Nirupan: An e-Journal of RBIMS
Vol. 1, No. 2
ISSN: 2395-7123
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
1
Analysis of Malwares and Crypto-Ransomware
aDeepika G. Vaghela
bSweta Dargad
aAssistant Professor - Computer Science & Engineering Department, ITM Universe, Vadodara.
bAssistant Professor - Computer Science & Engineering Department, ITM Universe, Vadodara
Abstract — Ransomware which is a family of
malware that takes files on a PC or network
storage, encrypts them, and then extorts money to
unlock the files is often called CryptoLocker,
CryptoDefense or CryptoWall. Ransomware is one of
the most widespread and damaging threats that
internet users face today.
Keywords — Crypto-Ransomware, encryption,
decryption, Private key, Cryptography,
Kryloggers .
I. INTRODUCTION
This danger is supposed crypto-ransomware
(ransomware) and includes at littlest a half-dozen
variants, including CryptoLocker and CryptoWall.
Ransomware shows picayune Very light of dim with
a view familiar detection-based support, such as
antivirus, has proven ineffective at preventing
the pretend to. In surely, ransomware has been
proliferationin handsomeness in compensation it
crafty appeared in September 2013,
,leveraging original attack vector, embracing
advanced encryption algorithms and expanding the
number of file types it targets.
Trojan attacks turn this way strive
for to route origination and annex astute answer,
such as credit card numbers and bank account
credentials.
In preference to, force ware unreservedly makes
its illusion make public by encrypting stationery and
demanding payment for the keys to unlock them.
Victims of the trouble may consent
to consternation or be leery of, hence they
are forced to spare the compel to put an end
to the endanger, forever without reporting the crime
in order to avoid further embarrassment.
Among the most popular variants of ransomware, it
is estimated that CryptoLocker and CryptoWall have
collected millions of dollars from its victims.
Key highlights from the analysis include:
• Ransomware proliferates through new attack
vectors, such as malwartising, employing anti-
analysis and persistence techniques to ensure
system compromise
• Advanced encryption algorithms, such as
RSA and AES, prevent decryption without the
key
• Ransomware has shifted its attention to the
enterprise, targeting more than 230 file types
(up 200 percent from 70 file types in 2013)
There are 11 types of malware which is
mentioned below.
1. Adware : The least dangerous and most
lucrative Malware. Adware displays ads on
your computer.
2. Spyware:. Spyware is software that spies on
you, tracking your internet activities in order to
send advertising (Adware) back to your system.
3. Virus: A virus is a contagious program or code
that attaches itself to another piece of software,
and then reproduces itself when that software is
run. Most often this is spread by sharing
software or files between computers.
4. Worm: A program that replicates itself and
destroys data and files on the computer. Worms
work to “eat” the system operating files and
data files until the drive is empty.
5. Trojan: The most dangerous Malware. Trojans
are written with the purpose of discovering your
financial information, taking over your
computer‟s system resources, and in larger
systems creating a “denial-of-service
attack” Denial-of-service attack: an attempt to
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
2
make a machine or network resource
unavailable to those attempting to reach it.
Example: AOL, Yahoo or your business
network becoming unavailable.
6. Rootkit: This one is likened to the burglar hiding
in the attic, waiting to take from you while you
are not home. It is the hardest of all Malware to
detect and therefore to remove; many experts
recommend completely wiping your hard drive
and reinstalling everything from scratch. It is
designed to permit the other information
gathering Malware in to get the identity
information from your computer without you
realizing anything is going on.
7. Backdoors: Backdoors are much the same as
Trojans or worms, except that they open a
“backdoor” onto a computer, providing a
network connection for hackers or other Malware
to enter or for viruses or SPAM to be sent.
8. Keyloggers: Records everything you type on
your PC in order to glean your log-in names,
passwords, and other sensitive information, and
send it on to the source of the keylogging
program. Many times keyloggers are used by
corporations and parents to acquire computer
usage information.
9. Rogue security software: This one deceives or
misleads users. It pretends to be a good program
to remove Malware infections, but all the while
it is the Malware. Often it will turn off the real
Anti-Virus software. The next image shows the
typical screen for this Malware program,
Antivirus 2010
10. Ransomware: If you see this screen that warns
you that you have been locked out of your
computer until you pay for your cybercrimes.
Your system is severely infected with a form of
Malware called Ransomware. It is not a real
notification from the FBI, but, rather an infection
of the system itself. Even if you pay to unlock the
system, the system is unlocked, but you are not
free of it locking you out again. The request for
money, usually in the hundreds of dollars is
completely fake.
