management is said to be a
belief that ultimately increases the individual's capacity to take effective action. Actions are in the way of
physical kill, competencies, cognitive, and intelligence. There are three perspectives of knowledge management.
These are information-based, technology-based, and culture-based (Bhatt, G. D., 2001) knowledge is an
adequately organized combination of data assimilation with a set of rules, procedures, and operations, which are
to be learned through experience and practice. Whatever our mind concludes from data is knowledge, but it
becomes data or information only if it is meaningless (Deering, A. 2002). knowledge management is a human
intellectual and transfers this intellectual into a service group. Knowledge management system embodied by the
database system, organizational language subsystem, networking subsystem, and transfer subsystem. (Hunt, D.
P. 2003). When we are speaking about knowledge, it's genuine and justifiable. Knowledge is an intangible thing
that cannot be seen with our eyes but is observed. We say knowledge is the capacity to act or to do anything. So
if we know, we feel safe, comfortable, practical, which ultimately leads to the achievement of goals of the
organization and individual: (Tom butler, & Ciaran murphy. 2007) knowledge management or information
technology argues for creating, storing, and retrieving transfer and application of knowledge in the organization
(Becerra-Fernandez, I., & Sabherwal, R. 2014). We get different thoughts meaning an idea from additional
knowledge resource is knowledge which promotes the creation, sharing, and leveraging of corporate
knowledge. Knowledge management relates to intellectual capital, which different corporate are using (Sadia
Anwar, 2016). Knowledge is crucial for the education industry. The researchers say knowledge is an essential
antecedent for knowledge sharing and continuous innovation and success (McGinn, C. 1984). knowledge needs
to be a belief which essentially needs to be cognitively related with the rationality of thought. Here, you decide
or develop your viewpoint after completely understanding the term rationally (Oeberst et al. 2016) knowledge
is a tripartite theory of a justifiable belief. So that we get a good reason to believe and prove our knowledge as
true or accurate. The proposition which is not verifiable is not considered as knowledge (Mohajan and
Harahan 2016) knowledge is not an individual concept. It is a collection of experience, appropriate
information, and skilled insight that gives you a well-structured estimate to integrate new expertise and
information. Knowledge is a storehouse of intelligence for the further devolvement of a person. (Bolisani,
Ettore & Bratianu, Constantin, 2018). To know is a specific human process, and knowledge results from
learning anything. Significant prospective of knowledge are rationalism and empiricism. Knowledge is
justification or true belief generated rationally and with a proper reasoning proces. (Liew, Anthony, 2007).
Data is a collection of words, symbols, raw forms of facts. It includes sensory symbols and non-sensory
symbols from the pool of raw facts. The primary purpose of data is to relate the activities and situations to
capture an accurate picture. Information is the message that contains relevant, meaningful, and implacable data
as input for the decision-making process. So the information is processed as data needed for decision making.
Knowledge is "cognition or recognition (know-what), capacity to act (know-how), understanding (know- why)
the ultimate aim of knowledge is to add value in an existing pool.
Knowledge is ancient as our civilization in human life. It came from epistemology, a branch of philosophy.
"episteme." It means knowledge, and "logy" means a science through which we conclude our facts.
Epistemology is an area of philosophy that considers knowledge to justify facts. Knowledge, when we are
justifying it, it has three essential dimensions.
1. Prior knowledge – its universal truth, its need not to justify as son rises from the east is a universal fact
which is not needed to justify anymore. It's like logic and mathematics, which do not need any proof. It came
with all Profs. In ancient times it was a particular type of knowledge.
2. Posterior knowledge – its factual information about the fac. It's complied or framed based on experience and
observation developed scientifically. So it's more practically proven knowledge that needs some proof.
3. Experienced knowledge is a tentative type of knowledge because it cannot exist but needs to be verified
collect evidence to prove this. All this is done due to our experience ,(Chia, Robert. 2009)
MEANING OF KNOWLEDGE MANAGEMENT
The Internet provides an abundant or unlimited source of knowledge that needs to manage—(kimiz dalkir,
2005). Knowledge management is an ongoing process that continues all the time. It starts from creating
knowledge or accusation of expertise, and then captures organization, storage, dissemination, and application.
Knowledge acquisition is the development and creation of insight, skill, and relationship. Knowledge
conversion is a social process in which different people communicate and make new knowledge. Knowledge
acquisition is connecting specific knowledge to execution or critical thinking. (Ana. Matten 2019). knowledge
445
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

management is a process to manage knowledge potentials, leading to value creation for an organization. It leads
to sharing, application, development, acquisition, and preservation. If knowledge evaluation is implemented, it
will increase the organization's efficiency. We can also say that knowledge management is a dynamic and
scientific process. Knowledge management has five essential steps: knowledge acusiqiton, use, preservation,
development, and, importantly, knowledge sharing Akhavan et al., 2010). Nowadays, portal services are used
in different knowledge-providing universities due to modernization, but further challenges emerge in this
implementation. Organizational factors are priorities in threes factors. Other challenges are financial and
information, security, technology and management, senior management support and strategy, users motivation
and culture, project management, change management, and training. Now knowledge management portal has
become a brand (Salo's 2011). study explores some leadership-derived forces that make knowledge
management implementation more effective. They are different practices used while acquiring knowledge in
educational institutes. The study concludes that KM was the heart of education and research development or
improvement (Garcia et al., 2011), social networking sites are significant nowadays. It leads to enhancing the
knowledge management process. More students or participants are well aware of social networking, so it's quite
Easy for them to use these sites and play an important role. Horizontal and vertical both in institutes need to
promote in places while working, which leads to the organization's growth and promotion, (Sharma, 2012).
Many changes are to be taken in the education process, so it's essential to know the teacher's perception of
knowledge management orientations in private institutes. Knowledge management in a higher institution is
received that much attention. There are five dimensions of knowledge management in private engineering
institutions: knowledge acquisition, knowledge dimension, leadership, culture, and technology. The study's
overall conclusion is that the five dimensions effectively use the knowledge management system in these
engineering institutions (Johannessen, 2017). The Knowledge management plays a significant role in a future
organization called info structure, which develops transfers, analyzes, storage, coordination, and manages data,
information, and knowledge. The infostructure emphasizes the frontline focus of a new way of organizing
business, module flexibility, a new structuring of your work, and global competencies structure that leads to
new competencies (Veer Ramjeawon & Rowley, 2018). Knowledge management was to be studded with the
help of its process that is knowledge creation, sharing, and transfer. It was found that knowledge was created
with learning activities, Consultancies, organizational documents, and external sources. Knowledge sharing is
done by department and curriculum, meetings, annual research seminars, conferences, and journals publication.
Knowledge is transferred to students, workforce tailor-made courses, training programs of public and private
institutes. There is a lack of awareness about this knowledge management process, (Chibuzor et al., 2019).
Study explored a positive relationship between technical and administrative innovation with knowledge
acquisition, sharing, and application. The study recommends that every organization needs a proper knowledge
storage system for disseminating new knowledge from different sources. With this system, every innovation
system is implemented efficiently and effectively, (Teigland et al., (2000)Traditionally, MNCs have to build a
successful ample space. Still, due to increasing complexities and competition, they need a centralized R&D
structure which leads to the creation of new technology for facing its complexities. There are four main reasons
responsible for the emergence of this need: the number of knowledge sources increase, localization of
competition, shrinking product life cycle, diversity of kill, and technologies requirement,(V Nair & Munusami,
2020). The knowledge management practices are placed in higher education institutes, but employees are not
aware of these practices. Some key areas were used for efficient working of knowledge management. These are
leadership innovation, knowledge sharing, knowledge acquiring work culture and technology usage,
(Quarchioni et al., 2020). Study shows that knowledge management is in just emerging age or embryonic
stage. It provides a thematic and descriptive analysis of knowledge management in higher education. They
establish a relationship between inputs [human, relational and technical] with knowledge management
implementation output. It will improve the learning process in higher education institutes, (F., Marzi, G., &
Orlando, B. et al. 2020). Knowledge management is a practice related to handing knowledge from its creators
and who provide you the knowledge. Knowledge management basically consists of a process, (Boamah et al.,
2021). Some factors make the knowledge management process implementation possible: employee knowledge,
motivation, effective decision, and strategic planning in the constructive industry. But in conclusion, we say that
the next-generation knowledge management strategy depends upon content sharing, decision making, and free
flow of ideas in the organization (Paudel & Bhattarai, 2021). it shows the interdependence between
knowledge management in higher education institutes and academic performance. There are seven dimensions
of knowledge management: knowledge utilization, acquisition, generation, dissemination, transfer, creation, and
presentation. There are four dimensions of staff academic performance: research and publication, innovation,
interactive learning, and capacity building. In conclusion, it was explored that the knowledge management

446
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

component positively impacts the employee knowledge management economy of staff in higher education
institutes(Chen & Xu, 2021). Knowledge enhancement is not influenced by just one, but different internal and
external factors affect the knowledge management process. The internal sources are innovative capabilities;
strengthen knowledge exchange, technology, and research and publications. Internal teaching factors of
corporate university, teachers employed outside the corporate university, technical means and knowledge-
sharing platform all help in the knowledge enhancement process (Di Vaio et al., 2021). The study shows that
digital innovation in knowledge management system plays a crucial role in effective implementation of the
Internet of things and business performance. It's a bibliographic analysis of 46 papers showing that knowledge
management systems add value to corporate governance through digitalization. There are the different crucial
roles of digitalizing knowledge management system they are like the role of knowledge management strategies,
supporting managers in decision making and optimizing the use of technology in business model development
(Serenko & Bontis, 2021). The study is conducted on knowledge management journals how, there ranking,
there citation indexes like H and G indices. The study provides a ranking of the journal in global database. The
pattern and trend show that many top-quality researches are conducted in the knowledge management area and
editors play a vital role in there evaluation and publication (Paudel & Bhattarai, 2021). Knowledge
management changes rapidly in this global context according to that perspective of faculty members is also
changing perception of faculty member changes according to international practices changes like academic and
organizational structure thoughts. A canonic correlation is found between seven factors in these universities. It
shows an independent relationship between knowledge utility, acquisition, generation, and dissemination with
research publication and capacity building, knowledge creation with innovation, and knowledge transfer and
presentation with interactive learning (Arias Velásquez & Mejía Lara, 2021). In this epidemic era, the
education system needs to update rapidly, but issues are arising in connectivity and adoption. Four persecutes
emerge into this: intellectual achievement, educational process, stakeholders, and intellectual development.
According to the model, institutes faced difficulty in assimilating knowledge in this epidemic. Relational capital
is affected very drastically, which ultimately affects knowledge management (Stanca et al., 2021). A direct
relationship of the community of practice depends upon the understanding level of students there learning style
and personality. Community of exercise in today's time plays a vital role for the development of professional
knowledge model graduate to gain specialist knowledge.
NATURE OF KNOWLEDGE MANAGEMENT
Knowledge management is an emerging concept due to the increase in the complexity of the institutions. It
helps solve problems in a very effective way. For problem-solving requires a process, and every part of this
process plays a significant role. Nowadays, technology is also playing an essential role in knowledge
management, the majority of work of acquisition, capturing, and storage is done with the help of technology. It's
also a safe and manageable way of handling knowledge. Knowledge indexing is also a challenge in knowledge
management, which is a very effective shootout by the technology (Gloet, M., & Berrell, M. 2003), with the
help of knowledge management, you can develop a knowledge asset for your organization. It helps correctly
refine your resources and update them from time to time. It will help you face the competitive environment and
become better in the field. Your knowledge repository needs to cover all types of knowledge, whether implicit
or explicit. Information is not presented in one, for you need to access both types of knowledge. Along with
that, it's also essential to know from where you get the information they are authentic, and further this
knowledge is helpful for decision making or not (Rowley, J. 1999). The primary function of knowledge
management is not systematic thinking, but its application without proper application its outcome is nothing. It
improves the working and quality of an institution. So it's using your brand power and doing brainstorming
activities. For brainstorming, it provides the content A.Khakpou. (2015).
IMPORTANCE OF KNOWLEDGE MANAGEMENT
Knowledge management is very much necessary now. Days without proper knowledge management, you're not
able to face the complexity of your environment. Now, globalization leads to an absolute increase in the
complexity of the business. Different ways and methods of doing work emerge daily if you're updated, then
only this global competition is faced by you; otherwise, not. Knowledge management is also helpful in saving
our resourcing. If we have a repository of information, it is easy to get the data and quickly decide. Knowledge
repositories store data by properly indexing them, which helps a lot. In this way, knowledge transfer can also
become an effortless task with the help of capturing and storing knowledge, and we can transfer them and use it
whenever we want. For this purpose, technology advancement helps a lot now a day's it is very easy to
knowledge repositories' with the help of technology, store and transfer them. It builds a new exposure of
institutions for upliftment as an intellectual capital asset of the organization. It manages the overloading of
information. Relevant information is handled.
447
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

PROCESS OF KNOWLEDGE MANAGEMENT


1- Knowledge Acquisition and Generation- knowledge need to acquire means we first have tacit knowledge
in our internal in our mind. We externalize that knowledge through the explicit process of any printed format
that further needs storage in written material. The concept of knowledge generation is also essential. Along
with that, it's exploring from the pool of information which will be new or new for you. Any way can do the
generation lie formally, informally, by doing research or sharing problems with, we get new solution from
them.
2- Knowledge Capturing- Knowledge management is identifying and capturing information from the pool of
knowledge and sharing the effective utilization of this knowledge in the institute. This also increases
intellectual assets for better performance and getting a competitive advantage. In the begging of knowledge
management, we capture the required knowledge, capturing is a process of converting our tacit knowledge
into explicit one. It's a process of externalization and internalization, vice versa. It's actually what type of
information we want for further processing. You can capture the knowledge in two ways: technology which
helps to reach the knowledge. Another is knowledge mapping means in an organization where the
knowledge needs to be used in which structure layer of the organization.
3- Knowledge Organization- it's a place where you quickly find the information whenever you are needed. It's
like any index or cataloging recorded all the book and non-book information of that content. It's some time
structure for information handling to get it on and when we require it. It's a place schedule where we found
relevant knowledge.
4- Knowledge Storage- to capture knowledge for future usage means in future whenever we need that that
knowledge we get the weather in a digital or documented form. We can store the information in coding,
transcribing, and digital documentation. It is also called a 'repository,' a warehouse where systematically you
place your information.
5- Knowledge Sharing- it's a critical part of the knowledge process. Without sharing the knowledge, it's worth
noting your acquisition of knowledge is nothing without sharing. So sharing knowledge means whatever
knowledge you acquired from different sources exchanged then to persons, organizations, or institutions.
Then it becomes a gaining process. An enhancement of knowledge is to be done in this way. If you can't
share knowledge it disappears or hoarding up to you, which discourages knowledge transfer.
6- Knowledge Application- application is a practical aspect of whatever knowledge we have. It's like using
knowledge to solve different types of problems related to the organization or any other. Applying the
information effectively leads to optimum utilization of our recourses. Effective and efficient utilization
always leads toward a profitable and problem-solving approach (Iguehi.et.al. 2018), (Alaaldin. Et.al.2018).
CONCLUSION
Knowledge is an abstract term that is not seen with the eyes or its justifiable and verifiable truth that must be
implicit or explicit. It has a direct relationship with data and information. Data is a collection of facts and
figures. Its initial stage of knowledge. After collecting data, we process them and make them in information. At
last, a reasoning process ends at the enhancement of knowledge. Then management began knowledge is a
crucial matter, and it's essential in every organization, whether educational or business. Knowledge
management is collecting information that is further needed to create, share, use, and manage the organization's
knowledge. Technology is also playing an essential role in knowledge management. With the help of
knowledge management, we can effectively face the complexity of the environment. It leads to rational
decision-making, implemented with proper justification through these knowledge management repositories.
Knowledge management is not the era's need but also essential for the institution's growth.
REFERENCE
 McGinn, C. (1984). The concept of knowledge. Midwest Studies in Philosophy, 9, 529- 554.
 Dawson, M., & Midgley‐Hunt, J. (1996). What is the meaning of “knowledge” under the Limitation Act
1980?. Property Management, 14(4), 11-14. doi: 10.1108/02637479610150720
 Tuomi, I. (1999). Data Is More than Knowledge: Implications of the Reversed Knowledge Hierarchy for
Knowledge Management and Organizational Memory. Journal Of Management Information
Systems, 16(3), 103-117. doi: 10.1080/07421222.1999.11518258

448
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Rowley, J. (1999). What is knowledge management?. Library Management, 20(8), 416-420. doi: 10.1108/
01435129910291175
 Bhatt, G. (2001). Knowledge management in organizations: examining the interaction between
technologies, techniques, and people. Journal Of Knowledge Management, 5(1), 68-75. doi:
10.1108/13673270110384419
 Soo, C., Devinney, T., Midgley, D., & Deering, A. (2002). Knowledge Management: Philosophy,
Processes, and Pitfalls. California Management Review, 44(4), 129-150. doi: 10.2307/41166146 .
 Bouthillier, f., & shearer, k. (2002). understanding knowledge management and information management
:the need for empirical perspective. Information Research, 8(1).
 Gloet, M., & Berrell, M. (2003). The dual paradigm nature of knowledge management: implications for
achieving quality outcomes in human resource management. Journal Of Knowledge Management, 7(1), 78-
89. doi: 10.1108/13673270310463635
 Dalkir, K. (2005). Knowledge management. Boston: Elsevier/Butterworth Heinemann.
 Butler, T., & Murphy, C. (2007). Understanding the design of information technologies for knowledge
management in organizations: a pragmatic perspective. Information Systems Journal, 17(2), 143-163. doi:
10.1111/j.1365-2575.2007.00237.x
 Liew, Anthony. (2007). Understanding Data, Information, Knowledge And Their Inter-Relationships.
Journal of Knowledge Management Practice. Vol. 7.
 Hunt, D. (2003). The concept of knowledge and how to measure it. Journal Of Intellectual Capital, 4(1),
100-113. doi: 10.1108/14691930310455414
 Armstrong, S., & Fukami, C. The Sage handbook of management learning, education, and development (pp.
23-41).
 Akhavan, P., Adalati, M., Sharifi-Yazdi, S., & Hosnavi, R. (2010). The challenges of knowledge
management portals application and implementation:An Iranian organizations case study. International
Journal of Industrial Engineering Computations, 1(1), 79-94. doi: 10.5267/j.ijiec.2010.01.008
 Becerra-Fernandez, I., & Sabherwal, R. (2014). Knowledge management: Systems and processes.
Routledge.
 Oeberst, Aileen & Kimmerle, Joachim & Cress, Ulrike. (2016). What Is Knowledge? Who Creates It? Who
Possesses It? The Need for Novel Answers to Old Questions. 10.1007/978-3-319-13536-6_6.
 Bolisani, Ettore & Bratianu, Constantin. (2018). The Elusive Definition of Knowledge. 10.1007/978-3-319-
60657-6_1.
 Abualooush, shadi habis & Masa'deh, Ra'Ed & Bataineh, Khaled & Alrowwad, Alaaldin. (2018). The Role
of Knowledge Management Process and Intellectual Capital as Intermediary Variables between Knowledge
Management Infrastructure and Organization Performance. Interdisciplinary Journal of Information. 13.
279-309. 10.28945/4088.
 Raudeliuniene, Jurgita & Davidavičienė, Vida & Jakubavičius, Artūras. (2018). Knowledge management
process model. Entrepreneurship and Sustainability Issues. 5. 10.9770/jesi.2018.5.3(10).
 Arias Velásquez, R. M., & Mejía Lara, J. V. (2021). Knowledge management in two universities before and
during the COVID-19 effect in Peru. Technology in Society, 64, 101479. https:// doi.org/ 10.1016/
J.TECHSOC. 2020.101479
 Boamah, F. A., Zhang, J., & Wen, D. (2021). Enablers of knowledge management : practical research-
based in the construction industry. https://doi.org/10.1108/IJIS-09-2020-0142
 Chen, Y., & Xu, Y. (2021). Influencing factors of knowledge enhancement of corporate universities in
China. Kybernetes. https://doi.org/10.1108/K-03-2021-0218
 Chibuzor, A. A., Jovita, O. U., & Onyemachi, U. C. (2019). Knowledge management and organizational
innovation. Strategic Journal of Business and Social Science, 2(2), 1–20. https:// www. researchgate. net/
publication/331330077_Knowledge_Management_And_Organizational_Innovation

449
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Pellegrini, M. M., Ciampi, F., Marzi, G., & Orlando, B. (2020). The relationship between knowledge
management and leadership: Mapping the field and providing future research avenues. Journal of
Knowledge Management.
 Di Vaio, A., Palladino, R., Pezzi, A., & Kalisz, D. E. (2021). The role of digital innovation in knowledge
management systems: A systematic literature review. Journal of Business Research, 123(September 2020),
220–231. https://doi.org/10.1016/j.jbusres.2020.09.042
 Muhammad Asrar-ul-Haq & Sadia Anwar | Tahir Nisar (Reviewing Editor) (2016) A systematic review of
knowledge management and knowledge sharing: Trends, issues, and challenges, Cogent Business &
Management, 3:1, DOI: 10.1080/23311975.2015.1127744
 Garcia, E., Annansingh, F., & Elbeltagi, I. (2011). Management perception of introducing social
networking sites as a knowledge management tool in higher education: A case study. Multicultural
Education and Technology Journal, 5(4), 258–273. https://doi.org/10.1108/17504971111185090
 Johannessen, J. A. (2017). Knowledge management in future organizations. Problems and Perspectives in
Management, 15(2Continue2), 306–318. https://doi.org/10.21511/ppm.15(2-2).2017.01
 Mrs Ana.Mateen, may 2019. "a study of apllication of nowledge management process for organisational
development in select public sector banks.
 Paudel, K. P., & Bhattarai, P. C. (2021). Interdependencies between knowledge management and academic
performance in higher educational institutions. https://doi.org/10.1108/VJIKMS-01-2021-0005
 Quarchioni, S., Paternostro, S., & Trovarelli, F. (2020). Knowledge management in higher education: a
literature review and further research avenues. Knowledge Management Research and Practice, 00(00), 1–
16. https://doi.org/10.1080/14778238.2020.1730717
 Salo, N. (2011). Knowledge management in education in Indonesia: An Overview. Global Journal of
Human Social Science, 11(1), 31–44.
 Serenko, A., & Bontis, N. (2021). Global ranking of knowledge management and intellectual capital
academic journals: a 2021 update. Journal of Knowledge Management. https://doi.org/10.1108/JKM-11-
2020-0814
 Sharma, V. (2012). A perceptual study on KM orientation in Indian private engineering institutions.
https://doi.org/10.1108/09513541211213327
 Stanca, L., Dabija, D. C., & Păcurar, E. (2021). Community of practice: converting IT graduate students
into specialists via professional knowledge sharing. Kybernetes. https://doi.org/10.1108/K-10-2020-0711
 Teigland, R., Fey, C. F., & Birkinshaw, J. (2000). Knowledge dissemination in global R&D operations: An
empirical study of multinationals in the high technology electronics industry. Management International
Review, 40(1), 49.
 V Nair, B., & Munusami, C. (2020). Knowledge management practices. Journal of Research in Innovative
Teaching & Learning, 13(2), 174–190. https://doi.org/10.1108/jrit-01-2019-0008
 Veer Ramjeawon, P., & Rowley, J. (2018). Knowledge management in higher education institutions in
Mauritius. International Journal of Educational Management, 32(7), 1319–1332. https:// doi.org/ 10.1108/
IJEM- 05-2017-0129
 Igbinovia, Magnus & Ikenwe, Iguehi. (2018). Knowledge management: processes and systems. Information
Impact: Journal of Information and Knowledge Management. 8. 26. 10.4314/iijikm.v8i3.3.
 https://mpra.ub.uni-muenchen.de/83041/1/MPRA_paper_83041.pdf

AUTHOR DETAILS:
SUMAN BALA1, NEETU RANI2 AND POOJA3
1,3
Research Scholar and 2Assistant Professor, Institute of Management Studies and Research, Maharshi
Dayanand University, Rohtak- 124001

450
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

A STUDY OF AUDITORS AWARENESS OF FORENSIC ACCOUNTING AND PERCEPTION ON


FRAUD

SEEMA DEVI AND RAM RATTAN SAINI

ABSTRACT
Organizations need to have forensic accounting as important as profit. Because, fraud became an accepted part
of big business houses' culture. Auditors should detect it and prevent it from becoming a problem but the
auditors have their limitations. In today's world auditors are not enough to deal with fraudulent activities. Here,
the job of forensic accountant becomes full of challenges. The objective of the study is to know the auditors
awareness of forensic accounting and perception on fraud. The data was collected from both internal and
external auditors. SPSS 21 software is used to analyze data and the chi-square test is applied. The study
revealed that auditors are moderately aware about forensic accounting. It also shows perception of auditors
that fraud is more common in companies with higher turnover, especially in govt. or private sector. Private
companies are also more likely to commit financial statement frauds than corruption or asset misappropriation.
The study suggested that forensic accounting should be accepted and applied in organizations to prevent and
detect fraud at its early stage.
Keywords: Culture, financial statement frauds, forensic accounting, fraudulent activities, turnover.

INTRODUCTION
The proverb "Auditors are watchdog, not the bloodhound", outlines the prerequisite skills that auditors must
have to deal with the changing business environment. In regular business life, extortion and deceit are common.
Every day, newspapers and news channels show a multitude of economic frauds and irregularities. It is essential
to ask: Should we invest in public, private, govt. or nonprofit organizations; whom to trust- employees,
managers, or owners/executives? Are auditors able to spot fraudulent activities in the organization? A rational
investor seeks a high return with minimal risk. As a result, expectations from auditors increase. However, there
is a gap in expectations between what auditors expected to do and what they actually do. As investors begin to
believe that auditors are only there to provide financial information, the auditor's tagline of "Trust Me" has
becoming less trustable. (Olojede et al., 2020). Forensic accounting is a new branch of accounting that grew out
of financial failures in businesses and the failure of auditors to meet expectations. Although it is a branch of
accounting, forensic accounting seems to be more critical than auditing.
Auditing failures spot frauds, resulting in enormous losses for investors and companies. Harshat Mehta scam,
Vijay Mallya fraud, 2G scam, Coalgate scam and Commonwealth games are just a few examples. The loss to
the nation from these scams is numerous. It is imperative that multinational companies, whether
PriceWaterHouse Copper, Deloitte, or KPMG, appoint auditors with forensic accounting knowledge. That is
why forensic accounting has become more critical in the education sector (Akhidime & Uagbale-Ekatah, 2014)
(Rezaee et al., 2014). Global study on occupational Fraud and Abuse: A report to nation (2020) shows that
frauds are responsible for more than $3.6 billion in annual losses worldwide. It suggested that frauds can be
detected earlier and will result in a decrease in loss. The loss will increase the longer it takes. Auditors who are
familiar with forensic accounting can detect frauds early. An increase in the awareness of frauds by auditors can
reduce financial crime court cases. (Evaz & Ramazani, 2012).
An auditor is someone who verifies and confirms the accuracy of financial statements. They also submit a
management report. Auditors review all supporting documents and have face-to-face interaction with employees
or managers in the event of any doubts. After verifying the information, they will determine if there is a shell
company, ghost employees or other fraudulent activities. An auditor must also be able to perform investigative
tasks to detect and prevent fraud. Sometimes auditors did not have enough documents to verify the accuracy of
financial statements. For financial statements to be accurate, an auditor must have legal and investigative
knowledge. Auditors can identify fraudulent activity by closely studying documents within organizations. This
study examines the auditor's perception of fraud and fraudulent activity occurring in an organization. The
auditors can inspect the managers, employees, owners/ executives, and any other areas most closely related to
fraudulent activities. When fraud is committed within an organization that auditors cannot identify, they call a
forensic accountant. Organizations are most vulnerable to fraud due to misrepresentations of financial
statements and misappropriation of resources. (Enofe et al., 2015). In the past, forensic accounting was not in

451
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

existence. It was auditors that identified fraudulent activities and prevented them from happening again.
Although auditors and forensic accountants have similar skills but the roles of these professionals are quite
different. While generally accepted accounting standards and principles bind auditors, the power of a forensic
accountant is unlimited. They are not responsible at all stages of an investigation. It assists companies in
reaching their goals by using a systematic and disciplined approach to assess and improve the effectiveness and
efficiency of their risk management, control, governance processes. (Shaheen et al., 2014). The reality is that
accountants focus on the numbers, while forensic accountants are more interested in the facts. (Okoye, E.I. &
Gbegi, 2013). Forensic accountants can see beyond the numbers and deal directly with the business realities. It
is a prominent profession that specializes in analysis, interpretation, summarization and presentation. (Bhasin,
2007) Auditors are not mentally equipped to spot frauds. Mind-set, rather than methodology, will probably be
the best method of detecting frauds. (Singleton et al., 2006).
REVIEW OF LITERATURE
Forensic accounting can be described as old wine in a new bottle. Although its origin is not new, its increasing
importance is attracting the attention of all parties. Auditors should not limit themselves to verifying the
accuracy and completeness of documents; their proficiency and capacity are more. Although they are not often
in command, forensic auditors work with organizations continuously. (Dibia, 2017) (Konar & Aiyar, n.d.).
Auditors are objective and subjective in their opinions. Undoubtedly, their ability to resolve 30-40% of frauds
within an organization. The auditor needs to learn investigative skills to meet the expectations of investors and
the company. 39% of organizations today accept the need for forensic accounting. (Mishra & Singh, 2017)
(Chakrabarti, 2014). An auditor's ability to detect fraudulent activity can help reduce mismanagement and fraud.
Beyond auditing basics, the forensic accountant can use special techniques to detect and prevent frauds such as
Benford's Law and Theory of the relative size factor. As they handle all aspects of financial audits, chartered
accountants are the best suited for forensic auditors. An auditor can acquire expertise by completing a rigorous
and thorough training program, a post-qualification degree, or an investigation diploma. (Dutta, 2018) (Moid,
2016) (Biswas et al., 2013) (Asllani & Naco, 2014). India's white-collar crime boom is due to the delusion of
unlimited profit and failure of law enforcement. These financial crimes crash the economy and entrepreneurial
spirit. While auditors evaluate the risk and provide reports, forensic auditors (also known as investigators) use
investigative techniques to examine human behaviour and present evidence in legal proceedings. Auditing
failures can be caused by frauds such as improper management, rotation of auditors according to their needs,
verification and bias in the appointment of auditors. These are the reasons for a new area of accounting, forensic
accounting. (Lama & Chaudhuri, n.d.) (Mcgurrin et al., 2013) (Silverstone & Sheetz, 2007) (Sharma, 2014).
India is the most corrupted country in BRICS, with 40% of frauds significantly higher than 32% of the global
average. As a result, white-collar crime and financial crimes are more common in India than elsewhere. No
university offers forensic accounting as a part of its curriculum. Forensic accounting found to be the most
effective tool for detecting fraudulent transactions and assessing risk. External and internal auditing also benefit
from forensic accounting. (Singh et al., 2015) An auditor is someone who works within an organization to
improve the lives of all stakeholders. However, the forensic auditor also works for the court as an expert
opinion and consultant in litigation. (Yadav & Yadav, 2013) (Singleton et al., 2006) (Golden et al., 2006)
(Upadhyay, 2018) (Peshori, 2015). The internal control system within an organization provides a foundation for
the detection and prevention of fraud. Auditors identify red flags and evaluate fraud possibilities. Auditors use
audit procedures to reduce fraud. However, only 56 of the 218 audit procedures are effective. Auditors can only
investigate as much as they are allowed that indicates weaknesses in the internal control system. Forensic
accounting is essential. The technology-assisted techniques help auditors identify frauds, but small businesses
are reluctant to spend large amounts on activities that might not occur. Auditors can also play a significant role
in fraud prevention if they can work on their own. (Ejoh & Ojong, 2017) (Gould, 2012) (O. R. Gray &
Moussalli, 2014). A forensic accountant combines an auditor and a private investigator with more skills than
auditors. The court of law is the source for forensic accounting standards. Therefore, the expert witness in court
is the forensic accountant. Auditors are not appointed to prevent fraud but to identify and prevent errors. The
chances of fraud becoming a problem are reduced if errors can be identified and stopped promptly. Auditors
cannot go through every transaction. Fraud can still occur if there is a material error. Frauds can still occur even
after the audit of financial statements. SAS 99 states that auditors are only responsible for identifying fraud
possibilities. Management and organizations are responsible for preventing or detecting fraudulent activity. (D.
Gray, 2008). Effective auditing requires auditors to have communication skills, multidisciplinary skills, and
strategic thinking. Financial frauds can be controlled by having a strong internal control system and good
corporate governance. (Rathnasiri & Bandara, 2018). For the betterment and development of the economy, it is
vital to be informed about the requirements and scope of forensic accountants. (Evans, 2020)
452
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

RESEARCH METHODOLOGY
This exploratory study uses both primary and secondary data. Secondary data was gathered from published
Govt. reports, global survey reports such as Deloitte, Price water House and KPMG, which aid in identifying
the problem. For the primary data collection, external auditors and internal auditors (105) were selected from
the public, private, NPO's, and govt companies. A structured questionnaire is used to collect information.
Fourteen questions were used to determine the auditors' perception of the fraud. The data is analyzed using
descriptive analysis or chi-square non-parametric tests.
Table 1: Statements used for data analysis and interpretation
Gender:
Male
Female
Age:
1) 21-35
2) 35- 50
3) 50- 65
What is you organizational position -
1) Internal Auditor
2) External Auditor
Level of awareness of Forensic accounting.
1) Highly aware
2) Moderate aware
3) Low aware
What is your source of awareness of forensic accounting. (Can tick more than one)
1) Part of syllabus content
2) Any course/ Diploma/ Degree
3) govt. documentation
What is tenure of your service.
1) Below 10 years
2) 10-20
3) 20-30
4) 30 and above.
Which type of Organization you are working in.
1) Private
2) Public
3) Govt.
4) Non-profit org.
Nature of Industry you are serving.
1) Manufacturing
2) Service
3) Trading
What is the Turnover of your organization (per annuam).
1) Below 5 crore
2) 5-50 crore
3) 50- 250 crore
4) 250 and above
In previous time, is any fraud identified in organization where you are serving now.
Yes ( ) No ( )
Which category is more closely related to fraud.
1) Employee
2) Managers
3) Owners/ executives
What do you think in which area risk of fraud is high.
1) Asset Misappropriation
2) Corruption
3) Financial statement fraud
Source: Author’s own

453
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

ANALYSIS AND INTERPRETATION


Table 2 indicates that total numbers of internal auditors approached are 45 and external auditors are 60. Out of
45 10 internal auditors are highly aware about forensic accounting, 27 are moderately and 8 are low aware.
Table 2: Frequency of Level of awareness
Level of Awareness Internal Auditor External Auditors Total
Highly aware 10 21 31
Moderate aware 27 30 57
Low aware 8 9 17
Total 45 60 105
Source: SPSS 21
Similarly in external auditors 21 are highly aware, 30 are moderate aware and 17 are low aware. In nutshell it
can be interpret that 54.28% auditors are moderately aware about forensic accounting.
Hypothesis 1
H0: There is no association between tenure of service and level of awareness of auditors.
H1: There is association between tenure of service and level of awareness of auditors.
Table 3: Association between tenure of service and level of awareness
Level of awareness of forensic accounting
Highly aware Moderate aware low aware
Observed 17 12 6
below 10 years
Expected 10.3 19.0 5.7
Observed 9 8 1
10-20
Tenure of Expected 5.3 9.8 2.9
service Observed 2 32 0
20-30
Expected 10.0 18.5 5.5
Observed 3 5 10
30 and above
Expected 5.3 9.8 2.9
Source: SPSS 21
Table 3 (a)
Chi-Square Tests
Value Df Asymp. Sig. (2-sided)
Pearson Chi-Square 53.479 6 .000
Source: SPSS 21
Table 3 (b)
Symmetric Measures
Value Approx. Sig.
Phi .714 .000
Nominal by Nominal
Cramer's V .505 .000
Source: SPSS 21
Interpretation: The Chi-square test is significant as p-value <0.05, so the null hypothesis is not accepted
(rejected), i.e. there is no significant association between age and level of awareness of auditors. Even Cramer’s
V (0.505) found more than the moderately strong association between the variables. As shown in Table 3,
auditors having below 10 years’ experience, say newly appointed, are highly aware of forensic accounting. The
auditors with 10-20 years tenure are also highly aware but less than those with below 10 years’ experience.
Auditors with 20-30 years’ service are moderately aware, and 30 above are also aware but low.
Hypothesis 2
H0: There is no association between source of awareness and level of awareness of forensic accounting.
H1: There is association between source of awareness and level of awareness of forensic accounting.
Table 4: Association between source of awareness and level of awareness of forensic accounting
Level of awareness of forensic accounting
Highly aware Moderate aware low aware
454
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Observed 0 3 1
Part of syllabus content
Expected 1.2 2.2 .6
Observed 1 2 0
Any course/Diploma/Degree
Expected .9 1.6 .5
Your source of 0 8 15
Observed
awareness of Govt. Documentation
Expected 6.8 12.5 3.7
forensic
Any Course/Diploma/Degree+ Observed 1 20 0
accounting
Govt. Documentation Expected 6.2 11.4 3.4
Part of syllabus content+ govt Observed 0 20 1
documentation Expected 6.2 11.4 3.4
Part of syllabus content+Any Observed 29 4 0
course+ Govt documentation Expected 9.7 17.9 5.3
Source: SPSS 21
Table 4(a)
Chi-Square Tests
Value Df Asymp. Sig. (2-sided)
Pearson Chi-Square 127.666 10 .000
Source: SPSS 21
Table 4(b)
Symmetric Measures
Value Approx. Sig.
Phi 1.103 .000
Nominal by Nominal
Cramer's V .780 .000
Source: SPSS 21
Interpretation: As p < 0.05 and Cramer’s V value is .780 so, a highly strong significant association is found
between the variables and null hypothesis i.e. there is no significant association between source of awareness
and level of awareness of internal, external and both auditors; is not accepted.
Hypothesis 3
H0: There is no association between type of organization and category related to fraud.
H1: There is association between type of organization and category related to fraud.
Table 5: Association between type of organization and category related to fraud
Category more closely related to fraud
Employee Managers Owners/Executives
Observed 2 3 25
Private
Expected 16.3 6.0 7.7
Observed 20 1 0
Type of Public
Expected 11.4 4.2 5.4
organization you
Observed 28 6 2
are working in Govt
Expected 19.5 7.2 9.3
Observed 7 11 0
Non profit org.
Expected 9.8 3.6 4.6
Source: SPSS 21
Table 5 (a)
Chi-Square Tests
Value Df Asymp. Sig. (2-sided)
Pearson Chi-Square 97.265 6 .000
Source: SPSS 21
Table 5 (b)
Symmetric Measures
Value Approx. Sig.
Nominal by Nominal Phi .962 .000

455
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Cramer's V .681 .000


Source: SPSS 21
Interpretation: Table 5 (a), 5 (b) indicate that there is significant and strong association between the variables.
Thus, null hypothesis is not accepted (rejected), that, there is no significant association between type of
organization and category related to fraud. The table 5 represents that in private sector owners/ executives are
most commonly related to the fraud and in public & Govt. sector the fraudsters are employees. In the non-profit
organization, managers are more indulged in fraudulent activities.
Hypothesis 4
H0: There is no association between Type of organization, nature of organization and Area of highest fraud
risk.
H1: There is association between Type of organization, nature of organization and Area of highest fraud risk.
Table 6: Association between Type of organization, nature of organization and Area of highest fraud risk.
Area in which risks of fraud is high
Nature of organization
AM C FSF
Observed 0 1 7
Private
Expected 5.6 1.1 1.3
Type of
Observed 13 0 0
Manufacturing organization you Public
are working in Expected 9.1 1.8 2.1
Observed 17 5 0
Govt
Expected 15.3 3.1 3.6
Observed 1 0 10
Private
Expected 2.8 5.3 3.0
Observed 2 0 1
Type of Public
Expected .8 1.4 .8
Service organization you
Observed 6 5 1
are working in Govt
Expected 3.0 5.7 3.3
Observed 2 16 0
Non profit org.
Expected 4.5 8.6 4.9
Observed 0 11
Private
Expected 3.7 7.3
Type of
Observed 5 0
Trading organization you Public
Expected 1.7 3.3
are working in
Observed 1 1
Govt
Expected .7 1.3
Source: SPSS 21 (AM- Asset Misappropriation, C- Corruption, FSF- Financial Statement Fraud)
Table 6 (a)
Chi-Square Tests
Type of serving organization Value Df Asymp. Sig. (2-sided)
Manufacturing Pearson Chi-Square 41.127 4 .000
Service Pearson Chi-Square 43.611 6 .000
Trading Pearson Chi-Square 129.163 6 .000
Source: SPSS 21
Table 6 (b)
Symmetric Measures
Type of serving organization Value Approx. Sig.
Phi .978 .000
Manufacturing Nominal by Nominal
Cramer's V .692 .000
Phi .996 .000
Service Nominal by Nominal
Cramer's V .704 .000
Phi .935 .000
Trading Nominal by Nominal
Cramer's V .935 .000
Source: SPSS 21
456
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Interpretation: From the above table 6 (a) a significant association can be measure between the variables. The
values of Cramer’s V (.692, .996,.935,.784) indicates the association is highly strongly significant. Chi-square
table represents that in private manufacturing company’s financial statement frauds (as Observed-7, Expected
1.3), in public companies fraud of asset misappropriation (as Observed-13, Expected 9.1) and in govt.
manufacturing companies’ asset misappropriation and corruption (as Observed-17, Expected 15.3, 5 and 3.1)
can be found. Similarly, in service providing private companies financial statement frauds can be seen in govt.
service sector asset misappropriation and non-profit organizations are high level of corruption. The trading
private companies having financial statement frauds and public trading companies have asset misappropriation.
Hypothesis 5
H0: There is no association between turnover of organization (per annuam) and identification of fraud.
H1: There is association between turnover of organization (per annuam) and identification of fraud.
Table 7: Association between turnover of organization (per annuam) and identification of fraud
Any fraud identified in organization where
you are serving
Yes No
Observed 4.5 12
Below 5 Crore
Expected 7.2 4.8
Observed 23 24
Turnover of 5-50 crore
Expected 28.2 18.8
organization per
Observed 12 4
annuam 50-250 crore
Expected 9.6 6.4
Observed 28 2
250 and above
Expected 18.0 12.0
Source: SPSS 21
Table 7 (a)
Chi-Square Tests
Value Df Asymp. Sig. (2-sided)
Pearson Chi-Square 35.786 3 .000
Source: SPSS 21
Table 7(b)
Symmetric Measures
Value Approx. Sig.
Nominal by Phi .584 .000
Nominal Cramer's V .584 .000
Source: SPSS 21
Interpretation: The association between turnover of the company and identification of fraud is strongly
significant (Cramer’s value .584, more than .5), the null hypothesis is not accepted (rejected) i.e. There is no
significant association between turnover of organization and fraud identified. As chi square table indicates
companies with below 5 crore and 5-50 crore turnover facing less fraudulent activities but companies with
higher turnover i.e. 50-250 & 250 and above are facing more frauds. Thus, higher the turnover of the company,
higher will be the fraud risk.
CONCLUSION AND SUGGESTIONS
The analysis and interpretation represent the relationship between variables. All hypotheses are accepted at p
(0.05) value. Cramer's V value shows a significant association. The findings show that auditor awareness is
strongly associated with the length of time served by internal and external auditors. Newly appointed auditors
with less than 20 years of experience in forensic accounting are well aware. Table 4 shows that highly aware
auditors were aware of various sources, including government papers, a course and a syllabus. Auditors are now
taking forensic accounting courses to expand their knowledge. Forensic accounting is a hot topic. Based on their
experiences, the auditors asked about their perception of which type of organization is most closely linked to
fraud. It includes their views of employees, managers and owners/executives. The auditors found that
owners/executives in the private sector are more involved with fraudulent operations than employees in
government and public sectors. Managers are more involved in fraud in non-profit organizations. Researchers

457
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

discovered an association between nature of companies such as manufacturing, trading and service with the type
of company and the area of fraud. Financial statement frauds in the manufacturing, trading and service sectors
are most closely linked to the private sector. Public companies mainly deal with asset misappropriation. For
companies facing misappropriation of assets in the manufacturing or service sector, NPOs will adjust with
corruption (Table-6). Table 7 shows that the risk of misappropriation is higher for companies with higher
turnover.
Forensic accounting, a new area of accounting, is drawing the attention of both investors and auditors. A
company with forensic accountants can quickly identify frauds. It also increases creativity and investigative
skills. Institutes that offer chartered accountant courses understand the importance of forensic accounting
awareness among auditors. The type and extent of fraud or loss can vary depending on the organization and the
perpetrator. According to a report to the countries (Global study of occupational fraud and abuse 2020), asset
misappropriation frauds are the most prevalent fraud in nations, but they are also the less costly.
On the other hand, financial statements frauds are the least common but are high-cost, and corruption is the
most widespread in world economies. Large organizations are most at risk for fraud. Despite only 20% of the
fraud committed by their owners/executives, the risk of losing money is very high. Private companies that have
a higher turnover face more frauds than those with smaller turnover. Fraudsters are a common threat to large
business houses. They should appoint auditors who are familiar with forensic accounting.
Auditors work within their boundaries. That is why they cannot deter, detect and prevent fraud from being
committed by organizations. Although auditors may know what is going on in an organization, they cannot
reveal the fraud due to a lack of evidence and management support. Forensic accountants can be called when
fraud has been committed. They also assist in court when required. The literature shows that auditors cannot
identify all frauds, and they can solve only 30% to 40% of frauds. Auditors and organizations should accept
forensic accounting and apply it whenever they identify red flags. It will prevent organizations from a
considerable risk of loss and get rid of fraud early.
REFERENCES
1. Akhidime, E., & Uagbale-Ekatah, R. E. (2014). The Growing Relevance of Forensic Accounting as a Tool
For Combating Fraud and Corruption: Nigeria Experience. Research Journal of Finance and Accounting,
5(2), 2222–2847.
2. Asllani, A., & Naco, M. (2014). Using Benford’s Law for Fraud Detection in Accounting Practices. Journal
of Social Science Studies, 2(1), 129–143. https://doi.org/10.5296/jsss.v2i1.6395
3. Bhasin, M. (2007). Forensic Accounting: A New Paradigm For Niche Consulting. The Chartered
Accountant, January, 1000–1010.
4. Biswas, M., Hiremath, K. G., & Ramaswamy, S. (2013). Forensic Accounting in Indian Perspective. The
5th International Conference on Financial Criminology (ICFC):Global Trends in Financial Crimes in the
New Economies, 98–106.
5. Chakrabarti, M. (2014). Problems and Prospects of Forensic Accounting Profession in India. International
Journal for Informative and Futuristic Research, 59(6), 1–9.
6. Dibia, N. O. (2017). An Overview of Forensic Accounting in Nigeria. Journal of Finance and Economic
Research, 3(2), 104–109.
7. DUTTA, P. P. (2018). Forensic Accounting in India: A new vibrant approach to prevent white collar
crimes: an empirical study. International Journal of Basic and Applied Research, 8(9), 1122–1137.
8. Ejoh, & Ojong, N. (2017). Forensic Accounting, Internal Controls and Fraudulent Practices in Nigeria.
Scholars Journal of Economics, Business and Management, 4(8B), 555–562. https:// doi. org/ 10. 21276/
sjebm
9. Enofe, A. O., Agbonkpolor, O. R., & Edebiri, O. J. (2015). Forensic Accounting and Financial Fraud.
International Journal of Multidisciplinary Research and Development, 2(10), 305–312.
10. Evans, C. D. (2020). Forensic Accounting and Fraud Deterrence. Corporate Fraud Exposed, 261–278.
https://doi.org/10.1108/978-1-78973-417-120201017
11. Evaz, H., & Ramazani, M. (2012). Accountant’s Perception of Forensic Accounting (Case Study of Iran).
Global Journal of Management and Business Research, 12(6).

458
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

12. Golden, T. w., Skalak, S. L., & Clayton, M. M. (2006). A Guide to Forensic Accounting Investigation.
13. Gould, M. (2012). Forensic Accounting. Institute of Cetified Public Accountants of Pakistan, Module 6.
https://doi.org/10.4135/9781412964289.n407
14. Gray, D. (2008). Forensic Accounting And Auditing: Compared And Contrasted To Traditional Accounting
And Auditing. American Journal of Business Education (AJBE), 1(2), 115–126. https:// doi.org/ 10.19030/
ajbe.v1i2.4630
15. Gray, O. R., & Moussalli, S. D. (2014). Forensic Accounting and Auditing United Again: A Historical
Perspective. Journal of Business Issues, 2006(2), 15–25.
16. Konar, E. M., & Aiyar, S. (n.d.). A Study on Forensic Accounting Profession in India and Around the
World. Tactful Management Research Journal, 85–91, ISSN: 2319-7943.
17. Lama, M., & Chaudhuri, M. (n.d.). Forensic Accounting: a Study of Its Role in Investigating Corporate
Frauds and Scams in India. 11th International Conference on Science, Technology and Management,
Osmania University Centre for International Program, Osmania University Campus, Hyderabad (India), 72–
84, www.conferenceworld.in,ISBN:978-93-86171-9. http://data.conferenceworld.in/11ICSTM/11.pdf
18. Mcgurrin, D., Jarrell, M., Jahn, A., & Cochrane, B. (2013). White Collar Crime Representation in the
Criminology Literature Revisited,2001-2010. Journal of the Western Society of Criminology, 14(2), 3–19.
19. Mishra, S., & Singh, G. (2017). Forensic Accounting: An Emerging Approach to Deal with Corporate
Frauds in India. Global Journal of Enterprise Information System, 9(2), 104–109. https:// doi. org/ 10.
18311/ gjeis/2017/15922
20. Moid, S. (2016). Application of Forensic Accounting to Investigate Scams in India. MIJBR - MITS
International Journal of Business Research, 3(1), 24–31. http://www.mba.mits.ac.in/MIJBR/Article 4 Sana -
Forensic Accounting.pdf
21. Okoye, E.I. & Gbegi, D. O. (2013). Forensic Accounting : A Tool for Fraud Detection and Prevention in the
public sector. International Journal of Academic Research in Business and Social Sciences, 3(3), 1–19.
www.hrmars.com/journals
22. Olojede, P., Erin, O., Asiriuwa, O., & Usman, M. (2020). Audit expectation gap: an empirical analysis.
Future Business Journal, 6(1), 1–12. https://doi.org/10.1186/s43093-020-00016-x
23. Peshori, C. (2015). Forensic Accounting a Multidimensional Approach to Investigating Frauds and Scams.
International Journal of Multidisciplinary Approach & Studies, 2(3), 26–36. http:// ijmas. com/
upcomingissue/ 04.03.2015.pdf
24. Rathnasiri, U. A. H. A., & Bandara, R. M. S. (2018). The Forensic Accounting in Sri Lanka “Perception of
Professional Accountants.” Kelaniya Journal of Management, 6(2), 68–82. https:// doi.org/ 10. 4038/ kjm.
v6i2. 7546
25. Rezaee, Z., Lo, D., & Ha, M. (2014). International Emergence of Forensic Accounting Education and
Practice. Open Journal of Social Sciences, 02(12), 1–3. https://doi.org/10.4236/jss.2014.212001
26. Shaheen, I., Pranathi, Sultana, A., & Noor, A. (2014). Forensic accounting and fraud examination in India.
International Journal of Innovative Research & Development, 3(12), 171–177.
27. Sharma, A. (2014). Frauds in India and Forensic Accounting. International Journal of Research &
Development in Technology and Management Science –Kailash, 21(5), 200–207. http:// journal. Rtm
online. in/vol21iss5/053066.pdf
28. Silverstone, H., & Sheetz, M. (2007). Forensic Auditing and Fraud Investigation for Non-Experts.
29. Singh, D., Grewal, M., & Jaspal, M. (2015). Forensic Accounting as Fraud and Corruption Detection Tool:
An Empirical Study. International Journal of Science Technology and Management (IJSTM), 486–495.
http://data.conferenceworld.in/ICSTM2/P486-495.pdf
30. Singleton, T., Singleton, A., Bologna, J., & Lindquist, R. (2006). Fraud auditing and Forensic Accounting.
https://books.google.com/books?hl=en&lr=&id=HN4KzlG8q7wC&oi=fnd&pg=PR3&dq=related:mqVg4u
VQ8SMJ:scholar.google.com/&ots=B-4xeYzu60&sig=2ZwyTEuNn4s8-NXOedidtRaJI8Y

459
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

31. Upadhyay, J. P. (2018). Application of Forensic Accounting in Nepal. NCC Journal, 3(1), 82–89.
https://doi.org/10.3126/nccj.v3i1.20250
32. Yadav, S., & Yadav, S. (2013). Forensic accounting: A new dynamic approach to investigate fraud cases.
EXCEL International Journal of Multidisciplinary Management Studies, 3(7), 1–9. http:// www. Indian
journals. com/ijor.aspx?target=ijor:xijmms&volume=3&issue=7&article=001
WEBSITES
1. https://ficpasyoungandlicensed.com/2016/04/04/the-difference-between-forensic-accounting-and-auditing/
2. https://legacy.acfe.com/report-to-the-nations/2020/
3. https://www.pwc.com/gx/en/services/forensics/economic-crime-survey.html
4. https://www2.deloitte.com/in/en/pages/finance/topics/forensic/india-corporate-fraud-perception-survey-
2020.html

AUTHOR DETAILS:
1
SEEMA DEVI AND 2 RAM RATTAN SAINI
1
Research Scholar and 2 Professor, Department of Commerce, Maharshi Dayanand University, Rohatk,
Haryana- 124401, India

460
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

ASSESSING THE WORK ENVIRONMENT OF SURAT DIAMOND POLISHING INDUSTRY

RUCHIKA AGARWAL AND DR. SARJOO PATEL

ABSTRACT
Surat is the chief centre for the world’s largest diamond cutting and polishing industry which makes India a
leading producer of finished diamonds. Ironically, although India does not have its own significant diamond
reserves it is still a leading exporter of finished diamonds leaving its competitors-Israel and Belgium far
behind. The process of converting rough diamond stones into sparkling gems involves a series of systematic
steps that requires an eye for detail and skills of its workers. Surat’s diamond industry provides employment to
large number of people. Most of these industries are unorganised in nature and very few are organised that
provide better facilities to its employees. For the present study 30 workers from a small polishing unit of Surat
was selected using the purposive convenience sampling method. 6 workers from each of the five major tasks
involved in polishing of diamonds were selected, namely, ‘tablework’ or polishing of the topmost single facet,
‘girdle rounding’, ‘talia’ or ‘bottom work’ or polishing of 24 facets of pavilion, ‘athpel ’or polishing of top 8
facets of crown and ‘mathala’ or polishing of top 24 facets of crown. An interview schedule with structured
questions was developed and administered to collect information regarding the background information of the
workers and also to find out their perception about the work environment of these small units. Apart from this,
three instruments namely the Digital Lux meter, Digital Sound meter and Thermal Hydrometer were also used
to assess the environment. Results obtained from the survey indicated that although the diamond polishing
industry is largely a non-polluting industry with no involvement of chemicals and other hazardous substances,
but still there is scope for a lot of improvement in its work environment. Positive changes made in the work
environment will definitely contribute to the welfare of the workers working in the industry and will improve
their productivity.
Keywords: Diamond, Polishing, Environment, Industry

INTRODUCTION
Surat, located in Gujarat is one of the fastest developing cities of India. As per Swachh Survekshan 2020, this
city, formerly known as Suryapur, is the second-cleanest city in the country (Shukla Y, 2020). This region has
witnessed remarkable expansion over the past couple of decades, making it the economic and commercial hub
of the South Gujarat Region. It has become one of Gujarat's top industrial cities, home to the diamond, jari,
textile, chemical, and fertiliser industries, the first three of which are the major players (Chaudhry, 2002). Even
though majority of the other states in India take pride in their traditional textile crafts, they cannot contend
against Surat's popular manmade fibre and cloth, which is sold in huge quantities across the world. However,
the diamond cutting and polishing industry of Surat is quite distinct and unique. Because of the fame and allure
of this trade, the city is also known as the "Diamond City" of India. It is here where the country’s as well as the
world’s maximum diamonds are cut and polished. Infact, it is reported that 92 percent of the diamonds in the
world are processed here. The proximity to sources of rough diamonds, such as Africa, and also the easy
availability and affordability of labour contribute for this.
The diamond industry's value chain consists of three processes. First, the mining, and sorting of rough
diamonds. The second step is diamond cutting and polishing, while the creation and retail sale of jewellery is
the third step in the process.1

461
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig 1: Structure of Round Brilliant Cut Diamond


(Source: https://www.jewelry-secrets.com)
In India, rough stones are imported from countries that mine them and then are sent to the cutting and polishing
units. Cutting and polishing of these stones is a very complex operation that is performed by skilled individuals.
It is partially automated and partially manual. First, a computer software program is used to mark the rough
stones. This process involves calculating the optimum approach to cut the rough stone in order to get the most
valuable results. Once the stone has been marked, it is sent for laser cutting, a computerized procedure that
requires little human supervision. The diamond is then given to the polishing unit once it has been cut. A typical
diamond consists of 58 facets. The top or crown of the diamond has 33 facets while the bottom or pavilion
consists of 25 facets. The top and bottom are separated by a girdle.
The sparkle of the stone is the result of the work of highly skilled individuals who polish these facets of the
diamonds received from the cutting section. An eye for detail and trained movement of hands on the spinning
wheel gives the stone its desired shine. The polishing process is divided into five steps. The first is called the
‘tablework’ where in the table or top of the diamond is polished. Here the worker sits on the floor and rubs the
top of the diamond held by a hand device called ‘angoor’, on a spinning wheel that rotates at a speed of 2000
rpm. The second step involves rounding the girdle of the stone with the help of a computerized machine. Once
the diamond is given the desirable shape at the girdle it is fitted on a holder and sent for polishing the ‘talia’ or
24 facets at the bottom. This step is also called ‘bottom work’. Next, the 8 facets on top of the stone is polished
and this process is called ‘athpel’. The last step involves polishing the remaining 24 facets of the crown called
the ‘mathala’. Lastly the diamond is again sent for tablework to give the top its final shiny appearance.
The availability of low-cost, highly skilled labour is one driver in India's booming diamond sector 2. It is very
likely that the workers' backgrounds have had a significant role in the industry's success. The workforce is fairly
simple and has minimal formal education. Despite having little formal education, many employees have
excellent managerial and organisational abilities (Rao I, 2009). Today, women are working in the diamond
polishing industry as well.
Every individual has the right to a safe, healthy, and comfortable workspace, yet this is a fact that many people
frequently overlook, particularly in a nation like India where unemployment and illiteracy are high
and occupational health issues frequently take a backseat. According to Meena (2018), there is a great deal of
variation in how various industries operate in India, thus it is futile to have a standard operating procedure to
protect occupational health and safety. He also claimed that most industries have been disobeying appropriate
OHS practises.
The review of literature highlighted that a number of studies were conducted in India as well as outside, to
understand the work environment and the impact that it can have on the worker’s health and productivity
(Parimalam P. et al 2007, Manjunatha R et al 2011, Padmini and Venmathi 2012, Azuike, E. C. et al 2017, Al-
Zboon, K. K., & Forton, O. T. 2019, Yu, W., et al 2013, M Kifle et al, 2014). Many studies have also been done
on the Indian diamond industry wherein the stress of the workers, job satisfaction of the workers and financial
aspects have been studied (Kutty, M. N.,1991, Engelshoven,1999, Yadav et.al., 2019) , however the
environment of the workplace has not been assessed in any of the studies.
462
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

OBJECTIVES
 To find out the background information of workers working in the diamond industry
 To assess the work environment of the diamond polishing units in Surat
DELIMITATIONS
 The study was limited to Surat city only
 The study was limited to the working conditions of a polishing unit
 The study was limited to those workers doing ‘tablework’, ‘rounding of girdle’, ‘talia’, ‘athpel’ and
‘mathala’ work
METHODOLOGY
The research design of the present study is descriptive in nature. A sample size of 30 workers workings in the
diamond polishing industry was selected by purposive convenience sampling method. An interview schedule
with structured questions was prepared and administered to the respondents. Six workers working in each of the
five activities for diamond polishing unit namely the ‘tablework’ or polishing of the topmost single facet, ‘girdle
rounding’, ‘talia’ or ‘bottom work’ or polishing of 24 facets of pavilion, ‘athpel ’or polishing of top 8 facets of
crown and ‘mathala’ or polishing of top 24 facets of crown were interviewed. The obtained data was tabulated
and analyzed by using MS Excel software. Descriptive statistics was used to express the results. Three
instruments namely the ‘Digital Luxmeter’, ‘Digital Sound Meter’ and ‘Thermal Hygrometer’ were used to
assess the indoor light, noise levels, temperature and humidity of the polishing units. For each of the
environmental aspect, three readings were taken and the average of the readings was compared to the ideal
environmental conditions.
RESULTS AND DISCUSSION
The information for the present study was collected in two sections. In Section A, the interview schedule was
used to collect data under four subheads- personal information, family information, work related information
and perception of work environment by the workers. In Section B, the three instruments- Digital Luxmeter,
Digital Sound meter and Thermal Hygrometer were used to assess the indoor environment of the polishing unit
Section A - Interview
The interview schedule was used to gather information under 4 heads which are discussed as below:
1. Personal Information of the Respondents
1.1 Age

Fig 2: Age of the Respondents


It was observed that 40% of the respondents belonged to 31-35 years category, followed by 36% of those who
belonged to the 26-30 years category. However 17% of the respondents were from the 18-25 years age group
and only 7% were above the age of 36 years. Thus it was observed that those belonging to the young age group
were mainly employed in the diamond polishing industry. This could be because of the high physical demands
of this work.

463
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

1.2 Gender

Fig 3: Gender of the Respondents


93% of the respondents were males while only 7% were female. Although the diamond cutting and polishing
industry of Surat is a male dominated industry, but slowly and gradually women are also finding employment
opportunities in this area.
1.3 Educational Qualification

Fig 4: Educational Background of the Respondents


An enquiry made into the educational qualification revealed that 53.3% of the respondents had received primary
education while 36.7% of them had completed middle school education. Only 3.3% respondent had completed
high school and 6.7% of them had received no formal education. None of the respondents were graduates. Thus
the collected data revealed that the workers working in the polishing sector are not highly educated but they
possess the skills required to work in the industry.
1.4 Type of House

Fig 5: Type of House

464
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

80% of the respondents had rented homes while only 20% of them had homes of their own.
2. Information About the Family
2.1 Type of Family

Fig 6: Type of Family


73% of the respondents lived in a joint family while only 27% had nuclear families.
2.2 Earning members in the family

Fig 7: No. of Earning Family Members


It was observed that 60% of the respondents were the sole earning members of their family while 23% had two
members and 17% had 3 or more members contributing to the family’s income.
2.3 Income
The mean monthly income of the respondents was 21000/- while the mean monthly income of the family was
28000/-. The mean monthly savings of the respondents family was 5000/-.
2.4 Other Family Member Employed in the Industry

Fig 8: No. of Respondents having another family member employed in the Diamond Industry
60% of the respondents had another member of the family employed in the diamond industry as compared to
the remaining 40%.
3. Work Related Information
The respondents had spent an average of 8 years in the industry. For 73% of them the present place of work was
their first job. All the 30 respondents spent 10 hours at their workplace with one break of 45 minutes in
465
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

between. They were employed in one of the five activities that is done to polish diamonds. The average time to
complete each of the step was 4 minutes for each stone.
4. Perception of the Work Environment By the Workers
73.3% of the workers felt that the temperature was not comfortable while 26.7% of them felt vice versa. None
of the workers reported of the place having unpleasant odour. According to them the place was well ventilated,
not dusty and had adequate light. They reported that safe distance was maintained from the machine and the
machine was serviced as and when required. There was enough space for movement. But the workers revealed
that no emergency safety procedure training was given to them.
The information provided by the workers revealed that clean water and sanitary facilities were made available
to them but there were no separate rest rooms or lunch rooms. There was no first aid kit in place and nor were
there fire safety equipments installed. Since they were all contractual employees, they were not provided with
insurance coverage.
Section B – Assessment of the Indoor Environment
1. Indoor Light Levels
The polishing units majorly rely on artificial light as they are located in closed rooms with minimum supply of
natural light. Polishing of diamonds involves a lot of detail and precision work and therefore task lighting is
provided on each of the polishing machines. A Digital Lux Meter was used to measure the amount of light at
three different locations inside the diamond polishing unit. It was observed that the lighting was inadequate at
the entrance as well as at the machine, while the general lighting of the place was sufficient.
Observation Table 1
Sr. Area of Study Light Intensity Measured (Lux) Recommended
No. 1st Reading 2nd Reading 3rd Reading Average Standard (Lux)3
1 Near the entrance 62 65 70 65.7 100
2 Near the machine 500 523 520 514.3 1000
3 General Lighting 275 280 273 276 250
2. Indoor Noise Levels
The Digital Sound Meter was placed near the machine and three readings were recorded at an interval of five
minutes. The workers were working for 10 hours per day and 6 days a week in the polishing unit and it was
revealed that they were well within the noise permissible standards specified by OSHA.
Observation Table 2
Noise Recorded (db) Permissible Standard
1st Reading 2nd Reading 3rd Reading Average
86db 86.7db 89.3db 87.33db 85db-90db (for 8 hours per
day) (Source: OSHA, 2019)4
3. Indoor Temperature
The researcher recorded three readings on the Thermo Hygrometer to measure the indoor temperature between
1:00 pm to 3:00 pm when it was middle of the shift that used to start at 9:00 am and end at 7:00 pm. The mean
indoor temperature of the polishing unit was 30.03℃. Although many large and organised cutting and polishing
units have air conditioning facility inside their units, but for small players this would mean an additional cost. It
is a known fact that working in comfortable temperatures contributes to better health and productivity at work.
Observation Table 3
Indoor Temperature (℃)
st
1 Reading 2nd Reading 3rd Reading Mean
30.1℃ 29.8℃ 30.2℃ 30.03℃
4. Indoor Humidity
The researcher recorded three readings on the Thermal Hygrometer for the presence of humidity between 1:00
pm to 3:00 pm when it was middle of the shift that used to start at 9:00 am and end at 7:00 pm. The mean
humidity percentage was 41.33% which falls in the range of comfortable relative humidity which is 25% - 60%.
Observation Table 4

466
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Humidity Level (%)


1st Reading 2nd Reading 3rd Reading Mean
40% 41% 43% 41.33%
CONCLUSION
The diamond polishing industry of Surat mainly sources the youth for its manpower supply. This is because the
polishing work requires high level of concentration and focus and is also physically exhausting as it requires the
worker to sit for long durations causing strain in different parts of the body. The study also revealed that the
industry is a male dominated one but slowly women are also finding job opportunities in this sector. The skills
required for working in the industry can be learnt through training and experience and thus migrants from
nearby villages shift base to Surat to earn a living since there are limited employment opportunities in small
villages. The study also showed that practical skills like precision, focus and calmness were more important
than theoretical skills, the workers were mainly those who had dropped out of studies due to financial
constraints and had joined this industry. Most of the workers were the sole bread earners of their families and
had many people to take care of since a culture of staying in joint family was observed among the respondents.
The workers perceived the working environment like light, noise, temperature and humidity to be comfortable
for them. However the recording from the Digital Lux meter revealed that the lighting conditions were not
enough for their work. This detailed work that involves constantly checking the diamond facet through an eye
piece can cause a lot of eye strain if proper light is not provided. Thus the polishing unit owners must provide
adequate lighting facilities in their units.
The thermal hygrometer recorded comfortable relative humidity percentage but the indoor temperature was a
little above the comfortable temperature range. Higher temperatures can lower the efficiency and productivity of
the workers and may also lead to errors. Thus installing air conditioners or coolers would help in maintaining
adequate temperature.
The sound levels were well within the range of the permissible standards. The low levels of sound which is
produced by the spinning of the wheel and the stone rubbing against it, does not harm the workers working in
the industry.
Thus, although the diamond industry is a non-polluting industry, there are certain environmental concerns that
the unit owners must look into. In India, these concerns are often neglected as providing a comfortable
environment to the workers would mean additional cost to the owners. Awareness must be created in this aspect
as a comfortable environment would mean better productivity, better concentration and better results. Thus
reducing errors and resulting in profits in the long run.
REFERENCES
 Al-Zboon, K. K., & Forton, O. T. (2019). Indoor air quality in steel rolling industries and possible health
effects. Environment and Natural Resources Journal, 17(4), 20-29.
 Azuike, E. C., Egenti, B. N., Njelita, I. A., Nwachukwu, C. C., Obi-Okaro, A. C., Ilika, A. L., & NAzuike,
E. D. (2017). Determinants of knowledge of occupational hazards among workers in automobile assembly
plants. ARC Journal of Public Health and Community Medicine, 2(1), 23-32.
 Chaudhry, J. (2002). Study of Foreign Trade and Management Capabilities of Textile units. Ph. D. Thesis.
Department of Business and Industrial Management (DBIM), Veer Narmad South Gujarat University, Surat,
Gujarat
 Engelshoven, M. (1999). Diamonds and Patels: a report on the diamond industry of Surat. Contributions to
Indian sociology, 33(1-2), 353-377.
 Kifle, M., Engdaw, D., Alemu, K., Sharma, H. R., Amsalu, S., Feleke, A., & Worku, W. (2014). Work
related injuries and associated risk factors among iron and steel industries workers in Addis Ababa, Ethiopia.
Safety Science, 63, 211-216.
 Manjunatha, R., Kiran, D., & Thankappan, K. R. (2011). Sickness absenteeism, morbidity and workplace
injuries among iron and steel workers-A cross sectional study from Karnataka, Southern India. The
Australasian medical journal, 4(3), 144.
 Meena, J. K. (2018). 203 Occupational health in India: present scenario, challenges and way forward.
 Padmini, D., & Venmathi, A. (2012). Unsafe work environment in garment industries, Tirupur, India. J
Environ Res Dev, 7, 569-575
467
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Parimalam, P., Kamalamma, N., & Ganguli, A. K. (2007). Knowledge, attitude and practices related to
occupational health problems among garment workers in Tamil Nadu, India. Journal of occupational health,
49(6), 528-534.
 Shukla Yash,"India's cleanest cities 2020 list: Madhya Pradesh's Indore emerges as cleanest city; check top
10". The Financial Express. 20 August 2020.
 Rao, I. (2009). Organizing the un-organized? The rise, recession and revival of Indian diamond industry. The
Rise, Recession and Revival of Indian Diamond Industry (September 30, 2009)
 Yu, W., Lao, X. Q., Pang, S., Zhou, J., Zhou, A., Zou, J., & Yu, I. T. S. (2013). A survey of occupational
health hazards among 7,610 female workers in China's electronics industry. Archives of environmental &
occupational health, 68(4), 190-195.
 Kutty, M. N. (1991). Diamond Cutting and Polishing Industry in Kerala. SEDME (Small Enterprises
Development, Management & Extension Journal), 18(3), 45-55.
 Yadav, G. K., Kumar, S., & Mishra, M. (2019). Stress among workers in diamond cutting and polishing
occupations. Indian journal of occupational and environmental medicine, 23(1), 3.
LINKS
1. https://mint.intuit.com/blog/investing/the-history-of-the-diamond-trade/. Accessed on 13th July 2021
2. AGD Diamonds (2014). ‘Surat- India’s Diamond Manufacturing Hub’ accessed from https://www.rough-
polished.com/en/analytics/85364.html. Accessed on 10th July 2021
3. www.engineeringtoolbox.com. Accessed on 10th July 2022
4. https://www.osha.gov/otm#standards. Accessed on 10th July 2022

AUTHOR DETAILS:
RUCHIKA AGARWAL1 AND DR. SARJOO PATEL2
1
Phd Student and 2Assistant Professor (Stage-III), Department of Family and Community Resource
Management, Faculty of Family and Community Sciences, The Maharaja Sayajirao University of Baroda,
Pratapgunj, Vadodara, Gujarat- 390002

468
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

ECO-FRIENDLY PRODUCTS: ASSESSING AND ENHANCING THE AWARENESS OF THE


HOMEMAKERS

DR. SARJOO PATEL AND MS. KAVITA SHAH

ABSTRACT
Eco-friendly means earth-friendly or not harmful to the environment. Eco-friendly products also helps to reduce
air, water and land pollution. We can indulge in using recycled materials, using fewer resources, or outfitting
products with eco-friendly packaging. There are many different types of eco-friendly products. Each one
ensures a quality product that is beneficial both to its users and the planet. Therefore, these products are
getting too much attention nowadays because they will not harm the environment and the quality of the product.
The eco-friendly products acts as most important component for user’s health and environment. Therefore it
became essential to find out the extent of awareness among the homemakers about eco-friendly products
available in the market. The present research was descriptive in nature. The data were gathered through
questionnaire on a sample of 60 homemakers from Vadodara city selected through purposive sampling. The
questionnaire contained two sections viz. background information and extent of awareness of the homemakers
about the eco-friendly products available in the market. The findings of the study revealed that majority of the
respondents were not aware about the consumer durable products like paper products, coffee cups, eco-friendly
polythene bags, recycled/rechargeable batteries, lightings and paper cloth bags. The eco-friendly cosmetics like
makeup remover pad, soap bars, wooden comb, makeup brushes, natural oil, facial kit, lip balm, kajal and
eyeliner were not known to the respondents. The respondents were not aware about the eco-friendly ornaments
like earnings, necklace, ring, anklets and bangles and also about eco-friendly medicines products like neem oil,
amla capsule, ashwagandha capsule, Himalaya rumalaya and Himalaya brahmi. Few of the respondents were
aware about natural balm, shatavar, bamboo nursing mask and dental floss in ecofriendly medicine. It also
found that majority of the respondents were not aware about bamboo bottles ,toothpicks, edible spoon and
glasses, plates, wooden tray, mitti terracotta cook wear, clay jug, glasses and bottles, wooden knife, bamboo
straw, coffee cups, reusable bamboo spoon and fork, and reusable snacks bags.
Keywords: Eco-friendly products, home maker, market, awareness.

INTRODUCTION
In the modern era of globalization, the biggest need of the time is not only to keep the customers and consumers
intact but also to keep our natural environment safe. Consumers are aware about the increasing environmental
issues such as global warming, acid rain, depletion of ozone layer and degradation of land etc. This resulted in
increase in consumer concern towards eco-friendly products for the rehabilitation of ecological balance. Thus,
Environmentalism is considered to be an essential aspect. As today’s consumers are becoming more and more
conscious of natural products, businesses are beginning to modify their own thoughts and behavior in order to
meet the concerns of the consumers (Kaur, 2017).
Environment friendly, eco-friendly, nature friendly, and green are marketing terms referring to goods and
services, laws, guidelines and policies that inflict reduced, minimal, or no harm upon ecosystems or
the environment. Companies use these ambiguous terms to promote goods and services, sometimes with
additional, more specific certifications, such as Eco labels. The International Organization for
Standardization has developed ISO 14020 and ISO 14024 to establish principles and procedures for
environmental labels and declarations that certifiers and eco labelers should follow. The past decades have
witnessed large scale industrialization that resulted in rapid economic growth and increasing consumption all
over the world. This in turn has resulted in deterioration of the environment due to exploitation of natural
resources. The exploitation of natural resources due to fast paced industrialization causes pollution, global
warming, desertification, acid rain, and so forth, which has a negative impact on human health and welfare
(Grunert,1993). reported that 40% of the environmental degradation has been brought about by the
consumption activities of private household.
Every year people living on the earth throw away enough garbage to cover a huge part of the world. Most of the
waste ends up in landfills which are very costly and which may have a major impact on the environment and on
the health of the people living on this planet. Saving the environment has become a big issue in recent times.
The messages are being promoted as REDUCE, RE-USE and RECYCLE.

469
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The study was an attempt to assess the awareness of the homemakers regarding eco-friendly products available
in the market. Consumers who are concerned about the environment and are knowledgeable about the
environmental issues when shopping any products, try to purchase only eco-friendly products. The homemakers
are the people who are engaged in household work and buying behavior therefore it was thought that the
awareness to the homemakers can motivate the other members to opt for eco-friendly products. There is an
urgent need to make consumers aware about the eco-friendly products to speed up the green buying behavior
among all the consumers to save this world. Therefore the present research study was conducted with the
following objective:
OBJECTIVES OF THE STUDY
1. To find out the background information of the respondents.
2. To assess the extent of awareness of the respondents about eco-friendly products.
3. To design a leaflet for enhancing the awareness of the homemakers about eco-friendly products.
METHODOLOGY
A descriptive research was adopted for the present study. The data were collected from 60 Homemakers of
Vadodara City selected through purposive sampling technique. The tool to collect data was an interview
schedule which contained two sections viz. background information and extent of awareness of the homemakers
about the eco-friendly products like Consumer durables, Cosmetics, Ornaments, Medicines and Utensils
available in the market.
FINDINGS
The major findings of the study are as follows:
The background information included age, education level, occupation, family monthly income, type of family
and number of family members of the respondents.
Table 1: Frequency and percentage distribution of the respondents according to their background information.

470
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table 2: Frequency and percentage distribution of the respondents according to their Awareness regarding eco-
friendly consumer durables
Sr. No Statements Aware Not aware
f % f %
1 Paper products 3 5% 57 95%
2 Coffee cups 6 10% 54 90%
3 Eco friendly polythene bags 8 13.33% 52 86.67%
4 Insect repellent 18 30% 42 70%
5 Recycled / rechargeable batteries 10 16.67% 50 83.33%
6 Lighting 10 16.67% 50 83.33%
7 Paper cloth bags 7 11.67% 53 88.33%
Table 2 depicts that majority of the respondents were not aware about paper products, coffee cups, eco-friendly
polythene bags, recycled/rechargeable batteries, lightings and paper cloth bags.
Figure 1: Frequency and percentage distribution of the respondents according to the extent of awareness of the
home makers for ecofriendly cosmetics product.

Figure 1 depicts that majority of the respondents were not aware about makeup remover pad, soap bars, wooden
comb, makeup brushes, natural oil, facial kit, lip balm, kajal and eyeliner.
Table 3: Frequency and percentage distribution of the respondents according to the extent of awareness
regarding eco-friendly ornaments
Sr.no Statements Aware Not aware
f % f %
1 Earning 6 10% 54 90%
2 Necklace 8 13.33% 52 86.67%
3 Bracelets 13 21.67% 47 78.33%
4 Hairpin 14 23.33% 46 76.67%
5 Ornaments holder 14 23.33% 46 76.67%
6 Ring 5 8.33% 55 91.67%
7 Anklets 7 11.67% 53 88.33%
8 Bangles 6 10% 54 90%
Table 3 depicts that most of the respondents were not aware about earnings, necklace, ring, anklets and bangles.
471
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table 4: Frequency and percentage distribution of the respondents according to the extent of awareness
regarding eco-friendly medicines
Sr.no Statements Aware Not aware
f % f %
1 Neem oil 2 3.33% 58 96.67%
2 Dental floss 19 31.67% 41 63.33%
3 Natural balm 43 30% 42 70%
4 Bamboo nursing mask 27 45% 33 55%
5 Shatavar 18 30% 42 70%
6 Amla capsule 5 8.33% 55 91.67%
7 Ashwagandha capsule 7 11.67% 53 88.33%
8 Himalaya rumalaya 5 8.33% 55 91.67%
9 Himalaya brahmi 7 11.67% 53 88.33
Table 4 depicts that majority of the respondents were not aware about neem oil, amla capsule, ashwagandha
capsule, Himalaya rumalaya and Himalaya brahmi. Fewer of the respondents were aware about natural balm,
shatavar, bamboo nursing mask and dental floss in ecofriendly medicine.
Table 5: Frequency and percentage distribution of the respondents according to the extent of awareness
regarding eco-friendly Utensils
Sr.no Statements Aware Not aware
f % f %
1 Bamboo bottles 4 6.67% 56 93.33%
2 Coconut wooden spoons 11 18.33% 49 81.67%
3 Edible spoon & glasses 9 15% 51 85%
4 Toothpicks 9 15% 51 85%
5 Plates 5 8.33% 55 91.67%
6 Wooden tray 6 10% 54 90%
7 Mitti- terracotta cook wear 6 10% 54 90%
8 Clay jug, glasses & bottles 5 8.33% 55 91.67%
9 Wooden knife 9 15% 51 85%
10 Bamboo straw 8 13.33% 52 86.67%
11 Coffee cups 9 15% 51 85%
12 Reusable bamboo spoon & fork 9 15% 51 85%
13 Go to travel bottle 30 50% 30 50%
14 Travel cup 32 53.33% 28 46.67%
15 Reusable coffee cup 13 21.67% 47 78.33%
16 Hydro flask coffee thermos 25 41.67% 35 58.33%
17 Life straw go bottle 17 28.33% 43 71.67
18 Reusable snacks bags 6 10% 54 90%
19 Collapsible Tupperware 16 26.67% 44 73.33%
20 Hydro flask coffee 23 38.33 37 61.67%
Table 5 depicts that majority of the respondents were not aware about bamboo bottles ,toothpicks, edible spoon
and glasses, plates, wooden tray, mitti terracotta cook wear, clay jug, glasses and bottles, wooden knife, bamboo
straw, coffee cups, reusable bamboo spoon and fork, and reusable snacks bags. Half of the respondents were
aware about the go to travel bottle, travel cups and few of the respondents were aware about hydro flask coffee
thermos, collapsible Tupperware and life straw go bottles in ecofriendly utensils.
Designing of a Leaflet for the Homemakers
Eco-friendly products are getting too much attention nowadays because they will not harm the environment and
the quality of the product. These products are available in the market like consumer durable products, health and
beauty products, medicines, utensils and ornaments. Consumer durable products which are available in the
market are paper products, coffee cups, eco-friendly polythene bags, recycled/rechargeable batteries, lightings
and paper cloth bags etc. Health and beauty products are makeup remover pad, soap bars, wooden comb,
makeup brushes, natural oil, facial kit, lip balm, kajal and eyeliner. Medicines which are organic in nature for
e.g. Neem oil, Amla capsule, Ashwagandha capsule, Himalaya rumalaya and Himalaya brahmi. The ornaments
472
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

which are made up of eco-friendly materials like earning, necklace, bracelets, hairpin, ornaments holder, ring,
anklets and bangles. The eco-friendly utensils which does not harm to the body like Bamboo bottles, Coconut
wooden spoons, edible spoon & glasses, toothpicks, plates, wooden tray, mitti- terracotta cook wear, clay jug,
glasses & bottles, wooden knife, bamboo straw, coffee cups, reusable bamboo spoon & fork, go to travel bottle,
travel cup, reusable coffee cup, hydro flask coffee thermos, life straw go bottle, reusable snacks bags,
collapsible Tupperware and hydro flask coffee. The eco-friendly products are available in the various sources
like online shopping website, retail stores and malls. There are many benefits to use this eco-friendly products
which reduce hazardous, CO2 emissions, preserving natural resources, promoting the uptake of green products,
redeeming money, saving energy, recycled and reused products, shifting to eco-friendly products a great move
towards sustainability. So, eco-friendly products are available in the market through offline and online sources
which have many advantages to both human and nature.
CONCLUSION
Homemaker plays a key member of the family responsible for majority of the purchases in the house. If the
homemaker is aware she can make the family and other members aware about the eco-friendly products like
Consumer products, Ornaments, Medicines and Utensils which in turn can help save the environment. This
thought made the researchers interested in finding out the awareness of the homemaker regarding eco-friendly
products available in the market. From this findings it can be concluded that respondents were not aware of eco-
friendly products like consumer products, ornaments, medicines and utensils therefore the researchers designed
a leaflet for enhancing the awareness of the homemaker about eco-friendly products and distributed to the
homemakers to enhance their knowledge which in turn will help save our environment and keep all of us safe.
REFERENCES
1. Desai, (2015). “A Study of Consumer Awareness: Towards Eco Friendly Buildings in Pune City”, Vol. 12.
2. Elham Rahbar (et al, 2011) "Investigation of green marketing tools' effect on consumers' purchase
behavior", Business Strategy Series, Vol. 12 No. 2, pp. 73-83.
3. Fabien D., Caroline B., and Charles J. (2010).
4. Green Building Awareness This report is available on the Department of Ecology’s website at
www.ecy.wa.gov/biblio/0807019.html.
5. K. Veerakumar & A. Venkedasubramaniam (2016) article titled “A Study on Consumer Satisfaction
Towards Selected Health Drinks In Pollachi Taluk” International Journal of Multidisciplinary Research and
Modern Education, Vol-II, Issue-I, Feb – 2016. P.No.112-115.
6. Kaur, (2017). “Green Marketing: A Study of Consumer Perception on using Eco-Friendly Products”. Vol.
7, pp. 298-309.
7. Kumar K., and Byram A., (2013). A Study on Consumer Behavior towards Eco-Friendly Paper, Vol. 13 Iss:
11.
8. Mostafa (2007), “Gender Differences in Egyptian Consumers’ Green Purchase Behaviour: The Effects of
Environmental Knowledge, Concern and Attitude. Vol. 3 No. 4, 220-229.
9. Nagaraju, D. B., & Thejaswini, H. D. (2014). Consumers' perception analysis-market awareness towards
ecofriendly fmcg products-a case study of Mysore district. IOSR Journal of Business and Management,
16(4), 64-71. 8
10. Rambalak Yadav and Govind Swaroop Pathak, ( 2013) “Green Marketing: initiatives in the Indian context”,
Indian journal of marketing, Volume No.43, issue no 10.
11. Rahbar E. and Wahid N. A., (2011) "Investigation of green marketing tools' effect on consumers' purchase
behavior". Business Strategy Series, Vol. 12 Iss: 2, pp.73 – 83.
12. Ramesh, S. V., & Divya, M. (2015). A Study on Consumers’ Awareness, Attitude, and Satisfaction towards
Select Organic Food Products with reference to Coimbatore. International Journal of Interdisciplinary and
Multidisciplinary Studies (IJIMS), 2(04), 81-84.
AUTHOR DETAILS:
DR. SARJOO PATEL1 AND MS. KAVITA SHAH2
Assistant Professor1 and Temporary Teaching Assistant2, Department of Family and Community Resource
Management, Faculty of Family and Community Sciences, the Maharaja Sayajirao University of Baroda,
Vadodara

473
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

DOCUMENTARY DEVELOPMENT: ASSESSMENT OF SATISFACTION AND VISITING


INTENTIONS OF THE VIEWERS.

DR. SARJOO PATEL AND ASTHA GARG

ABSTRACT
The tourism industry is one of the prospective economic sectors to develop India at a larger rate and make sure
of the consequential growth of the infrastructure at the destinations. It has the potential to capture and
capitalize on the country’s success in the services sector and contribute to sustainable models of development.
From Kashmir to Kanyakumari, India is full of places of religious worship. A state which is known for its rich
heritage is Uttar Pradesh. It is full of religious places with temples that attract pilgrims and religious and non-
religion people throughout the year. Some of the places are extremely crowded due to their popularity while the
others are quaint towns and villages which have great religious significance but are not as commercial as the
rest. All the places have their glorified history and importance. Muzaffarnagar is one of the cities of Uttar
Pradesh. There are many religious places near Muzaffarnagar, which are less explored but have great
significance. The documentary is one of the latest technologies and is nowadays widely used in promoting
tourism. The objectives of the study were to assess the satisfaction of the viewers and the intention of the
viewers to visit the religious places after viewing the documentary. The documentary was developed. The
sample size was 202 viewers’. The data was collected by Google form. The data was then analyzed by applying
descriptive (frequency, percentage, and weighted mean score) as well as relational statistics (Analysis of
Variance, and ‘t-test). The major finding of the present study revealed that nearly sixty percent of the viewers
were highly satisfied with the voice-over of narrations, more than half of the viewers with the videography and
photography of the destinations, and the majority of the viewers were highly satisfied with the destination’s
description. The majority of the viewers agreed to go to the selected religious places which were shown in the
documentary, after viewing the documentary.

INTRODUCTION
The tourism industry is one of the prospective economic sectors to develop. India at a larger rate and make sure
of the consequential growth of the infrastructure at the destinations. It has the potential to capture and capitalize
on the country’s success in the services sector and contribute to sustainable models of development. Apart from
employing a broad spectrum of job finders from the unskilled to the specialized skilled, a larger proportion of
tourism advantages (jobs, petty trade opportunities) accrue to women. According to the Tourism Satellite
Account for the year 2002-03 arranged by the Ministry of Tourism, the direct and indirect contribution of
tourism to the GDP and the aggregate employment in the nation from 2007 and 2008 is measured to be 5.92%
and 9.24% respectively. The nation’s economy has been contributed three-fourths by domestic tourism (Nair
and Kumar, 2017).
The word “Tourism” came from the Latin word “TOURNUS”, which means a tool for describing a circle of
turner’s wheel. The concept of round or package tour was introduced from this word. It was as late as 1643.
This term was first used for traveling from place to place. The word “tourism” consists of these trades, which
together satisfy the numerous needs of travelers (Selvam and George, 2019).
The origins of the concept of "Tourism" can be found in Sanskrit literature in India. It has given three phrases
derived from the root word "Atana," which means "to go forth," and have the names "Theerthtana,"
"Deshatana," and "Paryatana."
 Theerthatana - It represents going out and visiting places of spiritual or religious merit.
 Deshatana - It represents going out of the country primarily for financial gains.
 Paryatana - It represents going out for pleasure and knowledge (Nair and Kumar, 2017)
Religious Tourism in India
In India, there are several religious places to visit. Some people go there for religious purposes and some go
there only to enjoy the beauty of the place. India has the excellence of being the land from where important
religions namely Hinduism, Buddhism, Sikhism, and Jainism have originated at an equivalent time. The country
is home to several indigenous faiths tribal religions which have survived the influence of major religions for
hundreds of years and are holding the bottom firmly. Many tourists from all over India comes to experience the
spirituality of holy place in India even the people who are non-religious visit these holy places to know about
474
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

the importance of these places. There are various hidden histories behind the religious places which everyone
wants to know whether the person is religious or non-religious (Ahamad et al., 2019).
Indian culture has specific importance for spiritual growth. Thus, visiting the pilgrimage center is an integral
part of Indian culture. Every Indian has an inner desire to go for pilgrimage at least once in his lifetime and this
practice is continued since time immemorial (Chaudhary and Sharma, 2015).
According to research by the National Council for Applied Economic Research (NCAER) in Delhi, religious
pilgrimages account for the majority of India's 230 million tourist excursions. The desire of Indians to travel on
pilgrimages or for religious purposes is a sign of their religiosity. Religious travel accounted for about four
times the percentage of all overnight travel conducted by Indians, and nearly seven and a half times the share of
commercial travel for purposes associated with education, show survey data from the National Sample Survey
Office (NSSO)(https://indianexpress.com/article/explained/indians-travel-4-times-more-for-religious-reasons-
than-on-business-indicates-data-from-nsso-4828897/)
Uttar Pradesh is on the second rank of attracting domestic travelers towards tourist destinations, it is estimated
that over 220 million Indian tourists who visited Uttar Pradesh in the year 2013 showed a share of about 20% of
1.14 billion domestic tourists visited all over India (Ahamad et al., 2019). Muzaffarnagar is one of the cities of
Uttar Pradesh.There are many religious places near Muzaffarnagar, which are less explored but have great
significance- Shakumbri Devi, Shukratal, Kureshtra, Maa Bala Sundari, Sewa Kunj, Pracheen shiv mandir,
Vahelna, Punchmuki Shivling, and many more.
For promoting the religious places documentary will be an interesting channel through which it will be possible
to educate a people about the religious destinations of Muzaffarnagar. A documentary is a film or video that
examines an event or person using facts as its foundation. The term can also refer to any document-related
activity. The term "documentary" was coined at the turn of the nineteenth century to imply "regarding papers."
Later on, it came to indicate a verified account of anything. Documentaries use special films techniques to
inform, persuade, convince and educate viewers. The Documentary can give the experience with facts and real-
life events to the one who never visited these places before. It will also assist the people in visiting sites that are
difficult to access in the real life. Strategic promotional activity performs a huge role in promoting religious
destinations among which documentary is one of the most extensively followed by the tourism industry. The
main purpose of the documentary is to make tourists aware of these rich cultural heritage temples, whose
significance is yet not known. Social media like YouTube, Facebook, Instagram, and other social sites can be
used for uploading the documentary where people will get assess of this documentary, get to know about these
places and will be interested to visit these place (https://www.thefreedictionary.com/documentary) .
OBJECTIVES
1. To assess the satisfaction of the viewers’ regarding the selected aspects of the documentary.
2. To assess the intention of the viewers to visit the religious places after viewing the documentary.
HYPOTHESIS
1- There exists a variation in the extent of viewers’ satisfaction regarding the selected aspects of documentary
for the selected religious destinations in Muzaffarnagar city, Uttar Pradesh according to the selected
independent variables (Age in years, Gender, and Educational Qualification).
METHODOLOGY
The descriptive research design was used to reach the objective of the study. The present study was conducted
virtually across the nation. The sample size for the present study was 202 viewers. For the present study, the
criteria set for the selection of the viewers were as follows: The viewers should be 19 years of age and above,
the viewers should know Hindi language as the narrations developed was in the Hindi language, the viewers
should have smart gadget through which they could view the documentary developed, the viewers should give
their consent for the research study. A pre-test was carried out on 30 viewers to establish the reliability by the
split-half technique. There were total of 42 statements. The value of reliability coefficient was 0.81. The data
was analyzed by utilizing Descriptive as well as Relational Statistics. Relational Statistics like t- test and
Analysis of Variance (ANOVA) were utilized to test the Hypothesis. The tool was constructed in compliance
with the objectives of the study.
The Information Sought In The Questionnaire Was Divided Into The Following Sections:
Section I: Background Information of the viewers: This section contained questions regarding the background
information of the Viewers. Section II: “Viewers’ Satisfaction Scale” regarding the selected aspects of
documentary. This section contained total 22 statements; these statements were developed to measure the extent
475
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

of viewers’ satisfaction regarding the selected aspects of the documentary. The pattern response was Highly
Satisfied, Satisfied, Neutral, Dissatisfied, and Highly Dissatisfied, and ascribed scores were 5 to 1. Section III:
Assess the intention of the viewers to visit the religious places after viewing the documentary. This section
contained total 20 statements.

Schematic Diagram Showing the Hypothetical Relationship between the Variables Selected for the Study
FINDINGS AND DISCUSSIONS
The developed documentary was share with the viewers to assess the satisfaction regarding the selected aspects
of the documentary and to assess the intention of the viewers to visit the religious places after viewing the
documentary.
Section I: Background information of the viewers
This section dealt with the background information of the viewers which included age, marital status, gender,
type of family, size of family, educational qualification, state of residence of the viewers, and gadgets used to
view the documentary.
The findings revealed that majority of the viewers belonged to the age group of 19 to 29 years (84.6%).
Majority of the viewers were unmarried (80.7%), and remaining were married 19.8 per cent. More than half of
the viewers were female 57.40 per cent and remaining were male 42.60 per cent. Less than half of the viewers
were graduate 43.60 per cent, few were post graduate 29.20 per cent, negligible had diploma 10.90 per cent, and
remaining were educated up to 12th 16.30 per cent.
The finding revealed that maximum number of the viewers were from Uttar Pradesh 34.65 per cent, followed by
Gujarat 18.81 per cent, Rajasthan 9.40 per cent, Delhi 7.92 per cent, Andhra Pradesh 5.44 per cent, Madhya
Pradesh 4.45 per cent, Jammu and Kashmir 3.96 per cent, Haryana 2.97 per cent, Maharashtra 1.98 per cent,
Karnataka 1.48 per cent, Uttarakhand 1.48 per cent, Daman 1.48 per cent, Himachal Pradesh 0.99 per cent,
Chandigarh 0.99 per cent, Bihar 0.99 per cent, Punjab 0.49 per cent, Kerala 0.49 per cent, West Bengal 0.49 per
cent, Jharkhand 0.49 per cent , Arunachal Pradesh 0.49 per cent, and Manipur 0.49 per cent. Majority of the
viewers used smart phone (79.2%) to view the documentary developed, few used laptops 19.30 per cent and
negligible used desktop 1.50 per cent to view the documentary.
Section II: Extent of Satisfaction Experienced by the Viewers Regarding Selected Aspects of
Documentary.
This section describes the viewers’ satisfaction related to the selected aspects of documentary viz; voice-over of
narrations, videography and photography of destinations, and destination’s description.
Aspect 1: Voice-Over of Narrations
The findings of the study revealed that viewers were highly satisfied with the clarity of voice 63.36 per cent
volume and pitch of the narration pace of the narrations, 62.37 per cent, recorded narrations were free from
background noise and disturbance 63.36 per cent, and overall features of the recorded narrations 60.39 per cent.
Therefore, it can be concluded that viewers were highly satisfied with the voice-over of narrations of the
documentary depicted through the weighted mean score 4.50.
Aspect 2: Videography and Photography of the Destinations
The findings revealed that viewers were highly satisfied with the clarity of the images and videos 58.42 per cent
naturality of the videos 57.92 per cent, brightness of videos and photos 56.93 per cent, sequence of the videos
55.94 per cent, and overall quality of the images and videos 57.90 per cent.
Therefore, it can be concluded that viewers were highly satisfied with the videography and photography of the
documentary depicted through the weighted mean score 4.44.
476
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Aspect 3: Destination’s Description


The findings revealed that majority of the viewers were highly satisfied with the accuracy of destination
description (70.29%), language used to describes the importance of the places (70.79%), understandable and
easy words used to describe the destinations (71.28%), interestingly kept attention of the viewers in the
documentary (74.25%), explanations of the narrations (72.27%), elaborated description of the places in the
narrations (70.79%), organization of the description (72.77%), pronunciation done by the narrator (74.25%),
pauses taken by the narrator in between the sentences to give the listener chance to catch up on the explanations
(70.79%), clarity of the pronunciation in narrations (70.29%), modulation of pitch and tone by the narrator to
emphasize the key words (70.29%), and voice of the narrator (71.78%).
Therefore, it can be concluded that viewers were highly satisfied with the destination’s description depicted
through the weighted mean score 4.63.
Section III: To Assess the Intention of the Viewers to Visit the Religious Places After Viewing the
Documentary.
It was found that the majority of the viewers were highly satisfied with the selected aspects of the documentary.
The majority of the viewers agreed to go to the selected religious places which were shown in the documentary,
after viewing the documentary.
Figure 1: Graph showing percentage distribution of the viewer’s according to their extent of satisfaction
regarding voice-over of narrations

Figure 2: Graph showing percentage distribution of the viewer’s according to their extent of satisfaction
regarding videography and photography of destinations.

477
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Figure 3: Graph showing percentage distribution of the viewer’s according to their extent of satisfaction
regarding destination’s description.

Section IV: Testing of Hypotheses


Analysis of Variance was computed to show the difference in the extent of satisfaction regarding the selected
aspects of a documentary developed with independent variable viz; age and educational qualification of the
viewers. ‘t’-test was applied to find out the mean difference between independent variable viz; gender of the
viewers with the extent of viewers’ satisfaction regarding the selected aspects of the documentary.
The computed t-value depicted that the extent of viewers’ satisfaction varied significantly due to gender. Hence,
the null hypothesis was rejected and it was concluded that the gender had significant effect on the extent of
satisfaction regarding the selected aspects of documentary at 0.05 level of significance.
IMPLICATIONS
The study will be beneficial for the Indian tourism department and the Hospitality and tourism industry of India.
A similar kind of documentary and short films can be developed for the various tourist destinations of India.
CONCLUSION
Tourism is one of the sectors which are affected a lot by COVID-19 in the world. With the help of technology
and innovation, the tourism sector can be boosted. The documentary is an innovative technology, which is a
boon for the tourism industry. Documentaries use special film techniques to inform, persuade, convince, and
educate viewers. The documentary can give experience with facts and real-life events to someone who has
never visited these places before. It will also assist people in visiting sites that are difficult to access in real life.
Hotel and tourism industries can upload this type of documentary on their websites. So, when people book their
hotels and search for tourist destinations, they can view the developed documentary. It was found that
documentaries influence the viewers' viewing intentions. This will be helpful for the economic growth of the
country, development of infrastructure, the lifestyle of local people, and the economy of the country as people
will get monetary support.
REFERENCES
 Ahamad, S. Joseph, S.T. and Brako, P. (2019). A Comprehensive study on religious tourism in Uttar
Pradesh. International Journal of Research in Humanities, Arts and Literature (IMPACT: IJRHAL). Vol. 7,
Issue 4, Apr 2019, 345-354. Retrieved from https://oaji.net
 Chaudhary, S. and Sharma, D. (2015). Spatial and Temporal Dynamics of Pilgrimage Tourism in
Uttarakhand Region. Shodhganga. Retrieved from https://shodhganga.inflibnet.ac.in/handle/10603/302000
 Chauhan, A. Singh, S.V. and Arya, A. (2021). Destinations motivations through antecedents of Film-
Induced Tourism: A study on Outbound Visitors of Lucknow. Indian Journal of Applied Hospitality &
Tourism Research. Vol. 13. Retrieved from https:// www. researchgate. net/ publication/ 350766951_
Destination_motivations_through_antecedents_of_Film-Induced Tourism_ A_study_ on_ Outbound_
visitors_ of_Lucknow
 Chauhan, N. (2017). Religious Conversion and Freedom of Religion in India: Debates and Dilemmas. ILI
Law Review. Summer Issue 2017 Vol. 1. Retrieved from https://ili.ac.in/pdf/paper817.pdf
478
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Collins-Kreiner, N. (2010), “Researching pilgrimage: continuity and transformations. Annals of Tourism


Research. Vol. 37(2). pp. 440-456. Retrieved from https:// www. academia. edu/ 259783/
RESEARCHING_PILGRIMAGE_Continuity_and_Transformations
 Collins-Kreiner, N. (2019). Pilgrimage tourism-past, present and future rejuvenation: a perspective article.
Emerald Publishing Limited. Vol. 75 (1). pp. 145-148. Retrieved from https:// www. emerald. com/ insight/
content/ doi/10.1108/TR-04-2019-0130/full/pdf
 Collins-Kreiner, N. and Sagi, K. T. (2011). Tourism to India as popular culture: A cultural, educational and
religious experience at Dharamsala. South Asian Popular Culture. Vol. 9(2). pp 131-145. Retrieved from
https://doi.org/10.1080/14746681003798078
 Collins-Kreiner, N. (2020). Pilgrimage tourism-past, present and future rejuvenation: a perspective article.
Emerald Publishing Limited. Vol. 75(1). pp. 145-148. Retrieved from https:// www. emerald. com/ insight/
content/ doi/10.1108/TR-04-2019-0130/full/html
 Costa, C. Araujo, A.F. and Vieira, A.L. (2015). Films' impacts on travel decisions and intentions: a
systematic review. Research Gate. Retrieved from https:// www. researchgate. net/ publication/
303702846_Films%27_impacts_on_travel_decisions_and_intentions_a_systematic_review
 Diaconescu, V. (2018). Film-Induced Tourism Among Students- An Exploratory Study. Cactus Tourism
Journal. Vol. 17(1). Pp. 49-56. Retrieved from http://paper.researchbib.com/view/paper/199484
 Dowson, R. Yaqub, J. and Raj, R. (2019). Spiritual and Religious Tourism. Motivation and Management.
CAB International 2019.
 Fatima, U. Naeem, S. and Rasool, F. (2016). The Relationship Between Religious Tourism and
Individual’s Perceptions (A case study of Hazrat Data Ghanj Bakhsh’s shrine). International Journal of
Religious Tourism and Pilgrimage. Vol. 4(1). Retrieved from https://arrow.tudublin.ie/ijrtp/vol4/iss1/6 on
11th September 2021 on 5th October.
 Garg, S. M. and Maurya, M. L. (2018). Exploring the relationship between religious tourism and economic
development Bundelkhand Region in India. International Journal of Marketing & Financial Management.
Vol. 6(12). pp 12-2. Retrieved from https://www.researchgate
 Nair, S. and Kumar, R. (2017). A study on Religious Tourism in Andhra Pradesh. Shodhganga. Retrieved
from https://shodhganga.inflibnet.ac.in/handle/10603/302000
 Oliveria, C. Garcia, J.A. Rama, D.R. Duran-Sanchez, A. (2018). Religious Tourism and Pilgrimage:
Bibliometric overview. Research Gate. Vol. 9(9). Retrieved from https:// www. researchgate. net/
publication/ 327137665 Religious Tourism and Pilgrimage Bibliometric Overview
 Raj, R. Griffin, K. (2015). Religious Tourism and Pilgrimage Management. An International Perspective
(2nd ed.). CAB International 2015. ISBN-13: 978 1 78064 523 0.
 Raj, R. Morpeth, N. D. (2007). Religious Tourism and Pilgrimage Festivals Management. An International
Perspective. CAB International 2007. ISBN: 978 1 84593 225 1.
 Roesch, S. (2009). The Experiences of Film Location Tourists (Aspects of Tourism). Channel View
Publications. Retrieved from https://www.researchgate.net/publication/334730530
 Saraswathy, S. Nikhil, N. (2015). Attitude of the Tourists towards Responsible Tourism. IJMIE. Vol.
5(12). Retrieved from https:// www. researchgate. net/ publication/ 315045582_ Attitude_ of_the_
Tourists_towards_Responsible_Tourism
 Selvam K. and George B. (2019). Potentials, Problems and Prospects of religious tourism in Puducherry
(UT). Shodhganga. Retrieved from https://www.scribd.com/document/539491841/K-Selvam-Ph-d-
Synopsis
 Shahnoor, R. & Bhowal, A. (2017). Virtual Tourism and Its Prospects for Assam. IQSR Journal of
Humanities and Social Science. Vol. 22(2). Retrieved from https://www.semanticscholar.org/paper/Virtual-
Tourism-and-Its-Prospects-for-Assam-Rahman-Bhowal/1fad5f9e4f9503a04f1fdbd6f50400b0070fa0a81

479
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Valiño, E.D. Fadoua, B. Núñez-Barriopedro, E. (2020). Sustainable, Smart and Muslim- Friendly Tourists
Destinations. Sustainability MDPI. Vol. 12(5). Pp. 1-13. Retrieved from https:// ideas. repec.
org/a/gam/jsusta/v12y2020i5p1778-d325891.html
 Vara, A. Z. (2020). The Impact of the Film Industry on Tourism. Modul University. Vienna. Retrieved
from https://www.modul.ac.at
 Warnick, R.B. Bojanic, D.C. and Siriangkul, A. (2005). Movie effects on the image of Thailand among
college student travelers. Porceedings of the 2005 Northeastern Recreation Research Symposium.
Retrieved from https://scholarworks.umass.edu/htm_faculty_pubs/.
 Weidenfeld, A. (2006). Religious Needs in the Hospitality Industry. Research Gate. Retrieved from
https://www.researchgate.net/publication/247478692_Religious_Needs_in_the_Hospitality_Industry.
 Willson, G.B. McIntosh, A.J. and Zahra, A.L. (2013). Tourism and Spirituality: A Phenomenological
Analysis. Annals of Tourism Research. Vol. 42. pp. 150-168. Retrieved from https:// www. Semantic
scholar. org/ paper/ Tourism- and- spirituality% 3A- A- phenomenological- Willson-McIntosh/ d05905ab
3ac78bd9 cd0fe341fa3054022eaae7d9.
 Wiltshier, P. and Griffin, K. (2018). Managing of Religious Tourism. CAB International 2019. ISBN
9781786393210 (ePDF).
 Indians travel for religious reasons, Retrieved from https://indianexpress.com/article/explained/indians-
travel-4-times-more-for-religious-reasons-than-on-business-indicates-data-from-nsso-4828897/ on 28th
August 2021
 Documentary, Retrieved from https://www.thefreedictionary.com/documentary on 7th October 2021.

AUTHOR DETAILS:
DR. SARJOO PATEL1 AND ASTHA GARG2
1
Assistant Professor (Stage-III), Department of Family and Community Resource Management, and Associate
Director, Post Graduate Diploma in Hotel Interiors, Faculty of Family and Community Sciences, The Maharaja
Sayajirao University of Baroda, Vadodara, India
2
Masters Student, Department of Family and Community Resource Management, Faculty of Family and
Community Sciences, the Maharaja Sayajirao University of Baroda, Vadodara, India

480
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

PROBABILISTIC ANALYSIS OF ANNUAL TIME SERIES OF PRECIPITATION DATA OVER


MARATHWADA REGION OF MAHARASHTRA, INDIA

PRITI PARMAR, MOHIT MAYOOR* AND HARENDRA PRASAD SINGH

ABSTRACT
Precipitation is an essential component of the water cycle because it replenishes the planet's freshwater supply.
The extent to which the magnitude of precipitation varies spatially and temporally defines the climate of an area
extensively. To diminish the adverse effects of disasters due to rainfall variability, planning and knowledge of
its geographic extent, severity, and duration are significant. An attempt has been made in the present study to
unveil the detailed statistical analysis of monthly precipitation of all the eight districts of Marathwada region
using 119 years (1901-2020) monthly precipitation data collected from Water Resources Information System
(https://indiawris.gov.in/wris). correlogram plotting has been done to justify the randomness in the data sets.
Spikes in a plot do not cross the upper and lower confidence levels demonstrating that the data is purely
stochastic. The probabilistic analysis is then carried out using 5 Probability Distribution Function (PDF)
functions namely Normal, Log-Normal, Exponential, Gumbel, and Gamma distributions functions to determine
the best fit distribution. Comparison of best distribution is based on the use of goodness of fit test i.e., Chi-
squared test. Results showed that Normal distribution performed better in Aurangabad and Jalna districts while
Log-Normal distribution performed better in Bid, Hingoli and Latur and Gamma distribution brought out the
best result in Prabhani, Osmanabad and Nanded districts. Many death trolls have been recorded linked to
prolonged drought, signaling the need for drought monitoring in that region to reduce death trolls. As a result,
precise monitoring of rainfall is required.
Keywords: Chi-Squared Test, Exponential Distribution, Gamma Distribution, Gumbel Distribution, Log-
Normal Distribution.

1. INTRODUCTION
Precipitation is a crucial component of the water cycle because it is responsible for replenishing the planet's
water supply. Every year, about 505,000 cubic km of water falls as precipitation, with 398,000 cubic km falling
over oceans and 107,000 cubic km falling on land. This distribution of rainfall on the land surface is largely
uneven. Rainfall prediction, characterization, and monitoring for a region are therefore all critical aspects of
water resource planning and management. In the context of planning and design of various irrigation and
hydraulic structures, analyzing and quantifying the extreme rainfall for a given probability of occurrence is
indispensable. The structures are then usually designed in terms of its capacity in such a way that it withstands
the probability of occurrence of extreme rainfall during its lifetime(1). The vital components of precipitation are
its amount, frequency and intensity; the magnitude of which change from place to place, day to day, month to
month and year to year(2). Interpreting earlier dataset of precipitation events in terms of projected probabilities
of occurrence is one of the most effortful tasks with rainfall data. As a result, understanding the rainfall
distribution that causes disaster could be a key for the state's long-term growth and conservation of natural
resources. The study of frequency analysis is crucial to opt the most acceptable model that could foretell
extreme events of certain natural phenomena e.g., rainfall, floods, etc.(3). Assessment of the stochastic
distribution that provides a suitable fit to annual precipitation has been continuing a concerning subject for
hydrologists, meteorologists and other water resource personnel. Uncertainties in the rainfall intensities and in
the flood frequency analysis creeps in because a Meteorologist and Hydrologist can never be sure about a fitted
distribution being the same as nature has used to generate the flood flow and also the data sample may not truly
reflect the complete characteristics of the population(4). North East regions of India being rich in water
resources makes tremendous opportunity to explore different water resource development programs and
projects(2). The success or failure of crops especially under rain fed conditions is closely linked with rainfall
patterns(5). Many studies have been done on the evaluation of precipitation, with a focus on Generating
precipitation data. The prime goal of work shown here is not to prospect the characteristics/properties of rainfall
but to properly apply the precipitation series notably sequences as entrant for another modeling to understand
and simplify the hydrologic processes to a certain extent. Trend detection of rainfall sequence and here forth
estimation based on several physical and probabilistic approach proves to play an important role for any water
resource planning and management based project(6). Monthly rainfall amounts are distributed according to
different frequency distribution in different parts of the world (7). Different tests, precisely known as
481
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

“goodness-of-fit”, or model validation in context of different modeling work are taken to test if a sample of
observations can be foresighted as a sample from a given distribution (8). In extremely arid regions gamma
probability distribution function are most often found to fit the existing data well(7). It is concluded from
analyses that the log Pearson type III and normal distribution would be useful for prediction of annual rainfall
and monsoon rainfall in Ludhiana(9). Amongst the nine distributions fitted in the Tawa canal command, Log-
normal distribution and Weibull distribution (II) are found as the best fit distribution for annual and monthly
rainfall data respectively(10). On the basis of graphical and numerical comparisons, the GEV (Gumbel Extreme
Value Distribution) could be recommended as the most suitable distribution due to its theoretical basis for
representing extreme value process and its relatively simple parameter estimation in southern Quebec
region(11). Gumbel distribution was found to be the best model for predicting the annual rainfall while Log
Normal distribution was found fairly close to the observed annual rainfall for the Allahabad (now Prayagraj)
district of Uttar Pradesh (12). In Bangladesh Generalized extreme value distribution is empirically proved to be
the most appropriate distribution of Monthly rainfall data for the three selected station namely Chittagong,
Rajshahi and sylhet and only Dhaka station provides good fit Gamma distribution(13). Probability distribution
arises from experiments where the outcome is subject to chance. The nature of the experiment dictates which
probability distribution may be appropriate for modeling the resulting random outcomes(14). Maharashtra
receives major part of the annual rainfall during the summer (Southwest) Monsoon season viz. June through
September (15). The Konkan area receives the most seasonal rain, followed by the eastern Vidarbha area, while
Madhya Maharashtra, a rain shadow region, receives the least (15). It was found that, in Ahmednagar and
Solapur district of Maharashtra, Beta distribution is the best fitted distribution for one month rainfall dataset,
Dagum distributions for cumulative two months precipitation dataset, Dagum and Gen.Extreme distribution for
consecutive cumulative three months(quarter) rainfall dataset, Log Logistic and Gen.Extreme distribution for
consecutive cumulative four and five months precipitation dataset, Log Logistic and Nakagami distributions for
consecutive cumulative six months rainfall dataset and Log Logistic and Johnson SU distribution for
consecutive cumulative seven months rainfall(16). Statistical average even would not give the correct measure
for the amount of precipitation occurring over the Marathwada regions as these regions are associated with lots
of fluctuation as far as rainfall pattern is concerned(5).
2. MATERIALS AND METHODS
2.1. Description of Study Area and Data used
Rainfall is the primary source of residential and agricultural water in the Marathwada. It has a total area of
64590 km2 and 18,731,872 as per Indian census, 2011. Godavari along with its tributaries drain the entire
region. The majority of its branches, such as Dudhna, Purna, Shivna, Bindusara, Vedganga, and others are
seasonal. They only carry water during the rainy season. They get drier as summer approaches. Godavari River
is only the perennial river in that region. During the summer season even, the Godavari carries far less water.
The Upper Dudhna Dam on the Godavari River in Jalna, the Lower Dudhna Dam in Prabhani, the Sindhphana
and Bendsura Dams in Beed, the Majira Dam Latur, and the Ujjani Dam in Aurangabad are all major dams in
this region. The failure of the monsoon most of the time causes these reservoirs to dry up. The southwest
monsoon has a severe impact on the region's climate. The average rainfall in the affected region is quite scarce.
Marathwada region is susceptible to drought. Droughts struck this part of Maharashtra many times in the past
i.e., in 1899, 1918, and 1919. The average annual rainfall is 750mm, and drought is a year-round occurrence. In
real terms, irrigation water reaches no more than 50,000 acres of arable land. Dryland agriculture accounts for
around 98% of agriculture, with cotton being the most important crop. However, the cotton crop's inherent
susceptibility to pests and the whims of nature makes its production a dangerous business, with many farmers as
a result falling into debt. Therefore, an attempt has been made in the present study to unveil the detailed
statistical analysis of monthly precipitation of all the eight districts of Marathwada region using 119 years
(1901-2020) monthly rainfall data collected from Water Resources Information System (https://indiawris.
gov.in/wris).

482
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Figure 1: Location Map of Marathwada region of Maharashtra India.


Table 1 Summary of Statistics of annual rainfall of eight districts of Marathwada region of Maharashtra India.
District Minimum Maximum Mean Standard deviation (mm) Variance
(mm) (mm) (mm) (mm)
Aurangabad 285 1091 676 152.006 23105.8
Beed 327 1235 752 188.051 35363.2
Hingoli 407 1518 925 233.40 54021.5
Jalna 306 1055 720 156.792 24379.3
Parbhani 458 1835 1141 306.410 93103.6
Latur 395 1300 798 178.701 31667.9
Osmanabad 310 1298 774 195.534 38233.7
Nanded 439 1465 910 102.066 40490.5
2.2. Autocorrelation/Correlogram
Autocorrelation measures the degree of correlation between two consecutive time intervals. The Time series
evaluates the relationship between the lagged version of a variable's value and the original version. serial
correlation is another name for autocorrelation which is used wisely. In the same manner that correlation
analyses the extent of a linear link between two variables, autocorrelation investigates the linear relationship
between lagged values of a time series. A prominent approach for determining the randomness of a data set is
the correlogram. If autocorrelations are random, they should be near 0 for all and all time-lag separations. If the
data is not unexpected, one or more of the autocorrelations will be significantly non-zero. Autocorrelations
should be near zero for unpredictability; if the analyst does not check for randomness, the validity of many
statistical conclusions is questioned.
The Mean of Time series 𝒚𝟏 , 𝐲𝟐 … . , 𝒚𝒏
1
𝑦̅ = ∑𝑛𝑖=1 𝑦𝑖 (1)
𝑛

The autocovariance function at lag k, for 𝑘 ≥ 0, The length of the time series is determined by
1 1 𝑛
𝑠𝑘 = 𝑛 ∑𝑛−𝑘
𝑖=1 (𝑦𝑖 − 𝑦
̅) (𝑦𝑖+𝑘 − 𝑦̅) = ∑ (𝑦 − 𝑦̅)(𝑦𝑖−𝑘 − 𝑦̅) (2)
𝑛 𝑖=𝑘+1 𝑖

The autocorrelation function at lag k, for 𝑘 ≥ 0, of the time series is defined by


𝑠
𝑟𝑘 = 𝑠𝑘 (3)
0

The variance of the time series is 𝒔𝟎 . A plot of 𝒓𝒌 Against k is known as correlogram

483
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

A time series model is used at first to understand the forces and structure that created the data and build a model
to predict future attitudes. During data analysis, a model is constructed to reveal seasonal patterns or trends in
the data. The two red horizontal lines in the graph below represent the Upper Confidence Level (UCL) and the
Lower Confidence Level (LCL). If the data is purely stochastic, the plot should be within the UCL and LCL.
From figure 2 it can be seen that all autocorrelation values are within the upper and lower confidence levels,
implying that the data are entirely random. In Nanded, Changes are quite minor as such they can be ignored on
a larger scale and maybe continued as purely stochastic datasets.
(A) (B)

(C) (D)

(E) (F)

484
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

(G) (H)

Figure 2: Correlogram plot of all 8 districts of Marathwada region of Maharashtra.