11. Browser Hijacker: When your homepage
changes to one that looks like those in the images
inserted next, you may have been infected with
one form or another of a Browser Hijacker. This
dangerous Malware will redirect your normal
search activity and give you the results the
developers want you to see. Its intention is to
make money off your web surfing. Using this
homepage and not removing the Malware lets the
source developers capture your surfing interests.
This is especially dangerous when banking or
shopping online. These homepages can look
harmless, but in every case they allow other more
infectious
There are two types of ransomware
1) Encrypting ransomware, which incorporates
advanced encryption algorithms. It‟s
designed to block system files and demand
payment to provide to provide the victim
with the key that can decrypt the blocked
content.
Examples include CryptoLocker[2], Locky,
CrytpoWall[3] and more.
2) Locker ransomware, which locks the victim
out of the operating system, making it
impossible to access the desktop and any
apps or files. The files are not encrypted in
this case, but the attackers still ask for a
ransom to unlock the infected computer.
Example include the police-themed
ransomware or Winlocker.
II. KEY CHARACTERISTICS
Crypto-ransomware is rather different from
traditional malware:
• It doesn‟t steal victim‟s information—instead it
makes it impossible to access your information
• It doesn‟t try to remain stealthy after files are
encrypted because detection won‟t restore the lost
data
• It‟s relatively easy to produce—there are a
number of well-documented crypto-libraries
III. TIMELINE AND DATASET
Given Figure shows the dataset and how the
malware raise their intensity with time. The given
dates are based on various reports, coupled with
our own analysis.
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
3
Fig 1: Diagram for Dataset and
Timeline[11]
CryptoLocker surfaced in the fall of 2013, and
remained among the most widespread of the
crypto-ransomware families until mid-2014
[2].
CryptoWall surfaced towards the end of 2013
[3], but didn‟t become prominent until 2014 .
New strains of CryptoWall have appeared as
recently as last month (October 2014).
Critroni behaves similarly to CryptoWall—
they both require using the TOR browser to
make payments, and they both were prominent
around the summer of 2014 [5]. Our sample of
DirtyDecrypt outdates CryptoLocker,
appearing in the summer of 2013—a few
months before CryptoLocker became
prominent[4]. This sample only targets and
encrypts eight different file formats, which
makes sense due to it being among the earliest
iterations of ransomware.
Steps to protect against Ransomware for
businesses and consumers:
1. Take regular backups of files, and test them to
make sure they‟re reliable. In case you do get
hit, you won‟t be put in the difficult position of
deciding whether to pay.
2. Keep all software up to date. Ransomware
often infects by taking advantage of security
flaws in outdated software, so keeping software
current will go a long way.
3. Use robust security software that employs a
layered approach to block known threats as well
as brand new threats that haven‟t yet been seen.
4. Watch out for spam and phishing emails.
For example, the post office will never send a
document as a .zip file. And so-called legal
documents that ask you to “enable content” are
traps. Businesses should also use a good email
filtering system, disable macro scripts from
Office files received via email, and educate
employees on current spam and phishing
schemes.
Fig 2: Diagram or Structure of Ransomware
Deployment [8].
1. Establish the Intial access : In this scenario ,
the access to the victim‟s computer/device has
establish with ransomware through network or
with some legal tools. This connection will start
the first step to enter into the victim‟s device.
2. Escalate Privileges: requires the attacker to
grant himself higher privileges.
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
4
2. Identify Backup, snapshot & DR system: When
ransomware has granted to enter into victim‟s
device then have to find out the location of
backup, snapshot etc so it can easily attack on
data.
3. Identify mission critical system & data
4. Identify app distribution system
5. Deploy ransomware, leave network, wait for
ransom to be paid.
CONCLUSION AND FUTURE-
WORK:
This paper indicates the brief details of crypto-
Ransomware and how ransomware act as a
malware. Ransomware is a malicious software
that attacks on victim‟s confidential data. This
Encrypted data can‟t be decrypted till now. The
future enhancement of this paper is how to
protect or provide some security tool/software
from ransomware. So, Function of future work
is decryption of encrypted data.
REFERENCES
[1] Andronio, Nicoló, Stefano Zanero, and Federico
Maggi. "HelDroid: dissecting and detecting mobile
ransomware." International Workshop on Recent
Advances in Intrusion Detection. Springer
International Publishing, 2015.
[2] Scaife, Nolen, et al. "Cryptolock (and drop it):
stopping ransomware attacks on user
data." Distributed Computing Systems (ICDCS),
2016 IEEE 36th International Conference on. IEEE,
2016.