2.3. Probability Distribution Function
Once the randomness of the data set is certained, the calculation of the probability distribution function is a
possible method for the generation of new probable data. The data collection procedure can be effectively
characterized by many PDFs. Normal distribution, Log-normal Distribution, Exponential Distribution, Gumbel
Distribution, and Gamma distribution have been used for the present work. Parameter estimation has been done
using the Maximum likelihood method. A maximum likelihood estimation is a statistical approach for
estimating the parameters of a probability distribution by maximizing a likelihood function such that the
observed data is most likely under the assumed statistical model. The maximum likelihood estimate is the point
in the parameter space that maximizes the likelihood function. The derivative test for detecting maxima can be
used if the likelihood function is differentiable. The best fit probability distribution has been carried out using
the following procedures.
Step1: Fitting the probability distribution and estimating parameters associated with each distribution.
The probability distribution such as Normal distribution, Log-normal Distribution, Exponential Distribution,
Gumbel Distribution and Gamma distribution have been used in the present study to find out the best fit
probability distribution.
a. Normal Distribution- The General form of Normal distribution is given by: -
1 𝑥−𝜇
1
𝑓(𝑥) = 𝜎 𝑒 −2( 𝜎 )^2 and 𝑥 ≥ 0 (4)
√2𝜋

µ = Mean of the random variable


σ = Standard Deviation of the random variable
b. Log- Normal Distribution- The Galton distribution is the other name of Log- Normal distribution.
The general form of Log-Normal Distribution is given by:
1 𝑦−𝜇𝑦
1 − ( )^2
𝑓(𝑥) = 𝜎 𝑒 2 𝜎𝑦
and 𝑥≥0 (5)
𝑦 √2𝜋

Where y = ln(x)
c. Exponential Distribution- The general form of exponential distribution is given by:
𝑓(𝑥) = 𝜆𝑒 −𝜆𝑥 and 𝑥 ≥ 0 (6)
1
𝜆 = 𝑥̅ (From Maximum likelihood function theory)
d. Gumbel Distribution- The general form of Gumbel distribution is given by:
−𝑥−𝑢
( )
𝑓(𝑥) = 𝑒 −𝑒 𝛼
and 𝑥 ≥ 0 (7)
√6
Shape Parameter = 𝛼 = 𝜎 (From Maximum Likelihood Function theory)
𝜋

𝑆𝑐𝑎𝑙𝑒 𝑃𝑎𝑟𝑎𝑚𝑒𝑡𝑒𝑟 = 𝜇 = 𝑥̅ − 0.5772𝛼 (From Maximum Likelihood Function theory)


485
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

e. Gamma Distribution- The general form of Gamma distribution is given by:


𝑧
𝑓(𝑥) = 𝛽 𝑒 −𝑧 and 𝑥 ≥ 0 (8)
𝑥−𝛼

𝑧=𝑒 𝛽 (9)
𝑥̅ 2
𝛼 = 𝜎∗𝜎 (From Maximum Likelihood Function theory) (10)
Step 2: Testing the goodness of fit.
The goodness of fit test namely Chi-Squared test has been carried out at 5% significance level for the selection
of best fit distribution. It checks if a specific distribution of a certain observed event’s frequency in a sample is
suitable for that sample or not. The Chi- Squared value obtained for each distribution is validated against
critical chi- Squared value 14.06714 which is taken from standard table at 5% significance level and 7 as degree
of freedom.
3. RESULTS AND DISCUSSION
Interpreting historical records of precipitation events in terms of future probabilities of occurrence is one of the
most formidable problems with precipitation data. As a result, understanding the rainfall distribution that causes
disaster could be a key for the state's long-term development and sustainable growth of natural resources.
Estimating a better stochastic based probability distribution function which pass on a better fit to annual rainfall
has long been an extensive topic for various water resource personnel. Table 2 shows the value of different
parameters associated with different PDFs calculated using method of moments and method of Maximum
likelihood.
Table 2: Values of the parameters of Pdfs for the Marathwada region.
σ=0.241531 σ=0.241531 (Aurangabad)

σ=195.534 (Osmanabad)
Parameters

Parameters

Parameters

Parameters

Parameters

Parameters
Parameters

Parameters
(Prabhani)

(Nanded)
(Hingoli)

(Latur)
(Jalna)
(Beed)
PDFs

µ=7.000 µ=1140.676
σ=0.232309 σ=156.7924

σ=0.2957 σ=306.4082

σ=0.225852 σ=202.0663
Distribution Distribution Distribution

µ=752.024
σ=188.051

σ=0.227484 σ=178.701
µ=924.79
σ=233.40
Exponential Log-normal Normal

µ=676

µ=720

µ=798

µ=774

µ=910
σ=0.2610
µ=6.488

µ=6.590

µ=6.798

α=21.25111346 α =122.3125 λ=0.00138 µ=6.553

µ=6.620

µ=6.789
σ=0.256

σ=0.255
µ=6.66
λ=0.001479

λ=0.001084

λ=0.001253

λ=0.000876

λ=0.001292

λ=0.001098
λ=0.00133

β=33.87013 μ=649.1793152
α =146.6971

α =182.0733

α =139.4321

α =152.5349

α =157,6303
μ=607.5768

μ=667.3505

μ=819.6926

μ=1002.703

μ=685.9972

μ=819.3926
Distribution

α =118.582

α =239.026
μ=719.922
Gumbel

β=39.7032288
α=15.831267
α=19.77886

α=15.99236

α=13.97505

α=15.67043
Distribution

β=34.17904

β=47.02396

β=58.41512

β=49.39496

β=44.47666
α=20.0894

α=20.4686
β=81.6218
Gamma

486
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Among all the Distributions, from table 3, it has been shown that Normal Distribution fits better with the lowest
value of 0.046361519 in Aurangabad & with lowest values of 0.0571 in Jalna. Log Normal distribution fits
better with the lowest value of 0.031221864 in Hingoli, & with lowest value of 0.035305926 and 0.060638 in
Prabhani and Osmanabad respectively. Gumbel distribution fits better with lowest value of 0.0861in Latur.
Gamma distribution fits better with lowest value of 0.064602462 in Nanded.
Table 3: Chi squared value of 5 PDF’s
Distributions Normal Log- Normal Exponential Gumbel Gamma
Distribution Distribution Distribution Distribution Distribution
Chi-Squared 0.046361519 0.082976842 2.45802957 0.782653598 0.088625532
value
(Aurangabad)
Chi-Squared 0.068355 0.031221864 1.821792099 1.429076934 0.03682201
value
(Hingoli)
Chi-Squared 0.057109923 0.820661728 2.3562854 0.433688914 0.079428369
value (Jalna)

Chi-Squared 0.095846990 0.70049707 2.19428781 0.086125954 0.062585051


value (Latur)

Chi-Squared 0.0549330296 0.035305926 1.757478704 0.374760284 0.092753083


value
(Prabhani)
Chi-Squared 0.103084 0.060638 1.965452 0.386507 0.047729
value
(Osmanabad)
Chi-Squared 0.093625212 0.76695412 2.260103764 0.16751699 0.064602462
value
(Nanded)
4. CONCLUSIONS
The Marathwada region of Maharashtra is facing the problem of drought. Thus, to endure with such extreme
event a proper simulation of data is required in various probability distribution function so that future data can
be generated on the basis of best fit pdf and proper water resource practice measures can be implemented well
in advance. The study also provides a basis for choosing the best probability distribution for the individual
districts. The Data generated based on the pdf for each district can also be used to plan and manage various
engineering projects, most notably construction projects.
5. ACKNOWLEDGEMENT
The authors would like to thank entire fraternity of department of Water Engineering and Management of
Central University of Jharkhand for providing utmost support for carrying out the work. In addition to it authors
are also thankful to the personnel of WRIS for providing the important precipitation data.
6. REFERENCES
[1]. Yuan J, Emura K, Farnham C, Alam MA. Frequency analysis of annual maximum hourly precipitation
and determination of best fit probability distribution for regions in Japan. Urban climate. 2018 Jun 1;
24:276-86.
[2]. Lairenjam C, Huidrom S, Bandyopadhyay A, Bhadra A. Assessment of probability distribution of rainfall
of North East Region (NER) of India. J Res Environ Earth Sci. 2016;2(9):12-8.
[3]. Alam MA, Emura K, Farnham C, Yuan J. Best-fit probability distributions and return periods for
maximum monthly rainfall in Bangladesh. Climate. 2018 Mar;6(1):9.;
[4]. Arshad M, Rasool MT, Ahmad MI. Anderson Darling and Modified Anderson Darling Tests for. Pakistan
Journal of Applied Sciences. 2003;3(2):85-8..

487
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[5]. Mayoor M, Kumari A, Mahapatra S, Parhi PK, Singh HP. Comparison of four precipitation-based
drought indices in Marathwada region of Maharashtra India. International Journal of Advance and
Innovative Research, Indian Academicians and Researchers Association. 2018 Dec 1;5(4)..
[6]. Vikram K. Statistical distribution of rainfall in Uttarakhand, India. Applied Water Science.
2017;7(8):4765-76..
[7]. ŞEN Z, Eljadid AG. Rainfall distribution function for Libya and rainfall prediction. Hydrological
sciences journal. 1999 Oct 1;44(5):665-80..
[8]. Jäntschi L, Bolboacă SD. Computation of probability associated with Anderson–Darling statistic.
Mathematics. 2018 Jun;6(6):88.
[9]. Sethi RR, Mandal KG, Behera A, Sarangi A, Aggarwal R, Ambast SK. Rainfall probability analysis for
conservation of water resources for sustainable irrigation planning. Environment Conservation Journal.
2019 Jun 20;20(1&2):87-99..
[10]. Mishra PK, Khare D, Mondal A, Kundu S, Shukla R. Statistical and probability analysis of rainfall for
crop planning in a canal command. Agriculture for Sustainable Development. 2013;1(1):95-102.
[11]. Tao DQ, Nguyen VT, Bourque A. On selection of probability distributions for representing extreme
precipitations in Southern Quebec. InAnnual conference of the Canadian society for civil engineering
2002 Jun 8 (pp. 1-8).
[12]. Asim M, Nath S. Study On Rainfall Probability Analysis At Allahabad District Of Uttar Pradesh. Journal
of Biology, Agriculture and Healthcare. 2015;5(11):214-22.
[13]. Ghosh S, Roy MK, Biswas SC. Determination of the best fit probability distribution for monthly rainfall
data in Bangladesh. Am. J. Math. Stat. 2016; 6:170-4.
[14]. Patel NR, Shete DT. Probability distribution analysis of consecutive days rainfall data for Sabarkantha
District of North Gujarat Region, India. ISH Journal of Hydraulic Engineering. 2008 Jan 1;14(3):43-55.
[15]. Ratna SB. Summer monsoon rainfall variability over Maharashtra, India. Pure and applied geophysics.
2012 Jan;169(1):259-73.
[16]. Sharma MA, Singh JB. Use of probability distribution in rainfall analysis. New York Science Journal.
2010;3(9):40-9.

AUTHOR DETAILS:
PRITI PARMAR1, MOHIT MAYOOR2 * AND HARENDRA PRASAD SINGH3
1
PG Student, 2Assistant Professor and 3Professor & Head, Department of Water Engineering and Management,
Central University of Jharkhand

488
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

TRAINING THE 12th PASS OUT GIRLS ON HOSPITALITY MANAGEMENT OPERATIONS FOR
PROVIDING THEM EMPLOYABILITY

MISS SMITA AND DR. SARJOO PATEL

ABSTRACT
Education is one of the most significant methods for engaging and empowering any individual or a community.
It is necessary especially for women to help them develop socially and economically. Varied sectors are
engaged in the drive of women empowerment whether it is hospitality and tourism or any other field. Most
hotels and tourist organizations are trying to employ women and empower them socially and financially. The
study aimed to assess the knowledge of 12th pass-out girls on Hospitality Management Operations for
providing them employability with the objective to acquaint learners with theoretical as well as practical
knowledge of the various departments of the Hospitality Industry i.e. Front desk management, Housekeeping
Operations, and Food and Beverage Operations. The sample size comprised of 120, 12th pass-out girls from
Surat City of Gujarat State selected through the Purposive Sampling Technique. The questionnaire was used as
a tool for data collection. Results revealed that the majority of the respondents (86.67%) were having Low
extent of knowledge about the different areas of the hospitality industry. Based on extent of knowledge of the
respondents the researcher developed various modules and provided training on Front desk management,
Housekeeping Operations, and Food and Beverage Operations to enhance their knowledge and provide them
with employment opportunities which was found very effective in enhancing the knowledge of the 12 th pass out
girls.
Keywords: knowledge, hospitality management operations, education, 12th pass-out girls, employability.

INTRODUCTION
Education is one of the most significant methods for engaging and empowering any individual or a community.
It is the process of encouraging learning, or the acquisition of knowledge, information, skills, abilities, ethics,
values, convictions, beliefs, and habits. Girl Education is necessary for any country to help them develop
socially and economically. According to Webster’s New World Dictionary (1962), Education is “the process of
training and developing the knowledge, skill, mind, character, etc., especially by formal schooling”.
Employment in hospitality operations allows 12th pass girls to work, enhance their skills and develop
confidence among them which may help in improving their knowledge and skills as well as the economic
conditions.
It has been observed that an educated woman is much more capable to handle her household work than the
uneducated one. Education not only enlightens a woman with knowledge but teaches lifetime lessons to be used
in the future. An educated woman will be filled with self-confidence as she has acquired skills that will lead her
to be a skilled employee in any sector.
There are many career fields that one can choose after the 12th standard. Often the selection is based on the
interest of the student, and future scope. The hospitality industry has become the largest employer of women to
the current date. It is one of the highly job-oriented fields; it covers a wide range of services including food
service, accommodation, and catering. The hospitality industry is a group of businesses that provides a variety
of products and services to guests or travelers (1). Hospitality is the relationship between a guest and a host,
where the host receives the guest (2).
The hospitality sector is growing at a rapid pace; the industry has to consider both male and female candidates
equally for positions that traditionally have been dominated by men. After senior secondary education, various
certificate and diploma programs are also available that are for three months, six months, and one year. Various
topics are taught under those programs in such a short duration of time. They teach about Communication Skills
which helps the front desk agent or the receptionist to deal with the guests and welcome them with smiling faces
and a good attitude. They also give them knowledge about housekeeping, accounting, nutritional status, event
management, travel and tourism management, serving, etc.
The hospitality industry is one of the largest employers of women currently. Women have indeed excelled in the
Hospitality sector not only in India but all over the World (3). Employment in hospitality operations allows 12th
pass girls to work, enhance their skills and develop confidence among them which may help in improving their

489
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

knowledge and skills as well as the economic conditions. Housekeeping plays a very important role in the
hospitality industry in many ways. It is something that a girl is familiar with. There are various duties of a
housekeeping staff such as: It helps to establish a welcoming atmosphere and ensure reliable service from all the
staff of the department, to ensure a high standard of cleanliness and general upkeep in all areas of the
department, to provide linen, bed sheet, towel soap etc. in rooms, as well as maintain an inventory for the same,
to provide uniforms for all the staff and maintain adequate inventories for the same, to cater to the laundering
requirements of the hotel linen, staff uniforms, and guest clothing, to iron all the uniforms, to provide and
maintain the flower decorations and maintain the landscaped areas of the hotel, to coordinate renovation and
refurnishing of them when required, to deal with lost and found articles, to ensure training, control, and
supervision of all staff attached to the department, to establish a good working relationship with another
department, to ensure that safety and security regulations are made known to all staff of the department. These
activities do not require specific training so women can learn these services easily.
According to an International Labor Organization report, "Educating girls has proven to be one of the most
important ways of breaking poverty cycles and is likely to have significant impacts on access to formal jobs in
the longer term” (4).
n the poorest countries of the world, around 50% of girls do not attend secondary school. Yet, research showed
that every extra year of school for girls increases their lifetime income by 15%. Improving female education,
and thus the earning potential of women, improves the standard of living for their children, as women invest
more of their income in their families than men do (5).
When girls cannot pursue higher education and discontinue their studies after the 12th standard, they lack the
skills or qualifications to find employment opportunities. However, they are capable of handling all these things
with proper care. Poverty is the root cause of many problems in India and also of the low female literacy rate.
More than one-third of the population in India is living below the poverty line. Though the government is
putting efforts to make primary education free, still parents are not ready to send their girls to school. In most
rural areas, the lack of easy accessibility to school is another reason for the low female literacy rate. Parents do
not prefer to send girls to schools if they are located at a far distance from their village or home. Even if schools
are there then lack of adequate school facilities becomes a problem. Some of the schools do not have even basic
facilities. In some places of India, schools do not meet the safety, hygiene, or sanitation needs of girls, therefore,
skill development programs are helpful in this situation and help them build a set of skills, thus securing their
future economically and socially.
Women's empowerment is one of the major issues currently. Varied sectors are engaged in the drive of women
empowerment whether it is hospitality or any other field. Most of the hotels and tourist organizations are trying
to employ women and empower them socially and financially. There is a wide scope of empowerment in the
tourism industry if the resources and employment opportunities are properly harnessed. Various social cultural
and economic factors influence the role of women in prominence occupying both in the society and the
workplace. The hospitality and tourism industry aims to lift the acceptance of women in business and raise the
profile of women in the industry. The current scenario in the industry has created a period of remarkable change
and growth for women in this field. In restaurants, hotels, catering, firms, resorts, and many other venues,
women are becoming much more visible in management roles and other key positions.
Female employment exceeds male employment in the tourism industry. The women’s aesthetic traits are
particularly important in tourism and hospitality firms, particularly in frontline departments (6). The travel and
the tourism economy of India supports employment creation for both skilled as well as less skilled persons
(7).
Today’s women hold an important position in society and are working equally with men. They are kind,
committed, smile-faced, and enthusiastic, and all of these qualities are important in hospitality. They can
explore their career options and do a lot to develop and improve the hospitality sector. Although women have
covered almost all the areas and sectors and are working everywhere, the hospitality and tourism industries can
be particularly advantageous to them.
Therefore, the study focuses on empowering girls in skills needed for various departments of hospitality
industries like front desk operations, housekeeping operations, and food and beverage departments which are
very much in demand today. It can be a bright career field for girls who are interested in the hospitality/tourism
industry (8). With their hospitality operations skills they can get employment in the housekeeping department

490
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

and food and beverage department. Girls with good communication skills can get employment as front desk
agents or receptionists.
OBJECTIVES
1. To assess the knowledge of 12th pass out girls on Hospitality Management Operations viz; Front desk
operations, Housekeeping management operations and Food and beverage operations.
2. To develop educational modules on Hospitality Management Operations viz; Front desk operations,
Housekeeping management operations and Food and beverage operations for training the girls for
employability.
METHODOLOGY
The present study aimed to assess the knowledge of 12th pass out girls on Hospitality Management Operations
with the objective to provide learners with theoretical as well as practical training of the various departments of
Hospitality Industry i.e. Front desk management, Housekeeping Operations, and Food and beverage Operations.
The sample size of the present study comprised of 120, 12th pass-out girls from Surat City of Gujarat State
selected through the Purposive Sampling Technique. Questionnaire was used as a tool for data collection. A
three point continuum Likert scale was used to find out the extent of knowledge of the 12 th pass out girls on
Hospitality Management Operations. The scale comprised of total 86 statements. For the positive statements the
scores assigned were 3, 2, 1 as Agree, Undecided and Disagree and were reversed for the negative statements.
The minimum score of the scale was 86 and the maximum was 258. Based on the extent of knowledge of the
respondents the researcher decided to develop various modules and provided training on Front desk
management, Housekeeping Operations, and Food and Beverage Operations to enhance their knowledge and
provide them with employment opportunities. A post testing was done after providing them training with the
help of the modules and it was found very effective in enhancing the knowledge of the 12 th pass out girls. The
study has been approved by the Institutional Ethics Committee and the ethical approval number for the study is
IECHR/FCSc/PhD/2021/173.
RESULTS AND FINDINGS
The findings of the study are presented below:
a) Background Information of the respondents.
Table 1: Frequency and percentage distribution of the respondents on the basis of their Background Information
n=120
Background Information of the Respondents
Personal Income of the Respondent (in rupees) f %
Less than 4000 72 60.00
4001 -8000 40 33.33
8001 and above 8 6.67
Locality
Sub-Urban 16 13.33
Urban 8 6.67
Rural 96 80.00
Type of family
Nuclear 68 56.67
Joint 52 43.33
Monthly income of the family (in rupees)
Less than 5000 24 20.00
5001 -10000 32 26.67
10001 and above 64 53.33
The results from the above table revealed that the highest per cent of the respondents 60% fall under the
category of less than ₹4000, followed by 33.33% respondents belonged to the category of ₹4001-8000, whereas
only 6.67% respondent’s monthly income was more than ₹8001. The average personal income of the
respondents was found to be ₹6000. Majority of the respondents i.e. 80% belonged to Rural area, followed by
13.33% respondents belonged to sub-urban and only 6.67% respondents belonged to urban area respectively.
More than one-half of the respondents i.e. 56.67% belonged to Nuclear family whereas 43.33% respondents

491
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

were from Joint family. A little more than one-half of the respondent’s i.e. 53.33% monthly income was ₹10001
and above whereas 20% respondent’s monthly income was less than ₹5000 (table 1).
b) Basic Information of the Respondents

Figure 1: Distribution of the Basic information of the respondents


The above figure depicts that the medium of instruction for 60% of the respondents was Gujarati medium and
for 40% respondents was Hindi Medium. Cent per cent respondents (100%) had not studied any subject in
school regarding Hospitality Management. Results also revealed that 93.33% respondent’s family members
were not working in the Hospitality fields whereas 6.67% were working in areas such as guest houses,
restaurants, hotels, hospitals, resorts and so on as housekeeping staff, cook, as waiter etc. (Fig 1).
c) Knowledge of 12th Pass Out Girls on Hospitality Management Operations
A three point continuum Likert scale was used to find out the extent of knowledge of the 12 th pass out girls
about Hospitality Management Operations. The scale comprised of total 86 statements. For positive statements
the scores assigned were 3, 2, 1 for Agree, Undecided and Disagree and it was reversed for negative statements.
The minimum score of the scale was 86 and the maximum was 258. After calculating the scores for each
statement, the knowledge scale was categorized into three categories i.e., high, moderate and low knowledge on
the basis of equal interval scoring method.
Table 2: Frequency and percentage distribution of the respondents on the basis of the Extent of Knowledge
n=120
S. No Extent of Knowledge Score Range f %
1. Low 86-143 104 86.67
2. Moderate 144-201 16 13.33
3. High 202-258 0 0.00
Results revealed that majority of the respondents (86.67%) were having low extent of knowledge about the
different areas of Hospitality Management Operations such as personal grooming, telephone etiquettes and
communication skills, different types of materials and methods used for cleaning, decorating different rooms
and areas according to any event or theme, food and beverage service, bed making and other information related
to safety measures etc. whereas only 6.67% respondents were having moderate knowledge about it (table 2).
Development of Modules
The extent of knowledge of 86.67% respondents was found to be low. Therefore educational modules were
prepared by the researcher to train the 12th pass out girls about the various areas and Departments of the
Hospitality industry. One month of training was provided to them to make them understand about the areas of
hospitality. The modules were prepared on the following topics: Personal Grooming and makeup,
Communication skills, Telephone manners and etiquettes, Managing different registers such as Guest arrival
and departure register, lost and found register, maintenance register etc., Handling guest cycle (from Pre-arrival,
arrival, during stay and departure), Bed making in rooms, flower arrangement and decoration, Cleaning of

492
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

rooms and bathrooms using various Cleaning Agents, Room service, Decorating rooms and different areas,
management of different areas such as Linen and Laundry Room, Uniform room and tailor room, housekeeping
stores, lost and found room, first aid emergency procedures, Table settings and its types (Formal, informal,
basic and buffet), Menu types, Napkin folding, Table laying, Taking orders and bill presentations, Banquet
service, outside catering, serving styles and cleaning equipment and materials.
These modules helped the respondents with practical as well as theoretical knowledge about the different areas
of Hospitality industry. These modules were found to be very effective in enhancing the knowledge of the 12th
pass out girls and also provided them with employment opportunities.
TESTING OF HYPOTHESES
Several hypotheses were formulated to find out the relationship between variables of the present study. For
present investigation, as per the nature of variables the Analysis of Variance (ANOVA) and ‘t’-test were
computed.
Analysis of Variance was computed to find out the variation in the extent of knowledge according to their
personal variables viz; age (in years), and size of family. ‘t’ test was applied to find out the mean difference
between extent of knowledge due to their personal variables viz; type of family and any family member
working in hospitality sector. Wherever ‘F’ ratio was found significant, Scheffe’s test was computed. The
analysis of variance was found to be significant for family income and extent of knowledge at 0.05 level. It was
found that if any member of the family was working in the hospitality sector the extent of knowledge was high
which was proved by the t-test conducted as found significant at 0.05 level. Hence it was concluded that family
income and the indulgence of family member in Hospitality sector had a positive impact on the knowledge of
the respondents.
CONCLUSION
The present study was carried out on assessing the knowledge of 12th pass-out girls on Hospitality Management
Operations for providing them Employability. It was found that majority (93.33%) of the respondents belong to
rural family, they had not studied any subject in their school related to hospitality fields therefore, the extent of
knowledge of majority of the respondents (86.6%) was found to be low which motivated the researcher to
develop modules on the different areas of the Hospitality fields. With the help of the developed modules, one
month training was provided to the group of respondents to enhance the knowledge of the 12 th pass out girls
about the different areas of the Hospitality fields. The training was proved to be very effective in enhancing
their knowledge.
REFERENCES
1. Kasavana, M.L. (2013). Managing front office operations, American Hotel & Lodging Association. pp 3-4.
2. Hospitality. Retrieved from : Hospitality - Wikipedia on 14.04.2022.
3. Pant, Y. (2020). Women’s Role in Hospitality Industry: A Study Through Analytical Framework.
International Journal of Advanced Research in Commerce, Management & Social Science (IJARCMSS).
2581-7930. 3(3): pp 394-400.
4. International Labor Organization report. https://theirworld.org/explainers/girls-education. Retrieved on
22.01.2021.
5. Female education. https://en.wikipedia.org/wiki/Female_education#cite_note-5. Retrieved on 22.01.2021.
6. Katircioglu, E. and Tekin, O.A. (2021). Examining the Relationships Between Female Frontline
Employees’ Aesthetic Labour And Burnout. Tourism and Hospitality Management. 27(3): pp 503-528.
7. Jacob, M. (2017). Entrepreneurships and Startup Programmes: Opportunities in Travel and Tourism. Atna,
Journal of Tourism Studies. 0975-3281, 12(2): pp 51-65.
8. What is Hospitality? An In-Depth Look For Professionals. (Webster Dictionary). https:// hoteltechreport.
com/ news/what-is-hospitality.
AUTHOR DETAILS:
MISS SMITA1 AND DR. SARJOO PATEL2
1
PhD Student and 2Assistant Professor, Department of Family and Community Resource Management, Faculty
of Family and Community Sciences, the Maharaja Sayajirao University of Baroda, Vadodara, Gujarat, India

493
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

IMPROVED INTERNET OF THINGS DEVICE SECURITY USING THE DEPLOYMENT OF


BLOCKCHAIN TECHNOLOGY

CHETAN CHAUHAN* AND DR. MANOJ KUMAR RAMAIYA

ABSTRACT
The Internet of Things (IoT) research is still vulnerable to attacks on privacy and security, despite its fast
proliferation. As a result of resource limitations and a decentralised architecture, IoT devices are unable to
implement traditional privacy and security protections. The report mainly focuses on the study of Internet of
Things systems. IoT-related risks can be examined here. Using the blockchain, scholars are attempting to solve
these issues. Because of its widespread use and success, blockchain has been embraced by a number of other
businesses. No doubt about it, blockchain is here to stay. Despite the tremendous advancements in blockchain
technology, there are still difficulties in IoT that need to be addressed. Before developing and executing a
blockchain-based solution, it is critical to understand the problems and hurdles encountered by earlier research
endeavours. Research presented here discusses previous issues and suggests ways to overcome them. A lack of
security requirements for authentication and data privacy puts data collected by IoT devices and always stored
on blockchain at risk. As a result, the blockchain must be safeguarded. This article examines in-depth the
security measures for IoT systems. The importance of IoT device security is also examined in this study. There is
a lot for readers to learn about the IoT system's issues and potential solutions. The study's findings will be
helpful to anyone looking to implement Internet of Things (IoT) applications. A safe Internet of Things system's
needs and how to achieve them can be learned by them.
Keywords: Internet Of Things, Blockchain Technology , machine-to-machine communication.

INTRODUCTION
As defined by the International Organization for Standardization, the "Internet of Things" (IoT)[1] is a network
of interconnected mechanical and digital machines (including robots), computing devices, people or animals
(including robots), as well as objects. The IoT is defined as a network in which each device has its own unique
identification and is capable of transmitting data over a network without the need for direct human to human or
computer to computer interaction (in its most basic definition). When sharing data over a network, always use a
secure connection to avoid the possibility of information being stolen or altered with while being transferred.
This constantly increasing and interconnected set of documents (referred to as "blocks"), which is protected by
encryption, is known as the blockchain, which is another term for bitcoin. Each block contains a cryptographic
hash of the preceding block, as well as a timestamp and any data associated with the transaction, among other
things. This is possible because the block chain was meant to be resilient to data manipulation, making it
impossible to manipulate the data. Everyone has access to and can make use of it because it is a publicly
accessible distributed ledger. Because of its ability to record transactions between two parties quickly and in a
permanent and verifiable manner, blockchain[2] technology has the potential to significantly speed up the
settlement of financial transactions. This is because it records transactions between two parties in a permanent
and verifiable manner. Once data has been gathered, it is impossible to make modifications to it without
influencing the data collection of succeeding blocks of information. It is only possible to change the following
block with the permission of a majority of the network's members. As a result of being kept on a distributed
computing system, blockchain records are inaccessible and cannot be altered, making them secure by design. As
a result of being inaccessible and secure by design, blockchain records can be called secure by design. It is
required that this system have a high level of Byzantine error tolerance, and this system was designed to meet
that need. People's privacy is being violated by widespread and broad data collecting, as well as covert data
processing and transfer, which is posing severe security and privacy issues for society. It is possible to transfer
information independently across machines when information is shared between machines through the use of
machine authentication. Briefly stated, allowing machines to authorise data flow over wired and wireless
networks increases the security of information transfer. Machine authentication can be used to prevent devices
such as sensors and metres from being accessed by unauthorised individuals. Machine-to-machine
communication (M2M) is at the heart of the development of the Internet of Things, and these technologies are
critical to its success (IoT)[3]. Virtual reality devices have the capability of sharing data automatically over a
network, and data in this virtual reality environment can be obtained through the use of a network connection. It
is critical that privacy and security concerns are addressed in the Internet of Things in order to maintain the
494
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

long-term survival of the technology (IoT). The use of machine authentication to protection both PCs and
networks is therefore necessitated by this.
RELATED WORK
As the Internet of Things (IoT) business expands and the number of connected devices rises, the volume of data
generated by IoT devices is exploding. IoT security and privacy concerns are on the rise because of this rapid
expansion. There have been a slew of recent research on blockchain and its potential use in IoT security and
privacy as well as an authentication and authorisation option for IoT devices. Networked smart devices that do
not require any human intervention to communicate sensor-based data via the Internet are a rising technology
called Internet of Things (IoT). The IoT devices (nodes) have a limited capacity and suffer from a variety of
challenges, including computing, communication, and security, among others. One of the most important
aspects of IoT security is the requirement for authentication and permission at the first point of network access.
For safe communication, these independent, networked nodes need to authenticate each other.
D. Puthal,, et al[4] An authentication system that can be utilised for Internet of Things (IoT) and edge
computing applications has been created for this article. Simulated and real-time testbeds are used to evaluate
the performance of the system and its components.
S. Mandal, et al[5] It's possible to utilise the AVISPA tool to demonstrate the robustness of CSUAC-security
IoT's measures under the real-or-random (ROR) model. CSUAC-IoT is proven to be superior to five other
competing techniques in terms of security and functionality, as well as computational and communication
expenses.
S. He et al [6] the scalability, resistance to infiltration, and exception response time of BoSMoS Using the
experimental data, it can be concluded that BoSMoS is practical and sound. Even more impressive is how well
the system can handle large-scale deployments of IIoT devices as well as offer authenticated software updates,
as well as detect illegal state of software.
L. Chen et al [7] For the sake of comparison, real-world and synthetic data were used to construct MB DDPG,
which was then placed against two other algorithms: the genetic algorithm and the random algorithm.
S. K. Pinjala et al [8] Smaller-scale infrastructures, such as sensor networks, can also be accommodated by the
DCACI framework in the same way as large-scale infrastructures like Smart Cities can be accommodated.
A. A. Malik et al.[9]Using a tried-and-true method can save you a lot of time and effort by automating the
deployment process. Author can model and implement a Blockchain-integrated[10] smart city using the
seamless deployment method provided by our automation module.
Blockchain Solution for IOT Device Security
Table 1: Existing Encryption Method for Security
Author/Year Technique Method
[11 ] When it comes to encryption, Multi-level security is used to protect
homomorphic encryption employs the data. Additionally, personal
morphological encryption. information is safeguarded..
[12] Encryption standard known as The same key can be used to encrypt
Advanced Encryption Standard and decrypt. Using three datasets to test
(AES) for fog security
[13] Encryption based on an individual's Encryption based on a person's identify
identification is known as Identity- (IBE) is known as Identity-Based
Based Encryption (IBE). Encryption.
[14] Accumulation of Data and Identity protection is essential when
Homomorphic Encryption uploading data to public cloud services.
Preserve fog nodes' bandwidth.
According to the manufacturer, the component shown in table 1 can be put at a smart home gateway and will
give both the administrator and owner of the smart house better cyber security capabilities. Components based
on blockchain technology are being developed to be used with this.The component can be beneficial to one or
more Internet of Things service providers as well as a significant number of smart home installation projects.
The following are some of the functions that this component is capable of performing:

495
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

a) Device and user registration, as well as the user's permission:


b) Within the scope of a single smart contract, both the user registration process and the user permissions
management process for the service are implemented.
The contract stores anonymized hashes of the data, which can be accessed and cross-checked against locally
stored information using the distributed ledger. In public Blockchain[15] environments, this separation allows
for deployment, as publicly visible information on the chain is stripped of any sensitive information, such as
descriptions and other identifying qualities. This strategy makes it easy to register gateways and devices and to
manage permissions. All control over user access rests with the Smart Contract (SC).
The "Owner" of a smart contract is the entity that established the contract[16] or acquired ownership of it by
purchasing it from a prior owner as shown in the fig 1. Adding and removing validated software hashes can be
done by the Owner for Administrators, Users, Gateways, and IoT devices alike. A Gateway may not be owned
by a contract owner. The Owner's user type is 1. This is the default setting.
An Administrator, in contrast to the Owner, does not have the authority to add or remove other Administrators
from their company's membership. In reality, only two types of users have the same last name: Administrators
and Owners, who are both referred to as "owners." Remember that the Owner is also an Administrator[17], in
case you forgot. Administrators are barred from owning Gateways since doing so would be in contradiction
with their official responsibilities.In a Gateway environment, the entity that has the ability to sign or revoke a
document is referred to as the "User." Users are not granted any further privileges. User 10 is the default type of
user in the system. Throughout the contract, the concept of Gateways is maintained in a variety of different
forms and configurations.

Figure 1: Basics Communication between two device


It is possible to make use of Gateway-specific examples of one-of-a-kind strings or information that has been
hashed, such as the Gateway's media access control address (or the hash of the MAC address). Hashing with the
SHA3(Keccak256) technique is required to ensure the successful completion of the derivation, as shown in the
accompanying figure.

Figure 2: SHA3 and Keccak256


496
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

It is likely that, with the introduction of Gateways, the ID will be examined to confirm that it is unique in order
to guarantee that it is legitimate. When you are configuring a smart contract, you are required to enter a
Gateway ID in the field that is designated for it. As a result of the fact that MAC addresses are not regarded as
being particularly sensitive, it is possible to use them as Gateway IDs in plain text.
PROPOSED ALGORITHM
RSA and ECC, two commonly used identity-based approaches, are combined[18] in the suggested method.
Encryption of the public encrypted ciphertext requires the deployment of both hybrid and PRE techniques. The
following are the steps to be taken: When the sender uses the hybrid technique, he or she is aware of the
recipient's identity (IDi). Encryption of the sender's keyword and receiver's identifier are both included in the
ciphertext output (the tags ordinary, secret, and top-secret are used to identify the keyword).
Algorithm 1 RSA Encryption
Input: RSA Public key (n,e), Plain text m €[0,n-1]
Ouput: Ciphertext c
Begin
1. Compute c = me mod n
2. Return c.
END
Algorithm 2: RSA Decryption
Input: Public Key (n, e), Private Key d, Ciphertext c
Output: Plain Text m
Begin
1. Compute c=c d mod n
2. Return m
END
Algorithm 3: hybrid encryption
Input Parameters field of Elliptic curve (p, E, P, n), Public key Q, Plan text m
Ouput: Cipertext (C1 , C2 )
Begin
1. Represent the message m as a point M in E(Fp )
2. Select k € R[1,n−1]
3. Compute C1 = K p
4. Compute C2 = M + kQ
5. Return (C1 , C2 )
6. END
Algorithm 4: Decryption
Input Parameters filed of an elliptic curve (p,E,P,n), Private Key d, Ciphertext (C1 , C2 )
Output: Plain text m
Begin
1. Compute M= C2 − dC1 and m from M
2. Return(M)
End.
The recipient decrypts the ciphertext after obtaining the identity using PKG.

497
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Figure 3: proposed algorithm flow chart


In the fig 3 describe the breakdown of each of the three hybrid algorithms and their parameters: Constructing a
setting entails: An elliptic curve can represent E(IDi, m) when it is initialised with two random values s and d
drawn from a prime number set. Security parameters ranging from 1 to k are entered, and the corresponding
parameter is created.
The blockchain allows you to transfer ownership of your contract to another party, which you can accomplish
by transferring the contract to them.
Identifying and Assessing Security Risks[19] It is not possible for an acceptable cloud policy decision point to
have an impact on blockchain consensus (the decision of the data owner) in either ACL-based or prefix
encryption-based data sharing systems. Owners can utilise blockchain transactions to vote on access control
options, which is something that should be kept in mind while using the technology. These transactions are
validated by the miners and validators of the blockchain. For the purpose of ensuring the security of the
blockchain technology as shown in the fig 4, we assume the standard safety conditions relating to the
underlying technology. With Proof of Work (PoW) blockchains like Bitcoin and Ethereum, there is a belief that
the attacker will not have control over the majority of computing power utilised. Prior to implementing access
control[20] choices on the blockchain and enforcing the cloud PEP, there was a user contract that all owners
signed and agreed to be bound by (Peer-to-Peer Encryption System) (Peer-to-Peer Encryption System). As a
result of their openness, cloud service providers can be held accountable for any decisions they make that differ
from the ones stated above. Using blockchain also has the added benefit of allowing auditability of all actions
(such as data offers, offer acceptances, and ACL modifications)[22]. -basic C's schemes will keep access to data
secure as long as the storage provider is a reliable and trustworthy one, ensuring that only those who have paid
for access to the data have access. The prefix encryption system should be able to withstand an attack from a
hostile storage provider as long as a reputable key distribution authority is used. On the other hand, if all of the
peers are acting maliciously, the distribution of authority can prevent any data from being released. If a storage
provider restricts access to encrypted data, that's not a denial-of-service attack we're looking into.

Fig. 4: Basic communication different IoT device using Blockchain

498
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

It is possible to use any desired function, such as the function f (F1...F2), to encode ciphertexts C1,......C2, but
no information about C1,......C2 or f (F1...F2) is revealed during the encoding process. Inputs, output, and
intermediate values are all protected by encryption.

Figure 5: Working of proposed algorithm


Using totally homomorphic techniques can help reduce the amount of bandwidth required for transmission. The
proposed solution uses a mathematical formulation based on a totally homomorphic scheme to increase the
security of the ciphertext. To address privacy concerns in fog computing, a new, totally homomorphic[23] type
is required. Data can also be stored in the fog because of this. In a fog environment, a three-tiered network of
IoT devices, fog nodes, and cloud centres is interconnected both publicly and privately. A secret communication
channel is used for authorization verification, and only users who have been confirmed are allowed to use it.
Data storage and access must be carefully considered when transmission is of a more public nature. When
creating an access control policy, it is important to examine the role of each user, the information contained on
their device, the potential for mobile interoperability and location awareness on the part of communication
parties, and the available resources. An asymmetry with respect to the ECC has been included into this basic
technique by virtue of the mathematical functionalities used. According to implementation, the critical size
ranges from 448 to 512 bits. Fog's system also has issues with data integrity, service availability, and security
that are common in cloud environments.
The coordinator should be a well-known fog node.
As a result, a key and parameters are generated by the authorised node.
Phase 1: The key creation method created public (pub k) and secret (S k) keys for the fog and public curve
parameters.
Phase2: It is kept in a vault under the control of the authority.
Phase 3: Receive the public curve parameters from other fog nodes and IoT device nodes (PK).
Phase 4: The fog coordinator sends the Cid1 private key to IoT devices.
Phase 5: Slave fog nodes receive the "Cid" of an IoT client from the primary Cid2 node.
Phase 6: Prior to transmission, the IoT client device encrypts message m using private key pri k Cid1.
Phase 7: Pri k Cid2 is used by the fog node to re-encrypt the communication after its encryption has been
decrypted. An encrypted and decrypted Cid message is in an intermediate state.
Cid used its private key, prik, Cid1, to decode the message.
On the cryptographic algorithms RSA and ECC Fog nodes must be able to communicate with other things while
retaining a high level of accuracy and confidentiality in their communications. Before sending an encrypted
message from one device to another, it is necessary to decrypt the message. In order to prevent fog nodes and
unsigned IoT devices from reading the messages transmitted [24] by each IoT device, they need be signed.
When dealing with a massively networked IoT environment, security keys will no longer be required because
the scheme will decouple the sender and the recipient. The primary focus of this research is on maintaining
confidentiality. If a specific method is right, it must be feasible to decode the message using the correct key in
order to verify that it is correct. If you prefer, you can start with the letter m as the message and encrypt it to
create a ciphertext from there. The encryption algorithm is reused ( Enc.m). (pri k Cid1, pri k-Cid2) is a pair of
499
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

keys that have been created. After decrypting the message, Re Enc(Enc.m)) is identical to m. When this is the
case, we may be confident in the security of our design solution. The proposed system is impenetrable, based on
the chance of a successful attack on the system. In situations where the likelihood of a breach is virtually
undetected, it is advantageous. Because it is time-bound and polynomial in nature, the breach caused by the
adversary is minimal. The proposal contrasts two cryptographic algorithms: RSA and ECC, each of which has
its own set of advantages and downsides. The best candidate is selected on the basis of the findings provided
and the factors considered in each case. If you use the robust RSA encryption algorithm, you must use the
composite number n=p*q, which is a pair of enormous prime numbers, in order to encrypt your data. It is
difficult to find the prime factorization of a huge integer, also known as the factorization of the composite
figure. Elliptic Curve Cryptosystems (ECC), RSA's main competitor in public key cryptography, uses a
different algorithm than RSA. It is possible to prevent an index calculus assault by employing a publicly
available elliptic curve. The algorithm's difficulty is defined by the size of the elliptic curve on which it
operates. The base points of a curve are difficult to compute with discrete logarithms because they are so close
together. It is not possible to find the multiplicand using point multiplication when both the original and product
points are provided. This is what determines the algorithm's level of protection. The proposed system services
an ECC proxy approach in order to protect against a chosen-plaintext attack. The ciphertext and signatures are
generated in a smaller size. It is more efficient than RSA at generating keys. Even with a 164-bit key, the ECC
approach delivers the same level of security as a 1024-bit RSA key, according to the researchers. If you want to
substitute the RSA approach, which provides only signing and decryption, you can use ECC instead, which is
computationally faster than RSA. A two-stage, extremely secure method, ECC signatures are difficult to
manufacture, but RSA signatures are not difficult to create. In addition to being fast and simple to implement,
ECC's binary elliptical curve serves as a fault-tolerant protocol for the critical exchange of information. The two
most significant techniques of the Secure Sockets Layer (SSL) are, nevertheless, subject to attack. In a
distributed system with Internet of Things and smart grid applications, the proxy re-encryption scheme is the
most appropriate choice. This technique can be used to address the storage and management challenges
associated with the Internet of Things network. In the experiment, the results indicate that the time it takes to
encrypt and decode data grows as the level of security increases, and that this is true for data of varying amounts
in the experiment as well. However, in most cases, the amount of time spent encrypting and decrypting the same
data is at least twice as long as the amount of time spent encrypting and decrypting it the first time. According
to the results, RSA decryption is much slower than ECC decryption in terms of speed. Cloud computing
delivers a service at the network's edge, where billions of applications and devices are connected. When
combined with cloud computing, this ubiquitous technology has the potential to support a wide range of fog
implementations. Some specific and generic servicshes can be supplied by fog nodes with varying levels of
resource availability. At all phases of the communication process, complete secrecy is ensured by the
organisation. The proposed double-encryption work satisfies the requisite requirements. The first degree of
encryption protects the privacy of two legal partners who are communicating with one another. When using a
fog-based Internet of Things network, the intermediary nodes do not need to be aware of the content of the data
they are transferring. This is accomplished through the use of encryption. It is possible to encrypt data without
the node being aware of the secret.
RESULT ANALYSIS
One of the metrics that is utilised in the process of determining whether or not an algorithm is capable of
encryption and decryption is the amount of time that is required to finish each phase. measures the amount of
time that has elapsed in relation to the security parameter between various nodes and IoT devices. This essay
analyses the experiment from the perspective of a particular hidden bit of information. For the purpose of the
test, a laptop equipped with an Intel(R) Core(TM) i7-6700HQ processor, 32 gigabytes of random access
memory (RAM), and a clock speed of 2.60 gigahertz was used. The order bit length of the elliptic curve group
is what is utilised for the security bit, and it is used to represent the number of bits, which is the same as the
number of valid points on the curve (number of valid points on the curve). The square root of a curve's
magnitude is inversely proportional to the degree of its curve's security. It was repeated ten times for each of the
three security parameters with widths of 80, 128, and 256 bits over message data of 32 and 64 bytes in order to
identify the encryption and decryption runtime that was developed using the programming language as a base.
This was done in order to identify the encryption and decryption runtime that was developed using the
programming language as a base. In order to implement the data-sharing functions described in Section IV, we
developed a smart contract on top of the blockchain. We deployed the contract on a Fabric network by using
Kafka as the consensus method, and the response that we've had to this decision has been overwhelmingly
good. The effectiveness of the method is evaluated through the use of our experiments. Sash is hard at work on
500
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

two distinct strategies for data exchange at the moment. The experimental blockchain network is constructed
using HyperLedger Fabric modules in addition to other components. This network offers a solitary ordering
service in addition to five distinct places of connection. The web application programming interface (API) that
is in charge of one of the peers serves the entire blockchain network. We have found that the performance of the
system is affected by both the amount of data being encrypted and the amount of depth that the encryption key
has. This is true for the prefix encryption-based method. In order to be more specific, we are monitoring the
amount of time it takes data producers and consumers, respectively, to upload data to the network and get data
from the network (for consumers). In this scenario, the functionality of the cloud service provider is imitated by
using a key/value store database that is also housed on the workstation of the peer.
Table 2: Comparison of Encryption Time

File Size in KB SHA1 (ms) RSA-AES Proposed


30 1243 1421 1124
40 2683 3199 1210
60 4912 5837 3693
80 7103 7920 5785
100 9234 10454 7654
This prefix encryption-based system was put through a slew of tests, spanning from one to six depth levels, to
see how the key depth affected its performance. Other than the experimental noise, we found no significant
differences in performance. As a result of this, we can conclude that no matter how many key depths are used,
the performance of the prefix encryption-based technique does not change, which was done in order to calculate
the amount of data. In order to submit and retrieve data from and to the system, we executed the queries on each
of the randomly generated arrays of bytes that we prepared for each test. These queries were run through the
computer. Participants' Reactions to the Research Data retrieval from the platform is a lot faster than data
committing to the platform, according to the results of the testing. Using a comparison of a similar but less
difficult activity can help explain an increase in the complexity of an action evaluated in terms of smart contract
calls. A real-world implementation is expected to show that people will become more and more data consumers
rather than data creators in the future. Data consumers, rather than data producers, are the underlying
assumptions that underlie this prediction. As a direct result of this, the time lag between these two actions is
significantly reduced. The total amount of time needed to complete each evaluated activity increases in a
manner that is almost linear with the linearity of the relationship between the number of actions carried out and
the total amount of time spent..
Table 3: Comparison of Encryption and Decryption Time for 32-byte msg
Encryption Time Decryption
(ms) Time(ms)
Security parameter(bits) 80 128 256 80 128 256
Partial homomorphic RSA 18.7 33.9 892 200 908 1097
and ECC algorithm
Proposed algorithm 6.5 30.4 573 3.7 18.3 231.7
Table 4: Comparison of Encryption and Decryption Time for 64-byte msg
Encryption Time Decryption
(ms) Time(ms)
Security parameter(bits) 80 128 256 80 128 256
Partial homomorphic RSA 111.5 123 1021 201.5 1016 1054
and ECC algorithm
Proposed algorithm 9.8 42 600 15.4 32.3 259
As the amount of data collected increases, so does the variation in data sizes. This affects performance
outcomes. In this example, it is obvious that the time it takes for data to travel across the network is a
contributing factor. Utilizing encryption has a little impact on smaller data sets, however as data sets grow in
size, the impact of using encryption gets increasingly severe. We believe that prefix encryption is a worthwhile
trade-off because of the advantages it provides.

501
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

CONCLUSIONS
Internet of Things (IoT) security concerns may be eased by the implementation of decentralized Blockchain
technology. Clustering the Internet of Things network is necessary. The network durability ofthese clusters is
then enhanced. The specifics of how the blockchain-based architecture for IoT authentication and authorization
will be implemented were the subject of our conversation. Hyperledger Fabric, an open-source blockchain
technology, is used in the model to evaluate the functionality of the proposed system. With a local blockchain
implementation, it creates a framework for Internet of Things devices in the region to work together to improve
their own security. When security is implemented utilising a multi-layered technique, computational and
network strain, as well as latency, are decreased. Peer-to-peer communication within a blockchain network is
used to improve communication efficiency while simultaneously supporting integrity and security in this
suggested paradigm.
REFERENCES
[1]. U. Guin, P. Cui and A. Skjellum, "Ensuring Proof-of-Authenticity of IoT Edge Devices Using
Blockchain Technology," 2018 IEEE International Conference on Internet of Things (iThings) and IEEE
Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing
(CPSCom) and IEEE Smart Data (SmartData), 2018, pp. 1042-1049, doi:
10.1109/Cybermatics_2018.2018.00193.
[2]. N. Garg, M. Wazid, A. K. Das, D. P. Singh, J. J. P. C. Rodrigues and Y. Park, "BAKMP-IoMT: Design
of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things
Deployment," in IEEE Access, vol. 8, pp. 95956-95977, 2020, doi: 10.1109/ACCESS.2020.2995917.
[3]. M. A. Rashid and H. H. Pajooh, "A Security Framework for IoT Authentication and Authorization Based
on Blockchain Technology," 2019 18th IEEE International Conference On Trust, Security And Privacy In
Computing And Communications/13th IEEE International Conference On Big Data Science And
Engineering (TrustCom/BigDataSE), 2019, pp. 264-271, doi: 10.1109/TrustCom/BigDataSE.2019.00043.
[4]. D. Puthal, S. P. Mohanty, P. Nanda, E. Kougianos and G. Das, "Proof-of-Authentication for Scalable
Blockchain in Resource-Constrained Distributed Systems," 2019 IEEE International Conference on
Consumer Electronics (ICCE), 2019, pp. 1-5, doi: 10.1109/ICCE.2019.8662009.
[5]. S. Mandal, B. Bera, A. K. Sutrala, A. K. Das, K. R. Choo and Y. Park, "Certificateless-Signcryption-
Based Three-Factor User Access Control Scheme for IoT Environment," in IEEE Internet of Things
Journal, vol. 7, no. 4, pp. 3184-3197, April 2020, doi: 10.1109/JIOT.2020.2966242.
[6]. S. He, W. Ren, T. Zhu and K. R. Choo, "BoSMoS: A Blockchain-Based Status Monitoring System for
Defending Against Unauthorized Software Updating in Industrial Internet of Things," in IEEE Internet of
Things Journal, vol. 7, no. 2, pp. 948-959, Feb. 2020, doi: 10.1109/JIOT.2019.2947339.
[7]. L. Chen et al., "IoT Microservice Deployment in Edge-Cloud Hybrid Environment Using Reinforcement
Learning," in IEEE Internet of Things Journal, vol. 8, no. 16, pp. 12610-12622, 15 Aug.15, 2021, doi:
10.1109/JIOT.2020.3014970.
[8]. S. K. Pinjala and K. M. Sivalingam, "DCACI: A Decentralized Lightweight Capability Based Access
Control Framework using IOTA for Internet of Things," 2019 IEEE 5th World Forum on Internet of
Things (WF-IoT), 2019, pp. 13-18, doi: 10.1109/WF-IoT.2019.8767356.
[9]. A. A. Malik, D. K. Tosh and U. Ghosh, "Non-Intrusive Deployment of Blockchain in Establishing Cyber-
Infrastructure for Smart City," 2019 16th Annual IEEE International Conference on Sensing,
Communication, and Networking (SECON), 2019, pp. 1-6, doi: 10.1109/SAHCN.2019.8824921.
[10]. M. Stoyanova, Y. Nikoloudakis, S. Panagiotakis, E. Pallis and E. K. Markakis, "A Survey on the Internet
of Things (IoT) Forensics: Challenges, Approaches, and Open Issues," in IEEE Communications Surveys
& Tutorials, vol. 22, no. 2, pp. 1191-1221, Secondquarter 2020, doi: 10.1109/COMST.2019.2962586.
[11]. Z. H. Mahmood and M. K. Ibrahem, "New Fully Homomorphic Encryption Scheme Based on Multistage
Partial Homomorphic Encryption Applied in Cloud Computing," 2018 1st Annual International
Conference on Information and Sciences (AiCIS), 2018, pp. 182-186, doi: 10.1109/AiCIS.2018.00043.
[12]. P. Chaudhary, R. Gupta, A. Singh and P. Majumder, "Analysis and Comparison of Various Fully
Homomorphic Encryption Techniques," 2019 International Conference on Computing, Power and
Communication Technologies (GUCON), 2019, pp. 58-62.
502
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[13]. V. -Q. -H. Nguyen and D. -H. Ngo, "Private Identity-Based Encryption For Key Management," 2020 7th
NAFOSTED Conference on Information and Computer Science (NICS), 2020, pp. 416-420,
[14]. X. Song and Y. Wang, "Homomorphic cloud computing scheme based on hybrid homomorphic
encryption," 2017 3rd IEEE International Conference on Computer and Communications (ICCC), 2017,
pp. 2450-2453, doi: 10.1109/CompComm.2017.8322975.doi: 10.1109/NICS51282.2020.9335831.
[15]. K. M. Giannoutakis et al., "A Blockchain Solution for Enhancing Cybersecurity Defence of IoT," 2020
IEEE International Conference on Blockchain (Blockchain), 2020, pp. 490-495, doi:
10.1109/Blockchain50366.2020.00071.
[16]. H. T. T. Truong, M. Almeida, G. Karame and C. Soriente, "Towards Secure and Decentralized Sharing of
IoT Data," 2019 IEEE International Conference on Blockchain (Blockchain), 2019, pp. 176-183, doi:
10.1109/Blockchain.2019.00031.
[17]. L. Wu, X. Du, W. Wang and B. Lin, "An Out-of-band Authentication Scheme for Internet of Things
Using Blockchain Technology," 2018 International Conference on Computing, Networking and
Communications (ICNC), 2018, pp. 769-773, doi: 10.1109/ICCNC.2018.8390280.
[18]. S. Arif, M. A. Khan, S. U. Rehman, M. A. Kabir and M. Imran, "Investigating Smart Home Security: Is
Blockchain the Answer?," in IEEE Access, vol. 8, pp. 117802-117816, 2020, doi:
10.1109/ACCESS.2020.3004662.
[19]. Y. Zhang, Y. Xiao, Y. Jiang and X. Ge, "A Hierarchical Blockchain Framework for Fog Computing-
supported IoT Networks," 2020 IEEE 6th International Conference on Computer and Communications
(ICCC), 2020, pp. 946-952, doi: 10.1109/ICCC51575.2020.9345159.
[20]. J. Hu, M. Reed, M. Al-Naday and N. Thomos, "Blockchain-Aided Flow Insertion and Verification in
Software Defined Networks," 2020 Global Internet of Things Summit (GIoTS), 2020, pp. 1-6, doi:
10.1109/GIOTS49054.2020.9119638.
[21]. A. R. Mahlous and A. Ara, "The Adoption of Blockchain Technology in IoT: An Insight View," 2020 6th
Conference on Data Science and Machine Learning Applications (CDMA), 2020, pp. 100-105, doi:
10.1109/CDMA47397.2020.00023.
[22]. E. Kfoury and D. Khoury, "Securing NATted IoT Devices Using Ethereum Blockchain and Distributed
TURN Servers," 2018 10th International Conference on Advanced Infocomm Technology (ICAIT),
2018, pp. 115-121, doi: 10.1109/ICAIT.2018.8686623.
[23]. M. -H. Tsai, Y. -C. Hsu and N. -W. Lo, "An Efficient Blockchain-based Firmware Update Framework for
IoT Environment," 2020 15th Asia Joint Conference on Information Security (AsiaJCIS), 2020, pp. 121-
127, doi: 10.1109/AsiaJCIS50894.2020.00030.
[24]. A. Damianou, M. A. Khan, C. Marios Angelopoulos and V. Katos, "Threat Modelling of IoT Systems
Using Distributed Ledger Technologies and IOTA," 2021 17th International Conference on Distributed
Computing in Sensor Systems (DCOSS), 2021, pp. 404-413, doi: 10.1109/DCOSS52077.2021.00070.

AUTHOR DETAILS:
CHETAN CHAUHAN1*, AND DR. MANOJ KUMAR RAMAIYA2
1
Department of CSE, SIRT, Sage University Indore (M.P.), India
2
Institute of Advance Computing, SIRT, SAGE University Indore (M.P.), India

503
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

A STUDY OF CONSUMER BEHAVIOR TOWARDS ONLINE SHOPPING

DR. JAYASHREE MEHTA

ABSTRACT
The digital revolution has ushered in a paradigm shift in how people shop. As opposed to physical and mortar
establishments, consumers are no longer restricted by restrictions such as operating hours or certain locations.
They can buy things and services almost anywhere and at any time. This has necessitated a better
understanding of how consumers see internet purchases. The study's goal is to learn about customer awareness
and preferences for various online items, as well as the frequency of online buying and the money paid on a
single purchase, and the factors that influence buying process. The research is empirical, and the primary data
were collected via a questionnaire survey. There were 139respondentsin the sample.Understanding the
elements influencing online shopping behavior and developing marketing strategies accordingly is critical for
gaining new clients and retaining existing customers.
Keywords: Consumer Behavior, Online Shopping,Attitudes, Online buying.

1. INTRODUCTION-
Consumers utilize the online shopping platform to evaluate costs, product characteristics, and after-sales service
facilities that they will receive if they purchase a product from a specific business.Online stores are typically
available 24 hours a day, and many consumers have access to the internet at both work and home. Other places,
such as the internet café and the school, also give access. A trip to a traditional retail store necessitates travel
and must be scheduled within business hours.In any event, Indians are familiar with and enjoy the concept of
home delivery. The mall frenzy has only recently begun. It used to be an option between placing it out in small,
packed markets or requesting a friendly neighborhood Kirana (grocer) to carry groceries to your house, and this
method is still in use today.Companies also utilize
the Internet to communicate with customers, disseminate information, sell products, collect feedback, and run
customer satisfaction surveys. Customers use the Internet to not only make online purchases, but also to
compare costs, product features, and after-sales service options. Aside from the enormous potential of a E-
business industry, the Internet offers businesses a unique opportunity to reach out to existing and future clients
more effectively.The internet is altering the way people shop for and purchase products and services, and it has
quickly become a global phenomenon. This study focuses on understanding consumer preferences in terms of
goods value. In today's global environment, buyers are quite reasonable. They are hesitant to purchase higher-
value goods due to concerns about the product's quality. The primary goal of this study is to investigate and gain
insight into how product value affects online consumers when booking as well as purchasing goods and
services.It investigates how emotions, attitudes, and preferences influence purchasing decisions. Because the
internet has substantially changed customer preferences and buying patterns, consumer behavior towards online
shopping is an area of interest for both scholars and professionals.
2. REVIEW O LITERATURE
Sonal Kala (2015) performed a research study on “Behavior of Customers‟ towards Online Shopping in India”.
The main objective of the research was to investigate the relationship between various characteristics of online
shopping and customer purchase Behavior. The sample size of the research was 100 respondents (50 Male
Students and 50 Female Students) from Jaipur national university. The author had used independent sample test
tool for data analysis purpose. After the data analysis, the author concludes that Consumers have been seen to
reveal different buying Behavior’s when shopping online than, when they are shopping in a physical retail store.
There is no significant difference between the response of male and female management students of Jaipur
National University. The respondents have perceived online shopping in a positive manner.
Jarvenpaa and Todd (1997a) Proposed a model of attitude, behavior, and shopping intention towards online
shopping. The design proposed includes several indicators that is classified into four categories i.e., product
value, quality services offered, shopping experience and the risk perception of the online shopping
Chang, Cheung and Lai, in 2005, studied categories of variables, which drive online shopping activities.
During their study, they divided the features into three broad categories. The first one is the perceived
characteristics of the web sale channel which include risk, online shopping experiences, advantage, service

504
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

quality, trust. The website and product features are the second category which includes risk reduction measures,
site features, and product characteristics. And the last group is the consumer characteristics which includes
various types of features like demographic variables, consumer shopping orientations, consumer innovativeness
and psychological variables, computer and internet knowledge.
In 2008, Kim, Zhao, Yang; Laforet& Li (2005); Sabir Rahman, 2012, given that demographics variables
such as age, gender, and level of income play a very vital. Facilitating role because they influence consumer
perception and consumer behavior that drives them towards online shopping.
Jarvenpaa, Tractinsky and Vitale (2000) explore how customers professed store size and status inspire their
trust in risk perception, attitudes and willingness to purchase from the specific store. They realize that there is a
positive correlation between customer belief in internet stores and the stores supposed reputation and cope.
Higher customer belief correspondingly decreases perceived risks related to internet shopping and produces
more promising attitudes near to shopping at a specific store, which in turn raises readiness to buying from
store.
Li, H., Kou, C., and Russell, M. G. (1999), in his study found that consumers who are buying from internet
stores more frequently are more suitability oriented and less practice concerned. These customers respect
suitability throughout shopping as the most significantfactor in buying decisionssince they have time
constrained and do not notice purchasing products without touching or sensitivity
3. OBJECTIVES
 To know the factors which affect decision making process of customer while purchasing the online shopping
product.
 To examine the problems of consumer while dealing with online shopping
 To study the trust level of the consumers while shopping online.
4. RESEARCH & METHODOLOGY-
The research is based upon both primary and secondary data both. The primary data was collected through a
questionnaire and Secondary data was taken from Research papers, journals, magazines, and websites.
5. ANALYSIS & FINDINGS
Crosstabulation of Gender by Motivation to Buy Products Online-
The study reveals that 58.7% female and 41.3% male respondent buy products online as they save their time
and 24% male and 19% female respondent shop because of best offers online platform provides.

Crosstabulation of Gender By Safety of Payments-


The study reveals that 76.2% female respondent and 69.3% male respondent face issue on payments while
shopping online. So, they feel safety of payment is one of their barriers while shopping online.
{1= Strongly Agree, 2= Agree, 3= Disagree, 4= Strongly Disagree}

505
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Crosstabulation of Gender by Online Shop Easy-


The study reveals 70.7%Male and 68.3%Female respondent feels easy to compare their product from different
online shopping platforms.

Cross Tabulation of Gender by Having Trust on Online Shopping-


The study reveals that 74.6% female and 65.3% male respondent have the trust issues with theonline shopping,
because of some bad experience they might had faced.
{1= Highly Agreed, 2= Agreed, 3= Disagree, 4= Highly Disagree}

Cross Tabulation of Gender by Product Rating-


506
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The study reveals that 71.4% female and 66.7% male respondent purchase the product after checking the
ratings of the products.

6- FINDINGS
 Young people are increasingly turning to online shopping because they find it more comfortable, time-
saving.
 According to the survey, when a buyer decides to buy online items, he or she is influenced by a number of
things. The most important aspects discovered are time savings, Discounts.
 People compare costs in online retailers and then evaluate all product feedback and ratings before making a
final purchase selection and choice
7- CONCLUSION
As per the study we can conclude that saving time is the main factor that attracts most of the customer. And
many times, customers face problem of payment during online shopping which creates a barrier for customer to
shop from online platform. Through online platform, customer can also compare their prices from different
online stores. And many customers check the product rating before buying any product online.
8-RECOMMENDATIONS-
1. Online shopping sites should increase the security for online payment.
2. Measures to be taken in order to avoid delivery of wrong products to retain the trust of the customers.
3. Companies should design and develop varieties of products to attract and retain online shoppers and to
provide complete satisfaction

AUTHOR DETAILS:

DR. JAYASHREE MEHTA


Associate Professor, Shri M.D Shah Mahila College of Arts and Commerce, Malad west, Mumbai- 400064,
India

507
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

DIGITAL MARKETINGAND ITS IMPACT ON CONSUMER BUYING BEHAVIOR

MRS. SHREEYA VAIBHAV RAUT

ABSTRACT
Digital technology and marketing both are co-related and affected on society as well as human being with the
help of digital technology we achieve success in each field of life. Digital technology and marketing strategies
are expected to radically transform the competitive landscape and society Digitalization is in every field of our
lives education and schools, social networking in business as almost each company has a website and in
business processes market places, logistics and more in accounting, consequently, the current age become
‘Digital Era’ Digital technology allows making tasks faster and more accurate, that’s why its growth impacts
digital market place and continues to grow each and every year.
The firms and the markets are faced with opportunities and challenges within this digital age. The vital
objective of digital marketing is attracted customers and allowing them to interact the company’s brand
through electronic/ digital. This research paper focuses on the importance of digital marketing for both the
customers and marketers have examined the effects of digital marketing has consumer’s buying decision making
and its impact firm’s sale.
The study is so much important for every business. As businessmen we always found different ways to increase
our business. Now a days this is very easy to reach every part of world through digital marketing because it is
very creative and efficient for obtaining, sustaining, and establishing consumer relationship with the help of
online channel.
It also suggests that a fresh starting which can develop substantially through digital marketing by creating
brand, awareness, building trust and building consumer awareness. However, most of the start-up companies
hesitate implementing digital marketing strategies at the beginning of the company’s establishment. This
research paper focuses on being meaning of digital marketing issue in the business by presenting some of its
positive and negative impact on digital marketing and opportunities on marketing strategies and why it is
important going digital for companies.
With the ever-increasing development in technology, the use of Digital Marketing, Social Media Marketing,
SearchEngine Marketing is also increasing. Digital Marketing is used by the marketers to promote the goods
and services tothe marketplace. Digital Marketing place an important role in increasing the sales of goods and
services. The purposeof this research is to study the impact of Digital Marketing, how it’s an important tool for
both marketers andconsumers. We have also studied the impact of Digital Marketing and its influence on
consumer buying behavior. Thisresearch was done on base of a structured questionnaire for primary data and
the sample size is 100 respondents.
Keywords: Digital marketing, opportunities, online retail, impact, research result, Sustainable Business.

1. INTRODUCTION
Digital marketing is a type of marketing which being largely used to promote the products services to reach
mass customers by using digital channels of communication. The utilization of electronic means of media by the
marketers promoting their products or services in the marketing the main basis of Digital marketing. In this
paper we will analyze Digitalization and its impact and opportunities on marketing strategies in the business, as
we hear about digitalization in everything: education, workplace, networking and business developing. Digital
marketing is crucial for business today is because the Internet is becoming one of the most used tools. More and
more people are logging on the web to carry out their day-to-day activities, which includes purchasing goods
and services. Any business can leverage digital marketing to reach out to their target market, connect with
prospects and convert more of them into clients. Everything from search engine marketing to face book
marketing comes under digital marketing.
Digital Marketing is used for the targeted, measurable and interactive marketing of products or services using
digital technologies to reach the viewers, turn them into customers, and retain them. Communication is
bidirectional. The customer also can ask queries or make suggestions about the business products and services.
Medium of communication is mostly through social media websites, chat and Email. Here is always a fast way
to develop an online campaign and carry out changes along its development. It is then made to reach the
508
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

specific audience by employing search engine techniques. It is best for reaching global audience. It is easier to
measure the effectiveness of a campaign through analytics. In the end of the paper, we present an impact and
opportunities on marketing strategies in the business.
According to Chaffey (2013), social media marketing involves ‘encouraging customer communications on
company’s own website or through its social presence’. Social media form to distribute their messages to their
target audience without paying for the publishers or distributor that is characteristic for traditional marketing.
2. OBJECTIVES OF THE STUDY.
1. To Study the impact of Digital Marketing on Consumer buying behavior.
2. To study the awareness of Digital Marketing.
3. HYPOTHESIS OF THE STUDY.
H01: There is no significant relationship between monthly income and product preference to buy through
DigitalChannel.
H02: There is no significant relationship between Customer Satisfaction and product buy through Digital
Marketing.
4. RESEARCH METHODOLOGY.
To Study the impact of Digital Marketing on various parameters, A Structured questionnaire for collecting
primarydata. Primary data was collected from 100 respondents. Respondents are selected from Ratnagiri
District, Maharashtra. Primary data in structured format was collected via direct questioning to respondents,
which is direct through surveymethod. Sample Size for this study is 100 who are purchasing products or
services through digital channel. The datawas analyzed, and hypothesis is tested with Statistical tool like chi-
square test.
5. Digital Marketing:
Digital marketing can be described as an agile, technology-enabled framework by which companies work
together with consumers and partners to develop, connect, generate and retain value for all stakeholders
(Kannan and Li,2017).Over time the phrase “digital marketing” has developed from a particular term that
describe the marketing of goods and services using digital platform- to a genetic term that describes the method
of incorporating digital technology to attract consumers and create consumer habits, support brands, maintain
consumers and improve revenue(Finance Times,lexicon.ft.com cited in Kannan and Li,2017).
Digital marketing is the use of media devices such as mobiles phones, computers, and other devices to reach
consumers through social media, websites, search engines, applications and other methods. Digital marketing
has tremendous potential. One of the key goals of digital marketing is to identify how customers use emerging
technology and incorporate this insight for the advantage of the organization, enabling the user to communicate
more efficiently with their potential customers (S.Teixeira et al.,2018).It is also possible to boost brand value,
attract new buyers and improve sales using digital marketing. Digital marketing can be online or offline (Bala
and Verma, 2018). Digital marketing is the new era of marketing that started with the lunch of the internet 1.0 in
1990.Internet marketing is defined as the use of digital technologies to achieve marketing objectives (Chaffey,
2009). Digital media marketing is a powerful tool used by organizations and marketing managers to attract
consumers and build brands to succeed (Fulgoni and Morn, 2009)
(Chaffey & Smith, 2013) Digital marketing, electronic marketing, e-marketing, and Internet Marketing are all
similar terms which, simply put, refer to “marketing online whether via websites, online ads, opt-in emails,
interactive kiosks, interactive TV or mobiles”Giese and Gote (2013) finds that customer information
satisfaction (CIS) for digital marketing can be conceptualized as a sum of affective response of varying intensity
that follows consumption and is stimulated by focal aspects of sales activities, information systems (websites),
digital products/services, customer support, after-sales service, and company culture. According to CAM
Foundation – “Digital Marketing is a broad discipline, bringing together all forms of marketing that operates
through electronic devices- online, on mobile, on screen”.
6. RESULTS AND INTERPRETATION.
After collecting data from respondents with the help of structured questionnaire, following are the
resultsinterpreted.
6.1 Responses from Online Buyers
Several questions were asked to the respondents on their Age, Monthly Income, Occupation, etc. for
understandingtheir profile and responses. The table below is the interpreted based on the responses.
509
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table-1: Responses from Online Buyers.


Category No. of Respondents. Percentage of
Respondents
Gender Male 63 63%
Female 37 37%
Total 100 100%
Age Below 18 years 19 19%
18-30 years 27 27%
31-45 years 31 31%
Above 45 years 23 23%
Total 100 100%
Profession Employee 45 45%
Business 22 22%
Housewife 18 18%
Student 8 8%
Any other 7 7%
Total 100 100%
Monthly Income Below 10000 39 39%
10000-25000 26 26%
25000-50000 10 10%
Above 50000 25 25%
Total 100 100%
What kind of Convenience Goods 15 15%
Productyouwould
prefer to buy
throughDigital Channel
Shopping Goods 69 69%
Specialty Goods 16 16%
Total 100 100%
Customer satisfaction Strongly Agree 39 39%
inPurchase through
DigitalChannel
Agree 53 53%
Neutral 6 6%
Disagree 1 1%
Strongly Disagree 1 1%
Total 100 100%
6.2 Chi Square Test: Relationship between monthly income and product preference to buy through
DigitalChannel.
To Study the Relationship between monthly income and product preference to buy through Digital Channel,
theclubbed table is as follow
Table 2: Relationship between monthly income and product preference to buy through digital channel.
Convenience Goods Shopping Goods Specialty Goods Total
Below 10000 6 28 3 37
10000-25000 5 17 3 25
25000-50000 3 3 4 10
Above 50000 1 21 6 28
Total 15 69 16 100
The data can be easily interpreted from the above table 2. Hypothesis testing is done to be more précised.
H01: There is no significant relationship between monthly income and product preference to buy through
digitalchannel.

510
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

According to the calculation, calculated chi-square statistic is 15.2929. The p-value is .018097. The result
issignificant at p < .05, with 0.05 level of Significance.
Hence the null hypothesis is rejected and there is a significant relationship between monthly income and
productpreference to buy through digital channel.
6.3. Chi Square Test: Relationship between Customer Satisfaction and product buythrough Digital
Marketing
To study the relationship between Customer Satisfaction and product buy through Digital Marketing, the
clubbedtable is as follow.
Table 3: Relationship between Customer Satisfaction and product buy through Digital Marketing.
StronglyAgree Agree Neutral Disagree Strongly Disagree Total
Social Media 10 11 0 0 0 21
Websites 21 30 0 0 0 51
Emails 3 3 2 0 0 8
Advertising 4 7 3 1 0 15
Others 1 2 1 0 1 5
Total 39 53 6 1 1 100
The data can be easily interpreted from the above table 3. Hypothesis testing is done to be more précised.
H02: There is no significant relationship between Customer Satisfaction and product buy through Digital
Marketing.
According to the calculation, calculated chi-square statistic is 41.459. The p-value is .000475. The result is
significant at p < .05, with 0.05 level of Significance.
According to above analysis, Null hypothesis is rejected. In other words, there is significant relation
betweencustomer satisfaction and buying the products through Digital channel.
7. Other Opportunities:
Digitalization provides customers with instant gratification. Everything is a single click away. Digital age is
here, and it is here to stay. Digitalization has spoiled the customers. Everything is available on touch of a button.
The ease and speed of things has tremendously increased. Social media has penetrated in the lives of people
such that they wake up, sleep, talk, walk, study, each also play only with their devices. The longer processes and
tiresome delays have been eliminated with the help of digital marketing processes and customers can now avail
higher degree of customization and have access to wide varieties and easy comparison. Digitalization has not
only saved customers’ precious time but also saved a lot of cost. Processes have become simpler, all you need to
do is pay online or on delivery and the products are delivered on your doorstep. Digitalization has made reduced
travel costs and other related costs, cheaper production possible by the company hence reduced prices,
elimination of mental and physical stress, access to more variety and large number of dealers, easy comparison
is possible, availability simplified processes and high degree of personalization is possible.
8. SUGGESTIONS:
Digital market in India is apparent that the Digitization is occurring with a fast manner. Web-based business site
is giving every one of the products and ventures through online entrances online today. The expanding number
of internet business sites. Numerous sponsors will build their advertising spending to goal request, helped by the
support gave by low product costs, which have decreased their info costs. Accordingly, all reports and studies
led far and wide are demonstrating that the digital marketing will develop more in coming years. Cell phones
are relied upon to stretch around 3 billion units around the world. So as more individuals utilize cell phones,
tablets and other cell phones, the capability of the portable market keeps on developing. ARC survey
demonstrates that 35% of sponsors would build their mobile advertising spend by half or more by 2020 in India.
Digital impact and electronic channels in marketing have become an essential part of strategy of many
companies. Companies and organizations should put more efforts to create innovation and novel customer
experiences and unique strategies for media to identify and catch up the best path for driving up and
establishing digital marketing performance
9. CONCLUSIONS
With the Research conducted, it has been found that there is a relationship between monthly income and the
products purchased by them. Monthly Income of people plays an important role to buy different products

511
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

through Digital Channel. It has also been found that there is a significance difference between the satisfaction
level of customer withpurchasing products online. Most of the Customers are satisfied with the products
purchased through Digital channel. A company can do lot more through Digital Marketing if they understand
and delivers what consumer needs.
10. REFERENCES
1. www.Shodh ganga.com
2. www.Wikipedia.org
3. www.Google.com.in
4. Bala, M. and Verma, D., 2018.A Critical Review of Digital Marketing. International Journal of
Management, IT & Engineering, 8(10), pp.321-339.
5. Chaffey, D. (2013). E-business & e-commerce management. Pearson Education.
6. Digital marketing strategy advice-Smart insights Digital Marketing.
7. Kotler, p., (2002). A framework for marketing management, A person Education Company, New Jersey,
Tenth Edition.
8. Daniel, Anand (June 10, 2015). Rise of Indian marketplaces, and what the future
hold.yourstory.com/2015/06/rise-Indian-marketplaces.
9. Murthy, Srinivasan (Jan.06, 2016). Always keep your customers close and your loyalist closer. Articles.
Economic times. India times.com>collections >digital marketing.
10. Chaffey, D., & Smith, P. (2013). E-marketing Excellence: planning and optimizing your digital marketing.
Rout ledge.
11. Kang, J.; Majer, M.; Kim, H.-J. Empirical Study of Omnichannel Purchasing Pattern with Real Customer
Datafrom Health and Lifestyle Company. Sustainability 2019, 11,7185
12. Reyes-Menendez, A.; Saura, J.R.; Filipe, F. The importance of behavioral data to identify online fake
reviewsfor tourism businesses: A systematic review. Peer J. Comput. Sci. 2019, 2019 5, e219.

AUTHOR DETAILS:

MRS. SHREEYA VAIBHAV RAUT


Shri Anandrao Pawar Mahavidyalaya, Khend-Kangnewadi, Chiplun, Dist-Ratnagiri-415605

512
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

NETWORK RANSOMWARE DETECTION BY GROUP SEARCH OPTIMIZATION AND MACHINE


LEARNING TECHNIQUES

SHWETA SHRIVASTAVA AND DR. S. VEENADHARI

ABSTRACT
Attacks on network is serious issue that needs to be detected before it makes any affect. Many of attack
detection models were developed to generate alarm that warns about the malicious activity. This paper has
proposed a ransomware detection model models that trigger the system when it detect the suspicious activity in
the network as per trained pattern. Training vector was optimized by the use of Group Search Optimization
algorithm. Scrounging and ranging feature of algorithm has improved the feature selection quality of work.
Training error back propagation neural network was done by selected features. Experiment was done on real
ransomeware dataset and implementation of model was done on MATLAB software. Result shows that proposed
model has improved the evaluation parameter values of precision, recall, f-measure, accuracy at different
testing dataset sizes

INTRODUCTION
Malware is a constantly evolving and rising threat, especially ransomware, a form of malware. The rise of
ransomware as a service platform adds to this surge, and malware researchers need options to swiftly and
reliably identify a family of ransomware to protect the data of individuals and vital infrastructures. The concept
of malware detection mainly deals with analyzing executable files to establish malicious intent. Since the advent
of anti-malware software,. Many researchers have seen a rise in sophisticated malware which are specifically
designed to circumvent this software. This in turn has spearheaded research into more advanced detection
techniques. Malware analysis or malware detection can be performed in two ways: statically, and dynamically.
Static Malware Detection: Static malware detection is the process of analyzing a binary file without executing
it. This can involve disseminating the file entirely and examining every component, using a disassembler to
reverse engineer it, or converting it into assembly code to examine its flow [1]. It can also extend to the original
source code of the software if available [2]. This is usually the first line of defense against malware used by all
anti-malware software.
Dynamic Malware Detection: Dynamic malware detection uses behaviour analysis while a malware is running
to determine malicious intent. Usually, this is done in a sandbox environment to ensure that the executable does
not cause any harm to the target system. This form of analysis is usually resource intensive and can be
circumvented in various ways. Debuggers can also be used to analyze system calls or other behavioral patterns
which cannot otherwise be detected using black box testing [3].
As the malware nowadays can with ease bypass this outdated method, new solutions based on structure and
behavior has to be adopted. This is where machine learning can be useful. With an almost infinite supply of
malware, features can be selected in order to extract important behavior characteristics and train a classifier.
Various machine learning methods has been proposed over the years, most commonly using deep learning and
supervised learning. Common deep learning methods usually use Convolution Neural Networks or Artificial
Neural Networks. While these can be effective, they take a long time to train and require large datasets to do so.
An alternative is to use Supervised Learning with classifiers such as Support Vector Machine, Random Forest
or Gradient Boosting. These algorithms are faster to train, and therefore a lot of different solutions can be tested
to see which performs the best. There is no right or wrong when selecting a classifier[13], different methods
will perform different depending on the approach and features.
Ii. Related Work
Ganapathi et. al. in [7] argue that different families have functional similarities that can be found in decompiled
code, making it possible, in principal, to detect them based on the similar features across a family. Algorithms
can be taught to recognize the similarities when binaries of malware are converted into images, and we predict
this can be done with ransomware, given that it is a type of malware and that families of ransomware also have
similarities in code.
Herrera Silva, Barona López [8] who explored the situational awareness parameters related to ransomware
attacks. The authors mapped situational awareness for ransomware into five phases, namely perception,

513
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

comprehension, projection, decision, and action. Based on these phases, the proposed ransomware detection
solutions were evaluated.
Sgandurra et al. [9] proposed the notion of training machine learning (ML) algorithms for preliminary
identification tasks utilising user information acquired over the early stages of ransomware’s execution period.
Their approach uses a fixed time as a threshold by which all ransomware instances in the training dataset are
executed for a short amount of time. The threshold was set to 30 s for all crypto ransomware samples. Then, the
collected data is used to train a logistic regression classifier.
Homayoun, Dehghantanha [10] decreased the threshold down to 10 s for all crypto ransomware samples. Then,
a pattern mining technique was proposed to extract the features by which the detection model was built using
several ML techniques including Decision Tree and Bagging.
Firoz et. Al in [11] proposed DNAact-Ran, A Digital DNA Sequencing Engine for Ransomware Detection
Using Machine Learning. DNAact-Ran utilises Digital DNA sequencing design constraints and k-mer
frequency vector. DNAact-Ran first selects key features from the pre-processed data using Multi-Objective
Grey Wolf Optimization (MOGWO) and Binary Cuckoo Search (BCS) algorithms. Thereafter the digital DNA
sequence is generated for the selected features using the design constraints of DNA sequence and k-mer
frequency vector.
Moser et al. [12], explored the drawbacks of static analysis methodology. In their work, they introduced a
scheme based on code obfuscation revealing the fact that the static analysis alone is not enough to detect or
classify malware. Further, they proposed that dynamic analysis is a necessary complement to static analysis as it
is less vulnerable to code obfuscation conversion.
Alhawi et al. [13] have done an analysis of network traffic for windows ransomware. They focused on a
conversational-based analysis and used J48, Decision tree classifier to calculate detection accuracy.
Subash et al. [14] developed a reverse engineering framework incorporating feature generation engines and
machine learning (ML) to efficiently detect ransomware. The Experimental results show the detection accuracy
of ransomware samples which varied from 76 percent to 97 percent based on the ML technique used.
Shaukat et al. [15] presented a layered defense system based on analysis of an extensive dataset of Ransomware
families. It combined several layers include static and dynamic analysis layers to generate a novel compact set
of features, a strong trap layer in early detection, machine learning for unearthing zero-day intrusions, and a file
backup layer for encrypted files backup.
Proposed Model
Explanation of proposed Group Search Ransomware Detection Model (GSRDM) was done in this section by
use of graph shown in fig. 1. Various notations were used in the model were detailed in table 1. Whole model
has three module first is data processing, second is machine leaning and third is testing of trained model.
Data Processing
In this module of work input dataset DRan is processed to get correct set of features that has high impact on
learning and detection. For feature filtration two approaches were used first is cleaning where some of column
were manually identify and removed. Other technique is Group Search optimization genetic algorithm.
Cleaning: Some of data artributes that were used for row identification like unique number were removed,
Apart form this some text based content were also not include in the training model hence such features were
directly removed at very initial stage. Further each row specify the class of session either normal of attack, that
is separate from the data for next step as class is not feature but actually used to compared the predictions.
Group Search Optimization
In this step of the module cleaned dataset features obtained were used for the feature selection. As features Fs
used for the training with different combination train the model and has its own impact. So finding all set of
feature combination and train each is time taken process. So this work adopt group search genetic algorithm that
gives suitable feature set. Group search finds the food to eat where searching member is at any of three state
first is producer, second is scrounging and third is ranging. In this work food source is set of binary vectors
where 1 represents the feature selection and 0 represents the feature absence. In whole process of Forgaing
(Searhcing of food to eat) objective is to finds the good food source. So to clear more about the terms used in
the algorithm and its relation with our work:

514
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Food Source: Single dimension vector having elements with two state either 1 or 0. If any element state is
change then this new vector is separate food source.
Member: It’s a chromosome position in the population that points a food source. A member can point different
food source at different iteration of algorithm.
Group Member
Collection of such members is group member. Hence in this algorithm population is group and elements present
in group is member. Out of various food sources available some random sources were point by the member.
Representation of this population is shown in eq. 1.
GMGaussian_Feature_Set (m, f,)
Where in Eq. 1 m is number of member in the population/group, f is number of features. In order to generate
random food source point Gaussian function was used.
Producing
Evaluation of various food point identify by the members was done in this step of the model. In terms of genetic
algorithm this step is fitness evaluation function. Producer selection is done in this step as per fitness values.
Algorithm 1 gives the fitness value of different members.

Fig. 1: Training of ransomware detection model.

515
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Algorithm 1:
Input: CD, T, GM// Cleaned Dataset, Target Output
Output: FV // Fitness Value
1. Loop 1:m
2. Loop 1:f
3. SSelected_Feature(CD) // S: Selected Feature
4. EndLoop
5. TNTrain(S,T)
6. FV[m]Test(TN, S)
7. EndLoop
Member having highest FV value is consider as producer in the current iteration.
Scrounging (Crossover) Scroungers
Producer finds the good food points and other member in the p group is considers as the scroungers. All
scroungers join the food source search by the producer. So producer stop searching the food source in this
iteration and other members change their food pint as per producer. This change is termed as crossover
operation in the group. To understand this let P is producer, M m is mth member in population then change occur
at random feature position as per producer feature state.
M’m[1 r] Mm[1 r] + P[1,r]
New food point obtained from the crossover operation. Where r is random position value range from 1 to f. One
more step is to check that new food point is better food source or not. For this evaluate its fitness value as done
in algorithm 1.Better food source were point by the member.
Ranging (Mutation) Rangers
Each group member except producer participate in this step f algorithm. As ranger will find new food point as
by there random behavior hence producer not help them. Member modify the state of the feature at some
random position either 1 to 0 or from 0 to 1. This change of state gives new food location in the search space to
the members. Flip operation were perform in the step of algorithm.
M’m[1 r] Flip (Mm[1 r])
New member food search point need to check as done in scrounging phase. Food point having better fitness
value obtained from algorithm 1 is consider as the final member food point in current iteration.
After sufficient number of iterations algorithm stops to get the feature set that has good feature values.
Machine Learning
Features were filter as per the producer food vector and same were used to train the mathematical model. This
work has train the Error back propagation neural network. It was obtained that use of sigmoid function in
training of error back propagation network gives better result as compared to step, softmax functions.
Proposed Algorithm
Input RD, T// RD: Raw Dataset, T: Target Output
Output: TEBPNN
1. CDCleaning(RD)
2. GMGaussian_Feature_Set(m, f,)
3. Loop 1:t
4. FVProducing(GM, CD, T)
5. PBest(FV)
6. Loop 1:m
7. M’m[1 r] Mm[1 r] + P[1,r]
8. Endloop
516
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

9. FV’ Producing(GM’, CD, T)


10. GMUpdate_Group_Member(FV’, FV)
11. Loop 1:m
12. M’m[1 r] Flip (Mm[1 r])
13. Endloop
14. FV’ Producing(GM’, CD, T)
15. GMUpdate_Group_Member(FV’, FV)
16. EndLoop
17. PBest(FV)
18. FDFilter(CD, P)
19. TEBPNNInitialize(f, T)
20. TEBPNNTrain (TEBPNN, FD, T)
Testing of Trained Model
Input testing dataset was processed as done in cleaning step. While features filtration was done by obtained
producer from Group search optimization algorithm during training. Filtered testing dataset was pass in the
trained TEBPNN. TEBPNN predicts session class of the input filter dataset.
Experiment and Results
Implementation of this model is done on MATLAB 2016 version. Experiment was perform on machine having
i3 6th generation processor with an 4GB RAM. In order to do comparison DNAact-Ran model was implement
and perform experiment under same environment. Ransomware dataset was taken from [11], having session.
Evaluation Parameters
To test our results, this work uses the following measures Precision, Recall, and F-score. These parameters are
dependent on the TP (True Positive), TN True Negative), FP (False Positive), and FN (False Negative).
Precision = TP / (TP+ FP)
Recall = TP / (TP + TN)
F-measure = 2 * Precision * Recall / (Precision + Recall)
Accuracy = (TP+TN)/(TP+TN+FP+FN)
Where
TP: True Positive
TN: True Negative
FP: False Positive
FN: False Negative
RESULTS
Table 1: Precision value of ransomware detection models.
Dataset% DNAact-Ran GSNNRD Improvement %
30 0.8432 0.9739 13.07
40 0.8307 0.9626 13.19
60 0.8162 0.9467 13.05
70 0.8162 0.9467 13.05
80 0.8162 0.9467 13.05
90 0.8162 0.9467 13.05

517
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig.2: Precision value based comparison of ransomware detection models.


Table 1 and fig. 2 shows precision values of ransomware detection models. It was obtained form the table 1 that
proposed model has increased the precision value by 13.7% as compared to previous existing method DNAact-
RN.
Table 2: Recall values of ransomware detection models.
Dataset DNAact-Ran GSNNRD Improvement %
30 1 1 0
40 1 1 0
60 0.7319 0.7308 -0.11
70 0.6325 0.6326 0.01
80 0.5562 0.5657 0.95
90 0.5 0.5121 1.21

Fig.3: Average recall value based comparison of ransomware detection models.


Ransomware detection models recall values shown in table 2 and fig. 3. It was obtained use of group search
based feature selection has improved the work efficiency. Table shows that GSNNRD has increased the recall
values by 0.46% as compared to existing model proposed in [11]. Training of linear regression model by
selected features obtained from hybrid model [11], has decrease the work efficiency.

518
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table 3: F-measure values of ransomware detection models.


Dataset DNAact- GSNNRD Improvement
Ran %
30 0.9149 0.9868 7.19
40 0.9075 0.9809 7.34
60 0.7717 0.8249 5.32
70 0.7127 0.7584 4.57
80 0.6616 0.7082 4.66
90 0.6201 0.6647 4.46

Fig.4: Average F-measure value based comparison of ransomware detection models.


Inverse average of precision and recall values is f-measure term. Table 3 and fig. 4 shows that proposed
GSNNRD has increased the detection f-measure value by 6.81%. Use of genetic algorithm was done in both
work, but group search algorithm based feature selection has increased the work performance.
Table 4: Accuracy values of ransomware detection models.
Dataset DNAact- GSNNRD Improvement
Ran %
30 0.8432 0.9739 13.07
40 0.8307 0.9626 13.19
60 0 .6659 0.7218 5.59
70 0.6096 0.6422 3.26
80 0.5665 0.595 2.85
90 0.5385 0.5591 2.06

Fig. 5: Accuracy value based comparison of ransomware detection models.


Table 4 and fig. 5 shows accuracy values of ransomware detection models. It was obtained from the table 4 that
proposed model has increased the precision value by 8.71% as compared to previous existing methods.
519
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

CONCLUSIONS
Communication network importance in human life increase as many of work and services are dependent on
networking devices. Security of such important factor depends on manual check and software that can monitor
to identify suspicious activities. This paper has developed a model that can detect ransom in the network by
identifying its pattern from the network. Error back propagation neural network was used to learn the pattern of
sessions. In order to increase the accuracy feature set were optimized by group search optimization algorithm.
Experiment was done on real dataset at different dataset size. Result shows that proposed model has improved
the precision value by 13.7%, recall by 0.46 and accuracy by 8.71%, as compared to DNAact-RN model
proposed in [11]. In future researcher can apply model on different dataset.
REFERENCES
1. M. Sikorski and A. Honig. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious
Software. No Starch Press, 2012.
2. Manuel Egele, Theodoor Scholte, Engin Kirda, and Christopher Kruegel. A survey on automated
dynamic malware-analysis techniques and tools. ACM computing surveys (CSUR), 44(2):6, 2012.
3. Dilshan Keragala. Detecting malware and sandbox evasion techniques. SANS Institute InfoSec Reading
Room, 16, 2016.
4. D. Amancio, C. Comin, D. Casanova, G. Travieso, O. Bruno, F. Rodrigues, and L. da F. Costa, “A
systematic comparison of supervised classifiers,” PloS one, vol. 9, p. e94137, 04 2014.
5. Deepak Chouhan, Prof.Lokesh Parashar. A Review of DDoS Attacking Methods". Ijsret.com volume 6
issue 5 2020.
6. Vishakha Samaria, Prof. Dr. Mir Aadil. "A Hybrid Approach Based Advanced Key Logger". IJSET.in
volume 10 issue 2, 2022.
7. Ganapathi, P., Shanmugapriya, D. (Eds.), 2020. Handbook of Research on Machine and Deep Learning
Applications for Cyber Security:, Advances in Information Security, Privacy, and Ethics. IGI Global.
8. Herrera Silva, J.A.; Barona López, L.I.; Valdivieso Caraguay, Á.L.; Hernández-Álvarez, M. A survey on
situational awareness of ransomware attacks—detection and prevention parameters. Remote Sens. 2019,
11, 1168.
9. Taylor, M. Ransomware Detection Using Machine Learning and Physical Sensor Data. Master’s Thesis,
Southern Methodist University, Ann Arbor, MI, USA, 2017.
10. 40. Homayoun, S.; Dehghantanha, A.; Ahmadzadeh, M.; Hashemi, S.; Khayami, R. Know Abnormal,
Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence. IEEE Trans.
Emerg. Top. Comput. 2017, 8, 341–351.
11. Firoz Khan, Cornelius Ncube, R.Lakshmana Kumar, Seifedine Kadry, Yunyoung Nam. "A Digital DNA
Sequencing Engine for Ransomware Detection Using Machine Learning". IEEE Access.
12. A. Arora, S. K. Peddoju, and M. Conti, “Permpair: Android malware detection using permission pairs,”
IEEE Transactions on Information Forensics and Security, 2019.
13. O. M. Alhawi, J. Baldwin, and A. Dehghantanha, ‘‘Leveraging machine learning techniques for windows
ransomware network traffic detection,’’ in Cyber Threat Intelligence (Advances in information Security).
Springer, 2018, pp. 93–106.
14. S. Poudyal, K. P. Subedi, and D. Dasgupta, ‘‘A framework for analyzing ransomware using machine
learning,’’ in Proc. IEEE Symp. Ser. Comput. Intell. (SSCI), Nov. 2018, pp. 1692–1699.
15. [12] S. K. Shaukat and V. J. Ribeiro, ‘‘RansomWall: A layered defense system against cryptographic
ransomware attacks using machine learning,’’ in Proc. 10th Int. Conf. Commun. Syst. Netw.
(COMSNETS), Jan. 2018, pp. 356–363

AUTHOR DETAILS:
1
SHWETA SHRIVASTAVA AND 2DR. S. VEENADHARI
1
PhD Scholar and 2Professor, Department of Computer Science Engineering, Rabindranath Tagore University,
M.P, India

520
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

ADOPTION OF ECOLOGICAL MARKETING: AN EMPIRICAL STUDY

DR. V N BAJPAI, DR. SATISH KUMAR AND DR. ASHISH KUMAR JHA

ABSTRACT
21st century witnessed the vital concern of Governments, Organizations and Society at large for the
environment. Many leading organizations around the globe have redefined their strategic intent indicating
genuine commitment in making this planet a better place to live. Environment Friendly products and Ecological
marketing have become the new buzz word for the world to address this concern. This has quiet visible impact
on both consumers and manufacturers with respect to their attention toward environment friendly products that
are presumed to be “Ecological marketing” or environment friendly. The products under this notion range from
energy efficient (low power consuming), electrical appliances, organic foods, recyclable paper, re-usable jars
and bottles, and discouraging single use plastic. The term Ecological marketing came in to prominence in late
1980’s and early 1990’s. The present study is undertaken to highlight the major stakeholders' apprehension
related to the Ecological marketing issues. The study is exploratory and descriptive in nature, which is based on
primary data collected through surveying the consumers of NCR including Noida, Ghaziabad, Greater Noida
& Gurgaon.
The paper lays down the conceptual framework followed by categorization of customers based on their level of
eco friendliness. The paper covers the impact of demographic variables on perception. It also covers level
consumer awareness, source of awareness, preference and level of satisfaction. The study also explores the
influence of select demographic variables on the perception of the eco friendly products. The findings reported
will be helpful to the organizations in creating, delivering and capturing better value in long run.

INTRODUCTION
Environment Friendly products are the products which are eco-friendly and relatively less harmful for the
environment.The other aspect says, the products which save the energy are known as Environment Friendly
products. The marketing activities to promote these products is said to be Ecological marketing.
Recent past has witnessed the growing concern and positive attitude of consumers and manufacturers for the
products which create less pollution thus are relatively less harmful for the environment. “The nature has given
enough for all of us to fulfill our need but not our Greed” is a famous saying. The irresponsible use of scare
resources has created an alarming situation where organizations have to redraft Marketing mix elements with
the focus on not only fixing up accountability towards preserving natural resources but also taking innovative
ways of creating, communicating, delivering and capturing customer value, as a sustainable business
model.This becomes more relevant when entire world is discussing about global warming, ozone depletion,
erosion of natural resources and quest for safety and healthy consumables.
Now days, more and more customers are becoming not only environmentally conscious but also
environmentally responsible. According to a study by Unilever, one third of consumers (33%) prefer to buy
from brands with positive social and environmental impact. The study highlights two reasons for consumers’
greater focus on sustainable purchasing in emerging economies like India compared to developed nations, one
being the direct exposure to the negative impact of unsustainable business practices, such a water shortage, food
poverty, poor air quality and second being the power of social norms such as pressure from family, friends, peer
group and even children.
This has created a plethora of opportunities for the organizations that make their sustainability credentials clear.
This new domain is called Ecological marketing.
The other dimension of Ecological marketing involves the effective utilization of resources in a way that the
utilization itself contributes to preservation and regeneration of resources leading to our planet, a better place
where future generations will not be deprived of the benefits enjoyed by the present generation in terms of
natural resources.
Companies following Ecological marketing approach sincerely embrace sustainability principles at its core and
communicate with their stakeholders about the ecological and social impact of their products and services with
transparency, truthfulness. They redefine the traditional 4Ps to make it compatible with their core.

521
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

REDEFINED 4PS OF ECOLOGICAL MARKETING;-


Product: - Rightly said that a Product is a bundle of benefits. It is one of the prime element for oragnisations to
create value. Innovative product ideas deal with pleasure and pain of customer. Environment Friendly products
are developed keeping in mind their environmental impact which serve twin purposes as to decrease pollution
and increase conservation of scare resources .The major features which are to be associated with Environment
Friendly products may include-
 Products that can be recycled or reused.
 Products with environment friendly packaging material (Eg: Biodegradable packaging, Corrugated Bubble
wrap, Air Pillow made up of Recycled material, Recycled cardboard and Paper etc.)
 Efficient products, which save water, energy or gasoline, save money and reduce environmental impact.
Price: - Price is among the most critical factors that determine the value of Ecological marketing product.
Organisations must be conscious enough to offer enhanced value to the customers as they are paying additional
price for Ecological product.
 The price value may be improved performance, function, design, visual appeal or taste.
 The introductory price of Ecological product should be less. For many products Government provide
subsidies to compensate cost to the company.
Promotion:-Promoting products and services to target markets includes paid advertising, public relations, sales
promotions, direct marketing and on-site promotions. Smart Ecological marketers will be able to reinforce
environmental credibility by using sustainable marketing and communications tools and practices.Ecological
promotion involves configuring . British petroleum (BP) displays gas station which its sunflower motif and
boasts of putting money into solar power. Indian Tobacco Company has introduced environmental-friendly
papers and boards, which are free of elemental chlorine. Toyota is trying to push gas/electric hybrid technology
into much of its product line.
Place:- This decision is very important that where and when to make a product available so that it will have a
significant impact on consumer.Ecological place is about managing logistics to cut down on transportation
emissions, thereby in effect aiming at reducing the carbon footprint. For example, instead of marketing an
imported mango juice in India it can be licensed for local production. This avoids shipping of the product from
far away, thus reducing shipping cost and more importantly, the consequent carbon emission by the ships and
other modes of transport.
REVIEW OF LITERATURE
Fitchett and Prothero (1999) in their study consider the potential for utilizing the commodity form to further the
Ecological marketing project. It is proposed that rather than considering the capitalist project in opposition to
ecological concerns, the commodity form offer the potential to encourage environmentally responsible behavior
in both consumers and organization. It is argued that the problem is not the commodity itself, but the
contemporary organization and structure of commodity relations. The mainstream Ecological commodity can
be achieved via the utilization and not the rejection of the commodity form. The authors suggest that this
approach would enable organizations to move towards developing eccentric strategies.
Peattie (1999) suggest that an alternative to conventional market segmentation should be developed in order to
understand the Ecological purchasingbehavior and it should focus on the purchase rather than the purchaser.
The author has developed a framework to segment consumers based on the perceptions regarding Ecological
purchase. A matrix is developed based on the degree of compromise and degree of confidence. The purchases
Ginsberg and Bloom (2004) propose that the companies handling the dilemmas associated with Ecological
marketing should always keep in mind that the consumers are unlikely to compromise on traditional product
attributes such as convenience, availability, price, quality and performance. The authors suggest the Ecological
marketing strategy matrix for different market and competitive conditions ranging from the relatively passive
and silent "lean Ecological " approach to the more aggressive and visible "extreme Ecological " approach with
"defensive Ecological " and "shaded Ecological " in between.
Many issues have been identified by researchers with respect to Ecological marketing (Welling and Chavan,
2010). Practicing Ecological marketing initially may prove to be a costly affair as it encourages Environment
Friendly products/services, Ecological technology, energy efficient machines, Ecological power/energy which

522
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

requires huge investment on R&D activities. High investment is requiredin marketing promotions to create
awareness regarding Environment Friendly products and their uses. Many customers may not be willing to pay
a premium for Environment Friendly products which may affect the sales of the company. Eco-labeling could
be a way to convince the customers regarding Environment Friendly products. For additional value/ benefit,
consumers might be ready to pay higher price (such as quality, environmentally safe product, fuel-efficient
vehicles, and non-hazardous products) attached with the product. Ecological marketing can help organizations
to gain a competitive advantage and a strong consumer base. (Renfro L A, 2010).According to Joel Makower
(citedbyShafaat& Sultan, 2012), challenges faced by Ecological marketer also include the lack of standards and
common consensus among the public about what actually constitutes “Ecological ”.Despite these challenges,
Ecological marketing continuesto gain popularity, particularly in light of growing global concern about climate
change. Companies are coming forward to showcase their commitments to reduce adverse climate impacts of
their products and services.
RESEARCH OBJECTIVES:
 To find out if Environment Friendly products are really environmental friendly.
 To find out consumer’s preferences of Environment Friendly products over other products.
 To find out if shopping habits of consumers have a favorable/adverse environmental impact.
 To find out the factor which affect customer in purchasing Environment Friendly products.
 To understand companies initiatives to go Ecological is myth or reality.
RESEARCH METHODOLOGY
Type of research Descriptive & Exploratory
Sampling Simple Random sampling
Sample Area Rural, Semi urban & Urban part of NCR, Delhi
Sampling Unit College students, malls visitors, rural people
Sample Size 358
Data Type Primary & Secondary
Data collection Method Survey, discussion with retailers
Data collection tool Questionnaire/ Schedule (Likert Scale)
The demographic segmentation of respondent are summarized in table 1.The questionnaire is divided into two
parts.The first part covers the information of demographic variables of respondents ( area , gender , age .
education . occupation & income ) and the second part covers the question to obtain data required for
measuring the various other components.
ANALYSIS & RESULTS:
DEMOGRAPHIC PROFILE OF RESPONDENT
Demographic variables of respondents Percentage (%)
Gender Male 74
Female 26
Age Age group
20-30 39
30-40 32
40-50 20
Above 50 08
Education Post graduate 35
Graduate 43

523
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Intermediate 12
Others 10
Occupation Service 50
Self employed 31
Agriculture 08
Student 11

Income (per month in Rs) Income group


NILL 10
10000-20000 47
20000-30000 31
30000 above 12

KMO and Bartlett's Test


Kaiser-Meyer-Olkin Measure of Sampling Adequacy. .536
Bartlett's Test of Approx. Chi-Square 658.572
Sphericity
Df 91
Sig. .000

Value of Kmo Is 0.536 That Means Data is Reliable.


Component Matrix (A)
Component
1 2 3 4 5 6
Government runs
sufficient awareness
programs about .677 -.035 -.341 .209 .149 -.026
Environment Friendly
products.
Social media has larger
impact on me for the use
.575 .218 -.044 .405 .327 .070
of Environment Friendly
products.
Environment Friendly
products are easily .544 .345 -.092 -.490 -.091 -.181
available everywhere.
Advertisement
encourages me to buy
.517 -.047 -.186 -.405 .136 .195
Environment Friendly
products.
I use it due to
Government -.087 .633 .265 .089 .196 .348
compliance.
Environment Friendly
products are costlier .221 -.571 .255 -.230 .289 .264
than other products.
Environment Friendly
products are less .353 .516 .345 .021 -.291 -.328
harmful.
524
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Environment Friendly
products creates less .416 -.498 .030 -.212 .123 -.069
pollution.
Environment Friendly
products creates less .121 .125 .679 .006 .466 .158
noise pollution.
Environment Friendly
products are .318 -.041 .190 .500 .028 -.153
environment friendly.
I will purchase
Environment Friendly
products even if it is .429 -.381 .075 .434 -.253 -.166
costlier by 25% than
other products.
The life of Environment
Friendly products are .455 .091 .368 -.302 -.501 .161
longer
Environment Friendly
products are safer to .059 .397 -.428 -.157 .434 -.283
use.
Performance of
Environment Friendly
.200 .189 -.407 .208 -.296 .680
products is better than
other.
Extraction Method: Principal Component Analysis. 6 components extracted.
Analysis of Above Matrix
First component consist variables Government runs sufficient program, Impact of social media, Availability,
Advertisement. Out of these variables governments program is most effective and advertisement is least
effective.
Second component consist the following variable; compliance of Govt. costlier, less harmful, less pollution.
Out of these variable compliance of Govt. is most effective and less pollution is least effective.
Third component consist only one variable that is Environment Friendly products creates less noise pollution.
Fourth component consist the following variables environment friendly and 25% more costlier.
Fifth component consist the following variable; longer life and more safety.
Sixth component consist only one variable that is performance of Environment Friendly products.
Hypothesis Testing:
Paired-Samples T Test
When the data are structured in such a way that there are two observations on the same individual or
observations that are matched by another variable on two individuals (twins, for example), the samples are
paired.
(i) First paired sample T test between Environment Friendly products are easily available everywhere and
advertisement encourages to buy Ecological product. Result is given below.

525
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table shows that through advertisement awareness can be spread that can be supported by the increased
availability of the Environment Friendly products and this when we put togetherwill increase the sales of
Environment Friendly products .
(ii) Second paired sample T test between Environment Friendly products are costlier over other products and
consumer will purchase even if it is costlier by 25 %. Result is given below

Table shows that consumer will purchase Environment Friendly products even these are costlier by 25 %
because people think that these products are eco friendly and less harm full.
(iii) Third paired sample T test between Environment Friendly products are less harmful and Ecological
product are environment friendly Result is given below

Table shows that Environment Friendly products are eco-friendly that’s why they are less harmful for the
society.
Table 3:- Ranking of the factors that affect customers purchase decisions.
Rank 1st Rank 2nd Rank 3rd Rank 4th
Price 92 194 50 22
Durability 74 101 155 28
Availability 34 97 59 168
Eco –friendliness 291 32 17 18
Major Findings and Observations:
1. It has been observed that the more, people believe that the efforts of an individual can make a difference in
the solution to environmental problems, the greater their will be likelihood of buying Ecological .
2. One’s level of environmental concern is linked to interest in and willingness to purchase Environment
Friendly products and considering safety to the environment more strongly when making a purchase.
3. People are ready to purchase Environment Friendly products even if they are costlier by 25%. This shows
the concern of Indian people for the environment and their readiness to contribute their bit for this.
4. The major factors that affect people to go for Environment Friendly products are eco-friendliness, price and
their availability.
5. Study also shows that Environment Friendly products are really safe and less harmful.
Government Role:-Government undertakes many initiatives and awareness programmes to protect the interest
of consumer, this protection has significant Ecological marketing implications. Governmental regulations
relating to environmental marketing are designed to protect consumers in several ways:
1) Discouraging the use of products which are not environment friendly.
2) Discouraging the use of harmful products as an input to the production process as well as unfriendly bi-
products.
526
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

3) Enforcing post use disposal of products/ packaging material in prescribed manner.


India has always been alive to its responsibilities in the area of environment, both in the domestic and
international context. Indian government has, over the years, not only developed a very comprehensive
framework of legislations with attendant rules and regulations, but also played an active role in developing and
implementing international conventions. They have been fast to incorporate the best of global standards and
regulations.
RECOMMENDATIONS FOR BUSINESSES
• Organisations should incorporate the growing concern of customers towards environment and Environment
Friendly products in their business plan for sustainability.
• To be adaptive to the current and new environmental, and industry legislation/ initiatives, laid by the
Government time to time.
• Encouraging innovative technologies and approaches thatminimize the cost of dealing with pollution and
improved resource and energyefficiency
• Understand all of the environmental impacts of your product across its lifecycle from production to disposal.
• Organisations should focus on improvement in environmental footprint (across the entirelifecycle), and
incentivize their customer and suppliers to join on the journey
• Provide independent evidence and contacts for third-party certifications/ labels
CONCLUSION:
Through above analysis we can say in nutshell that Environment Friendly products are really environment
friendly. Environment Friendly products are less harmful for environment. So many companies are promoting
the Ecological concept and it is mention in strategic intent of many companies. Many consumer who belong to
rural India they do not know about Environment Friendly products and the benefits of Environment Friendly
products, and consumers are more price conscious so that is why they do not purchase Environment Friendly
products. People who belong to urban and semi-urban they know about benefits of these products so that is why
they purchase these products even then pay more. If we say India is ready to adopt Ecological concept or not.
We can say that urban and semi-urban people are ready but rural people are not ready to adopt this concept. So
adopting the concept of Ecological as a whole government and companies should more focus on awareness
programs.
In A Nutshell:
 Ecological product development is more than just creating products that are environmentally friendly, it is
about systemic change in society that includes consumers, producers and the general commercial structure
within which they negotiate
 By widening & deepening the meaning of Ecological , relevant actors will have an economic incentive to
pursue Ecological product development.
 Harnessing the market forces that favors Ecological product development will lead to mainstream
Ecological .
REFERENCES
 References RéférencesReferencias 1. Arseculeratne, D., &Yazdanifard, R. (2014). How Ecological
marketing can create a sustainable competitive advantage for a business. International business research, 7,
130-137. Retrieved from http: //ccsenet.org/journal/index.php/ibr/article/view/3150 2/19041 2. Agyeman, C.
M. (2014).
 Consumers’ buying behavior towards Environment Friendly products: An exploratory study. International
Journal of Management Research and Business Strategy, 3, 189-197. Retrieved from
http://www.ijmrbs.com/ijmrbsadin/u pload/ijmrbs_530233991e0c5.pdf 3. Alniacik, U., &Yilmaz, C. (2012).
 The effectiveness of Ecological advertising: Influences of claims specificity, product’s environmental
relevance and consumers’ pro-environmental orientation. Economic Inferences, 14, 207-222. Retrieved from
http://www.amfiteatrue conomic.ro/temp/article_1111.pdf 4. Awan, U., & Raza, M. A. (n.d.).
 Ecological consumer behavior: Empirical study of swedish consumer behavior. Retrieved from
http://www.wseas.us/elibrary/conferences/2011/montreux/icicic/icicic14.pd

527
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 https://www.unilever.com/news/press-releases/2017/report-shows-a-third-of-consumers-prefer-sustainable-b
 Bajpai V N, India’s Initiative to Go Ecological : A Myth or Reality. Conference Proceeding
 http://srimca.edu.in/srijan/managementarticles/Ecological marketing
 http://www.123eng.com/forum/viewtopic.php?p=56597
 Mintel(1991)London , the Ecological consumer report
 Report on climate change in India, ministry of environment, press release
 Sundquist, ET (1993) the global carbon dioxide budget. Sciences 259,934-942
 http://www.123eng.com/forum/viewtopic.php?p=56597
 Mintel(1991)London , the Ecological consumer report

AUTHOR DETAILS:
1
DR. V N BAJPAI, 2DR. SATISH KUMAR AND 3DR. ASHISH KUMAR JHA
1,2
Professor and 3Assistant Professor, I.T.S Ghaziabad

528
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

CRITICAL THINKING ENHANCING PREDICTIVE PARAMETERS TO EARLY DETECTION OF


LEUKEMIA AN ANALYTICAL MODELING USING WEKA

MS. HARSH PALIWAL AND DR. KUNTAL BARUA

ABSTRACT
Early detection of leukemia may result in life saving opportunities for the patient, by providing them proper
treatment according to the type of leukemia they are being suffered. To make the process easier and faster many
researchers are working to develop an automated system for detection of leukemia. In this paper we have done
a rigorous literature survey. We are proposing a method to identify leukemia.
Keywords:- White Blood Cell,Acute Lymphocytic Leukemia,Support Vector Machine, convolutional neural
network.

INTRODUCTION
Blood cancer or Leukemia is developed due to abnormality in production of blood cells, which initiates from
bone marrow and results in the manufacturing of large amounts of abnormal cells. By the time, these cells enter
into the blood cells and cause fatal diseases. WHO has declared cancer as 2nd among deadliest diseases.[1]
(2019) This disease affects the immune system of the human body. Depending on the growth rate leukemia can
be classified as acute or chronic leukemia. The subclasses of leukemia further vary depending on the fact that
which type of leukocytes is being affected. If the affected leukocytes are lymphocytes and leukemia is identified
as Lymphocytic, and monocytes and granulocytes are found to be abnormal then it is considered as myeloid
Leukemia.[2](2020). Sometimes the symptoms are pale color of skin, tiredness, enlargement of lymph nodes,
fever, joint pain etc. but many a times cases are asymptotic which is more dangerous. Generally, leukemia has
four types - Acute Lymphocytic Leukemia (ALL), Acute Myeloid Leukemia (AML), Chronic Lymphocytic
Leukemia (CLL), and Chronic Myeloid Leukemia (CML).
CLASSES OF LEUKEMIA
Acute Lymphoblastic Leukemia (All)
Acute lymphoblastic leukemia is a type of blood cancer in which abnormal leukocytes (WBCs) start growing
rapidly. It can be seen in kids more commonly. French American British (FAB) classifies ALL into three
categories i.e. L1, L2 and L3 based on their morphological differences. [5](2019) Its symptoms are quite
similar to flu which makes diagnosis of the disease very difficult.
Acute Myeloid Leukemia (Aml)
It is most common in elderly people and is also known as acute myelocytic leukemia. It is caused when bone
marrow produces blasts cells in large amounts. FAB classification has identified eight subtypes of AML i.e.
M0-M7 where M0-M5 AML subtypes are found in the primitive WBCs, while M6 in primitive RBCs and M7
in platelets. [4].
Chronic Lymphocytic Leukemia (Cll)
In CLL leukocytes seem to be similar to normal cells, which makes the detection of disease more complicated.
It is more common in adults of age 60+ and in men over women. Para chromatin in lymphocytes of CLL
infected persons is less condensed relative to normal lymphocytes. Weight loss, fever, night sweats, and
periodic infections are some of the symptoms of CLL.
Chronic Myeloid Leukemia (Cml)
Excessive production of immature granulocytes in bone marrow results in CML. The percentage of myeloblasts
decreases rapidly with the excessive production of neutrophils, monocytes, myelocytes, and eosinophilic
myelocytes.[4] Patient also suffers from deficiency of RBCs and platelets in his body. The CML has three
stages -chronic, accelerated and the blast. It is more common in young and adults of the middle age.
RELATED WORK:
Mustafa Ghaderzadeh et. Al. [3](2021)discussed various features crucial for detection of leukemia including
Color Features parameters like Mean color intensity for Red, Blue and Green component, Mean color intensity
for Hue, saturation and value component. Texture features like Homogeneity, Contrast, Correlation, & Energy.
Statistical Features- Mean, Variance and Skewness, Wavelet Features- Mean of HARR A,H and V coefficient

529
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Variance of A,H,V coefficient. Morphological features- Area, Perimeter ,roundness, elongation, form factor,
length to diameter ratio, compactness, discrete Fourier transform, edge detection, dilation etc. Common problem
faced by researchers is overfitting due to lack of availability of data sets.
Anita et. Al. [10](2021) proposed a method that uses an artificial electric field algorithm (AEFA) and Velocity
and Position Clamping Based AEFA (AEFA-C). After preprocessing, an edge detection algorithm is used for
segmentation(diffused expectation-maximization (DEM) is used) which gives WBC,RBC and background
pixels as output. Morphological edge detection (MED) is used for edge detection. This edge map image is used
as an input for the AEFA-C based ellipse detection scheme. Method achieved 96.90 % detection rate and 3.09%
false alarm rate.
Muhammad Shahzad et. Al.[11](2020) suggested a Robust method for semantic segmentation of Whole-Slide
Blood Cell Microscopic Images. Semantic segmentation helps in pointing out the what (semantics) and where
(location) about the image which is under observation. Information regarding Semantics and location are
encoded in a nonlinear local-to-global pyramid fashion by using deep feature extraction.For preprocessing
pixel-level labeling, acquired masked image are converted from RGB to grayscale, then pixel fusing, and unity
mask are generated. They used VGG16 for feature extraction. System classified RBCs with 97.45%,WBCs with
93.34%, and platelets with 85.11% and global and mean accuracies were 97.18% and 91.96%.
Cecilia Di Ruberto ET. Al.[13] (2020) proposed a method to identify WBC and classify them as either healthy
or affected. Preprocessing- RGB to HSV, Blob Detection predicts leukocytes candidate locations and provides
useful information about them. Gaussian filtering is used for noise removal. For segmentation watershed
algorithm, Otsu algorithm removes pixels from image background, then Leukocyte Recognition on the basis of
shape and color and feature extraction is done using CNN and Leukemia classification is performed by three
different linear SVMs and the result is generated on the majority basis. 100% accuracy for SMC-IDB, the
IUMS- IDB datasets and 99.7% for the ALL-IDB in white cells detection and 94.1% in leukemia classification
Altaf Khan et. Al.[15] (2021)proposed MLANet-FS-ELM(multi-layer AlexNet Feature selection extreme -
learning machine) model for WBC type(neutrophils, lymphocytes, monocytes, and eosinophils are utilized )
identification. ELM is a single-layer feed-forward neural network. CNN is used for feature extraction. AlexNet
is used for training. Deep feature extraction is performed by AlexNet , GoogLeNet , VGG-16 , and ResNet.
Then these features are fed into ELM and linear SVM for training. Feature segmentation used are ReliefF, MI ,
FSV , RFE , and MRMR. AlexNet model achieved 94.44% recognition accuracy, linear SVM reached 94.99%
recognition accuracy when combined with AlexNet. ReliefF yielded the best among remaining FS techniques
i.e. 99.12% recognition accuracy. ResNet 50 performed well using the BP algorithm.
Asim Shahzad et. Al. [16] (2021)Categorized WBC by using deep features of proposed 4B-AdditionNet-based
CNN network with ant colony optimization. WBC are larger in size as compared to RBC, platelets due to the
presence of nucleus and cytoplasm. Contrast-limited adaptive histogram equalization (CLAHE) is used for
preprocessing, for feature extraction CNN with ResNet50 and EfficientNetB0 networks, Ant colony
optimization is used for feature selection and these features are then supplied to SVM, LDA, KNN for further
classification of WBC in four classes. 100 features from 4B-AdditionNet, 400 from ResNet50, and all 1000
from EfficientNetB0 provide best results. The Cubic SVM classifier achieved an Ac of 97.58% with a Se of
96.56%, Sp of 98.24%, Pr of 94.85%, and an F1 score of 95.69%, with a runtime of 174.73 s. Different
classifiers were tested and various evaluation parameters had been taken into account while experimenting the
process. Accuracy of eosinophil is 97.92% and neutrophil 96.08% , lymphocytes and monocytes were 99.84%
and 99.80%.
M. Samir Abou El-Seoud et. Al. [18](2020) focused on detecting and classifying normal white blood cells
using CNN into 4 types. Data pre-processing includes Image acquisition, RGB images to Grayscale conversion,
Image Resizing, labeling, Pickling. After preprocessing data is fed to CNN(with five layers, out of which 4 are
used for feature extraction and 1 for classification. 96.78% accuracy is achieved.
Vaibhav Rupapara ET. Al. [20](2022) proposed an approach for blood cancer prediction and classification,
where a hybrid logistics vector trees classifier which uses logistic regression, support vector classifier, and extra
tree classifier is used. The architecture consisted of feature selection, data resampling, data splitting, model
training, model evaluation stages. Performance of the model is checked by first using an ADASYN
oversampled dataset, secondly by applying Chi2 technique and thirdly by applying both Chi2 and ADASYN
techniques together. 100% accuracy by LVTrees.

530
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

A.N.Nithyaa1 ET. Al. [21](2021) proposed potent algorithm, which can diagnose the image automatically on
the basis of morphological features and for segmentation of RBC from WBC, using a color space model
(MATLAB software).For classification random forest classifier is used to identify the exact type of cancer
detected in the WBC. Geometric features considered were the mean of area, diameter, radius, perimeter,
eccentricity, solidity and elongation, angular momentum, energy, entropy, homogeneity and correlation values.
Sara Hosseinzadeh Kassani et. Al [22] proposed an architecture for leukemic b-lymphoblast classification
using hybrid deep learning. The key motive is to propose a hybrid CNN model which can combine low-level
features from intermediate layers to obtain high-level discriminative feature maps for immature leukemic blast
classification.B Lymphoblast classification with 96.17% overall accuracy, 95.17% sensitivity and 98.58%
specificity. The proposed model delivered high accuracy (96.17%) on the dataset mean normalization with
Adam optimizer. High sensitivity (95.92%) result achieved by Adam optimizer, and ImageNet mean
normalization method, and high specificity (99.53%) obtained by dataset mean normalization and SGD
optimizer. The model improves VGG16 up to 16% and MobileNet by 8.17% in terms of accuracy, which is
considered significant. Moreover, the plain MobileNet architecture (88.00%) gives a better performance than
VGG16 architecture (80.77%).
Jos´E Elwyslan Maur´Icio De Oliveira Et. Al [29] (2021) proposed the system which performs binary
classification i.e. Normal versus Leukemic Cells by using data augmentation and CNN. Cells were dyed with
the help of Jenner-Giemsa stain technique, and before segmenting the images, stains were normalized. For data
augmentation mirroring, rotation,Gaussian blurring shearing and addition of salt and pepper noise were used.
VGG16, VGG19, and Xception architectures were used to work as classifiers and ReLU activation functions
were used. 400 epochs were taken under consideration. The system showed F1- score - 92.60%, precision -
91.14%, sensitivity -94.10%, and specificity - 90.86% for the malignant class.
Maryam Bukhari ET. Al [31](2022) suggested a deep learning algorithm where the power of representation of
features is increased by including squeeze-and-excitation learning, where first step is to squeeze the features
obtained by convolution layers from blood sample images, to get the channel descriptor which gives
information to be embedded globally, and this descriptor combines the channel wise features which are used by
bottom layers in the model. In the excitation phase recursive recalibration and further enhancement of features
takes place. Squeeze-and-Excitation Learning is integrated to CNN model to strengthen the spatial encoding of
the model, this process empowers the model to extract strong, relevant, and discriminative features from
leukemic and normal cells. 94% accuracy is achieved.
Rana Zeeshan Haider et. Al [33] (2022) used CPD parameters, bone marrow examination,
immunophenotyping, cytogenetic and/or molecular tests based on initial workups, along with clinical and
demographic information. ANN is used for predictive modeling,differentiation and classification, and to
determine the nature of a dataset. Two tools were used i.e. Radial basis function network (RBFN) and Multiple
perceptron (MLP) networking. The study early differentiates among different kinds of leukemias: acute from
chronic as well as myeloid from lymphoid.
Nor Hazlyna Harun ET. Al [ 34] introduced a method for enhancing the acute leukemia image quality by
combining two algorithms named Particle swarm optimization (PSO) algorithm and contrast stretching, and
named it Hybrid PSOContrast stretching (HPSO-CS). The PSO is capable of optimizing the fitness criterion of
image for improving the contrast and detail in microscopic image. Firstly RGB to the HIS color model
conversion of images is performed, and S- component from HSI model is used for segmentation which leaves
only WBC in image and with PSO algorithm segmentation is done, and contrast stretching is done for filling
image dynamic range. Proposed method is compared with global and CLAHE. Lowest MSE (2067.651),
AMBE (43.51827) and highest PSNR (14.98671) were observed.
Surya Gundepudi et al [40](2021)proposed two models for ALL detection which utilized transfer learning. In
the first method (Hybrid AlexNet and Machine Learning based ALL detection system) data augmentation is
done by rotation, flipping, zooming, and preprocessing through resizing, transformation and normalizing.
AlexNet is used for feature extraction while different classifiers k Nearest Neighbors, Support Vector Machine
(linear and gaussian), Decision Trees and XGBoost are used for classification purposes. In the second method
both feature extraction and classification is done by AlexNet. It was concluded that the SVM classifier
outperformed other classifiers in the first model by showing the 98.15% as the highest F1 score and Recall 98%
respectively. Second model outperformed all other classifiers used in the first model with a 100% score for all
metrics.

531
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Sorayya Rezayi Et Al [41] (2021) focused on less time consumption of a system and hence compared
performance of three networks i.e. ResNet 50 ,VGG-16 and a novel proposed convolutional network for
classification of ALL, on matrices such as runtime, accuracy, architecture, or complexity. The results showed
that the training accuracy for ResNet-50 is 95.76%, and validation accuracy is 81.63%. For VGG-16 training
accuracy is 97.41%, and validation accuracy is 84.62%. The training accuracy of the proposed convolutional
network is 85.79%, and validation accuracy is 82.10%. The system took less time which is a must for real time
systems.
Jyoti Rawat et Al [47](2022) The paper proposed a method to classify acute leukemia classes L1,L2,L3, M2,
M3, and M5. Segmentation of nuclie is done by PCA fusion-based hybrid method. Segmented image is masked
with blue band image. Extracted Features are reduced through Principal component analysis. The classification
consists of two subsections as subsection1 is comprised of single six class PCA(Principal component analysis)
based neural network as PCA-NN0 and subsection 2 contains an ensemble of 15 binary PCA based neural
network classifiers as PCA-NN1 (L1/L2), PCA-NN2(L1/L3), PCA-NN3(L1/M2), PCA-NN4(L1/M3), PCA-
NN5(L1/M5), PCA-NN6(L2/L3), PCA-NN7(L2/M2), PCA-NN8(L2/M3), PCA-NN9 (L2/M5), PCA-
NN10(L3/M2), PCA-NN11(L3/M3), PCA-NN12(L3/M5), PCA-NN13(M2/M3), PCA-NN14(M2/M5), PCA-
NN15(M3/M5). Accuracy achieved 86.4% using PCA-NN0 only. In experiment 2 PCA-NN0 is supplied to
other binary PCA based neural network i.e. PCA-NN1 to PCA-NN15 which achieved accuracy of 94.2%.
93.7% (30/32), 86.9% (20/23), 86.6% (13/15), 85.1% (23/27), 84.2% (16/19), and 79.1% (19/24) for L1, L2,
L3, M2, M3 and M5, respectively.
V. Jeya Ramya et al [49] (2022) Proposed Fractional Black Widow Optimization (FBWO) for the purpose of
enhancing the performance of the Neural Network to detect AML. For segmenting fuzzy C-mean clustering is
integrated with an active contour-based model. Feature extraction- fractals and spatial variation functions,
Classification- Fractional Black Widow-based Neural Network is used, which has three layers i.e. input, hidden
and output. FBWNN detects normal and AML infected cells. FBW-NN yields 96.56% accuracy, 97.81%
specificity, 96.90% sensitivity, 97.20% precision, and 97.90% recall results.
Nur Khomairoh Et Al [51] (2020) suggested the Segmentation System of Acute Myeloid Leukemia (AML)
Subtypes on Microscopic Blood Smear Image. The paper proposed a segmentation system which will identify
the boundary of white blood cells contained in microscopic images of blood cell smears. The cytoplasm has a
fader color variation when compared with the nucleus and looks like red blood cells. Haar Cascade Classifier,
RGB to HSV and Split S channel is used for preprocessing. Erosion and dilation techniques are used to
calculate the minimum location around the kernel area. The histogram equalization-increases contrast to evenly
distribute lighting on each object. Split S and k- mean clustering is used for nucleus and histogram equalization
for cytoplasm segmentation. The results were nucleus segmentation in each cell of M4, M5, and M7 with an
accuracy of 87.5%, 90.4%, 84.6% in sequence, and the results of cytoplasm segmentation are 75%, 71.4%, and
80.76%, respectively. Images with large dimensions can cause errors. The proposed system can detect only
AML subtypes i.e. M4,M5 and M7.
Eman M. Nagiuba Et Al [52] proposed a method to detect, classify, and diagnose AML-type leukemia by
applying deep learning using PB and BM smears’ images. Seven types of CNN models: Alexnet, VGG16,
GoogLeNet, ResNet-101, and Inceptionv3 were used, out of which Inceptionv3 outperformed all other
classifiers and took only 0.2273sec to test each image. Transfer learning is used. Accuracy achieved by the
system is 99.98% with Inception-v3. The system was evaluated using accuracy,sensitivity and specificity.
Jameela Ali Alkrimi Et Al [54] suggested classification of Imbalanced leukocytes using ANN-based Deep
Learning, the system has 4 stages. The size of WBCs, the shape and number of nuclei and the color of
cytoplasm (bluish and reddish) are provided as input to the ANN algorithm. For evaluation the relative absolute
error (RAE) and the root mean squared error (RMES) are used. 94.70% when using 100 clusters with 6
clustering seeds. The classification accuracy achieved a GM of 0.806, Kappa value 0.92 , RMSE 0.275 , RAE
9.50.
Fredric Samson Kirubakaran Sakthiraj [58] (2021) proposed the approach based on Hybrid Convolutional
Neural Network with Interactive Autodidactic School (HCNN-IAS) algorithm,for feature extraction, feature
fusion, and classification. The algorithm mentioned can identify healthy, ALL, AML, CML, and CLL. Global
features are extracted using two layers of DNN and Local features using a sliding convolutional kernel. Self-
attention scheme is used for fusing both local and global features, after this stage Fully connected layer
classifies the type of leukemia(ResNet-34 and DenseNet-121), achieving accuracy about 99%.

532
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Previous Techniques Faced Many Challenges Like:-


● Use of ML in pathology faces many challenges like digitizing slides, labeling supervised learning is used,
initial and maintenance costs, advanced equipment, technical expertise, and ethical considerations.
● studies covered were limited to AML, ALL, CLL, and CML
● Models reviewed were not generalizable because they used a very small data set to train and test the model.
● Another limitation is that many of the studies included binary sets of data: diseased and normal.which is not
realistic to the real world problems.
● Use of unsupervised models can be proved more time efficient but they are still uncommon.
● So we are proposing a system
PROPOSED METHOD
Data collection is the very first step, after collecting data features will be reduced as only few features can be
selected for detection of leukemia, with the help of correlation attribute evaluator. After that preprocessing is
performed as data sometimes needs to be preprocessed in order to make it suitable for the model. Imbalance of
data can be the cause of lower rate of accuracy of the model,hence class balancer or resampling is needed in
order to make a balance in different classes(if applicable) of the dataset. So filters are used. Classification is a
fundamental part in analyzing data and pattern recognition, classifiers are developed for this purpose.
Various Bayes, functions and trees will be used for the classification purpose. After analyzing the results, a
predictive model will be developed with higher accuracy of prediction of leukemia.
CONCLUSION
The parameters which were considered as most significant by different researchers includes Alexandra Bodzas
et Al.[37] considered the nucleus position and shape (shape of the nucleus plays most important role in
identifying immature cell), chromatin structure, presence of nucleoli, nucleocytoplasmic ratio, size of the cell,
and color or structure of the cytoplasm, Nucleus compactness, Nucleus form factor, Nucleus eccentricity,
Nucleus elongation, Nucleus solidity, Statistical parameters- Nucleus energy, cell contrast, Nucleus correlation,
Cell dissimilarity, Cell entropy. Khaled Almezhghwi et Al.[2] (2020) focused on neutrophils, eosinophils,
lymphocytes, monocytes, or basophils. Anamika Das Mouet. Al. [1](2019) considered 13 attributes
Gender(Male,female), Age, Height(cm), Weight(Kg), Body Mass, Index(BMI), Diastolic Blood Pressure, Pulse,
S.Total Cholesterol(TC) , S. Triglycerides, HDL Cholesterol, LDL Cholesterol and class(Yes,No). Sarmad
Shafique et. Al [5](2019) observed white blood cells, red blood cells and platelets, Lymphocytes (roundness
ratio is used to detect lymphocytes). A.N.Nithyaa et. Al.[21] geometric features, the mean of area, diameter,
radius, perimeter, eccentricity, solidity and elongation, angular momentum, energy, entropy, homogeneity and
correlation values. average, maximum, minimum intensity and cell area, total cancer cell count in the image.
region of interest,
Cell density, boundary region and width of the cell.
REFERENCES
1. A. Das Mou and P. Kumar Saha, "A Comprehensive Study of Machine Learning algorithms for Predicting
Leukemia Based on Biomedical Data," 2019 2nd International Conference on Innovation in Engineering
and Technology (ICIET), 2019, pp. 1-5, doi: 10.1109/ICIET48527.2019.9290544.
2. Khaled Almezhghwi, Sertan Serte, "Improved Classification of White Blood Cells with the Generative
Adversarial Network and Deep Convolutional Neural Network", Computational Intelligence and
Neuroscience, vol. 2020, Article ID 6490479, 12 pages, 2020. https://doi.org/10.1155/2020/6490479
3. Mustafa Ghaderzadeh, Farkhondeh Asadi, Azamossadat Hosseini, Davood Bashash, Hassan Abolghasemi,
Arash Roshanpour, "Machine Learning in Detection and Classification of Leukemia Using Smear Blood
Images: A Systematic Review", Scientific Programming, vol. 2021, Article ID 9933481, 14 pages, 2021.
https://doi.org/10.1155/2021/9933481
4. A. Shah, S. S. Naqvi, K. Naveed, N. Salem, M. A. U. Khan and K. S. Alimgeer, "Automated Diagnosis of
Leukemia: A Comprehensive Review," in IEEE Access, vol. 9, pp. 132097-132124, 2021, doi:
10.1109/ACCESS.2021.3114059.

533
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

5. S. Shafique, S. Tehsin, S. Anas and F. Masud, "Computer-assisted Acute Lymphoblastic Leukemia


detection and diagnosis," 2019 2nd International Conference on Communication, Computing and Digital
systems (C-CODE), 2019, pp. 184-189, doi: 10.1109/C-CODE.2019.8680972
6. Salah HT, Muhsen IN, Salama ME, Owaidah T, Hashmi SK. Machine learning applications in the
diagnosis of leukemia: Current trends and future directions. Int J Lab Hematol. 2019 Dec;41(6):717-725.
doi: 10.1111/ijlh.13089. Epub 2019 Sep 9. PMID: 31498973.
7. Abass, Shakir & Mohsin Abdulazeez, Adnan & Zeebaree, Diyar. (2021). A YOLO and convolutional
neural network for the detection and classification of leukocytes in leukemia. Indonesian Journal of
Electrical Engineering and Computer Science. 25. 10.11591/ijeecs.v25.i1.pp200-213.
8. A.M. Patil, M.D. Patil, G.K. Birajdar, White Blood Cells Image Classification Using Deep Learning with
Canonical Correlation Analysis, IRBM, Volume 42, Issue 5, 2021, Pages 378-389, ISSN 1959-0318,
https://doi.org/10.1016/j.irbm.2020.08.005.
(https://www.sciencedirect.com/science/article/pii/S195903182030141X)
9. Alam MM, Islam MT. Machine learning approach of automatic identification and counting of blood cells.
Healthc Technol Lett. 2019 Jul 17;6(4):103-108. doi: 10.1049/htl.2018.5098. PMID: 31531224; PMCID:
PMC6718065.
10. Anita, Anupam Yadav, An Intelligent Model for the Detection of White Blood Cells using Artificial
Intelligence, Computer Methods and Programs in Biomedicine, Volume 199, 2021, 105893, ISSN 0169-
2607, https://doi.org/10.1016/j.cmpb.2020.105893. (https:// www.sciencedirect.com/ science/ article/ pii/
S0169260720317260)
11. Muhammad Shahzad, Arif Iqbal Umar, Muazzam A. Khan, Syed Hamad Shirazi, Zakir Khan, Waqas
Yousaf, "Robust Method for Semantic Segmentation of Whole-Slide Blood Cell Microscopic Images",
Computational and Mathematical Methods in Medicine, vol. 2020, Article ID 4015323, 13 pages, 2020.
https://doi.org/10.1155/2020/4015323
12. Sahlol, A.T., Kollmannsberger, P. & Ewees, A.A. Efficient Classification of White Blood Cell Leukemia
with Improved Swarm Optimization of Deep Features. Sci Rep 10, 2536 (2020). https:// doi.org/10.1038/
s41598-020-59215-9
13. C. Di Ruberto, A. Loddo, and G. Puglisi, “Blob Detection and Deep Learning for Leukemic Blood Image
Analysis,” Applied Sciences, vol. 10, no. 3, p. 1176, Feb. 2020, doi: 10.3390/app10031176.
14. Roopa B. Hegde, Keerthana Prasad, Harishchandra Hebbar, Brij Mohan Kumar Singh, Comparison of
traditional image processing and deep learning approaches for classification of white blood cells in
peripheral blood smear images, Biocybernetics and Biomedical Engineering, Volume 39, Issue 2, 2019,
Pages 382-392, ISSN 0208-5216, https://doi.org/10.1016/j.bbe.2019.01.005. (https:// www.science
direct.com/ science/article/ pii/S0208521618304819)
15. Altaf Khan, Amber Eker, Alexander Chefranov, Hasan Demirel, White blood cell type identification using
multi-layer convolutional features with an extreme-learning machine, Biomedical Signal Processing and
Control, Volume 69, 2021, 102932, ISSN 1746-8094, https://doi.org/10.1016/j.bspc.2021.102932. (https://
www.sciencedirect.com/science/article/pii/S1746809421005292)
16. Shahzad, A., Raza, M., Shah, J.H. et al. Categorizing white blood cells by utilizing deep features of
proposed 4B-AdditionNet-based CNN network with ant colony optimization. Complex Intell. Syst. (2021).
https://doi.org/10.1007/s40747-021-00564-x
17. Muhammed Yildirim, Ahmet Çinar Classification of White Blood Cells by Deep Learning Methods for
Diagnosing Disease Vol. 33, No. 5, October, 2019, pp. 335-340 International Information and Engineering
Technology Association https://doi.org/10.18280/ria.330502
18. Abou El-Seoud, S., Siala, M. & McKee, G. (2020). Detection and Classification of White Blood Cells
through Deep Learning Techniques. International Association of Online Engineering. Retrieved April 2,
2022 from https://www.learntechlib.org/p/218513/.
19. Shraddha kshirsagar, Dr. Anup vibhute Blood count analysis using machine learning Volume XII, Issue
VIII, 2020 Journal of Xi'an University of Architecture & Technology, ISSN No : 1006-7930

534
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

20. Rupapara, V., Rustam, F., Aljedaani, W. et al. Blood cancer prediction using leukemia microarray gene
data and hybrid logistic vector trees model. Sci Rep 12, 1000 (2022). https://doi.org/10.1038/s41598-022-
04835-6
21. Nithyaa A. N, Kumar R. P, Gokul M, Aananthi C. G. Matlab Based Potent Algorithm for Wbc Cancer
Detection and Classification. Biomed Pharmacol J 2021;14(4). https://dx.doi.org/10.13005/bpj/2328
22. arXiv:1909.11866 [eess.IV] or https://doi.org/10.48550/arXiv.1909.11866
23. A. Belhekar, K. Gagare, R. Bedse, Y. Bhelkar, K. Rajeswari and M. Karthikeyan, "Leukemia Cancer
Detection Using Image Analytics : (Comparative Study)," 2019 5th International Conference On
Computing, Communication, Control And Automation (ICCUBEA), 2019, pp. 1-6, doi:
10.1109/ICCUBEA47591.2019.9128546.
24. Nighat Bibi, Misba Sikandar, Ikram Ud Din, Ahmad Almogren, Sikandar Ali, "IoMT-Based Automated
Detection and Classification of Leukemia Using Deep Learning", Journal of Healthcare Engineering, vol.
2020, Article ID 6648574, 12 pages, 2020. https://doi.org/10.1155/2020/6648574
25. R. P and S. D. P, "Detection of Blood Cancer-Leukemia using K-means Algorithm," 2021 5th International
Conference on Intelligent Computing and Control Systems (ICICCS), 2021, pp. 838-842, doi:
10.1109/ICICCS51141.2021.9432244.
26. Sai Sreeja Alapati , Dr. M. Rama Bai, 2020, Leukemia Detection using Object Oriented Method,
International Journal Of Engineering Research & Technology (IJERT) Volume 09, Issue 05 (May 2020),
27. S. Patil Babaso, S. K. Mishra and A. Junnarkar, "Leukemia Diagnosis Based on Machine Learning
Algorithms," 2020 IEEE International Conference for Innovation in Technology (INOCON), 2020, pp. 1-5,
doi: 10.1109/INOCON50539.2020.9298321.
28. R. Kandhari, A. Bhan, P. Bhatnagar and A. Goyal, "Computer based diagnosis of Leukemia in blood smear
images," 2021 Third International Conference on Intelligent Communication Technologies and Virtual
Mobile Networks (ICICV), 2021, pp. 1462-1466, doi: 10.1109/ICICV50876.2021.9388546.
29. Oliveira, José & Dantas, Daniel. (2021). Classification of Normal versus Leukemic Cells with Data
Augmentation and Convolutional Neural Networks. 685-692. 10.5220/0010257406850692.
30. Rocio Ochoa Montiel, Leonardo Martínez Ibarra, Humberto Sossa, Gustavo Olague pp. 271–280; rec. 09-
09-2020; acc. 15-10-2020 Research in Computing Science 149(11), 2020
31. Maryam Bukhari, Sadaf Yasmin, Saima Sammad, Ahmed A. Abd El-Latif, "A Deep Learning Framework
for Leukemia Cancer Detection in Microscopic Blood Samples Using Squeeze and Excitation Learning",
Mathematical Problems in Engineering, vol. 2022, Article ID 2801227, 18 pages, 2022.
https://doi.org/10.1155/2022/2801227
32. M. Loey, M. Naman, and H. Zayed, “Deep Transfer Learning in Diagnosing Leukemia in Blood Cells,”
Computers, vol. 9, no. 2, p. 29, Apr. 2020, doi: 10.3390/computers9020029.
33. Haider RZ, Ujjan IU, Khan NA, Urrechaga E, Shamsi TS. Beyond the In-Practice CBC: The Research
CBC Parameters-Driven Machine Learning Predictive Modeling for Early Differentiation among
Leukemias. Diagnostics (Basel). 2022 Jan 7;12(1):138. doi: 10.3390/diagnostics12010138. PMID:
35054304; PMCID: PMC8774626.
34. N. H. Harun, J. A. Bakar, Z. A. Wahab, M. K. Osman and H. Harun, "Color Image Enhancement of Acute
Leukemia Cells in Blood Microscopic Image for Leukemia Detection Sample," 2020 IEEE 10th
Symposium on Computer Applications & Industrial Electronics (ISCAIE), 2020, pp. 24-29, doi:
10.1109/ISCAIE47305.2020.9108810.
35. Ahmed N, Yigit A, Isik Z, Alpkocak A. Identification of Leukemia Subtypes from Microscopic Images
Using Convolutional Neural Network. Diagnostics (Basel). 2019 Aug 25;9(3):104. doi:
10.3390/diagnostics9030104. PMID: 31450720; PMCID: PMC6787617.
36. S, Alagu & Bagan, K.. (2019). Acute Lymphoblastic leukemia diagnosis in microscopic blood smear
images using texture features and SVM classifier.

535
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

37. Bodzas A, Kodytek P, Zidek J. Automated Detection of Acute Lymphoblastic Leukemia From
Microscopic Images Based on Human Visual Perception. Front Bioeng Biotechnol. 2020 Aug 28;8:1005.
doi: 10.3389/fbioe.2020.01005. PMID: 32984283; PMCID: PMC7484487.
38. Nayeon Kim. Deep Learning Technology-based Model to Identify Benign and Pro-B Acute Lymphoblastic
Leukemia (ALL): Xception + LIME. American Journal of Biomedical and Life Sciences. Vol. 9, No. 5,
2021, pp doi: /j.ajbls Received: October 8, 2021; Accepted: October 27, 2021; Published: October 30, 2021
39. S. Nayaki K., J. Denny, M. M. Rubeena and J. K. Denny, "Cloud based Acute Lymphoblastic Leukemia
Detection Using Deep Convolutional Neural Networks," 2020 Second International Conference on
Inventive Research in Computing Applications (ICIRCA), 2020, pp. 530-536, doi: 10.1109/
ICIRCA48905.2020.9183249.
40. Surya Sashank, G.V., Jain, C., Venkateswaran, N. (2021). Detection of Acute Lymphoblastic Leukemia by
Utilizing Deep Learning Methods. In: Bajpai, M.K., Kumar Singh, K., Giakos, G. (eds) Machine Vision
and Augmented Intelligence—Theory and Applications. Lecture Notes in Electrical Engineering, vol 796.
Springer, Singapore. https://doi.org/10.1007/978-981-16-5078-9_38
41. Sorayya Rezayi, Niloofar Mohammadzadeh, Hamid Bouraghi, Soheila Saeedi, Ali Mohammadpour,
"Timely Diagnosis of Acute Lymphoblastic Leukemia Using Artificial Intelligence-Oriented Deep
Learning Methods", Computational Intelligence and Neuroscience, vol. 2021, Article ID 5478157, 12
pages, 2021. https://doi.org/10.1155/2021/5478157
42. Rohan Khandekar, Prakhya Shastry, Smruthi Jaishankar, Oliver Faust, Niranjana Sampathila,Automated
blast cell detection for Acute Lymphoblastic Leukemia diagnosis, Biomedical Signal Processing and
Control, Volume 68, 2021, 102690, ISSN 1746-8094, https:// doi.org/10.1016/j.bspc.2021.102690. (https://
www.sciencedirect.com/ science/article/pii/ S1746809421002871)
43. Krishna Kumar Jha, Himadri Sekhar Dutta, Mutual Information based hybrid model and deep learning for
Acute Lymphocytic Leukemia detection in single cell blood smear images, Computer Methods and
Programs in Biomedicine, Volume 179, 2019, 104987, ISSN 0169-2607, https:// doi.org/
10.1016/j.cmpb.2019.104987. (https:// www.sciencedirect.com/ science/ article/ pii/ S0169260718317802).
44. A. Genovese, M. S. Hosseini, V. Piuri, K. N. Plataniotis and F. Scotti, "Acute Lymphoblastic Leukemia
Detection Based on Adaptive Unsharpening and Deep Learning," ICASSP 2021 - 2021 IEEE International
Conference on Acoustics, Speech and Signal Processing (ICASSP), 2021, pp. 1205-1209, doi:
10.1109/ICASSP39728.2021.9414362.
45. S. Ramaneswaran, Kathiravan Srinivasan, P. M. Durai Raj Vincent, Chuan-Yu Chang, "Hybrid Inception
v3 XGBoost Model for Acute Lymphoblastic Leukemia Classification", Computational and Mathematical
Methods in Medicine, vol. 2021, Article ID 2577375, 10 pages, 2021. https:// doi.org/ 10.1155/
2021/2577375
46. S. Rajpurohit, S. Patil, N. Choudhary, S. Gavasane and P. Kosamkar, "Identification of Acute
Lymphoblastic Leukemia in Microscopic Blood Image Using Image Processing and Machine Learning
Algorithms," 2018 International Conference on Advances in Computing, Communications and Informatics
(ICACCI), 2018, pp. 2359-2363, doi: 10.1109/ICACCI.2018.8554576.
47. Rawat, J., Virmani, J., Singh, A. et al. FAB classification of acute leukemia using an ensemble of neural
networks. Evol. Intel. 15, 99–117 (2022). https://doi.org/10.1007/s12065-020-00491-9
48. Fathi E, Rezaee MJ, Tavakkoli-Moghaddam R, Alizadeh A, Montazer A. Design of an integrated model
for diagnosis and classification of pediatric acute leukemia using machine learning. Proc Inst Mech Eng H.
2020 Oct;234(10):1051-1069. doi: 10.1177/0954411920938567. Epub 2020 Jul 7. PMID: 32633668.
49. Ramya, V.J., Lakshmi, S. Acute myelogenous leukemia detection using optimal neural network based on
fractional black-widow model. SIViP 16, 229–238 (2022). https://doi.org/10.1007/s11760-021-01976-5
50. Maneela Shaheen, Rafiullah Khan, R. R. Biswal, Mohib Ullah, Atif Khan, M. Irfan Uddin, Mahdi Zareei,
Abdul Waheed, "Acute Myeloid Leukemia (AML) Detection Using AlexNet Model", Complexity, vol.
2021, Article ID 6658192, 8 pages, 2021. https://doi.org/10.1155/2021/6658192

536
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

51. N. Khomairoh, R. Sigit, T. Harsono, Y. Hernaningsih and A. Anwar, "Segmentation System of Acute
Myeloid Leukemia (AML) Subtypes on Microscopic Blood Smear Image," 2020 International Electronics
Symposium (IES), 2020, pp. 565-570, doi: 10.1109/IES50839.2020.9231651.
52. Acute myeloid leukemia diagnosis using deep learning p. 167 Eman M Nagiub, Khaled F Hussain, Nagwa
M Omar, Qamer T Al-Rashedi DOI:10.4103/ejh.ejh_11_20
53. Ronald G Hauser, MD, Denise Esserman, PhD, Lauren A Beste, MD, MS, Shawn Y Ong, MD, Denis G
Colomb, Jr, PhD, Ankur Bhargava, MD, Roxanne Wadia, MD, Michal G Rose, MD, A Machine Learning
Model to Successfully Predict Future Diagnosis of Chronic Myelogenous Leukemia With Retrospective
Electronic Health Records Data, American Journal of Clinical Pathology, Volume 156, Issue 6, December
2021, Pages 1142–1148, https://doi.org/10.1093/ajcp/aqab086
54. Jameela Ali Alkrimi; Rajaa Salih Mohammed Hasin; Ali Zaki Naji; George, Loay E; Sherna Aziz Tome.
“Classification of Imbalanced leukocytes Dataset using ANN-based Deep Learning” doi:10.1088/1742-
6596/1999/1/012140
55. R. Agrawal, S. Satapathy, G. Bagla and K. Rajakumar, "Detection of White Blood Cell Cancer using
Image Processing," 2019 International Conference on Vision Towards Emerging Trends in Communication
and Networking (ViTECoN), 2019, pp. 1-6, doi: 10.1109/ViTECoN.2019.8899602.
56. P. Jagadev and H. G. Virani, "Detection of leukemia and its types using image processing and machine
learning," 2017 International Conference on Trends in Electronics and Informatics (ICEI), 2017, pp. 522-
526, doi: 10.1109/ICOEI.2017.8300983.
57. M. O. Aftab, M. Javed Awan, S. Khalid, R. Javed and H. Shabir, "Executing Spark BigDL for Leukemia
Detection from Microscopic Images using Transfer Learning," 2021 1st International Conference on
Artificial Intelligence and Data Analytics (CAIDA), 2021, pp. 216-220, doi: 10.1109/
CAIDA51941.2021.9425264.
58. Sakthiraj, F.S.K. Autonomous Leukemia Detection Scheme Based on Hybrid Convolutional Neural
Network Model Using Learning Algorithm. Wireless Pers Commun (2021). https:// doi.org/ 10.1007/
s11277-021-08798-1

AUTHOR DETAILS:
MS. HARSH PALIWAL1 AND DR. KUNTAL BARUA2
1
Ph.D Research Scholar and 2Associate Professor, Institute of Advance Computing, SAGE University, Indore,
Madhya Pradesh, India

537
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

AN EMPIRICAL ANALYSIS OF MACHINE LEARNING MODELS FOR SENTIMENT ANALYSIS


OF TWITTER REVIEWS

SHWETA BARHATE

ABSTRACT
The World Wide Web (WWW) has become a large source of user-generated content and opinionated data in
recent years. Using social media platforms such as Twitter, Facebook, and others, users may easily
communicate their thoughts and sentiments. Millions of people share their ideas via their daily interactions on
social media sites like Twitter and Facebook, which can include their thoughts and opinions regarding a
specific topic. These ever-increasing subjective data are, without a doubt, an extraordinarily rich source of data
for any decision-making process. Sentiment Analysis is a field that has arisen to automate the analysis of such
data. In this research, we study and compare Machine Learning techniques to analyse Twitter messages
regarding electronic devices such as smartphones and laptops. It is possible to determine the effect of domain
information on sentiment classification by doing sentiment analysis in a specific domain. Due to the automated
and hierarchical learning capabilities intrinsically enabled by deep learning models, deep learning has
emerged as one of the most sought-after methods to address this difficulty. In light of the use of deep learning
approaches for sentiment analysis, the goal of this study is to present a taxonomy of traits to consider for deep
learning-based sentiment analysis and to de-mystify the role of deep learning approaches in sentiment analysis.
The feature set is thoroughly integrated into convolution neural networks, and its performance is compared to
that of other methods such as SVM and Naive Bayes.
Keywords: CNN, Twitter, Deep learning, Sentiment Analysis, SVM, Naive Bayes

1. INTRODUCTION
Sentiment analysis, which is also referred to as opinion mining, has been one of the most active studies areas in
natural language processing when you consider that early 2000 [1]. The goal of sentiment evaluation is to
outline computerized tools able to extract subjective records from texts in natural language, which includes
reviews and sentiments, so that you can create structured and actionable understanding to be utilized by both a
decision aid machine and a choice maker.
Analyzing the emotions of people from such opinionated data allows both end customers and business
industries in choice-making for getting merchandise, launching new merchandise, assessing the industry
popularity the various clients, and so forth. Sentiment analysis is an automatic technique of extracting the
polarity of the opinionated textual content. Sentiment analysis is one of the maximum energetic research regions
in natural language processing considering since 2000 and continues to be exceedingly sought-after studies area.
It's miles forecasted that by using 2025, NLP market would reach $22.3 billion [2]. Due to the proliferation of
diverse opinion sites, it's miles hard to find and reveal all of the web sites and gather the information touching
on some domain and carry out sentiment evaluation. Furthermore, it is tough for human employees to segregate
the opinionated facts from lengthy blogs and forums and summarize the critiques. This arises the need of
computerized sentiment evaluation systems. On this paper, we goal at sentiment class for textual content
statistics and study an architecture of the Convolutional Neural network (CNN) [3–5], which is a sort of deep
learning model. We reveal the effectiveness of our study through experimental evaluation and comparison with
other machine learning models.
The rest of this paper is prepared as follows. Segment 2 evaluations related studies about sentiment
classification, machine learning and deep learning models. Phase 3 affords classifiers for sentiment
classification and a detailed description of CNN method. Segment 4 describes the experimental settings and
datasets and compares the model with some other models. Thereafter, segment five discusses the experimental
outcomes. Eventually, segment 6 concludes this paper.
2. RELATED WORKS
There are basic methodologies to locate sentiments from textual content. They are Symbolic techniques and
Machine Learning techniques [6]. The next sections deal with those strategies.

538
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Symbolic Techniques:
Kamps et al. [7] used the lexical database WordNet [8] to determine the emotional content of a phrase alongside
distinctive dimensions. They evolved a distance metric on WordNet and decided the semantic orientation of
adjectives. WordNet database includes words connected by way of synonym members of the family.
Baroni et al. [9] evolved a system the use of phrase area model formalism that overcomes the problem in lexical
substitution task. It represents the nearby context of a phrase along side its standard distribution.
Balahur et al. [10] brought EmotiNet, a conceptual representation of text that stores the shape and the semantics
of actual events for a specific domain. Emotinet used the concept of Finite state Automata to pick out the
emotional responses prompted by using moves.
One of the participant of SemEval 2007 undertaking No. 14 [11] used coarse grained and high-quality grained
approaches to perceive sentiments in news headlines. In coarse grained approach, they executed binary
classification of emotions and in great grained technique they classified emotions into one-of-a-kind tiers.
Machine Learning Techniques
Machine learning techniques use a training set and a take a look at set for classification. Training set
incorporates input feature vectors and their corresponding elegance labels. The use of this training set, a class
version is evolved which tries to classify the input function vectors into corresponding class labels. Then a
check set is used to validate the version by using predicting the elegance labels of unseen function vectors. A
number of machine learning techniques like Naive Bayes (NB), Most Entropy (ME), and Support Vector
Machines (SVM) are used to categorise evaluations [12]. Some of the features that may be used for sentiment
class are time period Presence, term Frequency, negation, n-grams and element-of-Speech [13]. These functions
can be used to discover the semantic orientation of words, terms, sentences and that of documents. Semantic
orientation is the polarity which may be either positive or negative.
Pak et al. [14] created a Twitter corpus by automatically collecting tweets via Twitter API and annotating them
with emoticons. They built a sentiment classifier based on the multinomial Naive Bayes classifier, which uses
N-grams and POS-tags as features, using that corpus. There is a chance of error in that method because the
emotions of tweets in the training set are labelled solely based on the polarity of emoticons. The training set is
also less efficient because it only contains tweets with emoticons.
For sentiment classification, Xia et al. [15] used an ensemble framework. By combining various feature sets and
classification techniques, an ensemble framework is created. To create the ensemble framework, they used two
types of feature sets and three base classifiers. Part-of-speech information and Word-relations are used to
generate two types of feature sets. As base classifiers, Naive Bayes, Maximum Entropy, and Support Vector
Machines are chosen. They improved their sentiment classification accuracy by using different ensemble
methods such as fixed combination, weighted combination, and Meta-classifier combination.
3. SENTIMENT CLASSIFICATION
Classification is done using Naïve Bayes, Support Vector Machine, and Convolutional Neural Networks
Classifiers.
Classification Techniques
In general, different types of classifiers are used for text classification in twitter sentiment analysis.
Naive Bayes Classifier
The Naive Bayes classifier's algorithm makes use of all features in the feature vector. The features are
independently analysed by the classifier. The naive Bayes algorithm makes use of conditional probabilities.
Sentiment analysis on Twitter is very efficient due to the presence of independent features such as emotional
keyword, count of positive and negative hashtags, count of positive and negative keywords, emotional keyword,
and emoticons. The relationship between the features is not taken into account in the Naive Bayes classifier for
classification.
Support Vector Machine (Svm) Classifier:
In the SVM classifier, a large margin is used for classification. SVM classifier separates positive and negative
tweets using a hyperplane. g(X) = wTϕ(X)+b (1) ,'X' represents the feature vector, 'w' is the weight vector, and
'b' is the bias vector. Linear mapping() is performed from the input space to the feature space. On the training
set, the letters 'b' and 'w' are automatically learned (Neethu & Rajasree, 2013). For classification, the Linear
kernel is used, and a large gap between two classes is maintained.

539
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Cnn Methodology
CNNs are feed-forward neural networks that use spatially local correlation by enforcing a local connectivity
pattern between neurons in adjacent layers. They are made up of various combinations of convolutional layers,
max pooling layers, and fully connected layers. Convolutional layers alternate with max pooling layers,
mimicking the nature of mammalian visual cortex's complex and simple cells. A CNN is made up of one or
more pairs of convolution and max pooling layers, culminating in a fully connected neural network.

Figure 1: A typical CNN architecture consisting of a convolutional layer, a max pooling layer, and a fully
connected layer
The CNN differs in terms of how the convolutional and max pooling layers are implemented, as well as how the
nets are trained. The net has five weighted layers, as shown in Figure 2, including the input layer, the
convolutional layer C1, the max pooling layer M2, the full connection layer F3, and the output layer. Assume
represents all trainable parameters (weight values), = and i=1,2,3,4, where I is the parameter set between the (i-
1)th and ith layer.

Figure 2: The architecture of the CNN classifier.


Layers C1 and M2 in our architecture can be viewed as a trainable feature extractor to the input HSI data, while
layer F3 is a trainable classifier to the feature extractor. The result of subsampling is the original data's actual
feature. Each original hyperspectral can be extracted into 20 features in the CNN structure, with each feature
having n3 dimensions.

540
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Training Strategies
In this section, we will show you how to learn the parameter space of the CNN classifier. CNN's trainable
parameters should be set to a random value between 0.05 and 0.05. The training procedure is divided into two
stages: forward propagation and back propagation. The forward propagation algorithm attempts to compute the
actual classification result of the input data using the current parameters. Back propagation is used to update the
trainable parameters in order to minimize the difference between the actual classification output and the desired
classification output.
Forward Propagation
The (L+1)-layer CNN network (in this work, L = 4) is made up of n1 input units in layer INPUT, n5 output
units in layer OUTPUT, and several so-called hidden units in layers C2, M3, and F4. Assuming xi is the ith
layer's input and the (l-1)th layer's output, we can calculate xi+1 as

Where

And WiT is a weight matrix of the ith layer acting on the input data, and bi is an additive bias vector for the ith
layer. fi(.) is the activation function of the ith layer. We chose the hyperbolic tangent function tanh(u) as the
activation function in layers C1 and F3 of this architecture. Layer M2 employs the maximum function max(u).
Because of the CNN classifier is multiclass, the output of layer F3 is fed to a n5 way softmax function, which
produces a distribution over the n5 class labels, and the softmax regression model is defined as

The output vector of the layer OUTPUT denotes the final probability of all the classes in the current
iteration.
Back Propagation
The trainable parameters are updated using the gradient descent method during the back propagation stage. It is
accomplished by minimising a cost function and computing its partial derivative with respect to each trainable
parameter. The loss function employed in this study is defined as
We can build the CNN classifier and reload saved parameters for classifying HSI data now that the architecture
and all corresponding trainable parameters have been specified. The classification process is similar to the
forward propagation step in that the classification result can be computed.

4. EXPERIMENTS
All of the programs are written in the MATLAB programming language. The results are generated on a PC with
an Intel Core i7 processor running at 2.8 GHz and an Nvidia GeForce GTX 465 graphics card.
Creation of a Dataset:
Twitter posts about electronic products are used to create a dataset. Tweets are short messages filled with slang
and misspellings. As a result, we conduct a sentiment analysis at the sentence level. This is accomplished in
three stages. Preprocessing is completed in the first phase. Then, using relevant features, a feature vector is
created. Finally, tweets are classified as positive or negative using various classifiers. The final sentiment is
calculated based on the number of tweets in each class.
Preprocessing of Tweets
Because of misspellings and slang words, keyword extraction on Twitter is difficult. To avoid this, a
preprocessing step is carried out prior to feature extraction. Steps in preprocessing include removing URLs and
avoiding misspellings and slang words. By replacing repeated characters with two occurrences, misspellings are

541
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

avoided. Slang words add a lot to the emotion of a tweet. As a result, they cannot be simply removed. As a
result, a slang word dictionary is kept up to date in order to replace slang words in tweets with their associated
meanings. The formation of a slang word dictionary is greatly aided by domain information.
Creation of Feature Vector:
Feature extraction is accomplished in two steps. The first step is to extract twitter-specific features. The relevant
Twitter features are hashtags and emoticons. Positive and negative emojis are both possible. As a result, they
are assigned different weights. Positive emoticons have a weight of '1', while negative emoticons have a weight
of '-1.' Positive and negative hashtags may exist. As a result, the count of positive and negative hashtags is
added to the feature vector as two separate features.
Some Twitter features may not be present in all tweets. As a result, additional feature extraction is required to
obtain additional features. Twitter-specific features are extracted and removed from tweets. Tweets can then be
thought of as plain text. Tweets are then represented as a collection of words using the unigram approach. A
tweet is represented in unigrams by its keywords. We keep a list of negative keywords, a list of positive
keywords, and a list of words that represent negation. Positive and negative keyword counts in tweets are used
as two distinct features in the feature vector. The presence of negation contributes significantly to the sentiment.
So, their presence is also added as a relevant feature.
5. EVALUATION
Using Twitter API, tweets related to products are collected. A dataset is created using 12000 twitter posts of
electronic products. Dataset is resolve in to a training set of 10000 tweets and a test set of 2000 tweets. We used
Stanford postagger for rooting part of speech tag from tweets. Since we've named product domain, there's no
need of analysing private and objective tweets independently. To identify the quality of product, both of these
rates contribute also. This shows how context or domain information affects sentiment analysis. These
classifiers are tested using MATLAB simulator. We used three types of basic classifiers (SVM, Naive Bayes)
and CNN classifier for sentiment classification. SVM and Naive Bayes classifiers are enforced using MATLAB
erected in functions. After creating a feature vector, classification is done using Naive Bayes, Support Vector
Machine, and Convolutional Neural Network Classifiers and their performances are compared.

100
SVM
Naive Bayes
90 iCNN

80

70

60

50
%

40

30

20

10

0
Accuracy Precision Recall
Performance Metrices

Figure 3: Performance of Different classifiers in Twitter Sentiment Analysis


6. CONCLUSION
Sentiment analysis is a grueling and seductive job. In this paper, we apply a convolutional neural network to
solve this problem. We've described an intriguing frame ,CNN on the available twitter dataset grounded on
product reviews. The experimental results suggest that convolutional neural networks that are duly trained can
outperform the shallow classification algorithms. Meanwhile, the way of pretrained fine-tuning is espoused to

542
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

train the convolutional neural network on the natural language processing task, which is better than some other
classifiers as SVM and Naïve Bayes classifier.
REFERENCES
[1] B. Liu, Sentiment Analysis and Opinion Mining, Morgan & Claypool, San Rafael, CA, 2012.
[2] NLP market. https://www.tractica.com/newsroom/press-releases/natural-language-process ing-market-to-
reach-22–3-billion-by-2025/.
[3] Kim, Y. Convolutional neural networks for sentence classification. arXiv 2014, arXiv:1408.5882.
[4] Nal, K.; Grefenstette, E.; Blunsom, P. A convolutional neural network for modelling sentences. arXiv
2014, arXiv:1404.2188.
[5] Lei, T.; Barzilay, R.; Jaakkola, T. Molding cnns for text: Non-linear, non-consecutive convolutions. arXiv
2015, arXiv:1508.04112.
[6] E. Boiy, P. Hens, K. Deschacht, and M.-F. Moens, “Automatic sentiment analysis in on-line text,” in
Proceedings of the 11th International Conference on Electronic Publishing, pp. 349–360, 2007.
[7] J. Kamps, M. Marx, R. J. Mokken, and M. De Rijke, “Using wordnet to measure semantic orientations of
adjectives,” 2004.
[8] C. Fellbaum, “Wordnet: An electronic lexical database (language, speech, and communication),” 1998.
[9] D. Pucci, M. Baroni, F. Cutugno, and A. Lenci, “Unsupervised lexical substitution with a word space
model,” in Proceedings of EVALITA workshop, 11th Congress of Italian Association for Artificial
Intelligence, Citeseer, 2009.
[10] A. Balahur, J. M. Hermida, and A. Montoyo, “Building and exploiting emotinet, a knowledge base for
emotion detection based on the appraisal theory model,” Affective Computing, IEEE Transactions on, vol.
3, no. 1, pp. 88–101, 2012.
[11] C. Strapparava and R. Mihalcea, “Semeval-2007 task 14: Affective text,” in Proceedings of the 4th
International Workshop on Semantic Evaluations, pp. 70–74, Association for Computational Linguistics,
2007.
[12] G. Vinodhini and R. Chandrasekaran, “Sentiment analysis and opinion mining: A survey,” International
Journal, vol. 2, no. 6, 2012.
[13] Y. Mejova, “Sentiment analysis: An overview,” Comprehensive exam paper, available on http://www. cs.
uiowa. edu/˜ ymejova/publications/CompsYelenaMejova. pdf [2010-02-03], 2009.
[14] A. Pak and P. Paroubek, “Twitter as a corpus for sentiment analysis and opinion mining,” in Proceedings
of LREC, vol. 2010, 2010.
[15] R. Xia, C. Zong, and S. Li, “Ensemble of feature sets and classification algorithms for sentiment
classification,” Information Sciences: an International Journal, vol. 181, no. 6, pp. 1138–1152, 2011

AUTHOR DETAILS:
SHWETA BARHATE
Assistant Professor, DECS, RTM Nagpur University, Nagpur- 440033

543
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

LEGAL PROTECTION OF GEOGRAPHICAL INDICATION IN INDIA

DR. NAMAH DUTTA AND PARUL SHARMA

ABSTRACT
Geographical Indications (GI) have arisen as an important kind of Intellectual Property Rights (IPR) concern
in India. Every geographical region has a name and a reputation. Given their financial value, proper legal
protection for GIs is required to prevent their theft. Geographical Indications refer to the features and
attributes of particular items that are due to certain geographical places and are reputable to "as produce of
certain region" (GI). The evolution of Geographical Indications, which has emerged as one of the most
contentious intellectual property rights concerns on a global scale, is of immense importance for a country like
India. This article provides an overview of geographical indicator legal protection in India.

INTRODUCTION
We saw the evolution of geographical indications from the Paris Convention to the World Trade Organization's
(WTO) TRIPs Agreement in the previous chapter. We've also seen how numerous rules and regulations relating
to GI were developed. Initially, each country had its own legal structure for dealing with GI, making some
product trading impossible. It was unavoidable, however with the founding of the WTO and the emergence of
the global trade market, to have a standard set of regulations for GI. To some extent, this was achieved in the
TRIPs agreement of 1995. The TRIPs agreement broadens the extent of GI protection in Articles 22 and 23,
which include safeguards against public misinformation and unfair competition. The TRIPs also outline the
methods for enforcing the agreements, as well as remedies and dispute resolution among the parties. As a result,
the TRIPs agreement became an international legal accord binding on all WTO members. On July 8, 1948,
India joined the GATT, and in 1995, it joined the World Trade Organization. As a result, India is obligated to
include TRIPs clauses into its legislation. In order to comply with TRIPs, India established the Geographical
Indication of Goods (Registration and Protection) Act, 1999, which protects geographical indications in India.
Legal protection of this IPR undoubtedly plays a significant role in commercial relations on both a national and
international level, given the enormous financial value of GIs. If GIs are not protected, they run the risk of being
improperly used by dishonest people and businesses. Because they have the potential to deceive consumers by
taking advantage of the advantages associated with the goodwill and reputation associated with such GIs. Such
unethical business tactics not only result in a significant loss of revenue for the legitimate owners of the GIs in
question, but they also have the potential to harm the goodwill and reputation connected with such indications
in the long run.
Legislation on Geographical Indication in India
Geographical Indications (GIs) have risen as a major protected invention rights concern in India in the recent
past. Around a hundred Indian commodities have been enlisted as GIs since the Indian GI Act took effect on
September 15, 2003. However, there are certain challenges in convincing Indian partners of the potential
benefits of GIs. Aside from the compelling implementation of the rights in the relevant markets (local and fare),
the success of a GI is contingent, in large part, on appropriate showcasing and advancement of the item—
assignments that are asset-intensive as well as difficult to execute for some partners from a developing country
like India. It's even more doubtful whether a significant portion of the benefits accruing from an item's GI status
reaches the true maker downstream in the manufacturing chain, unless a right institutional instrument is in place
to that aim. In India, the legislative framework for GI protection is still being built. In 1999, the Geographical
Indications of Goods (Registration and Protection) Act was passed, and it went into effect in September 2003.
(Hereafter called GI Act)
History and Legislative Intent of G.I. Act 1999
There were no official procedures or any legal law in India to safeguard the makers of those products that were
either or made within the geographic regions of India prior to the GI act, which was adopted in the early years
of 1999. Since then, the judiciary and the administration have been working hard to prevent people from
abusing GI products. As a result of the GI Act's passage, producers are given maximal protection in order to
safeguard their products and combat counterfeiting. As a result, the socioeconomic status of people living in
rural areas improves.

544
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The case of Mohan Meakin Breweries Ltd. v. The Scotch Whiskey Association in 1980 was about a brand name
"Highland Chief" used in relation to a product described as "Malted Whisky" along with a device of a Scottish
gentleman wearing a feather bonnet and plaid and a tartan edging that gives the impression that the product in
relation to which it is used comes from Scotland and is thus likely to deceive or confuse the unwary purchaser
in the applicant's mark on whisky was refused registration by the Delhi High Court. In another case from 1991,
the Hon'ble Justice in Scotch Whisky Association v Pravara Sahakar Karkhana. The defendants were selling
their Whisky under the description "mixed with scotch" combined with the word "drum beater with the device
of a Scottish drummer wearing a kilt or plaid." Mr. D.R Dhanuka, the Scotch Whisky Association, was
successful in restraining the defendants.
The following are the two key occurrences that prompted the necessity for a strong guideline to protect GI:
Basmati Controversy: RiceTec inc., a US MNC based in Alvin, Texas, was given a patent on September 2nd,
1997, for new "lines and grains" in the name of "Basmati" rice by the United States Patent and Trademark
Office. The trademark was granted because RiceTec Inc claimed that the new kind of rice they produced had
better features than original Basmati rice, which can only be farmed in certain locations of North America. They
have been utilizing the trademark names "Texmati", "Kasmati", and "Jusmati" for some years, claiming to be a
Basmati rice variant. This was unacceptable to India because, among other things as
The patent was not validly granted and basmati rice was deemed a GI in India, marketing it was against India's
interests.
Basmati rice is a long-grained aromatic rice type that has been widely grown in sub-Himalayan locales for
generations utilizing traditional methods and traditions. As a result, no other country should be permitted to use
this designation. Indian Basmati rice is exported to a variety of nations, with Europe having the biggest demand.
Basmati rice has an extremely low duty because to the huge demand in Europe. However, as RiceTec Inc.
launched its own Basmati strain, competition among multiple Basmati rice kinds rose, and India worried losing
a large market. RiceTec inc. claimed that the patent was awarded to a new type of 'Basmati' (lines and grains)
that was an improvement over the previous one. They also claimed that Basmati was a generic term for all sorts
of aromatic rice, rather than a specific Indian rice strain. They claimed that the term 'American Basmati,'
'Uruguayan Basmati,' and 'Thai Basmati' had been used interchangeably for decades to describe several rice
kinds such as 'American Basmati,' 'Uruguayan Basmati,' and 'Thai Basmati.' According to them, Basmati is not
a geographical designation, but India says that the rice's name, reputation, and quality are all based on its origin,
which is the Indian subcontinent. As a result, it requires protection under the TRIPs agreement. RiceTec inc.
continued to contend that their products are labelled as "American type Basmati rice," which is prohibited under
the TRIPs agreement for GI under Article 23 for wines and spirits but not for other items.
In the year 2000, India challenged RiceTec Inc.'s patent. Only three types of hybrid Basmati grain were granted
patents by the US Patent and Trademark Office (USPTO), while seventeen types were rejected out of a total of
twenty patents claimed by the company. Because the term Basmati was not a trademark nor a regional
identifier, unlike Champagne, which was distinctive to a place, the patent office stated that patents could be
awarded to the three different varieties of Basmati. They also claimed that Basmati was grown throughout the
Indian subcontinent, not just in India's specific location. As a result, Texamti and Jasmati began to appear on
supermarket shelves in the United States in the mid-1990s. This is entirely against Indian interests, and if rich
countries such as the United States exert pressure on poor countries to allow crop patenting in accordance with
their wishes, developing countries will lose their ability to contest patents on their crops.
Darjeeling Tea Controversy: An event with Darjeeling tea was another important issue that India had to deal
with. Darjeeling tea is a unique variety of tea produced in the Darjeeling area of West Bengal, India. The issue
stemmed from companies all over the world selling tea labelled Darjeeling that was not grown in Darjeeling.
The authentic Darjeeling tea companies were losing a huge market share as a result of these fraudulent
Darjeeling tea products.
As a result, India realized that in order to safeguard its geographical indications over the world, it needed to
establish certain standard laws and regulations. As a result, both chambers of India's parliament enacted the
Geographical Indications of Goods (Registration and Protection) Bill 1999. It, together with the Geographical
Indications of Goods (Registration and Protection) Rules 2002, went into effect on September 15, 2003. Prior to
this, there was no legal doctrine dealing explicitly with geographical indications or appellations of origin. As a
result, Darjeeling tea received the GI tag in 2004, making it the first product to obtain the label.

545
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Salient Features of the Act


The primary occurrences that may be cited in relation to the enactment of the Geographical Indication of Goods
(Registration and Protection) Act 1999 are the Basmati rice and Darjeeling tea issue. The statute establishes
particular guidelines for GI registration and protection. The Controller General of Patents, Designs, and
Trademarks is in charge of enforcing the law. The Registrar of GI is also known as the Controller General.
GIGA's three primary goals are as follows: They are:
(i) Protecting Geographical Indications of Goods in the Country, which could protect the interests of producers
of such goods;
(ii) Misuse of GI by unauthorized persons, as well as protecting consumers from being misled; and
(iii) Promoting Geographical Indications in the Trade Market, which could bring economic prosperity to the
country.
The Indian GIGA Act allows for multilateral GI registrations, which includes owners from other countries.
CHAPTERS IN THE ACT CONTENT
Chapter I Preliminary Commencement as well as the definitions
Chapter II The Register and Conditions for Registration Registration of goods
Chapter III Procedure for and Duration of Registration Procedure including application, withdrawal etc.
Chapter IV Effect of Registration The consequences of GI registration in India
Chapter V Special Provisions Regarding Trademarks and Users Covers the arena of GIs v. Trademarks
Prior Art
Chapter VI Rectification and Correction of the Register Rectifying the applications and errors thereof
Chapter VII Appeals to the Appellate Board Appeals, bar of jurisdiction etc.
Chapter IX Offences, Penalties and Procedure Punishment for falsely using GI
ANALYZING THE DEFINITIONS
1. Geographical Indications
AS per section 2(e) of the Act, "An indication which identifies such goods as agricultural goods, natural goods,
or manufactured goods as originating, or manufactured in the territory of a county, or a region or locality in that
territory, where a given quality, reputation, or other characteristic of such goods is essentially attributable to its
geographical origin and in the case where such goods are manufactured." It defines this as any agricultural,
natural, or manufactured commodities produced or made in any region or locality of that country, where the
product's quality, reputation, or characteristic can be traced back to its geographical origin. It further states that
any term that is not the genuine name of the country's region or municipality is eligible for GI protection. As a
result, names like Navara and Alphonso were eligible for GI.
2. Concept of Goods
The Act further divides 'goods' into five categories:
i) Agricultural products
ii) Natural products
iii) Production of goods
iv) Handcrafted items
v) Consumables.
TRIPs states that the good's quality, reputation, and other attributes should be attributed to its geographical
origin. Any one of the activities, such as production, processing, or production of goods, must occur in the place
of its geographical origin when making goods. Natural elements such as climate and topography, as well as
human factors such as talents, are also mentioned in the GIGA report.
3. Meaning of Indication
The term "indication" has also been defined to include:
(i) Any name (including abbreviations),
(ii) geographical or figurative representations, and
(iii) Any combination or suggestion of the geographical origin or items to which it applies.

546
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

India not only adopted the TRIPs Agreement's terminology, but also offered a precise explanation and meaning
for the terms "geographical indications" and "goods." Unlike Europe, where GI protection is limited to
agricultural items, India has broadened GI protection to include non-agricultural goods. Handicrafts, Indian
jewelry, cuisines, and textiles are all examples of non-agricultural items.
Functions of G.I.
As previously stated, the major goal of GI is to safeguard the items registered under it from a socioeconomic
standpoint.
 It will aid in the identification of bogus products that are being manufactured/produced and marketed in the
market, as well as the taking of legal action against them.
 It will also help makers of products with authentic documentation of origin better their financial situation.
 From the consumer's standpoint, identifying the genuine goods will be simple, resulting in better purchasing
decisions.
 Furthermore, GI contributes to the preservation of culture by retaining ancient production processes. As a
result, the products have a natural and regional personality.
The purpose for which the GI Act was enacted in India is defined by these functions. Many products require
specific protection and care in a country like India, which is diverse in terms of its people and regions. The
answer to the dilemma is GI. There are several strategies for locating and comprehending a regional indication.
These functions also aid in the differentiation of two GIs and make GI application simpler and easier. All of the
information concerning GI is now available on the website. The site includes information on the GI registration
process as well as a GI registry with information on the registered GI goods in India to date.
Judicial Response to the Act
Some products, like Champagne, which is a normally sparkling wine produced in the Champagne region of
France by a two-stage maturation process using grapes grown exclusively in the Champagne region of France,
or Darjeeling tea, which is a premium tea produced in the sloping areas of Darjeeling in the Indian state of West
Bengal, are unique because they can only be produced in a particular geological area. These products are
assumed to be authentic due to a correlation between their qualitative characteristics and the geological
characteristics of their manufacturing area. In addition to agricultural products like tea, rice, wine, spices, and
natural products, these commodities also include handicrafts like sarees or cloaks, metal with traditional artwork
on it, or even food like Prosciutto di Parma or Hyderabad Haleem. Such items frequently seek property rights
based on how they are produced in a topographical region with distinctive geoclimatic conditions and traditional
skills. These items cannot be replicated anywhere else because of their unique properties, which provide an
amazing motivation to the item. To use the corresponding geological word for them, there is no defense for the
merchandise seeping from another location. It will inevitably be a deceit, and as a result, an uncommon right is
preferable to an action that requires proof of misinterpretation. An appropriate rule for securing land signs
would achieve this in order to balance the knowledge imbalance between the maker and the purchasers and
allow them to participate as much as possible in improving the quality and, consequently, the notoriety of the
great. One of India's most important pillars is the judiciary. It serves as a gatekeeper for the locals' interests. To
ensure unbiasedness in the organization of equity in India, the legal executive is separate and independent of the
official. The extent of legal survey perceived by India's higher legal executive is the largest and most
comprehensive of any law-based organization on the world. In addition to establishing new norms and precepts
in managing new conditions, the legal executive is not yet restricted by the interpretation of laws. Prioritization
is determined by the legal executive's selection, and it is critical that the legal executive be knowledgeable with
the laws and their recommendations. The judicial response to the concept of geographical indications has
always been in favor of creating as many GIs as possible while minimizing duplicity. In this process, it becomes
vital to maintain the geographical indications of such areas in India that stand out against the world at macro-
level management, as India is a land of diverse culture, cuisines, and lifestyles. Cases like Basmati rice and
Darjeeling tea, as discussed in the previous chapter, have proven the above assertions.
In the first lawsuit, Scotch Whisky Association v. Pravara Sahakar Karkhana Ltd., the defendants participated in
colorable imitation, out-of-line exchanging, and the use of the terms Blended with Scotch in order to obtain out-
of-line benefits through the appointment of the aggrieved party's generosity. The respondent was prohibited
from marketing or offering for sale or distribution in any country Whisky that was not Scotch whisky. The legal
executive in India has reliably stretched the umbrella of lawful assurance to GIs, as evidenced by the
aforementioned choice, albeit without any enactment in force at the time. In the case of Anton Piller v.
Manufacturing Processes, the same thing happened.
547
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

G.I. Process in India


Geographical Indication, often known as GI Tags, is an intellectual property right conferred on a product that
originated from a specific geographical location and possesses intrinsic or reputable features as a result of that
area. Roquefort Cheese, a rare sort of blue cheese aged in Roquefort-Sur-Soulzon, France, and Mysore Silk
Saree, created in the KSIC factory in Mysuru, are two instances of GIs. The TRIPS Agreement recognizes GI as
an intellectual property right in Article 22. It requires member states to safeguard the identity of products that
originate from a certain geographical location, as well as to prohibit the use of that identity for any other
product that does not originate from that location, in order to protect the public from being misled. India, as a
TRIPS signatory, enacted the Geographical Indication of Goods (Registration and Protection) Act, 1999, and
the Rules on Geographical Indication of Goods (Registration and Protection), 2002.
1. Ordinary application: a request to register a Geographical Indication of India (GII).
2. Convention application: a GI registration application submitted by a convention country, which is defined as
any country or group of nations that are signatories or parties to an international region or bilateral treaty. It
should include proof of the GI's registration in the home nation.
3. A single class application is one that is submitted for the registration of GI in fewer than one category class.
4. A multi-class application is one that is made for the registration of a GI under many categories of products.
The registration of GI is made to the registrar by associations or communities of producers of the concerned
items, as the registrar is the appellate officer of GI. The application must include:
(i) A declaration showing that the product's origin, quality, reputation, or other qualities are due to human and
natural causes, as well as procedures such as production and processing that take place in a certain location or
territory. Without any supporting samples, the product should be described as a valid Geographical Indication.
(ii) Appropriate journals or reports with a distinctive feature of the product should be produced to the concerned
individuals inspecting the goods.
(iii) A map or geographical representation of the country's territory must be submitted.
(iv) If a product's color, for example, is claimed to be an element of a GI in an application for registration, the
application must include a clear explanation of the attribute's significance.
G.I. Registration Process in India

Figure I- G.I. Registration process in India


548
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Filling of the Application

Figure II- Filling of the Application


Infringement of Registered G.I.
The law relating to the infringement of registered GI is outlined in Section 22 of the GIGA. Infringement of a
GI occurs when a person uses any registered GI in any of the designations or presentations of goods that
indicates the origin of such goods is a geographical area other than its true place of origin, which may mislead
the public, or when a person uses a GI in any of the designations or presentations of goods that acts as unfair
competition with respect to the registered GI. Under section 21(b), there are two explanations that provide a
clear grasp of the word "unfair competition." According to Explanation 1, unfair competition is any form of
competition that is not in line with the industry's or market's ethical principles. Explanation 2 is divided into
three sections, each of which states:
(I) any act by the product's competitor that may cause misunderstanding in the industry and market with respect
to the original GI registered product.
(II) False claims made by a competitor in order to undermine the original product or the company that makes it.
(III) Using GI qualities such as product characteristics, an indicator of the product's origin, and product quality
that may deceive the consumer. A representation of a product originating in a specific location or region, for
example, that is analogous to a registered GI product.
From the foregoing, it is obvious that once a product is registered as a GI, it is granted statutory rights and
remedies to protect it from unlawful use. However, simply being listed in the GI registry does not protect a
product against piracy. The indication must be renewed within the timeframe specified in section 18 of the
GIGA. Those products whose registration has not been renewed and whose names still appear in the GI registry
as a result of any delays will not be deemed registered GIs, and no action against infringement will be pursued.
As a result, any unauthorized user who presents their products using registered GI in a way that suggests the
products' true place of origin is somewhere else, potentially misleading the public, is violating the registered GI.
549
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Enforcement for G.I.


There are two types of remedies available for GI protection.
a. Civil
b. Criminal
CIVIL REMEDIES: Infringement or passing off processes may be initiated by holders of enlisted GI against
an infringer. The infringer can file a lawsuit in a court with jurisdiction equal to or greater than that of the
district court. The civil remedies available for infringement of GI are listed below.
(a) Injunction- There are two types of injunctions: temporary and permanent. An order for the insurance of
infringement of linked goods, records, or other proof in relation to the suit's subject is permissible. An order is
given prohibiting the respondent from disposing or managing his items in a manner that may adversely affect
the ability of aggrieved parties to recover damages, costs, or other financial remedies that may be provided to
the offended party as compensation. The previously suggested remedy for disorder is gradually effective and
can help the offended party avoid more serious damage. The offending party may also be offered additional
unusual remedies.
(b) Penalty- To deter infringers from committing infringement, a remedy of damages or profit accounts is
available. This is a different treatment option. Damages or profit accounts may be barred. Where the litigant
proved to the court that he was unconscious and that there was no reasonable justification for it, assuming that
the injured party's GI was registered while he was busy with using it, and that when he became aware of its
presence and nature, he stopped using it.
The court concluded that the offended party's privileges had been encroached upon in Scotch Whisky
Association v Golden Bottling Limited, where Scotch whisky had a GI tag and offended parties claimed that the
respondents encroached on their GI tag by selling its Whisky as 'Red Scot.' The court granted the injured party's
request for a permanent injunction and damages, as well as the respondent's cost of prosecution.
(c) Delivery of the infringing labels and indications containing products- By considering applicable criteria, the
court could possibly arrange for the offender to deliver up infringing labels and signs for destruction. All of the
aforementioned damages are also available for the purpose of passing off. Passing off actions began in response
to the infringement of unregistered GI.
CRIMINAL REMEDIES: Criminal solutions are more effective than customary cures because the former can
be carried out more quickly. The existence of a common action does not justify the delay of a criminal
proceeding involving a similar investigation. Because criminal processes directly attack an infringer's respect
and society status, he may seek an out-of-court settlement to protect his reputation. Section VIII of the Act deals
with criminal offences and their penalties.
The Act incorporates a penal scheme for infringements of several GI-related agreements, which are listed
below.
a. Fudging geological signs and applying them incorrectly to items.
b. Selling items with fictitious geological signs on them.
c. Misrepresenting a topographical sign as being enrolled.
d. Misrepresenting a corporate position as being linked.
e. Forgery of parts of the register.
The suggested punishment for the aforementioned offences ranges from six months to three years in prison and
a fine of not less than rupees 50,000 but not more than rupees two lakh. Regardless, the court may impose a
lighter punishment if there are substantial and compelling reasons.
Foreign Applicants
The majority of GI applications and enrollments currently on the Indian GI Register have Indian elements.
However, numerous overseas candidates have recently been successful in obtaining GI insurance in India,
which is advantageous for right proprietors. PISCO was the first remote GI application in a long time, and it
was filed under Section 84 of the Act, which allows items from outside sources that have gained sufficient
renown in India to apply for enrolment. PISCO is an indigenous liquor made from 'Pisquera grapes' using
traditional production and refining techniques unique to the region and country of origin.
550
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

G.I. In India
Enrolling in the GI program in India has a number of advantages, including legal insurance in India and the
prevention of unapproved use of an enrolled GI by others. It facilitates the expansion of Indian GI trades, as
well as the financial blooming of manufacturers of products delivered in a land an area. It also facilitates the
search for genuine security in other WTO member countries. GI registrations began in India in April 2004 and
wares are classified into four categories: agriculture, food, handicrafts, and manufactured goods. The data for GI
categories in India is shown in the table below.

209 Gis Registered In India Are Handicrafts Followed By 109 Agricultural Products
The products are divided into four categories by the GI registry: agricultural, manufactured, handicraft, natural,
and food stuff. A study of the registered GIs by category reveals that 209 are handicrafts and 109 are
agricultural items. Together, these two groups account for 58 percent and 30 percent of all GIs registered in
India to date. The remaining 12% is made up of 24 manufactured goods, 17 food items, and 2 natural goods.
The two natural products are Rajasthan's Makrana Marble and Uttar Pradesh's Chunar Balua Patthar.
Maximum Number of Gis Were Registered in the Year 2008-09
Each financial year, data on the registration of GIs in India is kept. Only Darjeeling Tea, Aranmula Mirror, and
Pochampalli Ikkat were registered in the first financial year, 2004-05, when registrations commenced. In 2008-
09, there were the most entries to the registry, with 45 products receiving the GI tag. The GI tag was applied to
33 items between April 2016 and March 2017. As of September 2019, 18 goods had been registered under GI
for the 2019-20 fiscal year. The graph below depicts the number of items in India that have obtained the GI
label each year.

551
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The GI Logo is Widely Recognized.


In June 2019, the Ministry of Commerce and Industry's Department for Promotion of Industry and Internal
Trade issued a notification outlining the rules for the uniform GI logo and slogan on all Indian GIs. The Indian
flag's three colors are represented by a 'G' and a 'I' in the logo. 'Invaluable Treasures of Incredible India' is the
English tagline, and the Hindi version is the same.
The use of this mark allows consumers all around the world to recognize genuine Indian GI products. It also
aids in the marketing and promotion of Indian products. This logo may not be used on foreign GI products.

Darjeeling Tea was the first item in India to receive a Geographical Indication (GI) under the Agricultural
Goods category. Until March 2019, 343 products were awarded GI labels (list released by the enlisting center of
land signs, Chennai, with 329 being of Indian origin and 14 being from other countries. The graphic depicts GI
enrollments from various Indian states and union areas. Karnataka topped the list of GI enrollments, followed
by Maharashtra, Tamil Nadu, and Kerala, with Jharkhand, the Lakshadweep Islands, Chandigarh, and the
Andaman and Nicobar Islands trailing behind. Zone astute GI enrollments show that the southern zone, with
137 out of 329 GIs, is the most popular, followed by the western zone, despite the focal zone has the fewest.
The GI enlistment rate in the southern zone is much higher than in the western zone. GI enrollments from
southern states are divided into four categories, which also include GIs that are common in several states.
Karnataka has the greatest number of GI enrollments for both handicrafts and horticulture items, followed by
Kerala, and Tamil Nadu has the highest number of GI enrollments for laborious work. Karnataka is the only
state that has GI enrollments in all four classifications, while Andhra Pradesh, Telangana, and Tamil Nadu have
GI enrollments in three classifications, Kerala has GI enrollments in two classifications, and Puducherry has GI
enrolment as a result of laborious work. GIs are, in a sense, legal insurance for products with high criticality.
India is endowed with a rich heritage of culture and customs that have flourished for hundreds of years. In
addition, it has a diverse biodiversity and agro-climatic conditions, resulting in a plethora of geographic-specific
IPR goods in farming and other sectors. The GI membership is significant in a country like India, as evidenced
by Basmati rice, which has a remote fare winning of about'38,443 crore. By and large, a set number of goods
have been enlisted under GI, and many more items with a presence in different states have the potential to be
enrolled. The awareness of potential issues related to the enrollment process, as well as its social and financial
benefits Furthermore, in order to obtain a GI tag, the importance of makers and brokers must be expanded.
CONCLUSION
India is a country where a large number of GI have been discovered all across the country. It is, for the most
part, a direct result of improved weather circumstances, human abilities, and regional customs. For a developing
nation like India, GI can be a sizable source of income if properly acknowledged and safeguarded. India has
agreed to offer protection for goods with a GI tag because it has signed the TRIPS Agreement. The GI Act,
which went into force on September 15, 2003, and the GI Rules were crucial in ensuring that the GI India was

552
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

adopted, and they continue to be so today. The national government has established a Geographical Indications
Registry in Chennai, which has an all-India scope, where right-holders can register their GI. Unlike TRIPS, the
GI Act does not limit its special assurance to just wines and spirits. The federal government has the discretion to
determine which objects require higher levels of protection. The drafters of the Indian Act purposefully used
this process in order to provide severe assurance to GI of Indian birthplace as guaranteed under the TRIPS
Agreement. Enlistment for the GI is not required in India. The owner of a GI may file a lawsuit if they are
covered by the GI Act and there is an encroachment occurrence. When a GI enrolls in India, finding insurance
in other nations becomes much simpler. Therefore, protecting GI in a nation like India will result in significant
financial gain.
REFERENCES
1. Das, Kasturi (2004), ‘Geographical Indications in Jeopardy’, ‘India Together’, April, available at:
http://www.indiatogether.org/2004/apr/eco-tradeGIs.htm.
2. 17 (1980) DLT 466
3. AIR 1992 Bom 294, 1992 (2) BomCR 219
4. Darjeeling tea is a tea manufactured from Camellia sinensis var. sinensis cultivated and processed in the
West Bengal districts of Darjeeling and Kalimpong.
5. The Geographical Indications of Goods (Registration and Protection) Act, ACT NO. 48 OF 1999, Section
2(e)
6. The Geographical Indications of Goods (Registration and Protection) Act, ACT NO. 48 OF 1999, Section
2(f)
7. Supra n4, Section 2(g)
8. (1976) RPC 719.
9. Roquefort is a sheep dairy cheddar from Southern France and one of the world's most well-known blue
cheeses.
10. 129 (2006) DLT 423, 2006 (32) PTC 656 Del.

AUTHOR DETAILS:
1
DR. NAMAH DUTTA AND 2PARUL SHARMA
1
Professor and 2LL.M Scholar, UILS, Chandigarh University

553
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

ELECTRONIC PRODUCTS PRODUCTION INVENTORY MODEL WITH EXTENDED


PRODUCER’S RESPONSIBILITY COST PARAMETERS

M. KASI MAYAN, NIVETHAMARTIN AND D. SELVI

ABSTRACT
The fastest growing electronic industries largely generate E-waste of different types. The world health reports
alarm the hazardousness of the dreadful electronic wastes to the mankind and to the environment. Inspite of
strict enforcement of environmental regulations on the electronic production sectors, the rate of waste
generation is quite high. As a means of mitigating E-waste generation, this paper suggests to establish recycling
stations as a step towards the practice of Extended Producer’s responsibility (EPR). The production inventory
model developed in this paper comprises of EPR associated cost parameters with demand dependent on price
and quality and also it considers all the costs pertinent to recycling of electronic wastes of various forms.
Keywords: Electronic Product Inventory, EPR, E-waste minimization.

INTRODUCTION
Electronic industries are robust at present digital age and they drive Indian nation’s economic growth. The
electronic product producing industries are blooming to accomplish the growing demands of the consumers and
the increasing number of E-products users accelerate the progress of these industries. The challenges of
electronic industries shall be assorted into internal and external. The internal challenges shall be discussed under
three major domains of product design, product production and quality management. The external challenge
comprises of E- waste management. The generation of waste occurs mainly in three phases in an electronics
industry namely input phase, production phase and the output phase. In the input phase the waste generation
begins from the input materials. As the industries are more concerned on quality sustenance not all input
materials enter the production phase after quality inspection. A portion of it turns out to be waste but it is quite
negligible. During the production phase the generation of waste occurs in two ways one is the production
wastes and the other is the defective product caused by technical error and human recklessness. The former type
of waste is expelled out during the output phase after treatment and the latter enters the repairing service. The
output phase consists of finished products and E-waste generated from the production processes. Inspite of
several available waste management methods, the challenge of E-waste management is still a growing concern
of the electronic industries. The government of India is taking many initiatives to manage E-waste with the help
of many government bodies through the ministry of environment. But the results are not highly satisfying and
henceforth the concept of EPR has started to gain momentum at recent times.
The roots of EPR has originated in European nations in 1980s and it has widespread to other nations. Germany
was the first nation to introduce EPR in 1991 and it was based on the principle of polluter pay. The
environmental concerns are growing across the globe and it is the need of the hour to impose such a kind of
responsibilities over the producers towards sustainable development. The main objective if institutionalizing
EPR is to develop a sense of shared responsibility to the producers company in waste minimization especially
involving electrical components and plastic packaging. Kibert has described how EPR can be made as a tool in
sustainable development. Allison has stated about different cost parameters involved in exercising EPR and has
suggested few new recycling programmes which industries that practice for creating effective waste operation
system. The objective of EPR is to make the manufacturers realize their responsibility in the process of waste
management. This approach marks new beginnings of shouldering the responsibilities of mitigating the waste
generated in the hands of the product producers. Under EPR, the manufacturers facilitate and make suitable
provisions to collect waste generated by the products produced on their own. Around 35 % of small electronic
products are covered under EPR. The electronic producing companies shall exercise EPR as a step towards
mitigating the generation of E-waste. Recycling of E-waste and remanufacturing of defective E-products are the
two most common strategies used by the production companies towards E-waste management and many
inventory models are formulated in the perspective of mitigating E-waste.
Ruidas et al [12] developed a production inventory model of products with high definition technology and also
considered different production runs and product variation. Fettermann et al [5] discoursed on inventory
management with reference to small scale electronic industry. Yadav et al [7], Miah et al [10], Arindum
Mukhopadhyay [8] have developed production inventory model for electronic components together with e-

554
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

waste minimization costs. In addition to electronic products production inventory models the researchers have
formulated inventory models to minimize E-waste generation. Sasireka et al [9], Ritha et al [11] have
constructed inventory models together with E-waste management cost parameters. Y-S. P. Chiu et al [2],
Biswajit Sarkar et al [3], Nobil et al [4], Hui-Ming Wee et al [1], Nita H. Shah et al [6] developed
remanufacture inventory models focussing on reworking of imperfect products. In these models the imperfect
production systems and the associated cost parameters are considered in determining the optimal order quantity.
In line with it Tapan proposed a profit maximization inventory model characterized by quality features and
price dependent demand pattern. Such kind of models clearly lay the picture of companies earning profit from
reworking of defective products. The literature on e-waste management inventory models are very limited to the
best of our knowledge. Also the earlier developed inventory models pertaining to E-waste management
comprises of costs associated with recycling and remanufacturing of defective items. But these inventory
models comprise of cost components related to internal E-waste management and not the external entities. This
paper develops an electronic product production inventory model comprising of the costs associated on
exercising EPR at local levels. The paper is organized as follows, section 2 presents the model development;
section 3 validates the proposed model with a numerical example, sensitivity analysis and the last section
concludes the paper with discussion of the results and future scope of the research work.
2. MODEL DEVELOPMENT
Let us consider the electronic products production system embedded with well-defined technology and
machinery and let P(r) be the quantity produced during the time period [0,t1] and the production takes place only
during this time period and stops at time t = t1. The production system aims in quality sustenance and
minimization of E-waste. The generation of flawed products commonly takes place due to mishandling of
equipment and human error. Let τ be the percentage of flawed items produced during the time of production and
(1- τ) be the percentage of non-flawed items. On intense screening of the flawed items it is found that ω portion
of the flawed items are reusable after minor mending and γ portion of the flawed items are reusable after major
mending. Also (1- ω - γ) portion of the flawed items enters the scrap and it is subjected to treatment before
disposal. During the time period [t1,t2] , demand fulfillment only takes place. At time t=t2, the inventory is
replenished with the repaired ω portion of the flawed items and again at time t = t 3 the inventory is replenished
with the repaired γ portion of the flawed items. Meantime during this process of internal E-waste management,
the production system also exercise its extended producers responsibilities of collecting the e-waste generated at
the end of the product life cycle.
Let us consider the situation where the production system periodically collects the e-waste from their local
distributors. The (1- τ) non-flawed products are transported to the customers through ‘n’ distribution centres
(here n = 3 for the purpose of modeling). The portion of non-flawed products that are transported to three
distribution centres are σ1, σ2 and σ3 respectively. Among the distributed non-flawed items a significant portion
of the items say μ1, μ2 and μ3 are collected back respectively at the end of its product life cycle and sent to the
recycling stations set up in the production system and a portion of φ1, φ2 and φ3 of the collected e-waste are
disposed after treatment. The recycling process takes place separately as an external step towards E-waste
management. The production system makes profit out of the recycled products and it adds to their revenue.
NOTATIONS AND ASSUMPTIONS:
𝑃
P(r)− production rate, P(r)=P1 + 𝑟2 ,0< r1≤ r ≤1 ----- (1)

D (k,r) – demand rate


𝑘 – Mark up charge for selling
𝑟 – Quality level
τ – Percentage of flawed items produced
ω - Percentage of flawed items reusable after minor mending
γ - Percentage of flawed items reusable after major mending
Cmi – Minor mending cost per unit
Cma – Major mending cost per unit
Cp – unit production cost, a+br, (a, b are constants)

555
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Ch – unit holding cost, p+qr2 (p, q are constants)


Ci– initialization cost
CT – Technology cost
CE – Equipment maintenance cost
CCC – Cost of establishing collection centres
CR – Cost of setting recycling stations
CTr – Cost of collecting E-waste from the collection centres to recycling station.
CRY – Cost of recycling per unit.
CSR – Selling price of recycled unit
CD – Disposal cost per unit
CTT – Waste treatment cost per unit

Figure 1: Inventory Level of E-waste


REVENUE CALCULATION
The average net revenue is calculated as follows
Quantity produced during [0, 𝑡1] = P(𝑟)t1
Quantity of flawed items = τ P(𝑟)t1
Quantity of repairable flawed items = 𝜔𝜏 P(𝑟)𝑡1+ 𝜏𝛾P(r)t1
Quantity of non repairable faulty items that will be removed = (1- ω - γ) τ P(𝑟)t1
Quantity of perfect items produced = (1 − 𝜏 )P(𝑟)𝑡1.
Quantity of inventory J1 at time t=t1 = [(1 − 𝜏 )P(𝑟)– D(k,r)] 𝑡1
Quantity of inventory J2 at time t= t2 = 𝜔𝜏 P(𝑟)𝑡1
Quantity of inventory J3 at time t= t3 = 𝜏𝛾P(r)t1
Total Minor mending cost = Cmi 𝜔𝜏 P(𝑟)𝑡1
Total Major mending cost = Cma 𝜏𝛾P(r)t1
Total production cost in a cycle = 𝐶p(𝑟)P(𝑟)𝑡1.
Total disposal cost = CD [(1- ω - γ) τ P(𝑟)t1]
𝐶ℎ (𝑟)
Holding cost = ( )[J1t2+J2t3+J3(T-t3)]
2
556
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Transportation cost of the items to the recycling stations = CTr [μ1 σ1+ μ2 σ2 + μ3 σ3]
Total disposal cost = CD [[(1- ω - γ) τ P(𝑟)t1] + φ1μ1 σ1+ φ2μ2 σ2 + φ3μ3 σ3]
1 𝐽
t2=t1+𝐷(𝑘,𝑟)
2 𝐽
t3=t2+𝐷(𝑘,𝑟)
3 𝐽
T = t3+𝐷(𝑘,𝑟)
(1−𝜏)𝑃(𝑟)𝑡1
t2=
𝐷(𝑘,𝑟)
[(1−𝜏)+𝜔𝜏]𝑃(𝑟)𝑡1 ]
t3=
𝐷(𝑘,𝑟)

Gross revenue = k 𝐶p(𝑟) [(1 − 𝜏) + 𝜔𝜏 + 𝜏𝛾]𝑃(𝑟)𝑡1 + CSR [(1-φ1 )μ1 σ1+ (1-φ2 )μ2 σ2 + (1-φ3 )μ3 σ3 ]
1
Total Revenue = 𝑇 ×[gross revenue −Setup cost – Minor mending cost – Major mending cost – production
cost – disposal cost – initialization cost – Technology cost– Equipment maintenance cost – Cost of establishing
collection centres – Cost of setting recycling stations– Cost of collecting E-waste from the collection centres to
recycling station.– Cost of recycling per unit – Selling price of recycled unit – Disposal cost per unit – Waste
treatment cost per unit – holding cost
1
= [(1−𝜏)+𝜔𝜏+𝜏𝛾]𝑃(𝑟)𝑡1 ×[ k 𝐶p(𝑟) [(1 − 𝜏) + 𝜔𝜏 + 𝜏𝛾]𝑃(𝑟)𝑡1 + 𝐶𝑆𝑅 [(1 − 𝜑1 )𝜇1 𝜎1 + (1 − 𝜑2 )𝜇2 𝜎2 +
𝐷(𝑘,𝑟)
(1 − 𝜑3 )𝜇3 𝜎3 ] – 𝐶𝑠 – 𝐶𝑚𝑖 𝜔𝜏 P(𝑟) 𝑡1 – 𝐶𝑚𝑎 𝜏𝛾P(r)t1 − 𝐶p(𝑟)P(𝑟)𝑡1 − CD [(1- ω - γ) τ P(𝑟)t1] − 𝐶𝑖 – 𝐶𝑇 – 𝐶𝐸 –
𝐶 (𝑟)
𝐶𝑐𝑐 – 𝐶𝑅 – 𝐶𝑇𝑟 – 𝐶𝑅𝑌 – 𝐶𝑆𝑅 – 𝐶𝐷 – 𝐶𝑇𝑇 – (2𝐷(𝑘,𝑟)

) [{{(1 − 𝜏)2 + [ 𝜔𝜏(1 − 𝜏) + (𝜔𝜏)2 +𝜔𝛾𝜏 2 ]} (𝑃(𝑟))2 −
𝐷(𝑘, 𝑟)(1 − 𝜏) 𝑃(𝑟)}𝑡12 +(𝜏𝛾𝑃(𝑟)𝑡1 )2 ]]
𝐷(𝑘,𝑟)𝐶𝑆𝑅 [(1−𝜑1 )𝜇1 𝜎1 + (1−𝜑2 )𝜇2 𝜎2 + (1−𝜑3 )𝜇3 𝜎3 ]
= k 𝐶p(𝑟) 𝐷(𝑘, 𝑟) + [(1−𝜏)+𝜔𝜏+𝜏𝛾]𝑃(𝑟)𝑡1

𝐷(𝑘, 𝑟)[ 𝐶𝑠 + 𝐶𝑖 + 𝐶𝑇 + 𝐶𝐸 + 𝐶𝑐𝑐 + 𝐶𝑅 + 𝐶𝑇𝑟 + 𝐶𝑅𝑌 + 𝐶𝑆𝑅 + 𝐶𝐷 + 𝐶𝑇𝑇 ]



[(1 − 𝜏) + 𝜔𝜏 + 𝜏𝛾]𝑃(𝑟)𝑡1
𝐷(𝑘, 𝑟)[ 𝐶𝑚𝑖 𝜔𝜏 + 𝐶𝑚𝑎 𝜏𝛾 + 𝐶𝑝 (𝑟)] 𝐷(𝑘, 𝑟)𝐶𝐷 [[(1 − 𝜔 – 𝛾)𝜏 ]]
− –
[(1 − 𝜏) + 𝜔𝜏 + 𝜏𝛾] [(1 − 𝜏) + 𝜔𝜏 + 𝜏𝛾]
𝐶 (𝑟)𝑡
ℎ 1
− 2[(1−𝜏)+𝜔𝜏+𝜏𝛾] [{(1 − 𝜏)2 + [ 𝜔𝜏(1 − 𝜏) + (𝜔𝜏)2 + 𝜔𝛾𝜏 2 ]}𝑃(𝑟) − 𝐷(𝑘, 𝑟)(1 − 𝜏) + (𝜏𝛾𝑃(𝑟) )2 ] ----
(2)
SOLUTION OF THE MODEL
The necessary conditions for the existence of a maximum value of ANR for a given value of 𝑟 are
𝜕𝐴𝑁𝑅 𝜕𝐴𝑁𝑅
𝜕𝑡1
=0 , =0 -------------------(3)
𝜕𝑘

Now
𝜕𝐴𝑁𝑅
=0
𝜕𝑡1

2𝐷(𝑘,𝑟)[ 𝐶𝑠 + 𝐶𝑖 + 𝐶𝑇 + 𝐶𝐸 + 𝐶𝑐𝑐 + 𝐶𝑅 + 𝐶𝑇𝑟 + 𝐶𝑅𝑌 + 𝐶𝑆𝑅 + 𝐶𝐷 + 𝐶𝑇𝑇 −𝐶𝑆𝑅 [(1−𝜑1 )𝜇1 𝜎1 + (1−𝜑2 )𝜇2 𝜎2 + (1−𝜑3 )𝜇3 𝜎3 ]]
t1=√
𝐶ℎ (𝑟)(𝑝(𝑟)[{(1−𝜏)2 +[ 𝜔𝜏(1−𝜏)+(𝜔𝜏)2 +𝜔𝛾𝜏2 ]}𝑃(𝑟)− 𝐷(𝑘,𝑟)(1−𝜏)+(𝜏𝛾𝑃(𝑟) )2 ]

--------------- (4)
lso
𝜕𝐴𝑁𝑅 2𝐷(𝑘,𝑟)[𝐶𝑆𝑅 [(1−𝜑1 )𝜇1 𝜎1 + (1−𝜑2 )𝜇2 𝜎2 + (1−𝜑3 )𝜇3 𝜎3 ]−[ 𝐶𝑠 + 𝐶𝑖 + 𝐶𝑇 + 𝐶𝐸 + 𝐶𝑐𝑐 + 𝐶𝑅 + 𝐶𝑇𝑟 + 𝐶𝑅𝑌 + 𝐶𝑆𝑅 + 𝐶𝐷 + 𝐶𝑇𝑇 ]]
𝜕𝑡12
= [(1−𝜏)+𝜔𝜏+𝜏𝛾]𝑃(𝑟)𝑡1 3
<0-
-(5)
It implies that ANR is maximum at t1 for given k and r.

557
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Moreover
𝜕𝐴𝑁𝑅
=0
𝜕𝑘
𝐶𝑆𝑅 [(1−𝜑1 )𝜇1 𝜎1 + (1−𝜑2 )𝜇2 𝜎2 + (1−𝜑3 )𝜇3 𝜎3 ]
= 𝐶p(𝑟) 𝐷(𝑘, 𝑟) + [𝑘 𝐶𝑝(𝑟) + [(1−𝜏)+𝜔𝜏+𝜏𝛾]𝑃(𝑟)𝑡1

[ 𝐶𝑠 + 𝐶𝑖 + 𝐶𝑇 + 𝐶𝐸 + 𝐶𝑐𝑐 + 𝐶𝑅 + 𝐶𝑇𝑟 + 𝐶𝑅𝑌 + 𝐶𝑆𝑅 + 𝐶𝐷 + 𝐶𝑇𝑇 ] [ 𝐶𝑚𝑖 𝜔𝜏+ 𝐶𝑚𝑎 𝜏𝛾+𝐶𝑝 (𝑟)] 𝐶𝐷 [[(1− 𝜔 – 𝛾)𝜏 ]]
− [(1−𝜏)+𝜔𝜏+𝜏𝛾]𝑃(𝑟)𝑡1
− [(1−𝜏)+𝜔𝜏+𝜏𝛾]
– [(1−𝜏)+𝜔𝜏+𝜏𝛾]
+
𝐶ℎ (𝑟)𝑡1 (1−𝜏)
2[(1−𝜏)+𝜔𝜏+𝜏𝛾] 𝑘
]𝐷 ----(6)

The sufficient conditions are given below for existence of maximum


𝜕2 𝐴𝑁𝑅
1) <0
𝜕𝑡12

𝜕2 𝐴𝑁𝑅
2) <0
𝜕𝑘 2
2
𝜕2 𝐴𝑁𝑅 𝜕2 𝐴𝑁𝑅 𝜕2 𝐴𝑁𝑅
3) 𝜕𝑡12
⋅ 𝜕𝑘 2
− { 𝜕𝑡 } >0
1 𝜕𝑘

We have already proved the first condition


∂2 ANR
Hence
∂k2
= 2Cp (r)Dk (k, r) + [kCp (r) − A(t1 ) + B(t1 )]Dkk
We have proved the second condition. Analytic proof is difficult but with the help of model parameters this can
be proved and the optimal value of ANR can be found
The Optimum Production quantity Q* = P(r)t1

2D(k,r)[ Cs + Ci + CT + CE + Ccc + CR + CTr + CRY + CSR + CD + CTT −CSR [(1−φ1 )μ1 σ1 + (1−φ2 )μ2 σ2 + (1−φ3 )μ3 σ3 ]]
=√ D(k,r)(1−τ)
Ch (r)[{(1−τ)2 +[ ωτ(1−τ)+(ωτ)2 +ωγτ2 ]}− +(τγ )2 P(r)]
P(r)

-------------- (5)
Algorithm:
The following is an algorithm to solve the problem.
Step 1: Choose a demand pattern. Model parameters must be provided.
Step 2: Choose the increment of q, say i. Let i be 0.1 or 0.01. Set a counter j such as j=1.
Step 3: Take r = r1 and k=1.
Step 4: Using (4) find the value of t1 .
Step 5: Using (6) find the value of k.
Step 6: Steps 2,3 and 4 must be repeated until t1 and k are consistent.
Step 7: Find ANR using (2). Allow this value to be ANR(j).
Step 8: r = r1 + i
Step 9: If r > 1, proceed to the next step. Else put j=j+1 and proceed to Step 3.
Step 10: From all the ANR (j) find ANR (j) for which ANR is maximum. The model’s solution will be
determined by r, k and t1.
Step 11: Stop.
4. NUMERICAL EXAMPLE
The demand rate is taken in a linear demand form D(k,r) = l+mr −nk where l,m,n > 0 and the secondary data is
obtained from the literature.

558
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table1: Input data of the Model


Parameter L M N a B 𝐏𝟏 𝐏𝟐 r1 K p q 𝛕 𝛚 𝛄 𝛗𝟏 𝛗𝟐 𝛗𝟑 𝛍𝟏
Value 320 40 50 14 18 50 20 0.4 3 7 8 0.35 0.21 0.11 0.7 0.35 0.14 0.16

Paramet 𝛍𝟐 𝛍𝟑 𝛔𝟏 𝛔𝟐 𝛔𝟑 𝐂𝐦𝐢 𝐂𝐦𝐚 𝐂𝐬 𝐂𝐢 𝐂𝐓 𝐂𝐄 𝐂𝐜𝐜 𝐂𝐑 𝐂𝐓𝐫 𝐂𝐑𝐘 𝐂𝐒𝐑 𝐂𝐃 𝐂𝐓𝐓


er
Value 0.22 0.31 0.5 0.7 0.4 0.18 0.67 400 13 17 15 3 11 6 12 2 5 9
Then the Optimum result is
t1 ∗= 0.401835
k = 3.36618
ANR = 10526.92
The Optimum production quantity Q* = 191.691.
SENSITIVITY ANALYSIS:
The values of annual net revenue for different values of the parameters of the model are presented below in
Table 2. The parameters L, M, N, k and t1 are varied by +6% to -6%. Following are some observations:
1) The demand parameter L is very sensitive for higher values. A positive change in L will increase the value
of ANR.
2) The demand parameter M is less sensitive. A positive change in M will only increase the value of ANR.
3) The demand parameter N is very sensitive for lower values. A negative change in N will increase the ANR.
4) The decision variable K is more sensitive for higher values. A positive change in K will increase the value
of ANR.
5) The decision variable t1 is very less sensitive. Any small change in t1 will lower the ANR.
The demand parameter and decision parameters must be properly estimated to obtain the optimal value of ANR.
The result of sensitivity analysis is graphically represented in Fig
Table 2: Values of ANR
Parameter % Change ANR %CHANGE IN ANR
-6% 8737.132 -17.002010085
-4% 9320.643 -11.458973755
-2% 9917.238 -5.7916465595
L
2% 11149.68 5.91588042846
4% 11785.53 11.9561087194
6% 12434.46 18.1205898781
-6% 10660.53 0.01269222147
-4% 10619.41 0.8786045681
-2% 10574.81 0.45492888708
M
2% 10475.91 -0.4845671858
4% 10421.97 -0.996967774
6% 10365.26 -1.5356818519
-6% 11550.77 9.72601672664
-4% 11197.69 6.37194925011
-2% 10856.58 3.13159024672
N 2% 10208.19 -3.0277612065
4% 9899.929 -5.9560726214
6% 9601.673 -8.7893419918
-6% 4432.525 -9.3830579882
-4% 4592.979 -6.1027942979
K -2% 4745.969 -2.975121931
2% 5029.566 2.8226328259
4% 5160.178 5.49281743401
559
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

6% 5283.336 8.01061515524
-6% 4888.672 -0.0577532808
-4% 4890.263 -0.0252274508
-2% 4891.191 -0.0062557536
t1
2% 4891.217 -0.005724219
4% 4890.385 -0.0227333268
6% 4889.033 -0.0503731271

DISCUSSION
This paper develops an electronic product production inventory model comprising of EPR associated cost
parameters with demand dependent on price and quality and also it considers all the costs pertinent to recycling
of electronic wastes . This model mutually regulates the quality of the product and selling price which will
maximize the average net revenue per unit time. A model is developed, numerical example are presented with
linear demand patterns. A sensitivity analysis has been performed to analyze the effects of demand parameters
and decision variables k and t1 on the average net profit ANR. An algorithm is provided for solving the model.
This algorithm helps in generating equation. However, standard optimizing , EXCEL, can be used for solving
this model. In EXCEL, Solver tools can be used. The model considers quality as a continuous variable
designated by the quality . Finally the best ANR for each of these possible qualities and the demand parameter
and decision parameters must be properly estimated to obtain the optimal value of ANR
CONCLUSION
The model proposed in this paper is an initial development of integrating the aspects of EPR with inventory
model. This EPR integrated inventory model for electronic products shall be extended to other different
products by encompassing the cost components of packaging. The model shall be made more accommodative
by discussing the parameters of the model in fuzzy environment. This EPR inventory model discussed at local
levels shall be generalized with the incorporation of costs associated with waste managements at all its
distribution centres.
REFERENCES
1. Sh-Tyan Lo., Hui-Ming Wee and Wen-Chang Huang,(2007) “An Integrated Production-Inventory Model
With Imperfect Production Processes And Weibull Distribution Deterioration Under Inflation”, International
Journal of Production Economics,Vol.106,no.1,pp. 248-260.
2. Yuan-Shyi Peter Chiu., Yi-Chun Lin, Li-Wen Lin and SW Chiu,(2012) “A Single-Producer Multi-Retailer
Integrated Inventory Model With A Rework Process”, Int. Journal for Engineering Modelling,Vol.25,pp. 27-
35.
560
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

3. Biswajit Sarkar., Leopoldo Eduardo Cárdenas-Barrón., Mitali Sarkar and Moses Laksono Singgih,(2014)
“An Economic Production Quantity Model With Random Defective Rate, Rework Process And Backorders
For A Single Stage Production System”, Journal of Manufacturing Systems,Vol.33,no.3,pp. 423–435.
4. Amir Hossein Nobil., Ata Allah Taleizadeh,(2016) “A Single Machine EPQ Inventory Model For A Multi-
Product Imperfect Production System With Rework Process And Auction”, International Journal of
Advanced Logistics,Vol.5,pp. 141-152.
5. Diego de Castro Fettermann., Guilherme Luz Tortorella and Carlos Ernani Fries,(2016) “Inventory
management: a small enterprise in the electronics sector case study”, ProduçãoemFoco,Vol. 06,no.2,pp.66-
74.DOI:10.14521/P2237-5163.2016.0010.0007.
6. Nita H Shah., Dushyantkumar G Patel and Digeshkumar B Shah,(2018) “EPQ Model For
Returned/Reworked Inventories During Imperfect Production Process Under Price-Sensitive Stock-
Dependent Demand”, Operational Research,Vol.18,no.2,pp. 343-359.
7. Rishabh Kumar Saran and Shashikant Yadav,(2019) “Significance of Electronic Waste Management for
Sustainable Industrial Production”, Operations Management and Systems Engineering, pp.241-249,
DOI:10.1007/978-981-13-6476-1_13
8. A. Mukhopadhyay, (2020) “Transportation-Inventory Model for Electronic Markets Under Time Varying
Demand, Retailer’s Incentives and Product Exchange Scheme”, In: Shah, N., Mittal, M. (eds) Optimization
and Inventory Management. Asset Analytics. Springer, Singapore. https://doi.org/10.1007/978-981-13-9698-
4_22.
9. A .Sasireka., Ah Nandhu Kishore., J Femila Mercy Rani., N Martin, (2020)
“Inventory Model To Combat E-Waste Management Costs”, Advances in Mathematics: Scientific Journal,
Vol.9, pp. 3059-3065.
10. Tharaka de Vass., Himanshu Shee and Shah J. Miah,(2021) “IoT in Supply Chain Management:
Opportunities and Challenges for Businesses in Early Industry 4.0 Context”, Operations And Supply Chain
Management, Vol. 14, No. 2, 2021, pp. 148 – 161. ISSN 1979-3561 | EISSN 2759-9363.
11. P. Selvi., W. Ritha,( 2022) “Green Inventory Model for Battery Waste Management”, Journal of Positive
School Psychology,Vol.6,no.3,pp. 7949–7955.
12. Subhendu Ruidas., Mijanur Rahaman Seikh and Prasun Kumar Nayak,(2022) “A production inventory
model for high-tech products involving two production runs and a product variation”, Journal of Industrial
and Management Optimization, doi: 10.3934/jimo.2022038
13. R. Pavithra., K. Karthikeyan,(2020) “Recent Survey On Economic Production Quantity Model”,Journalof
Xi'anUniversityofArchitecture& Technology,Vol.12,no.3,pp.5779, Issn No : 1006-7930.
14. Allison Boutillier,(2020) “Extended Producer Responsibility”, Environmental Law Centre (Alberta) Society.
15. Charles Joseph Kibert,(2004) “ Extended producer responsibility: A tool for achieving sustainabl
development”, https://www.researchgate.net/publication/265158179

AUTHOR DETAILS:
M. KASI MAYAN1, NIVETHAMARTIN2 AND D. SELVI3
1
Department of Mathematics, S.B.K.College, Aruppukottai & Research Scholar, Madurai Kamaraj University
2,1
Department of Mathematics, Arul Anandar College (Autonomous), Karumathur, India (Affiliated to Madurai
Kamaraj University)
3
Assistant Professor, Department of Mathematics, Jayaraj Annapackiam College for Women (Autonomous),
Thamaraikulam, Periyakulam -625601

561
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

COMPARATIVE STUDY BETWEEN FERROCEMENT AND CONCRETE

MR. DEVDATTA K. MOKASHI, MRS. JOTHI DHANKE, MR. NILESH MADHAV SHIVPUJE, MR.
BALJAI RAM BIRADAR AND MR. TEJODEEP DEEPAK KORPE

ABSTRACT
Ferro Cement is a breakthrough in the field of civil engineering. It has less self-loading, and therefore less load
on structures. We had studied various properties of ferrocement such as tensile behaviour, compression,
cracking, impact resistance and fire resistance. Based on the tests performed, different applications than
ordinary cement and its advantages will be identified.
Keywords: Ferro Cement, concrete, durability, Flexural Strength, Compressive Strength, Wire mesh

I. INTRODUCTION
Ferrocement is a compound of ferro (iron) and cement (cement mortar). Ferrocement can be thought of as a type
of thin-walled reinforced concrete construction in which wire mesh of smaller diameter is used instead of
reinforcing bars placed evenly across the cross section and in which instead of concrete Portland cement mortar
is used. Ferrocement is widely used in construction due to low weight, lack of framework etc. It was developed
in 1940 by the Italian architect P. L. Nervi. The quality of ferrocement works is ensured as the components are
fabricated. Installation and implementation time of machinery in the workplace is short. In the last two decades,
this material has been used extensively only in construction.
Eco-friendly refers to an environmentally responsible and resource-efficient structure and use process
throughout the building's life cycle: from seating to design, construction, operation, maintenance, renovation
and demolition. Eco-friendly buildings generally include better air quality, abundant natural light and views and
sound control that benefit the occupants of the building, making these buildings better places to work or live.
The main Process difference between green and traditional buildings is the concept of integration. Through
which a multi-disciplinary team of construction professionals work together from pre-design to post-occupancy
to optimize construction for environmental sustainability, performance and cost savings. Ferrocement is an
environment-friendly technology and excellent unique functions, such as good tensile strength, improved
toughness, water hardness, opacity, fire resistance, crack resistance and cost, time-effective construction
technology and materials.
Ferrocement has applications in all areas of civil structure of construction, building components, soil retaining
structures and including water, large space structures, Pools, domes, dams, boats, drains, bunkers, silos, water
treatment plants and Sewage.
II. LITERATURE REVIEW
A. Ferrocement floor and roof system for Buildings of Dr. TS Thandavamurthy and S. Durairaj Adhiparashakti
Engineering College Pvt Melmaruvathur 900mm X size hollow cord ferrocement floor panel Cement mortar
was precast 600 mm with 1: 2 and cured for 7 Days later they were arranged in a loading frame and tested
Stable loading is gradually increasing until it fails. The final load of the panel was 85 KN. Experimental
program A welded mesh was made with two layers of chicken Mesh sample was poured with cement mortar 1:
2 and Reinforcement mesh as prescribed. Ready sample Healed in 7 days. Samples were arranged Loading
frame. Loads were applied in increments and dials Readings were reported for each increase. There was a load
Extended until panel failed. Results The final load seen was 85 KN. It was a burden Distributed on the panel
with an intensity of 78.7 KN / m2. Therefore Part 2 per IS 875 is the recommended direct load on the floor only
2 KN / m2. With this in mind the ferrocement floor the panel is appropriate, realistic and workable.
B. Flat and folded flexible behaviour Ferrocement panel by Mohammed Mahmoud Civil Department of
Engineering Mosul University Iraq the research include the outcome of a folded and flat test Ferrocement
panels are reinforced with different wires Layers of mesh. The main purpose of these experimental tests to
examen the application of different number of wires Layered mesh on elastic reinforcement of folded and flat
to compare ferrocement panels and changing effects Flexibility and quantity of sheet of wire mesh on the final
the strength of these types Ferrocement composition. There were seven ferrocement components Each
(600x380mm) horizontally built and tested Projection and 20 mm thick, with four flat panels and three folded
panels. Quantity of wire mesh used There are levels first to third. Experiment outcome reach that the elastic

562
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

strength of folded panels is increased for panels with 37% and 90%, 2 or 3 mesh wire layers Respectively,
differentiate to having a single layer Increased elastic strength compared to flat panels The plan mortar panels
for panels 1, 2 and 3 are 4.5%, 65% and 68% wire mesh layers respectively. The present study propose that the
strength of folded panels is in order 3.5 to 5 and same number of wire layers mesh same as corresponding
panels. C . Anisha G. Krishnan 1, Alzi Abraham, (September 2016)
During the case study, specimens of control beams of dimensions (200 x 300 x 1000) and thickness of 25 mm.
The control beam was reinforced with 10 mm diameter strips and 6 mm diameter double straps with two foot
strips of 6 mm diameter at the top and bottom at 200 mm c/c. The formwork consists of skeletal reinforcement
of 6 mm diameter which provides shape and support to the mesh and a layer of chicken mesh of 0.88 mm
diameter.
HISTORY
The history of iron ore is more than 170 years old. Idea of Pregnancy Near-Distance Wire Mesh Cod The old
method of building walls with rich cement mortar. In the cod method, bamboo and cane are tied tightly together
and a mixture of soil and dung is filled to form a matrix. Used in rural areas of India. Therefore ferrocement can
be said to be a modified form of standardized cod raw material, systematic method of manufacturing and
reliable structural properties. Here bamboo and reeds are replaced with cement mortar instead of lattice and
clay. Fermentation in the form of mesh-reinforced cement mortar was used in Europe Mr. in France. J. L. By
Lambo. In 1848 he built the Ferrocement rowing boat Reinforcement was in the form of elastic woven wire
mats and small sized bars. He patented this process. In the early 1940s, Nervi, Italy used ferrocement for ship
building. Due to the shortage of steel during the world war II they use ferrocement for building and warehouses.
Ferrocement has been used for the construction of the dome. The roofs of stadiums, opera houses and
restaurants in Europe. Despite nerve no systematic studies have been conducted so far, the material shows
successful use dating back to the 1960s, when it was used as a boat building material in Australia, the UK and
Southeast Asian countries. In 1972, an ad-hoc panel was set up by the National Academy of Sciences, USA.
Study the use of iron ore in developing countries. His report 'Ferrocement Application in Developing Countries'
was published in 1973. The United States has since taken action to establish the Concrete Institute, Committee
549 on Fermentation in 1974. Since then, many individuals and organizations have made great efforts for
making ferrocement as a building material.
“International Ferrocement” at Asian Institute of Technology, Bangkok, Thailand an information centre has
been set up and a "Ferrocement Journal" is regularly launched Published by it.
Comparision between Rcc & Ferro Cement
• Ferro cement is mainly similar to reinforced concrete (RCC), but has the following differences:
• Its thickness rarely exceeds 25 mm, while RCC components are rarely less than 100 mm.
• A rich Portland cement mortar is used without any coarse aggregates like RCC.
• Compared to RCC, ferro cement has a higher percentage of reinforcement, consisting of closely spaced
smaller diameter wire and wire mesh, evenly distributed throughout the cross section.
• Its tensile-strength-to-weight ratio is higher than RCC, and its cracking behaviour is better.
• Ferro cement can be manufactured to almost any shape without formwork. Mortar composition.
• The required mortar content, which represents approximately 95% of ferro cement, is a proportion of
Portland cement, sand, water and in some cases.
• Hexagonal wire mesh, commonly called chicken wire mesh, is the cheapest and easiest to use, and is
available almost everywhere.
Sr. No. CONCRETE FERROCRETE
1 Minimum Thickness 100 mm. Minimum thickness 25mm.
2 Coarse Aggregate is present. Rich Portland cement mortar with fine aggregate.
3 Reinforcement consisting of larger diameter Greater percentage of reinforcement, comprising
bars and more widely spaced as compared to closely spaced small diameter wires and wire mesh,
ferrocrete. distributed equally to edges.
4 Structure are heavier than Ferrocrete Structure are lighter than RCC
5 Without Formwork construction is not Can be constructed without formwork.
possible.
563
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table no. 1 Comparison between ferrocrete and concrete


Materials Used in Ferro-Cement Structures
A) The refer as skeleton steel cones, steel bars, welded wire fabric, or pipe.
B) Steel wires are mesh for making cages.
C) Rich cement mortar as matrix as micro concrete.(Cement, fine aggregate, water, mortar mix, reinforcing
mesh, skeleton steel, coating.)
These are the three raw materials that are commonly used in business Construction of traditional buildings was
maintained for seven consecutive days. The placement process is called the bottom-up process and a stone
tower was used for the application. The thickness of the mortar was kept less than half an inch on either side of
the sheet. When the mortar hardens slightly (about ½ hour later placing the mortar) it is plastered using the same
mortar and a final thickness of ” is obtained. Special care was taken to finish the top, sides and sides of the wall
well. The opening edge was left for the second RCC casting. The verticality of the wall was taken care of by
using a spirit level and a plumb bob. The wall is then insulated for 24 hours before starting the treatment. Care
was taken not to touch it. Treatment started after 24 hours. After seven days the RCC column was removed and
a linen bag was wrapped around it to cure for seven days.
4. Curing Procedure
After 24 hours of casting and plastering, the treatment was started by sprinkling water. Water was sprayed every
hour of the day until it overflowed and was maintained for seven consecutive days.
5. Finishing
After seven days of treatment, the wall remained dry for three days. They were then cleaned with sandpaper and
stone and after proper brushing, they were ready for primer coating. Mastic paste was made from chalk powder
and white cement primer paint and applied to two surfaces. After the mastic was dry, it was sanded and a final
paint coat was applied.
Uses of Ferrocement
1. It saves cement and steel in the construction of structures. So, it is used in residential buildings.
2. Ferrocement is used for making upper water tanks for domestic purposes. The tank is lightweight and easy to
transport. A tank made of ferrocement is cheaper than any other competing material. The bottom of the tank can
be built with a simple hopper shape grain extraction system.
3. In bio-gas plant gas holding unit is made up of ferro-cement.
4. By modifying ferrocement tank we can use that as septic tank.
5. This is the right material for building a boat.
6. Maintenance hole cover is also made up of it.
7. It is a preferred material for prefabricated roofing systems.
8. Ferro-cement is suitable for pressure pipe.
9. It is a great material for making benches for gardens, open-air theatres and parks.
Laboratory tests
Testing of Ferrocrete
The tests and observations that are commonly performed in the design, manufacture and subsequent service
life of concrete structures also apply to ferrocrete structures. they include
1) Testing of the physical, chemical and mechanical properties of constituent materials prior to their
acceptance, such as water purity, sieve analysis, mesh strength, etc.
2) Tests to control the properties of fresh mortar mix: such as meltdown, air content etc.
3) Tests on structural properties of the hardened composite: such as all kinds of strength, cracking behavior,
fatigue permeability, etc.
Testing Structural Properties of Ferrocrete
Two types of tests are recommended to predict the structural properties of ferrocrete.
 Compressive strength of mortar

564
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Flexural strength
Compressive Strength of Mortar
It may be determined from cube with surface area 37.5 sq. cm tested in accordance with I.S.516-1959.

Fig. 1 Compressive strength of mortar


Flexural Strength of Ferrocrete
Ferrocrete specimens should be tested as simply supported beams with third point loading.

Fig. 2 Flexural strength of ferrocrete


Result
Table no. 2 Test result for compression

Ferrocement Cube-
Concrete cube [m25]-(F=P/A)
Table no. 3 Test result for compression

Ferrocement cube-
Sr.No. Size [L*b*D] Age[Days] Load[KN] Strength N/mm2
1 150*150*25 18 4.5 7.2
2 150*150*25 28 5.40 8.64
Table no. 4 Test result for flexure
Concrete block [m25]- (F=PL/bD2)
Sr.No. Size [L*b*D] Age[Days] Load[KN] Strength N/mm2
1 150*150*600 18 28.02 4.98
2 150*150*600 28 36.2 6.43
565
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table no.5 Test result for flexure

Graph no. 1 Comparison of compressive strength (N/mm2)

Graph no. 2 Comparison of flexural strength (N/mm2)


CONCLUSION
This study showed that ferrocement is an innovative material and the ready availability of the material and ease
of manufacture make it suitable for housing, and water and food storage structures in developing countries.
Ferrocement is found as a suitable material to repair or reshape faulty RCC structural elements and to enhance
its performance. The applications of ferrocement are occupying almost all areas of civil engineering, but
research support is born and there is a rational design basis for the construction of ferrocement structures. Since
the performance of ferrocement is greatly dependent on the characteristics of the reinforcing mesh, an optimal
range of properties for the mesh needs to be determined and specified, such as wire spacing, wire diameter, and
mesh system characteristics. This is a review study only and experimental research is needed on new building
materials for use in ferrocement manufacture or in combination with mesh and fibre. The impact of the standard
method of ferrocement manufacturing and the size that led to the new forms should be researched and the
benefits brought to the fore. Considering the unique features, ferrocement will undoubtedly be one of the most

566
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

important structural choices for RCC and a repair material in the future and thus has a great potential for
developing and developed countries alike.
REFERENCES
1. Abasolo, R., Bandivas, C., Guinita, J.V., Palen, J., Parners, E. And Apor, G. (2009) ―Utilization of
Ferrocement as Flexural Building Member (Applied as a Hollow Box Joist), Student Working Paper,
Xiraadman Research Center, Xavier University, Philippines, 29
2. Abdullah & Takiguchi, K. (2003) ―An investigation into the behavior and strength of reinforced concrete
columns strengthened with ferrocement jackets‖, Cement & Concrete Composites, 25: 233–242.
3. ACI Committee 549-1R-88 and 1R-93: Guide for the Design, Construction, and Repair of Ferrocement,
ACI 549-1R88 and 1R-93, in Manual of Concrete Practice, American Concrete Institute, Farmington Hills,
Michigan, 1988 and 1993, 27 pages.
4. ACI Committee 549-R97: State-of-the-Art Report on Ferrocement, ACI 549-R97, in Manual of Concrete
Practice, American Concrete Institute, Farmington Hills, Michigan, 1997, 26 pages.
5. Adajar, J.C., Hogue, T. and Jordan, C. (2006) ―Ferrocement for Hurricane-Prone State of Florida‖,
Proceedings of the Conference on Structural Faults + Repair, 13-15 June 2006, Edinburgh, Scotland, U.K.
6. Akhtar, S., Arif, M. and Quraishi, M.A. (2009) ―Use of Chemical Corrosion Inhibitors for Protection of
Metallic Fibre Reinforcement in Ferrocement Composites‖, The Arabian Journal for Science and
Engineering, 34 (2C):105-113.
7. Al-Dulaijan, S.U., Al-Zahrani, M.M., Saricimen, H., Maslehuddin, M., Shameem, M. And Abbasi, T.A.
(2002) ―Effect of rebar cleanliness and repair materials on reinforcement corrosion and flexural strength
of repaired concrete beams‖, Cement and Concrete Composites, 24:139-149.
8. S.DeepaShri, A., Experimental Investigation On The Flexural Behaviour Of SCC Ferrocement Slab
Incorporating fibers,International Journal Of Engineering Science and Technology(IJEST), Vol.4 No.05.
9. A Review on construction process of Ferrocement sandwich panel: Instigating an orderly approach in
Bangladesh. R. Hafiza, 1, S.l. International Journal of Science and Engineering, 2015, Vol. 3.
10. Flexural behaviour of ferro cement panels with different types of meshes by manishhajare dr. M . B. Varma,
ijsrd vol. 3, issue 06, 2015
11. Mandlik, A., Sood, T. S., Karade, S., &Naik, S. (2015). Lightweight Concrete Using EPS, 4(3)2013–2016.
12. Alavez-Ramirez, R., Chinas-Castillo, F., Morales-Dominguez, V., Ortiz-Guzman, M., and Lara-Romero, J.,
2014, “Thermal lag and decrement factor of a coconut-ferrocement roofing system”, Construction and
Building Materials.
13. Ferrocement. Bangkok: International Ferrocement Information Center, B.K.Paul, 1978.
5.Decorativeferrocement elements. Nadasan, l.6. BNBC, 2014
14. Phalke, R. J., &Gaidhankar, D. G. (2014). Flexural Behaviour of Ferrocement Slab Panels using Welded
Square Mesh by Incorporating Steel Fibers. International Journal of Research in Engineering and
Technology, 3(5), 756–763.
15. Dr.R.S.sharma, Sumesh Jain, “Ferro cement An Affordable Housing Material For Low Cost
Housing”volume -2, Issue- 10,

AUTHOR DETAILS:
MR. DEVDATTA K. MOKASHI 1, MRS. JOTHI DHANKE 2, MR. NILESH MADHAV SHIVPUJE 3,
MR. BALJAI RAM BIRADAR4 AND MR. TEJODEEP DEEPAK KORPE5
1,2
Assistant Professor Bharati Vidyapeeth’s College of Engineering, Lavale, Pune- 412115
3, 4, 5
Undergraduate Student, Bharati Vidyapeeth’s College of Engineering, Lavale, Pune- 412115

567
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

INFLUENCE OF BIRTH ORDER ON ACHIEVEMENT MOTIVATION AMONG ADOLESCENTS

J. MAMATHA AND DR. SHIVAKUMARA. K

ABSTRACT
The purpose of the present study was to examine the effect of birth order on achievement motivation. The
sample consisted of 450 students each from Only Child, First Born, Middle Born and Last Born. Purposive
sampling technique was used to collect the data. The Achievement Motivation (n-Ach) Scale by Pratibha Deo
and Asha Mohan was used to collect the data. The descriptive statistics and ANOVA test was carried out to
verify the hypothesis. The findings reveal that there were few factors found to be significant in achievement
motivation with regard to the birth order. The results show that the for the factor’s achievement motivation and
work methods the first born have higher mean values when compared to only child, middle and later born
samples . However, for the factors need for achievement, academic challenge, achievement anxiety, importance
of grades/marks, relevance of schools/college to future goals, attitude towards education, attitude towards
teachers, individual concerns, dramatics the only child have higher mean values than first born, middle and
later born, among the 15 factors of achievement motivation the only child have received higher scores
compared to the other birth order sample. For the factors meaningfulness of tasks, interpersonal relations,
general interest the middle born have higher mean value when compare to only child, first born and later born.
The hypothesis proposed for this study was been partially accepted since there are only few factors found to be
significant in the achievement motivation across the birth order.