[3] Constantin, Lucian. "CryptoWall ransomware
held over 600K computers hostage, encrypted 5
billion files." PC-World. Tomado de www. pcworld.
com/article/2600543/cryptowall-heldover-
halfamillion-computers-hostageencrypted-5-billion-
files. html (2014).
[4] Atul Kumar, Sr. Analyst ,Chiranshu Ahuja, Sr.
Analyst : Cyber Security Research Developments
[5] Luo, Xin, and Qinyu Liao. "Ransomware: A new
cyber hijacking threat to enterprises." Handbook of
research on information security and
assurance(2009): 1-6.
[6] Valach, Anthony P. "What to Do After a
Ransomware Attack." Risk Management 63.5 (2016):
12.
[7] Jakobsson, Markus, and Zulfikar
Ramzan. Crimeware: understanding new attacks and
defenses. Addison-Wesley Professional, 2008.
[8]https://www.ransomware+diagram&oq=ransomwa
re+diagram&gs_l=serp
[9] J. Walter. Meet tox: Ransomware for the rest of
us. https://blogs.mcafee.com/mcafee-labs/meet-tox-
ransomware-for-the-rest-of-us/, 2015.
[10] H. Weisbaum. CryptoLocker crooks launch
„customer service‟ site.
http://www.cnbc.com/id/101195861, 2013.
[11] Co, Carl, et al. "Mechanism of action network
attachment to moving membranes: barbed end
capture by N-WASP WH2 domains." Cell 128.5
(2007): 901-913.
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
1
Card Payment System Using By NN
ADR. RAMESH PATEL
B DARMSINGH RAGHUMANSHI
A Principal , M.A.Parikh Fine Arts& Arts College , Palanpur , B.K,Gujarat. [email protected]
B Lecturer Govt.Poly.college , Sonaghatti Betul M.P. [email protected]
Abstract: Companies and institutions move parts of their
business to bee grow, the entire business, towards online
services providing e-commerce, and fund Transfer ,
information and communication services for the purpose of
allowing their customers better efficiency, stability and
accessibility. Regardless of location, consumers can make the
same purchases as they previously did “over the desk” on his.
The evolution is a big step forward for the Improve
efficiency, accessibility and profitability to each point of view
but it also has some drawbacks. The evolution is most
efficient accompanied with a greater to vulnerability threats.
The problem with making business through the using Internet
lies in the fact that neither the card nor the cardholder needs to
be present at the point-of-sale. It is therefore impossible for
the merchant to check whether the customer is the genuine
cardholder or not. This problem is many time in over the
world through Account Payment card.
Companies and institutions loose huge amounts
annually due to fraud and fraudsters continuously seek
new ways to commit illegal actions and to be
continuing. The good news is that fraud tends to be
perpetrated to certain patterns and that it is possible to
detect such pattern all so good and efficient, hence
fraud. In this paper we will try to detect fraudulent
transaction through the neural network Naive Bayesian
algorithm. Find the transaction calcification which are
legal and fraudulent transaction using data cauterization
of regions of parameter value.
Keywords: Data mining. Neural network, E-
Commerce, Naive Bayesian algorithm
I. INTRODUCTION
Credit Card Fraud is one of the biggest threats to
business establishment’s today. However, to combat the
fraud effectively, it is important to first understand the
mechanisms of executing a fraud. Credit card fraudsters
employ a large number ormolus operandi to commit
fraud. In simple terms, as While fraudsters are using
sophisticated methods to gain access to credit card
information and perpetrate fraud, new technologies are
available to help merchant’s to detect and prevent
fraudulent transactions. Fraud detection technologies
enable merchants and banks to perform highly
automated and sophisticated screenings of incoming
transactions and flagging suspicious transactions.
II FRAUD DETECTION
There are some occasions when the transaction
made by algal user is of a quite different and there are
also possibilities that the illegal person made use of
card that fit into the pattern for what the neural network
is trained. Although it is rare, yet If the legal user can’t
complete a transaction due to these limitation then it is
not much about to worry But what about the illegal
person who is making use of card , hare also work
human tendency to some extent when a illegal person
gets accredit card he is not going to make use of this
card again and again by making number of small
transaction rather he will try to made as large purchase
as possible and as quickly that may totally mismatch
with the pattern for what the neural networks trained.
1. The prediction probabilities are sorted
in descending order.
2. The sorted list is divided into 10 segments
(deciles).
3. Count the number of actual hits (actual
responders in the modeling dataset) in each
docile.