INTRODUCTION:
Birth order is considered influencing many aspects of one’s personality. Adler was one of the first in the field of
psychology to theorize about the differences birth order could make. He was the founder of Individual
Psychology and he was the first to talk about the influence of birth order on personality development. While he
identified usual characteristics and patterns for particular birth order positions, he emphasized how every person
has a self-perceived place in their family. This sensed position may or may not be the person's chronological
place in the family. Adler thinks that birth order had a direct connection with personality characteristics.
Personality theorists such as Adler have asserted that family situation can affect individuals' experiences and
development. He believed that each birth order situation has its own unique set of personality traits.
First born children feel more conservative. They are viewed as leaders who follow order. They take to authority.
They are often more challenging than other birth order children who are also more conforming. Adler
recommended that first born child tend to be more motivated to accomplish than later born child. They are
ordinarily better at pleasing adults and behaving in socially advantageous ways. They typically stick to order
and expect the same from other person. They are also the dethroned children who must deal with the middle
born child. Because of this, they do hard work to stay ahead of the middle and last born child. Middle born
children are respectable more disaffected and more expected to challenge authority. They have a more
unmanageable time determination their place of importance in the family. Because of their middle position they
are often the conciliator in the family and become experts at negotiation. They teach to be competitive because
they have to follow with their older sibling.
Adler believed the middle born child was especially at risk for becoming demoralized. The middle born children
must find a way to measure up to the achievement of the first born child or find a place of import through other
means. Just For example, if the first born child find significance through academic accomplishment and
pleasing, the second may vie with the other position child or find significance through another area such as
drawing, music, sports or other ability to develop warm social relationships. Adler described these types of child
as appearing to be in a competition in order to overtake the first born child. Last born children have viewed as
dependent, pampered, irresponsible and immature. They tend to be more sociable and normally get more care
and attention. Others have to do things for them. They teach to use this to their reward and often use influence
and handling to get people to do things for them.
Birth Order and Scholastic Achievement:
Three theories were introduced to explain birth order effect on scholastic achievement. First, some of the
intrauterine theories claimed that young mother is capable to provide a “rich uterine environment” for her first
born children and therefore, results in good health and intelligence in the first born child. Still, there are

568
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

intrauterine theories that indicate the differently and claimed that mothers experience less labor and likely to use
forceps in following delivery, which in turn reducing the potential damaging to the children’s health and
intelligence. Second, confluence hypothesis claimed that the affect of birth order on cognitive achievement was
mostly influenced by familial intellectual family environment and the chance to serve as intellectual resource.
Familial intellectual surroundings environment decreases in react to increased family size. Therefore, first born
children were born to a higher intellectual surroundings environment as compared to the later born children.
However, this is mostly depended on the age gap between the siblings. Large spacing is beneficial to the
younger while prejudicial to the older sibling; small spacing is appropriate to the older but harmful to the
younger sibling. Moreover, older siblings always serve as intellectual resource to the last born child and this
stimulates the intellectual development of the older siblings. However, the last born and only children are never
a “teacher” so they do not perform as well as first born child in academics. Third, resource dilution hypothesis
suggested that parental resources (e.g., personal attention, money, cultural objects etc.) are bounded and will be
toned down by the addition of siblings. According to resource dilution hypothesis, parents are capable to devote
amply to their only child or first born child whose sibling has yet to arrive. However, the arrival of new child
led the parents to divide their resources accordingly. In any case, this hypothesis also claimed that the relation
richness of parental resources also affects one’s educational or academic success. Some research found that,
only child and first born child had better academic attainment than do later born children. There were empirical
research findings that demonstrated birth order effect on academic achievement.
REVIEW OF LITERATURE:
Paulhus, Trapnell, and Chen (1999) investigated birth order effects on personality and achievement in four
studies (N = 1,022 families) including both student and adult samples. Control over a wide range of variables
was effected by collecting within-family data: Participants compared their siblings (and themselves) on a
variety of personality and achievement dimensions. Across four diverse data sets, first-borns were nominated as
most achieving and most conscientious. Later-borns were nominated as most rebellious, liberal, and agreeable.
The same results obtained whether or not birth order was made salient (to activate stereotypes) during the
personality ratings. Overall, the results support predictions from Sulloway's niche model of personality
development, as well as Zajonc's confluence model of intellectual achievement.
Phillips, and Phillips (1994) examined the relationship between birth order and achievement attributions among
university students. Subjects reviewed an application for a student job that detailed the applicant's past work
performance as either good or poor. After reviewing the application, Subjects completed attribution scales. An
analysis of covariance (ANCOVA) revealed that first-born Subjects and Subjects who were only children had a
greater tendency than later-born subjects to attribute more responsibility for past good or poor performance to
factors internal to the applicant.
Cherian (1990) in his study investigated the relationship between birth order and academic achievement of
randomly chosen Standard 7 pupils in Transkei, South Africa. The subjects ranged in age from 13 to 17 year,
with a mean of 15.6 year. Two questionnaires, one for the pupils and the other for their parents, were
administered to collect information on the birth order of children. Analysis of variance indicated a significant
negative relationship between birth order of children and their academic achievement.
Fergusson, Horwood, and Boden (2006) paper examined the relationship between birth order and later
educational outcomes in a birth cohort of more than 1,000 New Zealand young adults studied to the age of
twenty-five. Being later born was associated with gaining fewer educational qualifications at secondary level
and beyond. The use of nested models to control for the confounding effects of family size on birth order
revealed that birth order effects on educational attainment were not disguised by family size effects. Following
adjustment for potentially confounding factors, there remained a statistically significant association between
being later born and a lower likelihood of obtaining educational qualifications. It was concluded that the intra-
family dynamics initiated by birth order may have a lasting effect on the individual in terms of later educational
and achievement
Hudson (1990) and Zajonc (2001) were found that first-borns are over delineated in political office and there are
birth-order differences in intelligence and in the Big Five personality dimensions of extraversion, neuroticism,
conscientiousness, agreeableness, and openness to experience.
David, John and Joseph (2006) examined that the intra family dynamics initiated by birth order may have a
lasting effect on the individual in terms of later educational and achievement outcomes.
Sputa and Paulson (1995) investigated that relationship between earlier birth order and school achievement in a
sample of adolescents. Jennifer Gordon (2012) were studied that no difference was found to exist between birth
569
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

order and the investigated variables; however a clear significant correlation was found to exist between Need
for Achievement and Perceived Scholastic achievement.
Argys, Rees, Averett and Witoonchart (2006) investigated that parents play a role in birth order behavior; there
is an idea that parents spend less time and energy supervising their younger offspring. This may be due to them
having less time to study in them. In addition, they studied that last born children are particularly prone to risky
and delinquent behaviors, compared to second born children. The fact that birth order impacts behavior
indicates that where one falls in one’s family influences one’s personality and life decisions.
METHODOLOGY
This cross-sectional study was conducted on High school and College students. This research involved 450
participants from Karnataka state using simple random sampling technique. A standardised personality test was
used to collect data in assessing the achievement motivation according to relationship between the birth order of
first born child, middle born child, last born child and only born child. Descriptive and ANOVA was deployed
to measures the mean differences among the birth order and achievement motivation.
OBJECTIVES OF THE STUDY
To examine the effect of birth order on achievement motivation among adolescents.
Hypothesis
There is a significant difference in the achievement motivation across birth order among adolescents.
Sample
The sample consisted of 450, high school and college students belonging from Bangalore. Purposive random
sample technique was used to collect the data. The participant’s age range was between 13- 19 years.
Variables
Independent variables: Birth Order
Dependent variable: Achievement motivation
Measures
Deo-Mohan Achievement Motivation (N-Ach) Scale
The Deo-Mohon Achievement Motivation (n-Ach) Scale: Pratibha Deo and AshaMohan (1985) have developed
the Deo-Mohan Achievement Motivation Scale (nAch). It is a self-rated, 50-item scale for measuring the need
for achievement in adolescents. The original scale consists of 15 factors- ‘academic motivation’, ‘need for
achievement’, ‘academic challenge’, ‘achievement anxiety’, ‘importance of grades’, ‘meaningfulness of task’,
‘relevance of school/college to future goals’, ‘attitude towards education’, ‘work methods’, attitude towards
teachers’, ‘interpersonal relations’, ‘individual concern’, ‘general interest’, ‘dramatics’ and ‘sports’. Among the
50 items, 37 items are positive and 13 (item number 1, 12, 13,14, 17, 18, 19, 20, 21, 22, 32, 34, 37) are negative.
Each positive item has 5 responses to rate 4 for ‘always’, 3 for ‘frequently’, 2 for ‘sometimes’ 1 for ‘rarely’ and
0 for ‘never’. The scoring was reverse for the negative items, i. e., 0 to 4 for the responses, ‘always’ to ‘never’
accordingly. Higher score indicates higher achievement motivation. The test-retest reliability of the original
scale is .78 for girls, .67 for boys and .69 for mixed group. Cronbach’s coefficient alpha was .86 for overall
male and female. The item validity was .54. The scale yields a correlation coefficient of .75with the Aberdeen
Academic Motivation Inventory of Entwistle (1968). The results support that the original scale of achievement
motivation is sufficiently valid to measure achievement motivation of adolescents.
Table 1: Shows The Mean, SD And F Value On Achievement Motivation Of Adolescents (N=150 Each For
Three Groups).
Birth order N Mean Std. Deviation F Sig.
Achievement Onlychild 150 2.4000 1.03626 2.22510 0.08416
Motivation firstborn 150 2.5800 0.95728
middleborn 125 2.3520 1.13063
Later born 175 2.2971 0.98421
Need for Onlychild 150 2.3667 1.06448 1.845 0.138
achievement firstborn 150 2.0933 1.17208
middleborn 125 2.3360 1.17737
Later born 175 2.3257 1.12555
Academic Onlychild 150 2.5133 1.14538 2.063 0.104
challenge firstborn 150 2.3600 1.22217
middleborn 125 2.3360 1.26328

570
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Later born 175 2.1829 1.17480


Achievement Onlychild 150 0.8000 0.41773 15.351 0.000
anxiety firstborn 150 0.4867 0.50150
middleborn 125 0.4400 0.49838
Later born 175 0.5600 0.53132
Importance of Onlychild 150 1.6067 0.63348 58.823 0.000
grades/marks firstborn 150 1.4400 0.83127
middleborn 125 0.7120 0.74937
Later born 175 0.7029 0.80426
Meaningfulness Onlychild 150 2.1933 1.14515 5.114 0.002
of task firstborn 150 2.4467 1.12648
middleborn 125 2.6960 0.98557
Later born 175 2.5429 1.14327
Relevance of Onlychild 150 1.4200 0.73521 27.128 0.000
school/college to firstborn 150 0.8333 0.87789
future goals middleborn 125 0.6960 0.88193
Later born 175 0.6686 0.81923
Attitude towards Onlychild 150 2.9667 1.02595 18.781 0.000
education firstborn 150 2.3733 1.25611
middleborn 125 2.7040 1.13609
Later born 175 2.0286 1.27950
Work methods Onlychild 150 2.5467 1.20729 12.009 0.000
firstborn 150 3.4267 1.31765
middleborn 123 2.8618 1.33874
Later born 175 3.1657 1.47818
Attitude towards Onlychild 150 1.9133 1.15820 43.073 0.000
teachers firstborn 150 0.9200 0.90872
middleborn 125 1.2000 0.89803
Later born 175 0.7714 0.86721
Interpersonal Onlychild 150 2.2533 1.19948 1.035 0.376
relations firstborn 150 2.4000 1.09299
middleborn 125 2.4640 1.19504
Later born 175 2.4343 0.97966
Individual Onlychild 150 1.6000 0.59076 41.262 0.000
concerns firstborn 150 0.7800 0.77607
middleborn 125 1.1600 0.84624
Later born 175 0.7714 0.80536
General Interests Onlychild 150 1.5467 0.98708 33.133 0.000
firstborn 150 2.4733 1.02778
middleborn 125 2.5360 1.03600
Later born 175 2.5143 1.03866
Dramatics Onlychild 150 1.3667 0.65964 20.104 0.000
firstborn 150 1.2867 0.84613
middleborn 125 0.7760 0.82172
Later born 175 0.8743 0.82083
Sports Onlychild 150 2.9000 1.27311 4.199 0.006
firstborn 150 3.2333 1.37776
middleborn 125 3.4720 1.29251
Later born 175 3.1371 1.44379
.00 level = Highly Significant
The primary objective of the present study was to examine the effect of birth order on achievement motivation.
To fulfill the objective and to verify the hypothesis, the data were analyzed using SPSS 16.0, Mean, SD and
ANOVA were calculated.
With reference to the Table 1 we find the mean scores, SD and F values on achievement motivation of
adolescents across the birth order. For the factors achievement motivation and work methods the first born have
higher mean value than only child, middle born, Later born. Phillips and Phillips (2000) found that first born
571
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

child attributed somewhat more responsibility for their better performance to factors internal to themselves. This
finding fits with previous research which, taken together, presents a profile of first born and only children as
having a greater sense of personal responsibility, being more achievement oriented and more serious, and being
less socially oriented than later born child. However, for the factors need for achievement, academic challenge,
achievement anxiety, importance of grades/marks, relevance of schools/college to future goals, attitude towards
education, attitude towards teachers, individual concerns, dramatics the only child have higher mean values than
first born, middle and later born, among the 15 factors of achievement motivation the only child have received
higher scores compared to the other birth order sample. Paulhus, Trapnell and Chen (1999) reported that first
and earlier born children from their own families as being the highest achievers, even after controlling for
participants’ beliefs about birth order. For the factors meaningfulness of tasks, interpersonal relations, general
interest the middle born have higher mean value when compare to only child, first born and later born.
Among the 15 factors, only the Achievement anxiety, Importance of grades/marks Relevance of school/college
to future goals, Attitude towards education, Work methods, Attitude towards teachers, Individual concerns,
General Interests, Dramatics the F value is found to be significant therefore the hypothesis is partially proven
for the present study.
CONCLUSIONS
The hypothesis proposed for this study was partially accepted since there only few factors found to be
significant in the achievement motivation across the birth order.
REFERENCES:
 Argys, L.M., Rees, D.I., Averett, S.L., &Witoonchart, B. (2006). Birth order and risky adolescent
behaviour. Economic Enquiry, 44(2), 215-233.
 Cherian, V. I. (1990). Birth order and academic achievement of children in Transkei. Psychological
Reports, 66(1), 19-24.
 David M. Fergusson, L. John Horwood and Joseph M. Boden (2006) Birth order and educational
achievement in adolescence and young adulthood; Australian Journal of Education, Vol. 50, No. 2, 122-
139.
 Fergusson, D. M., Horwood, L. J., & Boden, J. M. (2006). Birth Order and Educational Achievement in
Adolescence and Young Adulthood. Australian Journal of Education, 50(2), 122–139.
https://doi.org/10.1177/000494410605000
 Hudson, V. M. (1990) Birth-order of world leaders: an exploratory analysis of effects on personality and
behaviour. Political Psychology, 11, 583–60
 Jennifer Gordon (2012) Birth order; investigating its effects on personality, empathy, achievement and
perceived scholastic achievement; Submitted in partial fulfillment of the requirement of the Bachelor of
Arts degree (Psychology Specialization) at DBS School of Arts, Dublin
 Paulhus, D. L., Trapnell, P. D., & Chen, D. (1999). Birth order effects on personality and achievement
within families. Psychological Science, 10(6), 482-488.
 Phillips, A. S., & Phillips, C. R. (1994). Birth order and achievement attributions. Individual Psychology:
Journal of Adlerian Theory, Research & Practice, 50(1), 119–124.
 Sputa, C. L., & Paulson, S. E. (1995). Birth order and family size: Influences on adolescents 'achievement
and related parenting behaviors. Psychological Reports, 76(1),43–51.
 Zajonc, R. B. (2001). The family dynamics of intellectual development. American Psychologist, 56, 490–
496.

AUTHOR DETAILS:
1
J. MAMATHA AND 2DR. SHIVAKUMARA. K
1
Research Scholar, Karnatak University, Dharwad
2
Professor, Post Graduate Department of Psychology, Karnatak University, Dharward

572
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

ON SOME NEW Ö-𝓘-CLOSED SETS WITH RESPECT TO AN IDEAL TOPOLOGICAL SPACES

T. SIVA SUBRAMANIA RAJA, G. ARUNA DEVI, G. THANAVALLI AND A. PANDI

ABSTRACT
In this paper, we introduce the notion of some new Ö-ℐ-closed sets and Ö-ℐ -closed sets in ideal topological
spaces. We discuss about the class of ⋆-closed sets and the class of Ö-ℐ-closed sets.
2010 Mathematics Subject Classification: 54A05
Keywords: Ö-ℐ-cld, Ö-ℐ -cld, Ö-ℐ-open, Ö-ℐ-int, Ö-ℐ-cl.

1. INTRODUCTION
In 1966, The subject of ideals in topological spaces has been studied by K. Kuratowski [6], introduced topology.
A. Acikgoz and et al. [1], introduced the on α-I-continuous and α-I-open functions. S. Jafari and N. Rajesh [7],
introduced the generalized closed sets with respect to an ideal. N. Levine [8], introduced the generalized closed
sets in topology.
In this paper, we introduce a new class of sets namely some new Ö-ℐ-closed sets in ideal topological spaces. We
discuss about the class of ⋆-closed sets and the class of Ö-ℐ-closed sets.
2. PRELIMINARIES
An ideal I on a topological space (briefly, TPS) (X, τ) is a nonempty collection of subsets of X which satisfies
(1) A∈ I and B⊆A⇒B∈ I and
(2) A∈ I and B∈ I ⇒A∪B∈ I.
Given a topological space (X, τ) with an ideal I on X if is the set of all subsets of X, a set operator ( • )⋆ :
→ , called a local function [4] of A with respect to τ and I is defined as follows: for A ⊆ X, A⋆( I, τ)={
x ∈ X : U∩A  I for every U ∈ τ(x)} where τ(x)={U ∈ τ : x ∈ U}. A Kuratowski closure operator cl⋆( • ) for
a topology τ⋆ (I, τ ), called the ⋆-topology and finer than τ, is defined by cl⋆(A) = A ∪ A⋆(I, τ) [4]. We will
simply write A⋆ for A⋆(I, τ) and τ⋆ for τ⋆(I, τ ). If I is an ideal on X, then (X, τ, I) is called an ideal topological
space (briefly, ITPS). A subset A of an ideal topological space (X, τ, I) is ⋆-closed (briefly, ⋆-cld) [4] if A⋆ ⊆
A. The interior of a subset A in (X, τ⋆(I)) is denoted by int⋆(A).
Definition 2.1 A subset L of a TPS X is called:
(i) Semi-open set [2] if L  cl(int(L));
(ii) 𝛼-open set [9] if L  int(cl(int(L)));
(iii) β-open set (Semi-pre-open) [2] if L  cl(int(cl(L)));
The complements of the above-mentioned open sets are called their respective closed sets.
Definition 2.2 A subset L of a TPS X is called
(i) 𝛼𝑔𝑠 -closed set (briefly, 𝛼𝑔𝑠 -cld) [9] if 𝛼cl(L)  P whenever L  P and P is semi-open.
(ii) semi-generalized closed (briefly, sg-cld) [2] if scl(L)  P whenever L  P and P is semi-open.
(iii)  -closed (briefly,  -cld) [11] if scl(L)  P whenever L  P and P is sg-open.
(iv) generalized semi-closed (briefly, gs-cld) [10] if scl(L)  P whenever L  P and P is open.
(v)  -generalized closed (briefly,  g-cld) [9] if  cl(L)  P whenever L  P and P is open.
(vi) generalized semi-pre-closed (briefly, gsp-cld) [10] if spcl(L)  P whenever L  P and P is open.
The complements of the above-mentioned closed sets are called their respective open sets.
Definition 2.3 A subset L of a ITPS X is called
(i) Ig -closed (briefly, Ig -cld) set [3] if L*  P whenever L  P and P is open.
(ii) I-ĝ -closed (briefly, I--cld) [5] if L*  P whenever L  P and P is semi-open.
573
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The complements of the above-mentioned closed sets are called their respective open sets.
3. Ö-𝓘-CLOSED SETS
We introduce the following definition.
Definition 3.1
A subset L of X is called
(i) Ö-ℐ-closed (briefly, Ö-ℐ-cld) if L*  P whenever L  P and P is gs-open.
The complement of Ö-ℐ-cld is called Ö-ℐ-open.
The family of all Ö-ℐ-cld in X is denoted by Ö-ℐC(X).
(ii) Ö-ℐ -closed (briefly, Ö-ℐ -cld) if  cl(L*)  P whenever L  P and P is gs-open.
The complement of Ö-ℐ -cld is called Ö-ℐ -open.
Proposition 3.2
Each ⋆-cld is Ö-ℐ-closed.
Proof
If L is any ⋆-cld in X and W is any gs-open set containing L, then W  L = L*. Hence L is Ö-ℐ-cld.
The converse of Proposition 3.2 need not be true as seen from the following example.
Example 3.3
Let X = {x, y, z},  = {, {x, y}, X} and ℐ = {}. Then Ö-ℐC(X) = {, {z}, {x, z}, {y, z}, X}. Here, L = {x, z}
is Ö-ℐ-cld set but not ⋆-cld.
Proposition 3.4
Each Ö-ℐ-cld is Ö-ℐ -cld.
Proof
If L is a Ö-ℐ-cld subset of X and W is any gs-open set containing L, then W  L*   cl(L*). Hence L is Ö-ℐ-
cld.
The converse of Proposition 3.4 need not be true as seen from the following example.
Example 3.5
Let X = {x, y, z},  = {, {y}, X} with ℐ = {}. Then Ö-ℐC(X) = {, {x, z}, X} and Ö-ℐ C(X) = {, {x}, {z},
{x, z}, X}. Here, L = {x} is Ö-ℐ -cld but not Ö-ℐ-cld.
Proposition 3.6
Each Ö-ℐ-cld is  -cld.
Proof
If L is a Ö-ℐ-cld subset of X and W is any gs-open set containing L, then W  L*  scl(L). Hence L is  -cld.
The converse of Proposition 3.6 need not be true as seen from the following example.
Example 3.7
Let X = {x, y, z},  = {, {x}, X} and ℐ = {}. Then Ö-ℐC(X) = {, {y, z}, X} and  C(X) = {, {y}, {z}, {y,
z}, X}. Here, L = {y} is  -cld but not Ö-ℐ-cld.
Proposition 3.8
Each Ö-ℐ-cld set is ℐ-  -cld.
Proof
Suppose that L  W and W is semi-open in X. Since every semi-open set is gs-open and L is Ö-ℐ-cld, therefore
L*  W. Hence L is ℐ-  -cld.
The converse of Proposition 3.8 need not be true as seen from the following example.
Example 3.9
Let X = {p, q, r, s},  = {, {s}, {q, r}, {q, r, s}, X} and ℐ = {}. Then Ö-ℐC(X) = {, {p}, {p, s}, {p, q, r}, X}
and ℐ-  C(X) = {, {p}, {p, q}, {p, r}, {p, s}, {p, q, r}, {p, q, s}, {p, r, s}, X}. Here, L = {p, r, s} is ℐ-  -cld
but not Ö-ℐ-cld.
574
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Proposition 3.10
Each Ö-ℐ-cld is Ig-cld.
Proof
If L is a Ö-ℐ-cld subset of X and W is any open set containing L, since every open set is gs-open, we have W 
L*. Hence L is Ig-cld.
The converse of Proposition 3.10 need not be true as seen from the following example.
Example 3.11
Let X = {x, y, z},  = {, {x}, {y, z}, X} and ℐ = {}. Then Ö-ℐC(X) = {, {x}, {y, z}, X} and Ig-C(X) = P(X).
Here, L = {x, y} is Ig-cld but not Ö-ℐ-cld.
Proposition 3.12
Each Ö-ℐ-cld is gs -cld.
Proof
If L is a Ö-ℐ-cld subset of X and W is any semi-open set containing L, since every semi-open set is gs-open, we
have W  L*   cl(L*). Hence L is gs -cld.
The converse of Proposition 3.12 need not be true as seen from the following example.
Example 3.13
Let X = {x, y, z},  = {, {x}, {y, z}, X} and ℐ = {}. Then Ö-ℐC(X) = {, {x}, {y, z}, X} and GS C(X) =
P(X). Here, L = {x, z} is gs -cld but not Ö-ℐ-cld.
Proposition 3.14
Each Ö-ℐ-cld is  g-cld.
Proof
If L is a Ö-ℐ-cld subset of X and W is any open set containing L, since every open set is gs-open, we have W 
L*   cl(L). Hence L is  g-cld.
The converse of Proposition 3.14 need not be true as seen from the following example.
Example 3.15
Let X = {x, y, z},  = {, {z}, {x, y}, X} and ℐ = {}. Then Ö-ℐC(X) = {, {z}, {x, y}, X} and G C(X) =
P(X). Here, L = {x, z} is  g-cld but not Ö-ℐ-cld.
Proposition 3.16
Each  -cld is Ö-ℐ -cld.
Proof
If L is an  -cld subset of X and W is any gs-open set containing L, we have  cl(L*) = L  W. Hence L is Ö-
ℐ -cld.
The converse of Proposition 3.16 need not be true as seen from the following example.
Example 3.17
Let X = {x, y, z},  = {, X, {x, y}} and ℐ ={}. Then  C(X) = {, {z}, X} and Ö-ℐ C(X) = {, {z}, {x, z},
{y, z}, X}. Clearly, the set {x, z} is an Ö-ℐ  cld but not an  -cld.
Proposition 3.18
Each Ö-ℐ-cld is gs-cld.
Proof
If L is a Ö-ℐ-cld subset of X and W is any open set containing L, since every open set is gs-open, we have W 
L*  scl(L). Hence L is gs-cld.
The converse of Proposition 3.18 need not be true as seen from the following example.
Example 3.19
Let X = {x, y, z},  = {, {x}, X} and ℐ = {}. Then Ö-ℐC(X) = {, {y, z}, X} and GS C(X) = {, {y}, {z}, {x,
y}, {x, z}, {y, z}, X}. Here, L = {z} is gs-cld but not Ö-ℐ-cld.
575
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Proposition 3.20
Each Ö-ℐ-cld is gsp-cld.
Proof
If L is a Ö-ℐ-cld subset of X and W is any open set containing L, every open set is gs-open, we have W  L* 
spcl(L). Hence L is gsp-cld.
The converse of Proposition 3.20 need not be true as seen from the following example.
Example 3.21
Let X = {x, y, z},  = {, {y}, X} and ℐ = {}. Then Ö-ℐC(X) = {, {x, z}, X} and GSP C(X) = {, {x}, {z},
{x, y}, {x, z}, {y, z}, X}. Here, L = {z} is gsp-cld but not Ö-ℐ-cld.
Remark 3.22
The following example shows that Ö-ℐ-cld sets are independent of  -cld sets and semi-cld sets.
Example 3.23
Let X = {x, y, z},  = {, {x, y}, X} and ℐ = {}. Then Ö-ℐC(X) = {, {z}, {x, z}, {y, z}, X} and  C(X) = S
C(X) = {, {z}, X}. Here, L = {x, z} is Ö-ℐ-cld but it is neither  -cld nor semi-cld.
Example 3.24
Let X = {x, y, z},  = {, {x}, X} and ℐ = {}. Then Ö-ℐC(X) = {, {y,z}, X} and  C(X) = S C(X) = {, {y},
{z}, {y, z}, X}. Here, L = {y} is  -cld as well as semi-cld but it is not Ö-ℐ-cld.
Remark 3.25
We obtain the following diagram, where A  B (resp. A B) represents A implies B but not conversely
(resp. A and B are independent of each other).

Diagram I

Diagram II
Theorem 3.26
A set L is Ö-ℐ-cld if and only if L*  L contains no nonempty gs-cld set.
Proof
Necessity. Suppose that L is Ö-ℐ-cld. Let T be a gs-cld subset of L*  L. Then L  Tc. Since A is Ö-ℐ-cld, we
have L*  Tc. Consequently, T  (L*)c. Hence, T  L*  (L*)c = . Therefore, T is empty.
Sufficiency. Suppose that L*  L contains no nonempty gs-cld set. Let L  T and T be ⋆-cld and gs-open. If L*
 T, then L*  Tc  . Since L* is a ⋆-cld set and Tc is a gs-cld set, L*  Tc is a nonempty gs-cld subset of L*
 L. This is a contradiction. Therefore, L*  T and hence L is Ö-ℐ-cld.
Theorem 3.27
A set L of X is Ö-ℐ-open if and only if F  int(L) whenever F is gs-cld and F  L.
576
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Proof
Suppose that F  int(L) such that F is gs-cld and F  L. Let Lc  G where G is gs-open. Then Gc  L and Gc is
gs-cld. Therefore Gc  int(L) by hypothesis. Since Gc  int(L), we have (int(L))c  G. i.e., (Lc)*  G, since
(Lc)* = (int(L))c. Thus, Lc is Ö-ℐ-cld. i.e., L is Ö-ℐ-open.
Conversely, suppose that L is Ö-ℐ-open such that F  L and F is gs-cld. Then Fc is gs-open and Lc  Fc.
Therefore, (Lc)*  Fc by definition of Ö-ℐ-cld and so F  int(L), since (Lc)* = (int(L))c.
Lemma 3.28
For an x  X, x  Ö-ℐ-cl(L) if and only if P  L   for every Ö-ℐ-open set P containing x.
Proof
Let x  Ö-ℐ-cl(L) for any x  X. To prove P  L   for every Ö-ℐ-open set P containing x. Prove the result by
contradiction. Suppose there exists a Ö-ℐ-open set P containing x such that P  L = . Then L  Pc and Pc is
Ö-ℐ-cld. We have Ö-ℐ-cl(L)  Pc. This shows that x  Ö-ℐ-cl(L) which is a contradiction. Hence P  L   for
every Ö-ℐ-open set P containing x.
Conversely, let P  L   for every Ö-ℐ-open set P containing x. To prove x  Ö-ℐ-cl(L). We prove the result
by contradiction. Suppose x  Ö-ℐ-cl(L). Then there exists a Ö-ℐ-cld set F containing L such that x  F. Then x
 Fc and Fc is Ö-ℐ-open. Also, Fc  L = , which is a contradiction to the hypothesis. Hence x  Ö-ℐ-cl(L).
REFERENCES
[1] A. Acikgoz, T. Noiri and S. Yuksel, On α-I-continuous and α-I-open functions, Acta Math.Hungar., 105(1-
2) (2004), 27-37.
[2] A. I. El-Maghrabi, and A. A. Nasef, Between semi-closed and GS-closed sets, Journal of Taibah University
for Science, 2(2009), 78-87.
[3] T. R. Hamlett and D. Jonkovic, Ideals in General Topology, Lecture notes in pure and Appl. Math.,
123(1990), 115-125.
[4] D. Jankovic and T. R. Hamlett, New topologies from old via ideals, Amer. Math. Monthly, 97(4) (1990),
295-310.
[5] K. Kavitha, P. Revathi, C. Shanmuga vadivu and A. Pandi, I-Closed Sets with Respect to an Ideal
Topological Spaces, GIS Science Journal, 8(6) (2021), 1276-1280.
[6] K. Kuratowski, Topology, Vol. I. New York, Academic Press (1966).
[7] S. Jafari and N. Rajesh, Generalized closed sets with respect to an ideal, European J. Pure Appl. Math.,
4(2) (2011), 147-151.
[8] N. Levine, Generalized closed sets in topology, Rend. Circ Mat. Palermo (2), 19(1970), 89-96.
[9] H. Maki, R. Devi and K. Balachandran, Associated topologies of generalized α-closed sets and α-
generalized closed sets, Mem. Fac. Sci. Kochi Univ. Ser. A. Math., 15(1994), 51-63.
[10] K. Nono, R. Devi, M. Devipriya, K. Muthukumarasamy and H. Maki, On g#α-closed sets and the digital
plane, Bull. Fukuoka Univ. Ed. part III, 53(2004), 15-24.
[11] N. Palaniappan and K. C. Rao, Regular generalized closed sets, Kyungpook Math. J., 33(1993),211-219.

AUTHOR DETAILS:
T. SIVA SUBRAMANIA RAJA1, G. ARUNA DEVI2, G. THANAVALLI 3 AND A. PANDI4
1
Assistant Professor, PG and Resarch Department of Mathematics, National College (Autonomous),
Tiruchirapalli, Tamilnadu, India
2
Assistant Professor, Department of Mathematics, Senthamarai College of Arts and Science, Vadapalanji,
Madurai, Tamilnadu, India
3
Kaspa Ayyalur, Ayyalur (Post), Vedasandur (TK), Dindigul District-624 801, Tamil Nadu, India
4
Assistant Professor, Department of Mathematics, Rathinam Technical Campus, Coimbatore-21, Tamil Nadu,
India

577
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

A GREEN SYNTHESIS AND CHARACTERIZATION OF ERBIUM DOPED CERIA–ZIRCONIA


NANOCOMPOSITES USING MORINDACITRIFOLIA FRUIT EXTRACT AND ITS ANTI-CANCER
ACTIVITIES

TAMILSELVI RAMASAMY, SUBALAKSHMI BABU, THIRUMOORTHI ARUNACHALAM* AND


KATHIKEYAN KATHIRAVAN

ABSTRACT
Erbium doped Ceria–Zirconia nanocomposites, (CeO2)(Zr1-xO2)(Er2O3)xO2 (x = 0.0, 0.1, 0.3, 0.5), has been
synthesized via green synthesis route using Morindacitrifolia fruit extract. The synthesis of (CeO 2)(Zr1-
xO2)(Er2O3)xO2 nanocompositeswas attained by processing the room temperature obtained mixed oxide solution
to the calcination temperature of 500°C. UV–Visible, FT–IR, XRD and SEM analyses have been employed to
ascertain the crystalline nature and morphology of the nanocomposites. The existence of dopant in the
nanocomposites and the bandgap energy in the range of 3.54-3.70 eV is confirmed with the UV-Visible
spectroscopy.In FT–IR, the stretching frequency of Ce–O, Zr–O and Er–O bands corresponds to 740, 443 and
471 cm-1 respectively. From the XRD, the cubic nature of Erbium-doped CeO2–ZrO2 nanocomposites is
confirmed. Also, the increase in concentration of Erbium dopant in the site of Zr haveenhanced the crystalline
growth with the crystallite size in the range of 40–80 nm. The anti-cancer activities have been performed
against MCF–7 cell line. Based on the observation, the cell viability losses and IC50 have been studied, which
confirms that the undopednanocomposites have lower cytotoxicity and inhibition rate than the doped
nanocomposites. The percentage of cell viability of cancer cell decreases with increase in concentration of
dopant and was found to be 22.8%. In addition, IC50 values have been decreased with increasing Erbium
concentration attributed that the synthesized nanocomposites have cytotoxic effect due to higher reactive
oxygen species generated for targeted toxicity.
Keywords: Ceria-Zirconia nanoparticles, MorindaCitrifolia fruit extract, Green synthesis, Erbium dopant,
Anticancer activities.

1. INTRODUCTION
Nanotechnology is the process of creating and manipulating particles with a diameter of less than 100 nm for
specialized purposes. Plants' physical and chemical entities can produce nanoscale materials. Green chemistry is
required to create nanoparticles in a safe, clean, and environmentally acceptable manner. Green nanotechnology
has garnered increased interest for its eco-friendly green production of metal oxide / mixed metal oxide
nanoparticles using plant-based synthesis. Green synthesis produces no hazardous byproducts and is therefore
more stable than chemical synthesis. Environmentally benign ingredients, such as plant extracts, operate as a
capping as well as the reducing agent, resulting in the development of nanomaterials. Its unique characteristics
related with the particle size, shape and dispersion makes them apart from its bulk counterparts [1-2]. The
synthesis of nanomaterials has been a significant endeavor due to their applications in nanoelectronics [3], nano
sensors [4], storage materials [5], catalysis, and nanomedicine [6].
Nanoparticles have recently garnered considerable attention from the scientific community. They have been
extensively studied in health sectors for diagnostic applications such as imaging of tumour cells, cytotoxicity
and carriers for medicine deliveries [7]. The reduced size of nanoparticles enables them for a safe integration
into biological systems which have a substantial impact on therapeutic and biological investigations. Various
metal oxides such as titanium oxide, zinc oxide, zirconium oxide iron oxide, bismuth oxide and cerium oxide
areextensively in medicinal applications [8–10]. Numerous processes are used to create nanoparticles, including
electrochemical, sonochemical, microwave-assisted, and ultrasonication. Nonetheless, most of these procedures
consume additional energy, include toxic compounds, and are difficult to purify. Recently, biological principles
have been devised to circumvent these challenges, resulting in the development of green chemistry, a method of
synthesis that is environmentally friendly [11].
Ceria is a lanthanide metal oxide with two bulk oxidation states, Ce+3 and Ce+4, so cerium dioxide can exist as
either CeO2 (Ce+4) or Ce2O3 (Ce+3). Cerium oxide is a cube-shaped fluorite that has atoms of cerium in the
corners and atoms of oxygen in the center. The cerium oxide nanoparticles have gotten a lot of attention and
utilized in chemical polishing, protection against corrosion, solar cells, sensing, catalysts, fuel oxidation with
therapeutic applications ranging from wound healing to anticancer treatments and drug delivering carriers [12–

578
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

16]. Cerium oxide nanoparticles can also get rid of reactive oxygen species (ROS), are safe for living things,
and aren't very dangerous at low concentrations. Cancer is a disease in which there are too many cells that can
spread to other parts of the body. Even though there are many ways to treat cancer, such as surgery,
chemotherapy, and radiation therapy, healthy cells are lost in the process. Nanotechnology might make it
possible for doctors to target cancer cells directly and selectively, which would make their treatments more
effective. Latest reports have revealed that cerium oxide nanoparticles can be utilized to kill cancer cell lines
[17].
Zirconium oxide is a structurally efficient material referred to as ceramic steel that is utilized in the manufacture
of cutting tools, engine components, and furnaces. ZrO2 nanoparticles are a polymorphic material that can be
employed for a variety of purposes, including fuel cells, catalysts, oxygen sensors, ceramic oxide thin films,
optical dielectrics, and antibacterial activity [18]. Zirconium oxide has recently been used in the medical
applications, showing promise as a big catalyst for dental fillings, crown fabrication, and therapeutic
applications. In compared to other metal oxides, there is a dearth of knowledge on the biological effects of
zirconia-based nanoparticles. ZrO2 nanoparticles are now used in the biomedical area for a variety of purposes,
including drug transport, drug targeting, labelling, and loading. Additionally, ZrO2 NPs are receiving
considerable attention in human health for their function in tumour imaging, cytotoxicity, and drug delivery, as
well as their anticancer, antioxidant, and antibacterial properties [19–21]. Their unique optical properties and its
extensive investigations in biological applications made the rare earth metals to acquire considerable attention
among the researchers. These elements possess beneficial biological properties such as anticoagulant,
antibacterial, anticancer, anti–inflammatory, and anti–tumor properties [22]. Er3+, Pr3+, Dy3+, Tm3+, and
Yb3+ are the most frequently employed lanthanide ions for doping, and hence the subject of this study.
For ages, herbal and natural medical items have been used in every culture on Earth. Morindacitrifolia L. has
long been recognized as a valuable medicinal herb for the treatment of a variety of physiological diseases. In
India, M. citrifolia is generally referred to as Noni or Indian mulberry. Historically, it has been used as an
antihelminthic, analgesic, antibacterial, antitumor, anti-inflammatory, and immunostimulant to treat a variety of
ailments. Additionally, it has been shown to be effective in the treatment of gastritis, skin ailments, respiratory
infections, menstrual and urinary tract disorders, diabetes, and venereal illnesses. Polynesians used the entire
Noni plant in medical preparations and as a color for some of their traditional clothing.
Sharma et al. [23] investigated the Morindacitrifolia L. fruits on cancer cell lines MCF–7, MDA–MB–231
(breast adenocarcinoma), and one non-cancerous cell line, HEK-293 (Human embryonic kidney), and found
that the ethyl acetate extract exhibited a greater degree of anticancer activity upon in vitro analysis. In addition,
they found that Noni extract inhibits intracellular ROS generation and mitochondrial membrane potential. The
green synthesis of silver nanoparticles using aqueous Morinda tinctoria Roxb leaf extract has been documented.
Morinda tinctoria Roxb, also known as Morindacitrifolia, and the extract of its leaves contain diuretic phenols
and flavonoids. AgNPs produced from M. tinctoria leaves shown strong antibacterial activity against pathogenic
bacterial and fungal cultures, as well as dosage-dependent free radical scavenging and anticancer activity during
its usage against the human hepatocellular carcinoma cell line (HepG2) [24].
Mahalingam Sundrarajan et al. [25] reported that Justicia adhatoda extract could be used to make CeO2–ZrO2
core metal oxide nanoparticles in a green way. The core metal oxides had a structure that looked like a bunch of
nanosticks stuck together, and they were more sensitive to gram-positive bacteria. Also, the toxicological
behaviour was linked to the fact that there were a lot of empty oxygen sites, that reactive oxygen species (ROS)
were made, that the particles were very small, and had the large surface area.
YokiYulizar et al. demonstrated an effective, eco-friendly sol–gel synthesis of CeO2 employing
Morindacitrifolia L. fruit extract as a weak base source, oxidizing agent, and capping agent. CeO2 NPs have an
FCC crystal structure with a nanospherical form, and their optical analysis was used to determine their UV light
absorption capacity by Methylene blue degradation, resulting in a poor photocatalytic efficiency of 10.25 and
9.46 percent under UV-A and UV-B, respectively. Additionally, CeO2 NPs have excellent optical properties,
with an absorption capacity of 89.27 and 67.55 percent for UV-A and UV-B, respectively [26].
Ansuman Chattopadhyay et al. [27] produced biocompatible silver nanoparticles by reducing and stabilizing
them with tyrosine and chitosan. Their toxicity was determined in human breast cancer cell lines MCF–7 and
MDA–MB–231. MTT experiment demonstrated an excellent cytotoxic impact with IC50 values and minimal
toxicity at effective dosages in normal human peripheral blood cells. Cytomorphological changes, ROS
production, and nuclear fragmentation were all observed in both cancer cell lines following therapy. As a result,
green produced silver nanoparticles are believed to be safe cytotoxic agents in the treatment of breast cancer.
579
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Iron nanoparticle’s in vitro cytotoxic and antioxidant properties were examined by BijenKivcakand team. Iron
oxide nanoparticles of Asphodelus aestivus aqueous extract (FeNPA) and ASP were investigated for anticancer
effectiveness in breast cancer, melanoma, and control cell lines. FeNPA was discovered to be more cytotoxic
against MCF-7 cell lines and to influence gene expression in breast cancer and melanoma cell lines with a
correlation to prognosis. In addition, the in vivo study of FeNPA-regulated gene expression in animals [28] was
conducted. Mina Sarani et al. employed an aqueous extract of Salvadora persica to manufacture
environmentally safe nanoparticles of cerium oxide doped with 1% and 5% Cadmium [29]. These nanoparticles
range in size from 10 to 20 nm and have a spherical shape. On the breast cancer cell line (MCF–7), undoped
CeO2 nanoparticles are more harmful than doped CeO2 nanoparticles. [30] The formation of a new MOF-
mediated CuO/CeO2 nanocomposite with a negatively charged surface was demonstrated. CuO/CeO2
nanocomposites exhibited dosage and time-dependent cytotoxicity against MCF-7 breast cancer cell lines, but
not normal fibroblasts.
According to our literature assessment, no mixed metal oxides have been identified to exhibit anticancer
properties, which justifies the current investigation. This research investigated the green synthesis of rare earth
metal (Er3+) doped ceria-zirconia nanocomposites utilizing Morindacitrifolia L. fruit extract, as well as their
characterization and anticancer testing on MCF-7 human breast cancer cell lines. MCF–7 cells include receptors
for oestrogen and progesterone, but not human epidermal growth factor receptor 2. (HER 2). UV-Visible, FT-
IR, XRD, and SEM with EDX were used to examine the structure, morphology, and optical properties. The
anticancer activity of MCF-7 cell lines was compared to the cytotoxicity of various doses of doped
nanocomposites and the cytotoxicity of the nanocomposites generated.
2. MATERIALS AND METHODS
2.1 Materials
Fresh Morindacitrifolia fruits were collected in Elayamuthur hamlet, near Udumalpet, Tirupur District,
Tamilnadu, India, between October and December 2021. At the State Horticulture Experimental Section in
Tirupur, the plant material was validated. Starting materials for the production of CeO2/ZrO include Cerium
(III) nitrate [Ce(NO3)3.6H2O] (Aldrich, 99 percent AR grade), Erbium (III) nitrate [Er (NO3)3.6H2O] (Aldrich,
99 percent AR grade), and Zirconyl (IV) nitrate [ZrO (NO3)2.2H2O] (Aldrich, 99 percent AR grade). The
compounds were used without further purification. For solution preparation and washing, double deionized
water was used throughout the experiment.
2.2 Preparation of Plant Extract
The extract was made from fresh Morindacitrifolia fruits. 1 kg of fresh fruits were washed thoroughly with tap
water before being washed twice with double distilled water to remove dust particles and other contaminants.
The fruits were then deposited into a glass jar and left for 10-12 days after which the extract was collected and
filtered using Whatman filter paper No. 1. The extract was then kept refrigerated at 4°C for future use.
2.3 Green Synthesis of CeO2–ZrO2 nanocomposites (CZ) and Erbium doped CeO2–ZrO2
nanocomposites (ECZ)
CeO2–ZrO2 and (CeO2)(Zr1-xO2)(Er2O3)xO2(x = 0.0, 0.1, 0.3, 0.5) nanocomposites were synthesized via a facile
hydrothermal method at the molar ratio of Zr: Er are 9:1, 7:3 and 5:5. A calculated quantities of Erbium nitrate
[Er(NO3)3.6H2O], Cerium nitrate [Ce(NO3)3.6H2O], and Zirconium nitrate [ZrO(NO3)2.2H2O] were dissolved
separately in double deionized water and mixed together in a Pyrex glass dish. 25 mL of Morindacitrifolia fruit
extract was added to the above mixture and stirred vigorously in a magnetic stirrer at 500 rpm to obtain a clear
solution. The dish containing the reaction mixture was calcined at 500oC for 2 hrs to obtain the powders of CZ
and ECZ nanocomposites whose compositions are given below in table 1.
Table: 1 Composition of synthesized CZ and Er doped CZ nanocomposites.
Sample Nanocomposites Formula Mole ratio of Ce : Zr : Er
CZ CeO2–ZrO2 1:1:0
ECZ–1 (CeO2)(ZrO2) 0.9(Er2O3)0.1O2 1 : 0.9 : 0.1
ECZ–2 (CeO2)(ZrO2) 0.7 (Er2O3)0.3O2 1 : 0.7 : 0.3
ECZ–3 (CeO2)(ZrO2) 0.5 (Er2O3)0.5O2 1 : 0.5 : 0.5
2.4 Characterization of CZ and ECZ Nanocomposites
UV–Visible absorption spectra of synthesized CZ and ECZ nanocomposites were recorded using double beam
UV-Visible spectrophotometer (UV-V-670, JASCO, USA) equipped UV-Probe software. The vibrational
analysis of prepared nanocomposites was recorded in the range of 4000- 400 cm-1 by using an IR Prestige-21
580
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

spectrometer, Shimadzu using KBr pellets. X-ray diffraction (XRD) measurements were carried out on a
Shimadzu lab X-6000 diffractometer with Cu Kα radiation (λ = 1.54A˚). The morphological and compositional
analysis were examined by the JEOL SEM-6390 and Oxford Instruments, INCA PENTA FET X3 respectively.
2.5 Cytotoxicity of CZ and ECZ Nanocomposites
To study the cellular cytotoxicity of the CZ and ECZ nanocomposites, the MTT assay, a sensitive and
quantitative colorimetric assessment test for enzyme activity, was used. MCF-7 cells were planted at a density
of 50000 cells/well in a 96-well plate (100 l each well). Different concentrations of CZ and ECZ were applied to
the partial monolayer in microtiter plates. The plates were then incubated at 37°C in a 5% CO 2 atmosphere for
24 hours. After successfulincubation, the test solutions were removed from the wells, and 0.05mg MTT was
supplied to each well Then, the plates were taken into incubation process and left for 4 hours at 37°C in a 5%
CO2 environment. The plates were taken out and the supernatant was removed. To dissolve the formazan, which
was formed during the process, 100 ml of DMSO were added to the plates and gently shaken till the formazan
gets dissolved. A microplate reader was used to detect absorbance at a wavelength of 590 nm.
3. RESULTS AND DISCUSSION
3.1 UV – Visible Spectra
The UV-Vis absorption spectra of various compositions of cerium zirconium oxide electrolytes such as
Ce0.8Zr0.2O1.9, Ce0.7Zr0.3O1.85, and Ce0.6Zr0.4O1.8 were examined by Rajasekaran et. al. [31]. The
absorption spectra implies that the electrolytes have a prominent absorption in the UV region (< 400 nm). Such
behaviour is linked with the charge transfer induced by the transitions between the oxygen O 2 (2p) and cerium
Ce4+ (4f) of the cerium oxide. There is a red shift in the absorption band due to an interface polaron effect which
is produced by electron-phonon interactions. The cerium oxide exhibits a bandgap of 3.1 eV in its crystalline
form and absorbs significantly in the UV area at 400 nm, whereas ZrO2 absorbs at 240 nm. The band gap
changes due to zirconium oxide doping, resulting in a blue shift and a single peak at 327 nm that corresponds to
cerium oxide [32].
Benjaram M. Reddy et al. investigated the oxygen–metal ion charge transfer bands in ceria-based solid solutions
using UV–vis DRS [33]. The CZ solid solution calcined at 773K exhibits three absorption peaks in the 250–
340nm wavelength range. The bands at 255 and 287 nm correspond to O2- Ce3+ and O2- Ce4+, respectively,
and the third band at approximately 340 nm is formed by an interband transition. The rare earth Pr3+ dopant in
the Zr site has a highly intense visible range of 400–650 nm, demonstrating rare earth doping into the ceria
lattice, because the Pr3+ transition becomes a high intensity defect peak in Raman spectra.

CeO2 - ZrO2
0.34 Ce Zr0.9Er0.1O3
Ce Zr0.7Er0.3O3
Ce Zr0.5Er0.5O3
0.32
Intensity (a.u)

0.30

0.28

0.26

300 400 500 600 700 800


Wavelength (nm)
Figure 1: UV-Visible spectra CZ and ECZ nanocomposites
The absorption peaks for CZ, ECZ–1, ECZ–2, and ECZ–3 in the UV-Visible spectra of CZ and ECZ
nanocomposites are 346 nm, 359 nm, 360 nm, and 373 nm, respectively. These peaks are strong absorption
bands below 400 nm caused by the charge-transfer transition in cerium oxide from O2- (2p) to Ce4+ (4f)
orbitals. The absorbance displays a red shift due to the interface polaron effect caused by electron phonon
interaction. The band gap of the nanocomposites produced was determined to be between 3.58 and 3.32 eV.
When Er3+ ions are introduced into ZrO2, the optical characteristics of the material change dramatically, and Er
581
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

doped zirconia samples exhibit f–f transitions that color them. Due to oxygen vacancies in the crystal structure
of the prepared nanocomposites, the rare earth Er3+ dopant in the Zr site revealed a strong intensity absorption
band in the visible range, with the peak changing with increasing Er3+ ion concentration.
3.2 FT - IR Spectra
The synthesized ceria-zirconia and erbium doped ceria-zirconia nanocomposites were investigated with a FT-IR
spectroscopy to unveil the functional groups present in the biomolecules, which are responsible for stabilizing
the nanoparticles. The FT-IR spectrum revealed that the fruit extract fromMorindacitrifoliacomprises alkaloids,
flavones, anthraquinones, vitamin-C and glycosides. In addition, various volatile compounds such as hexanoic
and octanoic acids as well as 3-methyl-3-buten-1-ol were present. In the FT-IR spectra of fruit extract, the
vibrational modes of alkyl and aldehyde groups were denoted by N-H stretching vibration with a noticeable
peak at 3330 cm-1. It is further confirmed by the C-H stretching vibrations at 2972 cm-1 and 2884 cm-1. The
amide (I) of carbonyl bending vibrations in the extract's amide linkages correlates to the unique and strong
absorption band at 1653 cm-1.The vibrational bands of C-N stretching induced by aromatic and aliphatic amines
were observed at 1379 cm-1 and 1086 cm-1. The C-H groups corresponding to phenyl ring assigned to the
bending vibrations at 879 cm-1 and 801 cm-1 whereas an aromatic C-H vibration is observed at 620 cm-1 [34].
The FT-IR spectra of nanocomposites produced with M.citrifolia are shown in Figure 2. It was discovered that
the C-H stretching vibration of alkyl and aldehyde groups has a frequency range of 2980-2988cm-1. Peaks at
approximately 1732-1738 cm-1 correspond to the >C=O stretching mode of aldehydes and ketones in the plant
extract. The peaks around 1600 cm-1 are caused by hydrogen bending vibrations of main protein in M.citrifolia
fruit extract due to intense interaction/capping of biomolecules with metal oxide nanoparticles. The vibration
modes of various peaks of CZ and ECZ nanocomposites are shown in table.2.

Figure 2: FT-IR spectra of (a) CZ (b) ECZ–1 (c) ECZ–2 (d) ECZ–3
Table 2: FT–IR spectral data of synthesized nanocomposites:
CZ ECZ–1 ECZ–2 ECZ–3
Peak Peak Peak Peak
Assignmen Assignmen Assignmen Assignmen
Position Position Position Position
ts ts ts ts
(cm-1) (cm-1) (cm-1) (cm-1)
Ce-O and 443.63 Ce-O and Ce-O and Ce-O and
460.99 476.41 482.20
Zr-O Zr-O Zr-O Zr-O
- Er-O Er-O Er-O
- 557.43 551.64 588.28
stretching stretching stretching
C-N C-N C-N C-N
1207.44 1207.44 1207.44 1207.44
stretching stretching stretching stretching

582
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Interaction Interaction Interaction Interaction


between between between between
plant plant plant plant
1620 1600 1605 1581
extract and extract and extract and extract and
metal metal metal metal
oxides. oxides oxides oxides
C=O C=O C=O C=O
stretching stretching stretching stretching
mode of mode of mode of mode of
1732.08 1728.22 1722.43 1737.86
carbonyl carbonyl carbonyl carbonyl
group in group in group in group in
the extract the extract the extract the extract
C-H C-H C-H C-H
stretching stretching stretching stretching
2986.08 of alkyl and 2987.74 of alkyl and 2980.02 of alkyl and 2987.74 of alkyl and
aldehyde in aldehyde in aldehyde in aldehyde in
the extract the extract the extract the extract
O-H O-H O-H O-H
stretching stretching stretching stretching
3628.10 of alcohol 3628.10 of alcohol 3628.10 of alcohol 3628.10 of alcohol
in the in the in the in the
extract extract extract extract
3.3 XRD Analysis
The X–ray diffraction device is an exceptional tool for analyzing and determining crystal properties. The
materials subjected to XRD analysis can yield us structural properties such as the phase, composition, size,
shape and orientation. In reports, the XRD pattern of Er doped CeO2 has revealed bragg diffraction peaks at

(311), (222), (400), (401) and (331) respectively. The pure CeO2 and Er doped CeO2 at lower dopant
concentrations have displayed only fluorite cubic structure as its major phase without any new phases.
However, at higher Er dopant concentrations, new phases besides the cubic structure have appeared.
Furthermore, Erbium doped Ceria has only fluorite cubic structure as a major phase at low Erbium
concentrations, whereas at higher Erbium concentrations, new phases appear. The intensity of the peaks
increases as the crystalline nature improves at low concentrations of Er [35]. CUI Meisheng et al. [36]
discovered a fluorite cubic phase in cerium–zirconium mixed oxide with the formula Zr0.5Ce0.5O2. The
diffraction peaks are indexed to different crystallographic faces that correspond to fluorite type cerium-
zirconium mixed oxide solid solutions. Due to the (111), (200), (220), and (311) planes, the cubic phase of
Zr0.5Ce0.5O2 has two values of 29.120°, 33.731°, 48.468°, and 57.541°.

Figure 3: XRD pattern of (a) CZ (b) ECZ–1 (c) ECZ–2 (d) ECZ–3
The structural analysis was done using X-ray diffraction studies and figure 3 shows the XRD pattern of
synthesized nanocomposites CZ, ECZ–1, ECZ–2 and ECZ–3. The values of 2θ at 28.20°, 33.32°, 47.11°,
56.48°, 59.19°, 69.21°, 76.40° and 79.37° represents the planes (111), (200), (220), (311), (222), (400), (331)
and (420) respectively. The nanocomposites synthesized have fluorite cubic structure and the crystalline size of

583
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

ceria-zirconia was found to be 55.81nm. The doping of Er3+ in the zirconium site decreases the crystalline size
because Er3+ ion is an effective grain growth inhibitor. However, the crystalline size of ECZ–3 nanocomposite
increases indicating the phase separation causing crystal size growth. Also, as the dopant Er 3+concentration is
increased, Er3+ replaces Ce4+ in the CeO2 lattice, and then filled the CeO2 lattice interstice. The table: 3 shows
that crystalline size and structural parameters of synthesized nanocomposites.
Table 3: Structural parameters of nanocomposites:
Crystalline size
Samples Lattice parameter (A°) V (A°)3
(nm)
CZ 55.61 5.3210 150.65
ECZ–1 64.73 5.4208 159.29
ECZ–2 45.25 5.3619 154.15
ECZ–3 87.53 5.4053 157.92
3.4 SEM Analysis

(a) (b)

(c) (d)
Figure 4: SEM images of (a) CZ (b) ECZ–1 (c) ECZ–2 (d) ECZ–3
Son-Ki Ihm and his researchers examined at the SEM images and pore size distributions of Ce0.65Zr0.35O2.
They found that the mixed oxide nanoparticles were clumped together, with the spaces between the
nanoparticles acting as pores. With the supercritical synthesis process, pores with a size of more than 10 nm
were found. The co-precipitation method showed that the pores were less than 5 nm in size and had a shape that
was very clumped together. The densely agglomerated shape of the ceria-zirconia mixed oxide made by the co-
precipitation method stops lattice oxygen from migrating from the bulk to the atmosphere. This means that the
ceria-zirconia mixed oxide does have more reduction and thermal properties than nanoparticles made with the
supercritical method [37].

584
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Ceria-zirconia mixed oxides made with triethylamine as a template (CZS) had more uniform particles and a
more even distribution than ceria-zirconia mixed oxides made without a template (CZ). The secondary
aggregated particles of CZS are also bigger than those of CZ, which means that larger grains have been packed
into bigger secondary aggregated particles [38]. SEM pictures also show that the structure of the secondary
aggregated particles in CZS is more stable, which is why it has better textural qualities and is more stable. Maria
Cristina Paganini et al. [39] looked at the shape and size of cerium and erbium doped ZrO2 nanoparticles used
as photocatalysts with a Field Emission Scanning Electronic Microscope. All the samples had nanometric-sized
powders that had clumped together, but pure zirconia had structures that looked like grains of rice and had a
size of less than 100 nm. As the amount of Ce and Er in the zirconia nanometric structures goes up, the
structures become more spherical and smaller.
Figure 4 shows how the CZ, ECZ–1, ECZ–2, and ECZ–3 nanocomposites were made. The undoped CZ mixed
metal oxides were found to be clusters of spheres with a crystal size of about 55nm. Even though Er3+ ion
slows down grain growth, adding more dopant Er3+ makes the crystals bigger, and the effect of dopant on grain
growth and phase separation gives nanocomposites a spherical shape. Er-doped ceria-zirconia mixed metal
oxide nanocomposites also had crystals that were between 45 nm and 88 nm in size. The dopant was spread out
evenly across the 45 nm granular aggregates that make up the nanocomposite ECZ-2. On the surface of mixed
metal oxides, there were a lot of round particles, and the surface became less porous and rougher. Also, when
you zoom in closer, you can see that the surface is spherical and rough, with a small range of particle sizes.
3.4 EDX Analysis
EDX analysis was used to determine out what elements were in CZ and ECZ nanocomposites, as shown in
figure 5. Table 4 shows the atomic percentages of the elements that were in the nanocomposites. There
is Cerium (Ce), Zirconium (Zr), Erbium (Er), Oxygen (O), Carbon (C), Nitrogen (N), and other elements. These
results show that the Ce:Zr:O stoichiometric ratio was 1:1:2, which is the same as the ratio for making CeZrO 2
in an undoped nanocomposite. However, the weight percent of Er in the Er-doped nanocomposites ECZ–1,
ECZ–2, and ECZ–3 was 6.4, 9.2, and 11.6, respectively. Even though carbon, nitrogen, and other elements were
found, the amount of Er in the samples made their atomicweight percentagesgo down.

(a) (b)

(c) (d)
Figure 5: EDX elemental analysis of (a) CZ (b) ECZ–1 (c) ECZ–2 (d) ECZ–3
585
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table 4: Weight percentage of synthesized nanocomposites:


Percentage by weight
Elements
CZ ECZ–1 ECZ–2 ECZ–3
Ce 17.27 18.74 17.45 17.58
Zr 14.88 13.81 12.25 11.22
Er - 6.35 9.20 11.60
O 60.05 59.10 59.10 59.15
C, N and other elements 7.80 2.00 2.20 0.45
Total 100 100 100 100
3.6 Cytotoxic Analysis
The MCF–7 cell line was utilized to test the effect of doping on MnxCe1-xO2 nanocomposites and their dose-
dependent toxicity. When the cell line is irradiated with red light in presence of nanocomposites and drugfor 30
minutes, the number of viable cells reduced considerably. The drug dosage and doped nanocomposite load were
increased from 40 ppm NP + 20 g ALA/PpIX to 200 ppm NP + 100 g 5-ALA/PpIX. The effect of increased
drug + various doped nanocomposite on the cancer cell line was recorded. The 9 % Mn-doped CeO2
nanocomposite was found to be more effective at treating MCF–7. Also, it was discovered that the
nanocomposite had a crystallite size of 6 nm, which allowed it to remain in the cells for a longer duration than
the largeparticle sized nanocomposite, which caused more cell damage [40]. The varied amounts of reactive
oxygen species formation have also been ascribed to the differential cytotoxicity of undoped and various Mn (
upto 7%) doped CeO2 nanoparticles and an overall cytotoxicity of Mn (9 %) doped CeO2 Nps. The IC50 is a
pharmacological evaluation of a drug's efficiency in suppressing targeted biological growth, and it is the
determination of the destroying 50% of malignant cells in vitro induced by a drug/nanocomposite toxicity
against a cell line.
Kamaraj et al. [41] established that the anticancer effect of calcined cerium oxide nanoparticles against MCF–
7(Human Breast cancer cell line) with normal L–6 cell line (Rat muscle). It has been observed that CeO2
nanoparticles possess least toxic to normal L–6 cell while more toxic to MCF–7 cell line based on IC50 values
and found that an increase in concentration of CeO2 Nps decreases the cell viability of MCF–7. Hence, due to
reduced size and large surface area of CeO2 Nps, it had better cytotoxicity against MCF–7 cell line.
The cell viability and IC50 values of synthesized nanocomposites against MCF–7 (Human Breast cancer cell
line) cell line is shown in Table 5. The cell morphology and the percentage of cell viability are presented in
Figure 6 and Figure 7 respectively. The cell morphology shows that many dead cells and their debris presents in
the culture media, and the cell viability is lowered for ECZ–2 nanocomposite. This confirmed that ECZ–2
nanocomposite has better cytotoxicity against MCF–7 cell line and the cell viability and IC50 values are found
to be 22.8 and 8.90 respectively. It has been observed that the better cytotoxicity effects are due to smaller
ECZ–2 nanocomposite, which is preserved in the cells for a long duration time than the other synthesized
nanocomposites that possessed largesize particles and able to induce a greater damage to the MCF–7 cells than
its counterparts.
Table 5: Cytotoxic activity parameters of undoped and Er3+ doped CeO2-ZrO2 nanocomposites:
Samples Cell viability IC50
CZ 26.8 10.30
ECZ–1 23.1 9.24
ECZ–2 22.8 8.90
ECZ–3 30.9 9.68

586
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Figure 6: Cell morphology of MCF–7 cell after treatment with 100µg/L of nanocomposites. (a) CZ (b)
ECZ–1 (c) ECZ–2 (d) ECZ–3

Figure 7: Cell viability of MCF–7 cell line using undoped and doped nanocomposites in different
concentrations of MCF–7.
4. CONCLUSION
Ceria–Zirconia (CZ) and erbium doped ceria–zirconia mixed metal oxide nanocomposites (ECZ) with the
composition CeZr1-xErxO2 (x = 0.1, 0.3, and 0.5) have been synthesized by a green synthesis process utilizing
Morindacitrifolia fruit extract. The XRD examination revealed that the fluorite cubic structure of the undoped
and erbium-doped mixed metal oxide nanocomposites is extremely pure and crystalline. SEM photos confirmed
the nanocomposites' spherical shape. The MTT assay indicated that the ECZ–2 nanocomposite had a low cell
viability and IC50 value in the presence of MCF-7 cells. Thus, green produced erbium doped mixed metal oxide
(ECZ–2) nanocomposites shown increased anticancer activity compared to undoped CZ nanocomposites. Their
toxic action on malignant microorganisms enables the use of nanoparticles as a medication delivery platform.
This discovery may provide a solid foundation for further research into the green synthesis of nanocomposites
for use in a variety of medicinal therapies. Thus, this environmentally friendly approach for synthesizing
undoped and erbium-doped mixed metal oxide nanocomposites is biocompatible and may be useful in the
development of cancer treatments.
REFERENCES
1. J. Jeevanandam, A. Barhoum, Y.S. Chan, A. Dufresne, M.K. Danquah, Review on nanoparticles and
nanostructured materials: history, sources, toxicity and regulations, Beilstein J. Nanotechnol. 2018, 9 (1),
1050–1074. https://doi.org/ 10.3762/bjnano.9.98
2. J.K. Patra, G. Das, L.F. Fraceto, E.V.R. Campos, M. del Pilar Rodriguez-Torres, L. S. Acosta-Torres, L.A.
Diaz-Torres, R. Grillo, M.K. Swamy, S. Sharma, S. Habtemariam, Nano based drug delivery systems:
recent developments and future prospects, J. Nanobiotechnol. 2018, 16 (1). https://doi.org/10.1186/
s12951-018-0392-8
587
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

3. M.J. Deen and F. Pascal, Electrical Characterization of Semiconductor Materials and Devices-Review,
Journal of Materials Science: Materials in Electron, 2006, 17(8), 549–575.
http://dx.doi.org/10.1007/s10854-006-0001-8
4. N. Tessler, V. Medvedev, M. Kazes, S.H. Kan and U. Banin, Efficient Near-Infrared Polymer Nanocrystal
Light-Emitting Diodes, Science, 2002, 295(5559), 1506–1508. http://dx.doi.org/10.1126/science.1068153
5. S. Kim, H. Moon, D. Gupta, S. Yoo and Y.K. Choi, Resistive Switching Characteristics of Sol-gel Zinc
Oxide Films for Flexible Memory Applications, IEEE Transaction on Electronic Devices, 2009, 56(4),
696–699.http://dx.doi.org/10.1109/TED.2009.2012522
6. S.M. Moghimi, A.C. Hunter and J.C. Murray, Nanomedicine: Current Status and Future Prospects, FASEB
Journal, 2005, 19(3),311–330. http://dx.doi.org/10.1096/fj.04-2747rev
7. L.M. Tolliver, N.J. Holl, F.Y.S. Hou, H.J. Lee, M.H. Cambre, Y.W. Huang, Differential cytotoxicity
induced by transition metal oxide nanoparticles is a function of cell killing and suppression of cell
proliferation, Int. J. Mol. Sci.,2020, 21(5), 1731.https:// doi.org/10.3390/ijms21051731.
8. A. Raghunath, E. Perumal, Metal oxide nanoparticles as antimicrobial agents: a promise for the future, Int.
J. Antimicrob. Agents, 2017, 49, 137–152. https://doi. org/10.1016/j.ijantimicag.2016.11.011.
9. A.A. Menazea, M.K. Ahmed, Silver and copper oxide nanoparticles-decorated graphene oxide via pulsed
laser ablation technique: Preparation, characterization, and photoactivated antibacterial activity, Nano-
Struct. Nano-Objects, 2020, 22, 100464.https://doi. org/10.1016/j.nano.2020.100464
10. M.P. Nikolova, M.S. Chavali, Metal oxide nanoparticles as biomedical materials, Biomimetics, 2020,
5(20), 27.https://doi. org/10.3390/biomimetics5020027
11. K.S. Mukunthan, E.K. Elumalai, T.N. Patel, F.V. RamachandraMurty, Catharanthusroseus: A natural
source for the synthesis of silver nanoparticles, Asian Pacific J. Trop. Biomed., 2011, 270–
274.https://doi.org/10.1016/s2221-1691 (11)60041-5
12. V. Golfinopoulos, G. Pentheroudakis, N. Pavlidis, Treatment of colorectal cancer in the elderly: A review
of the literature, Canc. Trear Rev., 2006, 32(1), 1–8.
13. A. Miri, S. AkbarpourBirjandi, M. Sarani, Survey of cytotoxic and UV protection effects of biosynthesized
cerium oxide nanoparticles, J. Biochem. Mol. Toxicol., 2020, e22475.
14. A. Miri, M. Darroudi, M. Sarani, Biosynthesis of cerium oxide nanoparticles and its cytotoxicity survey
against colon cancer cell line, App. Organomet. Chem., 2020, 34(1), e5308.
15. C.H. Baker, Harnessing cerium oxide nanoparticles to protect normal tissue from radiation damage, Transl.
Cancer Res., 2013, 2(4), 343–358.
16. M. Abbasi, Radioprotection of military forces: Past, present and future, J. Md. Med., 2003, 5(1), 69–79.
17. A. Clark, A. Zhu, K. Sun, H.R. Petty, Cerium oxide and platinum nanoparticles protect cells from oxidant-
mediated apoptosis, J. Nano Res., 2011, 13(10), 5547. https://doi. org/10.1007/s11051-011-0544-3
18. D.G. Shchukin, R.A. Caruso, Inorganic Macroporous Films from Preformed Nanoparticles and Membranes
as Templates: Synthesis and Investigation of Photocatalytic and Photoelectrochemical Properties, J.
Advanced Functional Materials, 2003, 13, 789-794.https://doi. org/10.1002/ADFM.200304415
19. L.N. Nagy, Silica@zirconia@poly (malic acid) nanoparticle: A promising nanocarrier for theranostic
applications, Journal of Materials Chemistry B, 2016, 4(25), 4420–4429.https://doi.
org/10.1039/c6TB01102k
20. F. Li, Z. Liang, J. Liu, J. Sun, X. Hu, M. Zhao, J. Liu, R. Bai, D. Kim, X. Sun, T. Hyeon, Dynamically
reversible iron oxide nanoparticle assemblies for targeted amplification of T1-weighted magnetic
resonance imaging of tumors, NanoLett., 2019, 19(7), 4213–4220,
https://doi.org/10.1021/acs.nanolett.8b04411.
21. S. Balaji, B.K. Mandal, S. Ranjan, N. Dasgupta, R. Chidambaram, Nano-zirconia–evaluation of its
antioxidant and anticancer activity, J. Photochem. Photobiol. B Biol., 2017, 170, 125–133.https://doi.
org/10.1016/j.jphotobiol.2017.04.004

588
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

22. R Sasikala, S Kutti Rani, K Karthikeyan, D Easwaramoorthy, Synthesis and Antibacterial studies of
Lanthanum, Cerium and Erbium loaded Copper Oxide Nanoparticles, DJ Journal of Engineering Chemistry
and Fuel, 2016, 1(4), 43-51. https://doi. org/10.18831/djchem.org/2016041004
23. K. Sharma , S. D. Pachauri , K. Khandelwal, H. Ahmad, A. Arya, P. Biala, S. Agrawal, R. R. Pandey, A.
Srivastava, A. Srivastav, J. K. Saxena, A. K. Dwivedi, Anticancer Effects of Extracts from the Fruit of
MorindaCitrifolia (Noni) in Breast Cancer Cell Lines, Drug Research, 2016, 66(3),141-147.https://doi.
org/10.1055/s-0035-1555804
24. GeethaParamasivam, RevathyKannan, SugapriyaMenagaPaulraj, JeyarajPandiarajan, Green synthesis of
silver nanoparticles from MorindatinctoriaRoxb and scrutiny of its multi facet on biomedical applications,
Pharmaceutical and Biological Evaluations, 2017, 4, 222-233. https://doi. org/10.26510/2394-
0859.pbe.2017.35
25.PandiyanNithya, MurugesanBalaji, SonamuthuJegatheeswaran,SamayananSelvam, MahalingamSundrarajan,
Facile biological synthetic strategy to morphologically aligned CeO2/ZrO2 core nanoparticles using
Justiciaadhatoda extract and ionic liquid: Enhancement of its bio-medical properties, J. Photochem.
Photobiol.B, 2017, 178, 481.https://doi. org/10.1016/j.jphotobiol.2017.11.036
26. YokiYulizar, SumandiJuliyanto, Sudirman, DewanggaOkyBagusApriandanu, RizkiMarcony Surya, Novel
sol-gel synthesis of CeO2 nanoparticles using Morindacitrifolia L. fruit extracts: Structural and optical
analysis , Journal of Molecular Structure, 2021, 1231,https://doi. org/10.1016/j.molstruc.2021.129904
27. ArindamBandyopadhyay, Bishnupada Roy, Pallab Shaw, ParitoshMondal, Maloy Kr. Mondal, Pranesh
Chowdhury, Shelley Bhattacharya, AnsumanChattopadhyay,Cytotoxic effect of green synthesized silver
nanoparticles in MCF7 and MDA‑MB‑231 human breast cancer cells in vitro, Nucleus, 2019 ,63,191-
202.https://doi.org/10.1007/s13237-019-00305-z
28. Burcu Sumer Tuzun, TugceFafal, PelinTastan, BijenKivcak, BesraOzmenYelken, CaglaKayabasi,
SundeYılmazSusluer and CumhurGunduz, Structural characterization, antioxidant and cytotoxic effects of
iron nanoparticles synthesized using AsphodelusaestivusBrot. aqueous extract, Green Process Synth, 2020,
9, 153–163. https://doi.org/10.1515/gps-2020-0016
29. KhadijehHamidiana, Mohammad Reza Saberian , AbdolhosseinMiri , FatemehSharifi , Mina Sarani, Doped
and un-doped cerium oxide nanoparticles: Biosynthesis, characterization, and cytotoxic study, Ceramics
International, 2021, 47, 13895–13902. https://doi.org/10.1016/j.ceramint.2021.01.256 .
30. Mohammad JavadFarhangi, Ali Es-haghi, Mohammad EhsanTaghavizadehYazdi, Abbas Rahdar, and
Francesco Baino, MOF-Mediated Synthesis of CuO/CeO2 Composite Nanoparticles: Characterization and
Estimation of the Cellular Toxicity against Breast Cancer Cell Line (MCF-7), J. Funct. Biomater., 2021,
12, 53. https://doi.org/10.3390/jfb12040053
31. K.AmarsinghBhabu, J. Theerthagiri, J. Madhavan, T. Balu, G. Muralidharan and T.R. Rajasekaran,
Enhanced electrochemical behavior of ceria based zirconia electrolytes for intermediate temperature solid
oxide fuel cell applications, J. Mater. Sci: Mater Electron 2016, 27, 10980–10992, doi: 10.1007/s10854-
016-5214-x
32. Ajin C. Sajeevan and V. Sajith, A Study on oxygen storage capacity of Zirconium-Cerium-Oxide
Nanoparticles, Adv. Mater. Res., 2013, 685, 123–127, https://doi: 10.4028/www.scientific.net/
AMR.685.123
33. D. Devaiah, Lankela H. Reddy, K. Kuntaiah and Benjaram M. Reddy, Design of novel ceria–based nano–
oxides for CO oxidation and other catalytic applications, Ind. J. Chem., 2012, 51A, 186–195.
34. M. Sundrarajan, K. Bama, M. Bhavani, S. Jegatheeswaran, S. Ambika, A. Sangili, P. Nithya, R.Sumathi,
Obtaining titanium dioxide nanoparticles with spherical shape and antimicrobial properties using M.
citrifolia leaves extract by hydrothermal method, Journal of Photochemistry & Photobiology, B: Biology,
2017, https://doi: 10.1016/j.jphotobiol.2017.05.003.
35. C. Maria Magdalane, K. Kaviyarasu, A. Raja, M.V. Arularasu, Genene T. Mola, Abdulgalim B. Isaev, Naif
Abdullah Al-Dhabi, MariadhasValanArasu, B. Jeyaraj, J. Kennedy, M. Maaza, Photocatalytic
decomposition effect of erbium doped cerium oxide nanostructures driven by visible light irradiation:

589
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Investigation of cytotoxicity, antibacterial growth inhibition using catalyst, Journal of Photochemistry &
Photobiology, B: Biology, 2018, https://doi: 10.1016/j.jphotobiol.2018.06.011.
36. YUE Mei, CUI Meisheng, ZHANG Na, LONG Zhiqi, HUANG Xiaowei, Characterization of CeO 2-ZrO2
mixed oxides prepared by two different co-precipitation methods, Journal of Rare Earths, 2013, 31(3), 251.
doi:10.1016/S1002-0721(12)60267-1.
37. Jeong-Rang Kim, Wan-Jae Myeong, Son-Ki Ihm, Characteristics in oxygen storage capacity of ceria-
zirconia mixed oxides prepared by continuous hydrothermal synthesis in supercritical water, Applied
Catalysis B: Environmental, 2007, 71, 57-63. https://doi: 10.1016/j.apcatb.2006.08.015.
38. Yi Zhou, Li Lan, Maochu Gong, Yaoqiang Chen, Modification of the thermal stability of doped CeO2–
ZrO2 mixed oxides with the addition of triethylamine and its application as a Pd-only three-way catalyst.
Journal of Materials Science, 2016, 51(9), 4283–4295. https://doi:10.1007/s10853-016-9733-x.
39. Chiara Gionco, Simelys Hernandez, Micaela Castellino, Tanveer Ahmed Gadhi, Jose Alejandro Munoz-
Tabares, Erik Cerrato, Alberto Tagliaferro, Nunzio Russo, Maria Cristina Paganini, Synthesis and
characterization of Ce and Er doped ZrO2 nanoparticles as solar light driven photocatalysts, Journal of
Alloys and Compounds, 2018, S0925-8388(18)33712-5, https://doi.org/10.1016/j.jallcom.2018.10.046.
40. M. Atif, Seemab Iqbal, M. Fakhar-E-Alam, M. Ismail, QaisarMansoor, Lubna Mughal, Muhammad
Hammad Aziz, AtifHanif and W.A. Farooq, Manganese-Doped Cerium oxide nanocomposites induced
photodynamic therapy in MCF–7 cancer cells and antibacterial activity, BioMed Research International,
2019, Article ID 7156828, https://doi.org/10.1155/2019/7156828.
41. M. Sridharan, P. Kamaraj, Vennilaraj, J. Arockiaselvi, T. Pushpamalini, P.A. Vivekanand, and S. Hari
Kumar, Synthesis, Characterization and evaluation of biosynthesized Cerium oxide nanoparticles for its
anticancer activity on breast cancer cell (MCF 7), Materials Today: Proceedings,
2020,https://doi.org/10.1016/j.matpr.2020.07.031.

AUTHOR DETAILS:
TAMILSELVI RAMASAMY1, SUBALAKSHMI BABU2, THIRUMOORTHI ARUNACHALAM3* AND
KATHIKEYAN KATHIRAVAN4
1
Research Scholar, Research and Development Centre, Bharathiar University, Coimbatore – 641 046,
Tamilnadu, India
2
II M.Sc. Chemistry, 3*Assistant Professor and 4Guest Lecturer, Post Graduate and Research Department of
Chemistry, Government Arts College, Udumalpet – 642 126, Tamilnadu, India

590
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

ULTRASONIC VELOCITY MEASUREMENTS OF MONOCROTOPHOS SOLUTIONS IN


AQUEOUS AND NON-AQUEOUS SOLVENTS

ARVIN PANWAR, UMENDRA KUMAR AND MANISHA

Monocrotophos is a serious environmental contaminant such as in human body tissues(1-3), food(4), water(5)
and pharmaceutical products(6), as it is highly toxic. In order to study tho photodegradation of monocrotophos
in aqueous and non-aqueous solvents, it is essential to have a comprehensive knowledge of its physical
properties so as to reduce the environmental burden of monocrotophos. "The literature survey reveals that the
references on ultrasonic velocity measurements are not available, although this technique gives a clear insight of
the behaviour of this substance. In our previous communication, we reported the ultrasonic velocity(7) and other
physical properties(8) of organophosphorus pesticides in aqueous and non-aqueous solvents. In the present
paper, ultrasonic velocity of monocrotophos solutions has been measured in water, methanol and toluene with a
view to study the behaviour of monocrotophos in different types of solvents and to calculate soveral allied
parameters.
Experimental
The monocrotophos (technical grade, Hindustan Insecticides Ltd.) was recrystallised in methanol and dried in
an air-oven (50%). The purity of monocrotophos was confirmed by m.p. (54-55°C) measurement. The organic
solvents, viz. water, methanol and toluene (all AnalaR) were purified by distillation and the purity was
confirmed by b.p. measurements (water, 100°C; methanol, 64.7°C; toluene, 40.6°C).
Density was measured at constant temperature with a dilatometer constructed of pyrex glass having a reservoir
volume of 15 cm3. The measuring section was constructed or precisely-bored graduntod capillary. The
uncertainty in density measurements is ±0.01 kg m–3.
Ultrasonic velocity of pesticide solutions was measured with the help of a single crystal ultrasonic
interferometer (Model No. F-81, Mittal Enterprises, New Delhi, India) working at a fixed frequency of 2 MHz.
Water from a thermostat maintained at the desired temperature an controlled upto ±0.05° was passed through th
jacket of the cell before the measurement was made. The measured velocities have an uncertainity of 0.047%
ms–1.
RESULTS AND DISCUSSION
Ultrasonic velocity (u) of monocrotophos solutions increases with increase in concentration of the pesticide
(Table 1) but decreases with increase in temperature (fig. 1). The Plots of u vs. C (concentration) are also linear.
However, the values of ultrasonic velocity of monocrotophos in different solvents vary in the order, water >
toluene > methanol. (fig. 2)

591
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table 1 – Ultrasonic Velocity and other related parameters for monocrotophos at 308K in Aqueous and
Non-Aqueous Solvents
10
Conc. Density Ultrasonic  × 10 Lf × Specific acoustic R × 10 W × 10
–3 9
Mol. g dm velocity () (m2  N 1 ) 10 Impedance 1/3 1/7
dm–3 ms–1 (m) Z ×10–5 m2  m  m3  N 
 
( kgm–2s–2) mol  s  mol  m 2 
Water

0.005 0.9943 1532 4.284 3.062 15.23 2.088 3.948


0.010 0.9946 1533 4.278 3.059 15.25 2.090 3.952
0.020 0.9952 1537 4.253 3.050 15.30 2.095 3.961
0.025 0.9954 1538 4.246 3.048 15.31 2.097 3.965
0.030 0.9957 1540 4.234 3.043 15.33 2.100 3.970
0.035 0.9960 1542 4.222 3.039 15.36 2.103 3.975
0.040 0.9962 1543 4.215 3.037 15.37 2.105 3.979
0.045 0.9965 1545 4.203 3.032 15.40 2.107 3.983
0.050 0.9967 1547 4.192 3.028 15.42 2.110 3.988
Toluene
0.005 0.8545 1252 7.465 4.041 10.70 2.272 4.244
0.010 0.8547 1255 7.428 4.031 10.73 2.276 4.251
0.020 0.8551 1259 7.337 4.017 10.77 2.282 4.262
0.025 0.8553 1262 7.340 4.007 10.79 2.285 4.268
0.030 0.8555 1264 7.315 4.001 10.81 2.289 4.274
0.035 0.8557 1266 7.291 3.994 10.83 2.292 4.279
592
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

0.040 0.8559 1268 7.266 3.987 10.85 2.295 4.285


0.045 0.8560 1271 7.230 3.977 10.88 2.298 4.291
0.050 0.8562 1273 7.206 3.971 10.90 2.301 4.297
Methanol
0.005 0.7786 1076 11.1 13.80 8.378 1.349 3.020
0.010 0.7788 1078 11.0 13.80 8.396 1.352 3.022
0.020 0.7792 1080 11.0 13.81 8.415 1.355 3.028
0.025 0.7794 1084 10.9 13.81 8.449 1.359 3.031
0.030 0.7796 1087 10.9 13.81 8.474 1.362 3.034
0.035 0.7798 1088 10.8 13.81 8.484 1.364 3.037
0.040 0.7800 1092 10.8 13.81 8.502 1.367 3.040
0.045 0.7801 1093 10.7 13.81 8.519 1.370 3.043
0.050 0.7803 1094 10.7 13.82 8.537 1.373 3.047
The adiabatic compressibility () of a solution is calculated using equation (1).
1
 2 … (1)
 d
where d is the density of solution.
The adiabatic compressibility (Table-1) decreases with increase in concentration but increase with increase in
temperature. The apparent molar compressibility (k) of the solution is calculated by using equation (2),
1000(d 0  0d) M
k   … (2)
dd 0 d
Where, M is the molecular weight of the solute, d0 and 0 are density and compressibility of the solvent,
respectively. The calculated values of k have been plotted against concentration (Fig. 3). The plot of k vs. C1/2
(fig. 3) is linear.

593
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The values of k decrease linearly with the increase in pesticides concentration at different temperatures and are
best fitted to equation (3),

k  k  Sk C1/2 …(3)

where, k is the apparent molar compressibility at infinite dilution and Sk is the experimental slope. The values
of the slope are negative (Table 2) which increase in different solvents with the increase of temperature. The
values of k also increase with the increase in temperature in methanol but the values of k decrease with the
increase in temperature in water, and vary in different solvents as methanol > toluene > water.

Table 2 – Values of k and Sk for monocrotophos solutions in different solvents at different
temperature
Solvents 308K 313K 318K 323K
k  1011
Water 11.04 10.96 10.75 10.24
Toluene 23.2 25.6 27.4 28.9
Methanol 35.8 36.2 37.4 39.6
11
Sk  10
Water 6.24 6.87 6.96 7.24
Toluene 3.2 3.4 3.7 4.1
Methanol 12.10 23.0 24.0 27.0
Intermolecular free length (Lf) has been calculated by using the semi-empirical relation.
1/2

Lf    …(4)
K
Where, K is a temperature dependent Jacobson’s constant. The value of Lf decreases with increase in
temperature. However, these values decrease slightly but linearly with increase in concentration. Specific
acoustic impedance of the medium (Z) is calculated from the for
motion present. The specific acoustic impedance (Z) for the pesticides is found to increase linearly with
increase in temperature in water but in methanol and toluene solvents, the specific acoustic impedence (Z)
decrease with increase in temperature. The value of Z varies in different solvents in the order, water > toluene >
methanol. Molar sound velocity (R) and molar sound compressibility (W) have been calculated as using
equations (5) and (6), respectively.

M
R    1/3  V  1/3 … (5)
d
M
W     1/7  V  1/7 … (6)
d
Where, M is the average molecular weight of the solution, calculated from the relation
M  X1M1  X2M2
Where X1 and X2 are the mole fractions of the solute and the solvent, and M1 and M2 are their respective
molecular weights. V is the molar volume of the solution and d is the density of the solution. Both the
parameters increase linearly with the increase in concentration. However, these parameters do not vary much
with the increase in temperature in methanol and toluene.
The adiabatic compressibility data have been used to calculate the solvation number (S n) of monocrotophos by
using Passynky’s relation

594
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

n  V 
Sn  1 1   … (7)
n 2  n1V10 

0
where, V is the volume of solution containing n2 moles of the solute and V1 is the molar volume of the solvent
and n1 is the number of moles of the solvents. The values of Sn thus calculated, have the general trend of
decrease with concentration non-linearly. However, it decreases slightly with temperature. There is no
appreciable change of Sn value in different solvents.
Measurements of densities, ultrasonic velocities and viscosities at different temperatures have been measured
for binary mixtures of 2-methylaniline with 1-alcohols and their pure liquids at 298.15K and 308.15K.
Ultrasonic velocity, density and viscosity of binary mixtures of Acetone with Toluene, Chlorobenzene and
Nitrobenzene measured at 303K.(12) Studies of ultrasonic velocities and acoustic paramenters of trifloxystrobin
at various concentration in ethanol-water system have been measured at 300K.(13) By using ultrasonic velocity,
density, viscosity and concentration data various acoustic parameters are calculated and result are interpreted in
terms of solvents-solute and solute-solute interaction. Ultrasonic studies provide a lot of information to
understands the molecular behaviour and either molecular interaction. Trifloxystrobin is a well known pesticide.
Based on its Physiochemical proportion, it’s use under the given condition can be selected the physical and
chemical properties strongly dependent on the structure of pesticide.(14) Further more knowledge of acoustical
properties of any solution provides information about the interaction occuring in solution.
ACKNOWLEDGEMENT
The authors would like to thank college authorities for providing laboratory facilities.
REFERENCES
1. B.S. Kaphalia and T.D. Seth, Pesticides, 1985, 19, 18
2. S.K. Gupta, S. Varghrsr, M.P. Shah, J.P. Jani, S.K. Chatterjee and S.K. Kashyap, Pesticides, 1984, 18, 14.
3. A. Apol and T. Thoburu, Chem. Abster, 1986, 103, 75606.
4. S.K. Gupta, S. Varghrsr, S.K. Chatterjee and S.K. Kashyap, Pesticides, 1987, 16, 8.
5. M.A. El-din and M.I. Bodawv, Bull. Environ, Contam., Toxicol., 1985, 34, 216
6. M. Voitrv, Expo-congr. Int. Technoi Pharm. 3rd, 1983, 3, 257.
7. R.P. Varma, B.B. Bhatnagar and A. Singh, Acoustica, communicated (mss no. 000)
8. R..P. Varma, B.B. Bhatnagar and A. Singh, Rev. Roum. Chem., communicated (mss no. 000)
9. B. Jacobson, Acta Chem, Scand, 1952, 6, 1485.
10. A. Passynsky, Acta Phys. Chem., 1930, 8, 885.
11. V.Venkatalakshmi, M.Gowrishankar, P. Venkateshwarlu and K.S. Reddy, “International Journal of Physics
and Research - (IJPR)”. Vol. 3, Dec, PP.33-44 (2013).
12. R.Kavitha, S.Jaya Kumar and R.Uma, “International Journal of Chemistry and Applications”. Vol. 3, No.
1, PP.19-33 (2011).
13. S.N.Yadav, Bimal Kanth, S.A.Afsah, “Journal of Applied Chemistry (IOSR-JAC)”. Vol. 12, PP 16-18
(2019)
14. P.B.Agrawal, I.M.Siddiqui and M.I.Narwade, “Indian Journal of Chemistry”. Vol. 42, No. 5, PP-1050-
1057, (2003).

AUTHOR DETAILS:
1
ARVIN PANWAR, 2UMENDRA KUMAR AND 3MANISHA
1
Department of Chemistry, S.D. (P.G.) College, Muzaffarnagar, U.P.-251001 (India)
2
Department of Chemistry, Janta Vedic College, Baraut, Baghpat, U.P.-250611 (India)
3
Department of Chemistry, D.A.V. (P.G.) College, Muzaffarnagar, U.P.-251001 (India)

595
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

A SECURE DATA SHARING SCHEME USING LIGHTWEIGHT SEARCHABLE ATTRIBUTE


BASED ENCRYPTION (LSABE) FOR CLOUD COMPUTING

DR. B RASINA BEGUM, M. PREM KUMAR, S. FAZIL MOHAMED, M. SHAIK FAREED AND N.
SHEIK ABDULLAH

ABSTRACT
Industrial Internet of Things (IoT) has suffered from deficient identity authentication and dynamic network
topology, thereby resulting in weakness to data confidentiality. Recently, the Attribute Based Encryption (ABE)
schemes have been used as a solution to ensure data transmission security and the fine-grained sharing of
encrypted IoT data. However, most of existing ABE schemes that bring tremendous computational cost is not
suitable for resources-constraint IoT devices. Therefore, lightweight, efficient data sharing and searching
schemes are suitable for IoT applications with of great importance. To this end, this paper proposes a
Lightweight Searchable Attribute Based Encryption scheme (namely LSABE). This scheme can significantly
reduce the computing cost of IoT devices with the provision of multiple keywords searching for data users.
Meanwhile, this work extends the LSABE scheme to multi-authority scenarios so as to effectively generate and
manage the public/secret keys in the distributed IoT environment. Finally, the experimental results demonstrate
that this scheme can significantly maintain computational efficiency and save the computational cost of IoT
devices, compared to other existing schemes.
Keywords: LSABE, Multi Authority, Encryption, Decryption, IoT

I. INTRODUCTION
Cloud computing aims to deliver the different services through the Internet. The resources comprise tools and
applications such as data storage, servers, databases, networking, and software. Cloud-based storage makes it
possible to save them to a remote database without keeping files on a proprietary hard drive or local storage
device. Cloud computing is a familiar choice for people and businesses for a lot of reasons including saving
cost, increased productivity, speed and efficiency, performance, and security. Cloud computing is named as
such because the information being accessed is originated remotely in the cloud or a virtual space.
Companies that offer cloud services enable users to store files and applications on remote servers and then
access all the data via the Internet. This says that users are not required to be in a specific place for accessing. It
allows the user to work remotely. Cloud computing takes all the heavy lifting involved in crunching and
processing data away from the device that user carry around or sit and work at. It also moves all of that work to
huge computer clusters far away in cyberspace. The Internet becomes the cloud where data, work, and
applications are available from any device with which user can connect to the Internet, anywhere in the world.
Cloud computing may be both public and private in terms of stake holders. Public cloud services provide
various services over the Internet for a free of cost. Private cloud services, on the other hand, only provide
services to a certain number of people. These services are a system of networks that supply hosted services.
There is also a hybrid cloud, which combines both the public and private services.
II. OBJECTIVES
The main objectives of this paper are
• Ensure the data security using multi authority data user login process
• Use the Lightweight Searchable ABE with multi-authority (namely LSABE-MA) for industrial IoT-cloud
systems.
• Protect the Cloud Server and Auxiliary Cloud Server.
• Perform secure and efficient data retrieval
III. LIGHTWEIGHT SEARCHABLE ATTRIBUTE BASED ENCRYPTION (LSABE-MA)
The LSABE-MA is a Lightweight Searchable Attribute Based Encryption. LSABE-MA works for the multi-
authority, which needs several authorities working together to generate the user’s key. The most of the other
schemes are single authority, which may result in the disclosure of the private key. Furthermore, this LSABE
scheme with single-authority has smaller computing costs than other single authority schemes. The process of
data encryption is done by resource-limited sensor nodes in LSABE-MA.
596
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The real IoT environment, encrypted privacy-sensitive files need to upload to the cloud immediately. So, the
latency is crucial in the encryption phase. Among keyword-searching algorithms, our LSABEMA requires keys
and generating operations. This overhead is not significant compared with other schemes. In fact, the search is
done by the cloud server so that this overhead can be negligible for cloud servers with strong computing
capability. To overcome the security problems that are occurred in the existing system and effectively store the
data over the cloud, this system is introduced. Every transaction in the ledger is digital signed and validated by
tens of thousands of mining nodes in the network.
IV. SYSTEM ARCHITECTURE
The following figure1 shows the system architecture including respective modules.

Figure1: System Architecture


Data Owner:
The data owner who entered into the cloud should be registered. In registration process, user has to input their
details like user name, email address, gender, name and the password they want to access. The data owner has
given the keyword to store in cloud server. The attribute authority is needed to generate a public key and secret
key and storing in the cloud server. The secret keys are used in encryption and decryption process which is
stored in the cloud server.
File Selection:
This process is going to select the data set and then it will be uploaded. After this process, Dataset can be
viewed.
Encryption:
The data is encrypted for secure maintenance. So only, the unauthorized person has unable to access the data
that are presented in the cloud server and auxiliary server. Each file contains health record and this process is
using algorithm LSABE. This process uses secret key for the encryption process then storing in cloud server
and auxiliary cloud server.
Cloud Server:
The completed encrypted process is to be stored in the cloud storages. No one opens the encrypted files. The
data user is searching for the trapdoor keys. It’s securable for the encrypted data. Computing services will be
able to encrypt documents to keep them safe in the cloud server.
597
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Auxiliary Cloud Server:


The auxiliary cloud server is same as cloud server. This is one of the storages for the cloud server. This process
is to receive the request for data users and then to sending the acknowledgement.
Data User:
The data user is going to register the details like username, password, Gender, email id, name. The certificate
authorities access id then login to specific account. The user searching for trap door key in cloud server. Then
sending to the transformation key for auxiliary cloud server and sending decryption key and acknowledgement
for auxiliary cloud server. Decryption process is completed to view the particular files.
Certificate Authority:
The data user registers the details in register form and then to view the details. If there are any irrelevant user,
rejects the login access. The certificate authority is given permission to enter the account. Otherwise any one
will not enter the account.
Decryption:
To select the particular encrypted file and then using the secret key then decrypting the files. After completing
the decryption process, store the decrypted file in cloud server and auxiliary cloud server.
V. CONCLUSION
LSABE scheme can support multi keyword search, fine grained access control and lightweight decryption. This
paper also defines the security notions of LSABE and proves that the schemes can secure against the chosen-
keyword attack and the chosen-plaintext attack. Furthermore, this paper proposes an improved version of
LSABE, namely LSABE-MA to support the multi authority scenario. LSABE-MA is more applicable to
industrial IoT environment. Both LSABE and LSABEMA schemes require less storage and computing cost than
most of the existing schemes. Experimental results on a real industrial system also demonstrate that LSABE and
LSABEMA Schemes perform other representative schemes. The feasibility analysis in IoT devices proves that
LSABE and LSABE-MA schemes can be well adapted in industrial IoT environment.
REFERENCES
[1] M. Usman, A. Jolfaei, and M. A. Jan, “RaSEC: An Intelligent Framework for Reliable and Secure Multi-
Level Edge Computing in Industrial Environments,” IEEE Trans. on Industry Applications, pp. 1–1,
2020.
[2] F. Farivar, M. S. Haghighi, A. Jolfaei, and M. Alazab, “Artificial Intelligence for Detection, Estimation,
and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT,” IEEE
Trans. on Industrial Informatics, vol. 16, no. 4, pp. 2716–2725, 2020.
[3] S. Ghane, A. Jolfaei, L. Kulik, K. Ramamohanarao, and D. Puthal, “Preserving privacy in the internet of
connected vehicles,” IEEE Trans. on Intelligent Transportation Systems, pp. 1–10, 2020.
[4] M. Usman, M. A. Jan, X. He, and J. Chen, “P2DCA: A Privacy- PreservingBased Data Collection and
Analysis Framework for IoMT Applications,” IEEE JSAC, vol. 37, no. 6, pp. 1222–1230, June 2019.
[5] A. Jolfaei and K. Kant, “Privacy and security of connected vehicles in intelligent transportation system,”
in 2019 DSN, June 2019, pp. 9–10.
[6] M. Green, S. Hohenberger, B. Waters et al., “Outsourcing the decryption of ABE ciphertexts,” in
USENIX Security, vol. 2011, no. 3, 2011.
[7] Y. Yang, X. Liu, X. Zheng, C. Rong, and W. Guo, “Efficient Traceable Authorization Search System for
Secure Cloud Storage,” IEEE Trans. on Cloud Computing, pp. 1–1, 2018.
[8] S. Tan, K. Yeow, and S. O. Hwang, “Enhancement of a lightweight attribute-based encryption scheme for
the internet of things,” IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6384–6395, 2019.
[9] J. Sun, H. Xiong, X. Liu, Y. Zhang, X. Nie, and R. H. Deng, “Lightweight and Privacy-Aware Fine-
Grained Access Control for IoToriented Smart Health,” IEEE Internet of Things Journal, pp. 1–1, 2020.
[10] Y. Miao, J. Ma, X. Liu, X. Li, Z. Liu, and H. Li, “Practical attributebased multi-keyword search scheme
in mobile crowdsourcing,” IEEE Internet of Things Journal, vol. 5, no. 4, pp. 3008–3018, Aug 2018.

598
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[11] Y. Miao, X. Liu, R. H. Deng, H. Wu, H. Li, J. Li, and D. Wu, “Hybrid Keyword-Field Search with
Efficient Key Management for Industrial Internet of Things,” IEEE Trans. on Industrial Informatics, pp.
1–1, 2018
[12] J. Li, W. Yao, Y. Zhang, H. Qian, and J. Han, “Flexible and Fine-Grained Attribute-Based Data Storage
in Cloud Computing,” IEEE Trans. on Services Computing, vol. 10, no. 5, pp. 785–796, Sep. 2017.
[13] J. Wei, W. Liu, and X. Hu, “Secure and efficient attribute-based access control for multiauthority cloud
storage,” IEEE Systems Journal, vol. 12, no. 2, pp. 1731–1742, 2018.
[14] K. Sowjanya, M. Dasgupta, S. Ray, and M. S. Obaidat, “An efficient elliptic curve cryptography-based
without pairing kpabe for internet of things,” IEEE Systems Journal, vol. 14, no. 2, pp. 2154–2163, 2020.
[15] J. Cui, H. Zhou, H. Zhong, and Y. Xu, “AKSER: Attribute-based keyword search with efficient
revocation in cloud computing,” Information Sciences, vol. 423, pp. 343–352, Jan. 2018.
[16] R. Amin, N. Kumar, G. Biswas, R. Iqbal, and V. Chang, “A light weight authentication protocol for IoT-
enabled devices in distributed Cloud Computing environment,” Future Generation Computer Systems,
vol. 78, pp. 1005–1019, 2018.
[17] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy AttributeBased Encryption,” in 2007 IEEE
Symposium on Security and Privacy (SP ’07). Berkeley, CA: IEEE, May 2007, pp. 321–334.
[18] X. Yao, Z. Chen, and Y. Tian, “A lightweight attribute-based encryption scheme for the internet of
things,” Future Generation Computer Systems, vol. 49, pp. 104–112, 2015.
[19] D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public Key Encryption with Keyword
Search,” in Advances in Cryptology - EUROCRYPT, 2004, pp. 506–522.
[20] J. Li and L. Zhang, “Attribute-based keyword search and data access control in cloud,” in 2014 Tenth
International Conference on Computational Intelligence and Security. IEEE, 2014, pp. 382–386.

AUTHOR DETAILS:
1
DR. B RASINA BEGUM, 2M. PREM KUMAR, 3S. FAZIL MOHAMED, 4M. SHAIK FAREED AND 5N.
SHEIK ABDULLAH
1
Associate Professor and 2,3,4,5Student, Mohamed Sathak Engineering College, Kilakarai- 623806

599
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

IMPLEMENTATION OF THE PROTECTION OF WOMEN FROM DOMESTIC VIOLENCE ACT,


2005 DURING PANDEMIC: A REVIEW

LALITA AND DR. JAGBIR NARWAL

ABSTRACT
Domestic violence is a pattern of conduct used in any relationship to acquire or retain power and control over
another person. It is also referred to as intimate partner violence, violence, domestic abuse, or family violence.
Abuse can be any type, it can be sexual, emotional, physical, economic or psychological actions which affects
badly to the intimate partner. The prevalence of Domestic violence is widespread across culture and society. It
does not see any caste, class, culture, religion, custom, society and nation, it is common everywhere. In India, it
is pervasive and deeply ingrained, and it got worse during the Covid 19 Pandemic. The Protection of Women
from Domestic Violence Act, 2005(PWDVA, 2005) was passed by the Indian government to safeguard women
against violence in the home. This article makes an effort to assess how PWDVA, 2005 was implemented during
the pandemic whether it worked properly in providing protection to women from violence which was increasing
very much in lockdown period or it need a special mechanism which can work in unexpected situations. The
evaluation of related literature is discussed, and the Act's flaws are highlighted along with their causes. The
findings of the study advocate that due to movement restrictions, disabled media, lack of formal support system
and reduced contact with native family, women were unable to report the domestic abuse and Act did not have
the special mechanism to remove these challenges. The review suggests some rigorous amendments in the
PWDVA, 2005 to mitigate with emergency situations.
Keywords: Domestic Violence, Covid-19 Pandemic, Protection against Violence, Women victims.

INTRODUCTION
Domestic violence is a violation of fundamental human rights on a global scale(Hazarika et al., 2017). Women
have long been stigmatized as being weak, helpless, and easily exploitable. Family, which ought to be seen as a
place of love, respect, kindness, as well as a hub of comfort and warmth, had turned into a hotbed of
exploitation (Mishra, 2006). Domestic violence cases increased at an alarming rate throughout the world as the
COVID-19 epidemic put some nations on lockdown (Halder & Mahato, 2020). Domestic violence has grown by
75% in India as a result of lockdown (Singh & Zehra, 2021). In certain states, the number of complaints has
decreased, whilst in others, the number of calls to helplines has increased. According to the National
Commission for Women there has been a double surge in assault against women since the COVID-19 lockdown
began (Chandra, 2020). According to a study of reported incidents throughout the nation, the likelihood of
domestic abuse occurring during a lockdown relies on the capacity of sufferers to report while they are in the
same house as the offenders (Kumar, 2020). It's not like women were never abused in households before; rather,
during the lockdown, the virus reflects and amplifies the prejudice, socioeconomic disparities, oppressions,
casteism, and patriarchal violence that already present in the male-dominated society (Nigam, 2020).
To assist the victim of such violence, countries have reacted by launching online assistance; web counseling,
WhatsApp helplines, telephone counseling services, etc. It is commendable that the Indian government have
responded and taken efforts to tackle the growing domestic violence issues. The main objective was to lessen
the pandemic's harmful effects and repercussions while also preserving the wellbeing and human rights of
women who have been the victims of abuse (Kumar, 2020).
The Domestic Violence Act was implemented by the Indian government in 2005 in an effort to combat the
rising number of domestic violence incidences (Singh & Bhattacharyya, 2020). The Act is a declaration by the
government that domestic abuse will not be tolerated. The government has been given affirmative obligations to
offer legal help, medical facilities, and shelter houses in the hopes that women in distress would get all of these
services. This is accomplished under the Act by establishing the Protection Officer's office and acknowledging
the responsibility of Service Providers (Chakraborty, 2020). Despite this, it is concluded from many studies that
the current Domestic Violence Act, 2005 has not succeeded in reducing the number of DV cases during
lockdown (Singh & Bhattacharyya, 2020). This paper aims to examine the effectiveness of Domestic Violence
Act in dealing with rising cases during pandemic situation. It hopes to spark a discussion among academics and
decision-makers on the need to strengthen and expand the 2005 Protection of Women from Domestic Violence
Act with evolving the special mechanism which can work in disaster situations.

600
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

AN OVERVIEW OF DOMESTIC VIOLENCE ACT, 2005


The Domestic Violence Act of India was passed approximately 15 years ago with the goal of providing “more
effective protection of the rights of women guaranteed under the Constitution who are victims of violence of
any kind occurring within the family and formatters connected therewith or incidental thereto.” The act itself
expanded the definition of domestic violence to include verbal, emotional, sexual, and economic violence in
addition to physical assault. It also created the possibility of immediate protective injunctions as well as
economic rights such as maintenance and compensation. However, the act's successful implementation was
hampered by cultural factors that unofficially influence how the police and judiciary function (EPW Engage,
2020).
SAFEGUARDS AND ASSISTANCE AVAILABLE TO DOMESTIC VIOLENCE VICTIMS
The "Protection of Women from Domestic Abuse Act of 2005" has granted certain rights to the victims of the
violence. The rights enshrined in the act are summed as:
a) The Right to a secure home: The Act protects a woman's right to reside in a married or cohabiting home,
even though she has no ownership or interests in it. This right also entitles her to have other people living
in the same house restrained from interfering with or disrupting her or her children's peaceful enjoyment of
the house and its facilities resources under Section 19 of the act (PWDVA, 2005).
b) Right to obtain assistance: Domestic abuse victims can contact service providers and a protection officer
for assistance in learning about their legal options under the Act's "Section 5". In order to file a petition and
an application for remedy under the act, she might even seek assistance from a protection officer, service
providers, or the officer in charge of the neighborhood police station according to "Sections 9 and 10."
(PWDVA, 2005).
c) Right to receive protection from Domestic Abuse: Under Section 18 of the act, the survivor has the right
to regain her stridhan, jewellery, clothing, items of daily necessity, and other home items in addition to
receiving protection from domestic abuse for herself and her children.
d) Assistance from a welfare expert: The Magistrate may use the aid of anybody—preferably a woman—in
any proceeding under this Act, whether or not that person is connected to the person who has been abused,
this includes anyone working to improve family wellbeing, as he sees suitable, to help him in carrying out
his duties.
e) The authority to issue orders: Orders for custody, compensation, monetary relief, residence, and
protection, are the many types of relief contemplated under the Act. Based on what the aggrieved party
wants in terms of remedy and what the victim’s requirements at the moment, the Magistrate may issue each
of these orders when disposing of the application.
Diagram 1: An overview of the Domestic Violence Act's service delivery process

601
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Whoever has basis to suspect that such an incident of domestic abuse has occurred or is about to occur may get
in touch with Protection Officer, to police or to any service provider. Any person who has received a complaint
or was present when the offence occurred, including the protection officer, a police officer, service providers
(any voluntary group created by law to safeguard the rights and interests of women), or a magistrate, would
notify such women of their rights. When a protection officer receives a domestic violence allegation, he or she
must file a domestic incident report with the Magistrate. After receiving a request from the party who is being
wronged, a representative on their side or a PO, the magistrate will decide when the first hearing will take place.
Aside from that, it is the duty of the protection officers to maintain a list of service providers, shelters, and
medical facilities in the area and to ensure that the injured person obtains all advantages specified in her rights.
Critical Analysis of Implementation of PWDVA, 2005 during Pandemic
Singh & Zehra, (2021) found in their study that a large fraction of the Quarantine population experiences
domestic abuse and the spouse's offence was the worst of all. When there is violence or threat of violence,
confinement prohibits women from leaving for safer locations (Rani et. all, 2020). Reporting of violence cases
affected by proximity of offender and helping media was also disabled due to movement restrictions. Women
were caged in violent houses without any possible contact with the outside world (Nigam, 2020). Through a
two-judge panel, the Delhi High Court ordered the federal and Delhi state governments to consider ways to
prevent and defend women against domestic abuse and to properly carry out the Protection of Women from
Domestic Violence Act, 2005 (PWDVA) (Sen, 2020). To address the rise in domestic violence, one-stop centers
with counselor’s staff are being established on the recommendation of the Women, and Child Development,
Department of Social Security. In general, the availability of counseling services over the phone and through
helplines has expanded, and in the lack of a national policy, women's rights organizations are strained to serve
as the primary support system (Sen, 2020).
It's crucial to realize that people who experienced domestic abuse suffered more than those who were simply
exposed to the virus. This is due to the fact that they did not even have the necessary tools to ask for help (Singh
& Kumar, 2021). Service providers, NGOs and organizations have been left without enough planning and
resources as a result of the abrupt lockdown announcement (Singh & Kumar, 2021). Singh & Zehra, (2021) said
that the legal safeguards against domestic abuse are not considered as necessary during lockdown period.
Protectors cannot enter the houses of victims, and NGOs cannot connect physically with the police which are
leading the battle against COVID 19. NCW only issued a small quantity of WhatsApp devices. In India, just
38% of women have a phone, and even fewer have access to the Internet, making the platform unavailable to
the majority of female citizens.
There have been several provisions made under numerous laws, as well as numerous groups and organizations,
yet despite these efforts, the crime of domestic violence continues to rise every day (Singh & Kumar, 2021).
Singh & Zehra, 2021 argues that laws which are for protection of women from domestic violence are only on
paper not achieving the real aim. T. Ruby (2021) found in her study that Domestic Violence Act, 2005 is not
helpful in reducing domestic abuse and not able to help women victims. She further said the Act implemented
properly but the Indian women are not utilizing it properly. Singh & Bhattacharyya, 2020 point out the
ineffectiveness of Act during pandemic when there is great surge in domestic violence (Singh & Bhattacharyya,
2020).
After being implemented in 2005, the PWDVA had never previously encountered a circumstance when all of
the family members were restricted to their homes and were not required to perform any outside job. The Act's
provisions can only be completely executed in physical mode; no virtual mode facilities are available since
policymakers failed to predict the occurrence of this sort of crisis and did not incorporate an emergency
mechanism in the Act.
CONCLUSIONS & SUGGESTIONS
In conclusion the cases of domestic violence were on surge during pandemic but the reporting of cases was not
done properly due to the unavailability of support system. The services and support that should have been
provided to victims, the Act was not succeed in doing so due to absence of the particular mechanism. Virtual
support system can work where 100% literacy and required system is present to use that kind of facilities. Out
of 1.3 billion people, just a third of Indians have access to the internet, and only 30% of users are women
(Nigam, 2020). Male family members regulate and watch over the internet usage of women. As a result, other
methods need to be considered across the nation, such as notifying through pharmacies and grocery shops, in
addition to the use of phones, mail, or media. Recognizing the degree of gender-based violence, reformulating
government laws and programs and creating robust support networks are crucial steps in reducing the
occurrence of domestic abuse.
602
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Through news outlets, radio stations, and social media platforms, the government has to launch a vigorous
national awareness campaign regarding domestic abuse. To close this gap, it is necessary to enlist the assistance
of civil society organizations, public health agencies, NGOs, psychologists and other emotional health
specialists, as well as university psychology departments. The governments must explicitly incorporate the
effects of domestic abuse and mental health issues into their strategies for preparing the public for the pandemic
and responding to emergencies like COVID-19. Domestic violence is a crime that happens within the family; as
a result, special rules are required to remove it from society. Modifications to policy must be complementary
and access to support systems should be made simpler for victims. While certain remedial measures have been
taken to assist DV victims during the lockdown, there is still much need for improvement in the Act. Authorities
must respond quickly and consistently, especially in India where women's safety is already a major concern. As
a result, we advocate for additional changes to the PWDVA, 2005 based on the variety of issues.
REFERENCES
 EPW Engage. (2020). COVID-19, Domestic Abuse and Violence: Where Do Indian Women Stand?
Economic and Political Weekly, 1–7. https://www.epw.in/engage/article/covid-19-domestic-abuse-and-
violence-where-do
 Chandra J. (2020, 15 June). NCW records sharp spike in domestic violence amid lockdown
 The Hindu. Retrieved from https://www.thehindu.com/news/national/ncw-records-sharp-spike-in-
domestic-violence-amid-lockdown/article31835105.ece
 Halder, S. &Mahato, K, A. (2020). Mental Health Status of Women Post Covid-19 in Indian Context.
EC Psychology and Psychiatry 9.12, 26-39.
 Hazarika, A. (2017). Crime against Women in India and Domestic Violence Act 2005. Science, P., &
College, L. G. B. G. 5264(84), 84–91.
 Kumar, A. (2020). COVID-19 and Domestic Violence: A Possible Public Health Crisis. Journal of Health
Management. Vol. 22(2). DOI: 10.1177/0972063420932765 journals.sagepub.com/home/jhm
 Nigam, S. (2020). COVID-19, LOCKDOWN AND VIOLENCE AGAINST WOMEN IN HOMES.
 Misra, Priti.( 2006). Domestic Violence against Women: Legal Control and Judicial Response. New Delhi,
Deep & Deep Publications.
 Rani, N., Duhan, K., & Kumari, P. (2021). Lockdown Impact : Domestic Violence against Women and
Girl. 10(01), 259–263.
 Sen, R. (2020). Stay home, stay safe: Interrogating violence in the domestic sphere. Economic and
Political Weekly, 55(25).
 Shubhodip Chakraborty. (2020). Law On Domestic Violence (Protection Of Women From Domestic
Violence Act, 2005) https://sccblog-linux.azurewebsites.net/post/2020/07/27/law-on-domestic-violence-
protection-of-women-from-domestic-violence-act-2005/ retrieved on 08/07/2022 at 12:14 PM
 Singh, A., & Kumar, R. (2021). DOMESTIC VIOLENCE AMID LOCKDOWN: A SHADOW
PANDEMIC. Cambridge Open Engage. doi:10.33774/coe-2021-mhjlj This content is a preprint and
has not been peer-reviewed.
 Singh, J., & Zehra, Q. (Oct 2021). Domestic Violence in India during Lockdown. International Journal of
Research and Analytical Reviews. Volume 8, issue 4. www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-
5138)
 Singh, S., & Bhattacharyya, R. (2020). A Review of Domestic Violence against Women in India during
Lockdown. Ijicc.Net, 230–242. www.ijicc.net
 The Protection of Women from Domestic Violence Act, 2005, No. 43, Act of Parliament,

AUTHOR DETAILS:
1
LALITA AND 2DR. JAGBIR NARWAL
1
Ph.D Research Scholar and 2Assistant Professor, Public Administration Department, Maharshi Dayanand
University, Rohtak, Haryana, 124001

603
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

A ROLE OF QUEUING THEORY IN OPERATIONAL DECISIONS: WITH SPECIAL


REFERECENCE TO CEMENT MANUFACTURING PLANT

THANESHWARLAL VERMA AND D. K. GANGESHWER

ABSTRACT
keeping in mind the world class manufacturing modelfor a successful growth of a firm, planning, organizing,
coordination and control are four pillars. Time based competition and the Fast Cycle Time strategies gave rise
to a renewed interest in queuing. Indeed, a Fast Cycle Time strategy is basically dealing with time, with reduce
waiting times and an emphasis on a Fast Time to Market. The purpose of the present paper describe an
application of Queuing theory or Queuing models in operational ( short term ) decision in production systems
including mass production, Batch production, Job - Shop and multi-stage production with its mathematical
approach . Assuming that the system can be modeled by a set of manufacturing units.
Keywords: Queuing system, Operation Management, Production System.
1.1. INTRODUCTION
Manufacturers in many industries face worldwide competitive pressures. Thesemanufacturers must provide
high-quality products with leading-edge performancecapabilities to survive, much less prosper.
The objective of this paper is to focus on operations management applications of queuing theory. The first
textbook on the subject:"Queues, Inventories and Maintenance" was written in 1958 by Morse.
A tremendous number of queuing problems occur in productionand inventory management. Think of the design
of facility layouts, staffingdecisions, maintenance problems, the physical capacity problem, lead time estimation
and lot sizing decisions to mention only a few.Over the last decade Just-In-Time (JIT), Time Based Competition
andthe Fast Cycle Time strategies gave rise to a renewed interest in queuing. Indeed, a Fast Cycle Time strategy
is basically dealing with time, with reduced waiting times and an emphasis on a fast Time-to-Market. It is
amazing to realize that with a little understanding of howqueues behave, the solution to many operations
management problemsbecomes clear if not obvious.
The traditional view of manufacturing management began in eighteenth century when Adam
Smith recognized the economic benefits of specialization of labour.Production management becomes the
acceptable term from 1930s to 1950s. AsF.W. Taylor’s works become more widely known, managers
developed techniques that focused on economic efficiency in manufacturing.
1. 2. Production / Operation Management
Earlier production was associated only with factory which has been defined as any premises where people were
employed for making, altering, repairing, ornamenting, finishing, cleaning, washing, breaking, demolishing or
adopting for sale of any particular item. Thou the non manufacturing sectors of business like, transport,
banking, were house, health( physical and psychological ), marketing etc. are the main component to run were
ignored and not considered as a part of production. Now the concept of production generalizing as ' process
through which goods and services are created' hence we can include both manufacturing and service
organization in production management. Thus the essential feature of the production function are to bring
together people, machine, and materials to provide goods are service by which customers demand can fulfill and
satisfy.
The process of converting input into output by adding values of some units like change in physical, or sensual
or psychological transport unit includes people, goods or garbage, stores, advertisement etc. are the primary
function of an organization, all these processes are called operation. Hence the purposefulcollection of people,
objects and procedure for operating within an environment is basic concept of operation management
system.With the 1970s emerges two distinct changes in our views. The most obvious of these,reflected in the
new name operations management was a shift in the service and manufacturingsectors of the economy.
These conceptual operation system can be better understand through following diagram Random Fluctuation

604
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Conversion efficiency which is known as Productivity is ratio of output and input i.e.
Productivity = output (o) /input(I)
There are two type of productivity1) Manufacturing system and 2) Service system
Cement, coal, textile, steel, automobiles, machine tools,, blades, televisions, furniture's etc. are coming under
manufacturing system and hospital, post office, bank, municipal corporation, school and universities, court,
telephone exchange, transport organization, and supply offices are including in service system.
In today's manufacturing environment companies are stressing duedateperformance, time (cycle time, response
time, time-to-market)and reduced inventory levels as primary measures of shop performance.
In order to achieve this, companies seek to add capacity cushionsin an attempt to become more responsive to
customer demands(instead of inventory buffers). This of course is contrary to the traditionalperformance
measure of resource efficiency (high levels of machineutilization). The core problem is the evaluation of the
benefitsassociated with lower inventories versus the lower efficiencies associatedwith excess capacity. The
question is whether a company is betteroff by replacing inventory by capacity,..or by keeping the machine
assets tight and accepting more inventory.
1. 3. Operational Management Decision
Operation management is essentially a function concerning decision making with respect to a
production/operation system and planning, organizing, coordinating and control are main steps of processing.In
Growth of business, Periodic and Continual decision of management has important roll.
Keeping in mind the avaibillty and inventory of resource, production capacity and methodology, service system
as per customer test thetimely, long term and short term right decision required for better performance.
Queuing models help the management to solve problem faced in decision making at different steps of
processing right from beginning of a business/firm to its growth like, Allocation, HR part, Inventory,
Production, Demand and Supply etc.,wherever required the queue tackled the bulk entry of data and able to
provide service satisfactory.
1. 4. Production Systems
Production planning and control is a tool available to the management to achieve the stated objectives.
Thus, a production system is encompassed by the four factors. i.e., quantity, quality, cost and time.
Scheduling can be defined as “prescribing of when and where each operation necessary to manufacture the
product is to be performed.”
It is also defined as “establishing of times at which to begin and complete each event or operation comprising a
procedure”. The principle aim of scheduling is to plan the sequence of work so that production can be
systematically arranged towards the end of completion of all products by due date.
On the basis of material flow characteristics, the production system can be grouped into the following
categories:
1. Flow line production or Mass production

605
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

2. Batch production system


3. Job shop
4. Unit manufacture of projects.
1.4.1. Flow Line Production or Mass Production
Flow line production involves a continuous movement of item through the production process. This means that
Facilities are arranged according to sequence of operations where the output of one stage becomes input to the
next stage i.e.when one task is finished the next task must start immediately.
1.4.2. Batch Production System
Batch production is a method of manufacturing where identical or similar items are produced together for
different sized production run. For example product of different size rubber corks, all pins, toy cars . printing of
different books as per demand etc.
1.4. 3. Job Shop
A job shop does not have its own standard product but accept whatever customer order come in.It is small
company that makes specific product for one customer at a time. It is a manufacturing unit that specialized in
small quantities of tailor made or custom-built. Each order may be a new order requiring process planning,
tooling and sequencing. The production manager may sequence the job order on the basis of the short
processing time( SPT) rule. The job requiring smallest operation time get top most priority on order -
scheduling. From analytical point of view a job shop can be treated as a network of queues and waiting line
models or simulation technique can be used.
1.4.4. Unit Manufacture of Projects
In this process manufacturing includes the supply of raw materials, may be simple or shaped forms into finished
product with specific shapes, structure and properties to complete the required task. In above three cases the
man power and facilities were fixed and product was moving place to place. But here product remains same and
manpower and facilities put work on it some chosen sequence. Here product is treating as project. For instant to
built buses/ships/train ect. The parts like nuts, bolt, sheets, angles, tyre-tube are prepared somewhere and
assemble at one place .
For better performance in business taking decision about priority of product in each of above category is plying
major role.
2 .Priority Decision Rules
Priority decision rules are simplified guidelines for determining the sequence in which jobs willbe done. In
some firms these rules take the place of priority planning systems such as MRPsystems. Following are some of
the priority rules followed.
FCFS: First come, first served
EDO: Earliest due date
LS: Least slack (that is, time due less processing time)
SPT: Shortest processing time
LPT: Longest processing time
PCO: Preferred customer order
RS: Random selection
3. Queuing System:
Queuing theory is a mathematical approach used by operations managers for the analysis ofwaiting lines. The
objective of queuing analysis is to minimize customer waiting and servicecapacity cost. With this, managers try
to strike a balance between efficiently utilizingresources and keeping customer satisfaction high. There are also
other costs associated withwaiting lines, such as loss of business due to customers leaving and refusing to wait,
or lossof reputation.
Queuing Theory in manufacturing process involves the study and simulation of models to predict the behavior
of amanufacturing process which attempt to provide services for randomly arising demands in manufacturing
workstation. By utilizing queuing model, we can make decisions about the waiting line which lead better

606
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

productivity.Engineers have applied results of queuing theory to show how cycle time is related to utilization of
machine andstatistic of inter-arrival time and service. These analyses provide means and predicting the average
cycle time insteady state condition. By knowing the cycle time, work in progress can be determined.
The main purpose of application Queuing Theory that related in manufacturing industries having a sequencing
in production processes is to model in manufacturing plant by using an appropriate analytical model ofQueuing
Theory. Certain importance measures of this model will be derived and can serve as comparison with
thestandard data available in the company. Important performance of queuing model will be determined as a
guide toincrease efficiency of each workstations and suggestion to increase the performance of each work
station.
This paper discusses a study about the application of Queuing Theory in Company whose production based on
mass production in bulk from chemicals and mined minerals.Acompany Xproduces Cements, Because of the
increasing of its productdemand, the company needs to examine the efficiency and other parameters of
production line to produceCements.Based on this reason, the objectives of this study are:
 To model a production line of assembly process in manufacturing plant by using an appropriate analytical
model of Queuing Theory.
 To examine the important performance of production line by using the developed queuing model, so that the
performance improvement of production line can be achieved.
As Cement manufacturing plant is very big and divided in many sub plants from mining to the dispatch of
product. Which includes mining, hammer/crusher, Raw mill, Pyro-processing tower, Coal mill, Rotary Kiln,
clinker cooler, Cement mill , Cement blending and storage and lastly packing plant. Each sub plants also
complete with the help of many sub supporting processing units.

4. Mathematical Modeling in Mass Production


In this section a simple situation, corresponding to aproduction system with many stages to complete a product
cement in a manufacturing plant is analyzed.
To Accomplish the Objectives of this Study, the Following Steps Were Used.
1. Select a production line to be studied.
2. Collect data from each manufacturing sub plants. The data are throughput rate, number of operator, and
number of partsthat arrives and leaves during part processing. Data for the number of parts that arrives and
leaves areCollected at least at amount of some samples to make the data is possible to be analyzed by
probability Test.
607
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

3. Analyze the arriving and leaving data by its variable distribution(Exponential or Poisson distribution).
4. Conduct performance measures of each manufacturing sub plants by using equations based on Queuing
theory.
Theperformance measures need to be measured are:
utilization factor (ρ),
percentage of manufacturing sub plants idle time(PFD allowance),
number of parts in system ( Ls),
number of parts in queue ( Lq),
waiting time spent in queue ( Wq),
time spent in system ( Ws),(task time).
5. Determine the efficiency of eachmanufacturing sub plants.
6. Make validation of the task time value resulted at step (4) by comparing it with the task time value based
on the company database i. e. standard time.
The equations based on Queuing theory that is used in this study can be described as follows:
𝜌= λ/µ(1)
where, ρ is utilization factor,λ is average number of parts arriving in one unit of time, and µ is service rate to
partsin one unit of time.
Percentage of idlemanufacturing sub plants (PFD) = (1 – ρ) 100% (2)
Ls = λ / ( µ - λ ) (3)
Lq= λ / µ( µ - λ )
2
(4)
Wq = Lq/λ =Ls/µ (5)
Ws = Wq + 1/µ (6)
Task time = 1/µ (7)
Total task time = setup time+ inspection time+ task time+ waiting time in queue
= normal time + allowance(8)
production time available in an hour
Cycle Time = 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑢𝑛𝑖𝑡 𝑝𝑟𝑜𝑑𝑢𝑐𝑡 𝑖𝑛 𝑜𝑛𝑒 ℎ𝑜𝑢𝑟
(9)
𝛴 𝑇𝑎𝑠𝑘 𝑇𝑖𝑚𝑒
Efficiency, e = 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑜𝑝𝑒𝑟𝑎𝑡𝑜𝑟 𝑥 𝑠𝑡𝑎𝑛𝑑𝑎𝑟𝑑 𝑐𝑦𝑐𝑙𝑒 𝑡𝑖𝑚𝑒
x 100 (10)
𝛴 𝑡𝑖𝑚𝑒 𝑓𝑜𝑟 𝑡𝑎𝑠𝑘
Maximum number of operator = 𝑐𝑦𝑐𝑙𝑒 𝑡𝑖𝑚𝑒
(11)

5. Evaluation and Analysis


Some Execution Framework for a certain process resulted in this study based on queuing theory are given
below.
Process Execution Framework
Arrival Leaving Utilizing Task Normal time of Personal fatigue Numberof
distributi distributio factor time company delay (PFD) @ operator
on n ρ= λ/µ (minute Nt=observed 10%= (persons)
(unit/hr) (unit/hr) s) time x Ntxallwance%/100
Ws rating%/100
Digging main 362 350 1.0342 12.75 15.3 1.53 64
raw material
stone
Stone crusher 347 345 1.0058 7 7.7 0.77 36
of size 1" to 1.5
"
608
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Stone crusher 344.5 343.75 1.0022 3 3.75 0.375 15


of size 1" to 1.5
"
Raw mill 343 342.5 1.00146 5.25 6.3 0.63 26
Pyro-processing 346 345.5 1.00144 7 6.65 0.665 36
unit
Kiln and 345.25 343.5 1.0050 6.5 7.15 0.715 32
cement mill
`Packing plant 343 342.4 1.00175 6.8 7.14 0.714 34
and loading
Total 50.3 53.99 243

To make validation for queuing theory model used in this study, all the task time values found by using queuing
theory, as described inabove table and ideal task time of company i.e. Normal time of company are compared
in table given below.Accuracy between data using queuing theory and ideal time in the company is93.165 %
.based on this data , it can be stated that queuing theory is valid to be used in this case study.
No. process Task time by Standard No of operator Efficiency
queuing theory time(Total task required = time
analysisWs time) = normal for task/cycle
time + allowance time
1 Digging main raw material stone 12.75 16.83 70 83.5%
2 Stone crusher of size 1" to 1.5 " 7 8.47 35 80%
3 Stone crusher of size 1" to 1.5 " 3 4.124 17 85%
4 Raw mill 5.25 6.93 29 85.8%
5 Pyro-processing unit 7 7.315 30 82.4%
6 Kiln and cement mill 6.5 7.865 33 85.12%
7 Packing plant and loading 6.8 7.854 33 83.47%
Total 50.3 59.989 247 87.082%

Total production time to produce each part of cementcan be determined by adding the total task time in eachsub
plants. As shown in table, the total production time is 59.989 min . The efficiency in each work station is shown
in table2.Also shown manpower required foe 100% achieve target.
Cycle time = total working time per day/product per day = 59.989x24/342.2 = 4.204 unit/min= 0.2377min/unit
6. CONCLUSION
This study examined the production line performance by using queuing theory at the company producing
Cement.The study has shown that queuing theory is able to analyze production system such as utilization(ρ),
percentage of idlemanufacturing sub plants, number of batch in system (Ls), number of batch in queue (Lq),
expected timespend in queue (Wq), and expected time spent in system (Ws).This study was based on
independent queuing system and it was simplified into 7 independent workstations. Thesub plants weremining,
hammer/crusher, Raw mill, Pyro-processing tower, Coal mill, Rotary Kiln, clinker cooler, Cement mill ,
Cement blending and storage and lastly packing plant. The resulted data by queuing model used in thisstudy
was compared to the standard data in the company to check the validity of queuing model. Accuracy
betweendata using queuing theory and standard data in the company was 93.165%.The decision for 100%
achieving the target it help to control the man power at different stage of product.
7. REFERENCES
[1]. Askin, R.G. and Standridge, C.R., Modeling and Analysis of Manufacturing Systems, New York:Wiley,
1993.
[2]. Marcheta, G., Melacinia, M., Perottia, S. and Tappiaa, E., Analytical model to estimate performances of
utonomousvehicle storage and retrieval systems for product totes, International Journal of Production
Research, Vol. 50,o. 24, pp. 7134-7148, 2012.
[3]. Mehmood, R. and Lu, J.A. Computational Markovian analysis of large systems, Journal of
Manufacturingechnology Management, Vol. 22 No. 6, pp. 804-817, 2011.
[4]. Papadopoulos,H.T., Heavy, C. and Browne, J., Queueing Theory in Manufactring System Analysis and
Design,pringerVerlagGmbh, 2013.

609
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[5]. Ullah, H., Petri net versus queuing theory for evaluation of FMS, Assembly Automation, Vol.31, No. 1, pp.
29–37,011.
[6]. G.R. Bitran, S. Dasu, A review of open queueingnetworkmodels of manufacturing systems, Queueing
Systems 12(1992) 95-134.
[7]. F.S. Hillier, G.J. Lieberman, Introduction to OperationsResearch, McGraw-Hill, USA, 2001.
[8]. M. LAMBRECHT" and N. VANDAELE" TijdschriftvoorEconomie en ManagementVol. XXXIX, 4,1994
[9]. Williams, T., 1984, Special Products and Uncertainty ill Production/Invei~torySystems, EZI -ropenn
Journal of Ope~niionaRlesearch15. 46-54.

AUTHOR DETAILS:

THANESHWARLAL VERMA1 AND D. K. GANGESHWER2


1
Research Scholar and 2Associate Professor, Department of Applied Mathematics, Bhilai Institute of
Technology, Durg, (C.G), India

610
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

A STUDY OF INTEGRATED MARKETING COMMUNICATION PRACTICES (IMC) IN HIGHER


EDUCATION INSTITUTES (HIES) IN THE ERA OF NATIONAL EDUCATIONALPOLICY (NEP)

PROF. DR. KARUNA GOLE

ABSTRACT
A study is being conducted to analyze the integration of marketing communication in higher education
institutions in Maharashtra and to evaluate the process of integrated marketing communication. Education has
also undergone enormous change in recent decades, and the old ways of doing things need to be improved
because foreign universities are now collaborating with local universities, and students are demanding courses
that make them competitive in the marketplace. Formerly, education institutions published their advertisements
only for job opportunities and tenders. However, due to ample competition in this sector, the majority of
education institutions and universities are now promoting their infrastructure, facilities, research and
innovations, programs, and achievements, etc to create brand value. To ensure that IMC is as effective as
possible, marketing and communications staff ought to adopt both informal and formal outreach efforts. In
order to maintain competitiveness amid intensifying competition and challenging socioeconomic conditions,
educational institutions of the future must invest in adequate resources, competences, and capabilities. Aim of
this work to finds the Integrated Marketing Communication (IMC) for marketing the HEIs plans and views in the
era of National Education Policy (NEP). The methods and tools of promotion must be coordinated in order to
implement an integrated marketing communications strategy. The purpose of this is to create a marketing
communications environment that is effective, unique, and rewarding. Various modern information and
telecommunications technologies, the growth of the global internet, social media marketing, creative marketing,
and the professionalism of HEI staff and teachers have contributed to the resolution of these challenges.
However, NEP has a great opportunity to implement IMC for brand promotion of HEIs in order to form a global
pool andcompete with the most prominent HEIs in the world.
Keywords: Integrated Marketing Communication tools, Advertising, Promotion, education sector, brand image,
New Education Policy (NEP).

INTRODUCTION
In a constantly changing environment, organizations are working hard to keep up with consumer demands, as
well as environmental changes, information disclosure, and information availability (Cravens and Piercy, 2013).
The purpose of marketing is not to simply enhance profits, but to create, transmit and communicate social
values, as Kotler and Levy (1969) indicate. Marketing is therefore more than simply enhancing profits in
organizations.
In integrated marketing communication, Belch and Belch (2004) define it as an approach that identifies the
activities that contribute to the value of a comprehensive plan through an assessment of the strategic roles of
various communication disciplines, such as advertising, direct response, sales promotion, and public relations.
In order to achieve maximum impact, these disciplines should be combined to support clarity, consistency, and
communication. IMC, as described by Kitchen et al (2004); characterized by a pathway that involves internal
and external coordination, which leads to the application of organizational strategies relative to resource
allocation, financial integration, and management accountability.
The standard marketing science view is that organizations should strive to increase profitability aggressively as
their fundamental goal. Marketing science makes profits a measurable parameter. Strategic application of
marketing science, not for profit orientation, but for integrating communication in meeting organizational goals
and values. It is particularly relevant to higher education as a means of adapting and transforming in response to
environmental change (Lambin and Schuiling, 2012).
It has become increasingly clear that integrated marketing communication (IMC) is the futureof marketing. IMC
is currently integrating into the internal strategic management processes of universities, colleges, autonomous
bodies, and institutes of higher education. The extent to which they do so is unclear. There is considerable
evidence that few American colleges practice what they preach regarding IMC, even though many teach IMC
concepts. Institutions have not yet integrated IMC processes effectively into their marketing and
communication processes. Researchers have identified gaps in the research literature on IMC in HEIs in this
study (Eagle et al, 2009).
611
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Role of Marketing in Hies:


A decade ago, the term "marketing" was all but taboo in academia. However, during the past several years, the
resistance to marketing in HEIs has begun to dissipate (Edmiston-Strasser, 2009). Integrated Marketing
Communication (IMC) has been adopted by every industry sector. Research has been conducted since 1983 by
several authors. With the sheer size of the market expanding, a variety of marketing methods became more
popular in the industry. Businesses began marketing products throughout states, countries, and the world. In
response, the need for different marketing tools emerged, and customers became more demanding in terms of
quality, price, and availability on the market (Kotabe and Helsen,2020). By creating partnerships with other
institutions, HEIs can build a fruitful and collaborative relationship with industry stakeholders; promote student
mobility and exposure through exchange programmes; and engage students in mobility and exchange
programmes through their marketing activities. Therefore, educational institutions of the future will need to
remain vigilant in maintaining resources, competencies, and capabilities necessary to compete more effectively in
challenging socioeconomic environments (Salem, 2014).
They can create strategic partnerships with other institutions to encourage student mobility and participation in
exchange programmes, enabling them to create fruitful and collaborative relationships with industry leaders. To
leverage themselves among increasing competition in challenging socio-economic environments, educational
institutions must maintain adequate investment in resources, competences, and capabilities in the future. It is
therefore crucial thatHEIs and business schools from developed and developing countries formulate policies and
strategic objectives that will enable them to evolve (Pucciarelli & Kaplan, 2016; Ivy, 2008; Kotler & Fox,
1995). In order to continue to develop the diversity of their student populations, HEIs should expand recruitment
of international students on their home campuses (Helyer and Lee, 2014), as well as create new markets using
satellite campuses (Pucciarelli & Kaplan, 2016; Friga, Bettis & Sullivan, 2003). Consequently,
internationalization has become an institutional
Imperative for many HEIs (Schofield et al., 2013), as they offer more courses in different settings.
In planning their marketing strategies, companies began to use tools of integrated marketing communication.
Education in India has changed greatly in the last decade. In addition to creating positive changes for students,
the government also supports changes that benefit society as a whole. The students are now being trained and
educated through international exposure to teaching methodologies, subject syllabuses, and various value-added
certifications related to current market trends. Now that the Indian education industry has gained a lot of
international competition, it has also become very competitive within the country. There are 1027 Universities
in India today, including 444 State Universities, 126 Deemed to be Universities, 54 Central Universities, 403
Private Universities and 391 under 12 B (UGC list of all Universities as of 4.03.2022). University marketing is
an inevitable part of their efforts to become more popular with students. In order to brand the courses taught by
an institute or university, marketing tools such as advertising developed and sales promotions have been used
systematically.
In recent days, ads for some private universities have featured actors and actresses from the locality promoting
the universities. This has helped create a direct connection with people who know these actors. As part of these
efforts, universities participate in a variety of cultural events, national conferences, and government conferences
to reach a maximum number of people at the same time. Advertising in newspapers is also used to promote new
courses. In regional newspapers, there are more ads covering the area. Students and faculty at colleges and
universities advertise almost everywhere including TV, newspapers, magazines, digital media, the internet, etc.
The ads are the primary source of information for students and parents. In every promotional activity, the goal is
to distinguish the brand from its competitors. Every academic institution advertises its academic infrastructure,
academic collaborations, tie-ups with foreign universities, innovation projects, research and publications of its
faculty. Youth are targeted with commercials that highlight job opportunities and industry-specific courses.
According to research, in 2017, U.S. postsecondary schools spent around $730 million on advertising, including
television, outdoor hoardings, online ads, and cable. Based on an Ernst & Young study on higher education in
India, the sector's spends (for higher education) currentlytotal Rs 46,200 crore. In the next decade, this segment is
expected to grow at 12.8% and touch nearly Rs 150,000 crore. It is extremely important to study the various
IMC practices being used by the Indian education industry and how effectively they are helping implement the
NewEducation Policy.
Rational of IMC in Higher Education in India:
The concept of integrated marketing communication has been around since the early 1980s, when theoretical
chapters were included in textbooks for students. It is said that the first researcher to describe the entire range of
612
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

marketing communication channels was Coulson- Thomas in 1983. This has been informed everyone about
the differences among elements of
IMC such as advertising, marketing, and public relations. Integration of these elements was considered to be an
effective approach to marketing campaigns. It was in 1991 that the faculty of North-western University's Medill
School of Journalism conducted a study in the field, and the idea of IMC gained traction (Schultz and Kitchen,
1997). Public relations and advertising companies quickly agreed with the concept and began developing the
new style of marketing campaigns for many companies. In the course of those years, virtually all companies
tycoons were well aware of the effectiveness of the IMC theory since it was suited for the establishment of a "One
Communication Strategy for target clients.".
A single strategy is employed across several communication channels for each communication function, such as
advertising, public relations, sales promotion, etc.' (Duncan & Everett, 1993). According to Tortorici (1991),
integrated marketing communication was one of the most successful strategies for a company to optimize its
return on investment during its marketing communications expenditures. It was, however, disputed whether
IMC was merely a managerial fad (Cornelissen and Lock, 2000) or was purely a theoretical concept (Schultz
and Kitchen, 2000). In order for HEIs to achieve their goals and objectives, their integrated marketing
communications initiatives should be based upon a defined plan. Different promotional instruments are
available for this purpose. In order to facilitate these different special exercises, the directors of the HEIs'
showcasing programs must coordinate their activities. As a result, they must devote adequate financial resources
to every advertising effort, so that all touch points will transfer predictable messages to the ideal audience
(Bonnema and Van der Waldt, 2008). Thus, HEIs should consider their (I) market, (II) mission, (III) message,
(IV) media, (V) budget, and (VI) estimation when they are using their marketing specialized tools.
Additionally, we see that the joining of advertising correspondences has been gaining importance as time has
progressed - mainly because of the consistent turn of events and changes in business sectors, the media,
exchanges, and customer behaviour (Lee et al, 2015; Reinold and Tropp, 2012). These days, IMC is considered
as one of the most powerful methodologies when applied to different settings (Laurie and Mortimer, 2019). In
HEIs, however, the degree of IMC has been little examined. According to Estaswara (2016), instructors have
acquired awareness of the IMC knowledge in different ways over time. Interestingly, Kerr and Kelly (2017)
provided a posting that describes training and offers pointers for thinking about IMC teachers. IMC has been the
subject of experimental investigation from 2000 to 2015 and Razak et. al. (2018) has conducted a systematic
examination of the theoretical research done concerning IMC from 2000 to 2015. Her study revealed 12 articles
related to schools, but a portion of the research relating to HE and IMC have been related to curricular practices.
There are also meeting papers examining how HEIs embrace IMC and how they oversee its integration (Porcu,
del Barrio-Garca, Rodriguez-Priego, and Crespo-Almendros, 2012). In contrast, Abdullah and Sahad (2015)
examined the degree of IMC execution in a selection of Malaysian establishments. Even though little research
has been conducted in this unique situation, it is evident that IMC influences HEM practice, particularly in
regard to mark correspondence objectives (Molesworth et al., 2009), which are important in HEIs' advertising
regulations.
RESEARCH METHODOLOGY
OBJECTIVES:
1) To find relevance of IMC for Higher Educational Institutions in Maharashtra state.
2) To study different types of IMC for contributing marketers helping to establish relationships with
consumers or stakeholders.
3) To analyse one of the significant IMC’s models for marketing in higher education.
4) To find possibilities of IMC’s in higher education during implementing NationalEducation Policy (NEP).
Research Questions: This paper attempted to answers following research question
1) What is IMC and it's distinctive their sorts?
2) Why are IMC methodologies expected in HEIs?
3) What are the advantages of applying IMC in promoting HEIs?
4) Whether IMC truly contributed toward marking HEIs?
5) What are the significance of IMC in NEP for HEIs?
613
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

RESEARCH DESIGN:
A descriptive survey design was adopted by the researcher. Study habits and academic performance of
mathematics students are examined through this research design. A descriptive survey design is used
when the researcher wants to understand the IMC for branding HEIs ( Obodoeze, 2009).
Data Collection:
Research conducted as part of the secondary research process involves assimilation of data from various
sources, which involves using existing research materials. There are also public and private libraries that
provide access to research materials along with this data accessed byonline resources.
RESULTS AND DISCUSSION
A) Efficacy of IMC in Indian Heis:
Indian higher education institutions are among the largest on the world map. Yet, the education system still has a
lot of scope and potential for improvement. According to a recent report, India's education sector offers a
number of opportunities for growth since almost 27% of the population is between the ages of 0-14. According
to estimates, India's education sector was worth US$ 117 billion in FY20 and will reach US$ 225 billion by
FY25.
In FY20, there were 42,343 colleges in India. There are 981 universities in India as of May 17, 2021. As of
February 2022, the number of AICTE-approved institutes in India totalled 8,997. There were 8,997 institutes in
this country. There were 3,627 undergrad, 4,790 postgrad and 3,994 diploma institutes. In 2019-20, India saw
38.5 million students enrolled in higher education, of which 19.6 million were male students and 18.9 million
were female students. According to the latest figures available, India's higher education sector had a Gross
EnrolmentRatio in FY20 of 27.1% (AICTE, 2022).
According to data released by the Department for Promotion of Industry and Internal Trade (DPIIT), Foreign
Direct Investment (FDI) equity inflows stood at US$ 6.74 billion from April 2000-September 2021. RISE, a
government scheme for revitalizing infrastructure, and EQUIP, a programme for improving education quality,
help meet the challenges faced by the sector. The Union Budget 2022-23 allocates around 20.3% of its total
allocation to Samagra Shiksha Scheme, up from Rs 31,050.16 crores (US$ 4.16 billion) in FY22 to Rs 37,383.36
crores (US$ 5.01 billion) in FY23 (AICTE, 2022).
A "New India Literacy Project" for FY 2022-27 was approved by the central government in the Budget
announcements for 2022-23 and National Education Policy 2020. From April 1, 2021, to March 31, 2026, the
Cabinet approved the Samagra Shiksha School Education Scheme. Several steps have been taken by the Indian
government including the opening of IIT's and IIM's at new locations and allocating research grants to scholars.
Additionally, with several educational organisations turning to online education for teaching, the higher education
sector in India is set for major change and growth in the future (AICTE, 2022).
The number of education institutes and universities has increased in the last decade due to foreign direct
investment and government policies. There is fierce competition among these institutions to attract the highest
number of students for their various programs. As a result, marketing communication has assumed a heightened
importance, and institutions of higher learning are making special efforts to design better educational programs.
In addition to traditional advertising formats such as newspapers, magazines, radio, hoardings and others, digital
communication is now widely used. Taking admission is made easier by providing students with information on
the best practices of the institute or university.
B) Role of Marketing in Heis in India:
Businesses need marketers, because without them, a product can't be sold, a brand can't be built, revenue can't
be generated, etc. The implementation of marketing strategies or tools in the education sector has been carried
on for several decades. There was a time when parents chose a school or college for their children based on
whose results were the most impressive in the above categories-students, career achievement, quality of
teaching, and teaching methods. However, today, parents choose schools and colleges based on which of these
categories has the highest results. For example, what are the employment opportunities? Upon their satisfaction
with the facilities on campus, in the hostel, etc., they can begin the admission process. A shift in mindset among
parents and students has led to increased competition among education institutions and universities. Several
companies try to sell their USPs to students and get them to give them first preference (Willard and Hitchcock,
2009).

614
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

For education institutions and universities around the world, the role of the IMC is becoming increasingly
significant. Universities and Institutions of Higher Education in Maharashtra have employed a variety of
marketing strategies. Newspapers publish press releases about various events, student achievements, faculty
accomplishments, sports activities, etc. Furthermore, a variety of seminars and conferences are organized to
assist students with their career paths, social media platforms are used to create digital branding for the institute,
videos of events are uploaded to YouTube channels. All of these activities serve to promote and brand the
institute. Parents and students have shown a strong interest in attending the institute as a result of the
promotional activities.
Each education institute and university has a marketing and communication department that plays a big role in
branding. We're headed by the Vice Chancellor, and we involve the heads of institutes in all our marketing
planning. Lack of marketing means that any course you introduce will either fail or get confused, because
people may not know what you're offering or they will not enrol. There is no way they will not share
information about their classes and other pertinent activities with the public.
Universities and academic institutes have recently become very active in marketing communication
departments due to increased competition. During admission season, the admissions office plans marketing
activities which usually include press releases, participation in career-oriented exhibitions, advertisements,
sponsorships, and television and radio ads. Depending on the institute's needs, well-known actors are hired as
brand ambassadors.
C) Challenges of IMC in Heis:
Putting IMC into practice in any organization has some challenges that need to be overcome (Camilleri, 2019).
They include:
1) It is difficult for the general public and practitioners to understand the IMC concept, as well as the value of
incorporating it into any marketing strategy.
2) Since IMC cannot be considered as a short-term marketing strategy, it may not meet the needsof companies or
universities who have a limited budget for short-term marketing strategies.
3) Implementing IMC will be most successful and effective if the entire organization is involvedin its execution.
4) Different channels of communication are necessary to reach the target audience of students and parents.
Every time an institution plans to integrate communication channels, it must verify the reach to various
audiences.
5) Though there are many creative ideas for the promotion of institutions, there is often an absence of creativity
among the team members when it comes to implementing such ideas.
6) One of the biggest barriers to implementing IMC is lack of resources.
7) People don't want to talk about marketing strategies openly because it's confidential.
D) Factors Promoting IMC Adoption in Heis:
1) The mass media are not effective in promoting educational institutions and universities.
2) There has been an increase in international communication in the Indian education sector due to Foreign
Direct Investment.
3) Because of the digitalization of all industries, every organization has a digital mediapresence.
4) Communication via electronic means has become a major aspect of every individual's life, as well as the
business world.
5) Computers, laptops, and tablets are now a part of Indians' everyday lives.
6) Many companies have realized the importance of incorporating IMC into their marketingstrategies.
7) Marketing personnel are now well-versed in using IMC tools; therefore, they find it to bean efficient method
to reach consumers.
8) Many businesses assisted businesses with their marketing efforts. Some of these businesses used IMC to help
with their marketing campaigns.

615
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

E) Types of Imcs in Heis:


Integrated marketing communications are effective when combined with marketing to promote educational
services at the university. Marketing communications can be integrated in various ways based on the
university's goals and objectives, its image, location and other factors. By integrating modern marketing
technology elements, branding technologies, as well as university corporate style elements, the universities are
expanding their complexes of promoting educational services. A marketing communications approach that is
incorporated shaping the university's image is also used. Such marketing tools are used in campaigns to attract
new applicants (Shimp and Andrews, 2012).

Figure No.1: IMC Tools for Heis.


1) Advertising- There are numerous advertising tools are available for HEIs to disseminated vision and
mission along with their programmes and achievements to large number of people. The HEIs applies variety
of media for advertising including TV, magazines, newspapers, internet, direct mail and radio. The HEIs also
focus on mobile devices and social media, such as Facebook, Blogs, Instagram and Twitter to reach students
and parents.
2) Consumer Sales Promotions- Through the advertising campaign the HEIs launch short- term incentives
like coupons, contests, games and rebates. It is considered under sales promotion when it is independent
from many components of the marketing mix which are focusing needs of first and second generation
learners. Promotions activities are customised such a way that it motivates students, parents and industries to
find association with HEIs where students likely to take admissions in various programs, industries to come
for placements, alumina recognised by their brands and overall, which reach to topmost in the list of HEIs.
In business-to-business marketing, HEIs’ need to focus on trade promotions that are typically used to target
youths, students, parents and industries where trademark of HEIs are duly recognised and honoured among
other HEIs.
3) Direct Marketing- For direct marketing HEIs involves delivering personalized and often interactive
promotional materials, broachers, pamphlets, leaflets directly to individuals through tactics such as mail,
catalogs, internet, e-mail, auto recorded telephone, distributed through news-papers and direct response
advertising. One to one marketing have biggest aims to make HEIs to target its consumer take action for
admission in various programmes.
4) Professional Selling- The HEIs have great scope to interaction between alumina, current students and
placement industries are involved in marketing. In person, on the phone, by organising Education Fair,
through online by Seminar, Zoom, G-meet and so on current students, alumina and admission seekers can
interact with each other. Therefore, HEIs typicallyneeds to develop a relationship with the alumina as well as
current students regardless of theymay available for guiding the perspective students.
5) Public Relations (PR)- For HEIs have been develop PR cell where faculties, students as well as
administrative staff should employ to find the ways of marketing. The HEIs major achievements and career
oriented goals for students was communicating with the aim of improving an organization's image and
marketing its courses. Since most PR information is tailored to sound as if it were created by an independent
organization, it is perceived as being more objective and neutral than other forms of promotion by the HEIs.

616
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Publicity of HEIs though Education Fairs, Seminar, Conferences, Career oriented programmes and press releases
are few of the major components of public relations materials. In addition to placement, sponsorships
programmes are often a vital part of a HEI communication mix, particularly for events and own experiences. In
fact, HEIs offers fellowships, scholarships to economically privileged students are often considered a separate
element of the communicationmix due to the higher fees as well as pulling talented scholar students.
The HEI’s Public relations may be handled internally by separate PR officers supported by faculties, students
and administrative staff. The HEIs PR is therefore incorporated into the marketing budget and the integrated
communication strategy with changing face of HEIs in thetime of National Education Policy.
6) Sponsorships – Typically HEIs have greater scope to find avenues of financial supports to events, venues
and experiences related to education, social as well as cultural programs which have major focusing on target
group of students and parents. The public relations are usually enhanced by sponsorships, which strengthen
the image of a HEIs. Sponsorships are becomingan increasingly significant component of promotional efforts
due to the large amount of moneyspent on them.
F) Win-Win Situation to Praise for IMC in Hies In India:
1) It is the HEIs' responsibility to raise the required financial capital by charging tuition fees to full-time, part-
time, and distance learning students; HEIs in the public sector may offer free orreduced tuition fees.
2) The English language is used in the teaching of many international courses; it is increasinglyimperative for the
mobility of international students in HIEs wherein IMC play a pivotal role for disseminating information
(ICEF, 2017).
3. There are a number of higher education institutions that offer a range of programs that integrate work-related
learning. It is possible that students are required to complete an industry placement as part of their studies.
Through the IMC, work-integrated education (WIE) was effectively communicated to the general public and
could form part of the curriculum of HEIs.
4) The integration of work-integrated education facilitates the development of all-round professionals with a
sufficient level of operational experience. In addition, students gain an understanding of the business and
industry's operation (Kolb & Kolb, 2005).
5) A growing number of higher education institutions are now entering into international collaboration
agreements with other educational institutions across borders through the development of International
Monetary Cooperation. These agreements facilitate student exchanges and field trips. In addition to
classroom instruction, students exchange experiences with each other and participate in field trips that
provide students with real-world training.
6) In addition, the HEIs have established alumni networks over the years, possibly with the assistance of IMC.
They have produced many professionals in business and industry.
7) Higher education institutions provide their consultancy and research services through the Institute of
Management Consultants, through which they are often in contact with industry.
8) In addition to offering Executive Development Programmes to industry practitioners, the HEIs offer other
opportunities for professionals to update their skills and broaden their knowledge.
G) Conceptual Framework:
An educational institute or university can benefit from effective use of IMC tools when they receive positive
responses from students and parents. This is when admissions are made based on the availability of seats. In the
graph below, we demonstrate how effective use of IMC creates positive outcomes for education institutes and
universities (Edmiston-Strasser, 2009).
In organizations with social motives, the adoption of management techniques and approaches that are generally
used in the business sector becomes very relevant, as organizations will face changing social conditions,
increasing competition, decreasing funding, and challenges communicating ideas and ideas that might hinder
the achievement of their missions (Dolnicar and Lazarevsksi, 2009). Marketers teach the organization about
understanding consumers through concepts and techniques (Day, 1994).

617
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Figure No.2: Conceptual Framework of IMC in HEIs.


1) The Foundation - As the name suggests, foundation stage involves detailed analysis of boththe HEI’s as well
as students and teachers. It is essential for marketers to understand the brandof HEI, its offerings and students
and teachers. Anyone need to know the facilities, placementsand services to student and teachers.
2) The Corporate Culture - The features of products and services ought to be in line with the work culture of
the HEIs. Every HEIs/organization has a vision and it’s important for the marketers to keep in mind the same
before designing syllabus and services.
3) Brand Focus - Brand Focus represents the HEIs identity of the brand. For example Oxford, Cambridge
foreign HEIs while in India IITs, IIMs and NITTEs.
4) Student Experience – The HEIs needs to focus on consumer experience which refers to what the students
feel about HEIs. A student are likely to pick up a courses which has good placement and career. The HEIs
need to meet and exceed students expectations.
5) Communication Tools - Communication tools include various modes of promoting a particular brand such
as advertising, direct selling, promoting through social media such as facebook, twitter, Whatsapp,
Instragram and so on.
6) Promotional Tools - Brands are promoted through various promotional tools such as trade mark promotions,
personal selling and so on. Organizations needs to strengthen their relationship with students, parents,
teachers and stakeholders.
7) Integration Tools – The HEIs needs to keep a regular track on students and teachers feedbacks and reviews.
This needs specific software like customer relationship management (CRM) which helps in measuring the
effectiveness of various integrated marketing communications tools.
H) Inclusion of IMC in National Education Policy (NEP):
The New Education Policy (NEP) must provide equal access to a quality education system for all students,
regardless of their location, with a specific emphasis on historically underrepresented, disadvantaged, and
marginalized groups. The greatest leveller is education, and education is the most effective tool for achieving
economic and social mobility, inclusion,and equality. In order to ensure success in the educational system for all
students from such groups, initiatives should be in place to promote a variety of targeted opportunities to enter
and excel within the system. Incorporating these aspects requires respect and consideration for the diversity and
culture of the country, as well as an understanding of its global and local needs. In order to promote national
pride, self-confidence, self-knowledge, cooperation, and integration, it is considered essential to teach young

618
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Indians about India and its diverse social, cultural, and technological needs, as well as its unique artistic,
linguistic, and intellectual traditions (Kamala, 2020).
The use of IMCs for quality improvement is also included in Sarva Shiksha Abhiyan (SSA), the flagship
education program of the Government of India. Furthermore, in its 2005 report onuniversal secondary education,
the Central Advisory Board of Education (CABE) has recommended comprehensive inclusion of technology in
schooling. In addition to promoting the development of a digitally empowered society and knowledge-based
economy, the DigitalIndia Campaign is helping to transform the nation. Despite the key role education will play
in this transformation, technology itself plays a significant role in improving educational outcomes and
processes; consequently, technology and education are interdependent at all levels (Wessesh and Lin, 2015).
When IMC is used at HEI's through NEP, it will improve multiple aspects of education. But these interventions
will have to be rigorously and transparently evaluated in the relevant context before they are scaled up. A free-
flowing discussion platform for the use of technologyto enhance learning, assessment, planning, communication,
and marketing will be established in the National Educational Technology Forum (NETF). The NETF will
provide a platform for marketing and facilitate decision making on technological implementation, deployment,
and use. However, IMCs in the NEP should be scaled up to allow for wider inclusion (Lorenzo, G., & Dziuban,
2006).
Students, employees, and faculty make up the internal audience. External audience includes alumni and other
individuals outside the organisation. In order to plan effective communications, universities and colleges need
to apply integrated marketing communications. For educational institutions, it is essential to implement
components of the marketing mix that are communicated to prospects. Defining and analyzing target groups in
detail will assist in creating the marketing mix components by understanding the target groups'needs, wishes, and
expectations. Before selecting IMC tools, it is essential to define target groups. In a recent study, it was
discussed that social networks, such as Facebook, Twitter, and other applications (such as YouTube), offer
enormous potential for university communications with potential students. This potential has yet to be fully
exploited.
Admissions officers need to directly contact students to better inform them. In order to attract prospective
students, educational institutions should use forms of marketing communications like knowledge competitions,
project exhibitions, and press coverage. The intended purpose of the visit is to inform secondary school students
about the courses offered and potential benefitsthat can be gained from the same (Judson et al, 2006). Publications
such as fliers and billboards, signage in transit, and advertisements with the university's logo, which advertise
courses, serve as an effective method to communicate information about available courses. Open Days are
organized by educational institutions so prospective students might learn more about the faculty and facilities at
the institution where they wish to study. In addition, they can see how teaching and learning there might be
affected by other factors (Beasley and Danesi, 2010).
The traditional marketing communication process resulted in separate campaigns for advertising, public
relations, direct marketing, and sales promotion. Nevertheless, IMC campaigns use the same message across
multiple marketing platforms to enhance theircombined reach and improve their effectiveness in promoting HEIs
brands along with NationalEducation Policy.
CONCLUSION
Today, higher education institutions (HEIs) have a wide array of marketing technology and tools available to
them. To identify, inform, encourage, and generate positive images of the university, the university must engage
in these activities to engage with target audiences. Integrated marketing communications assures cohesion and
coordination between methods and means of promoting the university's services in order to create an effective,
unique and positive information area for the university. Having developed modern technologies in information
technology, telecommunications, global Internet, social media marketing, creative marketing, as well as growing
professionalization of faculty and teachers in universities, we have been able to solve these problems. Political,
socioeconomic, and technological changes are being addressed by HEIs in a timely manner in the NEP. Perhaps
HEIs that are still receiving public funding do not feel the necessity to differentiate themselves from their
competitors. This these institutions are independent and have a greater chance of maximizing their marketing
potential through effective communication by the way of IMC. As a result, universities and colleges from PAN
India will be able to compete on a global stage, increasing their brand equity by the virtue of IMC addressed in
NEP.

619
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

REFERENCES
1) Abdullah, S. A. C., & Sahad, M. N. (2016). Integrated marketing communication: a spiritual and an ethical
Islamic perspective. International Journal of Islamic Marketingand Branding, 1(4), 305-320.
2) AICTE (2022), https://www.aicte-india.org/.
3) Beasley, R., & Danesi, M. (2010). Persuasive signs: The semiotics of advertising (Vol. 4). Walter de
Gruyter.
4) Belch, G. E., & Belch, M. A. (2004). Advertising and promotion: An integrated marketing communications
perspective 6th. New York: McGraw-Hil l.
5) Bonnema, J., & Van der Waldt, D. L. R. (2008). Information and source preferences of a student market in
higher education. International journal of educational management.
6) Camilleri, M. A. (2019). Higher education marketing: opportunities and challenges in the digital era.
Camilleri, MA (2019). Higher Education Marketing: Opportunities and Challenges in the Digital Era.
Academia, 0 (16-17), 4-28.
7) Camilleri, M. A. (2020). Higher education marketing communications in the digital era. Strategic
marketing of higher education in Africa, 77-95.
8) Cornelissen, J. P., & Lock, A. R. (2000). Theoretical concept or management fashion? Examining the
significance of IMC. Journal of Advertising Research, 40(5), 7-7.
9) Coulson-Thomas, C. (1983). Marketing communications. London: Heinemann.
10) Dolnicar, S., & Lazarevski, K. (2009). Methodological reasons for the theory/practice divide in market
segmentation. Journal of marketing management, 25(3-4), 357-373.
11) Duncan, T. R., & Everett, S. E. (1993). Client perceptions of integrated marketing communications.
Journal of advertising research, 33(3), 30-40.
12) Duncan, T., & Moriarty, S. E. (1998). A communication-based marketing model for managing
relationships. Journal of marketing, 62(2), 1-13.
13) Eagle, L., Kitchen, P., Hyde, K., Fourie, W., & Padisetti, M. (1999). Perceptions of integrated marketing
communications among marketers & ad agency executives in New Zealand. International Journal of
Advertising, 18(1), 89-119.
14) Edmiston-Strasser, D. M. (2009). An examination of integrated marketing communication in US public
institutions of higher education. Journal of Marketing forHigher Education, 19(2), 142-165.
15) Edmiston-Strasser, D. M. (2009). An examination of integrated marketing communication in US public
institutions of higher education. Journal of Marketing forHigher Education, 19(2), 142-165.
16) Estaswara, H. (2016). Integrated marketing communications (imc) in higher education in Indonesia. Polish
Journal of Management Studies, 14(1), 74-83.
17) Friga, P. N., Bettis, R. A., & Sullivan, R. S. (2003). Changes in graduate management education and new
business school strategies for the 21st century. Academy of Management Learning & Education, 2(3), 233-
249.
18) Helyer, R., & Lee, D. (2014). The role of work experience in the future employability of higher education
graduates. Higher Education Quarterly, 68(3), 348-372.
19) Ivy, J. (2008). A new higher education marketing mix: the 7Ps for MBA marketing. International
Journal of educational management.
20) Judson, K. M., Gorchels, L., & Aurand, T. W. (2006). Building a university brand from within: A
comparison of coaches' perspectives of internal branding. Journal of Marketing for Higher Education,
16(1), 97-114.
21) Kamala, K. (2020). NEP An Uncertain Future for Indian Higher Education. Anusandhan, 7.
22) Kerr, G., & Kelly, L. (2017). IMC education and digital disruption. European Journalof marketing.
23) Kitchen, P. J., Schultz, D. E., Kim, I., Han, D., & Li, T. (2004). Will agencies ever “get”(or understand)
IMC?. European Journal of Marketing.

620
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

24) Kolb, A. Y., & Kolb, D. A. (2005). Learning styles and learning spaces: Enhancing experiential learning in
higher education. Academy of management learning & education, 4(2), 193-212.
25) Kotabe, M. M., & Helsen, K. (2020). Global marketing management. John Wiley & Sons.
26) Kotler, P., & Fox, K. F. (1995). Strategic marketing for educational institutions. Prentice Hall.
27) Kotler, P., & Levy, S. J. (1969). Broadening the concept of marketing. Journal of marketing, 33(1), 10-15.
28) Lambin, J. J., & Schuiling, I. (2012). Market-driven management: Strategic and operational marketing.
Macmillan International Higher Education.
29) Laurie, S., & Mortimer, K. (2019). How to achieve true integration: the impact of integrated marketing
communication on the client/agency relationship. Journal ofMarketing Management, 35(3-4), 231-252.
30) Lee, C. Y., Tsao, C. H., & Chang, W. C. (2015). The relationship between attitude toward using and
customer satisfaction with mobile application services: An empirical study from the life insurance industry.
Journal of Enterprise Information Management.
31) Lorenzo, G., & Dziuban, C. (2006). Ensuring the net generation is net savvy (Vol. 2, pp. 1-19). Boulder,
CO: Educause.
32) Obodoeze, F. (2009). SUBJECT SPECIALIZATION IN ACADEMIC LIBRARIES. Library and
Information Science Digest, 3(1), 5-12.
33) Porcu, L., del Barrio-García, S., Rodríguez-Priego, N., & Crespo-Almendros, E. (2012). HIGHER
EDUCATION INSTITUTIONS (HEIS) AND INTEGRATED MARKETING COMMUNICATIONS
(IMC): AN ODD COUPLE?. In INTED2012 Proceedings (pp. 3421-3428). IATED.
34) Pucciarelli, F., & Kaplan, A. (2016). Competition and strategy in higher education: Managing complexity
and uncertainty. Business Horizons, 59(3), 311-320.
35) Pucciarelli, F., & Kaplan, A. (2016). Competition and strategy in higher education: Managing complexity
and uncertainty. Business Horizons, 59(3), 311-320.
36) Ramaseshan, B., Ishak, A., & Kingshott, R. P. (2013). Interactive effects of marketing strategy formulation
and implementation upon firm performance. Journal of MarketingManagement, 29(11-12), 1224-1250.
37) Razak, N. A., Jalil, H. A., Krauss, S. E., & Ahmad, N. A. (2018). Successful implementation of
information and communication technology integration in Malaysian public schools: An activity systems
analysis approach. Studies in Educational Evaluation, 58, 17-29.
38) Reinold, T., & Tropp, J. (2012). Integrated marketing communications: How can we measure its
effectiveness?. Journal of Marketing Communications, 18(2), 113-132.
39) Salem, M. I. (2014). Higher education as a pathway to entrepreneurship. International Business &
Economics Research Journal (IBER), 13(2), 289-294.
40) Schofield, C., Cotton, D., Gresty, K., Kneale, P., & Winter, J. (2013). Higher education provision in a
crowded marketplace. Journal of Higher Education Policy and Management, 35(2), 193-205.
41) Schultz, D. E., & Kitchen, P. J. (2000). Communicating globally. McGraw Hill Professional.
42) Shimp, T. A., & Andrews, J. C. (2012). Advertising promotion and other aspects of integrated marketing
communications. Cengage Learning.
43) Tortorici, A. J. (1991). Maximizing marketing communications through horizontal andvertical orchestration.
Public Relations Quarterly, 36(1), 20.
44) Wesseh Jr, P. K., & Lin, B. (2015). Renewable energy technologies as beacon of cleaner production: a real
options valuation analysis for Liberia. Journal of Cleaner Production, 90, 300-310.
45) Willard, M., & Hitchcock, D. (2009). The business guide to sustainability: Practical strategies and tools for
organizations. Routledge.

AUTHOR DETAILS:
PROF. DR. KARUNA GOLE
Associate Professor, Indira School of Business Studies, PGDM, Tathawade,Pune

621
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

APPLICATIONS OF “INTERNET OF THINGS (IoT)”: A REVIEW

POONAM AND VAISHALI SINGH

ABSTRACT
One of the most important technologies applied now-a-days is Internet of Things (IoT). It is fast growing
technology and plays important role in different areas. In present study, IoT has been reviewed critically from
initiation of technology to date. It has been concluded from study that, IoT has wide applications in various
areas like development of urban groups, development of organization of essentialness resources and
frameworks, adaptability, transport, collaborations etc. This technology works on use of different sensors.
Different sensors have been developed for sensing different situations, and by this, IoT is being developed day
by day. Development in IoT realizes a growing number of arranged data are being studied, secured and
transmitted in different conditions.
Keywords: Internet of Things (IoT), Sensors, Smart Systems, Communication.

INTRODUCTION
The abbreviation IoT stands for Internet of Things. It refers to the collective network of connected physical
devices. It is technology which facilitates communication between physical devices & internet cloud, and
different devices themselves. Due to advancement of computer chips and high internet bandwidth billions of
devices can be connected together. Everyday used IoT enabled devices like toothbrushes, vacuum cleaners, cars
and other machines use sensors to collect data and respond to users very intelligently via internet. The IoT
integrates everyday used things with internet. Computer Engineers are continuously adding sensors and
processors to everyday objects from 1990s to make the things smart. Progress of making the things smart was
slow initially because chips were big in size. Later, low power computer chips (called RFID) were used for
tracking expensive equipment. Computing devices became comparatively small in size and consequently chips
also became small, fast and smarter with time. The cost of objects has also dropped considerably. With this
advancement anybody can add connectivity with Alexa voice services capabilities to MCUs having even less
than 1MB RAM. A whole industry including our homes, businesses and offices have become smart with IoT
devices. These smart IoT based devices can automatically transmit data from and to Internet. Combination of all
these invisible computing devices and the technology associated with them are collectively referred as Internet
of Things [1-2].
Different researches give various ideas about application of IoT in different areas in their researches. But, it
depends on individual that how to utilize these ideas for advancement approaches. IoT is also one of the best
ideas which can be used in automation of various places. Other disciplines need to coordinate with IoT to apply
this concept for improvement of various aspects of life. Various researchers used IoT in different disciplines
including smart cities. Some important researches performed in this field have been reviewed.
REVIEW OF LITERATURE
Menon, A. Et Al. (2013) [3], worked on implementation of IoT in bus transport system of Singapore. This
investigation was to know the credibility of realizing Internet of Things in transport transportation system in
Singapore and found that Singapore is known for its advancement movements, still has scope for improvement
to the extent development being used for transportation purposes. There is a necessity for the customer to
understand and survey particular transport options in a compelling way and this is the place IoT structure can
help.
Qiang, C. Et Al. (2013) [4] studied the applications and security issues related to IoT. They found that there are
such a large applications and number of issues in security of IoT shouting out for arrangements, for example,
RFID label security, remote security, organize transmission security, security insurance, data preparing security.
This research depends on the ebb and flow examination of system security innovation. Also, it gives another
way to deal with specialists in certain IoT application and outline, through investigating and compressing the
security of IoT from different ways.
Bhide, V. H. (2014) [5] gave completely keen condition observing by different sensors for perusing vital
information to alter the solace level in homes by streamline utilization of vitality. He utilized estimation for
consequently discovery and determination of any issue in the gadgets. For that he is utilizing Naïve Bayes

622
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Classifier calculation for information mining. It will convey email or SMS to required specialist for
administration and it will likewise tell the proprietor. This gives a colossal favorable position on the brilliant
home frameworks utilizingIoT.
Kaur, S. & Singh, I. (2014) [6] worked on the survey of applications of IoT. The IoT continues ensuring its
basic position with respect to Information and Communication Technologies and the change of society.
Distinguishing proof and following advancements, wired and remote sensor and actuator systems, upgraded
correspondence conventions and conveyed knowledge for keen items are only the most applicable. As one can
undoubtedly envision, any genuine commitment to the progress of the Internet of Things should essentially be
the consequence of synergetic exercises led in various fields of learning, for example, media communications,
informatics, hardware and sociology. In such an unpredictable situation, this study is coordinated to the
individuals who need to approach this mind boggling control and add to its improvement.
Shah, K. A. Et Al. (2015) [7] worked on improvement of traffic monitoring system by density and flow control
for Indian road system using IoT. The development and size of vehicles today makes administration of
movement a steady issue. The current activity control framework works in light of a planning component,
which means an equivalent schedule. Opening is accommodated every intersection. This is wasteful for non-
uniform stream of vehicles. Consequently there is a requirement for a framework which is versatile in nature.
Courses ought to have a choice of being conceded additional schedule vacancies relying upon the prerequisites
for the given course. They proposed a movement clog control framework which would be versatile in nature
and giveschedule opening to each course in light of activity thickness.
Lee, W. & Chong, S. (2015) [8] worked on a dual-factor model to explain the future adoption of smart internet
of things service and its implications to know the connection between apparent entomb animation and the
impact of ad. For this reason, a commercial, which the IoT advancements are connected, is utilized. An
introduction procedure for IoT and IoT innovations connected commercial is done to individuals who are the
subjects of this examination. At that point, a review is led in the wake of viewing an IoT advances connected
ad. They close the clients who have higher seen intuitiveness demonstrate the positive notice states of mind in
contrast and the clients who have bring down seen entomb liveliness.
Das, R. & Tuna, G. (2015) [9] worked on machine-to-machine communications for smart homes and found
that machine to machine can be portrayed as advancements which permit both wired and remote
frameworks to speak with different gadgets of the same ability. M2M conveys a few advantages to industry
and business, since it can be utilized as a part of an extensive variety of uses for observing and control
purposes. It is normal that M2M advancements when joined with PDAs will end up noticeably necessary
components in savvy homes. In like manner, in this investigation, an example utilization of M2M advances
is introduced. In the exhibited application, utilizing temperature information gave by sensors, the savvy
aeration and cooling system consequently changes itself. In spite of the fact that the displayed application is
only a basic case of how M2M can be utilized, it has the capability of influencing all regions enhancing our
everyday life.
Nandyala, C. S. & Kim, H. (2016) [10] worked on from cloud to fog and iot-based real-time u-healthcare
monitoring for smart homes and hospitals and proposed engineering for IoT based u-medicinal services
observing with the inspiration and favorable circumstances of Cloud to Fog(C2F) registering which
communicates more byserving nearer to the edge (end focuses) at shrewd homes and hospitals.
Kaur, A. (2016) [11] worked on security and privacy concerns related to IoT and gave a diagram of
architecture, application zones, security and protection challenges in the IoT. That IoT can be seen as a 7
layered design. The layers can be gathered into 4 gatherings: Fog Computing, Cloud Computing, Big Data, and
Business Value.
Gupta, A. et al. (2016) [12] worked on Need of Smart Water Systems In India and fund that half of total
populace will be under high water shortage as per World Water Development (UN) report. Nations of Africa
and Asia like Cambodia, Bangladesh, China, and India who is as yet creating are probably going to confront
water shortage more. It was normal that till 2050, 70% of populace will leave in city of India. With contracting
of water store, low precipitation, and so forth is difficult to sustain and give assets like water, power to such
high populace. Utilizing sensor, Information and correspondence Technology (ICT) water assets can be
overseen and be put something aside for sometimes later. Sensors give ongoing checking of pressure driven
information with mechanized control and disturbing if there should arise an occurrence of occasions, for
example, water spillages and so forth. Examination of information will help in taking significant
623
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

activities. Shrewd water framework gives decreased water non-sustainable water misfortunes and lessened
water utilization in field of horticulture.
Deshpande, P. L. & Deshpande, L.M. (2017) [13] worked on industrial environmental parameters monitoring
and controlling using IoT and proposed a thought that in industry, there is, have to secure all the pertinent data,
insights and information identified with the distinctive modern procedures, engines, machines and gadgets
utilized in industry premises. This goes for controlled access, better efficiency and top notch consequences
of mechanical items being made. For this reason, modern natural parameters checking and controlling is
required. IoT is quickly expanding innovation. IoT is the arrangement of physical things or things embedded
with equipment, programming, sensors, and framework organizes, which engages these articles to assemble and
exchange data. In this article, they are developing a structure which will screen and control the cutting edge
parameters using thought of IoT with remote devices, android, and sensors. It is the best and by and large
invaluable. So, it has found to be awesome social prospects.
Ghute, K. Et Al. (2017) [14] worked on IoT based smart garbage monitoring and air pollution control system
and told said this venture is an extremely inventive framework which will keep the urban areas clean. This
framework screens the waste canisters and advises about the level of junk gathered in the refuse containers
through a site page. For this the framework utilizes ultrasonic sensors set over the containers to distinguish the
junk level and contrast it and the waste canisters depth. This framework likewise recognizes the unsafe gases
noticeable all around with the assistance of gas sensors. Though, a website page is worked to demonstrate the
status to the client checking it. The site page gives a level of destructive gases and demonstrates the level of
refuse gathered. The LCD screen demonstrates the status of the junk level and level of hurtful gases. The
framework puts on the signal when the level of rubbish gathered crosses as far as possible. Subsequently this
framework keeps the city clean by advising about the rubbish levels of the containers by giving graphical
picture of the receptacles by means of a site page.
Debauche, O. Et Al. (2018) [15] worked on web monitoring of bee health for researchers and beekeepers based
on the IoT. They proposed a new data storage architecture which can be dedicated to scientific research. This is
known as lambda architecture and this is able to ingest a large variety of data as images, videos, punctual data
and time series data etc. at high frequency. The main new features of this architecture offered in this framework
reside in its capacity to normalize, share and exchange data among groups of researchers. Moreover, the
increasingly wide availability of IoT protocols allow to transfer wide range of data from various different
sources at very low cost. The use of interference-resistant and robust protocols also empowers the use of
monitoring system in different difficult conditions such as urban environments especially in urban beekeeping.
Alexopoulos, K. Et Al. (2018) [16] worked on architecture and development of an industrial IoT framework for
realizing services in industrial product service systems. This framework provides architecture for development
of IoT framework for realization of services in industries. An integrated prototype was developed which can
demonstrate collection, analysis and reporting of data successfully. It also provides various functions towards
different roles and their needs. Main benefits of this framework are systematic information collection,
aggregation, analysis, streamlining of information of the users. Output is reported to the users in form of
different type graphs and figures. Further, this framework may be deployed for different environments and
allow the users to utilize for long time.
Mourtzis, D. Et. Al. (2019) [17] worked on mapping vulnerabilities in the industrial internet of thing landscape
and concluded that the IoT is able to transform industries into much complex system containing CPS, sensors,
machines and actuators which can communicate and exchange data among them to provide a flexible and fully
aware system. However, with increase in wireless connections, ability of data to move from controlling
actuators to machines is increased. The expanded landscape of IoT also provides opportunities and methodology
to exploit a network leading to numerous threats. Existing vulnerabilities in IoT landscape has been identified in
that paper and assessed the potential impact on an industry’s human and machine resources. This framework
was implemented in the shop-floor, as its devices are usually designed with a focus on cost and not so much on
security, to highlight the importance and need of cybersecurity at every layer before providing a service to
users.
Bouras, M. A. et al. (2019) [18] worked on synergy between communication, computing, and caching for smart
sensing in internet of things and concluded that applications of IoT are growing and a large number of devices
are being added continuously in IoT enabled network. It is necessary to resolve the sensing problems by caching
along with computing and communication. Sensing associated with IoT has more challenges which must be
addressed to achieve promising benefits and optimization sensing for smart world in future. In this paper,
624
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

authors discussed about the convergence of communication, computing and caching for smart sensing in IoT.
They also identified different requirements which should be fulfilled to achieve smart systems associated with
IoT. Authors also identified smart sensing along with convergence of CCC. It is needed in number of
technologies like 5G networks, cloud, fog and edge computing for future IoT.
Allah, S. et al. (2020) [19] worked on a real time IoT based water quality management system to decrease or
eliminate the cost of analysis of water quality in off lab and said that water quality parameters can be monitored
using IoT. Water quality parameters can also be maintained by IoT. These parameters are checked at the inlet
and maintained smartly using IoT.
Zhu, Z. M. et al. (2020) [20] performed a research on school intelligent classroom management system based on
IoT. In this research, they developed a system for school smart classroom management which is of low power,
low cost, easy to be used and easy to be popular. It has been observed that, storage model based on MySQL and
NoSQL meets the optimum system requirement. Operation of MySQL is easy and it meets the requirements of
small data volume information. HBase provides stable storage and fast data for massive data generated by the
IoT. During the use of that system data can be read quickly by the user while taking reading.
Aslam, A. & Curry, E. (2021) [21] performed a survey on approaches, challenges, and future directions of
object detection for the internet of multimedia things (IOMT) using deep learning and event-based middleware.
Authors reviewed characteristics and challenges of IOMT for the multimedia event processing using service-
oriented architecture (SOA) of IoT. They analyzed event based middleware solutions and their suitability for the
IOMT and concluded that the middle wares are very important to provide services of general purpose and to
resolve heterogeneity among structured events. They also showed that the current multimedia event processing
approaches are not adaptable and consist of limited user interface. Authors took detection of objects to highlight
the challenges of multimedia event processing by methods based on neural network.
Tariqa, N. Et Al. (2021) [22] performed a comprehensive analysis of security challenges and requirements for
smart IoT applications and found that the industries and researchers have focused on various security
weaknesses like vulnerabilities of devices and attain transit connected with IoT devices. There are various
problems in security of smart IoT applications is their restrained nature and these problems must be addressed
during formulating security measures. Authors also discussed crucial security challenges of IoT application in
smart cities, smart health care, smart agriculture etc.
Hamdy. W. Et Al. (2022) [23] proposed a system of using Node-RED for applying IoT in warehousing 4.0. In
this research a system has been proposed for the implementation of the approach of IoT in management of
warehousing using Node-RED and MongoDB. It has been given in research paper that, how IoT can be
implemented in a warehouse for gaining benefits and avoiding the problems faced in traditional management
systems for warehouses. For this, a dataset has been used to show the great impact of IoT has on of operations
warehouse especially on accuracy in forecasting. This system helps to provide real-time visibility of everything
in the warehouse along with increase in speed and efficiency, decreasing manpower and prevent inventory
shortage & counterfeiting. This research provided an effective roadmap for warehouses to improve their
functions using IoT.
Long. L. (2022) [24] performed a research on status information monitoring of power equipment based on IoT
and found that the IoT technology has improved the level of online monitoring of the power grid greatly. Online
monitoring using IoT is more intelligent, real-time, free from many restrictions and its power equipment
analysis of is also more automated and intelligent that can improve the efficiency and reliability of monitoring
as compared to traditional monitoring technique. There are number of sensors which form perception layer and
the network layer through data communication and data analysis.
CONCLUSION
It has been revealed from the literature review that the IoT is fast growing technology and has wide applications
in various fields. It is based on sensors and theses sensors may be of many types which can sense variety of
manmade, natural including environmental factors. Number of researchers used sensors based IoT technology to
monitor different factors which can be used to monitor various aspects. Apart from the technology, there is need
for data analysts for assessing the information provided so that any problem can be handled properly and
improvements may be done properly. Smart cities use a number of number of IoT based system for general
public. It has been revealed for the literature survey that, many researchers has used three or four sensors to
monitor the climatic or weather condition. So, it is important and necessary that some more sensors are to be
added to the system.
625
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

REFERENCES
1. Potu, A.; Jayalakshmi, & Umpathy, K. (2016), "Smart Paper Technology a Review Based on Concepts
of E-Paper Technology" IOSR Journal of Electronics and Communication Engineering (IOSR-JECE),
11(1-1): 42-46.
2. Anonymous: https://aws.amazon.com/what-is/iot/ (Fetched on 18/05/2022)
3. Menon, A.; Sinha, R.; Ediga, D. & Iyer, S. (2013), “Implementation of Internet of Things in bus
transport system of Singapore”, Asian Journal of Engineering Research, 01(5): 08-17.
4. Qiang, C.; Quan, G.; Yu, B & Yang, L. (2013) “Research on Security Issues of the Internet of Things”,
International Journal of Future Generation Communication and Networking, 6(6): 1-10.
5. Bhide, V. H. (2014), “A Survey on the Smart Homes using Internet of Things (IoT)”, International Journal
of Advance Research in Computer Science and Management Studies, 2(12): 243-246.
6. Kaur, S. & Singh, I. (2016), “A Survey Report on Internet of Things Applications”, International Journal
of Computer Science Trends & Technology (IJCSTT), 04(2): 331-336.
7. Shah, K. A.; Jha, J.; Zala, M. & Khetra, N. (2015), "Improvement of Traffic Monitoring System by
Density and Flow Control for Indian Road System using IoT", IJSRD - International Journal for Scientific
Research & Development, 3(10): 167-170.
8. Lee, W. & Chong, S. (2016), "A Dual-factor Model to Explain the Future Adoption of Smart Internet of
Things Service and Its Implications", International Journal of Software Engineering and its
Applications, 10(11): 441-450
9. Daş, R. & Tuna, G. (2015), "Machine-to-Machine Communications for Smart Homes", International
Journal of Computer Networks and Applications (IJCNA), 4(2): 196-203.
10. Nandyala, C. S. & Kim, H. (2016) “From Cloud to Fog and IoT-Based Real-Time U-Healthcare
Monitoring for Smart Homes and Hospitals”, International Journal of Smart Home, 10(2): 187- 196.
11. Kaur, A. (2016) “Internet of Things (IoT): Security and Privacy Concerns” International Journal of
Engineering Sciences & Research Technology, 5(5): 161- 165.
12. Gupta, A.; Mishra, S.; Bokde, N. & Kulat, K. (2016),"Need of Smart Water Systems in India",
International Journal of Applied Engineering Research, 11(4): 2216-2223.
13. Deshpande, P. L. & Deshpande L. M. (2017), “Industrial Environmental Parameters Monitoring and
Controlling Using IoT”, International Journal of Research in Engineering, IT and Social Sciences, 9(8): 7-
12.
14. Ghute, K.; Thakare, G.; Wahane, M.; Holey, A. & Soni, M. M. (2017), "IoT Based Smart Garbage
Monitoring and Air Pollution Control System", International Journal of Innovative Research in Computer
and Communication Engineering, 5(3): 6013- 6016.
15. Debauche, O.; El-Moulat, M.; Mahmoudi, S.; Boukraa, S.; Manneback, P. & Lebeau, F. (2018) “Web
Monitoring of Bee Health For Researchers and Beekeepers Based on The IoT” Procedia Computer
Science, 130: 991–998.
16. Alexopoulos, K.; Koukas, S.; Boli, N. & Mourtzis, D. (2018) “Architecture and development of an
Industrial Internet of Things framework for realizing services in Industrial Product Service Systems”,
Procedia CIRP, 72: 880–885.
17. Mourtzis, D.; Angelopoulos, K. & Zogopoulos, V. (2019) “Mapping Vulnerabilities in the Industrial
Internet of Thing landscape, Procedia CIRP, 84: 265–270.
18. Bouras, M. A.; Ullaha, A. & Ninga, H. (2019) “Synergy between Communication, Computing, and
Caching for Smart Sensing in Internet of Things. Procedia Computer Science, 147: 504–511.
19. Allah, S.; Hassan, H. & Mourad, M. H. (2020) “Real time IoT based Water Quality Management
System, Procedia CIRP, 91: 478–485.
20. Zhu, Z. M.; Xu, F. Q. & Gao, X. (2020) “Research on School Intelligent Classroom Management System
Based on Internet of Things, Procedia Computer Science, 166: 144–149.

626
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

21. Aslam, A. & Curry, A. (2020) “A Survey on Object Detection for the Internet of Multimedia Things
(IoMT) using Deep Learning and Event-based Middleware: Approaches, Challenges, and Future
Directions”, Image and Vision Computing 106: 104095.
22. Tariqa, N., Khanb, F. A. & Asim, M. (2021) “Security Challenges and Requirements for Smart Internet
of Things Applications: A Comprehensive Analysis”, Procedia Computer Science, 191: 425–430
23. Hamdy, W.; Al-Awamry, A. & Mostafa, N. (2022) “Warehousing 4.0: A proposed system of using node-
red for applying internet of things in warehousing, Sustainable Futures, 4: 100069
24. Long, L. (2022) “Research on status information monitoring of power equipment based on Internet of
Things”, Energy Reports, 8: 281–286.

AUTHOR DETAILS:

POONAM AND VAISHALI SINGH


Department of Computer Science, Maharishi University of Information Technology, Lucknow, India

627
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

VOTING RIGHTS OF PRISONERS: A CRITICAL ANALYSIS

DR. SATISH CHANDRA AND DAL CHANDRA

ABSTRACT
India is the largest democratic country of the world. All citizens of the India over the age of 18 years,
regardless of race, religion, ethnicity, or socioeconomic status, have the right to vote under the terms of our
nation's constitution. Prisoners may contest in election in India, but they are not allowed to cast vote. In many
countries are given right to vote for prisoners, however in India, inmates are not allowed to vote. The
fundamental principle of equality established in the Indian Constitution is violated when the right to vote is
completely denied to prisoners. Withholding the right to vote from prisoners would be equivalent in a
democratic nation to putting them "to death civilly". In a democratic country, the right to vote has long been
recognized as a fundamental human right. We have stated a desire to construct a correctional and reformative
jail system. We also use the reformation principle to rehabilitate convicts in our criminal justice system, but this
cannot be done without the inmates having the chance to cast a vote. Due to the acknowledgement of two
fundamental concepts, inmates have the right to vote. People in jail are no longer treated as if they were "slaves
of the state," which means they are no longer "condemned to civil death" under the law. Articles 14, 19, and 21
of the Indian Constitution, promulgated in 1950, offer constitutional protections for inmates, including the right
to humane treatment. The Apex Court, in its most important ruling, affirmed that a prisoner is nonetheless a
person in the eyes of the law.
Key Words- Democracy, Right to Vote, Prisoners, Human Rights, Fundamental Rights

INTRODUCTION
“If we want former felons to become good citizens, we must give those rights as well as responsibilities,
and there is no greater responsibility then voting”- “Representative John Conyers, Jr., Chair of the Judiciary
Committee in Congress”
For a lengthy period of time, India was ruled by a variety of foreign powers. Consequently, India was ruled by
numerous foreign regimes, including the Delhi Saltant (1206–1526), Mughal Dynasty (1506–1707), East India
Co. (1708–1858), and the British Crown (1858-1947). The primary goal of these tyrants in India was to
consolidate their dominion and advance their own religious views, beliefs, and ideologies. Because of this, they
forced their regulations on the people of India in a violent manner. A democratic India was born in 1947 after
independence from the British Empire. Voting rights in Parliament and state legislatures have been granted to
Indian citizens. India is currently widely recognized as the world's biggest democracy. All citizens over the age
of 18 are entitled to cast their ballot, regardless of their caste, religion, colour or race, education, or economic
status; this is known as universal adult franchise.
Importance of the right to Vote
According to the Abraham Lincoln “democracy is the government of the people by the people for the people”.
In present era, participation of the citizen in the government has been considered as most significant concept of
democracy. Voting rights have long been seen as the most effective means of participating in national
governance. As a result, it can be said that participation is a fundamental democratic virtue. In a democracy,
casting a ballot is a crucial obligation and right. Despite the fact that the voting right is essential for democracy.
A Canadian author and social activist Naomi Klein, observed that "Democracy is not just the right to vote, it is
the right to live in dignity." “KM Panikka”r also stated that "adult suffrage, the acceptance of the fullest
implication of democracy was the most striking feature of the Constitution". It is obvious that the vision the
Constitution's authors had for India included the freedom to vote as a key component. Voting rights were named
a top priority of Mandela's campaign in his first television interview in 1961, when he stated that “the Africans
demand, want, the franchise on the basis of one man, one vote. Noted that Nelson Mandela was imprisoned for
27 years.
Constitutional Provision regarding Right to Vote
“No person to be ineligible for inclusion in, or to claim to be included in a special, electoral roll on grounds of
religion, race, caste or sex There shall be one general electoral roll for every territorial constituency for election
to either House of Parliament or to the House or either House of the Legislature of a State and no person shall
be ineligible for inclusion in any such roll or claim to be included in any special electoral roll for any such
628
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

constituency on grounds only of religion, race, caste, sex or any of them”. A person may vote in elections for
the Lok Sabha and the Vidhan Sabha of any Indian state if he or she is at least 18 years old and is not otherwise
disqualified by the Constitution or any legislation passed by that legislature on account of residency, insanity, or
another cause.
Right to Vote under the Representation of the People Act, 1951
To exercise one's right to vote, one must comply with the following provisions of the “Representation of the
People Act 1951”: "Right to vote 62. - In order to vote in a certain constituency, a person must be on the
electoral register of that particular constituency at the time of the election. If a person is disqualified from voting
under section 16 of the Representation of the People Act, 1950, he or she cannot cast a ballot in any election (43
of 1950). Persons are prohibited from voting in more than one constituency of the same class during a general
election, and their ballots will be nullified if they do so. All votes cast in the same constituency by the same
individual in the same election are invalid if he votes more than once, even though his name has been recorded
in the electoral roll for that constituency many times. Voting is prohibited for anybody who is in the custody of
the police or in jail, whether for a term of imprisonment or transportation. This clause does not apply to
anybody who is being detained as a result of a current statute mandating preventative detention." When it comes
to voting, no one is allowed to do so if they are incarcerated or in the custody of the legitimate police, as stated
in “Section 62, Clause (5) of the 1951 Representation of the People Act”. This clause does not apply to anybody
who is currently detained as a result of a current statute mandating preventative detention.
Judicial perspective on Prisoner’s right to vote
For detainees, the Indian Supreme Court ruled that they have the right to constitutional protections and their
treatment must be in compliance with the Indian Constitution of 1950. Article 32 and Article 226 of India's
Constitution, 1950, provide for the enforcement of prisoner's rights, according to the Supreme Court of India.
The most important part of the Court's decision is that a prisoner is still a person in the sense of the law. It is
thus impossible to deny him the right to life unless it is done in a way which is both legal and ethical.
The rights of inmates have therefore become a significant part of the prison reform agenda. That's because two
fundamental concepts have been recognized. The first change is that the prisoner "no longer is considered as an
object... who the law would leave inside of the jail and which would be sentenced to 'civil death'" is no longer
an object, ward, or "slave of the state." It is becoming more and more accepted that a citizen is still a citizen
even if he or she is imprisoned. According to numerous Supreme Court rulings, prisoners are entitled to the
fundamental freedoms guaranteed by our constitution, except for the fact that they are deprived of certain rights
like the right to move freely or to practice a profession of one's choice when they are imprisoned for their
crimes. Second, Prison is a punishment, not a place where the guilty party is sent for punishment.
Anukul Chandra Pradhan v. Union of India & Ors. (1997 Judgment)
In this case also known as (the 1997 ruling), the court affirmed the legality of section 62 of the “Representation
of the People’s Act” in two areas. For starters, the voting right is not guaranteed by Article 14 of the Indian
Constitution and cannot be considered a fundamental right since it is subject to legislative restrictions. The court
also noted that “Section 62(5) of the Representation of the Public Act” is constitutionally unambiguous. It was
so decided that prisoners' right to vote was not violated by Article 21 and Article 14 of the Indian constitution.
People who have been imprisoned for their own conduct are not entitled to the same freedoms as others who are
not imprisoned. People who are currently detained should be distinguished from those who have been freed.
Imprisonment itself is a reasonable basis for limiting a person's right to vote. In the absence of such a constraint,
a person is free to vote or not vote based on his or her personal preference; he or she may even choose not to
vote. In light of the prisoner's lack of freedom of movement, he cannot argue that he should be allowed to vote.
Furthermore, if the goal is to keep criminals out of the voting booth, it is impossible to deem a limitation on a
prisoner's right to vote unjustified.
Furthermore, it has been ruled that voting is not fundamental right but a statutory right, which implies that it is
influenced by the laws that grants it. “NP Ponnuswami v. Returning Officer, Namakkal Constituency and Other
S.C.R. 218 at 236”, the Constitution Bench ruled that "the right to vote or stand as a candidate for election is not
a fundamental right, but a creation of legislation or special law and must be subject to the constraints imposed
by it." Even recently, three law students filed a public interest case requesting that criminals be allowed to vote.
The contentions of the petitioners were that there should be a difference between those who are charged with
murder or with any of the terrible crime and the convicts who commit small crimes like stealing. It was only in
its comment, however, that it indicated that the "Right to Vote" was constitutional under Section 62(5) of the

629
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

"Representation of the People's Act". In addition, the court cited the decision in “Anukul Chandra Pradhan v.
Union of India & Ors” and rejected the petition on the basis of that ruling as well.
INTERNATIONAL PERSPECTIVE ON PRISONER’S RIGHT TO VOTE
“United Nations and the Universal Right to Vote”
Article 21 of “Universal Declaration of Human Rights (UDHR)”
1. A basic right of every citizen is the right to participate in the government of his or her country, either
directly or via a representative of his or her choice.
2. All citizens of a given nation have the right to equitable access to public services.
3. The will of the people will serve as the basis for government authority in periodic and actual elections held
by universal and equal suffrage and secret vote or equivalent free voting techniques.
Article 25 of “International Covenant on Civil and Political Rights (ICCPR)”
The democratic process is open to all citizens, with no exceptions or unreasonable limitations as stipulated in
article 2:
a) Participation in public affairs, either personally or by representatives duly elected;
b) To ensure the free expression of the people's will via the use of secret balloting and real periodic elections
that are conducted with universal and equal suffrage?
c) To be able to apply for public service in his nation on the same basis as everyone else.
“United Nations Standard Minimum Rules for the Treatment of Prisoners (the Nelson Mandela Rules)”
“Rule 58”
1. Under proper monitoring, “prisoners” will be permitted to speak with their loved ones on a regular basis:
(a) Through written correspondence and, where appropriate, the use of electronic, digital, or other types of
telecommunications; and
(b) As a result of visitors.
2. Any state that permits conjugal visits must do so on an equitable basis for men and women alike, and this
right must be administered uniformly across the board. Procedures and facilities must be in place to provide fair
and equitable access while also maintaining a high standard of safety and respect for human dignity.
Rule 59
Whenever feasible, inmates will be housed in prisons that are near to their residences or the locations of their
social rehabilitation programmes.
Rule 60
1. Visitors are only allowed inside the jail if they agree to have their belongings checked. An inmate's
permission to visit may be withdrawn at any moment, and the prison administration may then deny the
visitor's request.
2. Search and admission processes must be based on principles that are at least as protective as those outlined
in the regulations 50 to 52. 2. Children should not be subjected to searches of their body cavities.
Rule 61
1. A legal consultant of the inmate's choosing or a legal aid provider should be permitted to visit and discuss
with the inmate without delay, interception or censorship and in complete confidentially, in accordance
with existing domestic legislation. Consultations may be held in the presence of jail personnel, but not in
their earshot.
2. As a last resort, the prison administration should make it possible for inmates who don't speak the local
language access to an independent, professional translator.
3. Legal help should be available to inmates.
As a result, denying a prisoner the ability to vote violates all of the preceding criteria. An extra penalty is
depriving a prisoner of the right to vote.
630
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Countries which provides prisoner’s right to vote


Nations Where Prisoners Cannot Vote
A country that has traditionally restricted voting rights to those who are incarcerated is, of course, the UK.
Aside from the UK, Austria also had a restriction on voting for felons, which went even farther than the UK's
six-month rule. As a result of its defeat before the European Court of Justice in the British case, it has now
conceded that it must modify its laws. Despite the fact that inmates in Armenia are prohibited from voting, no
one has taken their case to the European Court of Justice. Bulgaria, Estonia, Georgia, Hungary, and Russia all
have similar prohibitions. There are efforts underway in Hungary and Liechtenstein to amend their respective
restrictions.
Nations Where Prisoners Can Vote
There is no one-size-fits-all approach to international affairs. Ex-communist countries have some of the most
free administrations. All Albanian inmates, regardless of their crime or sentence, are entitled to vote. Since the
fall of the Iron Curtain, there have been no efforts to restrict the franchise. When it comes to voting rights for
inmates in “Bosnia and Herzegovina” during the breakup of Yugoslavia, it is quite similar. All convicts may
vote in a number of other countries, including “Croatia, the Czech Republic, Denmark, Finland, and Ireland,
Latvia, Lithuania, Macedonia, Montenegro, and Serbia”. Unless a court rules differently, most inmates in
Cyprus and Romania have the right to vote. It is the opposite way around in Malta, where most inmates who
have been imprisoned for more than a year lose their right to vote. In Bulgaria, if a convict is sentenced to more
than ten years in prison, courts have the authority to strip him or her of his or her citizenship. An offender who
is sentenced to fewer than 10 years in prison may nonetheless be denied the right to vote. There is a 20-year
time limit on returning the money to the original owner. Judges have so much latitude that they may even
temporarily deny the right to vote to those who have not been sentenced to prison. Because disenfranchisement
is an extra punishment that must be applied as part of the sentence, France has a complicated set of laws
regarding the kind of sentencing. In other words, disenfranchisement is necessary for certain offences, but only
for a limited time for significantly less severe ones. An appeals court will decide what kind of ban would be
imposed, much as the Bulgarian courts. All three countries have comparable regulations. If convicted of crimes
against the state or the democratic system, German convicts are prohibited from voting. That implies that a
person convicted of terrorism or political violence would lose their right to vote, but an ordinary burglar would
not. Identical to Germany, Norway and Portugal enable citizens to vote in the event that a criminal is convicted
under similar conditions. The prohibitions in “Italy and Greece” are different. Life-sentenced felons in both
nations are permanently barred from voting. Even if a convict is released from prison, Italian and Polish courts
have the power to exclude him or her from voting. Iceland restricts its prohibition to severe offenders, claiming
that those who commit crimes that are "considered terrible by public opinion" have forfeited their ability to
vote. No matter what a judge says, convicts may vote in Moldova and Monaco.
Why should be prisoners right to vote
Each and every citizen's vote is a badge of honour and a testament to their unique worth. A prisoner's isolation
from society increases when he or she is denied the opportunity to vote. It is impossible for a person to survive
in a democratic society without a vote. In Indian politics, there are no pledges to improve jail conditions or laws
in election manifestos. Prisoners rely on people to speak on their behalf and advocate for them. As a result,
officials will pay more attention to the demands of convicts if inmates have the right to vote. There are two key
reasons for dismissing the arguments against the ability of convicts to vote. The goal of prisons is not
punishment in the traditional sense, but rather deprivation of liberty for reform and preparation for a prisoner's
return home and reintegration into society. It is important to remember that confinement is a punishment unto
itself; no additional punishment can be inflicted on an individual.
“Sauvé v. Canada (Chief Electoral Officer) ), [2002] 3 SCR 519”
In this important “Supreme Court of Canada” judgement, the court determined that section 3 of the Canadian
Charter of Rights and Freedoms applies to inmates' “right to vote”. The Supreme Court overturned the Federal
Court of Appeal's earlier decision, holding that the previous Canada Elections Act's section 51(e), which
prohibited felons serving terms of more than two years from voting, was unconstitutional. The Canadian
Supreme Court stated the following in this case: “Denying prisoners the opportunity to vote is more likely to
send negative messages about democracy and the rule of law than enhance those values. The right of every
citizen to vote immediately results in the legitimacy of the law and the responsibility to uphold the law. Denying
prisoners the right to vote means losing a crucial opportunity to instill in them civic virtues and responsibilities.
A democracy founded on the ideas of inclusion, equality, and citizen engagement has no room for the
631
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

government's novel political philosophy, which would allow elected officials to deny voting rights to a portion
of the population.”
The Supreme Court of Canada observed that:
“Denying prisoners the opportunity to vote has a harmful impact on prisoners as well as the criminal justice
system. It eliminates a pathway for social advancement and undercuts penal legislation and policy aimed at
integration and rehabilitation. The disadvantageous impacts of (this law) on inmates have a disproportionate
effect on Canada's already underprivileged Aboriginal community due to the disproportionate number of
Aboriginal people in prisons.”
Why should not be Prisoner’s right to vote
There are a number of reasons why inmates should not have the ability to vote. Firstly, if someone has already
violated another person's right, how can they utilize their own right correctly? Let me begin by asking a few
questions in response to this reasoning. What about those who have been incarcerated for minor offences?
People who are jailed for doing something that the law forbids them from doing, but which isn't illegal in and of
itself should be held accountable, too.
The felony of selling marijuana is not the same as murdering someone, for example. Why should punishment be
equal if deeds are not equal? Although they are entitled to vote, we prevent them from doing so. In our
Constitution, inmates who have been released on bail have the right to vote, but those who have been
imprisoned for a small infraction are not entitled to do so. Is it because of this that they are unable to get a bail
bond?
CONCLUSION
The foundation of every democracy is the right to vote. To improve our criminal justice system, it is critical that
those in jail speak out. In order to grasp the prisoner's situation, they must open up and tell us about their issues.
Rehabilitation and reintegration will be very difficult for acquitted convicts who were not involved in decision-
making during their time in jail. Many of them may endure hardships and believe that they are not as good as
other people in society. The right to vote should be extended to those who are incarcerated because it is a basic
right grounded on the ideals of equality and fairness. Because one may run for office while in prison, why can't
one vote? One of the most pressing questions we need to address is this: As we have already shown, not all
crimes are equally harmful, and so, certain convicts may not be granted the opportunity to vote, but all other
prisoners must. People's votes, not governments, should choose their governance. Why shouldn't the United
States follow suit with European nations and provide voting rights to its prisoners? There should be a
categorization of inmates for voting rights if all prisoners are not entitled to vote.
REFERENCE
1. Marc Mauer “Voting Behind Bars: An Argument for Voting by Prisoners” 2011 Vol. 54 No. 3
2. Baljeet Kaur (baljitcaur@gmail.com) is a researcher at the Quill Foundation. Vol. 54, Issue No. 30, 27 Jul,
2019
3. Pilkington, Ed (2018): "US Inmates Mark End of Prison Strike with Push to Regain Voting Rights,
Guardian, 9 September,
4. JPost (2015): "Prisoners of the Election: Thousands of Inmates Line Up to Vote At Facilities Across
Israel," 17 March, https://www.jpost.com/Israel-Elections/Prisoners-of-the-election-Thousan....
5. Shivangi Gangwar “Another Prisoners’ Dilemma: Voting Rights Of The Incarcerated” Volume Iii March
2021
6. Adams, David Wallace. Education for Extinction: American Indians and the Boarding School Experience,
1875-1928. Lawrence: University Press of Kansas, 1995.
7. Gerber, Alan S. and Huber, Gregory A. and Meredith, Marc and Biggers, Daniel R. and Hendry, David J.
(2017) Does incarceration reduce voting? Evidence about the political consequences of spending time in
prison. Journal of Politics, 79 (4). pp. 1130-1146. ISSN 0022-3816
8. Morris, Nancy A., and Lee Ann Slocum. 2010. “The Validity of Self-Reported Prevalence, Frequency, and
Timing of Arrest.” Journal of Research in Crime and Delinquency 47(2)” 210-240.
9. Shannon, Sarah K.S., Christopher Uggen, Melissa Thompson, Jason Schnittker, and Michael Massoglia.
2011. “Growth in the U.S. Ex-Felon and Ex-Prisoner Population, 1948-2010.” Working Paper.
632
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

10. Uggen, Christopher, Sarah Shannon, and Jeff Manza. 2012. “State-Level Estimates of Felon
Disenfranchisement in the United States, 2010.” Washington D.C.: The Sentencing Project.
11. Deepak Antil “Should Prisoners Be Treated As Equal Citizens: Right To Vote A Way Forward? Volume 7
Issue 5 – ISSN 2454-1273 August 2021
12. Vavreck, Lynn. 2007. “The Exaggerated Effects of Advertising on Turnout.” Quarterly Journal of Political
Science 2(4): 325-343.
13. White, Ariel. 2016. “Misdemeanor Disenfranchisement? The Demobilizing Effects of Brief Jail Spells on
Potential Voters.” Harvard University mimeo.
14. S. Abubacker Sidhic et.al “A Critical Analysis On Right To Vote Of Prisoners” Volume Ii Issue I IJLLR |
Indian Journal of Law and Legal Research May 2021
15. Ed Bates “Analysing the Prisoner Voting Saga and the British Challenge to Strasbourg” doi:
10.1093/hrlr/ngu024
16. Kamal Kumar Arya, Participation In Democracy: In Search Of Legitimacy Of Paragraph 2(1) (B) Of Tenth
Schedule Of The Constitution, ILI Law Review, Summer Issue 2016
17. Bhakti Parekh, Denial Of Voting Rights To Undertrial Prisoners: An Unreasonable And Unjust
Disqualification
18. Article 325 & 326 Constitution of India
19. Dr. Kurt Neudek, the United Nation in Imprisonment Today and Tomorrow- International perspective on
prisoners’ rights and prison condition eds.,Dirk van Zyl Smit and Frieder Dunkel; Kluwer Law Taxation
Publisher,Deventer,Netherlands,1991
20. Jon Vagg. Prison System- A Comparative study of accountability in England, France, Germany and the
Netherlands, Clarenden Press, Oxford 1994
21. Hritik Manchanda “right to vote for Priosoners”
22. Hritika Singh, “Prisoner’s right to vote: In Indian context”
23. https://www.un.org/en/about-us/universal-declaration-of-human-
rights#:~:text=Article%2021,public%20service%20in%20his%20country
24. https://www.bbc.com/news/uk-20447504 at 23/03/2022
25. Why should prisoners have the right to vote? By The John Howard Society of Canada
https://johnhoward.ca/wp-content/uploads/2016/12/Why-Should-Prisoners-have-the-Right-to-Vote.pdf
26. Sunil Batra v. Delhi Administration, AIR 1978 SC 1675
27. Charles Shobraj vs. Superitendent,Tihar Jail AIR 1978,SC 1514
28. Sauvé v. Canada (Chief Electoral Officer), [2002] 3 SCR 519

AUTHOR DETAILS:

DR. SATISH CHANDRA1 AND DAL CHANDRA2


Assistant Professor1 and Research Scholar2, School of Law, Justice & Governance, Gautam Buddha University
Greater Noida

633
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

ABSTRACTION OF CODE COMPLIANCE INFORMATION USING PYTHON FROM THE IFC


MODEL

ER. NARINDER SINGH, PROF. HARVINDER SINGH AND PROF. HARDEEP SINGH

ABSTRACT
IFC Format is gaining popularity for being used to Exchange the data between di fferent Building Information
Modelling software. The IFC file format is developed based on various domains like the Architectural Domain,
Structural Domain, and many more. The architectural Domain is composed of architectural data of building
members (BEAM, COLUMN, WALL, SLAB, etc.). But the Structural Domain deals with the Structural data of
the analytical model of Building with the description of load, type of Load, Moment of Inertia, Bending Moment,
Buckling, Shear Modulus, etc. This paper explains the fetching of data from the IFC file with the extension of
*.ifc. The retrieving process takes place by the file handling method of python language. The Structural
Constraints of entities like (BEAM, COLUMN, WALL, SLAB etc.) are performed. Results are manipulated to
abstract the information with the help of data fetched from the .ifc file.
Keywords: BIM, IFC, PYTHON, SCHEMA

1. INTRODUCTION
Building Information Modeling (BIM) has revolutionized how we plan, analyze, construct, design, and
administer structures. Structure designs were based only on 2D drawings before the invention of BIM, which
resulted in a significant loss of information and synchronization. This issue is becoming less prevalent as BIM
technology advances. It serves as a common ground for all AEC professionals. Make sure they work in the
same sequence [2, 3, 4, 17] as the structure.
Structural Engineers created the model using one piece of software; as a result, it's impossible to seek advice
from their previous Architecture work [2, 3, 17]. As a result of the advent of BIM software such as FreeCAD,
Revit, and ArchiCAD, the information present in a building, may now be stored in the standard IFC format
(Industry Foundation Classes). A python software tool was created to compile inspections following Indian
Standard Codes (I.S.) [2, 5, 3, 6, 4, 7, 8, 9, 10, 11, 17]. This tool supplies the attributes of various construction
materials, such as columns, walls, slabs, and beams, to the user.
1.1. Building Information Modeling (Bim)
With insufficient grouping and failure of processed data, the typical building design relied only on 2D Drawings
[1, 12, 17]. However, this problem has been greatly alleviated because of the introduction of BIM, as BIM
requires 3D Models instead of 2D Drawings. As a result, the advent of BIM has changed any structure's
development, building, execution, and control. Every engineer involved now has access to the structure's
processed data through a single, shared platform [1, 12, 17].
Before BIM, it wasn't easy to collaborate with all the engineers simultaneously since each was developing a
model in a different program, which led to compatibility concerns [1,17] since they couldn't exchange data.
That problem was finally solved when BIM software came along. For every section of the structure, there is a
standard format (.IFC) from which any BIM software can collect data [2, 5, 3, 6, 4, 7, 13, 14, 15, 16, 17].
1.2 Industry Foundation Classes and Subsequent Development
The IFC are a really important tool and VitalSource for interoperability in the construction industry, and its
subsequent development is as underneath:

634
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The IFC standard makes importing and exchanging information across IFC-compatible applications easier. [17,
12]. It gathers information about each item inside the structure. Every entity is described in detail to get a feel
for its unique characteristics [12,17]. Its computations, numbers, and geometry are all stored in IFC. Experts
such as electrical engineers, architects, plumbers, and structural engineers contribute to the analysis of this data
[2, 3].
1.3 Ifc File Structure
IfcObjectDefinition is the data structure's description. Interoperability between BIM experts may be smoothed
by using the IFC file format standard, which has an exact data structure and can store and organize data for
seamless interoperability between the many BIM professionals included in the following process.
Any IFC model's IFC file composition defines a hierarchically included model with several elements.
Entities like the following are only a few instances.

Figure 1: IFC file structure (part1): the Ifc Object Definition

Figure 2: IFC file structure (part2): the IfcRelationship


635
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Figure 3: IFC file structure (part3): the IfcPropertyDefinition

1.4 Ifc Relationship


IfcRelationship is a way of describing certain kinds of connections. A subclass of the IfcRelationship class, the
following five main kinds of relationships exist in the IFC representation:
1. Connecting items using IfcRelConnects establishes a logical link based on certain criteria.
For example, a slab attached to a partition wall, or a beam supported by a floor slab
2. External sources of information are linked to items or property definitions using IfcRelAssociates, which is a
one-way connection. An example of an outside IFC library, including information on the categorization or
item for a meticulous area inside a building, can be found here.
3. Composition/decomposition of components is the general concept of IfcRelDecomposes. There is a
hierarchical structure to decompositions, where the explanation of the whole depends on the description of
the individual pieces. Combining beams and columns is possible to create an architectural framework rather
than a separate item.
4. When an entity instance inherits a property set, it is referred to as a correlation. For example, several
windows in the IFC model may be of the same kind (belonging to the identical catalogue or company). As a
result, the same data is distributed.
5. If one object needs the assistance of another, IfcRelAssigns links the two objects' obligations clear. We may,
for example, assign a certain source to a specific object. According to fig2, each of these five categories
allows the development of more relationships linked between objects, types, and attributes.

636
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

1.5 Express-G (Ifc)

Figure 4: Schematic illustration (4 layers) of the IFC Model

IFC schema is produced using a graphical notation known as EXPRESS-G i.e.an an international data definition
language [4, 17, 12]. This graphical notation easily helps formulate the model's progress and review. IFC exists
in one more XML form, which is known as ifcXML [8].
2. RESEARCH METHODOLOGY
The *.Ifc file is read similarly to a text file character by character
Following expressions are used for file management in Python. "r ", for reading. "a ", for appending. "w ", for
writing." r+ ", for both reading and writing e.g.

#Pythongenerate testing.txt file with the output


" First file
This file holds four lines."
 Until a semicolon appears, the characters in a string are linked together.
 Lines with # at the beginning of the line are ignored.
 The most common usage of strings, namely split (), is to divide a single string into many segments separated
637
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

by various delimiters.

Figure 5: Split function

 String functions like join () are typically used to combine numerous sub-parts into a single string.

Figure 6: join function

2.1 Ifc Entities' Historical Relationship


The tagging methods used to find the desired output are shown visually in the figure for dealing with the Ifc
format.

Figure 7: Inheritance diagram of entities


638
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

2.2 An IFC File Example in Text Format

Figure 8: Example of IFC Text File


2.3 An Example of How an IFC File Should Be Partitioned
The python application is used for @ members like wall attributes as below:

Figure 9: EXAMPLE FOR PARCING OF .IFC FILE


 In the end, we use the IfcCartesianPoint and id to match the identifier and ref. We then decode to get the
coordinates of the physical entities' first and final positions.
 We can perform the needed research, design, or other data on the physical entities of the building by
collecting all the relevant information in the digital system.
2. RESULT WITH DISCUSSION
The conventional method was tedious, difficult, and prone to errors. IfcOpenShell is a Python module that links
IFC statistics and the building checks on the building members, which are being framed following data
collection. 3D Structural software like FreeCAD, Revit, ArchiCAD, etc., creates an ifc file for export. The
measurable materials used in the building are being measured for their area, dimensions, amounts, and a slew of
other attributes. Slenderness Ratio is calculated using the effective height and effective length of columns,
walls, and other structures to ensure their structural integrity and safety. Because Python is a completely OOP
language with many built-in libraries for doing calculations, it is used to construct the dependencies. With these
built-in libraries in Python, it is possible to do preliminary analysis, design, and variations using the
Ifcopenshell, Panda, and Build libraries, which further streamlines the process and makes it more efficient.
3. CONCLUSION
The conclusion is reached that the knowledge of distinct domains of the IFC file helps retrieve the numerable
physical data of a fundamental object. The study highlights that automatic code agreement and python language
639
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

benefit the abstraction process. Automated Code Obedience saves time and labour-intensive efforts and offers
exact results.
4. SCOPE
Nonetheless, substantial work is needed for total success. The data extricated from the IFC files of the
fundamental Domain may be used to assess the presentation and analysis feasibility of the BIM prototype.
Hence improving the ability of checks to function according to I.S. Codes. Reporting might be updated, and the
graphical display of the findings might increase.
5. REFERENCES
[1] M. Fischer, Linking CAD and expert systems for constructability reasoning, Proceedings of the Fifth
International Conference on Computing in Civil and Building Engineering 322 (10) (1993) 156370.
[2] P. Nawari. O. Nawari, PhD, A framework for automating codes conformance in the structural Domain,
Journal of Computer and Information Technology 1 (1).
[3] Q.Z. Yang, Xingjian Xu, Design knowledge modeling and software implementation
[4] David Greenwood, Stephen Lockley, Sagar Malsane, Jane Mathews, Automated compliance checking
building information models, The Construction, Building and Real Estate Research Conference of the
Royal Institution of Chartered Surveyors.
[5] Susmita Sinha, Anil Sawhney, Extracting information from building information models for energy code
compliance of building envelope. URL Http://blog.sanaulla.info/2013/05/23 parsing-xml-using-dom-sax-
and-stax-parser-in-java.
[6] Sharpe R, Oakes S., Advanced I.T. processing of Australian standards and regulations, The
International Journal of Construction Information Technology 3 (1) (1995) 7389.
[7] Zarli A, Debras P., Integration of corba and web technologies in the vega dis., Proceedings of the European
Conference on Integration in Manufacturing, Gothenburg, Sweden 3 (1) (1998) 184 97.
[8] S. M. Inc., J2ee overview of the java 2 platform enterprise editions. URL http://java.sun.com/j2ee/
[9] Building, C. A. of Singapore (BCA), e-plancheck system in CORENET. URL http://www.bca.gov.sg/
[10] C. D., Development and implementation of automated code compliance checking in the U.S., International
Code Council, 2007.
[11] Delis E.A., Delis A., Automatic firecode checking using expert-system technology, journal of computing in
civil engineering, ASCE 2 (1995) 141–156.
[12] Ding, L., Drogemuller, R., Rosenman, M., Marchant, Gero, D. J., Automating code checking for building
designs: in K. brown, k. Hampson, P. Brandon (eds.), clients driving construction innovation, Cooperative
Research Centre (CRC) for Construction Innovation (2006) 113–126.
[13] Eastman, C. M., Jaemin Lee, YeonsukJeong, Jinkook Lee, Review automatic rule-based checking of
building designs, Automation in Construction 18 (2009) 10111033.E. Technology, Express data manager.
URL http://www.EPMtech.jotne.com
[14] Notation for building code compliance checking, Building and Environment 39 (6) (June2004) 689698.
[15] C. Wu, Ifc model viewer to support and model application, Automation in Construction 15 (2) (2006) 178–
185.
[16] Er. Narinder Singh, Prof. Harvinder Singh, Prof. Hardeep Singh Rai: Extracting Code Compliance Data
from IFC With Python Language -- Palarch's Journal of Archaeology of Egypt/Egyptology 17(9). ISSN
1567-214x

AUTHOR DETAILS:
ER. NARINDER SINGH1, PROF. HARVINDER SINGH2 AND PROF. HARDEEP SINGH3
1
Research scholar, IKGPTU, Kapurthala Road, Jalandhar
2,3
Guru Nanak Dev Engineering College, Ludhiana

640
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

CONSEQUENCES OF INDIA CHINA BORDER DISPUTE ON THE SALE OF CHINESE MOBILE


PHONES IN KERALA

NUSARATH K. K AND DR. HABEEBURAHIMAN P. M

ABSTRACT
India and China are the two neighbouring countries in Asia.Both the countries share a common 3488 kilometer
long border , unfortunately a major lenght is disputed .This has caused minor to major standoffs and a full
fledged war between the two countries, the recent one in Galwan ,occurred in 2020 and was a major issue. The
purpose of this study is to investigate India-China conflict and its implications on the sale of Chinese branded
mobile phones in Malappuram district in kerala.Primary datas were collected from the mobile phone retailers
in malappuram district through questionaire and personal interview. Statistically significant differences were
not found in the attitude of consumers by age, gender and location. The study provides an understanding of
whether India-China conflict has made any changes on the import and export of Chinese products in kerala or
not. The marketing strategy of Chinese products is also discussed. It ends with a perspective on the future
challenges.
Keywords: India-China conflict, Chinese branded mobile phone and implications.

INTRODUCTION
India and China are the two important countries in the Asian continent. These two are the major economies
with huge population and fastest growth in the world.India has a long standing trading relationship with China.
Latest Indian commerce ministry data’s shows China as the second largest trading partner of India .The
economic relationship between India and China is so deep that both countries are not in a situation to avoid
each other.
India China boundary disputes date back to British era.Himalayas lies in between India and China. India shares
around 3500 km of border with China.It is located primarily in the north-eastern part of the Indian province of
Kashmir and south-western part of the China. A clear map showing the extent of India and China,s border is not
available. India -China relations are marked by border disputes that have led to 3 conflicts -the Sino-Indian war
of 1962, the border clashes of Nathu La and Cho la in 1967 and 1987 sumdorong chu standoff. However, both
countries have re-established diplomatic and economic relations since the late 1980s. India’s foreign policy
governs the policy of creating and maintaining a good neighbourhood relationship.The nature of the current
relationship between India and China are the conflicts, mutual cooperation and the problematic boundary
dispute.
India Government Policy Shifts on Chinese Imports after Galwan Vallay Clash in 2020
Latest clash between the two countries in Galwan vallay in 2020 along the line of Actual Control , resulted in
heavy losses on both side. It resulted in the deaths of 20 Indian soldiers and an unknown number of Chinese
soldiers. This dispute is not like the earlier ones.This was the biggest encounter since the 1962 war.As a result ,
both Indian government and the public have an aversion towards the Chinese products. In protest, India
banned a number of Chinese apps and several restrictions were put on Chinese products imported and marketed
in india. Although the Indian government imposed a number of restrictions on Chinese goods , the Chinese
goods continued to come to India through other countries such as Bangladesh and Sri lanka. This prompted
India's commerce and Industry ministry to tighten up the supervision on the products coming to India through
other countries.
India’s exports to the US are higher and imports are lower, but its not the case with China,that is India's exports
are less and imports are more.That is ,the trade between India and China is heavily imbalanced . The main
purpose of India govt retaliatory measures were to reduce these trade deficit and to pressurize China to defuse
border disputes.
Chinese Mobile Brands in Kerala Market
The Indian consumer durable market is flooded with Chinese products. Out of this imports, mobile phones
consist a major part. This study , concentrates on only Chinese branded mobile phones in Kerala. Chinese
branded mobile phones occupies an important role in the mobile phone market. Initially there where few Indian
brands which dominated the Kerala market , but gradually Chinese smart phones entered and established their

641
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

brand. Although , there are a few domestic mobile brand still in the market , consumers are more inclined
towards Chinese brands.The main Chinese mobile brands are Oppo, Xiomi, One plus, Realme, Lenovo,Vivo
etc .
According to official data‘s , more than 50% of mobile phones in India are Chinese branded mobile phones. As
per the 2015 record, the percentage of mobile phone in the mobile phone market in India was Lava 7%, Intex
9.4%, Lenovo 11.6%, Samsung 26.8%, Micromax 14.1% and others are 31.1%. In the year 2019, it was
Xiaomi-29%,Lenovo-23%,Oppo-7%, Realme- 7%, and Vivi-12%. This all are Chinese brands. Indian domestic
brands like Lava, Micromax and Intex was once the dominant player in the mobile phone market ,but then
Chinese companies captured the Indian market by bringing a lot of such feature phones to India at cheap rates
gradually and Indian branded mobile companies lost their market share.Studies shows main reasons for the
failure of indian mobile brands were lack of innovative ideas,higher price and also the clueless marketing
strategy .
There was an initial decrease in the demand for Chinese branded mobile phones due to the imposing of control
over the Chinese products in India by government and contemption towards Chinese products by the people
aftermath the border conflict in 2020.But Indian mobile companies were not able to leverage the situation.
LITERATURE REVIEW
Ahmet Uyar (2018), understood that most consumers do not have much respect for the Chinese products as
there is already an impression that the Chinese products are of low quality. But the fact is that Chinese products
are of varied quality with respect to its price and today most of the products of developed country's are
produced in China. Country of origin is an important influencing factor while making purchase decision. In the
future attitude of consumers may change.
Amrit Mohan (2014), explains smartphone consumers behaviour. The main factors for smart phone purchase
are product brand, its features and its price. Although there are many internal and external influential factors
like advertisement, social image of the customer, promotion, aftersales service, brand preferences etc mobile
brands is of supreme importance. It is also found out that around half of the customers prefer international
brands.
Karthik.M (2018),defines the relation of brand loyalty and customer satisfaction of mobile phones.Customers
have brand loyalty towards the mobile brand , that they use and the contributory factors are reputation and cost
of the product. There is also a relation between brand switching and the factors like cost, quality, advanced
technology ,inconvenience, advertisement etc.
METHODOLOGY
Primary data was collected by using convenient sampling method. In order to collect primary data for the
research , questionnaire in the form of google form were used.The google form was sent to the retailors, having
mobile business in the Malappuram district in kerala,via email and other social media and through direct
interviews with consumers at mobile shops.A total of 60 questionaires were given to the retailers selling mobile
phones .Out of 60 retailers , only 50 questionsaires were received with required coverage and details. The
statistical package for the social science (SPSS) for Ms.Windows 20 was used to complete the analysis of the
collected data. Descriptive statistics including mean & standard deviation were implemented in order to analyse
the demographic data. One way analysis of varience were used to determine whether any significant difference
exist among respondents. In addition the 0.5 level of statistical significance was set at all statistical tests in the
present study. The findings of the study were generalised as follows. Statistically significant difference were not
found in the attitude of consumers by age, gender and location.
Data Analysis
Table 1 shows the demographic characteristics of the participants. According to the table, 80% of the
participants were male and 20% of them were female. 76.% of them were in the age range of 21 to 35 years,
and 24% of them fall in the 36-50 age group.location wise 68% came from urban area and 28% from rural area.
Table 1: The Demographic characteristics of the participants
Variables Frequency Percent
male 40 80.0
Gender female 10 20.0
Total 50 100.0
Between 21-35 38 76.0

642
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Age Between 36-50 12 24.0


Total 50 100.0
rural 14 28.0
Location semi urban 2 4.0
urban 34 68.0
Total 50 100.0
INTERPRETAION
Table 2: Brand availability

From table 2, it is clear that all respondents deal with OPPO and next comes Realmi and 84 % deal in Vivo.
Other cheap Chinese brands are sold by 20%. of the respondents. Very few or negiligible quantity of Indian
brands are stocked by the retailers.
Change in the Sale of Mobile Phone after the India-China Conflict
TABLE 3:1
Variables Frequency Percent
Increase 32 64.0
Decrease 2 4.0
No change 16 32.0
Total 50 100.0
Table 3:2
Variables N Percent
Newtechnology 26 33.3%
Affordableprice 26 33.3%
Increase in sale Increasedavailability 6 7.7%
due to factors like Newmodels 10 12.8%
Othersreasons 2 2.6%
Advertisement 8 10.3%
Total 78 100.0%
Decrease in sale Lowquality 2 4.0%
due to factors like 48 96.0%
Total 50 100.0%
Change in Consumer Behaviour
Table 3:3
Variables Frequency Percent
YES 0 0
No 50 100.0
INTERPRETATION
All respondents are of the opinion that there is no change in the consumer behaviour towards Chinese branded
mobile phone before and after the Indo-China conflict. Interesting observation is that during this period Chinese

643
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

mobile phone sale increased. From the table 3:1 it is understood that 64 % of the respondents are of the opinion
that sale of Chinese branded mobile phone has increased while 4 % claimed that the sale decreased and 32%
claimed that there is no much change in the sale of mobile phone before and after the conflict.
Table 3:2 shows that 33% of the respondents claimed new technology and affordable price are the main reasons
for the increase in sale. New models ,advertisement and increased availability are other reasons which
contributed to the growth in sales . Even the 2 respondents who think there is a decrease in the sale , they
attribute this to the quality of the products.It implies that there is no decrease in the sale of chinese branded
mobile due to the conflict.
Table 4
Variables Frequency Percent
Sufficient stock Yes 38 76.0
No 12 24.0
Total 50 100.0
Mobile price Increased 20 40.0
No change 30 60.0
Total 50 100.0
Difficulty in Yes 10 20.0
getting spare parts No 34 68.0
Maybe 6 12.0
Total 50 100.0
INTERPRETATION
Most of the respondents [76%] did not face any trouble in getting the stock as per order. while 24 %
respondents are of the opinion that govt restrictions are causing difficulty in getting the stock as per
order.Slight increase in mobile price was reported by 40 % of the respondents but 60 % respondents do not
think so. Most of the retailers don’t feel any difficulty in getting sufficient spare parts for Chinese mobiles.
Table 5
Variables Frequency Percent
Negative impact on Yes 6 12.0
sale No 38 76.0
May be 6 12.0
Total 50 100.0
Difficulty in Yes 8 16.0
Software updations No 34 68.0
May be 8 16.0
Total 50 100.0
INTERPRETATION
According to Table 5 data’s, 76 % of the retailers are of the opinion that there is no any negative impact on the
sale of Chinese branded mobile phone due to the China India border issue.while 12% opinion that the issue
created a negative impact and another 12% think that it may have negative impact .Some popular apps were
blocked by govt of India, but there was no much issues with software updations. 34 respondents don’t feel any
difficulty in software updation whille 8 respondents felt some difficulties in software updations .
Table 6
Variables Frequency Percent
Impact on mobile Yes 16 32.0
sale in future No 22 44.0
May be 12 24.0
Total 50 100.0
INTERPRETATION
Retailers had a mixed forcast. 16 respondents believe that there would be a decrease in the sale of chinese
branded mobile phone ,while 44% do not think so.24% retailers do not expect any change in trend in the near
future.

644
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

INTERPRETATION
As sig is .638 ,its greater than .05, there is no relation between gender of the respondents and attitude towards
chinese branded mobile phone
ANOVA
Attitude
Sum of Squares df Mean Square F Sig.
Between Groups 1.617 1 1.617 3.650 .062
Within Groups 21.263 48 .443
Total 22.880 49
INTERPRETATION
As the result is .062 ,greater than .05 , there is no relation between age of the respondents and attitude towards
chinese products.
ANOVA
Attitude
Sum of Squares df Mean Square F Sig.
Between Groups .393 2 .196 .410 .666
Within Groups 22.487 47 .478
Total 22.880 49
INTERPRETATION
As per the above table result is .666, its greater than .05 , it is assumed that there is no relation between
location of the respondents and attitude towards chinese branded mobile phones.
FINDINGS AND CONCLUSION
As the border dispute between India and China is really getting hot ,it is not only affecting the boarder areas but
also the cordial relationship between the two super giants of Asia. New series of clashes has result in Indian
government imposing restrictions, excess taxes etc on the Chinese import. That’s why import from china is
reduced.As we know Indian durable market is flooded with Chinese product. Initially it had some effects but
things looks, back to normal now. Contrary to the believes ,chinese branded mobiles sales increased . Study
shows no any significant shift away from chinese brands. In the near future retailers are expecting continuous
growth in sales. The consumers attitude towards Chinese branded phones are unaffected, There are no
major change in the price of mobile, no difficulty in getting sufficient stock and also for software updation.
Indian companies were not able to leverage the negative image created against China. Chinese dominance is
expected to continue because of its specialities like new technology,new models,availability,marketing
strategy etc.In short , the Indo-China border dispute as well as the restriction imposed by the government on it
had consequences,but it lasted only for a short term.
REFERENCES
1. Amrit Mohan (2014)-consumer behaviour towards smartphone industry in Indian market.
2. Surendra Malviya, Manminder Singh Saluja and Avijeet Singh Thakur (2013),” A study on the factors
influencing consumer’s purchase decision towards smartphones in Indore”---ISSN: 2321-7782, Vol.1,
Issue 6, Nov 2013.
3. Exploring Consumer Purchase Behaviour :Foreign Versus Local Brands---- Alireza Nalchi Kashi--Global
Business Review 14 (4) 587-600 © 2013 IMI SAGE publication

645
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

4. Trade and Balance of Payments in India and China : A comparative analysis Vol. 4.No-3 June 2016
ISSN-2319-961X Dr.S.Palani and Dr.K.Balamurugan.
5. Study on customers perception towards buying chinese electronic products- Shilpa shree.M.S. (2020 Dec).
University of mysore
6. Rakesh Kumar (2014),”Impact of Demographic Factors on Consumer Behaviour- A Consumer Behaviour
Survey in Himachel Pradesh. Global Journal of Enterprise Information System DOI : 10.15595/
gjeis/2014/v6i2/ 51844.
7. Customer’s perception towards buying Chinese products: An empirical investigation in Malaysia.
8. Karthik ( 2018) ,Brand loyalty and customer satisfactionof Smart phones.

AUTHOR DETAILS:
NUSARATH K. K1 AND DR. HABEEBURAHIMAN P. M2
1
Research Scholar and 2Research Supervisor, Department of Commerce, PSMO College, Tirurangadi,
Malappuram

646
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

OPERATING CYCLE: A TOOL FOR WORKING CAPITAL

DR. HITESH G. SUTHAR

ABSTRACT
Actual Operating Cycle is greater than operating cycle as per owner’s view. Owner’s view considered on the
basis of questionnaire fill up by owner. Due to increase in working capital cycle period cause increased in
requirement of working capital. From the study it is concluded that there is significant difference between
requirement of working capital and actual working capital. In fact requirement of working capital (based on
operating cycle period) is greater than actual working capital (based on operating cycle period). Hence,
operating cycle significantly affect the working capital management of Micro enterprises. Pearson and
Spearman correlation between requirement of working capital and actual working capital is 0.952& 0.958
respectively. P value of the difference of requirement of the working capital and actual working capital is 0.041.
Therefore null hypothesis is rejected.
Keyword: Operating Cycle, Working Capital, Requirement of Working Capital and Actual working Capital

1.1 INTRODUCTION
The knowledge and understanding of the working capital management practices of small, business units are
presently not enough and many units have gone in to liquidation over the years as a result of running a deficit
cash flow from operations. Financial soundness and profitability of a business enterprises largely depend upon
the working capital management of the firm. Working capital comprises of different components like raw
material, work in progress, debtor, bill receivable and cash etc. The management of receivable is very crucial in
order to control collection cost and bad debt. The cash management is also very significant because firm should
have optimum level of cash during the year. The raw material and work in progress and finished goods are very
important part of inventory therefore they should be properly managed.
1.2 REVIEW OF LITERATURE
1.2.1 According to Chakraborty (1973) approached working capital as a segment of capital employed rather
than a mere cover for creditors. He emphasized that working capital is the fund to pay all the operating expenses
of running a business. He pointed out that return on capital employed, an aggregate measure of overall
efficiency in running a business, would be adversely affected by excessive working capital. Similarly, too little
working capital might reduce the earning capacity of the fixed capital employed over the succeeding periods.
For knowing the appropriateness of working capital amount, he applied Operating Cycle (OC) Concept. He
calculated required cash working capital by applying OC concept and compared it with cash from balance sheet
data to find out the adequacy of working capital in Union Carbide Ltd. and Madura Mills Co. Ltd. for the years
1970 and 1971. He extended the analysis to four companies over the period 1965-69 in 1974 study. The study
revealed that cash working capital requirement were less than average working capital as per balance sheet for
Hindustan Lever Ltd. and Guest, Keen and Williams Ltd. indicating the need for effective management of
current assets. Cash working capital requirements of Dunlop and Madura Mills were more than average balance
sheet working capital for all years efficient employment of resources. For Union Carbide Ltd., cash working
capital requirements were more in beginning years and then started reducing in the later years as compared to
conventional working capital indicating the attempts to better manage the working capital. Chaktraborty
emphasized the usefulness of OC concept in the determination of future cash requirements on the basis of
estimated sales and costs by internal staff of the firm. OC concept can also be successfully employed by banks
to assess the working capital needs of the borrowers.
1.2.3 According to Lambrix and Singhvi (1979) adopting the working capital cycle approach to the working
capital management, also suggested that investment in working capital could be optimized and cash flows
could be improved by reducing the time frame of the physical flow from receipt of raw material to
shipment of finished goods, i.e. inventory management, and by improving the terms on which firm sells
goods as well as receipt of cash. However, the further suggested that working capital investment could be
optimized also (1) by improving the terms on which firms bought goods i.e. creditors and payment of
cash, and (2) by eliminating the administrative delays i.e. the deficiencies of paper-work flow which
tended to extend the time-frame of the movement of goods and cash.

647
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

1.2.4 According to Prasad and Eresi (1990) conducted an empirical study on working capital management of
Small Scale Industries in the state of Karnataka during the period 1986-87 to 1988-89. The study was
made by using data from primary as well as secondary sources. The study revealed that more than fifty
per cent of the total assets of the selected units were in the form of current assets. However, another
notable finding of the study was that excessive investment of funds in inventories and debtors which was
responsible for the poor performance of liquidity management of SSI units.
1.2.5 According to Reddy and Rao (1996) in their study made an attempt to examine the working capital
management practices in Hindustan Cables Limited (HCL), a public enterprise on the assumption that
working capital policies had a great effect on a firm’s liquidity and profitability. The study was based on
the data and information obtained from the annual reports of HCL from 1989-90 to 1993-94. The study
demonstrated that the company maintained its current ratio and quick ratio above the conventional
standard of 2:1 and 1:1 respectively throughout the study period. The study concluded that liquidity status
of HCL was satisfactory during the period under study.
1.2.6 According to Prasad (2001) in his paper examined the position of the working capital management of
paper industry in India for the period 1983-84 to 1992-93. The study considered the selected 21 large,
medium and small scale paper mills. This study reported that all sample firms made huge investment in
current assets and the working capital in most of the paper mills was not properly utilized. This study
revealed that top-level management of the sample units failed to trade off between liquidity and
profitability.
1.2.7 According to Reddy (2001) in his study evaluated the working capital management of a diversified group
of small scale industries in the Cuddapah district in the state of Andhra Pradesh for the period 1989-90 to
1994-95. The study was based on the selected 30 small scale firms from different industrial groups such
as plastic, mineral, engineering, aluminum and miscellaneous. The study showed the sample SSI units
failed to manage their working capital efficiently and their investments in inventories and receivables
were relatively high. The study explored the liquidity crisis in most of the selected firms.
1.3 Objectives of the Study
1. To understand the operating cycle of the enterprises
2. To understand the requirement of working capital & actual working capital
1.4 Problems of the Study
1) Operating Cycle affects working capital of the enterprises.
2) Difficult to maintain requirement of working capital.
1.5 Hypothesis of the Study
H0: “There is no significant difference of Requirement of working capital and Actual Working Capital based
on operating cycle period.”
H1: “There is a significant difference of Requirement of working capital and Actual Working Capital based
on operating cycle period.”
1.6 Universe of the Study:
Total 60 Ladies Kurti Manufacturer located between from Malad to Borivali (Sub- Urban Area of
Mumbai)
1.7 Sample of the Study
From the universe, researcher has selected 50 Ladies Manufacturer (Micro Enterprises).
2.1 Concept Related to Operating Cycle
The need of working capital arrived because of time gap between production of goods and their actual
realization after sale. This time gap is called “Operating Cycle” or “Working Capital Cycle”. The operating
cycle of the enterprise consist of time period between procurement of inventory and the collection of cash from
receivables. The operating cycle is the length of time between the enterprise’s outlay on raw material, wages
and other expenses and inflow of cash from sales of goods.
Operating cycle is an important concept in management of cash and management of working capital. The
operating cycle reveals the time that elapses between outlays of cash and inflow of cash. Quicker the operating

648
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

cycle less amount of investment in working capital is needed and it improves profitability. The duration of the
operating cycle depends on nature of industries and efficiency in working capital management.
The Operating Cycle in a Manufacturing Firm is shown below:
DIAGRAM -1:

2.2 Operating Cycle Approach or Working Capital Cycle Approach


According to this approach, the requirements of working capital depend upon the operating cycle of the
business. The operating cycle begins with the acquisition of raw materials and ends with the collection of
receivables. It may be broadly classified into the following stages viz.
Stage 1: Cash to Inventory – In this stage, cash first gets converted into raw materials, then work-in progress
and then finished goods in a typical manufacturing concern. As regards non-manufacturing concerns, when the
goods are purchased, cash gets converted into inventory
Stage 2: Inventory to Debtors – The Inventory thus produced or purchased, gets converted into debtors or
receivables upon credit sales.
Stage 3: Debtors to Cash – The debtors or accounts receivables get in turn converted back into cash when they
make payment.
Thus, Working Capital Cycle = Days Inventory + Days Receivable. Researcher presented& explained day’s
receivable and days inventory with the help of sample no.1’s financial data under table no 2.1 to 2.3 and other
samples ascertained same.
Table No 2.1 Days Receivable
Year *Average Receivable Net Sales **No. of days
2015-16 692776.8 2,329,967 109
2016-17 709888.8 2,547,120 102
2017-18 772982.4 2,678,042 105
2018-19 868209.6 2,791,483 114
2019-20 927776 3,237,842 105

*Average Receivable = Receivable beginning of the year + Receivable end of the year
2

**Days Receivable = Average Receivable x100


Sales
Table No. 2.2 Days Inventory
Year # Average Inventory Cost of Goods Sold = Sales -Gross Profit ## No. of days
2015-16 369948.8 1,430,914 94
2016-17 344778.4 1,509,257 83
2017-18 365280 1,671,458 80
2018-19 376731.2 1,826,006 75
2019-20 387672 2,607,007 68

# Average Inventory = Inventory beginning of the year + Inventory end of the year
2

## Days Inventory = Average Inventory x365


Cost of Goods Sold

649
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table No. 2.3 Operating Cycle


Year Days Receivable Days Inventory Operating Cycle
2011-12 109 94 203
2012-13 102 83 185
2013-14 105 80 185
2014-15 114 75 189
2015-16 105 68 172
According to operating cycle approach the requirement of working capital depend up on the operating cycle of
the business. To judge liquidity position of samples, researcher has ascertained requirement of working capital
on the basis of the following formula:
Requirement of Working Capital = Cost of Goods Sold x Operating Cycle Period / 365
Source: CA IPCC, Financial Management Module.
To judge over all liquidity position researcher compare average requirement of working capital with average
actual working capital. Actual working capital ascertained by using formula i.e. Working Capital x Operating
Cycle Period /365. On the basis of both formula researcher ascertained requirement of working capital and
actual working capital as per operating cycle. Requirement of working capital & actual working capital
presented under table no. 2.4 & 2.5
Table No. 2.4 Requirement of Working Capital for the year 2015-16 to 2019-20
2015-16 2016-17 2017-18 2018-19 2019-20 AVERAGE
SAMPLE
Rs Rs Rs Rs Rs Rs
1 795407 765411 847726 944658 985284 867697
2 1022311 982448 1055939 1146002 1202008 1081742
3 947205 880418 944025 1021030 1071378 972811
4 1275455 1209294 1299963 1440418 1505082 1346043
5 1451579 1358730 1478968 1628714 1690220 1521642
6 1396575 1393558 1556929 1682679 1771090 1560166
7 1567494 1629163 1824397 1986094 2114685 1824367
8 1763199 1858321 2064115 2275980 2467336 2085790
9 2013142 2168862 2473396 2744566 2954560 2470905
10 2236462 2378186 2635048 2949731 3239667 2687819
11 2393615 2651703 2965507 3271548 3529446 2962364
12 2339343 2676874 3005475 3337210 3691084 3009997
13 2629970 3137809 3556699 3851802 4196274 3474511
14 2200902 2475104 2723154 2929900 3014180 2668648
15 2566230 2916106 3282516 3435287 3513494 3142727
16 864556 951624 1053324 1181813 1298733 1070010
17 665580 733002 796673 892137 990470 815572
18 640434 695705 794238 975752 1162954 853816
19 814796 935210 1074830 1150006 1106766 1016322
20 744678 843555 919359 1042383 1130615 936118
21 972363 992605 1067700 1113054 1151254 1059395
22 182389 178022 194840 243695 245336 208856
23 539157 581310 680210 828957 892480 704423
24 335927 429008 475374 508002 547038 459070
25 898377 1090458 1140426 1147427 1152118 1085761
26 370955 405760 497127 715864 926618 583265
27 439735 420344 414448 458458 463542 439306
28 925160 952605 986842 1030510 1066599 992343
29 383756 438474 471659 453678 398146 429143
30 422997 419443 488146 616558 672628 523954
31 328067 399525 420659 450687 505050 420798
32 2238343 2560646 2871027 3194822 3540218 2881011
33 300068 366840 364068 403833 429066 372775
650
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

34 814796 744678 972363 182389 539157 650676


35 335162 315438 329953 345473 344770 334159
36 251088 268565 330630 356756 370566 315521
37 227916 282691 320979 351386 361692 308933
38 225222 274755 303117 304706 323738 286308
39 305346 330114 311398 320616 332674 320030
40 305090 301323 365366 451214 527250 390049
41 1020364 967435 1039970 1152334 1204066 1076834
42 1610514 1735090 1978717 2195653 2363648 1976724
43 1871474 2141498 2404380 2669767 2952867 2407997
44 2103976 2510247 2845359 3081442 3357019 2779609
45 1760722 1980083 2178523 2343920 2411344 2134919
46 2052984 2332885 2626013 2748230 2810795 2514181
47 691645 761299 842659 945450 1038986 856008
48 532464 586401 637338 713710 792376 652458
49 718702 872366 912340 917942 921694 868609
50 296764 324608 397702 572691 741294 466612
Table No. 2.5 Actual of Working Capital for the year 2015-16 to 2019-20
2015-16 2016-17 2017-18 2018-19 2019-20 AVERAGE
SAMPLE
Rs Rs Rs Rs Rs Rs
1 529618.4 501911.2 870574.4 887433.6 950238.4 747955.2
2 639076.8 554332 914390.4 1031836 1128560.8 853639.2
3 428772 442,478 787,810 907,221 663,900 646,036
4 774704.8 947,711 1,278,346 1,477,549 1182039.04 1,132,070
5 774012.8 929,517 1,217,829 1,301,099 1040879.36 1,052,667
6 675894.4 914,454 1,167,365 1,271,307 1017045.76 1,009,213
7 765470.4 1,239,787 1,663,640 1,845,986 991829.76 1,301,343
8 945676.8 1381432.8 1748676.8 1851381.6 1105146.24 1406462.848
9 910206.4 1687188 1885485.6 1960937.6 2622285 1813220.52
10 965533.6 1490835.2 1971532 2433280 3637930 2099822.16
11 1130276 1,932,854 2,714,350 3,166,808 4,465,092 2,681,876
12 1260144.8 2264292.8 2953109.6 3517530.4 5384335 3075882.52
13 1469377.6 2859088.8 3749800 4075354.4 5611896 3553103.36
14 764047.2 1542070.4 1871351.2 1975743.2 3131761 1856994.6
15 944228.8 1572604.8 1870200.8 2098824 3390641 1975299.88
16 587582.4 655430.4 1113295.2 1512299.2 2248586 1223438.64
17 485475.2 395833.6 652532.8 961792 1376281 774382.92
18 280162.4 321248.8 622687.2 971964.8 1316490 702510.64
19 424037.6 495059.2 848415.2 1015965.6 1258274 808350.32
20 449747.2 417531.2 758656.8 906290.4 1284540 763353.12
21 435422.4 469218.4 721500 488089.6 625134 547872.88
22 110012 111448 168245.6 204378.4 230707 164958.2
23 386727.2 459201.6 415811.2 662304 757572 536323.2
24 313640.8 318203.2 294424.8 366651.2 470669 352717.8
25 544048 763021.6 714728.8 679059.2 805083 701188.12
26 569060 445468 497172 794850.4 1127355 686781.08
27 241749.6 137208.8 138400 149495.2 203628 174096.32
28 476731.2 480885.6 691184 459964 575602 536873.36
29 300472 378721.6 370723.2 222529.6 185592 291607.68
30 275654.4 225037.6 296447.2 374280.8 485047 331293.4
31 542509.6 439870.4 249368.8 198930.4 263977 338931.24
32 1224530.4 2199828 2864765.6 3418677.6 5242135 2989987.32
33 168763.2 154670.4 126271.2 142881.6 167902 152097.68
34 935209.6 843,555 992,605 178,022 726,637 735,206
651
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

35 243084.8 118997.6 141927.2 127337.6 148668 156003.04


36 83055.2 72931.2 102944 107214.4 115897 96408.36
37 140667.2 101775.2 90265.6 92543.2 99049 104860.04
38 121195.2 97179.2 86358.4 115334.4 123778 108769.04
39 217750.4 162832.8 132453.6 91742.4 104958 141947.44
40 79764.8 102458.4 107980.8 135058.4 190346 123121.68
41 619764 758168.8 1022676.8 1182038.4 1236136 963756.8
42 728164.8 1349750.4 1508388.8 1568749.6 2097828 1450576.32
43 1008116 1811434.4 2362488 2814024 4307468 2460706.08
44 1175502.4 2287271.2 2999840 3260283.2 4489517 2842482.76
45 611238.4 1233656 1497080.8 1580594.4 2505409 1485595.72
46 755383.2 1258084 1496160.8 1679059.2 2712513 1580240.04
47 470065.6 524344.8 890636 1209839.2 1798869 978750.92
48 388380 316667.2 522026.4 769433.6 1101025 619506.44
49 435238.4 610417.6 571783.2 543247.2 644066 560950.48
50 455248 356374.4 397737.6 635880 901884 549424.8
Table No. 2.6 Average requirement of working capital, average actual working capital & operating cycle
working capital Ratio
Sample No. Average requirement of working capital Average actual working capital Ratio
1 867697 747955 86.20
2 1081742 853639 78.91
3 972811 646036 66.41
4 1346043 1132070 84.10
5 1521642 1052667 69.18
6 1560166 1009213 64.69
7 1824367 1301343 71.33
8 2085790 1406463 67.43
9 2470905 1813221 73.38
10 2687819 2099822 78.12
11 2962364 2681876 90.53
12 3009997 3075883 102.19
13 3474511 3553103 102.26
14 2668648 1856995 69.59
15 3142727 1975300 62.85
16 1070010 1223439 114.34
17 815572 774383 94.95
18 853816 702511 82.28
19 1016322 808350 79.54
20 936118 763353 81.54
21 1059395 547873 51.72
22 208856 164958 78.98
23 704423 536323 76.14
24 459070 352718 76.83
25 1085761 701188 64.58
26 583265 686781 117.75
27 439306 174096 39.63
28 992343 536873 54.10
29 429143 291608 67.95
30 523954 331293 63.23
31 420798 338931 80.54
32 2881011 2989987 103.78
33 372775 152098 40.80
34 650676 735206 112.99
35 334159 156003 46.69
652
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

36 315521 96408 30.56


37 308933 104860 33.94
38 286308 108769 37.99
39 320030 141947 44.35
40 390049 123122 31.57
41 1076834 963757 89.50
42 1976724 1450576 73.38
43 2407997 2460706 102.19
44 2779609 2842483 102.26
45 2134919 1485596 69.59
46 2514181 1580240 62.85
47 856008 978751 114.34
48 652458 619506 94.95
49 868609 560950 64.58
50 466612 549425 117.75
Ratio ascertained by using formula i.e. Average Actual Working Capital / Average Requirement of working
Capital x100.
Table No. 2.7: No. of Sample under different category of Operating Cycle Ratio
Particulars No. of Sample
Less than 50 % 8
Between 50 % to 100 % 32
More than 100 % 10

3.1 RESEARCH METHODOLOGY


For testing null hypothesis researcher used data related to Operating cycle Requirement of working capital and
Actual Working Capital collected by researcher. The details of which are given table no. 3.1 to 3.3
Null for Normality Normality Result of
Variables P value
test test normality test
Difference of Operating cycle The distribution of
One sample
Requirement of working capital DIFF is normal with Reject null
kolmogorov- 0.041
and Actual Working Capital mean 252562.8 and hypothesis
smimov test
(DIFF) S.D. 59267.1
Observation and Interpretation
From the above table no. 3.1, it is observed that p values for variable DIFF is 0.041. This value is less than
critical p value 0.05. Hence researcher rejected null hypothesis and data is not normally distributed. Therefore
researcher used non-parametric related sample Wilcoxon sign test for testing significance difference between
Operating cycle Requirement of working capital and Actual Working Capital.
653
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

It is concluded that from mean, standard deviation and minimum value of requirement of working capital are
greater than actual working capital.
Pearson’s and Spearman’s Rank Correlation Coefficients are given in Table No. 3.2.
Table no. 3.2: Paired Samples correlation

Observation and Interpretation


From above table no.3.2, it is observed that Pearson’s coefficient and Spearman rank correlation coefficient
values are 0.952 and 0.958 also corresponding p values are 0.000 and 0.000 respectively. These values are less
than significant p value 0.01. Hence there exists significant positive correlation between Operating cycle
Requirement of working capital and Actual Working Capital. Therefore two groups are dependent/related.
Table no. 3.3
Descriptive Statistics
Category N Mean Std. Deviation Minimum Maximum
Requirement of working Capital 50 1297379 941190.9099 208856 3474511
Actual working capital 50 1044813 881923.8103 96408 3553103
Observation and Interpretation
From the above table no.3.3, it is observed that:
1) Mean value for Operating cycle Requirement of working capital is 1297379 is greater than mean value for
Operating cycle Actual Working Capital 1044813.
2) Standard Deviation for Requirement of working capital is 941190.9099 is greater than standard deviation for
actual working capital is 881923.8103
3) Minimum value for Requirement of working capital is 208856 is greater than minimum value of actual
working capital is 96408.
4) Maximum value for Requirement of working capital is 3474511 is less than maximum value of actual
working capital is 3553103.
Finding: From the above it is concluded that, there is significant difference of Operating cycle Requirement of
working capital and Actual Working Capital. In fact operating cycle Requirement of working capital is greater
than Operating cycle Actual Working Capital. Therefore alternative hypothesis (H1) is accepted.
Conclusions With Respect to Operating Cycle
Actual Operating Cycle is greater than operating cycle as per owner’s view. Owner’s view considered on the
basis of questionnaire fill up by owner. Due to increase in working capital cycle period cause increased in
requirement of working capital. From the study it is concluded that there is significant difference between
requirement of working capital and actual working capital. In fact requirement of working capital (based on
operating cycle period) is greater than actual working capital (based on operating cycle period). Hence,
operating cycle significantly affect the working capital management of Micro enterprises.
REFERENCES
1. Referen Chakraborty, S.K. (1973), “Use of Operating Cycle Concept for Better Management of Working
Capital”, The Economic and Political Weekly, August, 1973, Vol.8, pp. M69-M76.
2. Lambrix, R.J and Singhvi, S .S (1979) “Managing the Working Capital Cycle”, Financial Executive, June
1979, pp.32-41.
3. Prasad, B. and Eresi, K. (1990). “Working Capital Management in SSI - An Empirical Study”, Journal of
Accounting and Finance, Vol.4, No.3, pp- 31-35.
4. Prasad, R.S. (2001). “Working Capital Management in Paper Industry”, Finance India, Vol.15, No.1, pp-
185-188.
654
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

5. Reddy, P. I. And Rao, K. S. (1996). “Working capital management in public sector undertakings – a case
study”, The Management Accountant, Vol. 31, No. 9, pp- 643-645..
6. Reddy, H.S. (2001). “Working Capital Management in Small Scale Industries: A study of Cuddapah
District, Andhra Pradesh”, Finance India, Vol.15, No. 2, pp-47-52.

AUTHOR DETAILS:
DR. HITESH G. SUTHAR
Academic Coordinator, GNVS Institute of Management

655
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

GENDER’S IMPACTS ON PERCEPTION TOWARDS INFLUENCER MARKETING FOR OTT


PLATFORM

DR. RACHIN SURI, AMIT KUMAR MANDAL AND MANVI KHOSLA

ABSTRACT
The goal of the study was to see how influencer marketing affected digital content viewing. Many businesses
have benefited from the increased popularity and engagement of OTT platforms and digital content. Many
viewers were able to examine OTT material due to the lockout imposed by Covid-19. The entertainment
industry's worldview shifted dramatically as a result of this. This was a game changer in India. OTT plans
began to sell like hotcakes, and competition intensified. There will be a slew of new and emerging production
houses and entertainment enterprises. In this regard, digital content began to necessitate advertising, and
influencer marketing proven to be quite efficient in this regard. Viewers targeted by firms for digital content
have a high level of digital presence and engagement. The goal of this study, which included 201 respondents
from the millennial generation, was to look at the elements that influence digital content viewing through
influencer marketing. Another goal was to see if the impact of influencer marketing differed between male and
female respondents.

INTRODUCTION
We live in a digital era in which everyone has access to the internet, a medium that connects and informs us all.
The internet allows us to interact, consume content, and get fashion inspiration from online influencers through
digital media, often known as alternative media. The idea of displaying movies, programs, and other
information through the internet originated with the growth of digital media. Furthermore, the rise of digital
platforms enabled marketers to target specific consumers across several channels and mediums. Social media,
which was formerly limited to television, radio, and newspapers, became a new platform for marketers in the
digital era. As a result, Digital entertainment channels devised a strategy to bring attention of viewers to their
products. The quantity of commercials grew in tandem with the development of films and their integration into
the digital media environment (Sundaravel and Elangovan, 2020).
Covid-19 brought people closer to the entertainment industry more than ever. The entourage of gen-Z
specifically indulged in raising the demand for entertainment of OTT platform. Another area where the
engagement of this segment was found high is on social media with influencers. Relating the two variables and
using it in integration is the new strategy formed by many OTT platforms. The efficacy of engagement is rising
as the algorithms and artificial intelligence inculcated in the system of digital social platform is improving the
impact. The dependence of a brand or product on promotion of the same on digital platform is escalating
(Madnani, Fernandes and Madnani, 2020). The initiation of perspective formation is stronger on the digital
platform then advertising. The sponsorship of the product that backs the advertising makes an individual
understand the non-reliability of it. On the contrary reliability on the influencers is elevated due to the present
being more relatable. Influencer marketing is less inclined towards advertising more towards word-of-mouth.
OTT Earnings
It is crucial to understand the revenue model of an entertainment providing digital platform. Every OTT ears
from the engagement of their audience regardless of the fact that whether the OTT is providing its streaming for
free or charging for the same in some manner. Free streaming platforms earn from advertising and premium
charging ones earn from the monthly and annual subscription plus advertising. In order to ensure the
engagement of their viewers these OTT platform advertise and promote their shows in various manner.
Especially the promotion is done through influencers (Bansal and Saini, 2022). Multiple influencers promote
movies and shows in various manner on their personal as well as company channels. Reviews, anticipation,
trailer dissection, information, interviews, prediction and many such information related to offering done by
OTT platforms is done by the influencers. At times many influencers in order to become famous and grow their
channel create similar contents for free (Saha, 2021).
Marketing with Influencers
Influencer marketing occurs when a certain brand or product is referenced in another work, such as a film or
digital content through a social media influencer. To build good associations between viewers and the promoted
brand, product placements are incorporated, referenced, or discussed throughout the broadcast. While it is

656
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

commonly acknowledged that product placement was first used to improve the realism of movie scenes, it has
now grown into a successful marketing tactic in the current day (Lee, 2021). Marketers are resorting to this
popular tactic in favor of traditional advertising, which has been less successful over time. They were able to
break through the clutter and decrease in advertising ratings because to this method (Nagaraj et al., 2021).
The practice of marketing commercial items in digital content through influencer is becoming popular. Viewers
find it more relatable and trust worthy when an influencer they connect with refers it. The psychological
influence on viewers is found higher I comparison to traditional methods. Because of this new advertising
medium, brands and viewers have been able to stand out on a much broader scale. Multiple companies and
start-up products have gotten popular and have increased their sales as this medium of promotion is more
reliable and affordable in the earlier stage. Partnering with influencers for promotion appears to be a more
inexpensive choice than the hefty endorsement fees paid to the new era celebrities (Raja et. al., 2020). This field
has attracted a considerable number of seasoned executives. In exchange for product placement, a brand gives
the influencer a payment based on per view basis. The usefulness of influencer marketing makes branding goes
beyond the brand's visibility on screen.
OTT (Over-The-Top) Platforms
Over-the-top (OTT) video and audio distribution is a way of distributing material over the internet in the form
of live streaming video and audio. Streaming is the process of distributing movies and television shows over the
internet without the requirement for a traditional pay-TV subscription such as Comcast or Time Warner Cable.
Mobile phones were used for entertainment reasons as a result of the internet era, and OTT was established.
Netflix, Amazon Prime, Voot, and Hotstar are just a few examples of platforms that offer numerous sorts of
content (Saha, 2021).
The popularity of binge-watching at home is growing, making it more difficult to recreate a genuine viewing
experience in the lab. When participants are required to remain focused on a stimuli for as long as binge-
watching requires, it creates ethical and intentional issues (Lee et. al. 2022). An OTT (over-the-top) service is
one that distributes content to customers directly over the internet. Streaming media is available as a stand-alone
service through over-the-top media providers. This term's applications include video-on-demand platforms,
audio streaming, messaging services, and internet-based phone calling choices. While OTT services sidestep
traditional media distribution channels such as telecommunications networks and cable television providers, you
may access all of them provided you have a local or mobile internet connection. Some over-the-top (OTT)
services do not need a monthly membership fee, while others do (Kumari, 2020).
REVIEW OF THE LITERATURE
The literature review is one of the most important elements of any research project since it gives the researcher
with the information they need to plan their study. Analyzing previous findings will aid researchers in
identifying research gaps and bolster their decision to pursue a certain study topic. The literature review is
carried out in chronological order, with the study's objectives in mind.
According to (Saima, & Khan, 2020), advertising of web series and over-the-top (OTT) platforms is growing in
popularity, resulting in large audience binge-watching at all hours of the day and night. Babu, 2021 quotes the
reason that influencer marketing is both less expensive and more effective than traditional kinds of advertising,
such as television and radio commercials. Many businesses are adopting influencer marketing in order to target
a younger generation that can relate to the product's quality right away. If the intended audience is not defined,
advertising might be ignored. Because of the booming OTT industry, advertising income is likely to skyrocket.
Influencer marketing assists in gaining awareness for a product or brand, as well as increasing recall value and
brand image.
The following assertions are made by Raja et al.: Both the things, the content promoted and the influencer are
included in product placement to increase brand recall when the content is being viewed. These impacts on the
reliability of the influencer if the brand or content promoted by the influencer is not of claimed quality. The
brand placement allows the viewer to learn about brands and products while the influencer describes or presents
it casually during their content. When it is done in an unobtrusive manner, the product placement or brand
retention for an attentive viewer is higher and stores in sub-conscious rather than the conscious of the viewer.
Viewers often switch channels; advertisements between shows with high TRPs tend to be less effective as they
understand that the slot if advertising is not to be paid attention to. Advertisers now prefer to boost brand
recognition through product placement advertising thorough influencers.

657
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Jilkova, 2018, says that the advent of social media Influencers has had a significant influence on media and
entertainment. It has altered how we produce, distribute, and consume media. Brunei's usage of over-the-top
(OTT) media began to shift rapidly a few years ago. In 2019, the speed with which OTT providers are adapting
to deliver a diverse range of content while establishing an engaging consumer experience increased
dramatically. The availability of alternatives and quick access to information has resulted in a noticeable shift in
consumer behaviour, with binge-watching becoming increasingly popular. As a result, a lot of effort is
expended only to make it appear corny or tacky. OTT platforms make it feasible to target individual viewers
based on their profiles and frequent viewing habits, which enhances customer relations. This also attracted
competition for the platforms. New and upcoming platforms are rising above and beyond imagination (Xiao et.
al., 2018). The viewing habit of the new segment is shifting from big screen to the small portabe screen. To
match up to the shifting pace big production houses, entertainment companies and channels are entering. The
content is also overwhelming in quantity. This is pampering the segment with high viewing choices. This is
where the influencers are needed by the viewers to guide them on where to engage their time. Influencer
marketing is becoming an important tool and medium for the platforms to promote their content on.
To save production expenses, Susan Chang advises using product placement in digital content and shows. Even
when the expense of producing and promoting films and television shows climbs, this core notion remains true.
Multiple business ventures and start-ups are following the approach pertaining to the notion of affordability.
Low research and less time presence in the market causes unpredictability of business methods. Numerous high-
profile product placement failures have happened, resulting in mismatched expectations between manufacturers
and influencers, leading to agreement failures (Bansal and Saini, 2022). Materialization of the conceptual notion
turns highly positive probability only if the ample research is conducted to hold the notion true. This is far from
that stage at present. This study is an attempt to make addition to improve the theory. Research indicates the
work done on the particular topic is not high in quantity.
RESEARCH METHODOLOGY
Each field, whether scientific or not, uses research methodology as a foundation and a staple. The research
process is similar to embarking on a journey. Important judgments must be made here for this voyage, such as
what we need to learn, what should be taken into account, and so on. This research is a descriptive one and here
we want to see the engagement of the viewers varies based on their gender. A popular notion is that female
engagement rate on social media is higher than the male but in case of OTT platform engagement specifically
with influencer marketing is yet to be tested.
The Study's Importance
Influencer marketing has grown in relevance in recent years as advertising and promotion has become a need in
everyone's life, whether they are producers, traders, or customers. It is critical in today's competitive world, as it
aids in the selection of information as well as a specific platform for watching. If the influencers are truly
capable of ascertaining the viewing choices of the viewers or even influence it to some extent. The method of
promoting the OTT services and products should be considered above other promotional tools.
The Study's Objectives
1. To ascertain the factors of influencer marketing that might influence OTT platform viewership.
2. To investigate the impact of gender on the perception of influencer marketing's impact on OTT platform
watching preferences.
Hypothesis
Since the research gap is not filled by any study prior the assumption is null. For this study the researchers
hypothesized that gender will not have any association or impact on the perception of influencer marketing.
Geographical Location of the Sample
Employees' survey in Gurugram has been taken into consideration to meet the study's objectives. A Google Doc
questionnaire was created for the staff to respond to in order to collect data.
Study owing to the researcher's convenience, etc. This method saves time and is convenient. Non-probability
sampling may be unbalanced, biased, and have a wider margin of error since all individuals of the population do
not have an equal chance of being chosen.
Samples Size
The research employed a sample size of 201 people. 250 employees in the IT industry were asked to fill out a
survey. Only 201 of the 250 questionnaires were completed, with 49 of them incomplete because certain
658
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

questions were left unanswered. So far, just 201 replies have been gathered, and the statistical technique has
been applied to them.
Tools
The data for the study was collected using a questionnaire with questions, and the data was analyzed using the
SPSS programme. One of the Study Constraints' restrictions was the time limit. A total of 201 people were used
in this investigation. Better results may be obtained if the sample size is increased. The purpose of this research
was to learn more about the influence of influencer marketing on OTT platform watching preferences. The
objectives and goals of the study must be satisfied. The EFA (Exploratory Factor Analysis) and T-test were
employed to analyse the objectives.
DATA ANALYSIS AND INTERPRETATION

Measure of the construct Factor Eigen Variance α Mean


Loading Value
Influencer’s Credibility 10.475 52.376 .866 3.935
Contest by influencers creates interactive sessions for .742
OTT Content
Casting of influencer in an OTT content influences me .739
to watch it
Trust that the information provided is correct and it .736
influences followers to watch the OTT Content.
Short reels made for promoting the upcoming OTT .735
events influences
Reviews by influencers are helpful in deciding what to .722
watch on OTT
Merchandise related to the OTT Content that is .707
endorsed by the influencer impacts viewing choice
Reaction videos by influencer impacts me to watch the .701
OTT content
Event promotion done by influencers for OTT content .701
influences
Interviews of celebrities by influencers creates impact .662
on viewing choice
Reviews of OTT content by influencers, influences .640
viewing choice
I find it useful that influencers provide information on .613
OTT content as it helps me in deciding what to watch
If influencer on social media has experience on .611
reviewing, I likely follow their advice
Influencers on social media who keep updating their .597
knowledge about OTT-related viewing choices are the
most credible and trustworthy
OTT-related influencers who get higher likes on views .515
are authentic.
Trustworthiness and Content Quality 1.359 6.795 .795 4.156
More followers an OTT related influencers has on .863
social media, more trustworthy I find them
If my favorite influencer recommends an OTT content .815
I’d try it.
Reviews by influencers of an OTT content are more .722
trustworthy than celebrities associated with that
content
I believe that influencers on social media have my best .633
interest at heart
If I found out that a OTT-related influencer had been .585

659
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

paid for posting on social media, it would not


negatively impact their credibility in my mind.
OTT-related influencers on social media will not .514
purposefully endorse a product that will waste my time

Table: 1, Factor Analysis


The first goal of the study is defined in the table above. The study included 20 variables that influenced viewers'
perceptions of the influencers. These variables were culled from a number of influencer marketing studies.
There was no such study that looked at the impact of influencer marketing on OTT viewing preferences. The
factors gathered from the study, as well as a few recommendations made by experts based on the viewer
interviews done by the researcher, aided in the development of a scale. EFA (Exploratory Factor Analysis) has
been used since the scale was reframed.
The results from the application show that the variance explained by the scale is 59.171. This means that the
scale probably requires more work, although the alpha came out satisfactory. For the constructs the value of
alpha 0.866 and 0.795, this means that the reliability of the scale is there. First extracted factor as it can be seen
above has 14 statements in it. This construct is contributing 52.376 of the variance on the Eigen value of 10.475.
The viewers are very much influenced from such influencers that carry a higher credibility to its name. The
credibility is earned by the influencers over a period of time with high mount of followers and higher amount of
likes on their content. The information provided by the influencer on the products and reviews are found to be
true. Such activities over a long period of time help the influencer to gain credibility. Such influencers are more
likely to be approached by the OTT platforms to review and promote their content on their social media handle.
Trustworthiness and content quality is the second construct. In this construct there are 6 variables that have an
Eigen Value of 1.359 and the variance explained is 6.795. The 6 variables indicated that the viewers trust the
social media influencer that is capable of creating quality content. The content quality is based on creativity and
knowledge that the influencers shed in their videos. If the viewers find the content quality to be higher than
others, they trust the influencer instantly. This makes his recommendation strong and this makes him reliable
for the OTT platforms as well to do their promotion.
Table 2: Gender based Independent sample T-Test
Statements Levene p-value Mean
’s Male (128) Female (73)
Value
Influencer’s Equal variance assumed .037
Credibility Equal variance not assumed .049
.167 3.795 4.075
Trustworthine Equal variance assumed .245 4.160 4.142
ss and Equal variance not assumed .274
Content .048
Quality
The second objective of the study was to find out whether there is any impact of gender in forming the
perception. The extracted constructs have been analyzed with the help of independent sample T-test.the
Levene’s value in the first construct is 0.167 which indicated the equality of variance in the construct. Hence the
P-value of equal variance assumed will be noted. The p-value is .037 which signifies the fact that since the
value is lowers than 0.05, the difference in perception regarding the credibility influencer marketing among the
gender is significant. From what it appears is that the female are tend to be little more inclined towards the
influencer marketing than the male segment.
The second construct has Levene’s value lower than 0.05 indicating the unequal variance in the two samples.
The value of p in this construct will be noted for equal variance not assumes. The p-value is 0.274 which shown
the insignificant difference in the two samples. The hypothesis will be rejected on the grounds that the factor
which is an outcome of 14 variables and also has high Eigen value has shown significant difference.
RECOMMENDATIONS
The researcher has pinpointed specific topics for additional study. Influencer marketing is highly utilized tool in
today’s world. The use and importance of it is growing. Research exploring a mere one aspect of it is not
enough. This research shows scope for inclusion of more variables to enrich the same study. Higher sample data
660
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

should be collected and in more than one city or state. The variety of viewership has varied opinions. Research
can also investigate on how an advertising agency sees Influencer Marketing. This way the viewpoint of the
professionals in the area will also come out.
CONCLUSION
Quoting unambiguous viewing choice is inappropriate for OTT platforms, as many respondents accurately
mentioned being influenced by influencers for the choice of content in OTT platforms. The experience of the
movies and ability to easily recall the same is somewhat altered by the influencers. Influencer marketing has
become increasingly important for companies as they have identified the factors which influence followers for
viewing OTT content. For effectively influencing the viewers for ensuring viewing of OTT content, this arrow
in the arsenal of promotion is a must. Product placements or appearance of main leads of OTT content is also
becoming a popular and successful method for creating awareness. OTTs have several options to promote for
increasing the popularity; influencer marketing is rapidly displacing traditional television and creating a new
type of medium.
The study has indicated correctly that now even the respondents have started to understand that influencers on
social media are guiding them to entertainment. The guidance provided by the influencer is also impactful to a
high extent. The reason behind is the trust that has been established over a period of time by the influencer. It is
now important for the companies to acknowledge the power social media influencers hold with them. The study
also proved that female and male are not very much different but females in comparison to males are more
inclined to believe and get influenced by the suggestions and review. Influencer marketing is in its growth stage
as more people and upcoming generations are adopting the platforms.
REFERENCES
 Babu, S. (2021). Influencer Marketing: The Voice of a Media Brand (Doctoral dissertation, Drexel
University).
 Bansal, R., & Saini, S. (2022). Leveraging Role Of Social Media Influencers In Corporate World-An
Overview. Nolegein-Journal of Global Marketing, 5(1), 1-5.
 Jílková, P. (2018, September). Social media influencer marketing in context of event marketing strategy.
In International Scientific Conference of Business Economics Management and Marketing (pp. 115-120).
 KALAN, Ö. Digital Transformation In Marketing: A Sample Review On Kid Influencer Marketing And
Toy Unboxing Videos On Youtube. In Media & Society, 127.
 Kumari, T. (2020). A study on growth of over the top (OTT) video services in India. International Journal
of Latest Research in Humanities and Social Science (IJLRHSS), 3(9), 68-73.
 Lee, E. (2021). The Effect of Social Media Influencer's Parpasocial Interaction and Relationship on Users's
Brand Attitude and Purchase Intention. The Journal of the Korea Contents Association, 21(3), 270-281.
 Lee, S., Song, K., Bae, W., & Choi, J. (2022). Social Network Comparison of Netflix, Disney+, and OCN
on Twitter Using NodeXL. International Journal of Advanced Culture Technology, 10(1), 47-54.
 Madnani, D., Fernandes, S., & Madnani, N. (2020). Analysing the impact of COVID-19 on over-the-top
media platforms in India. International Journal of Pervasive Computing and Communications.
 Nagaraj, S., Singh, S., & Yasa, V. R. (2021). Factors affecting consumers’ willingness to subscribe to over-
the-top (OTT) video streaming services in India. Technology in Society, 65, 101534.
 Raja, D., Thiyagarajan, A., Vasanth, G., & Deepak, J. R. Influencer Marketing On Instagram: An Analysis
On The Perception Of The Influencer’s Credibility By Generation-Z.
 Saha, S. (2021). Consumption Pattern Of Ott Platforms In India. International Journal of Modern
Agriculture, 10(2), 641-655.
 Saima, & Khan, M. A. (2020). Effect of social media influencer marketing on consumers’ purchase
intention and the mediating role of credibility. Journal of Promotion Management, 27(4), 503-523.
 Sundaravel, E., & Elangovan, N. (2020). Emergence and future of Over-the-top (OTT) video services in
India: an analytical research. International Journal of Business, vol. Management and Social Research, 8(2),
489-499.

661
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Xiao, M., Wang, R., & Chan-Olmsted, S. (2018). Factors affecting YouTube influencer marketing
credibility: a heuristic-systematic model. Journal of media business studies, 15(3), 188-213.

AUTHOR DETAILS:
1
DR. RACHIN SURI, 2AMIT KUMAR MANDAL AND 3MANVI KHOSLA
1
Assistant Professor and 2Student, Department of Business Administration, National Institute of Technology,
Kurukshetra
3
Student, School of Business and Management, Queen Mary University

662
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

SYNTHESIS, CHARACTERIZATION AND ANTIMICROBIAL STUDY OF SULFONAMIDE METAL


DRUG COMPLEXES

AMIT KUMAR

ABSTRACT
The Fe, Ru, Pd, Zn and Hg complexes of mixed of sulphonamide were synthesized. The complexes were
characterized using basic investigation, conductivity measurement, infrared, electronic and ESR spectroscopy.
Sulphonamide complexes of coordination of the metal to the ligands is through the nitrogen of the pyrimidine
group and coordination through the nitrogen of the amine group. The antimicrobial activity of the complexes
was carried out against Basillus Subtillus, Staphylococcus Aurus, Escherichia coli, Salmonella typhi,
Aspergillus niger and Penicillium rubrum.
Keywords: Sulfonamides, Synthesis, Complexes, Characterized, Antimicrobial ligands metal

INTRODUCTION
Antibiotic is a compounds or substance which inhibit the growth of bacteria. 1 Tuberculosis is a disease caused
by Mycobacterium tuberculae, a bacteria that is passed from people to people through the air. Combinations of
the drugs are used to treat tuberculosis (TB) which are normal for effective treatment. 2,3 Antituberculosis drugs
are drugs which are used to treat tuberculosis that are available only in tablets, capsules, liquid and injectable
forms.4 Sulfonamides having functional group (R-SO2-NH2) called sulfonamide group are compounds having
potential of antimicrobial activity. They have their familiarity as amide derivatives of sulfonic acid because they
are synthesized by introduction of amino group in sulfonic acid after replacing its hydroxyl group. With
physical appearance of white colour they are feebly acidic and form water soluble salts with bases. Their
sodium salts show PH on higher side and damaging of tissue results from this prominent alkaline behavior,
however there are few exceptions.5 From medical point of view sulfonamides have also another recognition as
sulfa drugs which are used to treat bacterial type infections as antibiotics in both animals as well as human
beings.6, 7 The involvement of agriculture and pharma in enjoying various biological activities of sulfonamides
is also producing significant attraction.8 Sulfonamides are the main functional portion of many structures of
drugs principally because of its stability as well as tolerance in humans.9,10 Sulfa drugs are used for treatment of
gut infections, conjunctivitis, urinary tract infections, in meningitis, eye lotions, bacillary dysentery, malaria.11-13
MATERIAL AND METHODS
The different instruments, techniques, glass wares, solvents, reagents and methods used in the synthesis of
sulfonamide compounds are as follows:
The instruments utilized in the current examinations and the trial subtleties are introduced underneath.
Natural examination: The explanatory information (C, H, N) for the ligands and their metal buildings were
gotten.
Conductance estimations: A Digisun conductivity meter, DI 909 model, with a cell aligned with 0.1M KCl
arrangement was utilized to gauge conductance of the metal buildings in DMF at 10-3M focus.
Infrared spectra: The infrared spectra of the ligands and the metal edifices were recorded in KBr pellets in the
range 4000 – 450cm-1 on Perkin Elmer100 FT-IR spectrophotometer.
Mass spectra: The mass spectra of the ligands were recorded utilizing Agilent 1100 MCD trap-5C Mass
spectrometer.
1H-NMR spectra: The 1H-NMR spectra of the ligands were recorded in DMSO-d6 arrangement utilizing
Bruker avance 300 MHz. The Chemical movements are given in ppm downfield from tetramethylsilane.
Electronic spectra: The electronic spectra of the metal buildings in DMF were recorded on Perkin Elmer UV-
Vis spectrophotometer.
ESR Spectra: WIN-EPR (BRUKER) ESR spectrometer working in the recurrence go 8.8 - 9.6 GHz was
utilized in recording ESR spectra of the all the Cu(II) buildings in DMF at fluid nitrogen temperature.
Attractive weakness estimations: The attractive susceptibilities of the buildings were recorded on a Faraday
balance (CAHN-7550-03) at room temperature utilizing Hg[Co(NCS)4] as the norm. Diamagentic revisions
were applied utilizing Pascal's constants.
663
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Warm information: The TGA-DSC bends of the metal edifices were recorded on SDT Q600 V20.9 Build, at
University.
METHODOLOGY
Synthesis of the Complexes
4-(Furan-2-ylmethylene) aminobenzenesulfonamide [FMABS]:
An answer of 1.72g (0.01mol) of 4-aminobenzenesulfonamide (Merck) broke down in 100 ml of methanol in a
250 ml round base cup, was included with 0.96g (0.01 mol) of furan-2-carbaldehyde (Fluka) . The arrangement
was refluxed on a water shower for 3 hours. The compound isolated was separated and recrystallized from
methanol to give a dark hued strong. Yield (62%), MP:130°C.14
4-(Thiophene-2-ylmethylene) aminobenzenesulfonamide [TMABS]:
To an answer of 1.72g (0.01mol) of 4-aminobenzenesulfonamide (Merck) disintegrated in 100 ml of methanol
in a 250 ml round base cup, 1.22 g (0.01 mol) of thiophene-2-carbaldehyde (Fluka) was included. The
arrangement was refluxed on a water shower for 3 hours. The compound isolated was separated and
recrystallized from methanol to give a light yellow shaded strong. Yield(82%), MP: 140°C.15,16
Antimicrobial Screening Procedure
A grouping of 5 mg/ml of each compound was set up in DMSO that had no impact on the microbial
development.
Bacterial species : The accompanying Gram +ve and Gram – ve culture of human pathogens were utilized to
test the antibacterial movement of the mixes.
Gram + ve : Staphylococcus aureus
Basillus Subtillus
Gram –ve : Salmonell typhi
Escherichia coli
Agar Cup Plate Technique17
A normalized 1 to 2 x 107 cfu/ml 0.5 MC Furland standard was presented onto the outside of a sterile agar plate
and equitably circulated inoculums by utilizing a sterile glass spreader. All the while, 6 mm wells were cut from
the plate utilizing a sterile plug
vigorously at 37 oC. After 24 hrs, the hindrance zones were estimated with a ruler and contrasted and the control
well containing just DMSO and 5 mg/ml of streptomycin as the norm.
RESULTS AND DISCUSSIONS
Considering the significance related with this class of aggravates, the creator has taken to the combination and
portrayal of metal buildings of Schiff bases got from a sulfonamide, carbohydrazide, pyrazinamide and various
aldehydes. The examinations have been reached out by screening the ligands TMABS, and FMABS and a
portion of their metal edifices arranged for organic action. In the present study, 4-aminobenzenesulfonamide has
been condensed with 2-hydroxybenzaldehyde, furan-2-carbaldehyde and thiophene-2-carbaldehyde; pyridine-4-
carbohydrazide with thiophene-2-carbaldehyde and pyrazine-2-carboxamide with thiophene-2 -carbaldehyde
and the accompanying Schiff base ligands acquired and portrayed.
4-((2-Hydroxybenzylidene)amino)benzenesulfonamide(HBABS) (Fig. 1)
4-((Furan-2-ylmethylene)amino)benzenesulfonamide (FMABS) (Fig. 2)

664
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The Fe(III), Ru(III), Co(II), Ni(II), Cu(II), Pd(II), Zn(II), Cd(II) and Hg(II) edifices of these Schiff base ligands
have been readied and basically portrayed based on basic investigation, conductance, warm, attractive and
infrared, electronic and ESR ghostly information. Pertinent ends as for the geometry of the edifices have been
drawn dependent on the information acquired. The work typified in the theory likewise incorporates aftereffects
of fundamental examinations of natural action of the ligands: HBABS and FMABS and their Fe, Ru, Pd, Zn and
Hg edifices against the two-gram positive bacterial strains: Basillus Subtillus, Staphylococcus Aurus and two-
gram negative bacterial strains: Escherichia coli, Salmonella typhi, and two contagious strains: Aspergillus
niger and Penicillium rubrum.
All the ligands are steady at room temperature and are non-hygroscopic. They are insoluble in water, somewhat
dissolvable in methanol and (CH3)2CO and genuinely solvent in hot methanol and dimethylformamide. The
ligands have been portrayed by investigative, mass, 1H NMR and IR ghastly information.
CONCLUSION
The transition metal of Fe, Ru, Pd, Zn and Hg complexes of mixed ligands have been synthesized. The
complexes undergo various characterization using solubility, electric conductivity, melting point, and infrared
Spectroscopy. The ligands form a chelating complex. The new alternative drugs obtained, confirmed that they
are more effective than their parent ligands. The antimicrobial activity of the complexes was carried out against
Basillus Subtillus, Staphylococcus Aurus, Escherichia coli, Salmonella typhi, Aspergillus niger and Penicillium
rubrum. The combined result of the physical andspectroscopic studies confirmed formation of complexes.
REFERENCES
1. Von N. F. Angew. Chem. Int. Ed. 45, 31, 2006 (5072).
2. Menzies, D, Al Jahdali, H, and Al Otaibi, B. The Indian journal of medical research 133, 2011, (257). PMC
3103149.
3. Cornwall, J. The Lancet, 1997 (660).
4. Harries A.D; Hargreaves N.J, Kumwenda J., Kwanjana1 J.H, Salaniponi1 F.M, Int J Tuberc Lung Dis, 11,
2000 (998).
5. Graham, L.P. Medicinal Chemistry 2nd Ed; Oxford Univesity Press, 2001 (377).
6. Yang, G.F. & Yang, II.Z. Chin. ..T. Chem., , 17, 1999 (650).
7. Stranix, B.R.; Lavalle, J.F.; Sevigny, G.; Telle, J.; Perron, V.; Leberre, N.; Harbart, D. & Wu, J., J. Bioorg.
Med. Chem. Lett., 6, 2004 (3459).
8. Satoker, R.S., Pharmacology & Pharmacotherpeutics., Mumbai popular foundation. 2002, (628).
9. Joel, G.H. & Lee, E.L., The Pharmacological Basis of Therapeutics. 10th Ed. McGraw Hill, 2001, (1172).
10. Evans, B.E.; Rittle, K.E.; Bock, M.G.; DiPardo, R.M.; Freidinger, R.M.; Whitter, W.L.; Lundell, G.F.;
Veber, D.F.; Anderson, P.S.; Chang, R.S.; Lotti, V.J.; Cerino, D.J.; Chen, T.B.; Kling, P.J.; Kunkerl, K.A.;
Springer, J.P. & Hirshfield, J., J. Med. Chem., , 31, 1988 (2235).
11. Supuran, C.T.; Casini, A.; Mastrolorenzo, A. & Scozzafava, A., Mini Rev. Med. Chen., 4, 2004 (625).
12. Patel, H.S. & Mistry, H.J., Phosphorus, Sulfur, & Silicon Relat. Elem., 179, 2004, (1085).
13. Selvam, P.; Smee, D.F.; Gowen, B.B.; Day, C.W.; Barnard, D.L. & Money, J. D., AntiviralRes., 74, 2007
(81).
14. Huang, J.L., Wang H.Y., and Tian X.Y., Polym. J., Sci. Part A: Polym.Chem, 34, 1933 (1996).
15. Huang J.L., Chen, .S, Tan L.S., and Wang H.Y., Science in China ( Series B), 41, 1998 (55).
16. Chen, S., Huang Z.H., and Huang, J.L., Eur.J. Polym. 36, 2000 (1703).
17. Desta, B., J. Ethnopharmacol., 100, 2005 (168).

AUTHOR DETAILS:
AMIT KUMAR*
P. G Department of Chemistry, Magadh University Bodh Gaya, Bihar

665
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

MODERN JUDICIAL INSTITUTION IN ARUNACHAL PRADESH: THE COURT

ROBIN HISSANG

ORIGIN OF MODERN JUDICIAL INSTITUTION IN INDIA


India is a land of diversified culture, local customs and various conventions which are not in opposition to the
statue or ethics. People of different religions as well as traditions are regulated by all the different sets of
personal laws in order to relate to society and family affairs. The main sources of modern judicial institution are
Indian Constitution, customary law (unwritten laws, conventions, oral tradition, oral literature, folklores,
folktales etc.) case laws, and statutes (legislation). Among these, the statutes are operated by the Parliament,
union territory legislatures and state legislatures. There are mainly two categories under which the Indian legal
system operates viz. Indian Civil Law and Criminal Law.
The Constitution of India is the fountainhead of the Indian Legal System. It demonstrates the Anglo‐Saxon
character of judiciary which is basically drawn from the British Legal System because of the long period of
British colonial influence during the British Raj. There is a single hierarchy of courts in India. Various acts and
ordinances first introduced by the British are still in effect in modified form today.
Courts Structure
The India has a quasi‐federal structure and judicial system however has a unified structure. The Supreme Court,
the High Courts and the lower Courts constitute a single Judiciary. Broadly there is a three ‐ tier division.
Each District has a District Court and each State a High Court. The Supreme Court of India is the Apex Court.
Each State has its own laws constituting Courts subordinate to the District Courts. Besides, a number of
judicial Tribunals have been set up in specialized areas.
Supreme Court
The Supreme Court is the highest and apex court of the India and union judiciary. At present, the Supreme
Court consists of the thirty one judges (one chief justice & thirty other judges) and the chief Justice is appointed
by the President after consultation with such judges of the Supreme Court & high courts as he deems necessary.
The other judges are appointed by President after consultation with the Chief Justice & such other judges of the
Supreme Court & the high courts as he deems necessary. The consultation with the Chief Justice is of obligatory
in the case of appointment of a judge other than Chief Justice.
High Court
Every State has a High Court, which works under the direct guidance and supervision of the Supreme Court of
India, and is the uppermost court in that state, and generally the last court of regular appeals. Though generally
the High Courts are only the courts of Appeal, however in the three presidency towns The High Courts are also
termed as the courts of equity, and can be approached in writs not only for violation of fundamental rights under
the provisions of Article 32 of the Indian constitution, but also for any other rights under Article 226 of the
Constitution, and under its powers to supervise over all its subordinate courts falling within the physical
jurisdiction of the same under Article 227 of the Constitution.
Organisation of High Court
(a) Every high court (whether exclusive or common) consists of a chief justice & such other judges as the
President may from time to time deem necessary to appoint. Thus, the constitution does not specify the
strength of a high court of leaves it to the discretion of the President. Accordingly, the President determines
the strength of a high court from time to time depending upon its workload. The Chief Justice is appointed
by the President after consultation with the Chief Justice of India & the governor of the state concerned. For
appointment of other judges, the Chief Justice of the concerned high court is also consulted. In case of a
common high court for two or more states, the governors of all the states concerned are consulted by the
President. The salaries, allowances, privileges, leave & pension of the judges of a high court are determined
from time to time by the Parliament.
Session Court and Session Judge
Each state is divided into judicial districts presided over by a ʹDistrict and Sessions Judgeʹ. He is known as a
District Judge when he presides over a civil case, and a Sessions Judge when he presides over a criminal case.
He is the highest judicial authority below a High Court judge.

666
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

These courts are primarily Criminal Courts, with jurisdiction to revise the orders from the subordinate
magistrates as well as to try serious offences, as prescribed by law.
District Court
There are courts of civil jurisdiction which is known by different names in different states. These courts are
primarily Civil Courts to hear generally the appeals from the courts of original civil jurisdiction in the Districts
and Tehsils (Talukas) level which is known as district court. But, these courts have also been given original
civil jurisdiction under many enactments.
Establishment of Permanent Bench at Itanagar
The President of India, His Excellency Shri K.R. Narayanan vide order dated July 18, 2000 had notified the
establishment of a Permanent Bench of the Gauhati High Court at Itanagar and such Judges of the Gauhati High
Court, being not less than one in number, as the Chief Justice of that High Court may, from time to time
nominate, shall sit at Itanagar in order to exercise the jurisdiction and powers for the time being vested in the
Gauhati High Court in respect of cases arising in the State of Arunachal Pradesh. Provided that the Chief Justice
of that High Court may, in his discretion, order that any case or class of cases arising in the State of Arunachal
Pradesh shall be heard at Guwahat i.The Gauhati High Court (Establishment of a Permanent Bench at Itanagar)
order, 2000 came into force on the 12th day of August, 2000. On this auspicious day the Hon’ble Chief Justice
of the Supreme Court of India, Dr. A.S. Anand was pleased to inaugurate the Itanagar Permanent Bench of the
Gauhati High Court at Naharlagun (located in a picturesque location about 13Kms. From the Capital town, in
presence of His Excellency Shri Arvind Dave, Governor of Arunachal Pradesh, Shri Mukut Mithi, Chief
Minister of Arunachal Pradesh, Hon’ble Mr. Justice S.N. Phukan of the Supreme Court of India, who
subsequently inaugurated the Itanagar High Court Bar and Hon’ble Mr. Justice Brijesh Kumar, Chief Justice of
the Gauhati High Court (later on elevated as a Judges of the Supreme Court) and his Lordship’s companion
Judges as well as other eminent dignitaries present there to mark the occasion in a befitting manner. Indeed the
12th day of August, 2000 was a red-letter day in the history of Arunachal Pradesh so far as the functioning of
the Highest Judiciary in the State with a population of ten lakh people was concerned. The Hon’ble Mr. Justice
S.N. Phukan, Judge, Supreme Court of India was pleased to release the cause list of the first working day of the
Itanagar Permanent Bench and inaugurated the High Court Bar Building. The Hon’ble Mr. Justice N.C. Jain
(since retired as the Chief Justice of the Gauhati High Court) held the Court at 10:30 A.M. on August 14, 2000
(Monday). Thev present strucrtural position of modern judicial institution is shown in table no.1.
Table-1
NAME OF THE COURT AND JURIDICTION IN ARUNACHAL PRADESH
Sl. No. NAME OF THE COURT JURIDICTION
1. District & Session Court, Yupia Papam Pare, Lower Subansiri and Kurung Kumey Districts.
2. District & Session Court, Tezu Lohit, Changlang, Tirap, Longding, Anjaw, Dibang Valley
and Lower Dibang Valley Districts.
3. District & Session Court, Basar West Siang and Upper Subansiri Districts
4. District & Session Court, Bomdila Tawang, East Kameng and West Kameng District.
5. District & Session Court, Pasighat East Siang and Upper Siang Districts.
After separation of judiciary from executive, the regular modern judicial institution in Arunachal Pradesh is
functioning effectively.
BIBLIOGRAPHY
PRIMARY SOURCES
GOVERNMENT AND NGOS OFFICIAL DOCUMENTS
 Government of Arunachal Pradesh, Department of Law and Judicial, Itanagar Notification 16/02/2012
 Government of Arunachal of Arunachal Pradesh, Gazette Extraordinary Notification dated 4th December
2006
 The Legal Services Authorities Act, 1987
 The Arunachal Pradesh Code Volume- I and III, 1982. Law and Judicial Department, Government of
Arunachal, Itanagar.
 The Arunachal Pradesh Code Volume-VIII, 2003 Law and Judicial Department, Government of Arunachal
Pradesh, Itanagar.
667
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 The Assam Frontier (Administration of Justice) Regulation, 1945 Amendment Act, 2005 (Act No.1 of
2005),
 Government of Arunachal Pradesh, Department of Law and Judicial, Itanagar Notification, dated 2 nd
August 2012,
 Government of Arunachal Pradesh Department of Law and Judicial Itanagr Notification dated 6 th January
2014
 Department of District Administration Arunachal Pradesh Civil Secretariat Itanagar,
 Handbook for Gaon Buras & Panchayati Leaders,
SECONDARY SOURCES
BOOKS
 Appleby, Paul,(1949), Policy and Administration, University of Alapbama Press, Syracuse, New York,
 Awasthy, S.S.(199), Indian Government and Politics, Har-Anand, New Delhi,
 Barber, R. Benjamin, (1984), Strong Democracy, Participating Politics for a New Age, University of
California Press, London, England.
 Barua, Alokesh, (edited),(2005), India’s North-East Developmental Issues in a Historical Perspective,
Manohar Publishers and Distributors, New Delhi,
 Billorey, R.K. (2000), Oral History in North East India, In Studies in the History, Economy and Culture of
Arunachal Pradesh, edited by S. Dutta, Himalayan Publishers, Itanagar,
 Bose, M.L. (1977), History of Arunachal Pradesh, Concept Publication, New Delhi,
 Kholey, R.N. (2017), Understanding Arunachal Pradesh, Director of Research Government of Arunachal
Pradesh, Itanagar,
 Chakravarty, L.N. (second edition),(1995), Glimpses of the Early History of Arunachal, Director of
Research, Government of Arunachal Pradesh
 Chaudary, J.N.(1979), Arunachal Panorama, Directorate of Research, Itanagar, Arunachal Pradesh,
 Dubey, Sanjay, (1991), Dynamics of Tribal Local Polity and Panchayati Raj in Arunachal Pradesh,
Premier Publishing House, New Delhi.
 Dutta, Basudeb Ray and Kumar, Ashok Ray (edited), (2006), Dynamics of Power Relations in Tribal
Societies of North-East India, Om Publications, New Delhi.
 Dutta, S. (2000), Studies in the History, Economy and Culture of Arunachal Pradesh, (revised eds.)
Himalayan Publishers, Itanagar.
 Elwin, Verrier, (1958), Myths of the North-East Frontier of India, Shillong.
 (1959), India’s North-East Frontier in Nineteen Century, Oxford University Press, Bombay.
 (1959), The Art of the North East Frontier of India, Shillong.
 (1965), Democracy in NEFA, Shillong.
 Elwin, Verrier, (1971), Democracy in NEFA, Shillong.
 Furer-Humendorf, C.Von, (1952), Himalayan Barbary, London.
 (1982), Highlanders of Arunachal, New Delhi.
 (1980), A Himalayan Tribe-from Cattle to Cash, New Delhi.
 Grewal, D.S. (1997), The Tribes of Arunachal Pradesh, Vol.2, South Asia Publications, Delhi.
 Joyal, Niraja, Gopal, et al. (2006), Local Governance in India, Decentralization and Beyond, Oxford
University Press, New Delhi.
 Kani, T. (1993), The Advancing Apatanis of Arunachal Pradesh, Himalayan Publications, Itanagar.
668
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Lasa, Hage, et al. (1996), The History of North-East India (1603-1947), Bani Mandir Publication,
Pashighat, Arunachal Pradesh.

AUTHOR DETAILS:
ROBIN HISSANG
Ph.D Scholar, Department of Political Science, RGU Doimukh, Itanagar

669
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

USES OF SOCIAL MEDIA AMONG STUDENTS PURSUING HIGHER EDUCATION IN UTTAR


PRADESH

CHHAYA BJAPAI AND DR. SITA DEVI

ABSTRACT
Social networking sites are not only popular for providing a platform for chatting, sharing scraps, videos,
pictures etc. but also for discussing social issues. Social networking phenomenon has emerged over the past ten
to fifteen years. In that time, social networking sites have grown from a niche to a mass online activity, in which
tens of millions of internet users are engaged, both in their leisure time, and at work. However, there has been
very little research on the socio-economic impact of these sites in the Indian context. The impact of social
networking sites on the youth of India has been both positive as well as negative. Social networking is a
phenomenon which has existed since society began. Internet medium is developing with the increased usage and
understanding of how to use email, could shop online, and search the web for recipes or the long- lost
instruction manual for a piece of equipment in the garage, etc. Now, internet is more about blogs, podcasts,
Facebook, Myspace, and Orkut. These are some of the tools and technology associated with a recent
phenomenon called social networking and is present everywhere. Present paper purports to examine the uses of
social media among the students pursuing higher education in Uttar Pradesh. The paper is based on mainly
primary data collected through field survey in city of Lucknow.

INTRODUCTION
The use of information technology in society and particularly educational institutions has become the fashion
today. It has proved to be the most effective mode and delivery mechanism. The educational programmes
highlight on the new models, approaches and modes for developing educational contents, conducting of
programmes, and delivery of educational inputs. Besides, effective use of technology in education sector has
widened the scope and nature of institutions with cost effective mechanism of administration, monitoring and
evaluation of performance. Even, use of ICTs in education sector has improved the quality of education and
more accessible to the target population. The application of information technoologies in education system has
become common now days The use of ICTs in the higher education system has been also encouraged in the
New Education Policy while COVID-19 pandemic has forced educational institutions to think beyond
traditional boundaries of education .Thus, online mode of teaching, training and sessions of seminar ,
examinations, and via voice are being conducted. This may depend upon various factors including existence of
ICT equipped labs, workshops, classroom and library; student&#39;s their background, nature of subject etc.
The e learning process is gaining importance.
In view of the improving quality and outreach of higher education in India, ICTs have brought significant
changes in teaching and learning . The traditional mode of teaching and learning are being replaced by the wider
applications of ICTs. On line and virtual teaching mode is gaining importance in the context of COVID-19
pandemic. There are enormous opportunities for conducting virtual classes, teaching and training programmes
with wider outreach and accessibility during the pandemic. The effective use of ICTs in higher education
institutions has ensured the greater success and outcomes in the nominal cost and investment. Even ,
development of education contents , and delivery of education services are found more effective through the use
of ICTs . The students are taking more interest in learning innovative and lucrative educational contents as
audio video mode make more attraction to them. The use of information technologies also makes teachers and
trainers competent to play crucial role in the educational development and social transformation. The
administrators of higher education institutions find more convenient in administration of higher education
services such as admissions, conduct of classes, examinations, evaluations of copies, conducting via voice, and
closer and wider interactions with students as well as faculty meetings through use of ICTs and digital platforms
. It makes them more transparent, with nominal cost and time. The use of information technologies in higher
education institutions has positive impact on teaching, learning and research. Use of internet has widened the
scope of search of information, data, and pertinent literature besides wider use of statistical and scientific tools
in research. It also ensures timely updating, retrieve and access of information and its accessibility to the
students and teachers.
Social networking sites are not only popular for providing a platform for chatting, sharing scraps, videos,
pictures etc. but also for discussing social issues. Social networking phenomenon has emerged over the past ten
670
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

to fifteen years. In that time, social networking sites have grown from a niche to a mass online activity, in which
tens of millions of internet users are engaged, both in their leisure time, and at work. However, there has been
very little research on the socio-economic impact of these sites in the Indian context. The impact of social
networking sites on the youth of India has been both positive as well as negative. Social networking is a
phenomenon which has existed since society began. Internet medium is developing with the increased usage
and understanding of how to use email, could shop online, and search the web for recipes or the long- lost
instruction manual for a piece of equipment in the garage, etc. Now, internet is more about blogs, podcasts,
Facebook, Myspace, and Orkut. These are some of the tools and technology associated with a recent
phenomenon called social networking and is present everywhere
The young and youth are using social media networks not only interpersonal communication but social media
sites have emerged as most effective tool for learning, knowledge sharing and education. In the context of
Covid-19, the way and methods of teaching and learning in educational institutions from primary stage to higher
education have replaced traditional approaches towards ICT. Social networking sites, IT platforms and other
ICT tools are gaining momentum for effective information dissemination, knowledge sharing, learning and
teaching. Even educational and training institutions are organizing online classes, training sessions, webinars
and other academic sessions. This has widened the scope of international collaboration, vast networking, wider
interaction and knowledge sharing. Thus, government has also promoting ICT use in educational institutions
and providing basic infrastructure for online teaching and learning. The growth of social networking sites shows
a significant change in the social and personal behavior of Internet users. Social networking sites have become
an essential medium of communication and entertainment among the young adults. Though it has started to
affect the daily activities of normal human beings, the popularity of social networking sites is not going to
reduce in near future. Everything in this world can be used for a bad purpose as well as for good. The rise of
social networking sites connect people in new ways and enable them to empathize with each other online.
Moreover, the growth of social networks sites in Indian society show a significant change in the social and
personal behavior of adolescents. Even though these sites help adolescents to publicize their personal
information, it also encourages them to overstate various aspects of their lives. However, these positive, aspects
are not without associated risks such as identity theft and cyber blackmailing. Other adverse effects on
adolescents are mood swings, attention deficits at school and addiction. Moreover, these sites serve as a
platform for the adolescents to engage in some deviant acts. People can hide their real identities on social
networking sites and can play with emotions and feelings. They display their best on these social networking
sites creating a false sense of perfection. Social networking sites have also given rise to cyber crime. The crime
has become easy, anonymous and effective on social networking sites. Emergence of cyber crime in network
society has become a concern for researchers and thinkers all over the world. It is essential to analyze various
studies and works undertaken in this area
REVIEW OF LITERATURE
Abbas and Singh (2014) opined that media industry in 2014 has moved away from traditional print and audio-
visual domination and into the digital age with smart phones being the key to ushering in innovative technology,
creativity and high-speed communication. Manjunath (2013) said that the usage of Social Networking Sites
(SNS) has significantly increased in India particularly among the Indian college students and it certainly has far
reaching impacts on the academic and other activities of the students. Kavita (2015) has highlighted that in the
last few years, social network media have spread widely all over the world and are used by various users for
several reasons and purpose. Jain (2017) has highlighted that social media is considered as ultimate tool of
marketing communication. It connects with online arena and spread the information of products and services.
Ahmed (2011) opined that social network offers people great convenience for social networking. It allows
people to keep in touch with friends, reconnect with old friends, meet new people, and even conduct business
online. The social network is rising not even in India, all over the World. Deshmukh et.al (2014) opined that
online social networking has achieved an exceptional global growth over the last decade by attracting much
attention from all age group people. It is a known fact that young adults and teenagers are the most avid users of
such sites. Jothi et.al (2011) highlighted that Internet is the emerging information technology with the
credibility of immediacy and fastness, thus, it brings globalization in every aspects of communication.
Communication through internet is more specified, with effective interactive strategy among its users. In recent
days, internet advertising has taken new forms which have more advantages over the traditional mediums like
print media, television and radio. Marketing communication is becoming precise, personal, interesting,
interactive and social. Different strategies of communication are followed in various social networking sites like
Face book, Twitter and Orkut. Bhagwat and Gautam (2013) said that social networks are groups of people, or
communities, who share a common interest, perspective, or background. Mathew (2013) opined that the period
671
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

of 2010 to 2013 has been an eventful period for social media. Several new networking sites became popular
(WhatsApp, Google Plus, Instagram), the usage base grew by leaps and bounds, and Facebook bought over
some of its competition. The growth of social media along with the rapid growth of smart phone usage has also
made a great impact on various facets of our lives. Siddiqui and Singh (2013) highlighted that Social media
plays a vital role in transforming people’s life style. Social media includes social networking sites and blogs
where people can easily connect with each other. Since the emergence of these social networking sites like
Twitter and Facebook as key tools for news, journalists and their organizations have performed a high-wire act.
Bhardwaj et. al (2017) highlighted that the extensive use of Social Networking in India has been on the rise
among the new generation youths. In today's world, life cannot be imagined without Facebook, YouTube,
Instagram, WhatsApp, LinkedIn or Twitter accounts and online handles. Isodje (2014) presented an overview
on the use of social media for business promotion, since social media as an online collaborative platform has the
power to impact cultures and business. Mamta et al. (2016) tested for affiliation that exists between Higher
Education and Social Networking Site. Purva et al. (2015) presented that online social networking like
Facebook and Twitter have the fastest means of communication and having gained wide popularity, have
revolutionized interpersonal communications by providing a platform to individuals for expressing themselves
at a global level, beyond their immediate geography. Davmane et al. (2015) analyzed the factors for the online
social networking sites as per users’ behavior regarding user friends, the peer groups, access patterns, amount of
time spend, the effect on personal and professional life. Singh et al. (2014) presented the research effort in
ensuring awareness about the social networking site concept, merits, demerits and meaning. Purti at al. (2016)
focused on Big Data Management for Social Networking Sites by review and analysis of how Big Data is being
managed for social networking sites by Facebook and Twitter. Kumar et al. (2016) proposed a sentiment
analysis method on the tweets in Cloud environment and utilized Hadoop for intelligent analysis and storage of
big data on Facebook and Twitter. The reason is that handling huge amount of unstructured data is a tedious
task to take up. The current Analytics tool and models used that are available in the market are not sufficient to
manage big data. Mittal et al. (2016) analyzed the effects of online shared sentiments of emoticons, interjections
and comments extracted from posts and status updates. Shang et al. (2015) investigated why and how people
use location sharing services on social networking platforms in China. Muhammed et al. (2017) reviewed
research papers from 2010 to 2016 on Sybil attacks regarding use of fake and malicious identities on the online
social network. Zhou et al. (2017) proposed a unique system called Pro Guard for detecting malicious identity
accounts in financial institutions dealing online with real and virtual currency. Kiliroor et al. (2017) presented a
trust analysis system for online social networks to improve privacy and approval process for authentic social
network site users. Wang et al. (2016) proposed use of a probabilistic model for detecting identity thefts on
social networking when using mobiles over unsecure Internet. Baruah (2012) highlighted that social media can
be effective for building social authority; individuals or organizations can establish themselves as experts in
their fields, and then they can begin to influence these fields. Jain and Gupta (2012) opined that social
networking sites provide a platform for discussion on such issues as it is this media which majority mass rely on
and extend warm support. Parvathi and Suchitra (2015) have made detailed analysis of what activities the youth
population involved with social networking sites. Sarkar et. al. (2015) opined that social networks have
undergone an intense evolution in recent years.
OBJECTIVES AND METHODS
 To study the mode, usage and timings of engagement of students in social media ;
 To examine the attitudinal change among the students regarding information technology and social media,
social networking sites and interpersonal relationships.
The present paper is based on a major research study. The study is empirical in nature and based on mainly
primary data collected through field survey. Lucknow city has been selected in the study. Overall, about 500
students pursuing different courses from higher education institutions were surveyed with the help of structured
interview schedule.
DISCUSSION OF RESULTS
Most of the respondents reported that they have opened their account on whatsApp, face book and youtube.
About half of the respondents further reported that they have opened their account on twitter while about more
than 1/4th respondents had their accounts in skype and LinkedIn. About 3/4th respondents revealed that they are
associated with less than 10 social networking sites. However, about 1/3rd undergraduate respondents were
found assonated with 10-20 social networking sites (Chart1).

672
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Chart 1: How Many Social Networking Sites You Are Associated With

80.00% 74.20%

70.00%

60.00%

50.00%

40.00%

30.00%
20.20%
20.00%

10.00% 3.20% 1.80%


0.60%
0.00%
1 10 10 20 20-30 30-40 50 +
Associated With

More than 3/4th respondents revealed that they are getting access of their social networking accounts through
use of smart phone. About 20 per cent respondents revealed that they get access to their social networking
account through their lap top. However, a higher proporiton of research scholars revealed that they get access to
their social networking accounts through their personel computers and lap top (Chart 2).
Chart 2: How Do You Access Your Social Networking Account
77.60%
80.00%

70.00%

60.00%

50.00%

40.00%

30.00% 21.00%
20.00%
7.00%
10.00% 1.60%
0.00%
Personal Laptop Ipod/Ipad Smart Phone
Computer
Networking Account

About 1/4th respondents reported that they are using social networking sites for less than one year. It was found
more pronouncing among the undergraduates and research scholars. About 1/3rd respondents reported that they
using social networking sites from 1-3 years. It was found more pronouncing among postgraduate respondents
(38.9 per cent). Thus, about 2/5th respondents were found using social networking sites for more than 3 years. It
was found more pronouncing among the graduates followed by diploma holders (Chart 3).
Chart 3: How Long You Are Using Social Networking Sites

35.00% 32.00%

30.00% 26.80%

25.00%
20.00% 16.60% 15.40%
15.00%
9.20%
10.00%
5.00%
0.00%
Less Than 6 6-12 Months 1-3 Year 3-5 Year 5 Year +
Months
Networking Sites

673
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

About 2/5th respondents reported that on an average they spend 1-2 hours daily on social networking sites. It
was found more pronouncing among the undergraduates (52.7 per cent) followed by research scholars (38.3 per
cent). About 1/3rd respondents further reported that they are spending 2-5 hours daily on social netowkring sites.
It was found more pronouncing among the graduates (46.5 per cent) followed by diploma holders (40 per cent) (
Chart 4).
Chart 4: On an Average How Much Time Do You Spend Daily On Social Networking Sites

39.60%
40.00%
35.00% 32.20%

30.00%
25.00%
20.00%
14.40% 13.80%
15.00%
10.00%
5.00%
0.00%
Less Than 1 Hour 1-2 Hours 3-5 Hours More Than 5
Hours
How Much Time

About 61 per cent respondents reported that they have more than 50 contacts / friends on their social networking
sites. It was found more pronouncing among diploma holders (85 per cent) followed by postgraduates (66 per
cent). About 28 per cent respondents reported that they have less than 30 contacts on their social networking
sites (Chart 5) .
Chart 5: How Many Contacts/Friends Do You Have On Social Networking Sites

70.00%
60.80%
60.00%

50.00%

40.00%

30.00%

20.00%
11.60% 9.60%
7.20% 6.60%
10.00% 4.20%

0.00%
Less Than 10 -20 20-30 30-40 40-50 50 And
10 Above
Contacts/Friends

The respondents were asked that how they use online social networking. Information search, keep in touch with
family and friends, making new friends, sharing videos/ pictures and movies, making professional and business
contacts and sharing experience of some of the main uses of online social networking. About 47 per cent
respondents reported that online networking somewhat effect face to face communication. It was found more
pronouncing among research scholars (66 per cent) followed by undergraduates (62.6 per cent). About 1/3 rd
respondents revealed that online networking does not affect face to face communication. However, about 22 per
cent respondents admitted that online networking has replaced mostly face to face communication. It was found
more pronouncing among the diploma holders (85 per cen) followed by graduates (25.6 per cent). About 90 per
cent respondents were found agreed and strongly agreed on the view point that social media has replaced
traditional mode of communication. However, a higher proportion of graduate and postgraduate respondents
were against the view point (Chart 6). ).
674
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Chart: 6: Whether Social Media Has Replaced Traditional Mode of Communication


56.20%
60.00%

50.00%

40.00% 34.20%

30.00%

20.00%
7.40%
10.00% 2.20%

0.00%
Strongly Agree Agree Do Not Agree Strongly
Disagreed
Replaced Traditional Mode of Communication

About 87 per cent respondents were found agreed and strongly agreed on the view point that social networking
is effective for e-learning and educational development. However, about 15 per cent postgraduate respondents
and a significant proportion of under graduate and graduate respondents were against the view point. . About
2/3rd respondents admitted that their parents support them for using social networking sites. However, about half
of graduate respondents and more than 2/5th research scholars were against the view point.
CONCLUSION
Social media plays a vital role in transforming people’s life style. Social media includes social networking sites
and blogs where people can easily connect with each other. Social Networking involves the use of the internet
to connect users with their friends, family and acquaintances. Social Networking websites are not necessarily
about meeting new people online, although this does happen. Instead, they are primarily about connecting with
friends, family and acquaintances you already have in real life. These sites allow you to share photos, videos
and information, organize event chat download music and even play games like Scrabble, Chess online. Often
each of your friends, family or acquaintances will be friends with several other friends. Just like in real life, the
connections between people aren’t just one-on-one but a network of connections. This online social networking
is very useful in spreading information, pictures and videos. Internet use has grown considerably in the last
decade. Social media is influencing every walk of life including social relations, society, politics, economics
and business. The technological deterministic view presents the internet as an innovative force that has
profound influence on children and youth; technology generates new patterns of expression, communication,
and motivation. The social media like Blogs, LinkedIn, facebook, twitter, Skype, etc. are playing a very
important role in consumer buying behavior, decision making process directly and indirectly. In recent trend of
innovation in management and marketing social media become powerful and cost effective approach to promote
products to consumer. The social media has affected every walk of life and youth are also not um –affected.
Their communication, way of life and social relations have widely affected by social mead.
REFERENCES
 Abbas, Shirin and A. K. Singh (2014) Media Industry Trends and Dynamics: The Social Media
Boom Social and Behavioural Sciences, 155
 Ahmad, Ateeq (2011) A Short Description of Social Networking Websites and Its Uses
,International Journal of Advanced Computer Science and Applications, Vol. 2, No.2, February
 Baruah, Trisha Dowerah (2012) Effectiveness of social Media as a Tool of Communication and
its potential for technology enabled connections, International Journal of Scientific and
Research Publications, Volume 2, Issue 5, May
 Bhagwat, S and Gautam , A (2013) Development of Social Networking Sites and Their Role in
Business with Special Reference to Facebook, Journal of Business and Management, Volume 6,
Issue 5
 Bhardwaj A, et. al (2017) Impact of Social Networking on Indian Youth - A Survey International
Journal of Electronics and Information Engineering, Vol.7, No.1
 Deshmukh, Pooja et. al (2014) An Impact Of Social Networking Sites On Youngsters,
International Journal of Management , Volume 5, Issue 12, December
 Devmane, M, and N. Rana,(2015) Usability Trends and Access of Online Social Network by
Indian population and its analysis," in International Conference on Nascent Technologies in the
Engineering Field
675
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Isodje, A, (2014) The use of Social Media for Business Promotion," in International Conference
on Emerging & Sustainable Technologies for Power & ICT in a developing society,
 Jain , M. R and Gupta , P ( 2012) Impact Of Social Networking Sites In The Changing Mindset
Of Youth On Social Issues A Study Of Delhi-NCR Youth, Research World Journal of Arts
,Science and Commerce, Vol3, Issue 2
 Jain , S (2017) Study of Social Media Impact On Indian Scenario, Asia Pacific Journal,
 Joshi, P. S. et. Al (2011) Analysis of social networking sites: A study on effective communication
strategy in developing brand communication, Journal of Media and Communication Studies Vol.
3(7),
 Kavitha (2015) The Influence Of Social Media On Indian Students and Teenagers, International
Journal of Advance Research In Science And Engineering, Vol. No.4, Special Issue (01), April
 Kiliroor, C. C. and C. Valliyammai, (2017) Trust analysis on social networks for identifying
authenticated users," in IEEE 8th International Conference on Advanced Computing
 Kumar, Senthil N et al (2015) On Privacy and Security in Social Media – A Comprehensive Study,
presented in International Conference on Information Security & Privacy 11-12 December 2015, Nagpur,
India
 Manjunatha S. (2013) The Usage of Social Networking sites Among the College Students in India
,International Research Journal of Social Sciences, Vol. 2(5), 15-21, May
 Mathews , S. P and George, S ( 2013) Growth and Future of Social Media, International Journal
of Advanced Research in Computer Engineering & Technology, Volume 2, Issue 12, December
 Mittal, S A. Goel, R. Jain, (2016) Sentiment analysis of E-commerce and social networking
sites," in 3rd International Conference on Computing for Sustainable Global Development
(INDIACom'16),
 Mohamed, Haneefa K. and Sumitha, K.( 2011) “Perception and Use of Social Networking Sites by the
Students of Calicut University”. DESIDOC Journal of Library and Information Technology, 31, 4; 295-301
 Parvathi, J and Suchitra, R (2015)Impact of Usage of Social Networking Sites on Youth,
International Journal of Computer Applications ,Volume 129 – No.3, November
 Purti , B . et. al (2015) Comparative Analysis Of Big Data Management For Social Networking Sites,
presented in Third International Conference on Computing for Sustainable Global Development , 16-18
March , IEEE Access, New Delhi
 Purva, P. et. al. (2015) How Has Twitter Changed the Event Discussion Scenario? A Spatio-
temporal Di_usion Analysis," in International Congress on Big Data (Big Data Congress'15),
IEEE
 Sarkar , Anurag et. al (2015) Impacts of Social Networks: A Comprehensive Study on Positive
and Negative Effects on Different Age Groups in a Society, International Journal of Advance
Research in Computer Science and Management Studies, Volume 3, Issue 5, May 2015
 Shang S. C et. al (2015) Generating Consumer Resonance for Purchase Intention on Social Network Sites,
Computer in Human Behavior, Vo.69
 Siddiqui, S and Singh, S (2016) Social Media its Impact with Positive and Negative Aspects,
International Journal of Computer Applications Technology and Research ,Volume 5– Issue 2,
 Singh, K. P. and Gill, Malkeet Singh. 2011. “Use of Social Networking Sites By The Research Scholar; A
Study of Guru Nanak Deve University, Amritsar”. Library Herald, 49, 3; 229- 241.
 Wang, C. and Bo Yang, J. Luo,(2017) Identity Theft Detection in Mobile Social Networks Using
Behavioral Semantics," in IEEE International Conference on Smart Computing
 Zhou, Y. at. al (2017) Accounts in Social-Network-Based Online Promotions," IEEE Access,
Vol. 5,

AUTHOR DETAILS:
CHHAYA BJAPAI1 AND DR. SITA DEVI2
1
Research Scholar and 2Professor, School of Humanities & Arts, MUIT, Lucknow, U.P
676
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

EMERGING TRENDS AND PATTERNS IN MICRO FINANCE IN INDIA

SAGAR SHUKLA AND DR TRUPTI SINGH

ABSTRACT
Microfinance may be conceptualized as the accessibility of monetary offering to the neglected section of the
society who does not have any accessibility of funds. Microfinance provides working capital loans to
entrepreneurs through which they can start their own business. It helps to create employment not only to
entrepreneurs but also generates employment opportunities to others too. Banks are not best suited to offer
microfinance since they do not take a long-term view; do not offer non-financial services such as training; and
lack the combined qualitative and quantitative approach that is unique to microfinance institutions. The concept
of micro finance and micro credit is usually used for mutual exchange. But micro credit is always given with the
thrift and therefore a more appropriate expression rather than a micro finance. This includes the entire gamut
of financial services, such as savings required by poor, loans, insurance, equipment leases, remittances etc.
Against this backdrop, present paper highlights the growth and emerging trends and patterns in micro
financing in India.
INTRODUCTION
Micro Finance has emerged as is a powerful instrument for poverty alleviation and empowering poor. The
global nature of the Micro Finance movement is reflected in the growing number of organizations providing
Micro finance to poor people. Micro Finance is being referred to as one of the cost effective and supplementary
tools of rural credit delivery system which facilitates prompt and timely availability of institutional credit to
poor in an effective and economical manner. One of the objectives of development planning is to reduce extant
of poverty by providing employment opportunities and raising the income levels of the population. There has
been remarkable progress in the outreach and expansion of MFIs in India. In this part of dissertation an attempt
has been made to analyze the views of MFIs officials regarding micro finance activities.
NABARD has introduced the concept of Joint Liability Group in 2006-07 in order to help clients like tenant
farmers, share cropper, oral lessees, etc, through formal banking channels/MFIs as they had no access to credit
due to lack of acceptable collateral. Joint liability lending schemes has positive impact on the repayment
performance of borrowers. In the sense that social collateral of borrowers takes the place of traditionally
accepted forms of physical collateral, joint liability lending relied upon social capital of the group. Under such
lending conditions, the group bears the liability for the individual. Loans of members and by that solved the
problem of lack of traditional forms of collateral. By delegating the function of screening, monitoring, and
enforcement of loans to the group members, banks in their turn overcome the problem of asymmetric
information and accordingly the problem of prohibitively high transaction costs
In order to increase the credit flow in priority sector, commercial banks, regional rural banks, cooperative banks
etc. were promoted and large scale credit fair was organized. However, credit access to the poor from formal
financial institutions is still limited and the poor depend on non-formal agencies for their credit needs. Thus,
micro-finance institutions (MFIs) are institutions other than banks, which are engaged in the provision of
financial services to the poor. Micro finance is seen as a central axis in the field of development with a focus on
poor women. Micro Finance has had several successful initiatives, including the range of outreach, as well as
the development of local institutions and innovative products that reach out to marginalized communities.
Micro-finance has been accepted at the national policy level for poverty reduction. The expansion of banking
network and expansion of micro finance programs have enabled the poor to undertake income generating
activities for their empowerment. There are three types of lending technologies: (1) Document-based and asset-
based traditional technology, which is followed by almost all existing banks; (2) Group lending technology,
which comes in various sizes and forms and has its own benefits; and (3) Individual based lending technique is
one where micro-finance institutions have to take great care in assessing the repaying capacity of the borrowers.
In fact, a major innovation in this area is that MFIs have to train loan officers to assess the repaying capacity of
potential borrowers. These techniques have been focused on micro finance through SHG, although there has
been a tremendous increase in credit access to the poor through SHG and recovery has been comparatively high.
Importantly, the provision of financial services dealing with small loans and savings has been increasingly
appreciated as an effective means of poverty reduction. There is continuous and rapid improvement in

677
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

understanding how financial services can be provided for poor people. However, micro-finance institutions
initially have small operations and expand their outreach very rapidly.
Microfinance may be conceptualized as the accessibility of monetary offering to the neglected section of the
society who does not have any accessibility of funds. Microfinance provides working capital loans to
entrepreneurs through which they can start their own business. It helps to create employment not only to
entrepreneurs but also generates employment opportunities to others too. Banks are not best suited to offer
microfinance since they do not take a long-term view; do not offer non-financial services such as training; and
lack the combined qualitative and quantitative approach that is unique to microfinance institutions. The concept
of micro finance and micro credit is usually used for mutual exchange. But micro credit is always given with the
thrift and therefore a more appropriate expression rather than a micro finance. This includes the entire gamut of
financial services, such as savings required by poor, loans, insurance, equipment leases, remittances etc. Micro
credit is the credit of a small amount of money, which plays an important role in enhancing human life, which
should be used in a proper manner to generate income, to eliminate poverty, create jobs etc. Micro finance is
usually known through small groups. As self-help group [SHG] not only works as a platform to monitor each
other's activities, but also provides social assistance. The amount of loan on the SHG member is based on the
amount of SHG savings and is usually collected in monthly installments. Debt is repeated and gradually
increased, thus, the establishment of relationship banking The small scale enterprises mostly deals in trading
different range of products like handicrafts items, fruits and vegetables seller, general store, potter works, dairy
farms, painting and embroidery works, papad-making and pickle-making, sewing works, agarbatti making,
candle-making, hair dresser or salon, etc. Banks are unable to deal with poor people due to involvement of high
transaction cost, thus, micro-finance comes into picture to fill this gap. Microfinance institutions provide all
essential services required to start up enterprises or to give training so that poor people can earn their livelihood.
MFIs motive to capture poor people by making their groups to credit them and provide financial security to
them. In the last decades, microfinance has turned into one of the major issues in the discourse of economic
development from literally unknown development tools. During the last two decades in the developing world,
there have been two different approaches to micro finance in the micro credit sector. It is important to know
them, because issues of a permanent system have to be checked in that context. The first is the business
approach that considers micro-finance as a marketing of credit to meet the needs of the informal sector or any
other customer, whose credibility does not match the requirements of formal banking practices.
Entrepreneurship and development have been emphasized.
FINANCIAL INCLUSION
Financial inclusion is imperative for increasing the outreach and accessibility of financial services to poor ,
marginalized and weaker sections of society. The global experience demonstrates financial inclusion reduces
social and income inequalities comparatively faster than other banking and financial services (Beck et al. 2007).
The financial inclusion and financial instruments have also positive impact on generation of self-employment,
business development and family level domestic consumption (Bauchet et al. 2011). The increasing access of
microcredit also has augments household consumption and reduces poverty while it enables entrepreneurs and
business men to develop businesses and face the risks (Banerjee and Duflo, 2011, Dupas and Robinson,
2013). Furthermore, randomized evaluations of health and insurance have positive impacts on farmers and also
reduces risks and (Cole, et al., 2013; Karlan, Osei-Akoto, Osei, and Udry ,2014). The studies have shown
positive results on savings and investment for future (Dupas and Robinson, 2009), It microcredit also increases
social Dupas and Robinson, 2009), and women empowerment.
In order to increase the credit flow in priority sector, commercial banks, regional rural banks, cooperative banks
etc. were promoted and large scale credit fair was organized. However, credit access to the poor from formal
financial institutions is still limited and the poor depend on non-formal agencies for their credit needs. Thus,
micro-finance institutions (MFIs) are institutions other than banks, which are engaged in the provision of
financial services to the poor. Micro finance is seen as a central axis in the field of development with a focus on
poor women. Micro Finance has had several successful initiatives, including the range of outreach, as well as
the development of local institutions and innovative products that reach out to marginalized communities.
Micro-finance has been accepted at the national policy level for poverty reduction. The expansion of banking
network and expansion of micro finance programs have enabled the poor to undertake income generating
activities for their empowerment. There are three types of lending technologies: (1) Document-based and asset-
based traditional technology, which is followed by almost all existing banks; (2) Group lending technology,
which comes in various sizes and forms and has its own benefits; and (3) Individual based lending technique is
one where micro-finance institutions have to take great care in assessing the repaying capacity of the borrowers.
678
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

In fact, a major innovation in this area is that MFIs have to train loan officers to assess the repaying capacity of
potential borrowers. These techniques have been focused on micro finance through SHG, although there has
been a tremendous increase in credit access to the poor through SHG and recovery has been comparatively high.
Importantly, the provision of financial services dealing with small loans and savings has been increasingly
appreciated as an effective means of poverty reduction. There is continuous and rapid improvement in
understanding how financial services can be provided for poor people. However, micro-finance institutions
initially have small operations and expand their outreach very rapidly.
TRENDS AND PATTERNS
The SHGs based micro financing programme has wider coverage to more than 10 million groups while a large
amount of loan was disbursed for livelihood generating activities. The poverty alleviation programmes such as
NRLM and NULM account for majority of SHGs (NABARD,2019). However, Southern states have major
share while Central Region (10.6 per cent) and Northern Region (5.5 per cent) recorded lower shares. Micro
Finance Institutions presently are in operation in 29 States and 4 Union Territories with the outreach of 563
districts. Twenty one MFIs have wise outreach and are functional in more than five states while four MFIs are
operating in more than fifteen states. However, 57 MFIs are functional in two to five states while 90 MFIs are
confined to only one state. The client outreach of MFIs had grown significantly during the period of 2005 to
2011 and achieved a level of 317 lakh clients. Majority of these clients are being served by NBFCs (NBFC/
NBFC-MFIs) .Number of functional MFIs during 2017 was reported large in Maharashtra followed by Madhya
Pradesh, Bihar, Chhattisgarh and Uttar Pradesh. However, number of branches was reported large in Uttar
Pradesh followed by Karnataka, Madhya Pradesh, Tamil Nadu, Bihar and West Bengal. Number of clients was
reported high in Karnataka followed by Uttar Pradesh, Bihar, Odisha and Tamil Nadu. Gross loan portfolio was
recorded high in Karnataka followed by Uttar Pradesh, Maharashtra, Bihar, Tamil Nadu and West Bengal
(Mishra and Tankha, 2018).
Membership of SHGs has enabled economic authorization of women through management of resources,
political empowerment through participation in decision-making, social empowerment through higher social
standing obtained by better economic status. Thus, the SHGs became the foremost powerful conduits for
incubating and empowering women to maneuver from subsistence to sustainability. The programme of linking
of SHGs to banks was started on a pilot basis by NABARD within the year 1991-92 and since then NABARD
has been propagating, promoting and funding SHG-Bank Linkage Programme. As on thirty one March 2021 the
SHG - BLP programme has reached many milestone with a complete membership of concerning 112.23 lakh
SHGs. covering 13.8 large integer households across India. Throughout the year 2020-21, the amounts of
SHGs hyperbolic by Rs. 9.80 lakh with a corresponding increase within the savings by Rs. 11325.56 crore. The
savings outstanding of SHG with Banks as on thirty one March 2021 has reached an incomparable high of
Rs.37477.61 crore. Taking the getting to know of collateral loose lending from the SHG concept, NABARD
piloted and evolved an powerful credit score product for landless laborers, share-croppers and tenant farmers
i.e. “Joint Liability Groups” (JLGs). This product allows trouble loose credit score that is of longer term;
satisfying seasonal wishes of credit score large in quantum. The product however, is predicated on mutual
assure of customers like small /marginal/tenant farmers, oral lessees and sharecroppers, micro-entrepreneurs,
who've no traditional collateral to offer. It leverages on social collateral presented via way of means of the
members. Encouraged via way of means of NABARD’s one hundred percentage refinance assist to banks, the
Scheme has additionally recorded an outstanding increase all through 2020-21 with 41.27 lakh JLGs receiving
economic help to the tune of Rs. 58311 crore from diverse banks. Under the Scheme NABARD has sanctioned
a cumulative furnish help of Rs. 219.73 crore to Joint Liability Groups Promoting Institutions (JLPIs) for
selling 11.69 lakh JLGs throughout the usa and allowing float of collateral loose mortgage to tenant/ landless
farmers.
The MFIs emerged in India in reaction to the distance in availability of banking services for the un-served and
underserved in rural population. There are round 184 MFIs (which include NBFC-MFIs) running in India in
numerous forms - trusts, societies, cooperatives, Section 25 businesses and Non-Banking Financial Companies
(NBFCs). The MFI enterprise has proven similarly promising increase. As in step with Sa-Dhan, as on 31
March 2021, the microfinance enterprise has a complete mortgage portfolio of Rs. 2,47,839 crore with a 12
months increase of 17 percent . The percentage of the numerous gamers in typical portfolio exceptional suggests
that the Banks’ percentage become maximum amounting to Rs. 110122 crore (44 percent), NBFC-MFIs Rs.
79115 crore (32 percent), Small Finance Banks Rs. 37724 crore (15 percent), NBFCs Rs. 18765 crore (8 percent
) and Non-income MFIs Rs. 2113 crore (1 percent ).

679
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

In 2020- 21 , the lockdown due to COVID -19 pandemic affected the economic activities across the country.
The worst affected had been firms with very little reserves and excessive liquidity turnover operations, which
turned into the case for ordinary micro and small businesses. When those MFIs confronted a shutdown in
collections and disbursements because of regulations on mobility within side the early months of the pandemic,
the impact turned into devastating. The Covid-19 pandemic has induced unceasing damages to the Indian
economic system. In view of the revival of the Indian economy from the slump, the banking region inter alia
appears to have obtained unique attention. Financial measures were adopted to provide relief. In India, the
MFIs have enormous contributions in reaching the a great deal pointed out the goal of economic inclusion.
During the pandemic, SHGs were massively engaged in manufacturing of PPE kits such as masks, sanitizers,
and providing banking services at the doorstep. As per Sa-dhan (2019) report, the MFIs have an outreach to
forty million customers with an superb mortgage portfolio of $ 12.76 billion. There has been a 22 percentage
growth in customer outreach and a 34 percentage growth in mortgage disbursements over the preceding year,
indicating a excessive increase rate. MFI lending performs a tremendous position in decreasing the proportion
of casual borrowings amongst families. The MFI operation and the views of economic offerings to the negative
want revamping within side the wake of the pandemic associated lockdown measures being in pressure
throughout the country. To incorporate unfold of Covid-19, the management has mandated social distancing and
confined marketplace. Needless to say, the MFI mode of operation mostly includes the distribution of credit
score on the customers' doorsteps, periodic organization of meetings and collections. The pandemic primarily
based totally regulations; however, create demanding situations to the continuation of the operations. Further, a
majority of the MFIs' economic offerings are directed to low-profits families whose income are abnormal and to
a bigger extent, are daily. The regulations at the monetary sports have visibly adversely affected the income and
the cash-go with the drift to the families. Considering the MFIs as instrumental in offering economic offerings
to the negative, and that the MFIs are presently locating it hard to elevate capital from the debt marketplace, the
authorities of India has delivered positive beneficial measures to enhance their liquidity needs. A unique
liquidity scheme of $ 4.06 billion has been released for the non-banking economic companies, housing finance
companies, and the MFIs under Self Reliant India. This is anticipated to ease the MFI operation and in turn,
assist the needy avail of a great deal-wanted credit score to permit pass the business. Under the lately introduced
scheme of the government “Self-Reliant India”, a economic package deal of USD 270.forty two billion is
introduced to restore the economy .The monetary package deal has the supply of economic help to the small-
scale industries particularly domestic industries, cottage industries, small-scale industries, and MSMEs .
MFIs can either grow by expanding their branch network or by adding more clients to the existing branch.
While the first approach typically leads to greater breadth in operations, the second approach leads to depth
within the existing area of operation. During the year 2017–18, an analysis of the operations of the top 10
NBFC-MFIs shows that a mixed approach was the trend. Except in the case of Spandana, Muthoot and Asirvad,
growth in the number of clients is either similar to growth in branches or slightly less. The overall data for 47
NBFC-MFIs also confirms this trend, as the sector average was 25 per cent annual growth in both the number of
branches and clients. A logical corollary of this aspect is that the existing operational areas of MFIs are
saturated, necessitating a move to new geographies. As the number of districts with NBFC-MFI presence did
not see a corresponding increase during the year, it can be inferred that most of the new branches are within
existing districts. It is a positive development because in previous years the focus was more on depth that is,
adding more branches.
Operation of MFIs in India is shown in Chart 1. The number of micro finance institutions functional in the state
was reported high in Maharashtra followed by West Bengal, Tamil Nadu, Madhya Pradesh, Bihar and Uttar
Pradesh. Number of districts of the state which were covered by MFIs operation was reported high in Uttar
Pradesh followed by Madhya Pradesh, Maharashtra, Tamil Nadu, Bihar, Karnataka and Odisha. Similarly, there
were 10233 branches of MFIs and a large number of MFI branches were found located in Karnataka, Tamil
Nadu, West Bengal, Uttar Pradesh, Madhya Pradesh and Maharashtra. The top five states viz., Karnataka, Tamil
Nadu, Uttar Pradesh, Odisha and Bihar account for 60 per cent of total client outreach in India.

680
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Chart-1 Operation of MFIs in India


45 41 41
40
34 35
35 33
30 28 28
25 23 22
21 20 20 20
20 18 17
16
15
10 10
10
4 5
5 3
1
0

Telangana
Rajasthan
Andhra Pradesh
Assam

West Bengal
Karnataka
Jharkhand
Chhattisgarh

Maharashtra
Madhya Pradesh

Odisha

Uttarakhand
Haryana
Gujarat
Bihar

Punjab
Delhi

Himachal Pradesh
Jammu & Kashmir

Kerala

Uttar Pradesh
Tamil Nadu
No. of MFIs

Loan disbursed to MFIs by financial institutions and banks has shown fluctuating trend over the period of 2016-
17 to 2018-19. During 2015-16, number of loan accounts were reported 647 which increased to 2314 during
2016-17 however, the number of accounts declined to 1933 during 2018-19.. The amount of loan disbursed to
Micro Finance Institutions has increased by 22.69 per cent during 2015-16 to 2017-18. Commercial Banks
accounted a large share against amount of loan disbursed to MFIs by banks and financial institutions in India
while outstanding loan against micro finance institutions as on 31st March, 2019 was reported to be Rs.
17760.66 crores. The amount of outstanding loan has shown increasing trend during 2015-16 to 2017-18.There
has been phenomenon growth in MFI-bank linkages in India during 2012-13 to 2018-19. The number of MFIs
to whom loan was disbursed by banks and financial institutions has increased by 4.54 times while there has
been 3 times increased in the amount of loan disbursed to MFIs in India during the period of 2012-13 to 2018-
19. Similarly, loan outstanding of MFIs has shown 2.69 times increase while amount of outstanding loan has
increased by 1.23 folds during the corresponding period (NABARD, 2019).
The states of Tamil Nadu, Karnataka, Maharashtra, Uttar Pradesh, West Bengal, Bihar, Madhya Pradesh,
Rajasthan, Gujarat and Odisha are top 10 performing states of Prime Minister Mudra Yojana in India. During
2016-17 to 2017-18, the sanctioned amount under the scheme has increased significantly in the state of
Rajasthan followed by Odisha, Gujarat and Uttar Pradesh .PMMY loan accounts were reported 48.13 million
and southern states constituted about 30 per cent share while northern states accounted for 18 per cent share.
However, Southern and Northern states accounted for about 54 per cent share in sanctioned amount during
2017-18. Out of total PMMY loan during 2017-18, more than 2/5th loan was reported under the category of
Shishu while number of accounts under Shishu accounted for 88.65 per cent share in the corresponding year.
However, more than 1/3rd amount was sanctioned under Tarun category against 9.67per cent share of loan
accounts during the period. The number of loan accounts under the Kishore category constituted less than 2 per
cent share but loan sanctioned under the category accounted for about 1/4th share (Mudra, 2019). The micro
finance industry is groining significantly while total loan portfolio was recorded in the tune of Rs.1,78,547
crore as on March 31, 2019 .NBFC-MFIs accounts for lion’s share in micro-credit with total loan outstanding
of Rs. 68,156 crore while Banks constitutie 34 percent of total micro-credit outreach . Number of MFI loan has
shown an increasing trend during the period of 2016 to 2019. During 2019, about 48 per cent number of loan
reported to be NBFC-MFIs while its share during 2016 was recorded 41.27 per cent. Number of loans by banks
constituted about 27.7 per cent. MFI disbursed amount is shown in Chart 2. Out of total MFI loan amount
during 2019, about 40 per cent loan amount w2as reported for NBFC-MFIs while banks constituted 36.88 per
cent share in the MFI loan amount disbursed during the year. There has been significant increase in the loan
amount during the period of 2016to 2019 (102.56 per cent).

681
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Chart-2: MFI Disbursed Amount (Rs Crores)


250,000

200,000

150,000

100,000

50,000

0
Banks SFBs NBFC-MFIs NBFCs Not for Profit Total Industry
MFIs

2016 2017 2018 2019

There has been increase of 128.55 per cent in MFI portfolio outstanding during the period of 2016 to 2019. MFI
portfolio outstanding was reported Rs. 78123 crores during 2016 which increased to Rs. 178547 crores during
2019. Microfinance industry has a presence in 619 districts in India while top 30 districts account for 25
percent of portfolio outstanding . MFI concentration was reported high in Puducherry followed by Tripura,
Tamil Nadu, Sikkim, Assam, Odisha, Karnataka, West Bengal and Kerala while number of active borrowers
was reported high in Tamil Nadu followed by West Bengal, Bihar and Karnataka (SIDBI, 2019). Most of MFIs
provide financial services through group based financial model such as JLGs/ SHGs . These institutions lend
through the concept of Joint Liability Group (JLG). A JLG is an informal group which comprising of 5 to 10
individual members who join together for receiving credit either individually or through the group based
mechanism. Out of cumulative number of JLGs promoted in India as on March 31st, 2019, southern states
accounted share of 30.97 percent while eastern states constituted more than one third share. The share of
northern states was recorded 13.24 percent while least share went to north eastern states. Out of the total loan
disbursed as on March 31st , 2019, about two fifth share accounted for southern states while about 27 percent
share was reported for eastern states ( NABARD, 2019) .
There has been global focus of microfinance on serving women. However, in India, MFIs also target Scheduled
Castes, Scheduled Tribes and Minorities besides women clients. However, about two fifth borrowers are from
urban centers. Rural-urban distribution of MFI borrowers is shown in Chart 3.
Chart 3: Rural and Urban Share of MFI Borrowers
67 67
70 62 61
56
60
50 44
38 39
40 33 33
30
20
10
0
2013 2014 2015 2016 2017
Rural Urban

CONCLUSION
Micro-finance initiatives are well recognized all over globe as an effective tool for poverty alleviation and
substantial income generation. In India too, micro-finance is playing crucial role in reducing poverty,
empowering poor and small business development. Micro finance is seen as a central pivot in the development
space with its focus on poor. The expansion of banking network and extending outreach of micro finance
programmes has enabled poor to initiate income generating activities for their empowerment. The SHGs based
micro financing has become a regular feature of the Indian financial system since 1996. The SHGs are small,
682
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

informal and homogenous groups which have proved as cyclic agents of development in both the rural and
urban areas. The micro finance movement in India, unleashed around the 1970s, has come a long way from
being a tool for welfare, to becoming an effective strategy for poverty alleviation and development of
enterprises. The movement has gained with the wider outreach of area and clients. In the last decade, micro
finance has moved from a virtually unknown development tool to one of the key issues in economic
development discourse.
REFERENCES
 Banerjee, A., Chandrasekhar, A., Duflo, E., & Jackson, M. (2013). The Diffusion of Microfinance.
Science, 341(6144), 363-363. Retrieved April 29, 2020,
 Banerjee, Abhijit V., and Esther Duflo. (2011) Poor Economics. New York: Perseus Books.
 Bauchet, J., C. Marshall, L. Starita, J. Thomas, and A. Yalouris (2011). “Latest Findings from Randomized
Evaluations of Microfinance.” Access to Finance Forum, Reports by CGAP and Its Partners, No. 2.
Consultative Group to Assist the Poor.
 Beck, T., Demirgüç-Kunt, A. and Levine, R., (2007) Finance, inequality and the poor. Journal of
Economic Growth, 12(1), pp.27-49.
 Cole, Shawn, Xavier Giné, Jeremy Tobacman, Petia Topalova, Robert Townsend, and James Vickery.
(2013.) “Barriers to Household Risk Management: Evidence from India.” American Economic Journal—
Applied Economics, 5 (1): 104–35.
 Dupas, Pascaline, and Jonathan Robinson.( 2013). “Savings Constraints and Microenterprise
Development: Evidence from a Field Experiment in Kenya.” American Economic Journal—Applied
Economics, 5 (1): 163–92. Financial Economics 58 (1): 261–300.
 Karlan, Dean, Isaac Osei-Akoto, Robert Osei, and Chris Udry. (2014) “Agricultural Decisions after
Relaxing Credit and Risk Constraints.” Quarterly Journal of Economics.
 Mishra, Alok and Ajai Tankha ( 2018) Inclusive Finance India , Access – Assist , New Delhi
 Mudra (2019) Annual Report , 2018-2019, Mumbai
 NABARD (2019) Micro Finance in India , NABARD, 2019 , Mumbai
 Sa- Dhan (2019) The Bharat Micro Finance Report, Sa –Dhan, New Delhi
 SIDBI (2019) Micro Finance Pulse Report, Volum,e II ,June, 2019, SIDBI, Mumbai

AUTHOR DETAILS:
SAGAR SHUKLA1 AND DR TRUPTI SINGH2
1
Research Scholar and 2Professor, School of Commerce and Management, MUIT, Lucknow, U.P

683
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

EMPOWERMENT OF PERSONS WITH DISABILITIES IN INDIA: WITH SPECIAL REFERENCE


TO UTTAR PRADESH

ALENDRA TRIPATHI AND DR. A. P. BHARTI

ABSTRACT
Disabled persons are the most marginalized and suffer from social deviations, stigma and social exclusion and
oppression. Government of India and the Government of Uttar Pradesh have launched several schemes in the
last decades. The plans are well thought out and supported by financial support. The state has all the structures
and processes that are necessary to implement these programs. The ultimate objective of these schemes is the
upliftment and empowerment of people with disabilities. In view of the problems of differently abled persons in
Uttar Pradesh and the government's concern for their empowerment and development, it is mandatory to
examine the pattern of development of public spending on the development of persons with disabilities in Uttar
Pradesh. Present paper attempts to review the government schemes for empowerment of PWDs in the state of
Uttar Pradesh.

INTRODUCTION
As per Census 2011, there are 2.68 crore Persons with Disabilities in India who constitute 2.21 percent of the
total population. The Constitution of India provides six Fundamental Rights to all the citizens including the
persons with Disabilities. These include - Right to Equality, Right of Freedom, Right against Exploitation,
Right to freedom of Religion, Cultural and Educational Rights and Right to Constitutional Remedies. Only six
states have dedicated departments for disabled. The six states are Andhra Pradesh, Madhya Pradesh, Odisha,
Rajasthan, Tamil Nadu and Uttar Pradesh. For the overall development, benefit and smooth operation of
schemes made for inclusive growth and welfare of the persons (with disabilities) Empowerment of Persons with
Disabilities Department was established on 20 September, 1995 by Government of Uttar Pradesh. As per 2011
census, In Uttar Pradesh the total number of Person with various disabilities was 41.36 lakh which is
approximately 2.08 percent of total population of the state. These include persons with Seeing, Hearing, Speech,
Movement, Mental Retardation, Mental Illness, Multiple Disability and any other disabilities. The Department
in-keeping with its goals has established a network of schools catering to different categories of disability and
age-group/literacy levels , residential hostels for students , establishment and operationalisation of Braille Press
as well as a University meant primarily to serve the differently-abled segment (challenged students) of the
society. It has taken various welfare measures such as shelter houses -cum-training centers for divyang destitute,
skill development centers along with provisions of grants, pensions, aids and assistive devices/artificial limbs
etc
LEGAL PROVISIONS
Adopted in 1992, the Central Government enacted the Persons with Disabilities (Equal Opportunities,
Protection of Rights and Full Participation) Act, 1995, in the wake of the Declaration on Full Participation and
Equality of People with Disabilities in the Asian and Pacific Regions. India is a signatory to the proclamation.
The PwD Act, 1995 provides certain benefits to persons with disabilities who have not less than 40 percent of
any disability, as evidenced by the Medical Authority. Thus, persons with a disability who wish to receive
benefits under the Act, have to obtain a disability certificate from the notified medical authority for this purpose.
State governments are responsible for issuing disability certificates based on applications received from persons
with disabilities. Recognizing the fact that a person with a disability constitutes a valuable human resource for
the country and that the majority of such individuals can lead to a better quality of life if provided equal
opportunities and effective access to rehabilitation measures, the government creates an environment. The
National Trust is a statutory body established by an Act of Parliament for the welfare of people with autism,
cerebral palsy, mental retaliation and the Americans with Disabilities Act, 1999. The National Trust offers
registration with voluntary organizations, persons with disabilities and associations. The new plan management
system has about 500 registered organizations of National Trusts in the country.
Disability is a complex term and is defined as an activity or restriction or disability within the limits of what is
considered normal for a human being, resulting mostly in impairment. Disability has been recognized as a
human rights issue in the international arena, with the United Nations Declaration on the Rights of Persons with
Disabilities focusing on the needs of persons with disabilities globally. Disability is any physical or mental
condition that limits a person's activities, senses, or activities. The term disability has traditionally been used to
684
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

refer to characteristics that are sufficient to interrupt or prevent day-to-day activities in general. According to
the United Nations Convention on the Rights of Persons with Disabilities, "Persons with disabilities include
those with long-term physical, mental, intellectual, or sensory defects, who interact with various barriers, which
their full and effective participation in society. Disability can be permanent, temporary or episodic. They can
affect people from birth, or can be acquired later in life through injury or illness. The World Bank (2007)
estimated that approximately 600 million people, or 10 percent of the world's population, have a disability and
80% of these people live in developing countries The 2011 census showed that over 21 million people in India
suffer from one or the other type of disability. This is equivalent to 2.1 percent of the population. There are
12.6 million men and 9.3 million women with disabilities in the country, although there are more people with
disabilities in rural and urban areas. Disability as a social concern is slowly but surely coming to attract public
attention at the highest levels of government and policy-making in recent years, efforts by grassroots groups and
non-governmental organizations No small measures have been taken. The Office of the Chief Commissioner for
Persons with Disabilities has been established under Section 57 of the Persons with Disabilities (Protection of
Equal Opportunities, Rights and Full Participation) Act, 1995 and has been mandated to take steps to protect the
rights of individuals. The Persons with Disabilities (Equal Opportunities, Protection of Rights and Full
Participation) Act, 1995 was published on 1 January 1996 and notified on 7 February 1996. The Persons with
Disabilities Act basically lays down the facilities that various types of disabled persons will be entitled to
responsibilities and obligations to the Government of India. It broadly includes the prevention and early
detection of disabilities, education, employment, social security, research and manpower development, barrier-
free access and the priorities and facilities that are available to such individuals and which are necessary to
avoid any discrimination. The primary health care centers have been trained to detect and prevent disabilities.
Treatment facilities available at the Trauma Center for the purchase of the disabled, soft shoes are being
provided to all the disabled, proper treatment and rehabilitation facilities are available for the disabled after their
primary screening. All children have been screened to identify risks under school health programs. Awareness
programs are being conducted by 07 SHGs to create awareness on health, sanitation and hygiene. Free
education for children with disabilities is available in the state. Strict instructions have been issued not to deny
admission to PwDs in common schools and government aided special schools are running in the state. The
Social Welfare Department is providing scholarships to students with disabilities. The State has identified 585
posts in all groups for PwDs, Notification for the implementation of minimum 3 percent vacancies under
Section 33 of the Act was issued to all concerned departments for reservation in jobs identified for PWD. The
scheme of preferential allocation of land to PwD at concessional rates is available for houses, businesses,
establishment of special recreation centers, special schools and research centers and factories for people with
disabilities. The State Commissioner for Persons with Disabilities has been appointed with additional charge.
Grant-in-aid of Rs. 27.00 lakhs have been distributed by the state to non-governmental organizations during the
year. Braille Press has been established. Loan facility for Self-Employment / Higher Education provided by
Regional Rural Banks is provided through NHFDC as per the Act, "Person with Disability" means a person
suffering from any disability with 40 percent from any disability. Not less as evidenced by medical authority.
"Disability" as defined in clause 2 (i) Act means - (i) blindness (ii) low vision (iii) leprosy (iv) hearing defect
(v) locomotor disability (vi) mental retardation (vii) mental illness.
DISCUSSION OF RESULTS
Budgetary allocations on welfare of persons with disabilities in India have shown an increase of 185.33 per cent
during 2014-15 to 2018-19. However, growth in budgetary allocations on welfare of disabled persons in Uttar
Pradesh recorded the growth rate of 93.13 per cent during the corresponding period. During 2018-19, Rs. 1070
and Rs. 871 crores were allocated by Central Government and state government respectively. Thus, the amount
in terms of per capita budgetary allocations is found to be meagre. Budgetary allocations on welfare of disabled
in Uttar Pradesh accounted less than one per cent in total expenditure of the state. There has been an increase of
154.67 per cent in budget allocations during the period of 2014-15 to 2017-18. Actual expenditure against
budget allocations during 2017-18 constituted 97.20 per cent. During 2016-17, more than 2/5th expenditure was
reported on National Programme for Welfare of PwDs while expenditure on autonomous bodies accounted for
27.26 per cent. Expenditure under umbrella programme for development of other vulnerable groups constituted
24.18 per cent during the year. Expenditure on umbrella programme for development of other vulnerable groups
has increased over the period of 2016-17 to 2018-19. Out of total expenditure, about 90 per cent expenditure
was reported on social services during 2016-17. However, this share is likely to decline in the coming years.
During 2017-18, a budgetary allocation was reported Rs. 61302.4 lakh. Out of total budget, about 91.19 per
cent budget was allocated for pension for differently abled persons while budget for leprosy pension constituted

685
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

2.94 per cent and budget for purchasing of artificial limbs accounted for 5.28 per cent. The overall financial
performance was reported 97 per cent while physical performance was recorded more than physical target.
Accessible India Campaign: Accessibility for people with disabilities was recognized as a right in India with
the passage of The Persons with Disabilities (Equal Opportunities, Protection of Rights and Full Participation)
Act in 1995, which mandated barrier-free access in all public places and transportation systems. Ministry of
Social Justice & Empowerment has launched the Accessible India Campaign (Sugamya Bharat Abhiyan), as a
nationwide flagship campaign for achieving universal accessibility for Persons with Disabilities and to create an
enabling and barrier free environment, with a focus on three verticals: built environment; public transportation
and information & communication technologies.
Swavalamban Health Insurance Scheme: “Swavlamban Health Insurance Scheme” has been conceived with
the objective of providing affordable Health Insurance to persons with blindness, low vision, leprosy-cured,
hearing impairment, loco-motor Disability, mental Retardation and mental Illness. It also aims to improve the
general Health condition & quality of life of persons with disabilities. Divyangjan sashaktikaran is
implementing the scheme under its aegis and the Uttar Pradesh Government is bearing 10 percent of the shared
cost-component .
Unique Identity Card For Divyangjan: Unique ID for Persons with Disabilities” project is being implemented
with a view of creating a National Database for PwDs, and to issue a Unique Disability Identity Card to each
person with disabilities. The project will not only encourage transparency, efficiency and ease of delivering the
government benefits to the person with disabilities, but also ensure uniformity.
Assistance to PwD for Purchase/Fitting of Aids/ Appliances (ADIP) : The main objective of the Scheme is to
provide grants-in-aid to the various implementing agencies (National Institutes/ Composite Regional Centres
/Artificial Limbs Manufacturing Corporation of India(ALIMCO)/ District Disability Rehabilitation
Centres/State Handicapped Development Corporations/other local bodies/ NGOs) so that they are in a position
to assist needy disabled persons in procuring durable, sophisticated and scientifically manufactured, modern,
standard aids and appliances to promote physical, social and psychological rehabilitation of Persons with
Disabilities through reducing the effects of disabilities and at the same time enhance their economic potential.
Deendayal Disabled Rehabilitation Scheme: The Deendayal Disabled Rehabilitation Scheme (DDRS) of the
Department is Central Sector Scheme that includes projects for Providing education and vocational training and
rehabilitation of persons with disabilities. The Scheme has been operational since 1999 with the objective of
ensuring effective implementation of the Persons with Disabilities Act (PwD), 1995, through creating an
enabling environment and encouraging non-governmental organizations through financial assistance for
undertaking projects for the empowerment of the Persons.
SIPDA: The grants-in-aid are provided under this Scheme to State Governments and various other bodies, set
up by the Central and State Governments, including Autonomous Bodies and Universities, to support activities,
pursuant to implementation of the provisions of the Persons with Disabilities (Equal Opportunities, Protection
of Rights and Full Participation) Act, 1995, particularly relating to rehabilitation and provision of barrier-free
access. The District Disability Rehabilitation Centres (DDRCs) and Composite Rehabilitation Centres (CRCs)
set up by the Department are also provided support under this scheme.
Scheme of National Awards for Empowerment of Persons with Disabilities: Empowerment of persons with
disabilities is an inter-disciplinary process, covering various aspects namely, prevention, early detection,
intervention, education, vocational training, rehabilitation and social integration etc.
Scheme of National Scholarships for Persons with Disabilities: Under the Scheme of National Scholarships
for Persons with Disabilities, every year 500 new scholarships are awarded for pursuing post matric
professional and technical courses of duration more than one year. However, in respect of students with cerebral
palsy, mental retardation, multiple disabilities and profound or severe hearing impairment, scholarship are
awarded for pursuing studies from IX Std. onwards.
National Fellowship for Students with Disabilities: National Fellowship for students with Disabilities
Scheme was launched during the financial year 2012-13 to increase opportunities to students with disabilities
for pursuing higher education leading to degrees such as M.Phil. and Ph.D. in any University recognized by
University Grants Commission(UGC).
Pre-Matric Scholarship and Post-Matric Scholarship for Students with Disabilities: The objectives of the
schemes are to provide financial assistance to the students with disabilities for studying in the pre-matric level
686
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

(class IX and X) and post-matric level (Classes XI, XII and upto Post graduate degree/ diploma level). These
two schemes have been launched by the Department of Empowerment of Persons with Disabilities during the
Financial Year 2014-15.
National Overseas Scholarship for Students with Disabilities: The scheme of National Overseas
Scholarship for Students with Disabilities has been launched with the objectives of providing financial
assistance to the students with disabilities for pursuing studies abroad at the level of Masters’ Degree and Ph.D.
Twenty (20) scholarships are to be awarded every year out of which six are reserved for women candidates. The
scholarship amount includes Maintenance Allowance, Contingency Allowance, Tuition Fees, and Cost of Air
Passage etc. Parental income ceiling is Rs.6.00 lakh per annum.
Scholarship for Top Class Education for Students with Disabilities: The Scheme aims at recognizing and
promoting quality education amongst Students with Disabilities by providing full financial support. The scheme
will cover Students with Disabilities (SwDs) for pursuing studies at the level of Post Graduate Degree or
Diploma in any discipline. The scheme will operate in all institutions notified by the Department
.Empowerment of Persons with Disabilities, Ministry of Social Justice & Empowerment as institutions of
excellence.
Employment to Persons with Disabilities: The objective of the scheme is to encourage of employment of
persons with disabilities in the corporate sector. The scheme of giving incentives to employers for providing
employment to persons with disabilities in the private sector was launched in the year 2008-09. Under the
scheme, payment of employer’s contribution towards the Employees Provident Fund Organization (EPFO) and
the Employees State Insurance Corporation (ESIC) for the first three years, is made by the Government of India,
in respect of persons with disability appointed in the private sector to a post carrying monthly emoluments up to
Rs.25,000/-. The administrative charges of 1.1% of the wages of the employees covered under the Employees
Provident Fund & Miscellaneous Provisions (EPF&MP) Act will continue to be paid by the employer. The
scheme is effective from 1st April, 2008.
The National Action Plan (NAP) for Skill Training of Person with Disabilities: The Department of
Empowerment of Persons with Disabilities, Ministry of Social Justice and Empowerment has launched the
National Action Plan for skill training of persons with disabilities, in collaboration with the Ministry of Skill
Development and Entrepreneurship on 21st March, 2015.
CONCLUSION
The analysis demonstrates that there is wide variation in the public expenditure efficiency across the states. This
variation could be due to the extent of good governance in the states as well as on the economic growth. It
implies that higher budgetary allocations on social sector alone might not necessarily translate into an
improvement in their social outcomes. The analysis clearly suggests that public policy needs to focus equally on
outcomes and not just on outlay-based polices. The analysis of physical and financial performance of various
programmes and schemes shows that there has been remarkable progress in empowerment of persons with
disabilities; however, there is dearth of funds and inadequate coverage of various schemes. The present
amount of funds under various schemes is grossly inadequate while economic norms for availing the benefits
under these schemes are also tough to achieve. The large number of applications of persons with disabilities is
not being timely processed and forwarded to government of India for availing benefits under various
educational and social development schemes.
REFERENCES
1. Neufeldt, A. H. et al (1991), "Economic independence for persons with disabilities”, a background paper
prepared for Employment and Immigration Canada (University of Calgary).
2. Rungta, S. K. (2004) Training and Employment of People with Disabilities: India 2002 (ILO), GLADNET
Collection, Cornell University ILR School Year,
3. Shapiro, Joseph P. (n.d.) No Pity People with Disabilities Forging a New Civil Rights Movement (Times
Books).
4. United Nations (1990) Disability Statistics Compendium (New York).
5. Waddington, L., And Diller, M. (2000) ‘Tensions and coherence in disability policy: the uneasy
relationship between social welfare and civil rights models of disability in American, European and
international employment law’ (presented at From Principles to Practice: An International Disability Law
and Policy Symposium, October 2000) available online at: http://www.dredf.org/ symposium/ waddington.
html, downloaded December 2001
687
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

6. World Bank (2007) People with Disabilities in India: From Commitments to Outcomes (New Delhi).

AUTHOR DETAILS:
ALENDRA TRIPATHI1 AND DR. A. P. BHARTI2
1
Research Scholar and 2Professor, School of Humanities & Arts, Maharishi University of Information
Technology, Lucknow

688
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

IMPACT OF COVID-19 LOCKDOWN ON RESTAURANT BUSINESS IN PUDUCHERRY

DR. S. VAIDHEESWARAN AND MS. K. KALAIVANI

ABSTRACT
This study is intended to bring out the economic as well as social impact of Covid-19 lockdown on Restaurant
business firms at Puducherry city, which is one of the most popular tourist destinations in south India where a
variety of Restaurants are operated to cater the need of people visiting from other countries; states and also for
the local people. The research is descriptive in nature, proposed to assess the impact of Covid-19 by analysing
the challenges faced by the Restaurant owners during the pandemic lockdown; their perception about the effects
of Covid-19 lockdown and expectations on the future prospects of business post lockdown using the Primary
data collected through questionnaire. Appropriate statistical tools are used to analyse the collected data.
Conclusion and suggestions are made based on the major findings of the study.
Keywords: Impact of Covid-19, Pandemic Lock-down, Tourist Destination, Restaurant Business

INTRODUCTION
Hospitality and tourism industry has emerged as the most contributing service sector for the economic growth
of India due to its huge potential to preserve, retain and enrich our cultural heritages and also the ability to
unlock new panoramas for multi-socio cultural activities. It has a significant potential to generate employment
and also a considerable source of foreign exchange for the country. Our government takes several measures to
make India a global tourism hub. Puducherry has emerged as an important tourist destination especially for the
neighbouring states as those people use to visit the place during most of their weekends. Tourists across the
globe visit the City round the year because of its attractive features as it is a coalescence of cultural diversity.
But the things got changed due to Covid-19.
The impact of Covid-19 is hard felt by most of the business firms as well as common public worldwide. Due to
the curfew and enforced lockdown by the government in the pandemic period, many businesses got affected
especially in Hospitality and Tourism Industry. The hospitality and tourism industry had a severe impact in
India with the surge in the number of Covid-19 cases. The City’s main growth engine as occupancy at hotels
and resorts has dropped drastically during the lockdown period. The industry is facing a huge fall in revenue
due to mass cancellations of bookings by tourists and travel agents during the period of lock-down, the business
owners were enforced to shut down their businesses completely. The allied industries like restaurant industry
also had a severe impact due to the Covid-19 pandemic lockdown imposed by the government in various stages.
In the Covid-19 lockdown period, the Restaurant businesses were the worst hit at Puducherry city. There is a
need to analyse the economical; social as well as behavioural impact of Covid-19 on the Restaurant business
owners in this city. Hence the present study. This study paves the way for the government authorities to support
the industry post the Covid-19 lockdown for taking remedial measures to rectify the major problems faced by
the restaurant business owners to recover from their losses and to be back on track on their businesses.
REVIEW OF LITERATURE
1. Dube, K., Nhamo, G., & Chikodzi, D. (2020) in their research titled “COVID-19 cripples global restaurant
and hospitality industry” pointed out that the restaurant industry is a key socio-economic sector contributes
to the world economy to a greater extent but vulnerable during pandemic periods and economic downturns.
The study investigated the impact of Covid-19 on the global restaurant industry using Open Table and other
sources data found that due to the imposed lockdown by the government in many countries, the restaurant
industry ended up with huge loss of revenue and employment. Further the study recommends financial and
other support measures for the industry to get rid of these bad impacts of Covid-19 outbreak.
2. Lakshmi, B. M., & Shareena, P. (2020) in their research article “Impact of COVID 19 on the Restaurants”
mentioned that the corona virus affected the economy as a whole especially the hospitality industry where
the restaurant firms got affected economically. The study suggests that to keep the reputation, the restaurant
business owners have to importance to food quality and hygiene and expressed that taking care of health and
safety will play the key role during the post pandemic period along with the consideration of working capital
and technology.

689
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

3. Yang, Y., Liu, H., & Chen, X. (2020) in their research titled “COVID-19 and restaurant demand: early
effects of the pandemic and stay-at-home orders” represented a pioneering attempt to explore the economic
impact of Covid-19 on restaurant businesses in US countries and evaluated the early effects of Covid-19
pandemic disease. The result have shown a 1% increase in daily new Covid-19 cases led to a 0.056%
decrease in the daily demand of restaurant business while the demand for stay-at-home orders witnesses a
3.25% fall. The degree of these declines varied across regions, traditions, customs and habits and the effects
of Covid-19 pandemic were moderated by restaurant diversity. The results portray the flexibility of regional
restaurant industries towards Covid-19 outbreak and find the susceptible areas required for public policies
and managerial strategies for interference.
4. Abel Duarte Alanso et al., (2020) in their exploratory study “COVID-19, aftermath, impacts, and hospitality
firms: An international perspective” with a sample of 45 small sized hospitality businesses widens
knowledge about how the business owners managed the key concerns and undertaken the adjustments and
changes during Covid-19 pandemic period with nine theoretical dimensions. The study shows that financial
impacts and uncertainty were the predominant issues among the respondents where over one-third pointed
out that alternative measures are taken to create essential revenue streams and preparing themselves for the
post Covid-19 operational management. Moreover, nearly two-third of the respondents pointed out that they
have made necessary changes to the day-to-day running of the business to cope up with the changing needs.
5. Kim, J., Kim, J., & Wang, Y. (2021) in their first empirical study on the impact of Covid-19 on restaurant
industry titled “Uncertainty risks and strategic reaction of restaurant firms amid COVID-19: Evidence from
China” mentioned that globally imposed social distancing, self quarantine and restrictions in travel due to
Covid-19 have affected the restaurant industry. The study explored the factors affected the restaurant
business firms’ financial status for their sustainability amid the pandemic lockdown. This exploratory
research identified the positive impacts of the aspects of operational characteristics and brand effects as the
factors minimizing uncertainty amid pandemic restrictions.
6. Brizek, M. G., Frash, R. E., McLeod, B. M., & Patience, M. O. (2021) in their research titled “Independent
restaurant operator perspectives in the wake of the COVID-19 pandemic” assessed the attitudes and
perceptions of restaurant business owners corresponding to the economic and operational effects of Covid-
19 pandemic by utilizing a mixed methods approach when the restaurants were permitted to operate with
limited seating capacity for keeping social distancing. The results of the study indicate that one fourth of the
restaurants were unable to survive during the lockdown period; less than a quarter of the business firms were
unable to retain their employees and most of the respondents were favoured by the financial relief programs.
Nearly two third of the respondents didn’t feel that they could keep their business open if the pandemic
prevails.
7. Madeira, A., Palrão, T., & Mendes, A. S. (2021) in their study “The Impact of Pandemic Crisis on the
Restaurant Business” identified the perception of restaurant owners regarding the post pandemic business
prospects, government measures needed to support their businesses, lessons learnt during the pandemic
lockdown and the strategies going to be applied to uplift their business. They also concluded in their study
that creation of working capital and government remedial measures to rescue the operations during post
pandemic period are vital concerns for the restaurant entrepreneurs.
OBJECTIVES OF THE STUDY
1. To identify the challenges faced by the business owners of Restaurants during Covid-19 lockdown period.
2. To know the Perception and Expectation of the Restaurant Business Owners on the impact of covid-19
lockdown.
RESEARCH DESIGN
The present study is aimed to assess and analyze the impact of Covid-19 lockdown in the pandemic period on
the Restaurant businesses in Puducherry city where the Hospitality and Tourism Industry is the backbone of
state economy. As Puducherry is one of the major tourist destinations, the number of Restaurants, fast food
outlets and franchise operated hotels is over one thousand in the city alone. The number of independent
restaurants operated is nearly 300. To analyse the impact of covid-19 lockdown on Restaurant businesses,
descriptive research design has been used. The sampling unit is Restaurant Business Owners at Puducherry and
the sample size is 55. Based on the intended objectives, a well structured questionnaire was used to collect the
primary data from the respondents. The sampling method employed is simple random sampling. Simple
statistical tools like percentage method and weighted average method are used to analyse the primary data.
690
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Journals, newspapers and internet are the secondary data sources used. The study was undertaken during the
partial lockdown i.e. lockdown extended with relaxations period in the months of Feb to Apr, 2021.
MAJOR LIMITATION OF THE STUDY
The study was conducted with a limited sample size as the survey could be done only with the respondents who
were ready to provide information.
DATA ANALYSIS AND INTERPRETATION
Demography and Socio-Economic Factors
 Respondents own Multi-cuisine restaurants, fast food outlets, franchise restaurants and family restaurants
and the types of ownership are equally distributed among Individual Proprietorship, Partnership and
Franchise.
 One third of the respondents (32.72%) are in the age group of 31-40 and more than half of the respondents
are in the age group of above 40.
 Most (74.55%) of the respondents are married.
 58.18% of the respondents are either graduate or post-graduate.
 Half of the respondents (50.9%) are in the annual income group of less than 5Lakhs
 Two third (65.45%) of the respondents’ family size is 3 to 5
 83.64% of the respondents reported that their financial position got deteriorated due to Covid-19 lockdown
Challenges Faced By the Restaurant Business Owners
Table No.1 Challenges Faced due to Covid-19 Lockdown
Factors Frequency * Rank Weight Total Rank
Economic Impact with deep Financial Crisis 27*5 11*4 8*3 9*2 0*1 221 1
Lost Self Confidence 6*5 5*4 12*3 11*2 21*1 129 4
Criticisms faced affected Emotional Stability 7*5 17*4 21*3 6*2 4*1 182 3
Lost Family Support 1*5 3*4 3*3 25*2 23*1 99 5
Thought of Winding up Current Business as 14*5 19*4 11*3 4*2 7*1 194 2
key employees left the firm
Inference
The above table depicts that Economic Impact with deep Financial Crisis was the most challenging factor due to
Covid-19 lockdown for the respondents followed by Thought of Winding up Current Business, Criticisms faced
affected Emotional Stability, Lost Self Confidence and Lost Family Support.
Perception and Expectation of the Restaurant Business Owners:
Table No.2 Perception of the Restaurant Business Owners about the impact of covid-19 lockdown
S. No. Response Frequency Percentage
I. People’s changed mindset due to Covid threat questioned the sustainability of the Business
1 Strongly agree 11 20.0
2 Agree 18 32.7
3 Neither agree or disagree 12 21.8
4 Disagree 9 16.4
5 Strongly disagree 5 9.1
Total 55 100
II. Pandemic period has imposed more challenges in running the Restaurant business in post
Covid time
1 Strongly agree 18 32.7
2 Agree 14 25.5
3 Neither agree or disagree 9 16.4
4 Disagree 7 12.7
5 Strongly disagree 7 12.7
Total 55 100
III. Restaurant business got severe unfavorable impact as the Tourism and Hospitality Industry
691
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

was affected by Covid-19 lockdown


1 Strongly agree 17 30.9
2 Agree 18 32.8
3 Neither agree or disagree 12 21.8
4 Disagree 6 10.9
5 Strongly disagree 2 3.6
Total 55 100
IV. Running the business after this pandemic period has become a question mark as the Covid-
19 adversely affected every underpinning of the business
1 Strongly agree 16 29.1
2 Agree 15 27.3
3 Neither agree or disagree 12 21.8
4 Disagree 8 14.5
5 Strongly disagree 4 7.3
Total 55 100
V. Without any remedial measures from the government to support the industry, it will be
very difficult to sustain in the business in the long run
1 Strongly agree 20 36.3
2 Agree 13 23.6
3 Neither agree or disagree 12 21.8
4 Disagree 4 7.3
5 Strongly disagree 6 10.9
Total 55 100

Table No.3 Expectations of Restaurant Owners on the prospects of business during post lockdown
S. No. Response Frequency Percentage
I. People’s taste and preference will not change and the industry has good scope after
Covid-19 Pandemic
1 Strongly agree 7 12.7
2 Agree 23 41.8
3 Neither agree or disagree 14 25.5
4 Disagree 8 14.5
5 Strongly disagree 3 5.5
Total 55 100
II. Post Covid Opening up of Tourism and Hospitality Industry will pave the way for the
revival of Restaurant Businesses
1 Strongly agree 10 18.2
2 Agree 15 27.3
3 Neither agree or disagree 12 21.8
4 Disagree 9 16.4
5 Strongly disagree 9 16.4
Total 55 100
III. People’s desire to have entertainment and break monotonous will lead to the growth of
hospitality & tourism industry after the pandemic period
1 Strongly agree 15 27.4
2 Agree 13 23.6
3 Neither agree or disagree 14 25.5
4 Disagree 5 9.1
5 Strongly disagree 9 16.4
Total 55 100

692
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

IV. The Government will support our industry with tax subsidy for recovering the losses due
to covid-19 lockdown
1 Strongly agree 22 40.0
2 Agree 15 27.3
3 Neither agree or disagree 7 12.6
4 Disagree 5 9.1
5 Strongly disagree 6 10.0
Total 55 100
V. The Banks and Financial Institutions will provide loans at low interest rates to boost the
prospects of our business after the pandemic period
1 Strongly agree 8 14.5
2 Agree 17 30.9
3 Neither agree or disagree 11 20.0
4 Disagree 14 25.5
5 Strongly disagree 5 9.1
Total 55 100

FINDINGS
Challenges Faced by the Restaurant Business Owners during Covid-19 Lockdown:
 The Economic Impact with deep Financial Crisis was the most challenging factor during lockdown for the
respondents followed by Thought of Winding up Current Business, Criticisms faced affected Emotional
Stability, Lost Self Confidence and Lost Family Support.
Perception of the Restaurant Business Owners about the Impact of Covid-19 Lockdown:
 20% of the respondents strongly agreed and 32.7% of them agreed with the statement ‘people’s changed
mindset due to Covid-19 threat questioned the sustainability of the businesses.
 One third (32.7%) of the respondents strongly agreed and 25.5% of them agreed with the statement
‘pandemic period has imposed more challenges in running the Restaurant business in post Covid time’.
 30.9% of the respondents strongly agreed and one third (32.8%) of them agreed with the statement
‘restaurant business got severe unfavorable impact as the tourism and hospitality industry was affected by
Covid-19 lockdown’.
 29.1% of the respondents strongly agreed and 27.3% of them agreed with the statement ‘running the
business after this pandemic period has become a question mark as the Covid-19 adversely affected every
underpinning of the businesses.
 36.3% of the respondents strongly agreed and 23.6% of them agreed with the statement ‘without any
remedial measures from the government to support the industry, it will be very difficult to sustain in the
business in the long run’.
Expectations of Restaurant Owners on the Prospects of Business during Post Lockdown:
 41.8% of the respondents agreed and one fourth (25.5%) of them neither agreed nor disagreed with the
statement ‘people’s taste and preference will not change and the industry has good scope even after Covid
time’.
 27.3% of the respondents agreed and 21.8% of them neither agreed nor disagreed with the statement ‘post
Covid opening up of Tourism and Hospitality Industry will pave the way for the development of Restaurant
Businesses’.
 27.4% of the respondents strongly agreed and one fourth of them (25.5%) neither agreed nor disagreed with
the statement ‘people’s desire to have entertainment and break monotonous will lead to the growth of
hospitality industry after this pandemic period’.
 40% of the respondents strongly agreed and 27.3% of them agreed with the statement ‘the Government will
support Restaurant industry with tax subsidy for recovering the losses due to covid-19 lockdown’.
 30.9% of the respondents agreed and 20% of them neither agreed nor disagreed with the statement ‘the
Banks and Financial Institutions will provide loans at low interest rates to boost the prospects of our business
after the pandemic period’.
693
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

SUGGESTIONS
1. As most of the respondents had unfavorable impact on their restaurant business due to Covid-19 lockdown,
it is suggested the Government to fulfill all the expectations of the industry by taking remedial measures to
improve and support the business entities post Covid-19 lockdown period.
2. Government authorities may come up with moral boosting activities to support the restaurant industry as
most of the respondents are thinking of winding up their current business.
3. It is advised to the business owners to revisit their current business according to the need and expectations of
customers to sustain in the industry post pandemic. They may consider remodeling their businesses with
some innovative ideas to retain their customer back. They may also utilize the online food delivery platforms
to keep their business alive.
4. It is also advised the restaurant business owners to take care of the customers by focusing on safety and
hygienic aspects during post lockdown period.
CONCLUSION
This study is aimed to analyse the impact of enforced lockdown by the government in the pandemic period due
to Covid-19 on Restaurant Businesses in Puducherry, which is famous for Hospitality and Tourism where a
variety of Restaurants are run to cater the need of the people coming from various parts of the country as well as
the world.
It is observed from the study, most of the restaurant businesses witnessed considerable loss in their business due
to Covid-19 lockdown. The restaurant owners have faced many challenges and got affected economically as
well as psychologically. The respondents perceived the unfavorable impact of covid-19 on their restaurant
business caused by the panic mindset of people due to Covid outbreak; imposed lockdown by the government to
control the virus spread and impact of pandemic in allied businesses like tourism and hospitality industries at
the same time they expressed their hope through their expectations on people’s taste and preference towards
restaurant dishes, government initiatives and financial institutions support by taking remedial measures towards
the revival of the industry during post pandemic lockdown. Moreover if the suggestions provided are well
received by all the stakeholders, it is possible for the restaurant industry to be back on track in their business
during post Covid-19 pandemic.
REFERENCES
1. Alonso, A. D., Kok, S. K., Bressan, A., O’Shea, M., Sakellarios, N., Koresis, A., &Santoni, L. J. (2020).
COVID-19, aftermath, impacts, and hospitality firms: An international perspective. International journal of
hospitality management, 91, 102654.
2. Brizek, M. G., Frash, R. E., McLeod, B. M., & Patience, M. O. (2021). Independent restaurant operator
perspectives in the wake of the COVID-19 pandemic. International Journal of Hospitality Management, 93,
102766.
3. Dube, K., Nhamo, G., & Chikodzi, D. (2021). COVID-19 cripples global restaurant and hospitality
industry. Current Issues in Tourism, 24(11), 1487-1490.
4. Kim, J., Kim, J., & Wang, Y. (2021). Uncertainty risks and strategic reaction of restaurant firms amid
COVID-19: Evidence from China. International Journal of Hospitality Management, 92, 102752.
5. Lakshmi, B. M., & Shareena, P. (2020). Impact of COVID 19 on the Restaurants. Journal of
Interdisciplinary Cycle Research, 12(8), 1327-1334. Madeira, A., Palrão, T., & Mendes, A. S. (2021). The
Impact of Pandemic Crisis on the Restaurant Business. Sustainability, 13(1), 40.
6. Roy, S. (2020). Economic impact of Covid-19 pandemic. A Preprint, 1-29.
7. Yang, Y., Liu, H., & Chen, X. (2020). COVID-19 and restaurant demand: early effects of the pandemic
and stay-at-home orders. International Journal of Contemporary Hospitality Management.

AUTHOR DETAILS:
DR. S. VAIDHEESWARAN1 AND MS. K. KALAIVANI2
1
Associate Professor and 2Assistant Professor, Department of Management Studies, Manakula Vinayagar
Institute of Technology, Puducherry, India

694
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

APPLICATION OF DECISION TREE CLASSIFIER FOR CLASSIFYING THE PURPOSE OF


INVESTMENT

TANMAY GUPTA, RAVINDRA GHARPURE AND RAHUL MOHARE

ABSTRACT
This paper deals with the role of demographics in making investment with specific purpose.More specifically, it
examines the differences between a businessman, a professional of different age group, income group and
education’s influence on the investment purpose. We have used Decision Tree classifier for framing the decision
rules. Selected sample consist of 152 respondents across Maharashtrastate of India. The originality of this
research paper is guaranteed since it traits the impact of demographics on deciding the investment purpose.
This paper presents a model for improving the decision process while knowing the investment purpose. The
purpose of this model is to indicate the need for using methods such as the decision tree analysis in order to
evaluate the purpose of an investment.

INTRODUCTION
Investor’s decision analysis is majorly based on some preconceived concepts, major one is net present value and
payback of capital invested. When making an investment decision the investor has many different purpose. The
task of the investor is to choose one investment that will best accomplish the objectives of the investment
project. In the past few decades, people have become more and more interested in using data mining algorithms
to analyse and predict multiple financial markets, especially in some areas of financial market segmentation,
such as stock prices, exchange rates, financial distress, commodity price forecasts, etc. Although data mining
technology has been widely used in financial data analysis, due to the high complexity, rapid growth and large
amount of financial market data, effective analysis of financial data still poses greater challenges. The
continuous development of artificial intelligence technology, computer technology, and financial knowledge
model makes the realization of many complicated financial models or analysis and prediction methods become
simple and feasible. Due to the continuous development of information processing technology, complex
financial problems in the past have become easy to handle by establishing accounting models and methods.
Data mining is to find hidden in a large amount of data and valuable knowledge and information, artificial
intelligence technology is used by simulating specialist knowledge and logic for complex problem solvingand
reasoning ability, and these new techniques for financial analysis, accounting information system, and financial
intelligence provide powerful technical support. Using these technologies, an intelligent system of operation and
financial management analysis based on knowledge data can be established. The ideas and algorithms of these
technologies providenew ideas for the development of data mining and effectively deal with the problems that
are difficult or impossible to be dealt with by traditional statistical analysis and machine learning techniques,
especially the analysis and prediction of high-dimensional nonlinear random, dynamic or chaotic system
behaviour.
RELATED WORK
As financial dataset is always very large and building a universal model for classification of investment purpose
is usually impracticable and is not accurate. A lot of hybrid models for financial dataset are developed, e.g.
hybrid model includes,
Berzal et.al. uses rule learners, decision lists, decision tree and association rules. However it mainly replies on
nominal labels;
Carvalho DR et.al. uses decision tree and genetic algorithm based hybrid model. But it can only handle small
disjunct with a small number of training examples.
Min SH et.al. mixes genetic algorithms with SVM to optimize feature subset and parameters of SVM. However
SVMs can only handle numerical attributes and binominal labels;
Lee KC Integrates financial ratios, intellectual capital ratios and neural network. However it only involves
numerical ratios and it is not a common structure.
More importantly, they do not follow the financial dataset features, e.g. categorical attributes are summarized
concepts, whose rules are uncertain in classification task and can be missing due to record neglect or different
operational procedures. On the contrary, numerical data is usually taken from ETL devices and so they are
unified in one field. We thus need a common approach to minimize using nominal attribute logically and
695
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

seeking the optimal model for classification to help business instant decision making, e.g. credit risk analysis,
customer churn prediction, and house price rank instant notification, etc.
Decision Tree
The goal of building a decision tree is to learn a decision tree model based on a given training data set. The
construction process of decision tree is generally divided into three parts, namely feature selection, decision tree
production and decision tree tailoring. When constructing a decision tree, the regularized maximum likelihood
function is usually used as the loss function for model training, and the learning goal is to minimize the loss
function. The algorithm for constructing a decision tree usually selects the optimal feature through recursion,
and partitions the training data according to the feature. Decision tree models often have better classification
capabilities for training data, but in practice we are more concerned about the classification capabilities for
unknown data. Therefore, after the decision tree is built, it usually needs to be pruned, so that the decision tree
has better generalization ability as proposed by HSSINA et al. (2014).
Feature selection is performed to select features with strong classification ability. The classification ability is
generally characterized by information gain, information gain ratio or Gini index. Feature selection means to
select a feature from a number of features as the criterion for splitting the current node. The goal of attribute
selection is that after the data set is divided using a certain attribute, the order of each data subset is higher than
the order of the data set before the division, mentioned by Garc´ıa et al. (2009).
Each question asked by the decision tree is represented by a tree node and the possible answers to this question
are associated with branches emanating from the node. Each node defines a probability distribution on the space
of possible decisions. A node at which the decision tree stops asking questions is a leaf node. The leaf nodes
represent the unique states in the decision-making problem, i.e. all contexts which lead to the same leaf node
have the same probability distribution for the decision.
Application of Decision Tree in Financial Market
Decision trees have been widely used in financial markets for their simplicity and ease of use. The author used
decision trees obtained through the application of artificial intelligence strategies to classify the converted data,
analyzes and evaluates different decision trees, shows accuracy and emphasizes the relevance of capital gains
Mir-Juli et al. (2010). Based on the financial statement detection information and detection rules extracted from
the C4.5 decision tree algorithm, Tang et al. developed a knowledge based financial statement fraud detection
system to detect fraudulent activities in financial statements and discover hidden knowledge Tang et al. (2018b).
The trading strategy was used to evaluate the profitability of the term trading decision extracted from the
decision tree model Nasseriet al. (2015). Zhao et al. used decision tree algorithms to mine and explore the
financial business related data of sports industry enterprises, and conduct risk assessment through related
indicators. And by using the model to calculate the probability of risk occurrence and analyze the degree of
damage Zhao (2021).
Purpose of the Study
The purpose of this study is to determine if gender can really affect the Investment purpose. This study is aimed
to contribute to this field through surveying a very narrow target population, explicitly professionals and
businessman’s. Author’s main purpose is to gather knowledge about how gender affects the Investment
purpose. Author also aim to Explain gender differences towards decision making while ascertaining investment
purpose.
Present Research Work
Investing is critically important to achieving long-term financial goals—from saving for retirement to paying
for children’s college educations. That means any gender differences in this area would have massive
implications for equality and financial security, especially since women tend to live longer than men.
In general, men are more focused on wealth accumulation, while women are more focused on wealth
preservation. Women often have a “safety first” mentality, and are more likely than men to say they have lower
levels of financial knowledge (more than half of women agree they know less than the average investor about
financial markets and investing, compared to only 27% of men). As a result, women prefer to seek financial
help more often than men do, and they are more receptive to financial research and advice.
It is clear that men and women investors differ in their risk aversion, confidence, and preferences. This suggests
they will want different portfolio strategies.
After a thoughtful discussion with the focus group and going through various reports available on websites,
author discovers following observations
696
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Parameter Men Women


Holding Men hold 60%. Cash can feel more women hold 71% of all their assets in
Cash secure cash
Managing 60% of men say they’re confident only 52% of women say they’re
Investments about managing investments confident about managing investments
Taking Risk 21% of men were more inclined 29% of women were more inclined
towards reducing risks 6% men were towards reducing risks 2% women
interested in taking more risk were interested in taking more risk
Patient Men are 35% more likely to buy or Single women trade 27% less
Investors sell stocks than women frequently than single men
Table-1: Gender biased Investment comparison
Sampling
The participants in the survey were recruited using purposive sampling method. Businessman and professionals
were invited to participate in this survey, 177 respondents participated in this survey but the valid sample were
152.
Sample Size
Results of this survey are based on an online omnibus conducted among a demographically representative
investors who are either professional or businessman or businesswomen from Maharashatra state, India,a
sample of 152 adults comprising 80 men and 72 women,30 years of age and older. The survey was completed
during the period December 1-11, 2020 by the authors. The results of this survey may not be representative of
all adults meeting the same criteria as those surveyed for this study.
Demographic Details are as Below
Total Sample 152
Gender Male 80
Female 72
Age of Respondent Upto 20 4
20-40 80
40-60 47
above 60 21
Educational Qualification Under Graduate 10
Graduate 107
Post Graduate 22
Professional Degree 13
Occupation Business man 85
Professional man 67
Educational Qualification Under Graduate 10
Graduate 107
Post Graduate 22
Professional Degree 13
Annual Family Income Upto 5 lakhs 3
Rs 5 lakhs - Rs 10 lakhs 101
Rs 10 lakhs - Rs 20 lakhs 46
Above Rs 20 lakhs 2
Annual % Investment 0-10% 86
10%-20% 48
20%-30% 13
More than 30% 5
Purpose of Investment Dream House 9
Children's Future 67
Purchasing Car 10
Future Needs 5
World Tour 1
Self Future Needs 3
697
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Retirement Corpus 56
Family Future Needs 1
Risk Inclination Yes 43
No 119
Table-2: Response segregation
Method Applied
Author has used Orange 3.31(Open source data mining and visualization software) for classification. The output
is a decision tree classifier. A machine researcher named J. Ross Quinlan in 1980 developed a decision tree
algorithm known as ID3 (Iterative Dichotomiser). Later, he presented C4.5, which was the successor of ID3.
ID3 and C4.5 adopt a greedy approach. In this algorithm, there is no backtracking; the trees are constructed in a
top-down recursive divide-and-conquer manner, the Input and Output of this algorithm is mentioned as below
Inputs
Data: input dataset
Preprocessor: preprocessing method(s)
Outputs
Learner: decision tree learning algorithm
Model: trained model
Further to confirms the accuracy of the model authors had used Test and score widget which gives the accuracy
of decision tree classifies in five different pointers, mentioned as below
 Area under ROC is the area under the receiver-operating curve.
 Classification accuracy is the proportion of correctly classified examples.
 F-1 is a weighted harmonic mean of precision and recall.
 Precision is the proportion of true positives among instances classified as positive.
 Recall is the proportion of true positives among all positive instances in the data.
Using Decision Tree Classifier
Author has used orange for decision tree classifier, data was stored in to excel format, in all 9 variables were
considered, investment purpose were set as target variable and rest 8 variables were set as feature variables. All
the variables were of categorical type. To load the data file widget was used, data was then splitted using data
sampler widget followed by tree widget and output was seen through tree viewer widget, and the accuracy
was checked using test and score widget.
Two different data set were used, one for male respondents and other for female respondents. The different
output for male and female respondents are given below

Figure-1: Men’s Decision making process with respect to investment purpose

698
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Figure-2: Female’s Decision making process with respect to investment purpose


Checking the Accuracy of the Model
In order to test our model with regard to its predictive accuracy it seems quite intuitive to split data into a
training portion and a test portion, so that the model can be trained on one dataset, but tested on a different, new
data portion. Since we expect the model to perform well, given that all data points are already “known”. This is
exactly what the term overfit refers to. What we are interested in is, if the model is also capable of handling data
that has just been introduced — the test data. In orange the test data is generated using data Sampler widget,
and the accuracy is computed by using test and score widget, the screen shot of the computation is mentioned
as below.

Figure-3: Decision Tree Classifier Accuracy

699
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

From the above picture, it is clearly evident that the decision tree classifier is used over the test data to confirm
the accuracy of the data, and the Classification Accuracy(CA) is coming out to be 97.8%, which means that
decision tree classifier will predict the target variable correctly with 87.8% accuracy.
MAJOR FINDINGS
 65% of total male respondent’s investment purpose is securing there Children’s Future
 100% Male respondents, who don’t want to take risks and invest more than 30% of there income, will
definitely invest for thereChildren’s Future
 100% Male respondent’s who want to take risk and invest more than 10% of total income surely invest for
raising there retirement corpus
 61.1% of total female respondent’s investment purpose is securing there retirement corpus
 Irrespective of annual income a professional female who wish to take risk desires to invest for recuring her
retirement corpus
 Almost 75% businesswomen are inclined to invest for securing there children’s future
DISCUSSION & CONCLUSION
This study has indicated that investors’ experience in investment has been impacted by gender. Our study also
showcases that there is a major difference between a professional and businessman or businesswomen, when it
comes to gender. the results ofour study show that:
1. Businesswomen and professional women have entirely different investment purpose
2. All the males who want to take risks and invest only upto10% has varied investment purpose
3. Graduate women professionals of any age who want to take risks and invest upto 20% may think for there
children’s future
Women often build financial plans in terms of life goals for themselves or their families, rather than focusing on
performance alone. Women tend to hold a more long term, conservative view with their investments, tending to
buy and hold stocks, versus taking quick action during market fluctuations.
Women are more likely to have their savings allocated in a more age-based allocation of investments than their
male counterparts. In fact, looking specifically at Fidelity retirement savings accounts over the last three years,
the percentage of women allocated appropriately for their age has increased by approximately 40 percent.
Furthermore, fewer women have their savings fully invested in equities than men (which could represent too
much risk and not enough diversification); and women are more likely to invest in target date funds, ensuring
they are well diversified.
While men and women may have different approaches to financial decision making, it is important to engage
both men and women in a thoughtful discourse about investing. Identifying the right level and manner of
engagement can be invaluable in managing their investments toward identified goals.
REFERENCE/ FOOT NOTES
1. C. Xiang and B. Li, “Research on ship intelligent manufacturing data monitoring and quality control system
based on industrial internet of things,” The International Journal of Advanced Manufacturing Technology,
vol. 107, no. 3-4, pp. 983–992, 2020.
2. Berzal F, Cubero J-C, Sánchez D, Serrano J (2004) ART: A Hybrid Classification Model. Machine
Learning 54 (1):67-92. doi:10.1023/B:MACH.0000008085.22487.a6
3. Carvalho DR, Freitas AA (2004) A hybrid decision tree/genetic algorithm method for data mining.
Information Sciences 163 (1–3):13-35. doi:10.1016/j.ins.2003.03.013
4. Min S-H, Lee J, Han I (2006) Hybrid genetic algorithms and support vector machines for bankruptcy
prediction. Expert Systems with Applications 31 (3):652-660. doi:10.1016/j.eswa.2005.09.070
5. Lee KC, Han I, Kwon Y (1996) Hybrid neural network models for bankruptcy predictions. Decision
Support Systems 18 (1):63-72. doi:10.1016/0167-9236(96)00018-8
6. Hssina B, Merbouha A, Ezzikouri H, et al. (2014) A comparative study of decision tree ID3 and c4.5. Int
Journal of Advance Computer Science and Application
700
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

7. Garc´ıa S, Fern´andez A, Herrera F (2009) Enhancing the e_ectiveness and interpretability of decision tree
and rule induction classifiers with evolutionary training set selection over imbalanced problems. Appl Soft
Comput9: 1304–1314.
8. Michael, N. (2006). Large database decision tree classifiers; Decision Trees & Data Mining, March 2006
9. Mir-Juli M, Fiol-Roig G, Isern-Dey AP (2010) Decision trees in stock market analysis: Construction and
validation. In Trends Applied Intelligent Systems-international Conference on Industrial Engineering and
Other Applications of Applied intelligent Systems, 2010
10. Tang XB, Liu GC, Yang J, et al. (2018b) Knowledge-based financial statement fraud detection system:
based on an ontology and a decision tree. Knowl Organ 45: 205–219.
11. Al Nasseri A, Tucker A, de Cesare S (2015) Quantifying StockTwits semantic terms’ trading behavior in
financial markets: An effective application of decision tree algorithms. Expert SystAppl42: 9192–9210.
12. Zhao Y (2021) Sports enterprise marketing and financial risk management based on decision tree and data
mining. J HealthcEng2021: 1–8.
13. “Women and Investing: A Behavioral Finance Perspective.” Merrill Lynch report. December 2013.
14. https://time.com/nextadvisor/banking/
15. https://www.ml.com/women-financial-wellness-age-wave.html
16. https://www.wellsfargo.com/?wdr=1
17. https://newsroom.fidelity.com/press-releases/news-details/2017/Fidelity-Investments-Survey-Reveals-
Only-Nine-Percent-of-Women-Think-They-Make-Better-Investors-than-Men-Despite-Growing-Evidence-
to-the-Contrary/default.aspx
18. https://orange3.readthedocs.io/projects/orange-visual- rogramming/ en/ latest/ widgets/ evaluate/
testandscore.html

AUTHOR DETAILS:
TANMAY GUPTA1, RAVINDRA GHARPURE2 AND RAHUL MOHARE3
1
Research Scholar, RTM Nagpur University, Nagpur
2
Assistant Professor, CIBMRD, Nagpur
3
Assistant Professor, SRCOEM, Nagpur

701
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

CONSUMERS BUYING BEHAVIOUR TOWARDS ONLINE PURCHASE OF PHARMACEUTICAL


PRODUCT (MEDICINE) DURING COVID-19 PANDEMIC IN CHANDRAPUR AREA

DR. KAVITA HINGANE

ABSTRACT
The marketers adopt different strategies to aware the consumers about their offerings and to promote them
during Covid-19 Pandemic. Sales Promotion is one such strategy which is used by marketers to attract new &
prospective customers towards their products and retain the existing ones. It can be understood as short term
incentives aimed at accelerating sales by motivating the customers to make a purchase. Pharmacy have been
one of the most rapid growing markets not only in the world but also in India since last decade; to stay
competitive, pharmaceutical retailers should use effective sales promotions tools and that may be become a
vital technique for pharmaceutical retailers to stimulate consumer buying behavior towards purchasing
pharmaceutical product. The aim of research is to determine the impact of price discount sales promotion tools
in retail pharmaceutical sector, on consumer buying behavior which include customer loyalty and repurchase
intention.
Keyword: Pharmacy, Prospective Customer, Retailer, Customer Loyalty

INTRODUCTION
In the words of Blattberg and Neslin (1990), Sales Promotion is “an action-focused marketing event whose
purpose is to have a direct impact on the behavior of the firm’s customer.” It means that the techniques adopted
to influence the customer’s buying behavior are clubbed under Sales Promotion. Retail pharmaceutical market
is growing in a high velocity environment all over the world. All types of promotional activities are currently
used by retailers in order to be differentiated in the market. At the same time, competitiveness among retailers is
booming. The Sales Promotion tools directed towards the consumers are termed as Consumer Sales Promotion
while those directed towards re-sellers (distributors, retailers, wholesalers etc.) are termed as Trade Sales
Promotion. Commonly used consumer promotion tools are price discount, free sample, contest, bonus,
premium, in-store display etc. while invoice allowance, free goods, buy-back allowance, contests etc. are
common trade promotion tools. These tools are being used by marketers, retailers as well as manufacturers
since decades but due to increasing competition and aware customers it is very important to plan and execute
the marketing & promotion strategy effectively.
LITERATURE REVIEW OF RESEARCH TOPIC
There is abundant literature on Sales Promotion as well as on Consumer Behavior. Popular definitions of Sales
Promotion are given by Kotler, Blattberg & Neslin (1990), Kazmi & Batra, Institute of Sales Promotion, etc. In
a very comprehensive definition by Kotler (2002), “Sales promotion consists of a diverse collection of incentive
tools, mostly short-term, designed to stimulate quicker and/or greater purchase of particular products/services
by consumers or the trade”.
SALES PROMOTION
John and William (1986), the sales promotional marketing activities considered to be more efficient than
advertising publicity and personal selling. In addition to that other researchers considered sales promotion as a
direct inducement, proposing special added value for goods to target salesperson, customers or resellers
(William & Ferrell, 1987; Gardener & Treved, 1998).
CONSUMER BUYING BEHAVIOR
The impact of sales promotion on consumer buying behavior has been widely stated in many researches and
studies, they have shown that there are a lot of factors can effect consumer buying behavior, either to buy or not
(Nagar, 2009; Smelser and Baltes, 2001).
Nijs, Dekimpe, Steenkamps and Hanssens (2001), sales promotions have a huge impact on consumers buying
behavior such as purchase time, product brand, quantity and brand switching. Moreover, consumer purchase
decisions sometimes based on the price sensitivity, individuals are more attracted to promoted products
(Bridges, Briesch and Yim, 2006).

702
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

OBJECTIVES OF THE RESEARCH


After reviewing the relevant literature, the study will be conducted keeping in mind the following main
objectives.
1. To study the awareness level of customer towards online pharmaceutical product purchase
2. To identify the various online sales promotion techniques which influence the customers’ impulse buying
decision towards online pharmaceutical product purchase
3. To study the satisfaction level of customer with respect to online pharmaceutical product purchase
RESEARCH HYPOTHESES
The following hypothesis are formulated after a critical examination of various literatures had been performed,
all mentioned hypothesis were tested in order to achieve the targeted main and specific objective of this study.
1. Awareness level of customer has significant impact on consumer purchase decision towards online
pharmaceutical product purchase
2. The various sales promotion techniques have significant impact on consumer purchase decision towards
online pharmaceutical product purchase
3. Satisfaction level of customer has significant impact on consumer repurchase decision towards online
pharmaceutical product purchase
RESEARCH METHODOLOGY
The present research will be Quantitative research in nature and it will base on the measurement of quantity or
amount. The researcher will focuses heavily on quantitative research because it is useful to quantify opinions,
attitudes and behavior and find out how the whole population feels about a certain issue. Therefore, the
researcher will preferred the quantitative research strategy because the study needs to address the factors that
influence consumers’ buying behavior.
SAMPLING DESIGN
There are many sample design methods from which choose relatively more precise and appropriate for this
study. The samples will be a non-probability Random Sampling technique to which the prepared questionnaires
will be distributed to be filling in a self-administered manner.
SAMPLING UNIT
The target population in this research will be consumers who consume or buy online pharmaceutical product,
which will either men or women, aged 21 and more years old and have at least a foundational education.
SAMPLE SIZE
Sample Size for the research is 120 Respond and which is select randomly.
DATA COLLECTION & ANALYSIS
For this study the process of collecting information involves primarily by Questionnaire share with the target
population who will consume pharmaceutical product, who are either men or women, aged 21 and more years
old and have at least a foundational education on online platform. The population of this research are scattered
over a wide geographical area, and questionnaire is considered as the most feasible tool to reach them in the
given time period. Therefore, the use of questionnaire is relatively convenient and inexpensive in comparison to
other tools.
A Likert scale questionnaire was adopted from different previous study which provided customers with a
greatest range of option starting from strongly disagree to strongly agree and they were used as a primary data
collection instrument in this study.
Demographic Profile of the Sample Respondents
SR. Demographic Factor Sample Respondents Percentage Cumulative
NO. Percentage Frequency
1 Gender
Male 72 60 60
Female 48 40 100
2 Age
21-40 30 25 25
703
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

41-60 48 40 65
61 & above 42 35 100
3 Marital Status
Married 78 65 65
unmarried 42 35 100
4 Educational Qualification
Undergraduate 42 35 35
Graduate 60 50 85
Post Graduate 18 15 100
5 Occupation
Student 18 15 15
Housewife 12 10 25
Self Employed 30 25 50
Govt. Employee 30 25 75
Private Employee 30 25 100
Frequency of Shopping Medicine Online from the Pharmacy before COVID-19 Pandemic
Respondent Opinion No of Respondent Percentage Cumulative Frequency
Occasionally 72 60 60
Monthly 36 30 90
Weakly 12 10 100

From the above analysis a majority of the Respondent occasionally shopping medicine online from the
pharmacy before COVID-19 Pandemic, 30 percent of Respondent monthly shopping medicine online from the
pharmacy before COVID-19 Pandemic, 10 percent of Respondent weakly shopping medicine online from the
pharmacy before COVID-19 Pandemic
Frequency of Shopping Medicine Online from the Pharmacy during COVID-19 Pandemic
Respondent Opinion No of Respondent Percentage Cumulative Frequency
Occasionally 24 20 20
Monthly 84 70 90
Weakly 12 10 100

704
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

From the above analysis a majority of the Respondent are Monthly shopping medicine online from the
pharmacy during COVID-19 Pandemic, 20 percent of Respondent occasionally shopping medicine online
from the pharmacy during COVID-19 Pandemic, 10 percent of Respondent weakly shopping medicine online
from the pharmacy during COVID-19 Pandemic
Awareness Level of Customer towards Online Pharmaceutical Product Purchase
Respondent Opinion No of Respondent Percentage Cumulative Frequency
Yes 72 60 60
No 30 25 85
Neutral 18 15 100

From the above analysis a majority of the Respondent are aware about online pharmaceutical product purchase,
25 percent of the Respondent are not aware about online pharmaceutical product purchase, 15 percent of the
Respondent are neutral about online pharmaceutical product purchase.
Contactless Delivery of Medicines is a Reason of Influencing Consumer Preference for Buying Medicine
Online
Respondent Opinion No of Respondent Percentage Cumulative Frequency
Agree 84 70 70
Disagree 24 20 90
Neutral 12 10 100

From the above analysis a majority of the Respondent are agree with Contactless delivery of medicines is a
reason of influencing preference for buying medicine online. 20 percent of Respondent are disagree with
Contactless delivery of medicines is a reason of influencing preference for buying medicine online. 10 percent
Respondent neutral with Contactless delivery of medicines is a reason of influencing preference for buying
medicine online.

705
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Offer/ Discount is a Reason of Influencing Consumer Preference for Buying Medicine Online
Respondent Opinion No of Respondent Percentage Cumulative Frequency
Agree 78 65 65
Disagree 24 20 85
Neutral 18 15 100

From the above analysis a majority of the Respondent agreed with the offers / discount is a reason for
influencing preference for buying medicine online, followed by 20 percent of the Respondent who disagree
with the statement. Almost 15 percent of Respondent are neutral regarding discount/offer influencing
preference.
Customer Relationship Management in Pharmacy for Online Purchasing
Respondent Opinion No of Respondent Percentage Cumulative Frequency
Very Good 72 60 60
Good 30 25 85
Satisfactory 6 5 90
Not Satisfactory 12 10 100

From the above analysis a majority of the Respondent say that very good customer relation maintained in
pharmacy for online purchasing, followed by 25 percent of the Respondent say that good customer relation
maintained in pharmacy for online purchasing, 5 percent of the Respondent are satisfied with customer relation
maintained in pharmacy for online purchasing, 10 percent of the Respondent are not satisfactory with customer
relation maintained in pharmacy for online purchasing,
Satisfaction Level of Customer with Respect to Online Pharmaceutical Product Purchase
Respondent Opinion No of Respondent Percentage Cumulative Frequency
Very Good 66 55 55
Good 36 30 85
Satisfactory 12 10 95
Not Satisfactory 6 5 100
706
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

From the above analysis a majority of the Respondent experience very good with respect to online
pharmaceutical product purchase, followed by 30 percent of the Respondent experience very good with respect
to online pharmaceutical product purchase, 10 percent of the experience satisfactory good with respect to
online pharmaceutical product purchase, 5 percent of the Respondent experience not satisfactory with respect
to online pharmaceutical product purchase
FINDINGS AND CONCLUSIONS
Findings of this study useful for managerial implications for policy maker to take decisions in such kind of
future purchasing behaviour of consumers and appropriate sales promotional techniques to increased sales in
pharmaceutical retail business.
1. Majority of the respondent occasionally shopping medicine online from the pharmacy before COVID-19
Pandemic.
2. Majority of the respondent are monthly shopping medicine online from the pharmacy during COVID-19
Pandemic.
3. Majority of the respondent are aware about online pharmaceutical product purchase.
4. Majority of the respondent are agree with Contactless delivery of medicines is a reason of influencing
preference for buying medicine online.
5. Majority of the respondent agreed with the offers / discount is a reason for influencing preference for buying
medicine online.
6. Majority of the respondent say that very good customer relation maintained in pharmacy for online
purchasing.
7. Majority of the respondent experience very good with respect to online pharmaceutical product purchase.
Awareness level of customer has significant impact on consumer purchase decision towards online
pharmaceutical product purchase . These promotional techniques affect the buying behaviour of consumers.
Discount and Price reduction is well-known tool for offering a good reduction in purchase price and have a
great relationship with influence the buying behaviour of consumers towards online pharmaceutical product
purchase. Satisfaction level of customer has significant impact on consumer repurchase decision towards online
pharmaceutical product purchase.
REFERENCES
 Aaker, D. A. (1996). Measuring brand equity across products and markets . California Management
Review, 38 (1), 100-120
 Banerjee, S. (2009). “Effect of product category on promotional choice: comparative study of discounts
and freebies
 Chunnawala.S.A, & Sethia.K.C. (1994). Foundation of Advertising Theory and Practice. Mumbai:
Himalaya Publishing House.
 Cook, A. (2003). How to cash in on the coupon craze. Incentive Business. Incentive Business. .

707
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Gupta, S. (1988). Impact of Sales Promotions on When, What and How Much to Buy. Journal . Journal of
Marketing Research, 25, 342-355.
 Kothari, C. (2004). Research Methodology Methods and Techniques 2nd edition. . New Delhi: New Age
International (p) limited.
 kotler, p. (2002). Rethinking Marketing 2nd edition. Singapore: Prentice Hall.
 Krishna, A., & Zhang. (1999). Short- or long-duration coupons: the effect of the expiration date on the
profitability of coupon promotions. Management Science, 45(8), pp. 1041–1056. .
 Raghubir, P., & Corfman, K. (1999). When do price promotions signal quality?The effect of dealing on
perceived service qualit.
 Schiffman, L., & Kanuk, L. (2004). Consumer Behavior. 8th Ed. . New Delhi: Pearson Education.
 Schneider, L., & Currim, I. (1991). Consumer purchase behaviours associated with active and passive deal-
proneness. International Journal of Research in Marketing ;8(3), 205-222. .

AUTHOR DETAILS:
DR. KAVITA HINGANE
LKM Institute of Management Studies & Research, Kosara, Chandrapur

708
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

PHASE OF NATIONALIZATION OF BANKS IN INDIA

VIVEK KUMAR TIWARI AND DR. S. D. SHARMA

ABSTRACT
“It is not by augmenting the capital of the country, but by rendering a greater part of that capital active and
productive than would otherwise be so, that the most judicious operations of banking can increase the industry
of the country.”
– Adam Smith
The current examination has been coordinated to analyze close to money related execution and financial
extensiveness of public and private region banks. The Government of India (GOI) after independence adopted
planned economic development for the country. Nationalization was in accordance with the national policy of
adopting the socialistic pattern of society. Nationalization came at the end of a troubled decade. India has
suffered many economic as well as political shocks.
The major aim of most of the banks was to accommodate financial needs of industry and trade in that locality.
During this time, the banking services became the opportunity of big business firms & wealthy individuals.
Masses were denied banking services and easy credit. In India, Nationalization of banks was done in 2 phases.
The initial phase of nationalization commenced in the year 1955 when the former Imperial Bank of India
became the State Bank of India with the Act of parliament. During the year 1959, 7 subsidiaries were
nationalized & connected with SBI one by one. This heralded a new beginning in the banking system of India.
Keywords: Financial, Nationalization, Monetary, Progression.

INTRODUCTION
Banking structure accepts a critical part in working of the current monetary world. The advancement of trade
and industry, which contributes basically towards in everyday financial turn of events, depends earnestly on the
smooth movement of money through banks. The presence of amazing monetary structure thusly is basic for the
money related progression of a country; and the Indian monetary advancement story bounteously includes the
significance of a sound monetary system.
Stream of money or banking is reflected in references available in our old holy messages. The issue of money
crediting was extremely typical during the Vedic time span and during the hour of Mughal period local financial
backers accepted a fundamental occupation by advancing money for progressing new trade and business.
Further, the vendors of East India Company set up their own association houses at the ports of Bombay,
Calcutta and Madras (by and by Mumbai, Kolkata and Chennai independently) in seventeenth century to
perform trade and exchange works out, under which they similarly carried on the monetary associations.
NATIONALIZATION ERA
A critical development to control banking structure happened in 1948, when the RBI was nationalized and
transformed into the establishment totally moved by the GOI. Further, the Banking Regulation Act was passed
during 1949 which brought RBI vigorously affected by the public power and vested it with wide extent of
powers to coordinate and supervise business banks. Under this Act, it was ensured that none of the banks can
open another branch and no new bank can be set up without due approval and grant from RBI.
Further, with an objective of extending banking organizations, especially into commonplace regions, the
Imperial Bank of India was nationalized and was renamed as State Bank of India (SBI) in 1955. This bank was
offered powers to function as the essential representative to keep control over the monetary trades all through
the country and offer wide extent of organizations to nation and semi-metropolitan locales. As the objective was
augmentation of the bank, hence seven unique banks which were significant for illustrious states were
nationalized and made helpers of the State Bank of India From that point, as the solicitations of need regions,
restricted extension adventures (SSIs) were not being fulfilled, the GOI by passing a rule nationalized other
fourteen essential business banks on July 19, 1969. From 1969 to 1979, the 14 nationalized banks opened a
bigger number of than 21 thousand new bank working environments raising the number from 8262 to 30202
independently.

709
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Thusly, six additional business banks were given nationalized status in 1980 and before the completion of 1980
about 80% of the banks were vigorously affected by the public position. The fundamental place of bank
nationalization was to offer need to meeting the credit requirements of the borrowers from in invert region,
restricted degree organizations, and agriculture and admission region. The crediting objective of 33.3% of
supreme advances was described for need region crediting. All through the length from 1969-1984, banks gave
colossal number of organizations to its customers in country zones and set forth expansive endeavors to spread
bank workplaces for enacting the stores of customers and advancing it to borrowers from more delicate
fragment of the overall population.
After the second time of nationalization the public authority of India had the control more than 91% of the
monetary business of the country. The banks were as of now fit for serving the tremendous section of the people
for monetary improvement of the country Nationalization of banks happened into the thorough program of
branch augmentation, opening of saving records and need region advancing. Banking region showed basic
results during the seventies and eighties in accomplishing the objections set by the public position. Nationalized
banks were working in less genuine environment, with very few private and new banks around then, at that
point, and in this manner, during late eighties, social banking and customer support transformed into the issue of
stress in view of the un-caring mindset of bank staff and ordinary method of working of the banks. Long queues
at bank counters, delay inside legitimate cutoff points opportunity, and non-openness of designs were similarly
a bit of the issues which constantly lamented the customers. Also, the banks were crediting to advantaged class
for social banking, instead of helping the under-uncommon
During late eighties the portion of stores with nationalized banks began declining; till 1984 the nationalized
banks had a portion of 63.30% of all out stores, which dropped down to 62.75% by March 31st 1991 Besides,
some inner just as outer requirements of banks prompted low operational effectiveness, lacking capital base,
increment in NPAs, decline in benefits and unacceptable client care. The suggestions made by Narsimham
Committee in 1991, featured that Indian business banks were burdened with huge measure of NPAs and
accordingly banks went monetarily powerless. Accentuation on need area loaning, bank office development,
increment in foundation costs, decline in non-premium pay and store arrangement were some different elements
which influenced the productivity of nationalized banks The RBI took a few measures to guarantee security and
consistency of banks and urged them to assume a lead job in quickening the financial development.
CHANGE ERA
As to settings, Narasimham Committee-I introduced money related and financial region changes in 1991 with
an expect to make Indian monetary region more capable, strong and enthusiastic. The vital change measures
recommended by the Committee changed the appearance and potential outcomes of banking industry. The time
period between1992-97 saw different change gauges like reduction for conceivable later use necessities, capital
sufficiency norms, and freedom of advance expenses, further developing earnestness and invigorating of bank
the board.
In 1993, the public position offered licenses to seven new private region banks to propel the spirit of
competition and to widen the scope of banking in until recently stayed away from regions. The recognizable
among these banks were ICICI (Industrial Credit and Investment Corporation of India), GTB (Global Trust
Bank), HDFC (Housing Development Finance Corporation) and IDBI (Industrial Development Bank of India)
bank (Gauba, 2012). This development and speedy improvement in Indian economy reestablished the monetary
plan of the country. The critical provider towards this advancement was the monetary region; all region banks
specifically open region banks, private region banks and new banks. Despite 27 public region banks, 24 new
private region banks were added during 1993-1998. The total of business banks, banishing RRBs extended from
75 of each 1992 to 99 out of 1998 (Malli, 2011). Private region banks, which were broadly known as New
Generation all around educated banks, made monetary more genuine and customer cheerful. Improvement of
these banks brought public region banks out of vanity and made them more genuine (Vohra, 2011). Public
region banks were unparalleled in case of customer dedication, picture and customer heading, while new private
region banks were seen as more customer neighborly.
Progression and globalization of the Indian economy, concerning addition in the section of new banks and
private region banks opened new vistas for the improvement of banking structure in the country (Anita and
Singh, 2013). Despite of reformist developments, in the wake of banking region changes and section of actually
learned banks, gigantic degrees of mistreated were at this point restricted from formal money related
organizations net. Keeping in see the present circumstance it had gotten essential for banks to work for holding
the current customer base and work on the level of credit movement structure for updating the force of financial
710
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

thought. Since opportunity the public power had been taking various measures to expand banking in natural and
unbanked domains to hinder people getting from private money advance subject matter experts. Social
monetary game plans were made to move the point of convergence of business banks from specific banking to
mass keeping money with the fixation to develop new bank workplaces and spread monetary workplaces to
consolidate the unbanked into banking. In 2005, the Reserve Bank of India, with the powerful pilot project in
affiliation district of Pondicherry, formally introduced the game plan of financial thought. Mangalam town was
the main town in Quite some time to get an opportunity to have every single monetary office. Despite this RBI
released up KYC (Know Your Customer) norms for the customers to open record with yearly store of under
'0.05 million While inspecting financial fuse, the Rangarajan Committee (2008) recognized venture reserves,
progresses, assurance, recognize, and portions as the parts which choosing money related completeness.
CURRENT SCENARIO
As of now, banking in India is truly completely mature to give wide thing arrive at a great deal; in spite of the
way that the extension in specific spaces of provincial India is at this point a test for the private region and new
banks. As of now in any occasion 80% of the business is at this point intensely affected by open region banks
(Singh and Arora, 2011). Individuals overall and private region banks of India give expansive extent of banking
organizations specifically opening a speculation account, web banking, yielding advances, selling assurance,
giving stockpiling workplaces to moving money abroad thus. Each bank needs to work for satisfying the
customers who come from different classes of the overall population. Since latest few decades, due to
continuously genuine, drenched and staggering business environment, retail banks in various countries have
accepted customer big-hearted perspectives to defeat any hindrance among bank and the customer.
The present moment, there are 93 booked business banks in India and these consolidate 27 public region banks,
20 private region banks and 46 new banks. Private region banks have around 19975 branches and around 51490
ATMs in the country. All through the time span enormous turn of events and achievements have been seen by
present monetary plan of India. These have been attributed to the technique of expansion, re-affiliation, mix,
and approach of web and specifically to the creative changes which have changed the complete circumstance.
Wide exertion has been a striking achievement in Indian banking all through the past couple of many years.
Banking is by and by not simply confined to metropolitan networks; rather the monetary organizations are
coming to even the far off areas of the country. Banking organizations have moreover exhibited monster
improvement by offering wide extent of organizations.
OBJECTIVES
1. To research the impact of different organizations given by ATM relying upon customers satisfaction.
2. To find the critical deterrents in ATM banking and to suggest restorative methodology measures.
3. To recognize the opening between presumptions for customers and real organizations offered by banks.
4. To find out the impact of nationalization on banking sector and progress.
REVIEW LITERATURE
Shetty (1978) in his assessment on "Execution of Commercial Banks since Nationalization of huge Banks -
Promise and Reality" had included the level achieve by banks to achieve the objections chose during the
nationalization of banks. It was assumed that design of stores remained unaltered and credit -store extent
had shown no improvement over the period. Further, it was represented that common zones were
disregarded for opening of new branches.
Divatia and Venkatechalam (1978) proposed to make a composite document by pondering functional
usefulness and advantage of individual banks using factor assessment strategy. Complete 15 public region
banks were considered using eighteen pointers of effectiveness, advantage and social targets. The pointers
picked for the examination were parceled into effectiveness, social objectives and usefulness. The
eventual outcomes of the assessment uncovered that basic differentiation was found similar to social
responsibility, productivity and advantage.
Varghese (1983) took apart the advantages and usefulness of Commercial Banks in India for the period
from year 1970 to 1971 using working results, working edges, improvement yield on assets and spread
extents. The outcomes of the assessment uncovered that during the hour of study Statutory Liquidity Ratio
(SLR) and Cash Reserve Ratio (CRR) necessities of both Indian and new bank bundles were found to be
same. The immense yield differential between them gives a proof as for the declining proficie ncy of

711
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Indian banks. The examination contemplated that monetary course of action gauges taken by RBI
influenced the advantages and usefulness of Indian business banks during mid 1970s.
Chakravarthy Committee (1985) while commenting on the functional capability of banks conveyed the
view that the possibility of functional expertise of business banks in India is associated with various
perspectives specifically cost usefulness, advantage, need region pushes, customer organizations,
readiness of stores and credit association. The board additionally conveyed a need to introduce some part
of significant worth contention among banks. The 'controlled contention' was recommended by the board
in such way.
Chopra (1987) in her book named "Managing Profits, Profitability and Productivity in Public Sector Banking",
analyzed about the changing examples in advantage of picked public region banks. It was referred to in the book
that it is huge for banks to make frameworks for further developing advantage and moreover need to work for
diminishing the costs for better benefit.
Ojha (1987) in his paper discussed the effectiveness and efficiency of public region banks in India. Resulting
to pondering various markers of advantage and effectiveness the end was drawn in that with the addition
productivity almost no change was found in the efficiency of banks, however Indian banks exhibited low
productivity and advantage, when differentiated and International banks. It was suggested that more broad and
multi-dimensional procedure ought to be embraced to overhaul effectiveness and usefulness.
RESEARCH METHODOLOGY
Benefit is a fundamental pointer of monetary execution and it shows association between the yield and the
information sources used to make it (Bansal, 2010). Productivity of banking region, as raised earlier, is
critical for financial advancement of a country. It is acknowledged that strong and productive monetary
structure prompts faster money related turn of events (Singla, 2013). Disregarding the way that the
monetary region has acquired extraordinary ground in impacts yet there still are troubles and banks would
have to continually notice the same. Likewise, evaluation of execution has gotten critical for the banks
since it helps in protecting the monetary exercises from the constant risk related with capital market (Hays
et.al. 2009). Today, keeping an eye out for bank execution has gotten a supported subject for certain
accomplices, for instance, customers, examiners and the general populace. Different financial markets are
available to assess the money related show. Be that as it may, indisputably the main standards to choose
the likeness and adequacy of a money related affiliation are distinctive extent gauges like credit store
extent return on assets extent, net NPA to net advances extent, capital adequacy, asset quality, nature of
the board, etc In this assessment the extent measures have been used. These rating are for the most part
recognized for surveying execution of banks and other money related foundations.
In India, HSBC set the trend and set up the fundamental ATM machine in1987 in Mumbai. Later new private
region banks have begun to stand out in introducing ATMs unbelievably and the public region banks moreover
pursued the foundation of ATMs wherever on the country. As one completion of August 2016 the hard and fast
number of ATMs is 215,763 in the country. Public region Banks and State Bank bundle with around 144599
ATMs addressed 67% of the ATMs. The private region banks have 57198 ATMs addressing 26.5% of the
ATMs and the 0.46% (1004) ATMs are passed on by new banks and balance 12962 (6%) are WLAs presented
by NBFCs.1Nearly 200 million trades are arranged every month in NFS, of which 75 % are cash withdrawal
trades with a typical ticket size of Rs. 3,300/ - . The harmony 25% trades are non money related trades.
"Other than Cash Withdrawal and Balance Inquiry trades, before long, NFS supports other Value Added
Services (VAS) like Pin Change and Mini Statement through the ATMs. There are plans to grow the VAS, for
instance, Card-to-Card Transfer, Check Book Request, Statement Request, etc through the ATMs. Basically
every one of the ATMS in the country are fundamental for NPCI'S public financial switch (NFS) network
which energizes controlling of ATM trades through cover accessibility between the Bank's systems, therefore
enabling the ATM/charge cardholders of the country to utilize the organizations in any ATM of a related bank".
"Concerning/rules, simply banks were permitted by Reserve Bank of India (RBI) to set up Automated Teller
Machines (ATMs) as widened movement channels till June 2012. Banks accepted a critical occupation in
enabling ATM choice by customers and changing behavior frameworks in the space of individual banking. The
interests in ATMs have been used for transport of a wide grouping of banking organizations to customers across
the monetary business and stretched out the degree of banking to at whatever point, wherever banking through
interoperable stages given by the supported common ATM Network Operators/Card Payment Network
Operators. Though in June 2012, there had been very nearly 23-25 % year-on year advancement in the amount
712
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

of ATMs (90,000+), their association had been predominantly in Tier I and II core interests. So there was a need
to develop the compass of ATMs in Tier III to VI centers (request of centers as embraced under the Census of
India 2011).
Notwithstanding the banks' leading undertakings toward this way, much ought to be done. In like manner, the
RBI gave the principles on June,20,2012 to permit non-bank components melded in India under the Companies
Act 1956, to set up, have and work ATMs in India. Non-bank components that mean setting up, asserting and
working ATMs, would be started "White Label ATM Operators" (WLAO) and such ATMs are arranged "White
Label ATMs" (WLAs). They give the monetary organizations to the customers of banks in India, taking into
account the cards (charge/credit/paid early) gave by banks. The WLAO's work would be confined to getting of
trades of every one of banks' customers and subsequently they would need to set up specific accessibility with
the current endorsed shared ATM Network Operators/Card Payment Network Operators".
DATA ANALYSIS
The first ATM was established in Quite a while by HSBC Bank in 1987, yet it was bound to metropolitan urban
areas until 2000. The biggest number of clients was in huge urban communities, however the improvement of
parts of new private area banks in little urban areas expanded the compass of the ATM. These days, people
incline toward ATM exchanges as opposed to visiting a similar bank office..

The above table shows from what time-frame ATMs are utilized by clients of public and private area banks.
Throughout the most recent 10 years, just 20% of public area banks' clients have utilized ATM, while this figure
is 23.34% in private area banks. Of each of the 24% of public area banks' clients and 28 percent of private area
banks, the individuals who have begun utilizing ATMs in the previous two years are those.

CONCLUSION
The examination moreover took apart relative shopper faithfulness levels of public and private region banks.
The assessment of money related execution breadth of picked bank bundles was done dependent on
discretionary data accumulated over 10 years (2005-06 to 2014-15), since the legitimate start of financial
thoroughness in 2005-06. Diverse quantifiable systems like rate procedure, aggregated yearly improvement rate
and extent examination were applied to study and take a gander at the money related show and breadth of
picked bank social occasions. To obtain a comprehension into the level of shopper unwaveringness as to
organizations given by open and private region banks. An illustration of 900 customers from three northern
district states for instance Punjab, Haryana and Himachal Pradesh was picked for fundamental survey. A
particularly coordinated survey was used to assemble the data. Customer devotion was focused dependent on
various limits like feasibility, receptiveness, cost, impacts, constancy and compassion. Connection between the
picked limits and monetary factors for instance age, sex, enlightening ability, occupation, yearly compensation
and district was considered using chi square test.
The retail banking industry is confronting hardened contest and the current situation is that of natural selection.
Every one of the banks are attempting to extend their client base and are fostering their own drawn out
methodologies to remain on the lookout. To further develop the client administrations and relationship the
executives a significant number of the retail banks adjust data innovation that has helped in incorporating and
uniting banking activity. Contest in retail banking is expanding between the current players, from worldwide
players and even from the new contestants. Retail banks should adapt to the opposition by offering astounding
support through client direction for which can be accomplished through specialization.

713
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Retail banks in India are planning specific and modified items remembering their client section. To have the
option to up-sell and strategically pitch their items, retail banks need to keep a decent connection with their
customer section. The customer portion is sorted by the area of retail banks too like the metropolitan and rustic
regions. Methodologies are grown diversely for various portions. Retail banks execute fragment explicit channel
systems to foster superior by relocating customers to practical direct channel. Another technique embraced by
retail banks are the advancement of contact focus administrations and cycles for very good quality and low-end
clients. Retail banks are expanding their strategically pitching and up-scaling exercises for private financial
customers determined to build their client base and further develop their client connection. Item advancement is
another procedure applied by retail banks. The diverse customer fragments are offered different administrations
like protection or renting administrations.
SUGGESTIONS
1. Nationalization of banks is the process of converting a private stake into a public stake, essentially
increasing the government's share of the banking sector. The primary goal of this move was to reduce the
concentration of power and wealth in the hands of a few families who owned and controlled these financial
institutions.
2. Indian banking system has passed 51 years of Bank Nationalization successfully and if it has contributed
anything to the economy, then it has to be gaining self-sufficiency in food grains products and a massive
raise in financial inclusion. It has helped India to emerge as one of the greatest economies and its potential
being recognized around the globe.
REFERENCES
1. Vijayaragavan Iyengar (2009). 'Introduction to Banking Excel Books New Delhi
2. Bharath E, Dhananjaya K M, Anoop C.N., Raghavendra B. V., (2012) 'Automated Teller Machine (ATM)
Banking a User friendly' IJMBS Vol. 2, Issue 4, Oct - Dec 2012.
3. Adelowo Solomon Adepoju (2010) 'Challenges of Automated Teller M Usage and Fraud Occurrences in
Nigeria - A Case Study of Selected Banks in Minna Metropolis' Journal of Internet Banking and
Commerce, August 2010, vol. 15, no. 2
4. Adeoti, Johnson Olabode (2011) Automated Teller Machine (ATM) Frauds in Nigeria: The Way Out' J Soc
Sci, Vol-27(1), pp-53-58.
5. Alhaffa, Alaa and Abdulal, Wael, (2011) 'A Market-Based Study of Optimal ATM'S Deployment Strategy
International Journal of Machine Learning and Computing, Vol.1, No. 1, April 2011.
6. Austin, Granville (1999). Working a Democratic Constitution - A History of the Indian Experience. New
Delhi: Oxford University Press. p. 215. ISBN 0-19 565610-5"Social Controls, the Nationalization of Banks
and the era of bank expansion - 1968 to 1985". Reserve Bank of India. Retrieved 12 January 2015.
7. Bhosale, S.T., & Sawant, S. B., (2012) Security In E-Banking Via Card Less Biometric ATMs
International Journal of Advanced Technology & Engineering Research (IJATER) Volume 2, Issue 4, July
2012.
8. Bhosale, S.T., (2013) 'A Study on Usage of ATM Services in Sangli District International Journal of
Advanced Research in Computer Science and Software Engineering Volume 3, Issue 7, July 2013 ISSN:
2277 128X.
9. Bishnoi, Sunita, (2013) “An Empirical Study Of Customers' Perception Regarding Automated Teller
Machine In Delhi And Nor Integral Review- A Journal of Management p-ISSN : 0974-8032, E- ISSN :
2278-6120, Vol. 6 No. 1, June 2013, pp 47-60
10. Chandan, C.L. and Rajput, P.K. (2010), “Financial Performance Analysis of Commercial Banks: A
Comparision of Federal Bank, Dhanlakshmi Bank, and SBI”, Professional Banker, Vol. 8, No. 9, pp. 34-
44.
11. Chidambram R. M and Alamelu (2013), "Financial performance of Nationalised Banks", NICE Journal of
Business, Vol. 5, No. 2, pp. 67-79.
12. Das A.(2012), "Ownership Effects on Bank Performance: A Panel Study of Indian Banks”, Paper presented
at the Fifth Annual Conference on Money and Finance in the Indian Economy, Indira Gandhi Institute of
Development Research, Mumbai, January 30-February 1
13. Dewan & Seidmann, (2001) 'Usable Security and E-banking: Ease of Use vis-à-vis Security'.

714
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

14. Dhar S. K., Tanzina, Rahman., (2013) Case Study for Bank ATM Queuing Model IOSR Journal of
Mathematics (IOSR-JM) E-ISSN: 2278-5728,p-ISSN: 2319 765X, Volume 7, Issue 1 (May. - Jun. 2013),
PP 01-05 www.iosrjournals.org.
15. Gheeta, P., (2014) ‘Awareness of ATMS in India' Volume: 4, Issue: 3, Mar 2014, ISSN - 2249-555X.

AUTHOR DETAILS:
VIVEK KUMAR TIWARI1 AND DR. S. D. SHARMA2
1
Research Scholor and 2Professor, Maharishi University of Information Technology, Lucknow, U.P, India

715
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

EFFECTIVE USAGE OF HELLO PACKET AND TIME STAMP TOIMPROVE THE END-TO-
END DELAY

MUKUL RUSTAGI AND SURJEET

ABSTRACT
Mobile ad hoc networks (MANETs) are dynami- cally changing and self-configuring networks. Multipath
routing in MANETs has been extensively researched for providing fault-tolerance routing, quality-of-service
(QoS), and numerous other objectives due to their widespread use in many applications.. In this approach, the
path is selected based on the information collected of delay, contention and traffic load from the nodes using
proposed monitoring mechanism and the path preference probability. In this, hello packets have been used to
study its effects on network parameter. The authors have considered band- width, delay and hop count as the
QoS parameters along with the stability of node, number of hops and path preference probability factors.
Network Simulator 2 simulations demonstrate that the proposed technique is scalable and outperforms existing
algorithms under increasing traffic loads.
Index Terms— Hello Packet, Time Stamp and End to End delay.

I. INTRODUCTION
Mobile [1] ad hoc networks (MANETs) are being widely used for military applications, wearable devices,
rescue oper- ations and in places where there is no pre-installed infras- tructure. They are continuously changing
and selfconfigur- ing networks. It is challenging to employ multimedia and other complex applications on a
dynamic network without quality-of-service (QoS) restrictions.. QoS can be defined as a set of service
requirement that a given network should satisfy while transmitting packets from source to destination [1, 2].
The target with QoS-enabled routing is to find feasible path between source and destination that satisfies the
QoS requirements for each admitted connection. Multiple QoS restrictions make it challenging to build a path
because of potential conflicting values and race situations among different parameters. Most reactive protocols
are developed without taking QoS requirements into account for the path they generate. QoS routing for ad hoc
networks has been extensively studied.
In this paper, we propose Time Constrained Best Neigh- bour routing protocol (TCBN) by using hello
packets and time stamp parameter to reduce the end-to-end delay in network.
A. Hello Messages
Network [3] connectivity may be determined through the reception of broadcast control messages. Any
broadcast con- trol message also serves as a hello message, indicating the presence of a neighbor. A node
adds or updates the routing table entry for its neighbour when it gets a hello message from that neighbour. To
maintain connectivity, if a node has not sent any broadcast control message within a specified interval, a hello
message is locally broadcast. As a result, every time period sees the delivery of at least one greeting message..
Failure to receive any hello message from a neighbor for several time intervals indicates that neighbor is no
longer within transmission range, and connectivity has been lost.
B. Overhead Of Hello Packets
i) Routing Overhead: In data transmission participating node of the reactive protocol are continuously
engaged in the transmission of either data or control packet. They are responsible of both establishing and
maintaining the transmission line from the source to the target. This overhead not only uses up network
resources but also makes the network more congested. The reactive routing protocols like AODV the
possibility of link failure decides routing overhead. Regular broadcasting of hello packets results in the
checking of the status of neighbor nodes for the preservation of the transmission path. In this instance, a
node is always looking for backup pathways. This process not only increases network overhead but also
consumes energy.
ii) Hello Messages Drain Battery: Most focused challenge in Ad hoc networks is battery life as all nodes of
the mobile Ad hoc networks are battery operated so it is very necessary for effective transmission to
consume less power, due to unnecessary battery drain, existence of the node is demolished from the network
and transmission of hello packets is one of the major cause of this. A lot of research is proposed to manage
power of nodes of ad hoc networks. In an adaptive hello interval is proposed to decrease battery drain

716
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

through repression of needless Hello messaging.


iii) Improper Updates of Neighbor Table Information: The reason of broadcasting of hello packets is to
create the neighbor table so that when route break exists in peer of transmitting node the backup route came
into existence. Backup routing is utilized as a workaround at regular intervals, and neighbor tables are
employed to persist the data transmission. However, because the neighbor tables were not updated enough,
various flaws developed. In [1] the problem of route preservation due to improper working of hello packets
trans- mission is discusses and an improved AODV routing protocol is proposed to deal with the problem
of route maintenance To determine whether the broadcasting of hello packets is low or high in the network,
[4] describes how the rate of hello packet spreading relies on the number of neighbors it has.
C. Generating Traffic Connection and Random Movement of Nodes
A traffic-scenario generator script may be used to build up random TCP and CBR traffic connections between
mobile nodes. This traffic generator script, known as cbrgen.tcl, is located in ns/indep-utils/cmu-scen-gen.
Between wireless mobile nodes, it may be used to establish connections for CBR and TCP traffic. The type of
traffic connection (CBR or TCP), the number of nodes and the maximum number of connections that can be
established between them, a random seed, and in the case of CBR connections, a rate whose inverse value is
used to calculate the time interval between the CBR packets, must all be specified in order to create a traffic-
connection file.. So the command line looks like the following:
Ns cbrgen.tcl [-type cbr—tcp] [-nn nodes] [-seed seed] [-mc connections] [-rate rate]
In this we have created 20,40,60,80,100 respectively.
And for giving random node movement, the node- movement generator is available under ns/indep-utils/cmu-
scen-gen/setdest directory and consists of setdest.cc,.h and Makefile. The setdest programme from CMU
generated random numbers using the system-dependent /dev/random device and library methods initstate(). A
more portable random number generator (class RNG) is available in ns. In order to compile the revised
setdest.cc do the following:
1. Go to ns directory and run”configure” (you probably have done that already while building ns).
2. Go to indep-utils/cmu-scen-gen/setdest. Run ”make” , which first creates a stand-alone object file for
ns/rng.cc (the stand-alone version doesnot use Tclcl libs) and then creates the executable setdest.
3. Execute setdest with the inputs shown below:
. /setdest [-n numofnodes][— ppausetime][
− smaxspeed]
[-t simtime] [-x maxx] [-y maxy] ¿ [outdir/movement-file]
For 40 nodes these two commands will run as,
Ns cbrgen.tcl -type cbr -nn 40 -seed 1.0 -mc 8 -rate 4.0 ¿ cbr-40-test
./setdest -n 40 -p 2.0 -s 10.0 -t 200 -x 500 -y 500 ¿ scen- 40-test
D. Problem Identification
For Routing in the network, we would be requiring a routing protocol that would help us to forward the data
packets from source to destination successfully without much compromising with the network performance
parameters. Ad hoc On demand Distance Vector being a standard reactive routing protocol is capable of
handling almost every wireless network with relative ease but is not specific to MANETs as it lacks satisfactory
quality of service performance. Therefore, certain modifications are required to implement this protocol with
acceptable quality of service.
Our aim is to propose a different approach based on Hello Packet interval modifications and Time Stamp to
improve the on-demand route discovery and establishment procedure with least end-to-end delay in AODV.
II. RELATED WORK
The utilization of hello message in Local Connectivity Management (LCM) in various comparisons are used as
metric, for those ad-hoc routing protocols. The use of mathematical techniques to calculate the stability of the
linkages in ad-hoc networks has also been the topic of research.. The lifetime expectations of these methods
mainly depend on the choice of links we use. The principal developers of the AODV protocol, Perkins et al.[9],
provide a full explanation of the benefits and drawbacks of utilizing hello messages. The frequency

717
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

optimizations of hello messages remove all of its disadvantages and give its advantages, which are mentioned
in this page.
Lundgren et al. [10] evidence says that sometimes mismatch occur between the actual connectivity status and
the router due to unreliable implement action of hello message. The phrase "communication grey zones" refers
to this discrepancy. In these zones in spite of neighbors reach ability are sensed by hello message but the actual
data message cannot be exchanged between router and its neighbors. To, remove this drawback one such
routing protocol [5] called position-based routing protocols, are introduced. The presence and the current
position are indicated by these protocols.
To date, three solutions based on the PUF function have been proposed in the literature [9], [10], [11]. All
involve exchanging three messages between the sensors and the sinks. The general idea is as follows: first, the
sink sends a challenge to the sensor; then, the sensor answers the challenge to authenticate itself and at the
same time sends a challenge to the sink; finally, the sink answers the challenge of the sensor to authenticate
itself. After both the sensor and the sink have been authenticated, a secure channel can be set up between the two
entities to allow a secure communication. Unfortunately, these solutions are not satisfactory for two main
reasons: i) it takes three messages to perform the mutual authentication between a sensor and a sink. ii) after the
authentication, it is necessary to set up a secure channel for the communication, meaning that this is not
performed by the algorithm. The goal we are pursuing is to provide a protocol that is minimal in terms of
complexity, computing power and memory use and energy consumption. This can be achieved by
systematically authenticating all messages, i.e. having a mutual authentication after only two messages (the
minimum number of messages necessary to perform a mutual authentication) and ensuring that the
communication is secure without the need to set up a secure and/or virtual channel.
Each node in this broadcasts a quick hello message to announce their presence. On topology-based routing
protocols, GPS tracking is employed. The proposed method of wireless network communication [4] can be
extended for these types of protocols and the main focus, in these references is mainly on topology- based
routing protocol only.
III. Proposed Solution
A. OVERVIEW
The [5] reactive routing protocols of ad hoc network transmits hello packets to establish link connectivity
between two peer of nodes, this mechanism works well in structured networks where packet loss is less and the
handshaking between the nodes is performed, however when we employ this implementation in Ad hoc
networks it increases the burden of the protocol and degrades its performance. AODV (Ad hoc On Demand
Vector) reactive routing protocol was described in this paper. In this protocol, routes are only established when
they are requested, and the participating nodes, the originator, target, and forwarding nodes, keep track of the
data transmission in the form of routing tables without affecting the other nodes of the network. Once the
transmission is complete, the route is then marked as expired. Hello packets are also used in the implementation
to keep the network connected. To improve the protocol's performance, additional route maintenance
procedures such as backup routing and local repair for updating neighbor table entries are also used.
A [6] node receiving a control message updates its routing table. A key to the construction of the shortest path
by randomly wandering control messages is that the direction from which a control message came indicates the
direction of the source node of the message. Thus, a better (i.e., shorter) path is expected to be established by
increasing the probability that the neighboring node, from which the node receives a control message, is
chosen as the next-hop node of data packets whose destination is the source of the control message.
B. Route Reuest
The Figure 1. shows the network of sample of nodes on which AODV has beeen implemented.
Ad [7] hoc On demand Distance Vector (AODV) routing protocol is an on demand protocol where a route from
source to destination node is established before initiating data trans- mission. This route discovery is done using
a route request packet RREQ transmitted by source node to each of its neigh- boring node. The RREQ packet
consists of following fields: RREQ ID, Destination IP Address, Destination Sequence number, Source IP
Address, Source Sequence number and Hop Count. RREQ ID field provides a unique identification to the RREQ
packet which helps a node to determine whether that particular packet has been previously forwarded by it or
not. If the same RREQ packet has been previously forwarded then the node discards that packet which helps in
avoiding packet duplicity and route loop formation.

718
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

In [14] extension to this approach, we have made the use of hello packet and time stamp to improve the end-
to-end delay. In AODV, there are basically two methods to get the information about the neighboring node that
are hello packet and link layer detection. But by default it is not specified that which method AODV is going to
use for the same. Hence, we have specified hello packet to keep and update routing table for the neighbor node.
The reason behind taking the hello packet is that it provide facility of maintaining routing table of neighbor node
and also give the facility to retransmit the hello
Packet with specific interval of time i.e. HELLO PACKET INTERVAL.
There [16] is another variable available in AODV is TIME STAMP. This variable gives the information of
event occur- rence time. Now what happen is we associated time stamp with every transmission of hello
packet so that whenever it sends packet to each neighbor node, it can calculate time duration of whole
transmission ’Wt’ (acknowledgement time and transmission time of hello packet). As we are sending this every
second so it also covers the effect of movement of node. For every neighboring node it takes the average of Wt
and to update the average of whole time, it appends the forthcoming value of time. Hence, neighboring node
who is having the least value of Wt would get selected eventually decrease the whole End-to-End delay.
By default HELLO packets are enabled in AODV protocol. In NS 2 to disable the broadcasting of Hello
packets, some steps have to be taken which are as follows:
In aodv.cc, uncomment the line is as shown: ifndef AODV LINK LAYER DETECTION
htimer.handle ((Event*) 0);
ntimer.handle ((Event*) 0);
Endif // LINK LAYER DETECTION
Destination IP = Node IP; Hop Count = 0
Destination seq number = latest seq number for node Lifetime = HelloInterval * HelloLoss

Figure 1. Network of Sample Nodes


Hello [16, 18] packets consist of two attributes which are used to assume the connectivity of the network
HELLOINT- ERVAL and ALLOWEDHELLOLOSS. HELLOINTERVAL is
the number of milliseconds between successive transmission of hello packets and ALLOWEDHELLOLOSS is
the waiting time of maximum number of periods. HELLO-INTERVAL should wait before detecting the loss of
connectivity to a neighbor. The suggested value of HELLOINTERVAL is one second which shows the link
break is detected if hello message is not received from neighbor within two seconds of the last message. Each
node of the network keeps record of neighbor table for maintaining local connectivity about their neighbors.
Whenever node receives hello message from its neighbors, it verifies, the existence of route to that
neighbor node in neighbor table, if route is found it updates route information by updating lifetime of that
neighbors by HELLOINTERVAL

Table I Format of Fa
719
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table II Format of Ba
*ALLOWEDHELLOLOSS else node makes entry for that route in neighbor table, after making entry of that
route current node can consider this route for forwarding data packets.
C. Route Reply
Once a route has been established, the source node is responsible for keeping it operational as long as it is
required. Node movement has no overall impact; it just affects the routes that travel through that particular
node. The source node may rebroadcast an RREQ if it moves while a session is running and loses contact with
the subsequent hop of the route. However, if an intermediate station loses connectivity with its subsequent hop,
it starts a Route Error (RERR) message, broadcasts it to its predecessor nodes, and invalidates the destination's
record in the route table by setting the distance to infinity. Since routing information could still be needed after
a certain period of time, the record won't be deleted immediately.
The node upstream of the break, which is nearer the break's source, starts RERR. It spreads to all the locations
impacted. RERR lists all the nodes affected by the link failure i.e. nodes that were using the link to route
messages (precursor nodes). When a node receives an RERR, it marks its route to the destination as invalid by
setting distance to the destination as infinity in the route table. When a source node receives an RRER, it can
reinitiate the route discovery.
Let [13] FA and BA be the forward and backward ant agents. FA entails obtaining information on each link's
transmission latency, processing delay at each node, available capacity, and the number of hops made during the
D search.. The packet format of FA is shown in Table I. In [14] Table I, the path field refers to address of all the
nodes traversed from S to D.
In Table II, the BA packet format [14] is displayed. There are several routes to D if S receives various BA.S
selects nodes for data transmission that have the highest possible pheromone Value.
IV. SIMULATION RESULTS
A. Simulation Model and Parameters
Here [15, 17] we have used NS-2.35 simulator, for comparing the performance of the proposed Time
Constrained Best Neighbor (TCBN) and AODV protocol on various network parameters.
Simulation of AODV and TCBN have been done in NS2.35 for different number of nodes in the network to
improve end- to-end delay in network have been evaluated.
The simulation settings and parameters are summarized in Table III.
B. Results Analysis
The X-graph is a tool to create graphical representation of the simulation results. It is used to show the data
transmission rate.
C. End-To-End Delay
End-to-End [16, 17] delay on network refers to the time taken for a packet to be transmitted across a network
from source to destination device.
End-to-end-delay in networks comes from several sources including transmission delay, propagation delay,
processing delay and queuing delay.
Transmission Delay sometimes referred to as store-and-forward delay or packetization delay, is the time
needed to push every bit of a packet over the line. In other words, this is the delay brought on by the link's data
rate. The length of the packet determines how long the transmission will take, not the distance between the two
nodes. The bit length of the packet determines how long this delay is.

720
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table III. Simulation Parameters for TCBN


Propagation delay time it takes for the signal's head to get from the transmitter to the receiver is known as the
propagation delay. It may be calculated as the reciprocal of the relationship between connection length and
propagation speed across the particular medium.
Processing delay time it takes for routers to process the packet header is known as processing delay. A
significant contributor to network slowness is processing delay. In the course of processing a packet, routers
may look for bit-level transmission defects in the packet as well as determine its final destination. High-speed
routers often have processing delays of a few microseconds or less. The router sends the packet to the queue
after this nodal processing, where more delay may occur (queuing delay).
Queuing delay amount of time a job must wait before it can be completed is known as the queuing delay. It is
an important factor in network latency. Queuing delay in a switched network is the interval of time between the
call originator's signaling completion and the call receiver's reception of a ringing signal. Queues may develop
as a result of hold-ups at the call receiver servicing switch, intermediate switches, or the originating switch.
In order to simulate the performance, X axis contains the number of nodes and the Y axis contains the end to
end delay in terms of milliseconds. It is shown in Figure 2.

Figure 2. End-to-End delay of sample of nodes According to the obtained performance of the networks the
Suggested technique requires less time for data propagation than the conventional routing protocol under attack
conditions,
D. Proposed Routing Protocol
The implementation of the proposed Time Constrained Best Neighbour (TCBN) Routing Protocol is performed
in NS 2 environment. The generated trace files of the performance outcomes are evaluated. During results
evaluation the end to end delay, throughput is expected and compared with the tra- ditionally available routing
protocol. End-to-End Delay found to be significantly improved and the performance summaries of the
implemented integrated routing protocol is given using Table IV.

721
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table IV. Performance Summary of Results


V. CONCLUSION
Mobile ad hoc networks are one of the hot topics of research in the present computer science and networking
era. They are in an increased demand in areas where wired networking does not provide effective
implementation and functioning. The dynamic nature of the MANETs supports user mobil- ity and network
agility. But mobility is difficult to manage and associates with it many trade-offs amongst the network
parameters which significantly affect the performance of the network.
After Comparing End-To-End delay between AODV and Proposed TCBN as shown in Table IV to improve
performance of AODV on the basis of simulations undertaken using NS- 2.35 it has been observed that the
proposed approach presents better delay results than AODV. For 20 nodes proposed delay is 8.91% lesser than the
original AODV. However, for 40 nodes the delay is 3.01% lesser than AODV which is more than the
previous value. For 60 and 80 nodes the delay is 3.64% and 5.71% lesser respectively. In approach of route
discovery we have made the use of hello packet and time stamp to improve the end-to-end delay. Hello packet
provide facility of maintaining routing table of neighbor node and also give the facility to retransmit the hello
packet with specific interval of time. Time stamp gives the information of event occurrence time as we
associated time stamp with every transmission of hello packet so that whenever it sends packet to each neighbor
node, it can calculate time duration of whole transmission. Neighboring node with least value of Wt will get
selected and eventually that improve the end to end delay.
REFERENCES
[1] I.D. Chakeresand and E. M. Royer, ”The Utility of Hello Messages for Determining Link Connectivity”, in
Proceedings of the 5th International Symposium on Wireless Personal Multimedia Communications
(WPMC), Honolulu, Hawaii, pp. 504-508, October 2002.
[2] G. Wang, J. Cao, ”A novel QoS multicast model in Mobile Ad Hoc Networks”, Proc. 19th IEEE Int.
Parallel and Distributed Processing Symp, (IPDPS), 206b207b, 2005.
[3] D. Tang and M. Baker, ”Analysis of a Local-Area Wireless Network”, Proceedings of ACM MobiCom00,
pp. 110, August 2000.
[4] S. Mueller and D. Ghosal, ”Analysis of a distributed algorithm to determine multiple routes with path
diversity in Ad Hoc Networks. Third Int. Symp. on Modeling and Optimization in Mobile, Ad Hoc, and
Wireless Networks, pp. 277285, 2005.
[5] E. M. Royer and C. K. Toh, ”A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless
Networks”, IEEE Personal Communications Magazine, vol. 6(2), pp. 46-55, April 1999.
[6] C. Perkins and E. M. Royer, ”Ad-Hoc On-Demand Distance Vector Routing”, Proceedings of the 2nd IEEE
Workshop on Mobile Computing Systems and Applications, New Orleans, USA, pp. 90-100, February
1999.
[7] H. Lundgren, E. Nordstrom, and C. Tschudin, ”Coping with Communica- tion Gray Zones in IEEE 802.11b
Based Ad Hoc Networks”, Proceedings of the 5th ACM International Workshop on Wireless Mobile
Multimedia (WoWMoM’2002), Atlanta, Georgia, USA, pp. 49-55, 2002.
[8] T. K. Sarkar, J. Zhong and K. Kyungjunj, ”A survey of various propaga- tion models for mobile
communications”, IEEE Antennas and propagation magazine, vol 45(3), pp. 107-115, June 2003
[9] M. Ali and A. Shahrabi, ”Multipath routing in Mobile Ad Hoc Networks”, 16th IEEE Mediterranean
Electro technical Conf. (MELECON), pp. 749752, 2012.
[10] T. S. Rappaport, ”Wireless Communications: Principles Practice”, Prentice Hall, pp. 70-74, 1996.

722
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[11] F. Yang and S. Ling, ”Network coding-based AODV routing in MANET”, IEEE Int. Conf. on Information
Science and Technology, Wuhan, Hubei, China, pp. 337340, 2012.
[12] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, ”Wireless sensor networks: a survey”,
Computer networks, vol. 38(4), pp. 393422, 2002.
[13] T. Nowak, M. Hierold, A. Koelpin, M. Hartmann, H.-M. Troger, and J. Thielecke, ”System and signal
design for an energy-efficient multi- frequency localization system”, IEEE Topical Conference on Wireless
Sensors and Sensor Networks (WiSNet), pp. 5557, 2014.
[14] Y. S. Lee and H. S. Le, ”Mutual authentication in wireless body sensor networks (WBSN) based on
Physical Unclonable Function (PUF)”, The 9th International Wireless Communications and Mobile
Computing Conference (IWCMC), pp. 1314-1318, 2013.
[15] P. G. Hoolimath and M. Kiran, ”Optimized TERMITE: a bio-inspired routing algorithm for MANETs”,
Int. Conf. on Signal Processing and Communications (SPCOM), pp. 15, 2014.
[16] J. Bielefeldt and S. Chellappan, ”Sensor authentication incollaborating sensor networks”, 13th Annual
Mediterranean Ad Hoc Networking Work- shop (MED-HOC-NET), pp. 5562, 2014.
[17] Network Simulator. Available at http://www.isi.edu/nsnam.
[18] J. Long and C. Gao, ”Bridging the gap among actorsensoractor commu- nication through load balancing
multi-path routing”, J. Wirel. Commun. Netw., pp. 1-10, 2015.
[19] A. Nasipuri, S. R. Das, ”On-demand multipath routing for mobile ad hoc networks”,Proc. Eighth Int.
Conf. on Computer Communications and Networks, pp. 6470, 1999.

AUTHOR DETAILS:
MUKUL RUSTAGI AND SURJEET
Bharati Vidyapeeth’s College of Engineering, New Delhi

723
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

DATA SECURITY OF IOT DEVICES USING BLOCKCHAIN

SURJEET

ABSTRACT
The Internet of Things (IoT) paradigm is one in all the foremost promising innovations of information
technology. Though internet is deployed on a large-scale in many kinds of scenarios, including smart cities,
industrial IoT, Internet of Vehicles and so on, it’s more vulnerable because of constrained resources. The
standard client-server architecture yields many significant limitations to fulfill the securitydemands of IoT, such
as relying on the trusted server, incapability for time- sensitive applications and high data maintenance cost.
Blockchain is a decentralized platform in which each node stores a replica of the whole ledger. IoT security is
thought to be scaled via a mechanism called blockchain. However, it is still unclear exactly how blockchain
technology can be utilized in this way; there is still no general framework of leveraging the blockchain
technique for enhancing the security of IoT. Leveraging blockchain architecture in IoT still remains a
challenging research direction.
Keywords: Blockchain, Data security, Internet of things

1. INTRODUCTION
In [1] recent decade, internet of things (IoT) has emerged with a view to targeting further automation in systems
where all nodes, devices and sensor networks are interconnected. IoT has made life easier with smart
transportation, smart healthcare, smart agriculture and other smart city approaches. As billions of devices are
being connected to the continuously growing networks, security appears to be a serious concern in this arena.
Most of the devices are resource constraint and heavy cryptographic approaches and are difficult to
implement thereby. Recent research works show that employing blockchain seems to be a cure for security
concerns regarding IoT. Present IoT ecosystem can be a centralized system where devices are managed,
identified and authenticated centrally that raises the scalability issue. Therefore, blockchain provides a
distributed authentication and management system which will enforce the privacy and security also. Deviating
[2] from the centralized system, blockchain provides automotive security, authentication and trust management
in both distributed and decentralized IoT ecosystem. The following are the main goals of this survey:
• To analyze the requirement of blockchain for IoT security, privacy, integration andmanagement
• To discuss the prospects of using blockchain in IoT ecosystems
• To raise issues considering different scopes, limitations and future directions of utilizing blockChain in
sensor networks.
2. BLOCKCHAIN PROPERTIES
2.1 Blockchain Working Steps
1. Nodes [3] communicate with the blockchain network via a combination of private and public keys. The user
uses its own private key to digitally sign its own transactions, so can access the network via the general
public key. Each signed transaction is broadcasted by a node that makes the transaction
2. The transaction is then verified by all nodes within the blockchain network except the node that creates the
transaction. During any step, invalid transactions leads to discard the step. It is called verification.
3. Mining is third step within which every legitimate transaction is collected by the network nodes during a
set time into a block and implements a proof-of-work to seek out nonce for its block. Once a node
finds a nonce, it broadcasts the block to any or all participating nodes
4. Each node collects a newly generated block and confirms whether the block contains legal transactions and
declares the accuracy of parent block by utilizing the hash value. After the completion of confirmation,
nodes will add the block to the blockchain and apply the transactions to bring the blockchain up-to-date.
The projected block is rejected if the block is not confirmed. This ends the prevailing mining round.

724
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

2.2 Verification
Blockchain [4] technology ensures the elimination of the duplication issues by taking assistance from
asymmetric cryptography which contains a public and a private key. The private key is kept secret from other
nodes whereas the public key is shared among all other nodes. Moreover, the transaction is digitallysigned by a
node that makes the transaction which is broadcasted to the complete blockchain network. By using the
initializing node's public key to verify the signature, all receiving nodes will validate the transactions. The
transaction is verified by the verification of signaturewhich indicates the initializing node is not modified.
2.3 Secure Hash Algorithm 256
The [5] typical work needed is exponential within the variability of zero bits needed and confirmed by running
the hash algorithm. In an exceeding blockchain network, all nodes implement the work for each mining process
by increasing a nonce value within the block till a value is found that offers the block’s hash desired bits. Once
the system unit effort has been spent to satisfy the proof-of-work, the block can't be modified until not redoing
the work. Users may have the option to share information with third parties due to distributed IoT information
management capabilities of blockchain. The target is to provide a distributed information access model for IoT,
that ensures that user-data isn't assigned to centralized entities or corporations.

Figure1: Secure Hash Algorithm [5]


3. CHARACTERISTICS OF BLOCKCHAIN
Decentralization
In [6] centralized transaction processing environment, each transaction has to be validated through the
centralized trusted party that result into high-cost and low performance at the central point. In contrast to the
centralized IoT paradigm, the blockchain eliminates the requirement for a third party. Consensus algorithms in
blockchain are used to maintain dataintegrity and consistency.
Persistency
Once a transaction record is validated by a miner node (special nodes that validate the transaction) in a
blockchain network, its copy is broadcasted in the complete network and that record is not deleted or rollback
from entire blockchain.
Anonymity
In blockchain, nodes interact with the network employing a public key that addresses the node on the complete
blockchain network by keeping the real identities of the user as a secret.
Security
Asymmetric cryptography is used by blockchain to guard the whole network. Asymmetric or public key
cryptography contains two keys, one publickey and second private key. The public key is utilized by the node to
address blockchain in network and the private key is used by the node to sign the transaction that it initiates.
The identity of transaction creator node is verified by using its public key.
Scalability or More Addressing Space
Scalability is concerned with blockchain that contains 160-bit address space as compared to 128 bit in IPv6.
The ECDSA algorithm creates this 160-bits (Elliptic Curve Digital Signature Algorithm). Compared to IPv6,
blockchain has 4.3 billion more addresses.
Resilient Backend
Every distributed node within the blockchain IoT network maintains a replica of the entire ledger. This helps in
safeguarding the network from any potential failures and attacks.

725
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

High Efficiency
Since the transaction removes the involvement of the third party and will proceed in low-trust condition, the
time spent to verify a transaction are decreed whereas the efficiency is going to be increased.
Transparency
Changes made to public blockchain network are publicly viewable by all participants within the network.
Additionally, each transaction is immutable, which means it cannot be changed or erased.
Smart Contract
The smart contract is one among the most efficient aspects of the Ethereum introduced by Nick Szabo in 1994
[7]. Using smart contract programs are written with in which access rights and different policies are defined.
Many programming languages are supported by Ethereum to write smart contracts such as Solidity.
4. SECURITY NECESSITIES FOR IOT ISSUES
Data Privacy
Because [8] of a diversified integration of services and network, the info recorded on a device is susceptible to
attack by compromising nodes existing in associate IoT network. Additionally, a hacker can access the data
without the owner's consent.
Data Integrity
In a centralized client- server model, the attacker may gain unauthorized access to the network and alter or
change the original data or informationand forward it. For instance, X sends data to Y, Z the middle guy might
get data first and forward the data after modification to Y.
Third Party
A third centralized organization that collects and controls data in a centralized environment may exploit the data
or disclose to another party.
Trusted Data Origin
In IoT environment, it is difficult to know the origin of data and data might be altered during the transmission
by any intermediate.
Access Control
Access control is one of the main issue in IoT network. It is difficult to define in IoT network that which node
has the right to access and perform a different functionwith data.
Single Points of Failure
As all network data is maintained and certified by a central authority, the further expansion of centralised
networks for IoT-based infrastructure might expose single points of failure. The whole network is disturbed in
case of failure of any central point.
Scalability
IoT uses the internet to connect a lot of sensors and other devices for information exchange and a lot of
applications. It challenges the structure and therapid growth of the system to satisfy scalability needs.
Illegal Use of Personal Data
IoT devices are simply sensors and embedded chips that collect unique, crucial information and transmit it over
the internet. The obtained data is kept in a company's central database. This data exposes the personal
performance of users; confidentiality of users is at risk as firms might use the data illegally. An example of such
confidentiality misuse is PRISM Surveillance program.
Iot Network Information Sharing
The data gathered by IoT network devices are recorded distinctly for the purpose of study. Information sets may
include the network data load from IoT devices or their operational records. To substantiate, the efficiency of
tools and tests, open accessibility of information plays a significant role. So, whenever these information setsare
openly shared, their integrity is critical.
5. SOLUTIONS FOR IOT
Data Integrity
All [9] nodes in the peer-to-peer blockchain network have the same copy of the records. An initiator node signs
a transaction using its private key and delivers it to other nodes for validation whenever a transaction is started.
All additional miner nodes participate in the validation process and look for the nonce. The right to validate and
726
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

get a reward belongs to the node that discovers the nonce first. Moreover, the newly created block will be
broadcasted to all other nodes of the entire network. Once the record is loaded in blockchain it cannot be altered
or deleted.
Data Privacy
Blockchain [ 1 0 ] used to provide data privacy in a network. Nodes used for a particular purpose are
combined together to form a private network or sidechain. It is the duty of each sidechain to handle its own IoT
data. Participants in one sidechain are not permitted to participate in the validation of another sidechain. The
node must first register and join the sidechain network in order to access the consortium blockchain network's
data. Access control on the consortium blockchain prohibits illegal access.
Addressing Space
In comparision to 128 address space in IPV6, blockchain is having 160-bit address space. These 160-bits are
generated by ECDSA (Elliptic Curve Digital Signature Algorithm). Blockchain has 4.3 billion more addresses
than IPv6 thus providing more addressing spacing than IPV6 address.
Trusted Accountability
Every operation record must be uploaded to the blockchain network. This gives every operation an identity and
each operation is traceable. When an abnormal behavior is detected in an entity, blockchain will be used for an
additional investigation.
Fault Tolerance
Decentralized devices are less likely to fail accidentally because they rely on many separate components. The
loss of a single node has no impact on the network since the blockchain is a point-to-point decentralized
network where each device has the same copy of a record. So, blockchain prevents from a single point of
failure.
Trusted Data Origin
Each IoT device is given a unique id so that data may be tracked on the blockchain network. Data gathered from
a device is linked to its ID, and after data hash calculation, the data is sent throughout the network. This serves
as the foundation for reliable data origin.
Removing Third-Party Risks Blockchain technology makes the devices capable of performing operations
withoutthe intermediary or third party, thusmaking it risk-free from a third party.
Access Control
Programs for blockchain that establish access rights and other regulations may be created using smart contracts.
As an illustrative example, if a rule is applied, devices will switch to energy-saving mode when the counter hits
135
Illegal Use of Personal Data
The [11] usage of blockchain can prevent the unauthorized use of personal data since P2P (Peer to Peer) storage
systems on the blockchain can track and validate all activities made on data across IoT networks. The aim is to
deliver decentralized storage wherever operators can have command over their data as an alternative of any
centralized intermediary authority. So the privacy is more stretched to numerous levels where ‘Consortium
blockchan’ for IoT is proposed.
IOT Network Information Sharing
As the size of IOT network information sharing is increasing, thus the fundamental storage cost will also
increase. So information sets are kept in distant origins and a centralized server is preserved which will
lonely kept the references to these origins. Moreover [12]blockchain is used to keep RIM (Reference Integrity
Matrix) of information set. Due to the sheer immutability feature of blockchain and RIM's accessibility to all
IoT network devices in blockchain, RIM's fidelity was guaranteed. Every [ 1 3 ] time an obligatory Information
Set is taken from the origin, its Integrity can be confirmed by comparing its RIM being maintained on
blockchain.
6. CONCLUSION
This paper aims to present the review on blockchain and IoT and emphasised on issues linked to an IoT
atmosphere. IoT is the next emerging technology with the rise of high-speed network and intelligent network
devices. Unfortunately, IoT devices are less capable of self-defense and thus more vulnerable to attackers. In
this paper, different properties and characteristics of the blockchain network are highlighted in such an order to
remove the issues in IoT. Additionally, concerns that remain unresolved following blockchain adoption are
727
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

emphasized. Our aim is to practically implement blockchain properties on the internet of things for monitoring,
error discovery and automatic fault correction in high critical IoT systems. Moreover, simulation-based
performance assessment can be conducted to demonstrate the scalability and effectiveness of the blockchain-
based solutions. A blockchain-based solution may be developed to ensure the safety and secrecy of the data
stored in IoT devices because they are in easily accessible locations and are in fact under the control of an
adversary. Additionally, even if the device is available in reach to everyone, this will reduce the possibility that
the hardware and software will be hacked.
REFERENCES
[1] I. Yaqoob, E. Ahmed, I. A. T. Hashem, A. I. A. Ahmed, A. Gani, M. Imran, and M. Guizani, “Internet of
things architecture: Recent advances, taxonomy, requirements, and open challenges,” IEEE Wireless
Commun., vol. 24, no. 3, pp. 10–16, 2017.
[2] M. R. Palattella, M. Dohler, A. Grieco, G. Rizzo, J. Torsner, T. Engel, and L. Ladid, “Internet of things in
the 5g era: Enablers, architecture, and business models,” IEEE J. Sel. Areas Commun., vol. 34, no. 3, pp.
510–527, 2016. (a) Results at the object. (b) Results at the subject. Fig. 10. Access results after
misbehavior occurring for six times.
[3] L. D. Xu, W. He, and S. Li, “Internet of things in industries: A survey,” IEEE Trans. Ind. Informat., vol.
10, no. 4, pp. 2233–2243, 2014.
[4] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of things: A survey on
enabling technologies, protocols, and applications,” IEEE Commun. Surveys Tuts, vol. 17, no. 4, pp.
2347–2376, 2015.
[5] C. J. DOrazio, K. K. R. Choo, and L. T. Yang, “Data exfiltration from internet of things devices: ios
devices as case studies,” IEEE Internet Things J., vol. 4, no. 2, pp. 524–535, 2017.
[6] E. Bertino and N. Islam, “Botnets and internet of things security,” Computer, vol. 50, no. 2, pp. 76–79,
Feb. 2017.
[7] S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in internet of things:
The road ahead,” Computer Networks, vol. 76, pp. 146–164, 2015.
[8] J. Singh, T. Pasquier, J. Bacon, H. Ko, and D. Eyers, “Twenty security considerations for cloud-supported
internet of things,” IEEE Internet Things J., vol. 3, no. 3, pp. 269–284, June 2016.
[9] A. Ouaddah, H. Mousannif, A. A. Elkalam, and A. A. Ouahman, “Access control in the internet of things:
Big challenges and new opportunities,” Computer Networks, vol. 112, pp. 237 – 262, 2017.
[10] A. Yavari, A. S. Panah, D. Georgakopoulos, P. P. Jayaraman, and R. v. Schyndel, “Scalable role-based
data disclosure control for the internet of things,” in 2017 IEEE 37th International Conference on
Distributed Computing Systems (ICDCS), June 2017, pp. 2226–2233.
[11] Q. Liu, H. Zhang, J. Wan, and X. Chen, “An access control model for resource sharing based on the role-
based access control intended for multi-domain manufacturing internet of things,” IEEE Access, vol. 5, pp.
7001–7011, 2017. 11
[12] N. Ye, Y. Zhu, R.-c. Wang, R. Malekian, and L. Qiao-min, “An efficient authentication and access control
scheme for perception layer of internet of things,” Applied Mathematics & Information Sciences, vol. 8,
no. 4, p. 1617, 2014.
[13] S. Bhatt, F. Patwa, and R. Sandhu, “Access control model for aws internet of things,” in International
Conference on Network and System Security. Springer, 2017, pp. 721–736.

AUTHOR DETAILS:
SURJEET
Bharati Vidyapeeth’s College of Engineering, New Delhi

728
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

EXTENSION OF SRIVASTAVA 𝛕 -HYPER GEOMETRIC FUNCTION

AMARNATH KUMAR THAKUR* AND SHAILENDRA KUMAR SAHU

ABSTRACT
There are many well knows special functions such as gamma function, Beta function and Gausses hyper
geometric function and so on play important roles and their applications. In this paper we will extend triplet to
quadruple to the quadruple to the 𝐻𝐵 Srivastava’s hyprgeomertic function and we introduce in the new form as
𝜏 𝜏 𝜏 𝜏 𝜏 𝜏 𝜏 𝜏
𝐻𝐵1 2 3 4 Srivastava’s quadruple 𝜏- hyper geometric function. Also we present some properties of the 𝐻𝐵1 2 3 4
Srivastava’s quadruple 𝜏- hyper geometric function.
Keywords: - Srivastava’s hyper geometric function; integral operators; Recurrence relations.

1. INDRODUCTION :- The classical gamma function Γ(x) is defined on



Γ(x) = ∫0 t x−1 e−t dt ……………………… (1.1)
And Beta function B (x, y) of the two variables complex variable x and y are defined as
1
B(x, y) = ∫0 t x−1 (1 − t)y−1 dt ………………… (1.2)
Srivastava’s [1, 4, 5] the existence of three additional complete quadruple hypergeometric functions of the third
order of which HB in defined as
p q
xm n
1 x2 x3 x4
HB [α, β1 , β2 , β3 ; γ1 , γ2 , γ3 ; x1 , x2 , x3 ] = ∑∞
m,n,p,q(α)m+p (β1 )m+n (β2 )n+p m! n! p! q!
…… (1.3)

(|x1 | < 𝑟, |x2 | < 𝑠, |x3 | < 𝑡, |x4 | < 𝑢, 𝑟 + 𝑠 + 𝑡 + 𝑢 = 1 + 𝑡𝑢).


Here (λ)n is the Pochhammer symbol is defined by
Γ(λ+n) 1 n=0
(λ)n = = {(λ)(λ ……… (1.4)
Γ(λ) + 1) … … … . . (λ + n − 1)(nϵN)
Where Γ being well – known Gamma functions (1.1).
In 2001 Virchenko ef.al. [30, 31] studied τ - hypergeometric functions:
Γ(c) (a)n Γ(b+τn ) zn
2Rτ1 (a, b, c, d) = 2R1 (a, b, τ; z) = Γ(b) ∑∞
n=0 Γ(c+τn ) n!
…….…….. (1.5)

They give the Euler type integral representation as follows


1 1
2R1 (a, b, τ; z) = ∫ t b−1 (1 − t)(−b−1) (1 −
B(b,(−b)) 0
zt τ )−a dt …… (1.6)

The special case when τ = 1 in (1.5) and (1.6) give the familiar representations of Gauss’s hypergeometric
functions [7, 8, 18].
Furthermore, Al- Shammery and Kalla [4] introduced and studied various properties of second τ- Appell’s
hypergeometric functions as:
(α)m1+m2 Γ(β1 +τ1 m1 )Γ(β2 +τ2 m2 ) xm 1 m2
τ ,τ Γ(γ )Γ(γ ) 1 x2
F21 2 [α, β1 , β2, γ1 , γ2 ; x1 , x2 ] = Γ(β1 )Γ(β2 ) ∑∞
m1 ,m2 =0 … (1.7)
1 2 Γ(γ1 +τ1 m1 )Γ(γ2 +τ2 m2 ) m1 ! m2 !

The interested reader may be referred to several recent papers on the subject [10, 16, 18].
The special case when τ1 , τ2 = 1 in (1.7) give the familiar representations of Appell’s hypergeometric function
[4, 5, 14, 17, 18].
By the some concept oguz yagci [18] introduced τ - Appell’s hypergeometric functions as:
m m p
τ ,τ2, τ3 Γ(γ1 )Γ(γ2 )Γ(γ3 ) ∞ (α) Γ(β +τ m+n)Γ(β2 +τ2 n+τ3 p) x1 1 x2 2 x3
F31 [α, β1 , β2, γ1 , γ2 , γ3 ; x1 , x2, x3 ] = ∑m,n,p=0 m+p 1 1
Γ(β1 )Γ(β2 ) Γ(γ1 +τ1 m1 )Γ(γ2 +τ2 m2 )Γ(γ3 +τ3 p) m1 ! m2 ! p!
…… (1.8)

729
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The interested reader may be referred to several recent papers on the subject [10, 16, 17]. The special case when
τ1 , τ2 , τ3 = 1 in (1.8).
However, recently there has been an increasing interest in and widely extended use of partial equation and
systems of fractional order. As better models of Phenomena of various physics, engineering, automatization,
biology and biomedicine, chemistry, earth science and so on.
The extensions of a number of well known special functions were investigated recently by several authors
specially [1-3, 6-9, 18].
τ ,τ2 ,τ3 ,τ4
Here, our aim to introduce HB1 Srivastava’s quadruple τ - hypergeometic functions.
After, we will present some properties of this function such as integral representations, partial differential
equation, derivative formula and recurrence relations.
τ ,τ ,τ ,τ
2. The Srivastava’s HB1 2 3 4 quadruple τ - Hypergeometric function. By adding parameters τ1 , τ2 , τ3 , τ4
τ ,τ ,τ ,τ
to a known HB (α, β1 , β2 , β3 ; γ1 , γ2 , γ3 ; x1 , x2 , x3 ) Srivastava Hypergeometric function, now HB1 2 3 4
(α, β1 , β2 , β3 ; γ1 , γ2 , γ3 ; x1 , x2 , x3 ) Srivastava’s triple τ – hypergeometric function defined as
HB [α, β1 , β2 , β3 ; γ1 , γ2 , γ3 ; x1 , x2 , x3 ] =
(α) Γ(β +τ m+Γτ2 (n+p)Γ(β2 +τ2 n+τ3 p+τ4 q) xm n p q
Γ(γ1 )Γ(γ2 )Γ(γ3 )Γ(γ4 ) ∞ 1 x2 x3 x4
∑m,n,p,q=0 m+p 1 1 ………... (2.1)
Γ(β1 )Γ(β2 ) Γ(γ1 +τ1 m)Γ(γ2 +τ2 n)Γ(γ3 +τ3 p)Γ(γ4 +τ4 q) m! n! p! q!

τ1 , τ2 , τ3 , τ4 > 0; |x1 | < 𝑟, |x2 | < 𝑠, |x3 | < 𝑡, |x4 | < 𝑢, 𝑟 + 𝑠 + 𝑡 + 𝑢 + 2√rstu = 1.
The special case where τ1 , τ2 , τ3 = 1 in (2.1) give the familiar representations of Srivastava’s HB triple
hypergeometric function [4, 5, 13, 15, 16].
τ ,τ2 ,τ3 ,τ4
2.1. Integral representation HB1 Srivastava’s Hypergeometric function.
τ ,τ2 ,τ3 ,τ4
In this sector we give some representation of HB1 Srivastava’s quadruple τ- hypergeometric function.
Theorem 2.1:- The following integral representations hold true
HB [α, β1 , β2 , β3 ; γ1 , γ2 , γ3, γ4 ; x1 , x2 , x3 ]
∞ ∞
1 τ ,τ ,τ
= ∫ ∫ t α−1 s β1 −1 e−t−s F τ1 (−; γ1; ts τ1 x4 )ϕ22 3 4 (β1 ; γ2 ; γ3 ; γ4 : sx2 ; tx3 , ux4 )dtds
Γ(α)Γ(β1 ) 0 0
…………… (2.2)
(τ1 , τ2 , τ3 , τ4 ) > 0, 𝑅(x2 ) < 1, 𝑅(x3 ) < 1, 𝑅(x4 ) < 1, 𝑅(α) > 0, 𝑅(β1 ) > 0
τ ,τ ,τ
Where ϕ22 3 4 is use of the confluent forms of τ- Appell series in two variables defined by [4].
τ ,τ3 ,τ4 (β2 )τ2 n+τ3 p+τ4 q (sx2 )n (tx3 )p
ϕ22 (β2 ; γ2 , γ3 , γ4 ; tx3 , ux4 ) = ∑∞
n,p,q=0 . n! ………… (2.3)
(γ2 )τ2 n (γ3 )τ3 p p!

(𝜏1 , 𝜏2 , 𝜏3 ) > 0, 𝑅(𝑎) > 𝑅(𝑏) > 𝑅(𝑐) > 0)


and
𝜏 ,𝜏2 ,𝜏3 ,𝜏4
𝐻𝐵1 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 ]
∞ ∞ ∞ ∞
1 𝜏 𝜏 𝜏
= ∫ ∫ ∫ ∫ 𝑡 𝛼−1 𝑠 𝛽1 −1 𝑣 𝛽2 −1 𝑒 −𝑡−𝑠 𝑜𝐹1 1 (−; 𝛾1 ; 𝑡𝑠 𝜏1 𝑥1 )𝑜𝐹1 2 (−; 𝛾2 ; 𝑠𝑣 𝜏2 𝑥1 )𝑜𝐹1 3 (−; 𝛾3 ; 𝑡𝑣 𝜏1 𝑥3 )
𝛤(𝛼)𝛤(𝛽1 )𝛤(𝛽 2) 0 0 0 0
𝜏
𝑜𝐹1 4 (−; 𝛾4 ; 𝑢𝑣 𝜏4 𝑥4 )𝑑𝑡𝑑𝑠𝑑𝑣𝑑𝑢 ……………. (2.4)
(𝜏1 , 𝜏2 , 𝜏3 , 𝜏4 ) > 0, 𝑅(𝑥2 ) < 1, 𝑅(𝑥3 ) < 1, 𝑅(𝛼) > 0, 𝑅(𝛽1 ) > 0 .
Proof: - By the equation (1.4) in (2.4) we get
𝜏 ,𝜏2 ,𝜏3 ,𝜏4
𝐻𝐵1 [𝛼, 𝛽1 , 𝛽2 , 𝛽3 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 ]

1 𝛤(𝛼 + 𝑚 + 𝑝 + 𝑞)𝛤(𝛽1 + 𝜏1 𝑚 + 𝑛)(𝛽2 )𝜏2 𝑛+𝜏3 𝑝+𝜏4 𝑞 𝑥1𝑚 𝑥2𝑛 𝑥3𝑝 𝑥4𝑞
= ∑
𝛤(𝛼)𝛤(𝛽1 ) (𝛾1 )𝜏1 𝑚 (𝛾2 )𝜏2 𝑛 (𝛾3 )𝜏3 𝑝 𝑚! 𝑛! 𝑝! 𝑞!
𝑚,𝑛,𝑝,𝑞=0

730
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Replacing the value 𝛤(𝛼 + 𝑚 + 𝑝 + 𝑞) and 𝛤(𝛽1 + 𝜏1 𝑚 + 𝑛) from the equation (1.1), the desired result can be
obtained. Thus, the similar way can easily get (2.4).
The special case shall (𝜏1 , 𝜏2 , 𝜏3 , 𝜏4 ) = 1 in (2.2) and (2.4) give the familiar representation of Srivastava’s 𝐻𝐵
quadruple hypergeometric function [21-23]. Also, the special case of (2.3) when (𝜏2 , 𝜏3 , 𝜏4 ) = 1 in such to yield
the confluent hypergeometric function [18, 20, 22, 23, 24].
Theorem. (2.2). The following representation hold true:
𝜏 ,𝜏2 ,𝜏3 ,𝜏4
𝐻𝐵1 [𝛼, 𝛽1 , 𝛽2 , 𝛽3 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ] =
1 1 𝛼−1 𝜏 ,𝜏 ,𝜏 ,𝜏
∫ 𝑡 (1 − 𝑡)𝑠−𝛼−1 𝐻𝐵1 2 3 4 [𝑠, 𝛽1 , 𝛽2 , 𝛽3 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ]𝑑𝑡 ….. (2.5)
𝐵(𝛼,𝑠−𝛼) 0

(𝜏1 , 𝜏2 , 𝜏3 , 𝜏4 ) > 0, 𝑅(𝑥2 ) < 1, 𝑅(𝑥3 ) < 1, 𝑅(𝛼) > 0


𝜏1 ,𝜏2 ,𝜏3 ,𝜏4
𝐻𝐵 [𝛼, 𝛽1 , 𝛽2 , 𝛽3 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ] =
1 1 𝜏 ,𝜏 ,𝜏 ,𝜏
𝐵(𝛽1 ,𝑠−𝛽1 ) 0
∫ 𝑡𝛽1 −1 (1 − 𝑡)𝑠−𝛽1 −1 𝐻𝐵1 2 3 4 [𝛼, 𝛽1 , 𝛽2 , 𝛽3 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ]𝑑𝑡 ….. (2.6)

(𝜏1 , 𝜏2 , 𝜏3 , 𝜏4 ) > 0, 𝑅(𝑥2 ) < 1, 𝑅(𝑥3 ) < 1, 𝑅(𝛽1 ) > 0


𝜏1 ,𝜏2 ,𝜏3 ,𝜏4
𝐻𝐵 [α, 𝛽1 , 𝛽2 , 𝛽3 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ] =
1 1 𝛽 −1 𝜏 ,𝜏 ,𝜏 ,𝜏
∫0
𝑡 2 (1 − 𝑡)𝑠−𝛽2 −1 𝐻𝐵1 2 3 4 [𝛼, 𝛽1 , 𝑠, 𝛽3 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ]𝑑𝑡 ….. (2.7)
𝐵(𝛽2 ,𝑠−𝛽2 )

(𝜏1 , 𝜏2 , 𝜏3 , 𝜏4 ) > 0, 𝑅(𝑥2 ) < 1, 𝑅(𝑥3 ) < 1, 𝑅(𝛽2 ) > 0


𝜏 ,𝜏2 ,𝜏3 ,𝜏4
𝐻𝐵1 [𝛼, 𝛽1 , 𝛽2 , 𝛽3 ; 𝛾1 , γ2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ] =
1 1 𝑠−1 𝜏 ,𝜏 ,𝜏 ,𝜏
∫ 𝑡 (1 − 𝑡)𝛾1 −𝑠−1 𝐻𝐵1 2 3 4 [𝛼, 𝛽1 , 𝛽3 , 𝑠, 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ]𝑑𝑡
𝐵(𝑠,𝛾1 −𝑠) 0
……. (2.8)

(𝜏1 , 𝜏2 , 𝜏3 , 𝜏4 ) > 0, 𝑅(𝑥2 ) < 1, 𝑅(𝑥3 ) < 1, 𝑅(𝛾1 ) > 0


𝜏 ,𝜏2 ,𝜏3 ,𝜏4
𝐻𝐵1 [𝛼, 𝛽1 , 𝛽2 , 𝛽3 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ] =
1 1 𝑠−1 𝜏 ,𝜏 ,𝜏 ,𝜏
∫ 𝑡 (1 − 𝑡)𝛾2 −𝑠−1 𝐻𝐵1 2 3 4 [𝛼, 𝛽1 , 𝛽2 , 𝑠, 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 ]𝑑𝑡
𝐵(𝑠,𝛾2 −𝑠) 0
…….. (2.9)

(𝜏1 , 𝜏2 , 𝜏3 , 𝜏4 ) > 0, 𝑅(𝑥2 ) < 1, 𝑅(𝑥3 ) < 1, 𝑅(𝑥4 ) < 1, 𝑅(𝛾2 ) > 0
𝜏 ,𝜏2 ,𝜏3 ,𝜏4
𝐻𝐵1 [𝛼, 𝛽1 , 𝛽2 , 𝛽3 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ] =
1 1 𝑠−1 𝜏 ,𝜏 ,𝜏 ,𝜏
∫ 𝑡 (1 − 𝑡)𝛾3 −𝑠−1 𝐻𝐵1 2 3 4 [𝛼, 𝛽1 , 𝛽2 , 𝑠, 𝛾2 , 𝑠; 𝑥1 , 𝑥2 , 𝑥3 , 𝑡 𝜏4 , 𝑥4 ]𝑑𝑡
𝐵(𝑠,𝛾3 −𝑠) 0
…….. (2.10)

(𝜏1 , 𝜏2 , 𝜏3 , 𝜏4 ) > 0, 𝑅(𝑥2 ) < 1, 𝑅(𝑥3 ) < 1, 𝑅(𝑥4 ) < 1, 𝑅(𝛾3 ) > 0
𝜏 ,𝜏2 ,𝜏3 ,𝜏4
𝐻𝐵1 [𝛼, 𝛽1 , 𝛽2 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ] =
1 1 𝑠−1 𝜏 ,𝜏 ,𝜏 ,𝜏
∫ 𝑡 (1 − 𝑡)𝛾4 −𝑠−1 𝐻𝐵1 2 3 4 [𝛼, 𝛽1 , 𝛽2 , 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑡 𝜏4 , 𝑥4 ]𝑑𝑡
𝐵(𝑠,𝛾4 −𝑠) 0
…… (2.11)

(𝜏1 , 𝜏2 , 𝜏3 , 𝜏4 ) > 0, 𝑅(𝑥2 ) < 1, 𝑅(𝑥3 ) < 1, 𝑅(𝛾4 ) > 0


𝜏 ,𝜏2 ,𝜏3 ,𝜏4 1 1 1
𝐻𝐵1 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ] = 𝐵(𝛽,𝛾 −,𝛽 )
∫0 ∫0 𝑡 ,𝛽2 −1 𝑢,𝛽2 −1 (1 − 𝑡)𝛾4 −𝛽2 −1 (1 −
2 4 2
𝑡𝑢 𝜏 1
𝑢)𝛾3 −𝛽2 −1 (1 − 𝑢𝜏2 𝑥2 )−𝛽2 (1 − (1−𝑢)𝑥3 )−𝛼 2𝐹1 1 [(𝛼,𝛾𝛽1; ; 𝑡𝑢 𝜏 )]𝑑𝑡𝑑𝑢
1 (1−𝑢𝜏2 𝑥2 )𝜏1 )[1−( ) 4 𝑥4 ]
1−𝑢
…………. (2.12)
(𝜏1 , 𝜏2 , 𝜏3 , 𝜏4 ) > 0, 𝑅(𝑥2 ) < 1, 𝑅(𝑥3 ) < 1, 𝑅(𝛽2 ) > 0, 𝑅(𝛾3 − 𝛽2 ) > 0
𝜏 ,𝜏2 ,𝜏3 ,𝜏4
𝐻𝐵1 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ] =
1 1 1 1 1
∫ ∫ ∫ ∫ 𝑡𝛽2 −1 𝑢𝛽2 −1 𝑣 𝛽1 −1 𝑤 𝛽1 −1 (1 − 𝑡)𝛾4 −𝛽2 −1 (1 −
𝐵(𝛽2 ,𝛾4 −𝛽2 )𝐵(𝛽2 ,𝛾3 −𝛽2 )𝐵(𝛽2 ,𝛾2 −𝛽2 )𝐵(𝛽1 ,𝛾1 −𝛽1 ) 0 0 0 0
𝑡𝑢
𝑢)𝛾3 −𝛽2 −1 (1 − 𝑣)𝛾2 –𝛽2 −1 (1 − 𝑤)𝛾1 –𝛽2 −1 (1 − 𝑢𝜏2 𝑥2 )−𝛽1 (1 − (1−𝑢)𝜏4 𝑥4 ))−𝛼 (1 −
𝑥1 𝑣 𝜏1 −𝛼
𝑡𝑢 𝜏 ) 𝑑𝑡 𝑑𝑢 𝑑𝑣 𝑑𝑤 ………. (2.13)
(1−𝑢𝜏2 )𝜏1 (1−( ) 4 𝑥4 )
1−𝑢

(𝜏1 , 𝜏2 , 𝜏3 , 𝜏4 ) > 0, 𝑅(𝑥2 ) < 1, 𝑅(𝑥3 ) < 1, 𝑅(𝛽1 ) > 0, 𝑅(𝛽2 ) > 0, 𝑅(𝛾4 − 𝛽2 ) > 0 .

731
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Proof: - From the above equation (1.4) and (2.1) we have


𝜏 ,𝜏2 ,𝜏3 ,𝜏4
𝐻𝐵1 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ] =
(𝑠)𝑚+𝑝 (α)𝑚+𝑝 (𝛽1 ) 𝜏1𝑚+𝑛 (𝛽2 )𝜏2𝑛+𝜏3 𝑝+𝜏4 𝑞 𝑥1𝑚 𝑥2𝑛 𝑥3𝑝 𝑥4𝑞
∑∞
𝑚,𝑛,𝑝,𝑞=0 ……… (2.14)
(𝑠)𝑚+𝑝 (𝛾1 )𝜏1𝑚 (𝛾2 )𝜏2𝑛 (𝛾3 )𝜏3𝑝 𝑚! 𝑛! 𝑝! 𝑞!

Let us consider the following equality and using definition of the beta function in equation (1.3),
(𝛼)𝑚+𝑝 𝐵(𝛼+𝑚+𝑝,𝑠−𝛼)
(𝑠)𝑚+𝑝
= ………….. (2.15)
𝑩(𝜶,𝒔−𝜶)

The equation (2.5) in obtained.


Thus, we can easily can find the equation (2.6) – (2.11) in similar ways. Putting the following equality (1.6),
1
𝛼, 𝛽; 𝑥 1
2𝐹1 ( )= ∫ 𝑢𝛽1 −1 (1 − 𝑢)𝛾−𝛽−1 (1 − 𝑢𝜏 𝑥)𝑑𝑢
𝛾 𝐵(𝛽, 𝛾 − 𝛽) 0
Into (2.11), we get the required result (2.12).
The special case by putting (𝜏1 , 𝜏2 , 𝜏3 , 𝜏4 ) = 1 in (2.5) – (2.12) give the similar integral representations of
Srivastava’s 𝐻𝐵 quadruple hypergeometric function [12, 13, 16].
Theorem (2.3) The following Euler integral representation hold true:
𝜏 ,𝜏2 ,𝜏3 ,𝜏4
H𝐵1 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ]
1
=
𝐵(𝛽1 , 𝛾1 − 𝛽1 )𝐵(1 − 𝛾1 + 𝛽1 , 𝛾2 − 𝛽1 − 1)𝐵( 𝛽2 , 𝛾3− 𝛽2 )𝑩( 𝛽2 , 𝛾4− 𝛽2 )
1 1 1 1
𝛾1 + 𝛾2 −𝛽1 +2
∫ ∫ ∫ ∫ 𝑢𝛽1 −1 𝑣 𝛽1 −𝛾1 𝑤 𝛽2 −1 (1 − 𝑢)𝛾1 −𝛾4−𝛽1 + 𝛽2 (1 − 𝑣)𝛾1 + 𝛾2 −𝛽1 +2 (1 − 𝑤))
0 0 0 0

(1 − 𝑥1 𝑢𝜏1 − 𝑥4 𝑋 𝜏4 )−𝛼 (1 − 𝑥2 𝑣 𝜏2 )−𝛽1 𝑑𝑢𝑑𝑣𝑑𝑤𝑑𝑥


(𝜏1 , 𝜏2 , 𝜏3 , 𝜏4 ) > 0, 𝑅(𝛾1 − 𝛽1 ) < 0, 𝑅(𝛽1 )> 1, 𝑅(𝛾1 + 𝛾2 − 𝛽1 ) > 1, 𝑅(𝛽2)> 1 .
𝜏 ,𝜏 ,𝜏 ,𝜏
Proof: - Form the definition of 𝐻𝐵1 2 3 4 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ] Srivastava’s triple 𝜏 -
hypergeometric function (2.1) and the second 𝜏 -Appell’s hypergeometric function (1.7). We get
𝜏 ,𝜏2 ,𝜏3 ,𝜏4
𝐻𝐵1 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ]

(𝛽1 )𝑛 (𝛽2 )𝜏 2𝑛 𝜏1 𝜏4 𝑥2𝑛
=∑ 𝐹2 [𝛼, 𝛽1 + 𝑛, 𝛽2 + 𝜏2 𝑛; 𝛾1 , 𝛾4 , 𝑥1, 𝑥4 ]
(𝛾2 )𝜏2𝑛 𝑛!
𝑛=0
………… (2.17)
From [4], we have the following equation:
𝜏 ,𝜏
𝐹2 1 4 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 ; 𝑥1 , 𝑥4 ] =
1 1 1
∫ ∫ 𝑡𝛽1 −1 𝑠 𝛽2 −1 (1 −
𝐵[(𝛽1 ,𝛾1 −𝛽1) 𝐵(𝛽2 ,𝛾4 −𝛽2 )] 0 0
𝑡)𝛾1 −𝛽1 −1 (1 − 𝑠)𝛾4 −𝛽2 −1 (1 − 𝑥1 𝑡 𝜏1 − 𝑥4 𝑠 𝜏4 )−𝛼 𝑑𝑡 𝑑𝑠
……… ……. (2.18)
Using the above equation (2.18) and making necessary arrangements in (2.17), we get
𝜏 ,𝜏2 ,𝜏3 ,𝜏4
𝐻𝐵1 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ]
1 1
1
= ∫ ∫ 𝑢𝛽1 −1 𝑋𝛽2 −1 (1 − 𝑢)𝛾1 −𝛽1−1 (1 − 𝑋)𝛾4 −𝛽2 −1 (1
𝐵[(𝛽1 , 𝛾1 − 𝛽1) 𝐵(𝛽2 , 𝛾4 − 𝛽2 )] 0 0
𝜏
− 𝑥1 𝑢𝜏1 − 𝑥3 𝑋 𝜏4 )−𝛼 2𝑅12 [𝛽1 , 𝛽2 , 𝛾2 ; 𝑥2 𝑢𝑤(1 − 𝑢)]𝑑𝑢𝑑𝑥
………. (2.19)
After that, using the integral representations of the 2𝑅1 from (1.6) and putting into (2.19), we can be obtained
(2.16).
The special case when (𝜏1 , 𝜏2 , 𝜏3 , 𝜏4 ) = 1 in (2.16) give the similar integral representations of Srivastava’s 𝐻𝐵
quadruple hypergeometric function [12, 13, 33].
732
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Theorem (2.4) the following integral representations hold true:


𝜏 ,𝜏2 ,𝜏3 ,𝜏4
𝐻𝐵1 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ]
(1 − 𝑥4 )−𝛼 (1 − 𝑥2 )−𝛽1 ∞ ∞ −𝑢−𝑣 𝛼−1 𝛽−1 𝜏1 𝑥2 𝑥4 𝑢𝑣 𝜏1
= ∫ ∫ 𝑒 𝑢 𝑣 𝑜𝐹1 (−; 𝛾1 ; )
𝛤(𝛼) 𝛤(𝛽1 ) 0 0 (1 − 𝑥4 )𝜏1 (1 − x2 )
𝜏 𝑥 𝑥 𝑢𝜏2 𝑣
𝑜𝐹2 2 (−; 𝛾2 ; (1−𝑥2 )4𝜏2 (1−𝑥 )) 𝑑𝑢 𝑑𝑣 ……. (2.20)
4 2

(𝜏1 , 𝜏2 , 𝜏3 , 𝜏4 ) > 0, 𝑅(𝑥2 ) < 1, 𝑅(𝑥3 ) < 1, 𝑅(𝛼) > 0, 𝑅(𝛽1 ) > 0 .
Proof: - If we put 𝛽2 = 𝛾2 , 𝑥1 = 𝑥2 𝑥4 and using
𝜏 𝜏 𝜏
𝜙1 2 4 (𝛾2 ; 𝛾2 , 𝛾4 ; 𝑠𝑥2 ; 𝑡𝑥4 ) = 𝑒 𝑥2 𝑠+𝑥4 𝑡 𝑜𝐹1 2 (−; 𝛾2 ; 𝑥2 𝑥4 )
We get
∞ ∞
𝜏 ,𝜏2 ,𝜏3 ,𝜏4 1
𝐻𝐵1 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ] = ∫ ∫ 𝑒 −𝑠(1−𝑥2 )−𝑡(1−𝑥4 ) 𝑡 𝛼−1 𝑠 𝛽1 −1
𝛤(𝛼)𝛤(𝛽) 0 0
𝜏 𝜏
𝑜𝐹1 1 (− ; 𝛾1 ; 𝑡𝑠 𝜏1 𝑥1 )𝑜𝐹1 2 (− ; 𝛾2 ; 𝑥2 𝑥4 𝑡 𝜏2 𝑠)𝑑𝑡 𝑑𝑠 ……. (2.21)
Putting 𝑡(1 − 𝑥4 ) = 𝑢 𝑎𝑛𝑑 𝑠(1 − 𝑥2 ) = 𝑣 in (2.21),
We are used to describe integral of equation (2.20).
The special case when putting (𝜏1 , 𝜏2 , 𝜏3 , 𝜏4 ) = 1 in (2.20) give the familiar integral representations of
Srivastava’s 𝐻𝐵 quadruple hypergeometric function [12, 13].
2.2. Partial Differential Equations:
𝜏 ,𝜏 ,𝜏 ,𝜏
Here, we will give partial differential equation for 𝐻𝐵1 2 3 4 Srivastava’s quadruple hypergeometric function.
Theorem (2.5)
The following partial differential equations hold true:
𝜏 ,𝜏2 ,𝜏3 ,𝜏4
[𝜃(𝜏1 𝜃 + 𝛾1 − 1)𝜏1 − 𝑥1 (𝜃 + 𝜙 + 𝛼)(𝜏1 𝜃 + 𝜙 + 𝛽1 )𝜏1 ]𝐻𝐵1 =0
𝜏 ,𝜏2 ,𝜏3 ,𝜏4
[𝜃(𝜏2 𝑄 + 𝜙 + 𝛾1 − 1)𝜏2 − 𝑥2( 𝜏1 𝜃 + 𝜙 + 𝛽1 )(𝜏2 𝜃 + 𝜙 + 𝛽2 )𝜏2 ]𝐻𝐵1 =0
𝜏 ,𝜏2 ,𝜏3 ,𝜏4
𝜙(𝜃 + 𝜏3 𝜙 + 𝛾3 − 1)𝜏3 − 𝑥3 (𝜃 + 𝜙 + 𝛼)(𝑄 + 𝜏3 𝜙 + 𝛽2 )𝐻𝐵1 =0
𝜏 ,𝜏2 ,𝜏3 ,𝜏4
𝜓(𝑄 + 𝜏4 𝜙 + 𝛾4 − 1)𝜏4 − 𝑥4 (𝜃 + 𝜙 + 𝛼)(𝑄 + 𝜏4 𝜙 + 𝛽2 )𝐻𝐵1 =0 …….. (2.22)
𝑑 𝑑 𝑑 𝑑
Where 𝜃 = 𝑥1 , 𝑄 = 𝑥2 𝑑𝑥 , 𝜙 = 𝑥3 𝑑𝑥 𝑎𝑛𝑑 𝜓 = 𝑥4 𝑑𝑥 .
𝑑𝑥1 2 3 4
𝜏 ,𝜏 ,𝜏 ,𝜏
Proof: - Using 𝐻𝐵1 2 3 4 [𝛼, 𝛽1 , 𝛽2 ;
𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ] Srivastava’s quadruple 𝜏 -hypergeometric
function in equation (2.1) and multiplying this equation (𝜃 + 𝛾1 − 1)𝜏1 , where
𝜏 ,𝜏2 ,𝜏3 ,𝜏4
𝜃(𝜏1 𝜃 + 𝛾1 − 1)𝜏1 𝐻𝐵1 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ]

𝑚(𝜏1 𝑚 + 𝛾1 − 1)𝜏1 (𝛼)𝑚+𝑝 (𝛽1 )τ1 𝑚+𝑛 (𝛽2 )𝜏2 𝑛+𝜏3 𝑝+𝜏4 𝑞
= ∑
(𝛾1 )𝜏1 𝑚 (𝛾2 )𝜏3 𝑝 (𝛾4 )𝜏4 𝑞
𝑚,𝑛,𝑝,𝑞=0
𝑝 𝑞
𝑥1𝑚 𝑥2𝑛 𝑥3 𝑥4
(M→ 𝑚 + 1) ……… (2.23)
𝑚! 𝑛! 𝑝! 𝑞!

(𝜏1 𝑚 + 𝜏1 + 𝛾1 − 1)𝜏1 (𝛼)𝑚+1+𝑝 (𝛽1 )𝜏1 𝑚+𝜏2 +𝑛 (𝛽2 )𝜏2 𝑛+𝜏3 𝑝+𝜏3 𝑞 𝑥1𝑚 𝑥2𝑛 𝑥3𝑝 𝑥4𝑞
= ∑
(𝛾1 )𝜏1 𝑚+𝜏1 (𝛾2 )𝜏2 𝑛 (𝛾3 )𝜏3 𝑝 (𝛾4 )𝜏4 𝑞 𝑚! 𝑛! 𝑝! 𝑞!
𝑚,𝑛,𝑝,𝑞=0

Taking advantage of the following property of pochhammer symbol [30, 31] in (2.23) we get
(𝛼)𝜏1 𝑚+𝜏2 𝑛+𝜏3𝑝 = (𝛼 + 𝜏1 𝑚 + 𝜏2 𝑛 + 𝜏3 𝑝)(𝛼)𝜏1 𝑚
And making some useful arrangement in the equation (2.23), we get the result (2.22).

733
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The special case, on putting (𝜏1 , 𝜏2 , 𝜏3 , 𝜏4 ) = 1 in (2.22) we get the partial differential equation of Srivastava’s
𝐻𝐵 quadruple hypergeometric function [21-23].
2.3. Derivative Formula
𝜏 ,𝜏 ,𝜏 ,𝜏
In this section, we derive the derivation formula for 𝐻𝐵1 2 3 4 Srivastava’s hypergeometric function.
𝜏 ,𝜏2,𝜏3 ,𝜏4
Theorem (2.6). The following for 𝐻𝐵1 Srivastava’s 𝜏 − hypergeometric function:
𝑑𝑟+𝑠+𝑡+𝑢 𝜏 ,𝜏 ,𝜏 ,𝜏
𝐻 1 2 3 4 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , x3 , 𝑥4 ]
𝑑𝑥1𝑟 𝑑𝑥2𝑠 𝑑𝑥3𝑡 𝑑𝑥4𝑢 𝐵
(𝛼)𝑟+𝑡 (𝛽1 )𝜏1𝑟+𝑠 (𝛽2 )𝜏2𝑠+𝜏3 𝑡+𝜏4 𝑢 𝜏 ,𝜏2 ,𝜏3 ,𝜏4
= 𝐻𝐵1 [(𝛼 + 𝑟 + 𝑡 + 𝑢), (𝛽1 + 𝜏1 𝑟 + 𝑠), (𝛽2 + 𝜏2 𝑠 + 𝜏3 𝑡 + 𝜏4 𝑢), (𝛾2 +
(𝛾1 )𝜏1𝑟 (𝛾2 )𝜏2𝑠 (𝛾3 )𝜏3𝑡 (𝛾4 )𝜏4𝑢
𝜏2 𝑠)(𝛾3 + 𝜏3 𝑡)(𝛾4 + 𝜏4 𝑢); ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ]. ……… (2.24)
𝜏 ,𝜏 ,𝜏 ,𝜏
Proof: - By using the definition of 𝐻𝐵1 2 3 4 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ] Srivastava’s 𝜏 −
hypergeometric function in (2.1) and derivative this equation r times, we get
𝑑𝑟 𝜏1 ,𝜏2 ,𝜏3 ,𝜏4
𝐻 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ]
𝑑𝑥1𝑟 𝐵

(𝛼)𝑚+𝑟+𝑝+𝑞 (𝛽1 )𝜏1𝑚+𝜏1 𝑟+𝑠 (𝛽2 )𝜏2 𝑛+𝜏3 𝑝+𝜏4 𝑞 𝑥1𝑚 𝑥2𝑛 𝑥3𝑝 𝑥4𝑞
= ∑
(𝛾1 )𝜏1 𝑚+𝜏1 𝑟 (𝛾2 )𝜏2 𝑛 (𝛾3 )𝜏3 𝑡 𝑚! 𝑛! 𝑝! 𝑞!
𝑚,𝑛,𝑝,𝑞=0

….. (2.25)
Therefore, we take derivative t times of (2.26) we get
𝑑𝑟+𝑠+𝑡+𝑢 𝜏 ,𝜏 ,𝜏 ,𝜏
𝐻 1 2 3 4 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ]
𝑑𝑥1𝑟 𝑑𝑥2𝑠 𝑑𝑥3𝑡 𝑑𝑥4𝑢 𝐵
(𝛼)𝑚+𝑟+𝑝+𝑡 (𝛽1 )𝜏1𝑚+𝜏1 𝑟+𝑠+𝑛 (𝛽2 )𝜏2𝑛+𝜏3 𝑝+𝜏4 𝑞 𝑥1𝑚 𝑥2𝑛 𝑥3𝑝 𝑥4𝑞
= ∑∞
𝑚,𝑛,𝑝,𝑞=0 ……… (2.26)
(𝛾1 )𝜏1𝑚+𝜏1 𝑟 (𝛾2 )𝜏2𝑠+𝜏2 𝑛 (𝛾3 )𝜏3𝑝+𝜏3 𝑡 𝑚! 𝑛! 𝑝! 𝑞!

Then, by taking derivative s times of (2.25) we have


𝑑𝑟+𝑠 𝜏 ,𝜏 ,𝜏 ,𝜏
𝐻 1 2 3 4 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ]
𝑑𝑥1𝑟 𝑑𝑥2𝑠 𝐵

(𝛼)𝑚+𝑟+𝑝+𝑞 (𝛽1 )𝜏1 𝑚+𝜏1 𝑟+𝑛+𝑠 (𝛽2 )𝜏2 𝑠+𝜏2 𝑛+𝜏3 𝑝+𝜏3 𝑞 𝑥1𝑚 𝑥2𝑛 𝑥3𝑝 𝑥4𝑞
= ∑
(𝛾1 )𝜏1 𝑚+𝜏2 𝑟 (𝛾2 )𝜏2 𝑠+𝜏2 𝑛 (𝛾3 )𝜏3 𝑡 (𝛾4 )𝜏4 𝑢 𝑚! 𝑛! 𝑝! 𝑞!
𝑚,𝑛,𝑝,𝑞=0

………. (2.27)
Using following property of pochhammer symbol [18, 20] in (2.27),
(𝛼)𝑚+𝑛 = (𝛼 + 𝑚)𝑛 (𝛼)𝑚 ……….. (2.28)
We get the described result (2.24).
The special case when (𝜏1 , 𝜏2 , 𝜏3 , 𝜏4 ) = 1 in (2.24) give the familiar derivative of Srivastava’s 𝐻𝐵 quadruple
hypergeometric function [21].
2.4. Recurrence Relations :
𝜏 ,𝜏 ,𝜏 ,𝜏
Theorem (2.7) the following recurrence relation for 𝐻𝐵1 2 3 4 hold true:
𝜏 ,𝜏2 ,𝜏3 ,𝜏4 𝜏 ,𝜏2 ,𝜏3 ,𝜏4
𝐻𝐵1 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ] = 𝐻𝐵1 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 − 1, 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , x4 ] +
𝛼𝛽1 𝑥1 𝜏 ,𝜏 ,𝜏 ,𝜏
𝐻 1 2 3 4 [(𝛼 + 1), (𝛽1 + 1), 𝛽2 ; 𝛾1 + 1; 𝛾2 ; 𝛾3 ; 𝛾4 ; ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ]
𝛾1 (1−𝛾1 ) 𝐵
………. (2.29).
𝜏 ,𝜏2 ,𝜏3 ,𝜏4
Proof: - Using integral representation of 𝐻𝐵1 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ]
𝜏
Srivastava’s 𝜏 - hypergeometric function in (2.2) and following relation for the function 𝑜𝐹1 1 in (2.30)

734
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

𝜏 𝜏 𝛼𝛽1 𝑥1 𝜏
𝑜𝐹1 1 (; 𝛾, 1; 𝑥), 𝑜𝐹1 1 (; 𝛾; 𝑥) 𝑜𝐹1 1 ( ; 𝛾, 1 ; 𝑥) = 0 …………... (2.30)
𝛾1 (1−𝛾1 )

We can easily obtain the recurrence relation (2.29).


𝜏 ,𝜏2 ,𝜏3 ,𝜏4
Theorem (2.8) the following recurrence relation for 𝐻𝐵1 holds true:
(𝛽2 − 𝛾2 + 1)𝐻𝐵𝜏1 ,𝜏2 ,𝜏3 ,𝜏4 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ] =
𝜏 ,𝜏 ,𝜏 ,𝜏
𝛽2 𝐻𝐵1 2 3 4 [𝛼, 𝛽, 𝛽2 + 1, ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ] − (𝛾2 −
𝜏 ,𝜏 ,𝜏 ,𝜏
1)𝐻𝐵1 2 3 4 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , x3 , 𝑥4 ]. ……….. (2.31)
Proof: - The series on the eight sides of (2.31) are:
𝜏 ,𝜏2 ,𝜏3 ,𝜏4
𝛽2 𝐻𝐵1 [𝛼, 𝛽, 𝛽2 + 1, ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , 𝑥2 , 𝑥3 , 𝑥4 ]

𝛽2 𝛤(𝛾1 )𝛤(𝛾2 ) (𝛼)𝑚+𝑝 𝛤(𝛽1 + 𝜏1 𝑚 + 𝑛)𝛤(𝛽2 + 1 + 𝜏2 𝑛 + 𝜏3 𝑝 + 𝜏4 𝑞 𝑥1𝑚 𝑥2𝑛 𝑥3𝑝 𝑥4𝑞
= ∑
𝛤(𝛽1 )𝛤(𝛽2 + 1) 𝛤(𝛾1 + 𝜏1 𝑚 + 𝑛)𝛤(𝛾1 + 𝜏2 𝑛 + 𝜏3 𝑝 + 𝜏4 𝑞) 𝑚! 𝑛! 𝑝! 𝑞!
𝑚,𝑛,𝑝,𝑞=0

𝛤(γ )𝛤(𝛾 ) (𝛼)𝑚+𝑝 𝛤(𝛽1 +𝜏1 𝑚+𝑛)𝛤(𝛽2 +1+𝜏2 𝑛+𝜏3 𝑝+𝜏4 𝑞 𝑥1𝑚 𝑥2𝑛 𝑥3𝑝 𝑥4𝑞 (𝛽2 +𝜏2 𝑛+𝜏3 𝑝+𝜏4 𝑞)
= 𝛤(𝛽1)𝛤(𝛽2 ) ∑∞
𝑚,𝑛,𝑝,𝑞=0
1 2 𝛤(𝛾1 +𝜏1𝑚+𝑛)𝛤(𝛾1 +𝜏2 𝑛+𝜏3 𝑝+𝜏4 𝑞) 𝑚! 𝑛! 𝑝! 𝑞! (𝛽2 )

𝑎𝑛𝑑
𝜏 ,𝜏 ,𝜏 ,𝜏
(𝛾2 − 1)𝐻𝐵1 2 3 4 [𝛼, 𝛽1 , 𝛽2 ; 𝛾1 , 𝛾2 , 𝛾3, 𝛾4 ; 𝑥1 , x2 , 𝑥3 , 𝑥4 ]

(𝛾2 − 1)𝛤(𝛾1 )𝛤(𝛾2 − 1) (𝛼)𝑚+𝑝 𝛤(𝛽1 + 𝜏1 𝑚 + 𝑛)𝛤(𝛽2 + 𝜏2 𝑛 + 𝜏3 𝑝 + 𝜏4 𝑞 𝑥1𝑚 𝑥2𝑛 x3p x4q
= ∑
𝛤(𝛽1 )𝛤(𝛽2 ) 𝛤(𝛾1 + 𝜏1 𝑚 + 𝑛)𝛤(𝛾2 − 1 + 𝜏2 𝑛 + 𝜏3 𝑝) 𝑚! n! p! q!
𝑚,𝑛,𝑝,𝑞=0

………….. (2.33)
Γ(γ1 )Γ(γ2 ) (α)m+p Γ(β1 +τ1 m+n)Γ(β2 +τ2 n+τ3 p+τ4 q xm n p q
1 x2 x3 x4 (γ2 −1+τ2 n+τ3 p)
= ∑∞
m,n,p,q=0
Γ(β1 )Γ(β2 ) Γ(γ1 +τ1 m+n)Γ(γ2 +τ2 n+τ3 p+τ4 q) m! n! p! q! γ2 −1

……. .(2.34)
Putting (2.32) and (2.33) in the series expression into the eight side of (2.31) we get the desired result of
τ ,τ ,τ ,τ
(β2 − γ2 + 1) HB1 2 3 4 [α, β1 , β2 ; γ1 , γ2 , γ3, γ4 ; x1 , x2 , x3 , x4 ].
The special case when (τ1 , τ2 , τ3 , τ4 ) = 1 in (2.20) and (2.31) give the recurrence relation for Srivastava’s HB
quadruple hypergeometric function [25, 26].

AUTHOR DETAILS:
AMARNATH KUMAR THAKUR* AND SHAILENDRA KUMAR SAHU
Department of Mathematics, Dr. CV Raman University, Bilaspur, India

735
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

PELTIER COOLER BASED TEMPERATURE CONTROLLER FOR CCD DETECTOR IN RAMAN


SPECTROMETER DESIGNING

PANKAJ UPADHYAY, P. BHASKAR AND RAMESH DATLA

ABSTRACT
The Raman spectrometers most often use Charge Couple Devices (CCDs) as a Detector unit as they are more
accurate and sensitive with high quality output but they suffer with noises like white noise, thermal noise, dark
current etc. One of the way to remove the noises from the signal is to keep the CCD element cool at low
temperatures (less than 5°C) during the measurement. This paper presents a solution to maintain the CCD
detector element at certain temperature by controlling in-built thermo-electric cooler (TEC) a Peltier device to
thermal noise in Raman spectrometer.
Keywords: Raman Spectrometer; Charge Couple Device; Thermo Electric Cooler; PID.

I. INTRODUCTION
Raman Spectrometer is emerging noninvasive, nondestructive technique for analysis of sample which is based
on principle of inelastic scattering of light. When sample is irradiated with monochromatic source most often
laser, a coherent, unidirectional, monochromatic source, the scattered light is observed which is acquainted with
the elastic and inelastic scattering. The ratio of the inelastic scattering to incident light is approximately 1 to 107
photons. The detection of the Scattered light is done by very sensitive detectors most often by charge coupled
devices (CCD) detector [1-3].
When the light impinged onto the sample most of photons get elastically scattered. The scattered photons have
the same energy (frequency) and wavelength as of incident photons. Very less light (approximately 1 in 107
photons) is scattered at other frequencies than that of incident one. The process of inelastic scattering is stated as
Raman Scattering. If there is change is rotational, vibrational or electronic energy the Raman scattering
happens. Elastic scattering is called Rayleigh scattering. If it’s not elastic, the process is called Raman
scattering. [2,3]. The scattering light confined with the Raman scattering and Rayleigh scattering, to separate the
Rayleigh line from the Raman lines an optical notch filter is implemented. The scattered light is given to
spectrograph in order to measure the scattered light and then given to PC for plotting graph between intensity
of scattered light (au) against the Raman shift (Δν cm-1) in scattered light. The measurement of the Raman
intensity with respect to the arbitrary unit is done by the CCD sensor.
CCD is the array of photo diodes (photo-sites) that produce a voltage proportional to the amount incident light,
depending on the wavelength. In conversion of the light signal into the electric form the CCD suffers with
noises. In order to improve the performance of CCD, chip is cooled to reduce thermal and dark noises in output
generated at the camera. The dark current represents the collection of all unwanted free electrons that thermal
noise generates in the CCD [8, 9]. The dark current grows with increasing temperature, it decreases if the sensor
is cooled.

Fig. 1. Block diagram of Temperature control System


736
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

II. MATERIAL AND METHODS


The block diagram of the C8051F380 microcontroller based PID temperature controller system is shown in
Fig.1. The system contains following elements.
A. Microcontroller
A C8051F380 microcontroller based PID temperature controller system has been designed and fabricated for
CCD unit. Microcontroller C8051F380 is an 8 bit Microcontroller with 8051 as core. It consists of peripherals
like 10 bit ADC, two 12-bit DACs, PCA used to control the power applied to the TEC. It has high speed
pipelined instruction architecture; executes maximum instructions in one system clock only and it has 48 MIPS
throughput. It contains 64 KB on-chip flash Memory and 4352 Bytes of RAM.
B. Temperature Sensor (Thermistor)
A built in Temperature sensor (thermistor) is used to sense the temperature of CCD mounted on TE cooler. The
thermistor has the resistance of 10KΩ at 298K environmental temperature and constant (B) of3900K.
C. Constant Current Source:

Fig. 2: Constant current source


The Fig.2 shows the constant current source employed in the present work. The temperature sensor thermistor is
a negative temperature coefficient sensor whose resistance gets decreases as the temperature of sensor increases.
It acts as thermally variable resistor, when current is passes through it, voltage will be is observed across the
thermistor, the output voltage appears inversely proportional to temperature. If the current passing through the
thermistor is constant, then voltage across the thermistor indicates the temperature. Hence, a constant current
source is designed to meet the requirement.
C. Thermoelectric Cooler
Thermoelectric coolers (Peltier Coolers) are solid state heat pumpsthat are used for temperature stability and for
achieving controlling heating and cooling cycle quickly.When DC voltage is applied to the module, the positive
and negative charge carriers in the pellet array absorb heat energy from one substrate surface and release it to
the substrate at the opposite side. The surface where heat energy is released becomes hot surface and vice versa.
Reversing the polarity will result in reversed hot and cold side [4]. The CCD used in the present work is S16011
series CCD manufactured by Hamamatsu, Japan.
D. TEC Driver circuitry
Thermoelectric cooler requires more current (in the order of Amps.) for its performance. As discussed above
when the current flows through TEC one side gets cooled and other heated. To ensure the stable temperature
control. ΔT (temperature difference between hot side and cool side temperature) should be less than 30°C
otherwise the TEC characteristics as dark current constancy may differ [5]. So the heat dissipation of hot side is
essential. The schematic diagram of TEC driver circuit as shown in Fig.3.
737
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 MOSFET: Thermoelectric cooler driver circuitry is built with MOSFET as final current control element. An
n-channel MOSFET IRF540 is connected to as it can withstand up to 30A of current. The gate of the
MOSFET is fed by the collector of photo-transistor of opto-coupler. When there is voltage at gate terminal
of MOSFET, the current flows through the in-built TEC of CCD in order to keep it cool and vice versa.
 Opto-Coupler: An opto-coupler is an interface between two circuits which operate at different voltage
levels. The key advantage of an opto-coupler is the electrical isolation between the input and output circuits.
In this design opto-coupler MCT2E is used to isolate the power device (TEC) from low power device
(Microcontroller). It consists of a photo-diode and a photo-transistor. As the current flows through the photo-
diode it glows and provides base current to the photo-transistor to conduct simultaneously. A NPN transistor
is used to make the photo-diode ON/OFF.
 Resettable Fuse: Polymeric Positive Temperature Coefficient (PPTC) are the devices that protects the load
devices from excessive current or excessive temperature. When the more current than rating flows through
the device these PPTC device gets heated and blown results break the connection form the circuit then again
fuse gets reset hence name resettable fuse.
 Thermo-Electric Cooler: Thermo-electric cooler is a device works on the principle of Peltier effect. The
effect creates a temperature difference by transferring heat between two electrical junctions when the voltage
applied.

Fig. 3 TEC Driver circuitry


II. CONTROL ALGORITHM (PID CONTROLLER)
In industrial control systems, a proportional-integral-derivative (PID) controller is a control loop feedback
mechanism. The difference between the set point and observed temperatures is calculated by the PID controller.
This difference is the input to the PID equation, which results in a control action to the load through the final
control element. This mode of the controller is a complex combination of proportional-integral-derivative (P-I-
D) control modes. PID control mode possesses zero steady state error, oscillations, and high stability [6]. The
PID controller is described by the following transfer function:
Ci(s) = Kp (1 + 1/Tis + Tds)… (1)
Where KP is the proportional gain, Ti is the integral time constant, and Td s the derivative time
Constant. A PID equation for calculating the control action variable is as following:

..(2)
Where, Kc is proportional gain, Kc/Ti is integral gain, Kd is derivative gain, e (t) =r (t) - m (t). In the present
work a PID controller is implemented to control the current flowing through the TEC in order to maintain the
temperature of the CCD at desired temperature.

738
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Iv. Working of the System and Flow Chart

Fig. 4 Flow Chart of the working of System


Output of thermistor is fed to on-chip ADC of C8051F350 in order to measure the temperature of TEC and
given to control algorithm which calculates the error and takes the control action, further control action is
applied to final control element through PWM to maintain the temperature of CCD at desired value.
V. RESULTS AND DISCUSSION
Raman spectrometer is vital and versatile instrument used in pharmaceutical, agriculture, chemical, biomedical
etc. fields for analysis of samples. The only drawback of instrument is its weak signal, which can be entrap in
the noise. Keeping CCD detector cool below 5°C reduces the thermal and dark noise of CCD also the NIR
region scattered light decrease as the little humidity comes on CCD but the proper arrangements of exhaust fan
gives better results.

Fig.5 PID controller output


The Fig.5 shows the Temperature controlled data for 5 degree Centigrade, for this experiment the set point is
fixed at 5°C, during the experiment the room temperature is recorded 26.1°C.Once set point is fixed the
measured temperature starts increasing towards set point and maintained set point using PID control algorithm.
739
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

It took around 7 seconds to reach set point of 5°C (Rise Time = 7 Sec.) element temperature which is almost
equal to Hamamatsu made CCD driver temperature control system.
Fig. 6presents the logarithmic scale Y axis graph to show both CCD outputs graphs at 5°C and room
temperature 27.5°C. It is observed that there is shift in the graph observed at 27.5°C and 5°C temps.

Fig.6. Raman Spectrograph CCD Output at 5°C and 27.5°C

Fig. 7.Xenon Lamp Raman Spectrograph CCD Detector Output


Spectrum of Xenon Pencil Lamp used in Raman Spectrograph CCD output is shown in Fig.7.
The spectrum is recorded when detector element temperature is at 5.12 °C. It is observed that PID based
temperature control system designed for Raman spectrograph CCD Detector gives the optimum results and
noises are suppressed to lowest level. Fig. 6 shows if the temperature is maintained at lower temperatures
approximately 5°C and lesser output of CCD detector stays stable but with the increase in temperature output
baseline starts increasing which may result instability. Fig. 7 presents the output of Xenon pencil lamp peaks
recorded by Raman Spectrograph cooled at 5°C with applied algorithms like PCA (Principal Component
Analysis), PLS(Partial Least Square), LSLS (Local Straight Line Screening) to extract the signal and improve
the SNR.
REFERENCES
[1] Bumbrah GS, Shrarma RM., 2015, “Raman spectroscopy–Basic principle, instrumentation and selected
applications for the characterization of drugs of abuse”, Egyptian Journal of Forensic Sciences.
740
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[2] Raman CV, Krishnan KS, 1928, “A new type of secondary radiation”, Nature; 121 (3048):501-2.
[3] Smith E, Dent G., 2005, “Modern Raman spectroscopy: a practical approach”, John Wiley & Sons,
Chichester, England.
[4] Peltier application Note. CUI INC.
[5] CCD S16011-1106 data sheet by Hamamatsu.
[6] Antonio V, 2006 “Practical PID Control”, Springer-Verlag London Limited, London.
[7] Newport Xenon Pencil Lamp 6033 Data Sheet.
[8] Wang Qinyou, “The applications of CCD,” Tianjin: Tianjin University Press.2000:173-175
[9] Holst, Gerald C.CCD arrays, cameras, and Displays, SPIE Optical Engineering Press, USA, 1998.

AUTHOR DETAILS:
PANKAJ UPADHYAY1, P. BHASKAR2 AND RAMESH DATLA3
1,2
Department of Instrumentation Tech. GUPG Centre, Yeragera- 584133, Raichur KA
3
ELICO Ltd. Hyderabad

741
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

CANDIDATE EXPERIENCE OF AI IN TALENT ACQUISITION: A STUDY ON THE IT SECTOR

DR. SWETA BANERJEE AND DR. MITTAL MOHITE

ABSTRACT
With the advent of technology and its varied uses in the business world, there are drastic changes in the way the
organizations of today are functioning. Artificial Intelligence is one of many trending technologies and can
almost be considered as ubiquitous in today’s time. Artificial Intelligence (AI) as the name suggests is the
replication of human intelligence into machines that are organized to think andfunction like humans. Businesses
are slowly yet steadily moving towards AI because of its capability torationalize and take business decisions that
have the best chance of achieving the set goals, without direct human intervention. Candidate experience would
essentially be the perception and experience a job seeker undergoes with the organisation and the employer
while undertaking the Talent Acquisition process. It refers to the experience the candidate has with the
employer during the course of the recruitment process. This experience is important in order to determine the
image of the organisation. Thus, this research paper aims to evaluate the impact of AI on the talent acquisition
process specifically on candidate experience. This study also tries to understand if the candidate experience is
likely to causesome kind of positive employer brand in the market.
Keywords: Artificial Intelligence; Candidate Experience; Employer branding; AI-recruitment

INTRODUCTION
Candidate experience and employer branding are quite prominent. AI technologies are enabling the
organisations to increase their reach and attract great talent from a wider geographic area. Along with this, the
role of importance of HR as a business function is moving beyond just, screening, sourcing and calling
candidates for interviews. As stated by, (Dijkkamp, 2019), AI transforms the role of HR professionals from a
sourcing and screening role to a relationship building and stakeholder management role in which the HR
professionals enable a positive candidate experience for new employees.
Candidate experience in general would refer to the feelings and experiences of candidates or potential
employees during their interaction with the employer/organisation that is conducting the hiring process. It refers
to the candidate’s perception about company’s recruiting and hiring process (talentlyft, n.d.) In another paper
authored by (McCamey, 2018) it was highlighted that candidate experience refers to the exchange between job
seekers or candidates and the organisation to which the employment is being considered. The exchange would
be through the activities undertaken by both parties. Candidates engagein activities that allows them to encounter
opportunities with the organisations and organisations engage in activities that allow them to fill a job position.
Thus, we can say that candidate experience is gaining immense importance in today’s business world. For better
understanding, we can draw a parlance between the external customer of the organisation and its internal
customers, i.e., its employees/potential employees. A document published by (Retorio) creates a comparison
between how customers of today’s time and date, want a fast, effective, personalised processes at the click of
mouse. Similarly, applicants of today, want a rapid, effective, trusted and personalised interview process. As
mentioned in the paper, “AI-recruitment is the Amazon of candidate experience” and subsequent employer
branding which offersa rapid, effective and highly personalised hiring process to job seekers. There are mainly 5
touch-points in the recruitment process that needs to be taken care of to ensure good candidate experience, i.e.,
Initial Job search, application process, job interviews, feedback-offer-rejection, onboarding. The paper argues
that the organisations that fail to optimise their candidate experience will eventually lose top talent and good
candidates and also create a negative employer brand. Having a bad candidate experience will eventually lead to
either of the following
1. Scaring away eligible candidates,
2. Creating a bad employer brand
3. Losing potential customers that are candidates.
AI-technologies can have a deep impact on understanding these talent acquisition touch-points.

742
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

LITERATURE REVIEW
The field of Human Resources has been evolving in terms of the methods, policies and practices required to
function, over the years. In today’s time, the HR domain is still experiencing crucial changes that willchange the
shape and nature of how HR functions in any organisation. As mentioned by (Patrick van Esch, 2019) the role
of HR has moved from being Tactical in nature to Strategic in nature. It states that recruitment too is a strategic
business priority and cannot be just tactical in nature. This drastic change is mainly because the focus of
competitive advantage for firms has shifted from tangible assets to intangible assets such as innovation, customer
insight, customer service and brand and this shift has increased the emphasis on human capital. Thus, when the
role of HR is becoming more and more strategic, AI-enabled recruiting is becoming a critical capability that
organisations will have to adapt in order to attract, develop and retain a workforce that is slowly and gradually
moving onto digital spaces and interacting extensivelywith technology.
According to, (Nishad Nawaz, 2019) the new cognitive technologies such as AI-driven Chatbots have gained
immense popularity when it comes to recruitment and the overall talent acquisition process. These technologies
have smart ways of collecting data of the candidate and thus, improve recruitment effectiveness. Among the
many benefits of using AI-Chatbots, as stated by (Nishad Nawaz, 2019), this allows us to conduct an
analysis of whether such technologies, enhance or weaken the Candidate experience and subsequent employer
branding for any organisation.
Employer Branding as defined in (Kumar, 2017) as an attempt of the organisation and employer to establish a
unique identity so as to attract and retain employees. This paper also highlights that the implementation of AI in
the organisation allows the organisation to streamline its operations and also manage its human capital better.
Earlier, employer branding was catered to using the various tabs on website, or professional social networking
sites. Now Digital employer branding is taking over with the help of new technologies and AI that help
organisations carry out activities such as preparing professional recruitment videos, running company blogs,
interactive games, publishing newsletters, managing chats, and participating in online (virtual) job fairs. It is
believed that, the candidates that have a smooth experience with the organisation look forward to more
interactions with the employer company through various modes such as purchasing their products, referring the
brand to their friends and families, giving good online reviews, thus, positively impacting the employer
branding. It can also be said that the HR department and its activities can be continually shaped and refined with
the AI solutions to make the organisations the desired employers in the labour market. “Automation of
processes such as recruitment and selection, onboarding, improvement, and talent management significantly
facilitates work, including increasing objectivity in action, introducing important standards. Such solutions as
ATS, TAS, LMS andchatbots revolutionize the business while allowing to shape the image of an organization as
a modern employer” (Kumar, 2017)
It can be observed that most of the available literature are mainly qualitative studies based on secondarysources
of information and cover aspects depicting the pros and cons of using AI-technologies on candidate experience
and subsequently on employer branding. However, there is a scarcity of empirical research that allows us to
gauge the actual impact of implementing AI on the candidate’s overall experience and further on employer
branding. This is the research gap identified in this paper and thus, the research problem that we will be
addressing in through this paper would be to Critically analyse the effect and impact of AI in the talent
acquisition process, specifically on candidate experience.
PRIMARY OBJECTIVE
1. To investigate the impact of AI on candidate experience in talent acquisition process.
SECONDARY OBJECTIVE
1. To assess whether candidate experience varies with the gender of the candidate.
2. To assess if candidate experience varies with the grade levels of position for which the hiring isbeing done.
HYPOTHESIS
Ho: There is no impact of AI on candidate experience during the Talent acquisition process
Ho: Candidate experience does not vary with the gender of the candidate.
Ho: Candidate experience does not vary with the grade levels of the position for which the hiring is beingdone
RESEARCH METHODOLOGY
This is an empirical study conducted with the help of primary data collected from job seekers in the IT sector.
The data is collected from 60 respondents and is analysed using IBM SPSS 26.00.
743
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

It is a quantitative research conducted to study the impact of AI on candidate experience when implemented in
the talent acquisition process.
DATA ANALYSIS
1. Reliability test
Scale: Artificial Intelligence
Table 1: AI case summary

Table 1.1 Reliability analysis of AI

Scale: Candidate Experience


Table 2. Case summary for Candidate Exp.

Table 2.1. Reliability analysis of Candidate Exp.

Since the Cronbach Alpha score of the independent variable, i.e., Artificial Intelligence and Dependent
Variable, i.e., Candidate experience is 0.828 and 0.855 respectively, which is greater than .7 we can conclude
that the data is reliable.

744
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

2. NORMALITY TEST
2.1 Artificial Intelligence
Table 3. Skewness and Kurtosis values for AI

From the above table 3 we can observe that the absolute skewness and kurtosis values for the first variable, i.e.,
Artificial Intelligence are 0.823 and 1.258 respectively. These values are less than 3, hence we can conclude by
saying that the variable data is normally distributed.
Fig. 1: Q-Q Plot for AI

The below box plot fig. 2 shows that the Artificial intelligence variable has an outlier (respondent 14).This is
the extreme value in data gathered.

745
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig. 2. Box Plot for AI

1.2 Candidate Experience


Table 4. Skewness and Kurtosis values for Candidate Experience

From the above table 4 we can observe that the absolute skewness and kurtosis values for the first variable, i.e.,
Candidate Experience are -0.228 and 0.101 respectively. These values are less than 3, hence we can conclude by
saying that the variable data is normally distributed.

746
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig. 3. Q-Q Plot for Candidate exp.

The below box plot fig. 4 shows that the Candidate experience variable does not have outliers and hence we have
clean box plot for the dependent variable.
Fig. 4: Box plot for candidate experience

3. STATISTICS
2.1. Descriptive statistics:
3.1.1. Frequencies
Table 5: Descriptive statistics for AI, Candidate exp., Employer branding

747
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

2.1.2. Gender statistics:


Table 6: Gender statistics

Fig 5: Pie-chart showing gender of respondents

For the purpose of this study, Male respondents were coded as 1 and Female respondents were coded as
2. Out of the total number of respondents, 56.7% of the respondents i.e., 34 respondents were male and 43.3%
respondents i.e., 26 respondents were female.
2.1.3. Age Statistics:
Table 7: Age statistics

For the purpose of this study, 3 age groups were considered. The first age group was 18-24 years of age which
are the Gen Z. They are coded as 1 in the above table. The second age group was 25-40 years which are
considered as Millennials and coded as 2 for this study. Lastly, the age of group between 41- 56 years,
categorised as Gen X and coded as 3 for the purpose of this study.
In this study, we observe that 55% of the respondents belonged to the Gen Z in the age group of 18-24 years and
30% belonged to the age group o 25-40 years. The remaining 15% belonged to Gen X.

748
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Fig. 6: Pie-chart showing age of respondents

2.1.4. Management Level


Table 8: Grade level statistics

Fig. 7: Bar chart showing grade level of respondents

For the purpose of this study, I tried to understand which level of management does the candidate interview for
in order to further understand whether the experience would vary with change in management levels. The
management levels I undertook is as follows:
Management level Code for this study
Entry level (approx. 0-2 years ofexperience) 1
Executive/Associate level (3-6 years ofexperience) 2
Middle-level (7-10 years of experience) 3
Top-level (>11 years of years) 4
63.3% of the respondents interviewed for entry-level positions. Followed by 15% belonging to top-level
management roles.
749
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Moving onto to inferential statistics in order to test the hypothesis and study the objectives mentioned
previously.
3.2. Inferential Statistics:
3.2.1. Correlation:
Table 9: Correlation between variables

As we can see, the Pearson’s Correlation score between the dependent and independent variable is 0.572 and
therefore we can conclude that there is a moderate positive correlation between AI and candidate experience.
Secondly, since the significance value i.e., p= 0.000, is less than 0.5. Hence, we can conclude that there is a
significant association between the variables.
3.2.2. Regression:
Table 10: Model summary of regression

The value of R Square denotes the model fit. The R square value in percentages would be 32.7% . This denotes
that 32.7% of the variance caused in the dependent variable (candidate exp.) is because of the independent
variable (AI).
Table 11: ANOVA Table of regression

750
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

In the ANOVA Table 11., we observe that significance value, p= 0.000, which is less than 0.05. This
indicates that there is a significant relation between the two variables.
Table 12: Unstandardized Coefficient table

As per the Coefficients table, the unstandardized coefficients we get the equation; Candidate experience=
38.923+ (1.163) (Artificial Intelligence)
3.3. Hypothesis Testing for Secondary objectives
3.3.1. Ho: Candidate experience does not vary with the gender of the candidate.
T-Test

On observing the group statistics, Female respondents (coded as 2) have a higher mean for candidate experience
when compared to Male respondents (coded as 1). This highlights that female respondents are more likely to
have a better candidate experience due to AI as compared to the Male respondents.
Table 13: Independent T-test for candidate exp. and gender

The significance value (2-tailed) of the t-test was found to be greater than 0.05 (p=0.324). We conclude that
there is no significant difference in candidate experience in males and females
Hence, we accept Ho

751
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

3.3.2. Ho: Candidate experience does not vary with the grade levels of the position for which the hiring is
being done
Table 14: One-way ANOVA for candidate exp. and grade levels of respondents
One-way ANOVA

The significance value, p=0.498, which is greater than 0.05. Therefore, there is no significant change in
candidate experience with the change in grade levels of position for which the hiring is being done.
Hence, we accept the Ho
FINDINGS
As per the study and the statistics presented earlier, we observe that in our representative sample, 56.7% of the
respondents were male and 43.3% respondents were female. 55% of the respondents belonged to the Gen Z in
the age group of 18-24 years and 30% belonged to the age group o 25-40 years.
We observe that there is a moderate positive correlation between the two variables AI and candidate exp. with a
Pearson’s Correlation score of 0.572. This implies that if organisations increased the implementation of AI in
their hiring processes, candidate experience for potential employees is likely toincrease.
We conducted T-test and ANOVA tests to check if the candidate experience of the respondents varies between
males and females. It is observed that there is no significant difference in candidate experience between males
and females. Also, we conducted ANOVA test to check if candidate experience would vary between different
grade level the respondents interviewed for. Again, there was no significant difference in candidate
experience between different grade levels in which the respondents applied for.
One question that was asked to the respondents was whether human-interaction would give them better
experience rather than a full-fledged AI driven process and following were the responses:
Table 15: Human Interaction desirability

The question was on a 7-point Likert scale from ‘Strongly Agree’ to ‘Strongly Disagree’ (Strongly agreescore=7
and Strongly disagree score=1). Out of 60 respondents 10% strongly agreed to this statement and 35% agreed to
this statement that human interaction would give them better experience rather than afull AI driven process.
Lastly, the respondents were asked if they were more likely to recommend the company that implements AI, as
an employer to their friends, families and acquaintances and following were the results.

752
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Table 16: Employer branding scores

Out of 60 respondents, 28 respondents gave a score of 4 on a Likert scale from 1 to 5. 1 being “Not at all likely”
and 5 being “Most likely”. 13 respondents are most likely to recommend an organisation if it implements AI in
its hiring processes.
RECOMMENDATIONS
1. Organisations can implement AI tools for processes such as Application tracking and resolution of queries
and concerns while applying for the position.
2. Implementing chatbot systems can be beneficial to keep the candidate engaged throughout the hiring process
he/she undergoes.
3. Organisations need to find the right balance between implementing AI and keeping the human touch,
especially in India. As many job seekers are still under the process of understanding the AI disruption and
still expect and enjoy a certain level of human touch to the entire process.
4. AI powered tools for providing personalized experiences with job recommendations based on their skillsets,
search history, similar job openings can be suggested to such potential employees.
5. There could be an AI powered screening for candidates. Every candidate can be given a“candidate fit score”
based on their skillsets mentioned on the CV rather than a subconscious or conscious bias of the recruiter
while screening.
LIMITATIONS AND FUTURE SCOPE OF THE STUDY
This study is limited to 60 respondents who interviewed with IT based organisation in India. This may not give
a clear understanding of how candidate experience is impacted due to AI intervention in the talent acquisition
process across industries. Also, the results could vary between different industries, organisations and regions.
Hence, a similar study can be conducted for various industries and across a larger sample size that will help us
gauge the readiness of our job seekers across various generations when they encounter AI processes in
organisations. It will also help us understand the extent to which the AI disruption has occurred in India wherein
the business environment is changing so dynamically and drastically in such asmall span of time.
CONCLUSION
In conclusion, it can be stated that these set of respondents are a representative sample and The results could
vary for a larger sample size. However, it can be seen that introducing AI in the Talent Acquisition process will
definitely have a positive impact on the candidate’s experience.
AI for talent acquisition is growing to become a very crucial aspect of the HR technology ecosystem and such
systems can be implemented not only to improve candidate experience but also to remove the mundane and
repetitive tasks in the hiring process.
We can state that AI processes in Talent Acquisition could have a lasting impression in the minds of the
candidates that could go a long way in creating an employer brand for the organisation in the market.
REFERENCES
 Bhatnagar, P. S. (2010). Employer Brand For Talent Acquisition: An Exploration Towards Its
Measurement. Vision: The Journal of Business Perspective, 11.

753
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

 Dijkkamp, J. (2019, November 13). The recruiter of the future, a qualitative study in AI supported
recruitment process.
 Strategic Marketing & Business Information, University of Twente. Enschede.
 Esch, J. S. (2019). AI-enabled recruiting: What is it and how should a manager use it? Elsevier Inc.
 Kumar, S. M. (2017). E-recruitment and training comprehensiveness: untapped antecedents of employer
branding. Industrial and Commercial Training.
 Kurek, D. (2021). Use of Modern IT Solutions in the HRM Activities: Process Automation and Digital
Employer Branding. European Research Studies Journal, 20.
 Laumer, J. O. (2020). AI Recruitment: Explaining job seekers’ acceptance of automation in human
resource management. 15th International Conference on Wirtschaftsinformatik,.
 McCamey, S. J. (2018). The candidate experience: Is it damaging your employer brand? Elsevier Inc, 2-3-
8.
 Nishad Nawaz, A. M. (2019). Artificial Intelligence Chatbots are New Recruiters. International Journal of
Advanced Computer Science and Applications, 2-5.
 Patrick van Esch, J. S. (2019). Factors that influence new generation candidates to engage with and
compete digital, AI- enabled recruiting. Elsevier Inc.
 Phenom. (2021, August 11). Retrieved from Phenom.com: https://www.phenom.com/blog/recruiting-ai-
guide
 Raju, V. (2020, June 4). AIHR Digital. Retrieved from digitalhrtech.com: https:// www.digitalhrtech.com/
artificial- intelligence-talent-acquisition/
 Retorio. (n.d.). Retrieved from Retorio : https:// cdn 2.hub spot. net/ hubfs/
4733742/ Whitepaper %20 Candidate %20 Experience.pdf
 Richard D. Johnson, D. L. (2020). The benefits of eHRM and AI for talent acquisition. JOURNAL OF
TOURISM FUTURES. talentlyft. (n.d.). Retrieved from Talentlyft: https://www.talen

AUTHOR DETAILS:
1
DR. SWETA BANERJEE AND 2DR. MITTAL MOHITE
1
PhD, Dy. Director & Professor in Human Resource Management, Balaji Institute of Telecom and Management
(BITM), Sri Balaji University Pune, India
2
PhD, Associate Professor, Balaji Institute of Management & Human Resource and Development
Sri Balaji University Pune, India

754
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

FUZZY DECISION TREES WITH MATHEMATICAL SOFTWARE

DR. B. MOHANA PRIYAA

ABSTRACT
Fuzzy decision trees are the foremost widely held choices for book learning and rational classifications,
specifically when it consists of learning about the unique value (article-based) instances. For the reason that of
the realization, they have had in their area; many challenges are made to make a sweeping statement the tactic
to work recovering with real value, arithmetic characteristics, but to not disappear values or arithmetic effects
(i.e. for in receipt of worse everyday jobs). Throughoutthis study, we'll present-day some ways and means with
the aim of unification the greater than before readability of fuzzy decision trees with the malleability to handle
information or incorrect data providing by confusing the full picture.

1 INTRODUCTION
In topical an age, neural set-ups turn out to be more and more prevalent when it takes organization difficulties,
for the reason that of relation easy submission and gifts to foodstuffs gradual answers. Nevertheless, they lack
analogous levels of readability [7], which potency is a concern, exclusively if manipulators constraint
rationalise and recognise their pronouncements. In this luggage, only fuzzy decision trees are able to convince
agreeable outcomes. Fuzzy Decision trees were made popular by Quinlan [5], collected with the calculated
program. Systems buttressed this methodology perform above all well on representative fields. When an
arithmetical consequence is anticipated, or when arithmetical values recover the subsequent cognitive, this set
of rules is appropriate. One in the middle of the leading communal methods is to pre-partition the
standards in fixed-length intermezzos (thus, predefining a gathering of compressed intermissions that
concealment the comprehensive data). Following developments of this set of rules, like carefully worked-out
software, are prepared to pander to arithmetical data; selecting a split opinion reinforced instructive examples.
We’ll pronounce how such fuzzy decision trees are created in supplementary detail, inopportunely; this could
diminution the accurateness of the organisation, particularly for standards that are neighbouring the limitations
of the intermissions strong-minded during the working outsteps. So as to augment the questions that are sitting
for by the limitations of fuzzy decision trees, changed methodologies are through to amount around this topic.
One in every single of these methodologies is on condition that by fuzzy decision reason.
In fuzzy rule-based organisms, the representative rules make available calm, thoughtful and allocation of high-
level data, while the fuzzy sets, organized with fuzzy pronouncement reasoning and fairly accurate reasoning
procedures, make presented the influence to prototypical fine information. For that reason, fuzzy decision tree
demonstration is agreeable more and more prevalent in management teething troubles of hesitation, noise, and
imprecise data, being magnificently pragmatic during a number of corporate complications [3]. Conventionally
fuzzy decision trees ought to double the most important mechanisms: technique to generate the representative
tree and method for determining. We’ll contemporary some ways and resources to attitude together of person’s
types of machinery. The remnants of this broadsheet are prearranged as shadows: Section 2 comprises a short-
lived outline to fuzzy decision trees; a short-lived overview to pure mathematics and fuzzy decision tree is
covered in section 3, then away on the way to put on fuzzy decision tree intellectual is existing in section 4.
Finally, section 5 concludes this copy with selected judgements on the matter of other potential information in
this fuzzy decision tree exploration playing field.
2 FUZZY DECISION TREES
Fuzzy Decision trees, as their designation proposes, are conclusion sustenance gears that use a treelike
prognostic prototypical which map annotations about an element on quite a few levelled in the exterior the
tree up until accomplishment the complete supposition vis-à-vis the outcome of the definite occupation.
One in all the principal used set of rules for building decision trees has extended been the mathematical
software method introduced by Quinlan [5]. This set of rules tries to hypothesis the least possible
arrangement tree prop up a tiny truncated set of working out instances. The most inadequacies are that this
set of rules only reflects representative (discrete) standards both for qualities, likewise as for the subsequent
class. The additional major drawback of this technique takes in the definite detail that the pre-partitioning
necessitates preceding information of the data (how a lot of intermissions are compulsory, a way to cherry-
pick the split opinions between the intermissions). Following enhancements of the mathematical software set of
rules, like mathematical software [4] and CART [1] try and household intermissions in the best method (they
755
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

continuously effort to split a compressed intermission into double subintervals, and that they achieve this
by selecting the ideal split-point, founded in detail on the working out data). In this broadsheet, we will
deliberate a conceivable postponement of mathematical software that uses fuzzy logic instruments for
statements. Consequently, we determine to twitch by giving the overall idea behindhand this set of rules s.
The explanation late lies in Occam's razor opinion: it will continuously try to conceptualize a bulge that
exploits the material improvement after picking the characteristic for that precise node. Though, this does
not continuously foodstuffs the minimum tree and is consequently only an experiential. The data gain is
formal by the notion of materialentropy:
Where:
D(S) = - ∑ Fs(d). log2 Fs(d)

d∈cls
> D(S) is the entropy of the usual S
> Cls is the set of all curriculums that come across in the working outset
> Fs(d) are the rate (fraction) of the case in point that ought to the rate d in the set S.
Entropy is used to control which characters to use for the up-to-date node. The entropy of 0 symbols is an
effortlessly top-secret set. Complex entropy fundsthat the characteristic is recovering well-matched for a greater
data gain, which iswell-defined by the succeeding formulation:
n
Ǧ(S,A) = D(S) - ∑Fs(Ti)D(Ti).

i=1
Where:
_Ǧ(S,A) is the calculation of the fixed S after a split over the A representative
_D(S) is the records entropy of the out-of-date S
_n is the size of divergent values of the specific Tin S
_Fs(Ti) is the degree of recurrence (calculation) of the items revel in Ai as responsibility for Tin S

_Tiis the conceivable value of T

_Tiis a subset of S around all bits and fragments wherever the value of T is Ti

The material gain enumerates the event gotten unbearable per a specifiedcharacteristic. The above formulary,
however, put on providing the characteristic thatwe are subtracting the info expansion is distinct. If the
feature is arithmetical, the indistinguishable formulation is used, but, of sequence, captivating into thought the
specific, undeniable detail that we cannot function all likely standards for the given characteristic: Here, S≤α
is that the subsection of S comprising the examples with the values for the characteristic T less or equivalent
than a supposed \cut-point" αLikewise, S≥α shelters the climate that the consistent value is larger thanα. For
selecting the leading effective cut-point, numerous mathematical software applications suggest
categorization of the facts trials in S in line with the characteristic underneath examination and figuring the
facts gain for all norms flanked by successive occurrences. At each period, both the mathematical software set
of rules picks the quality that makes the most of the info gain. The mathematical software set of rules is defined
below. Of progression, one modification flanked bythe mathematical software set of rules s is that the set of
rubrics can reuse an arithmetical attribute at manifold levels of the tree. For separate attributes, but, onequality
is frequently rummage-sale lone once on each path after the think all the way altogether the way depressed to a
leaf. There remain in any case numerous other changes, but they're yonder the goal of this paper. We’ll label
the most opinions around concluding rules in such a tree in section 4.
3 FUZZY SET THEORY
In instruction to design comprehended the idea of fuzzy pure mathematics; we must continuously chief take
a short-lived appraisal of the traditional pure mathematics (also called crunchy set philosophy). Throughout

756
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

thiscircumstance, you will coarsely that a piece either goes to a plain set or it doesn't. T crispy set T ⊆ U is well-
defined by a two-valued distinguishing occupation T(U ):f → U
Where U is that the cosmos of all conceivable values of the climate (occasionally called the cosmos of
dissertation). Still, the distinguishing purpose of a collection exceptionally categorizes the set. Though, in
certain bags, due to inexact dimensions or maybe for a few language ideas, such a distinguishing meaning might
not serve. Notions like `big', `cold' or `small' are integrally fuzzy ideas and greatest of the period these are
personal or fervent around the setting.
The fuzzy pure mathematics spreads the two-valued distinguishing the meaning of an assortment to a real-
valued occupation. So, a fuzzy set T is designated by an involvement occupation μU:U →{0,1}, which
embodies the notch to which part μϵU fit into the set U. kind of like the important processes of combination,
connexion, and accompaniment clear in traditional set theory, such processes are clear for fuzzy sets.
Different from the crispy instance, these workers aren't exclusively clear. As an example, the Zadeh
workers for blending and node are very successful and min separately (conforming to the principal bright/best
negative of dual set involvement degrees). On the contradictory needle, the Lukasiewicz operatives that the
quantity (restricted by 1) for the combination and also the invention of binary involvement gradations for the
joint (this method was painstaking so as to strictly bout the actions from chance theory). Though, in both these
bags, the accompaniment of a given grade x is clear as 1 -x.
4 FUZZY DECISION TREE SET OF RULES S
A humble recognition to enlighten how the fundamentals are indirect from a call tree is to contemplate all the
plants of the chart. For every leaf, coincidence is often humbly instituted by construing the markers of the
bulges and brushwood that are come across vacillating from the origin of the tree all the way sad to the parallel
leaf. Then, so as to wish the complaint about one in each of the courses, we valour ordinarily pattern a
dislocation among all the shrubberies that have afee related to that class. This slant is basically the notion
overdue the conventional conclusion trees, but we are profitable to encompass it by carefully worked-out
logic. One of the most imperative shortcomings of conventional conclusion treesis that all tested things will
have a fair one leaf linked to them. Furthermore, this foliage is thoroughly allied with the effort examples. In
several cases, it power be an enjoyable eye to own close values someway linked with one extra. Also, it'd be
agreeable to be prepared to hypothesis decision trees by representative morals (big/small, warm/icy), but test
items having an arithmetical value. Of these questions is resolvable engaging a fuzzy method.
Successful back to the orthodox verdicts conditional by a special tree so as to crisscross an object counter to a
given decision tree, we valour start from the underpinning of the tree, and go depressed the tree by challenging
the characteristic increase in value this node and subsequent only the subdivision of the tree that resembles the
value that has the equal value as the thing we are difficult. In fuzzy terms, this would be cruel to trail only the
division such as the set anywhere our price involves a sternly confident affiliation degree. in the case of
crunchy decision trees, only 1 local office will have a mark of 1 and all one the conflicting values will have a
mark 0, but for our fuzzy method, we'll ponder all the twigs that the association degree of our thing to it
precise set is non-zero (or if we have attended in an earlier set of rules, for an association larger than a
specific threshold). For all nodes, we are profitable to flat have to visit in the notice the involvement of the thing
miserable the existing path (from the root of the lump, where the association is typically 1, all the way
depressed to this node). Over, indoors the case of crunchy decision trees, the association on the extant
path is habitually 1 (only one path and only 1 leaf have involvement 1, all the reverse ones obligate affiliation 0
and are consequently unnoticed). For straightforwardness, we are profitable to ask the affiliation degree of an
article to a detailed set of features because of the involvement of the element to the consistent tree node (or to
the consistent path indoors the tree). This affiliation is added slowly and needs to use a connection worker
for fuzzy associations. In other words, as that the qualities T1,T2………Tn was met from the base of the tree to
a careful lump(the knot will in this item air level k), the association degree of our item (as that the values for the
conforming qualities d1,d2………dn is:

∩n μ (T) (d)
i=1 i i
If we are difficult a figurative attribute, seeing on the semantics of the quality, we are bright to each test it
alongside mathematical values (for example, a disease of 250C may be well-thought-out 75% warm and 25%
icy), or againstrepresentative values. Once more, staking on the semantics of the quality, we are clever to either
757
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

assign a definite degree of resemblance amid like attributes or adopt they're entirely split, as outside the event
of standard decision trees. If we are taxing a mathematical attribute, we continually would house a disorder in
contradiction of a cut point ɳ. throughout this case, for each such quality, we will present an extra limit
ɳ> 0. About each blue-pencilled idea, we are motto that there's an ambiguity recess of dimension ɳ.
Private this recess, the state x < ɳ comprises a sure association degree amid 0 and 1. If the characteristic is
absent when challenging the item, Quinlan future [6] that the humblest tactic is to consistently rive an instance
into all broods if the wanted eye value isn't obtainable. In the end, slightly than realization one greenery, as
privileged the case of a crisp decision tree, we are fruitful to reach manifold leaves. The outcome repaid by
our tree for our assumed thing is regularly planned in plentiful ways, gaming on the semantics of the lessons.
Besides, for all discussion, we figure the connotation ofour article. This is often easy to calculate as for each
leaf we've the consistent value furthermore as an associate degree connected to it. We just need to figure the
disjuncture among the foliage that has a nominated value. If the modules aren't self- regulating, we are able to
total a prejudiced usual of the sprig values (the bulks beingthe affiliation gradations for all foliage):

∑ Value (ɳ)*μɳ
ɳ∈Greenery node

∑ Μɳ
ɳ∈Greenery node
Where
> Greenery Nodes is the fixed of all Greenery in the tree (since the association of non-accessible Greenery is zero, they
can be accepted from this calculation)
> Value(ɳ) is the value consistent with the Greenery node ɳ
> ɳ is the association degree of the assumed Greenery
For instance, reflect that we've got a high-quality tree those initially hush-hushtasters into 3 courses: grey, hoary
or dark and hence the shared leaf involvements 0.40, 0.35 and 0.25 singly. In some gears, we will ponder that a
blend of two modules be painstaking jointly of the conflicting lessons (in this situation, the group
\old" are the production, whether or not this can be not the leading probable class in custody with our decision
tree). In additional cases, lessons aren't similar, in the interior which circumstance, we'll yield the grouping with
the best mutual association mid the Greenery nodes (in our example, \grey" are the harvest).
5 EXPERIMENTAL SETUP
For example, think through that we need to get an excellent tree those initially secret tasters into 3 lessons: grey,
hoary or dark and thus the collective leaf involvements 0.45, 0.45 and 0.30 one-to-one. In some bags, we
are successful to reflect that a mixture of two courses is being careful jointly of the other classes (in this
circumstance, the group \grey" are the produce, whether or not this can be not the primary possible class to
retain with our decision tree). In extra cases, lessons aren't similar, within which case, we'll production the class
by the best-combined association among the Greenerybulges (in our example, \grey" are the production). For our
challenging drives, we used the J48 classifier providing by the Weka mechanism knowledge tool, which is an
open-source, easily available application of the exact software set of rules obtainable earlier5.
We indicated this so as to originate up with a call tree that reinforced a given occupation. The purpose we chose
for our principal test was sin(x), controlled to the intermission [-1; 1] (see figure 1). For the reason that we
are managing with only 1 incessant quality, the subsequent tree was a two tree with 25 greeneries, as seen in
figure 2. One of the difficulties of a call tree is that the productivity isn't incessant. There is a certain set of
rubrics s, similar to CART [1], which crop an estimate for every Greenery(founded afterwards all on the workout
samples), but exact software comprises a separate output. We chose as the productivity lessons 20 insignificant
strings consistent with the statistics. The drill data was selected for the sin(x) function round to 1 fraction, on
400 intermediate points inside the [-1; 1] rest. The erudite occupation is moreover depicted in corresponding
with the major task in figure 1. As you'll be clever to see, the purpose learned maybe a step purpose, which is
begun by our estimate (keep in attention this tree was created by circumnavigating the sin meaning on 450
opinions to 1 number). Whether or not such high-quality treestrength suffices for many requests, we are going to
try and recover it even more.
As an example, we confirmed how well this tree makes on 40000 middle ideasindoors the matching [-1; 1] rest
(we seasoned if the tree suitably prophesied the price of the sin meaning rounded to 1 fraction on these
758
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

quantities). The correctness of these facts is about 96.26%: 1089 examples out of the 40000 were imperfectly
secret (however, for of these facts, the error was by fair 0.1). Additionally, all of those unfitting cases were
neighbouring the cut opinions. This point toward that so as to improve the accurateness of our decision tree,
we obligation precise one midst themain downsides of most overseen education set of rules s. That is, all such
sets of rubrics s are contingent on the illustrative, correct data in the training stage. In our case, the lack of
cases near the precise cut ideas has led to erroneously foretold cut opinions. The response we recommend is to
form an ambiguous cut fact. First, let's analyze the distinguishing function of an archetypal cut opinion:

Figure 1: sin (ɳ) as learned by the mathematical software set of rules

Next, we introduce the notion of a fuzzy cut point by using an extra positiveparameter β

In other disputes, near the cut fact, there's a \hesitation" pause of measurement ɳ where the
individual function slashes linearly relatively than moving
its value from 1 to 0 nonstop. Since we chose this line picture within the \indefinite" interval, the rate of this
purpose is 0:5 at the first censored point. Recurring to the excellent tree, usually, we'd concept our rules by
preliminary at the foundation node and descendent within the tree by means of the right office. all through this
case, the outlet was permanently unique, as only 1 office had the distinguishing role adequate 1, all the
different ones having the typical 0 (if the quality chosen by the set of rubrics was numeric, in mathematical
software, this is able to resemble a node with only binary twigs, but if the quality was separate, the bulge
759
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

should have one division for every likely value of the quality). In our fuzzy cut fact perfect, the \correct"
division isn't any lengthier exclusively strong-minded. More precisely, each division joins a truth value
connected to it, diversity amid 0 and 1 (the association purpose related to the disorder that labels that branch).
Like the traditional cognitive in decision trees, we are successful to ignore all twigs with a 0 truth price
(and their consistent subtrees), but we'll travel all leaves which have a joint membership that's severely
positive. By the joint association of a greenery node we nasty the connection of the realism values of the labels
which are met from the foundation node right unhappy to the greenery in query. In our experimentation, we
used the Lukasiewicz operative for joining (the produce). The final step is to think near all the non-zero leaves
and their association degrees then to get the production of the purpose. One in all the humblest keys for this
trick is to need the biased amount of the greenery values (the bulks being the greenery associations). This also
income the yield of our decision tree will not be a step meaning, but a continuous one. Within the next pages,
we are successful in current some results gotten using this technique (by contrast to the specific sin (ɳ)
function), for innumerable values of ɳ (figures 3, 4, 5 and 6). Even as a cue, the classical decision tree agrees to
a price of ɳ = 0 (similar values as the job in figure 1).

Figure 3: Function obtained for ɳ= 0:1

Figure 4: Function obtained for ɳ = 0:8

760
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Figure 5: Function obtained for ɳ = 1:2

Figure 6: Function obtained for ɳ = 36 Summary and conclusions


This paper suggests a practice of reading decision trees by proper logic. A sum of the maximum operative
results realizable this way is subsequently we try to be voiced a job that's non-stop with relative to a given trait
that we are since formal sense. Even and yet lots of problems are still up for dialogue (such as electing the
tolerable fuzzy workers, indicating the crusty screen on each characteristic, then the connection role for each
quality). By this fuzzy understanding of the lumps, we will realize better correctness after calculating the
consequence of our classifier. But, this alteration amongst the growth and so the clarification of the resulting
tree can aim some errors while figuring the price for the exercise statistics himself. This willpower
infrequently is a huge issue, especially around local dangerous facts, but it may also run a badly valued piece of
info: it can sign where a slip inside the uniquedata has happened, especially if we are treating a reversion task. in
this situation, the loud input file will rootles sly trouble inside the forecast ethics, later the general prejudice
of uncertain result trees is to a \smooth" incessant meaning. The \flatness" of the function which is
foretold by a fuzzy decision tree derives from the prejudice of this fuzzy understanding: like values in the effort
must reason alike production. Also, whereas the crusty clarification of decision trees would generally yield a job
with various cut-off ideas (typically, the yield of such a high-quality tree could be a role which is endless on
trivial breaks, with gap points when substituting from one price to extra), the fuzzy understanding we optional
will continuously have infinite production (as that we define the affiliation marks on the traits for every pause
to edge adjoining breaks).
REFERENCES
1. R. Jain, Decision-making in the presence of fuzzy variables, IEEE Trans. Syst. Man Cybern. 6 (1976) 698–
703.
2. R. Jain, A procedure for multi-aspect decision making using fuzzy sets, Int. J.Syst. Sci. 8 (1978) 1–7.
761
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

3. D. Dubois, H. Prade, Operations on fuzzy numbers, Int. J. Syst. Sci. 9 (1978)613–626.


4. G. Bortolan, R. Degani, A review of some methods for ranking fuzzy numbers, Fuzzy Sets Syst. 15 (1985)
1–19.
5. E.S. Lee, R.J. Li, Comparison of fuzzy numbers based on the probability measure of fuzzy events,
Comput. Math. Appl. 15 (1988) 887–896.
6. S.J. Chen, C.L. Hwang, Fuzzy Multiple Attribute Decision Making, Springer,New York, 1992.
7. F. Choobineh, H. Li, An index for ordering fuzzy numbers, Fuzzy Sets Syst. 54(1993) 287–294.
8. G. Dias, Ranking alternatives using fuzzy numbers: a computational approach, Fuzzy Sets Syst. 56 (1993)
247–252.
9. K.M. Lee, C.H. Cho, H. Lee-Kwang, Ranking fuzzy values with satisfaction function, Fuzzy Sets Syst. 64
(1994) 295–311.
10. I. Requena, M. Delgado, J.I. Verdagay, Automatic ranking of fuzzy numbers with the criterion of decision-
maker learnt by an artificial neural network’’, Fuzzy Sets Syst. 64 (1994) 1–19.
11. Liu X, Feng X, Pedrycz W (2013) “Extraction of fuzzy rules from fuzzy decision trees: An axiomatic fuzzy
sets (AFS) approach”. Data and Knowledge Engineering, 84:1-25.
12. Sun, Jinkun “Power instability prediction method for wind turbine based on fuzzy decison tree” in
Journal of intelligent and fuzzy systems, vol 39, no. 2 pp -1439-1447, 2020.
13. M. Kuhn, S. Weston, N. Coulter, and M. Culp, C5.0:C5.0 Decision Trees and Rule-Based Models, CRAN,
Germany, 2018, https://cloud.r- project.org/package=C50.
14. Galka, Jakub, Jaciow and pawel “speaker indification using fuzzy i-vector tree”in Journal of intelligent and
fuzzy systems, vol 37, no. 4 pp 4937-4949, 2019.
15. J.Mingers. “An Empirical Comparison of Prunning Methods for Decision Tree Induction”. Machine
Learning4, 1989, pp. 227-243.
16. J. Mingers. “An Empirical Comparison of Selection Measures for Decision- Tree
Induction”. MachineLearning3, 1989, pp. 319-342.

AUTHOR DETAILS:
DR. B. MOHANA PRIYAA
Assistant Professor, Department of Mathematics, Trinity College for Women, Affiliated to Periyar University,
Namakkal

762
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

A NEW METHOD TO FIND BASIC ACCEPTABLE SOLUTION FOR TRANSPORTATION


PROBLEMS

J. BOOBALAN AND P. RAJA

ABSTRACT
In today’s competitive world, the Transportation problems plays a vital role. To maximize cost profit,
organizations are always aiming for revenue. In this paper, we are proposing a new algorithm to find an
optimal solution for minimize transportation cost and maximize profit. In this research, some of these measures
are used to find the basic acceptable solution for transportation problems. Better results are obtained by using
these measures by taking five applications with different capacities.
Keywords: Transportation problem, Northwest-corner method, Least-cost method, Vogel approximation
method, Harmonic Mean Method, Median Method

1. INTRODUCTION
The transportation problem is one of the extraordinary kind of Linear Programming problems in which the
objective is to transport various quantities (goods) initially stored at different origins/plants/factories to various
destinations/distribution centres /warehouses in such a way that the total transportation cost is minimized. To
accomplish this objective, we should decide the number of available supplies and the quantities demanded.
Also, we should decide the transportation costs from various origins to various destinations. The Transportation
Problem (TP) was first formulated by Hitchcock [12] and was independently treated by Koopmans[18]. Monge
[22] defined it and unravelled it by mathematical methods. In 1951, after the introduction of the Simplex
Algorithm by Dantzig [6], complex transportation problems which stirred in business were solved and found
optimal solutions. Reinfeld and Vogel [23] gave a clear insight into Mathematical Programming. Hamdy [11]
narrated about Operations Research. Ford and Fulkerson [9] gave a clear idea on Solving Transportation
Problem. Researchers concentrated broadly in finding alternative methods to solve cost-minimizing
transportation problems.
In the literature, a few heuristic solutions approach such as the Northwest corner method (NWCM) by Charnes
et. al [5], Juman and Hoque’s Method(JHM) [15], Goyal’s version of VAM(GVAM) [10], Efficient Heuristic
Approach(EHA) [14,16,19,20], was proposed to obtain an Initial Feasible Solution (IFS) to Transportation
Problem. Ahmed et. Al. [4] conceived Incessant Application Method for solving Transportation Problems.
Also, Akpana et. al. [2] developed A Modified Vogel Approximation Method for Solving Balanced
Transportation Problems. Ullah et. al. [25] obtained Modified Vogel’s Approximation Method for Obtaining a
Good Primal Solution of Transportation Problems. Deshmukh [7] developed An Innovative Method for Solving
Transportation Problem. Manisha and Sarode [21] gave an Application of a Dual Simplex Method to
Transportation Problem to minimize the cost. Hosseini [13] developed Three New Methods [Total Differences
Method 1 (TDM1, TDM2) and Total Differences lest Squares Method 1 (TDSM)] to Find Initial Basic Feasible
Solution for Transportation Problems. Ahmed et al. [3] presented A New Approach to Solve Transportation
Problems. Soomro et. al. [24] conceived Modified Vogel’s Approximation Method for Solving Transportation
Problems. Juman and Nawarathne [17] presented an alternative approach to solving a Transportation Problem.
Adhikari and Thapa [1] presented a new approach for finding an optimal solution for the Transportation
Problem. Ekanayake et. al. [8] obtained A modified Ant Colony Optimization Algorithm for Solving a
Transportation Problem.
2. PROPOSED METHODS
The proposed method is simple to implement and can also be the basic solution method for the Balanced
Transportation Problem.
2.1 Harmonic Mean Method (HMM)
The following are the basic steps for this method:
𝑛
̅=
Step 1: Calculate the harmonic mean of the costs in each row and column according to the equation 𝐻 1
∑𝑛
𝑖=1 𝑐𝑖

Step 2: Determine the highest harmonic mean in all rows, columns and then choose the cell containing the least
cost to give the appropriate amount of availability(supply) to meet the needs(demand).
763
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Step 3: Delete the row that ran out of the supply or column that was filled in the demand so as not to enter into
the harmonic mean again.
Step 4: Repeat steps (1-3), and then calculate the total cost.
2.2 Median Method (MM)
Step 1: Calculation the median of the costs in each row and column by ascending order (or descending). If the
𝑛 𝑛
number of costs is even, the median represents the arithmetic mean of the two values in order 2 and 2 + 1, but
𝑛+1
if the number of costs is odd, the median represents the value of order .
2
Step 2: Determine the highest median in all rows and columns and then choose the cell containing the least cost
to give the appropriate amount of available (supply) to meet the needs (demand).
Step 3: Delete the row that ran out of the supply or column that was filled in the demand so as not to enter into
the median again.
Step 4: Repeat steps (1-3), then calculate the total cost
3. NUMERICAL RESULTS
In order to observe the best methods proposed in this research, five examples of different transport models are
presented. The total cost of the proposed method is calculated and compared with the classical methods as
follows:
3.1 Example
D1 D2 Supply
S1 4 2 60
S2 7 5 40
S3 3 10 70
Demand 105 65 170
3.2 Example
D1 D2 D3 D4 Supply
S1 7 3 8 2 100
S2 5 6 11 12 200
S3 10 4 7 6 300
Demand 80 170 190 160 600
3.3 Example
D1 D2 D3 D4 Supply
S1 20 16 14 20 9
S2 9 15 16 10 8
S3 8 13 5 9 7
S4 9 6 5 11 5
Supply 5 10 5 9 29
3.4 Example
D1 D2 D3 D4 D5 Demand
S1 4 3 1 2 6 65
S2 5 2 3 4 5 50
S3 3 5 6 3 2 40
S4 2 4 4 5 3 20
S5 4 3 6 5 1 25
Supply 60 60 30 40 10 200
Table 1
S.No/Methods NWCR LCM VAM HMM MM
1.[3.1] 1185 600 600 600 600
2.[3.2] 4010 3450 3210 3210 3210
3.[3.3] 392 308 308 306 306
4.[3.4] 11100 9100 7100 6650 6650
764
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

The table 1 shows that our proposed method is compared with other existing methods and the proposed method
gives better solution, easy to understand and apply to real life situation.

4. CONCLUSION
Statistical measures have been seen from observing and discussing Table 1. These are either Central
Tendency or Scattering Measures. They can be used as methods to find the basic acceptable solution for
Transportation Problem. In addition, it was concluded that the proposed method is easy to apply to all types of
transport problems and are an important decision-making tool in order to reach the basic solution of the lowest
possible total cost of goods transportation. The mathematical steps of these methods are easy to implement in
real life situations.
REFERENCES
[1] P. Adhikari and G. B. Thapa, “A Note on Feasibility and Optimality of Transportation Problem”, Journal
of the Institute of Engineering, 10 (1), 2000, pp. 59–68. [2].
[2] Akpana, T. Ugbeb, J. Usenc and O. Ajahd. “A Modified Vogel Approximation Method for Solving
Balanced Transportation Problems”, American Scientific Research Journal for Engineering, Technology,
and Sciences (ASRJETS), 14 (3), 2015, pp. 289-302.
[3] M. M. Ahmed, A. R. Khan, S. Uddin and F. Ahme “A New Approach to Solve Transportation Problems”,
Open Journal of Optimization, 5, 2016, pp. 22-30.
[4] M. M. Ahmed, A. R. Khan, F. Ahmed, Md. S. Uddin, “Incessant Allocation Method for Solving
Transportation Problems”, American Journal of Operations Research, 6, 2016, pp. 236-244.
[5] A. Charnes, W. W Cooper and A. Henderson, “An Introduction to Linear Programming” John Wiley &
Sons, New York. 1953.
[6] G. B. Dantzig, “Linear programming and extensions”. Princeton, NJ: Princeton University press’’, 1963.
[7] N. M. Deshmukh, “An Innovative Method For Solving Transportation Problem”, International Journal of
Physics and Mathematical Sciences, Vol. 2 (3), 2012, pp. 86-91.
[8] E. M. U. S. B. Ekanayake, S. P. C., Perera, W. B. Daundasekara, and Z. A. M. S. Juman, “A Modified Ant
Colony Optimization Algorithm for Solving a Transportation Problem” Journal of Advances in
Mathematics and Computer Science, 2020, 35 (5), 83-101.
[9] L. R. Ford, and D. R. Fulkerson, “Solving the transportation Problem”, The RAND Corporation. 1956.
[10] S. K. Goyal, “Improving VAM for unbalanced transportation problems”, Journal of Operational Research
Society 35,1984, pp. 1113-1114.
[11] A. T. Hamdy, “Operations Research: An Introduction. 8th Edition, Pearson Prentice Hall, Upper Saddle
River. 2007.
[12] F. L. Hitchcock, “The distribution of a product from several resources to numerous localities”, J. Math.
Phy., 20,1941, pp. 224-230.
765
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[13] E. Hosseini, “Three New Methods to Find Initial Basic Feasible Solution of Transportation Problems”,
Applied Mathematical Sciences, 11 (37), 2017, pp. 1803-1814.
[14] T. Imam, G. Elsharawy, M. Gomah M, I. Samy, “Solving Transportation Problem”, Using Object-Oriented
Model. Int. J. comput. Sci. Netw. Secur. 9 (2), 2009, pp. 353-361.
[15] Z. A. M. S. Juman, M. A. Hoque, “An efficient heuristic approach for solving the transportation problem”,
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management
Bali, Indonesia, 2014.
[16] Z. A. M. S. Juman, M. A. Hoque, “An efficient heuristic to obtain a better initial feasible solution to the
transportation problem”, Applied Soft Computing 34, 2015, pp. 813-826.
[17] Z, A, M, S. Juman, N. G. S. A. Nawarathne, “An efficient alternative approach to solve a transportation
problem. Ceylon Journal of Science 48 (1), 2019, pp. 19-29.
[18] T. C. Koopmans, “Optimum Utiliztion of Transportation System”, Econometrica, Supplement vol 17,
1949.
[19] S. Korukoglu, S. Bali, “A improved Vogel Approximation Method for the transformation Problem”,
Mathematical and computational Applications 16 (2), 2011, pp. 370-381.
[20] S. S. Kulkarni, H. G. Datar, “On Solution To Modified Unbalanced Transportation Problem”. Bulletion of
the Marathwada Mathematical Society 11 (2), 2010, pp. 20-26.
[21] V. Manisha, M. V. Sarode, “Application of a Dual Simplex method to Transportation Problem to minimize
the cost”, International Journal of Innovations in Engineering and Science, 2 (7), 2017.
[22] G. Monge. Mémoire sur la théorie des déblais et des remblais. Histoire de l’Académie Royale des Sciences
de Paris, avec les Mémoires de Mathématique et de Physique pour la même année, pages 666–704, 1781.
[23] N. V. Reinfeld and W. R. Vogel, 1958. Mathematical Programming. Englewood Cliffs, NJ: Prentice-Hall.
[24] A. S. Soomro, M. Junaid and G. A. Tularam “Modified Vogel’s Approximation Method For Solving
Transportation Problems”, Mathematical Theory and Modeling, 5 (4), 2015.
[25] M. W. Ullah, M. A. Uddin and R. A. Kawser, “Modified Vogel’s Approximation Method for Obtaining a
Good Primal Solution of Transportation Problems”, Annals of Pure and Applied Mathematics, 11 (1),
2016, pp. 63-71.

AUTHOR DETAILS:
J. BOOBALAN1 AND P. RAJA2
1
Department of Mathematics, Annamalai University, Manbumigu Dr. Puratchithalaivar, M.G.R.Government
Arts and Science College, Kattumannarkoil– 608 301, India
2
Department of Mathematics, Periyar University College of Arts and Science, Pappireddipatti– 636 905, India

766
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

COMPRESSION OF DIFFERENT TECHNIQUE USING FOR INTERFERENCE AVOIDANCE


MECHANISMS IN BLUETOOTH

NITI SINGHAL AND DR. RUCHI SHARMA

ABSTRACT
The fast development and extension of remote empowered conditions have expanded the requirement for
complex Service Discovery Protocols (SDPs). Ordinarily, Service Discovery includes a customer, specialist co-
op, and query or registry worker. Administration enrollment and query, or coordinating, are significant parts of
most regular SDPs including Jini, the Service Location Protocol (SLP), Salutation, UPnP (general attachment
and play), and UDDI (widespread portrayal, disclosure, and incorporation). Key difficulties in remote versatile
impromptu organizations are computational asset imperatives, power restrictions, and effective assistance
revelation procedures. The short-range radio organization innovation Bluetooth experiences long help
revelation postponements and high-power utilization because of important association foundation among
finding and found element. Based on a performance evaluation, we present the comparison of different
approaches available.
Keywords: Service discovery; Bluetooth; Adaptive frequency hopping; Max-Min D Clustering.

I. INTRODUCTION
Bluetooth was designed as a cable replacement technology. It is a short range radio link designed to connect
portable and/or fixed electronic devices. The effective range, to date, is thirty feet or ten meters. It is a
combination of software and hardware technology. The hardware is riding on a radio chip. On the other hand,
the main control and security protocols have been implemented in the software. By using both hardware and
software Bluetooth has become a smart technology for efficient and flexible wireless communication system.
The Bluetooth SIG (Special Interest Group) has developed to reduce the cost of implementation and speed up its
adoption for various applications. The Bluetooth specifications provide for three basic security services: - •
Authentication: verifying the identity of communicating devices based on their Bluetooth device address.
Bluetooth does not provide native user authentication. • Confidentiality: protecting information from
eavesdropping by ensuring that only authorized devices can access and view transmitted data. • Authorization:
allowing the control of resources by ensuring that a device is authorized to use a service before permitting it to
do so. Bluetooth devices are low-power and have a range of 10m distance from the device. Today Bluetooth
technology is the implementation of the protocol defined by the IEEE 802.15 standard. The standard defines a
wireless PAN (Personal Area Network) operable in an area of the size of a room or a hall. It is a protocol of
choice to connect two or more devices that are not in direct line of sight to each other. A security association
between two devices can be connected manually by pairing i.e. the user entered common PIN (Personal
Identification Number) number to each of the devices. When two devices attempt to connect, unique key is
generated based on the PIN number entered on both the devices. Attacks like Bluesnarf retrieve personal data
from the devices with flawed implementation of access control. Whenever a device tries to attempt to connect to
another device, a Bluetooth user has the ability to choose if he/she wants to connect or not. However, Bluetooth
devices are prone to attacks such as battery exhaustion, man in the middle, denial of service, and unauthorized
device control and data access [3]. Experts have warned that unless higher security protection is delivered, all
transmission of sensitive data over Bluetooth would be unwise.
II. BLUETOOTH
Bluetooth was designed as a cable replacement technology. It is a short range radio link designed to connect
portable and/or fixed electronic devices. The effective range, to date, is thirty feet or ten meters. It is a
combination of software and hardware technology. The hardware is riding on a radio chip. On the other hand,
the main control and security protocols have been implemented in the software. By using both hardware and
software Bluetooth has become a smart technology for efficient and flexible wireless communication system.
The Bluetooth SIG (Special Interest Group) has developed to reduce the cost of implementation and speed up its
adoption for various applications. The Bluetooth specifications provide for three basic security services: - •
Authentication: verifying the identity of communicating devices based on their Bluetooth device address.
Bluetooth does not provide native user authentication. • Confidentiality: protecting information from
eavesdropping by ensuring that only authorized devices can access and view transmitted data. • Authorization:
allowing the control of resources by ensuring that a device is authorized to use a service before permitting it to
767
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

do so. Bluetooth devices are low-power and have a range of 10m distance from the device. Today Bluetooth
technology is the implementation of the protocol defined by the IEEE 802.15 standard. The standard defines a
wireless PAN (Personal Area Network) operable in an area of the size of a room or a hall. It is a protocol of
choice to connect two or more devices that are not in direct line of sight to each other. A security association
between two devices can be connected manually by pairing i.e. the user entered common PIN (Personal
Identification Number) number to each of the devices. When two devices attempt to connect, unique key is
generated based on the PIN number entered on both the devices. Attacks like Bluesnarf retrieve personal data
from the devices with flawed implementation of access control. Whenever a device tries to attempt to connect to
another device, a Bluetooth user has the ability to choose if he/she wants to connect or not. However, Bluetooth
devices are prone to attacks such as battery exhaustion, man in the middle, denial of service, and unauthorized
device control and data access [3]. Experts have warned that unless higher security protection is delivered, all
transmission of sensitive data over Bluetooth would be unwise. II. PROTOCOL STACKS OF BLUETOOTH A
protocol stack is a combination of software/hardware implementation of the actual protocols specified in the
standard. It also defines how the devices should communicate with each other based on the standard. The
Bluetooth protocol stack is shown in Figure 1. Each component of the Bluetooth stack is explained below. •
Bluetooth Radio: specifics details of the air interface, including frequency, frequency hopping, modulation
scheme, and transmission power. • Baseband: concerned with connection establishment within a piconet,
addressing, packet format, timing and power control. • Link manager protocol (LMP): establishes the link setup
between Bluetooth devices and manages ongoing links, including security aspects (e.g. authentication and
encryption), and control and negotiation of baseband packet size. Vikethozo Tsira et al, Int.J.Computer
Technology & Applications, Vol 5 (5),1833-1837 IJCTA | Sept-Oct 2014 Available online@www.ijcta.com
1833 ISSN:2229-6093 Fig 1: Bluetooth Protocol Stack [6] • Logical link control and adaptation protocol
(L2CAP): adapts upper layer protocols to the baseband layer. Provides both connectionless and connection-
oriented services. • Service discovery protocol (SDP): handles device information, services, and queries for
service characteristics between two or more Bluetooth devices. • Host Controller Interface (HCI): provides an
interface method for accessing the Bluetooth hardware capabilities. It contains a command interface, which acts
between the Baseband controller and link manager • TCS BIN (Telephony Control Service): bitoriented
protocol that defines the call control signaling for the establishment of voice and data calls between Bluetooth
devices. • OBEX(OBject EXchange) : Session-layer protocol for the exchange of objects, providing a model for
object and operation representation • RFCOMM: a reliable transport protocol, which provides emulation of
RS232 serial ports over the L2CAP protocol • WAE/WAP: Bluetooth incorporates the wireless application
environment and the wireless application protocol into its architecture.

Reaction alongside a continuation state boundary [1]. All SDP interchanges utilize just the BR/EDR regulator.

768
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

III. CLUSTERING
Clustering helps in grouping the data into similar clusters or groups that helps in uncomplicated retrieval of
data. The data within a single cluster contains close associations with each other, while the data in different
clusters do not present close associations. Figure 2 shows the visualization of a sample cluster. Clustering is
quite possibly the main examination subjects in both AI and information mining networks. Clustering alludes to
apportioning the given information into gatherings. Each gathering contains objects that are comparable in
nature. Thus, Clustering helps in discovering designs in a gathering. This is a solo learning procedure;
consequently, client obstruction is discovered to be insignificant when playing out the way toward grouping.
Ordinary Clustering calculations, for example, the k-implies Clustering calculation plays out the cycle of a
straightforward consistent gathering of hubs. Correspondences are normally completed between the individual
hubs. Cluster analysis is a technique that divides the data in such a way that the in-lying patterns can be
discovered. Clustering techniques are known as “Unsupervised Learning” because there is no prediction or user
interaction involved in the clustering process. The main goal of clustering data is to find common patterns or to
group similar cases in the data.
The clustering analysis, as one of data mining technology, plays an important role in the process of advanced
data analysis. It is not only used as the sophisticated stage of data pre-processing but also directly used for
advanced data processing, but because of different application fields and incorrect application, the clustering
results always are not entirely satisfied. One of the important reasons is that different distribution patterns of
original data could produce relevant influence on clustering results. If the users could not identify the
applicability of different clustering methods on spatial data distribution, the technology value of clustering
methods would not be realized.

Figure 2: A sample Cluster


IV. SERVICE DISCOVERY
If a flexible service discovery framework is lacking, nodes in a mobile, and in particular in infrastructure-less
and constantly changing, environment will be restricted to utilize just their own administrations and assets (or
probably any such administrations and assets that are pre-arranged by framework heads). Administration
disclosure is subsequently central for activity in obscure conditions (and for viable reasons in portable and
inescapable conditions). Autonomic help disclosure is the doorway to autonomic portable registering, since it
empowers heterogeneous hubs to interface with one another, learn and adjust to their current circumstance.
Without this part no self-arrangement, self-enhancement, self-mending or self-insurance can be performed. [2].
To discover a service, a client uses one of these protocols to issue a query to a central server or an individual
service provider. The service description in the query may contain a specific name and set of one or more
attributes. The server or provider attempts to match the query’s pattern with the pattern of a service its database
contains, then it returns the appropriate response to the client [1]. The Bluetooth Low Energy (BLE) standard
provides a low power solution to connect IoT nodes with mobile devices [14].
A. Security Constraints
Many secure problems of the service discovery have been brought in Pervasive computing environment. Firstly,
in pervasive computing, dozens to hundreds of devices and services may surround a user. How to protect the
privacy of the service provider and service requestor during the communication is a problem. At the service
provider’s side, administration data, proprietors' characters, and presence data should simply be presented to
authentic clients and stowed away from others. At the administration requestor's side, personalities utilized for
769
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

verification, clients' essence data, and administration inquiry data should possibly be uncovered when it
essential. Secondly, the pervasive computing environment is comprised of numerous devices, and the devices
may join the network or leave it at any time. The model needs to adapt to the dynamic of the devices [8].
DISCUSSION ON BLUETOOTH TECHNOLOGY
A. Bluetooth History Bluetooth is a wireless technology standard for exchanging data over short distances. This
technology was created to solve a simple problem of replacing the cables used on mobile hand held devices
with RF communication technologies. Consequently, one of the earliest applications of Bluetooth was in the
context of mobile devices. The technology encompasses a simple low-cost, low-power, global radio system for
integration into mobile devices. Such devices can form a quick ad-hoc secure ”piconet” and communicate
among the connected devices. Bluetooth is a wireless technology designed to connect devices of different
functions such as telephones, notebooks, computers (desktop and laptop), cameras, printers, coffee makers, and
so on. A Bluetooth LAN is an adhoc network, which means that the network is formed spontaneously; the
devices, sometimes called gadgets, find each other and make a network called a piconet.
V. PRELIMINARY RESULTS
A fixed Bluetooth transmitter can offer mobile services to people in proximity. However, the Bluetooth device
discovery process introduces a significant delay, which impacts usability [5].The challenges are encountered
mainly in the device discovery and selection step. The Bluetooth specification declares a service discovery
profile which supports Bluetooth enabled devices to search for services specified by a 128 (128B), 32 (32B) or
16-bit (16B) UUID [7]. First, Bluetooth device discovery is time consuming: theoretically it takes 10.24
seconds, but in practice it normally takes longer. Second, Bluetooth device discovery does not scale well in the
presence of numerous Bluetooth devices [5].
In a Classic Bluetooth, when two terminals perform the connection procedure, these terminals cannot accept
connection requests from other terminals even when they receive connection request packets [11]. It also
increases the discovery time for Bluetooth devices.
VI. CONCLUSIONS AND PERSPECTIVES
The numerical results showed that the signal collision probability of Advanced- Neighbor Discovery Process
(A- NDP) is always lower than that of B-NDP (Basic), and hence the discovery delay performance of A-NDP is
better than that of B-NDP [8]. Bluetooth Classic and Low Energy, exhibit different characteristics with respect
to velocity and road context [12]. It is important to characterize the different behaviors of both BC and BLE.
Information about what is discovered, as well as when and where, should be logged locally and upload to our
back-end whenever possible.Service discovery is a fundamental component of systems running in a pervasive
computing environment [8].
Bluetooth receives an inquiry-based methodology. Gadget data, administration, and the qualities of the
administrations are questioned and associations between at least two Bluetooth gadgets are set up. It likewise
restores all coordinated assistance data; nonetheless, Bluetooth doesn't give powerful security in help sharing
and flaw lenient highlights [8].
Therefore, in order to enhance the security, as well as improving the discovery process, the best alternative is
Frequency Hop Spread Spectrum (FHSS) [6],which is already employed in Bluetooth discovery, but rather
required to be improved. Frequency hopping is method of spreading a relatively low data rate digital signal over
a large bandwidth [6]. In the zone of combat zone correspondence, aimlessly jumping period and bouncing
recurrence assessment from a progression of uproarious recurrence bouncing (FH) signals is a significant
examination subject [15]. Soon, we attempt to improve the exhibition of revelation through FHSS.
REFERENCES
[1] SasikanthAvancha, Anupam Joshi, and Timothy Finin, "Enhanced Service Discovery in Bluetooth", IEEE
Transaction on Communications, pp. 95-99, 2002.
[2] Igor Sedov, Stephan PreuB, Clemens Cap, Marc Haase, and Dirk Timmermann, "Time and Energy
Efficient Service Discovery in Bluetooth", IEEEProceeding, pp. 418-422, 2003.
[3] Rozeha A. Rashid, and RohaizaYusoff, "Bluetooth Performance Analysis in Personal Area Network
(PAN)", International RF and Microwave Conference Proceedings, Putrajaya, Malaysia, pp. 393-397,
2006.
[4] Rupali Favade, Vikrant S. Kaulgud, and Sakib A. Mondal, "An Enhanced Service Discovery Protocol for
Bluetooth Scatternets", IEEE, pp. 261-264, 2006.
770
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[5] Jonathan R. Engelsma, and James C. Ferrans, "Bypassing Bluetooth Device Discovery Using a Multimodal
User Interface",IEEE Proceeding, 2007.
[6] Branislav LOJKO, "A Contribution to the Design of a Frequency Synthesizer for Fast Frequency-Hopped
Spread- Spectrum Systems",IEEE, 2007.
[7] Andre Peters, and Andreas Heuer, "Time Efficient Service Discovery in Mobile P2P Architectures using
Bluetooth", 19thInternational Conference on Database and Expert Systems Application, pp. 347-351, 2008.
[8] Fang Shen, Qingqi Pei, and Shu-po Bu, "A trust-based dynamic secure service discovery model for
pervasive computing", Seventh International Conference on Computational Intelligence and Security, pp.
630-634, 2011.
[9] JinsukSeong, Myungsup Kim, Seong Ro Lee, and Iickho Song, "A Hopping Phase Estimator for Frequency
Hopped FM/BFSK Signals", IEEE ISCE, pp. 1-4, 2014.
[10] Bin Zeng, and Lu Yao, "A Robust Estimation Algorithm for Device Discovery in Bluetooth Networks",
5th International Conference on Computer Science and Network Technology (ICCSNT), pp. 488-492,
2016.
[11] Nobuhiro Kajikawa, Yuya Minami, Eitaro Kohno, and Yoshiaki Kakuda, "On Availability and Energy
Consumption of the Fast Connection Establishment Method by Using Bluetooth Classic and Bluetooth
Low Energy", Fourth International Symposium on Computing and Networking, pp. 286-290, 2016.
[12] Walter Bronzi, Thierry Derrmann, German Castignani, and Thomas Engel, "Towards Characterizing
Bluetooth Discovery in a Vehicular Context", IEEE Vehicular Networking Conference (VNC), 2016.
[13] Walter Bronzi, Thierry Derrmann, German Castignani, and Thomas Engel, "Characterizing Driving
Environments Through Bluetooth Discovery", IEEE ICTC, pp. 501-506, 2017.
[14] Abdullah Alghaihab, Jacob Breiholz, Hun-Seok Kim, Ben Calhoun, and David D. Wentzloff, "A 150 μW -
57.5 dBm- Sensitivity Bluetooth Low-Energy Back-Channel Receiver with LO Frequency Hopping",IEEE
Radio Frequency Integrated Circuits Symposium, pp. 324-327, 2018.
[15] Yun He, Yang Su, Yuan Chen, Yao Yu, and Xiaolong Yang, "Double window spectrogram difference
method: A blind estimation of frequency-hopping signal for battlefield communication environment",
24thAsia-Pacific Conference on Communications (APCC), pp. 439-443, 2018.
[16] Gaoyang Shan, and Byeong-heeRoh, "Performance Model for Advanced Neighbor Discovery Process in
Bluetooth Low Energy 5.0-enabled IoT Networks", IEEE Transactions on Industrial Electronics, 2019.

AUTHOR DETAILS;
1
NITI SINGHAL AND 2DR. RUCHI SHARMA
1
Research Scholar and 2Professor, Department of Electronics and Communication Engineering,
Vivekananda Global University, Jaipur, India

771
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Received: 10th March 2022 Revised: 16th April 2022 Accepted: 25th May 2022

MODIFIED EXPANDING RING SEARCH BASED ON TTLOPTIMIZATION FOR MANETS

PRAKHAR SHARMA AND SURJEET

ABSTRACT
Mobile Ad Hoc Networks MANETs) comprise of mobile and wireless nodes connected with each other in an
infrastructure- less manner. Each node in such networks due to non-provision of any fixed access point can act
as a source or a downstream node as well as an intermediate router. Due to dynamic topological structure of
these networks, designing optimum routing protocols pose a great challenge. This paper mainly focuses on an
enhanced routing approach based on Ad hoc On demand Distance Vector (AODV) by modifying Time To Live
parameter during route discovery phase of AODV to reduce end-to-end delay.
Keywords- Mobile ad hoc network, Ad hoc On demand Distance Vector, Time-to-live, End-to-End Delay

VI. INTRODUCTION
With recent advancement in wireless technology, need for infrastructure-less independent networks has
emerged considerably. A Mobile Ad Hoc Network (MANET) [1] is an infrastructure-less wireless network
comprising various interconnected mobile devices. The nodes in the network are mobile and move randomly
without any restriction as long as they are within the transmission range of any node comprising the network.
The ability of nodes to interact with each other in a distributed but controlled manner in MANET has been a
great boon to the wireless technology. Owing to the unique and distributed characteristics of MANETs several
areas of applications where MANETs are prominently used are: Military information networking systems [2],
underwater wireless communication networks [3] and disaster relief operations [4]. Basic Structure of MANETs
is presented in Figure 1.

Figure 1: Basic Structure of MANETs


One of the major challenges in MANETs is to design a routing protocol to match the needs of a dynamic
environment. Various standard wireless routing protocols which also support MANETs characteristics have
been proposed earlier but each one comes with its own drawbacks. These protocols are classified into proactive,
reactive and hybrid types. Proactive routing protocols [5] are table driven protocols which aid in faster route
discovery but at the same time have additional routing overheads and excessive node power consumption that
adversely affect bandwidth efficiency. Reactive routing protocols [6] are on-demand protocols which form a
route from source to destination node only at the time of data transmission but successful and fast route
discovery and route maintenance in MANETs with large number of nodes pose a big challenge in their
implementation. One such reactive protocols is Ad hoc On demand Distance Vector (AODV) [7] protocol.
Dur i ng r out e di scover y, i t enables every intermediate node to maintain a back tracking routing table
containing temporary back track route information from intermediate node towards the source node until a route
to destination node is successfully established. AODV unlike Dynamic Source Routing (DSR)[8] does not
create large routing overheads when number of wireless nodes in a network is large and hence provide better
bandwidth utilization. In AODV, a source node broadcasts a route request packet (RREQ) to all of its
immediate neighbor nodes to discover a route towards destination. The intermediate neighbor nodes further
forward the received RREQ packets to all of their immediate neighbor nodes. In this way an RREQ packet is
forwarded in the entire network until it reaches the destination node. The RREQ packet contains a “unique-id”
field which is used by a node to drop a packet which it has already forwarded before in order to avoid packet
forwarding duplicity [7].
772
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

In this paper, a novel routing approach called Modified Expanding Ring Search for MANETs based on AODV
is proposed which exploits the characteristics of AODV along with enhancement in Time To Live (TTL)
parameter in Route Request (RREQ) packet.
Rest of the paper is organized as follows: Related work is discussed in section 2. Proposed modified expanding
ring search approach in section 3. Network performance parameters are discussed in section 4. Simulation and
results in section 5 and finally the conclusion in section 6.
II. RELATED WORK
Efforts have been made to improve performance of AODV using techniques such as Hello Packet time interval
modifications [9], data packet header resizing [10] and time to live incrementations in Expanding Ring Search
mechanism of AODV [11]. The proposed approach is based on TTL incrementations to enable enhanced
Expanding Ring Search mechanism. Route discovery attempts to reduce failures while route establishment and
routing overhead. Existing approaches include Expanding Ring Search (ERS) [12] based enhancement in basic
TTL sequence resulting into faster route discovery. In [13] TTL value for RREQ request path is limited which
greatly enhances the throughput. In [14] issue of intermediate route creation in AODV has been resolved that
also improves the performance of AODV protocol which consists of concept of local recovery with limited TTL
value. Evaluation of effects of the route repair is done in [15] which are aimed to efficiently repair the link errors.
To control congestion by applying efficient local route repair method if destination was no farther than
maximum repair TTL was proposed in [16]. In this proposal, major focus is on a scheme to find optimum
values of TTL and evaluate effect of TTL increment and threshold value for faster and reliable route discovery
process.
III. PROPOSED MODIFIED EXPANDING RING SEARCH PROTOCOL
Route Request
The proposed Modified Expanding Ring Search protocol is based on Ad hoc On demand Distance Vector
(AODV) [7]. AODV routing protocol is an on demand protocol where a route from source to destination node is
established before initiating data transmission. This route discovery is done using a route request packet RREQ
transmitted by source node to each of its neighboring node. The RREQ packet consists of following fields:
RREQ ID, Destination IP Address, Destination Sequence number, Source IP Address, Source Sequence number
and Hop Count. RREQ ID field provides a unique identification to the RREQ packet which helps a node to
determine whether that particular packet has been previously forwarded by it or not. If the same RREQ packet
has been previously forwarded then the node discards that packet which helps in avoiding packet duplicity and
route loop formation. The destination node on receiving RREQ identifies the source node and uses the routing
table of the intermediate nodes to send a route reply packet RREP back to the source node. The proposed
approach also uses the same route discovery and establishment mechanism with modifications in Time To Live
parameters of AODV RREQ to facilitate modified expanding ring search during route discovery. Route
discovery and establishment is shown in figure 2.

Figure 2: Route Establishment Using RREQ and RREP Packets in AODV


Initially, TTL_START=1 and the source node starts broadcasting the RREQ message with the same TTL value.
If destination is not present within the range of a single hop and also nodes in that range do not have any valid
existing route to destination then TTL is increased by default TTL_INCREMENT of 1 having a ring radius of 1
unit. If destination is still not reached, the source node further increments TTL by 1 and broadcast the RREQ in
the network for up to 2 hops. AODV provides number of retries equal to threshold value of TTL for RREQ i.e.
value of TTL_THRESHOLD. Finally, TTL is set to a NETWORK_DIAMETER which is the maximum number
773
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

of hops in the network and RREQ message is broadcasted to entire network. Finally destination receives RREQ
message and therefore it sends acknowledgement to source by sending a Route Reply (RREP) message via same
path. A modified ERS mechanism for faster route discovery is used in this approach where the TTL increment
is set to 5. So ring search covers the more number of nodes in fewer attempts and reduces unnecessary lags in the
network. Algorithm for Modified Expanding Ring Search routing protocol is as presented below:
Step 1: Start
Step 2: Initialize values of TTL_START, TTL_THRESHOLD and TTL_INCREMENT
TTL_START ← 1
TTL_THRESHOLD ← 7
TTL_INCREMENT ← 1
Step 3: Repeat step 3 until TTL is smaller thanTTL_THRESHOLD
If, TTL is currently equal to zero TTL is equal to TTL_START;
else
if, last value of TTL is smaller thanTTL_THRESHOLD
TTL is equal to last value of TTL +
TTL_INCREMENT
else
new value of TTL is equal to NETWORK_DIAMETER
Step 4: Stop
Here, various variables are used which need to be properly explained. TTL is responsible for ensuring the total
number of hops to be covered when RREQ is broadcasted and until it reaches the destination. When a route
request message is broadcasted, it cannot be allowed to freely move through the network indefinitely as that
would eventually increase the congestion in traffic. Also, if destination is not found, the route request message
would never stop hopping from node to node looking for the destination node. To rectify this, TTL used within
RREQ header is a parameter that terminates the RREQ message after a certain number of hops has been
reached. TTL starts with a default value known as TTL_START which gives the number of hops covered by
the RREQ in the first attempt of route discovery. After each unsuccessful attempt, the number of hops covered
by TTL is increased. This increase in the number of hops is given by TTL_INCREMENT. Once the value of
TTL and TTL threshold become equal to each other, the RREQ message is broadcasted into the entire network.
“TTL_THRESHOLD” is the variable used for this. In case of an error, an RRER message is sent back to the
source node. When such a node is encountered, TTL is set back to its original value and the search is restarted.
AODV broadcasts a RREQ (Route Request) packet to the neighbors by the expanding ring search method,
where an iterated increment of TTL (time-to-live) in the RREQ packet is used to discover the route to the
destination. For example, a node will first send the RREQ packet with TTL= 1 and then send RREQ packets with
TTL=2, if it did not find a route to destination in the previous try. Finally the node will keep the TTL value until
the end-to-end communication is finished. If the TTL is set too small, valid routes are likely to be discarded, and
large routing delay and traffic overhead may result due to the new route search. On the other side, if the TTL is
set too large then invalid route caches are likely to be used, and before the broken route is discovered additional
routing delay and traffic overhead may result. Route discovery using Modified Extended Ring Search (MERS) in
MANETs is shown in figure 3.

774
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Figure 3: Route discovery using MERS in MANETs


Route Reply and Maintenance
When RREQ [5] reaches destination then the destination sends a Route Reply (RREP) packet which follows the
reverse path according to the routing tables maintained by intermediate nodes. This informs all
intermediate nodes about a route to the destination node as well as source node.

Figure 4: Wireless Mobile Network of 20 nodes


After RREQ and RREP are delivered to their destination, each intermediate node on the route knows which node
to forward data packets to in order to reach source or destination. Therefore unlike DSR, the data packets do not
need to carry addresses of all intermediate nodes in the route. It only carries the address of destination node,
reducing routing overheads significantly. A third type of routing control message, known as Route Error
(RERR) is used for route maintenance. It permits immediate nodes to inform source node about errors regarding
link failures, for example, since a previous neighbor has changed its location and is no longer accessible. If a
route becomes inactive, all information stored in routing tables of intermediate nodes expires after a timeout and
is eliminated from the routing tables.
IV. Network Performance Parameters
Network performance parameters such as throughput, end- to-end delay, jitter and packet delivery ratio are
considered in the study of performance evaluation of MANETs. Various issues regarding the network are
apprehended by carefully examining these parameters which ultimately testify the QoS of the network [15].
Following are the parameters which have a profound effect on the efficiency of a routing protocol.
Throughput
Throughput can be defined as the average data rate achieved in terms of number of data packets which can
travel successfully from source node to the destination node during a given period of time. This parameter is
essential in evaluating the congestion in a route of the network. It is measured in bits per second [17].
End-to-End Delay
End-to-End delay is a one directional delay which is a measure of the amount of time taken by a data packet to
travel from source node to destination node. It is essential in the evaluation of link failure and congestion in the
paths between the nodes in a network. It is typically represented in milliseconds [18].
Jitter
Jitter is a variation in the amount of time usually required by data packets to transfer from one position, the
source node to another position, the destination node. High amount of jitter is caused due to congestion and route
failure related factors in the communication path [19].
775
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

Packet Delivery Ratio


Packet delivery ratio is a measure of the ratio between number of data packets successfully transmitted from
source node to destination node to the total number of data packets originally transmitted through the
established link between source and destination node [20]
V. Simulation and Results
In this section 20, 40, 60, 80 and 100 wireless mobile nodes making up an ad hoc network are simulated with
traditional AODV as well as MERS routing protocol using Network Simulator 2.35. The protocols are
measured for network performance parameters such as end-to-end delay and throughput and the results are
compared for both the scenarios. Table 1 presents the physical parameters required for preparing TCL
simulation scenario.
Parameters Values
Simulation Area 500m x 500m
Simulation Time 300 sec
Mobile Node Placement Random Way Point
Packet Size 1024 Bytes
Routing Protocol MERS
No. of Mobile Nodes 20, 40, 60, 80, 100
Node Traversal Time 0.04 sec
Node Speed 10 m/s
Diameter of Network 25
Table 1: Simulation Parameters for MERS
TTL Constants AODV MERS
TTL_START 1 1
TTL_THRESHOLD 15 15
TTL_INCREMENT 1 5
Table 2: Time to Live Constants for AODV and MERS
No. of Nodes End-to End Delay in AODV End-to EndDelay in
(ms) MERS(ms)
20 36638.1 30892.3
40 39098 33524.4
60 45284.2 39758
80 60489.8 54847.8
100 64533.2 59945.2
Table 3: Observations for average End-to-End Delay for Sample Nodes
As per the simulations performed on both protocols, the MERS offers better performance. Table 1, 2 and 3
present the simulation parameters, TTL constants and average end- to-end delay respectively. Figure 5 shows
graphical representation for end-to-end delay comparison for 20, 40, 60, 80 and 100 sample nodes.
On Comparing end-to-end delay between AODV and MERS as shown in figure 5 to improve performance of
AODV on the basis of simulations undertaken using NS- 2.35, it has been observed that MERS presents better
delay results than AODV. For 20 nodes MERS offers delay which 15.68% lesser than the original AODV.
However, for 40 nodes the delay is 14.25% lesser than AODV which means delay is more than the previous
value. For 60, 80 and 100 nodes the delay is 12.2%, 9.38% and 7.1% lesser respectively.

Figure 5: End-to-End Delay Comparison for Sample Nodes

776
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

VI. CONCLUSION
The main objective of this paper is to propose a routing protocol which improves end-to-end delay of existing
AODV routing protocol. i.e. AODV using modified ring search approach. We can clearly see that our approach
is efficient for practical use as it minimizes overall end-to-end delay of transmission significantly. Bearing in
mind that routing protocols are realized as separate models in NS-2 simulator, part of the future work will be the
implementation of extension of this approach considering any other network performance parameter in basic
reactive routing protocols.
REFERENCES
[1] I. Chlamtac, M. Conti and J. Liu, “Mobile Ad Hoc Networking: Imperatives and Chellenges.” Ad Hoc
Networks, Vol 1, No.1, pp. 13- 64, 2003.
[2] I. R. Chen, R. Mitchell and J. H. Cho, “On modelingof adversary behavior and defence for survivability of
military MANET applications”, IEEE Military Communications Conference, pp. 629- 634, 2015.
[3] J. Kong, J. Cui, D. Wu and M. Gerla, “Building underwater ad hoc networks and sensor networks for large
scale real time aquatic applications”, IEEE Military Communications Conference, pp. 1535- 1541, 2005.
[4] N. A. Mahiddin, N. I. Sarkar and B. Cusack, “Gateway load balancing and routing selection scheme of
MANET in disaster scenario”, Asia-Pacific World Congress on Computer Science and Engineering, pp. 1-
7, 2015.
[5] N. Raj, P. Bharti and S. Thakur, “Vulnerabilities, Challenges and Threats in Securing Mobile Ad-Hoc
Network”, Fifth International Conference on Communication Systems and Network Technologies, pp. 771-
775, 2015.
[6] N. Raza, M. Aftab, M. Akbar, O. Ashraf and M. Irfan, “Mobile Ad Hoc Networks Applications and its
Challenges”, International Journal of Communication and Networks”, pp.131-136, 2016.. E. Perkins and E.
M. Royer, “Ad-hoc on-demand distance vector routing”, in Proceedings of the 2nd IEEE workshop on
Mobile Computing Systems and Applications, pp 90–100, 1997.
[7] D. B. Johnson, D. A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks”, The Kluwer
International Series in Engineering and Computer Science, pp. 153-181, 1997.
[8] I. D. Chakeres and E. M. Royer, “The utility of hello messages for determining link connectivity”,
International Symposium on Wireless Personal Multimedia Communications, pp. 629-635, 2002.
[9] S. Hakak, F. Anwar, S. A. Latif, G. Gilkar and M. K. Alam, “Impact of packet size and node mobility
pause time on average end to end delay and jitter in MANETs”, International Conference on Computer and
Communication Engineering”, pp. 56-59, 2014.
[10] S. Kurundkar and A. Maidamwar, “An improved AODV routing protocol for Mobile Ad-Hoc Networks”,
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering”,
Vol. 2, Issue 7, pp. 3003-3008, 2013.
[11] P. N. Ramanuj and H. M. Diwanji, ”Enhanced Expanding Ring Search Algorithm for AODV”, IJCA, pp
60-64, Jan 2012.
[12] R. Fotohi, S. Jamali and S. Behzad, “An Improvement over AODV Routing Protocol by Limiting Visited
Hop Count”, International Journal of Information Technology and Computer Science, Vol 9, Issue 3, pp.
87-93, 2013.
[13] A. Porwal, B.L.Pal, R. Maheshwari and G. Kakhani,”Study and Design of New Reactive Routing Protocol
Advance AODV for Mobile Ad hoc Networks”, International Journal of Electronics and Communication
Engineering, Vol.2, Issue 3, pp. 3195-3204 Jun 2012.
[14] M. Pan, S.Y. Chuang and S.D. Wang, “Local Repair Mechanisms for On-Demand Routing in Mobile Ad
hoc Networks”, Pacific Rim International Symposium on Dependable Computing, pp. 8-16, 2005.
[15] K.S. Rao and L. Srivastav, “Efficient Local Route Repair Method in AODV to reduce congestion in
MANET”, Corona Journal of Science and Technology, Vol. 1, No. 1, pp. 35-38, 2012.
[16] J. Liu, X. Jiang, H. Nishiyama and N. Kato, “Throughput capacity of MANETs with Power Control and
Packet Redundancy”, IEEE Transactions on Wireless Communications, Vol. 12, No. 6, pp. 3035- 3047,
2013.
777
Special Issue on Innovative Research in Management, Applied Science and Engineering
Stochastic Modeling & Applications ISSN: 0972-3641
Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 10) UGC CARE APPROVED JOURNAL

[17] J. Liu, M. Sheng, Y. Xu, J. Li and X. Jiang, “End-to-End Delay Modelling in Buffer Limited MANETs: A
General Theoretical Fraamework”, IEEE Transactions on Wireless Communications, Vol. 15, No. 1, pp.
498-511, 2016.
[18] S. Hakak, F. Anwar, S. A. Latif, G. Gilkar and M. K. Alam, “Impact of Packet Size and Node Mobility
Pause Time on Average End to End Delay and Jitter in MANET‟s”, International Conference on Computer
and Communication Engineering, pp. 56-59, 2014.
[19] A. Tsirigos, Z. J. Haas, “Analysis of Multipath Routing-Part I:The effect on the Packet Delivery Ratio”,
IEEE Transactions on Wireless Communications, Vol. 3, No. 1, pp. 138-146, 2004.

AUTHOR DETAILS:
PRAKHAR SHARMA AND SURJEET
Bharati Vidyapeeth’s College of Engineering, New Delhi

778
Special Issue on Innovative Research in Management, Applied Science and Engineering
MuK Publications & Distributions
F-2562, Palam Vihar
Gurgaon-122017 (Haryana)
E-mail: mukpublications@gmail.com
https://www.mukpublications.com

You might also like