4. Calculate the random expectation per docile by
dividing the total number of actual responders
by 10. This means that 10 percent of the total
responders are expected in each decile. If the
percentage of hits exceeds the random
expectation, the model provides a lift in that
decile (over random expectation).
III NAÏVE BAYESIAN CLASSIFIER
Algorithm
1. Check for base cases
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
2
2. For each attribute a
3. Find the normalized information gain from splitting
on a
4. Let a_best be the attribute with the highest
normalized information gain
5. Create a decision node that splits on a_best
6. Recur on the sublists obtained by splitting on a_best
and add those nodes as children of node
Naïve Bayesian classifierTraining dataPosterior probabilities
Dataset
Figure: 1classifier on all attributes in dataset
IV CONCLUSION
As indicated above, there are many ways in which
fraudsters execute a credit card fraud. As technology
changes, so do the technology of fraudsters, and thus
the way in which they go about carrying out fraudulent
activities. Frauds can be broadly classified into three
categories, traditional card related frauds, merchant
related frauds and internet frauds. A major area of
concern is the issue of privacy.Consumers is hesitant to
use online business because they often have limited
guarantees about the privacy of their information. If
concerns like these can be reduced, electronic
commerce can play a positive role in helping improve
the world of business.
REFERENCES
[1] Dechang Pi, Xiaolin Qin and Qiang Wang,
“Fuzzy Clustering Algorithm Based on Tree
for Association Rules”, International Journal
of Information Technology, vol.12, No. 3,
2006.
[2] Fahim A.M., Salem A.M., “Efficient enhanced
k-means clustering algorithm”, Journal of
Zhejiang University Science, 1626 – 1633,
2006.
[3] Fang Yuag, Zeng Hui Meng, “A New
Algorithm to get initial centroid”, Third
International Conference on Machine Learning
and cybernetics, Shanghai, 26-29 August,1191
– 1193, 2004.
[4] Friedrich Leisch1 and Bettina Gr un2,
“Extending Standard Cluster Algorithms to
Allow for Group Constraints”, Compstat 2006,
Proceeding in Computational Statistics,
Physica verlag, Heidelberg, Germany,2006
[5] J. MacQueen, “Some method for classification
and analysis of multi varite observation”,
University of California, Los Angeles, 281 –
297.
[6] Maria Camila N. Barioni, Humberto L.
Razente, Agma J. M. Traina, “An efficient
approach to scale up k-medoid based
algorithms in large databases”, 265 – 279.
[7] Michel Steinbach, Levent Ertoz and Vipin
Kumar, “Challenges in high dimensional data
set”, International Conference of Data
management, Vol. 2,No. 3, 2005.
[8] Parsons L., Haque E., and Liu H., “Subspace
clustering for high dimensional data: A
review”, SIGKDD, Explor, Newsletter 6, 90 -
105, 2004.
[9] Rui Xu, Donlad Wunsch, “Survey of
Clustering Algorithm”, IEEE Transactions on
Neural Networks, Vol. 16, No. 3, may 2005.
[10] Sanjay garg, Ramesh Chandra Jain, “Variation
of k-mean Algorithm: A study for High
Dimensional Large data sets”, Information
Technology Journal5 (6), 1132 – 1135, 2006.
[11] Vance Febre, “Clustering and Continues k-
mean algorithm”, Los Alamos Science,
Georgain Electonics Scientific Journal:
Computer Science and Telecommunication,
vol. 4, No.3, 1994.
[12] Zhexue Huang, “A Fast Clustering Algorithm
to Cluster Very Large Categorical Data Sets in
Data Mining”.
[13] Prof. Brian D. Ripley, “Study of the pure
interaction dataset with CART algorithm”,
Professor of Applied Statistics
[14] Brin, S., Motwani, R., Ullman Jeffrey D., and
Tsur Shalom. Dynamic itemset counting and
implication rules for market basket data.
SIGMOD. 1997.
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
3
[15] Nathan Rountree, “Further Data Mining:
Buildinm Decision Trees”, first presented 28
July 1999.
[16] Yang liu, “Introduction to Rough Set Theory and
Its Application in Decision Suppot System”
[17] Wei-YIn loh, “Regression trees with unbiased
variable selection and interaction detection”,
University of Wisconsin–Madison.
[18] S. Rasoul Safavian and David Landgrebe, “A
Survey of Decision Tree Classifier
Methodology”, School of Electrical Engineering
,Purdue University, West Lafayette, IN 47907.
[19] David S. Vogel, Ognian Asparouhov and Tobias
Scheffer, “Scalable Look-Ahead Linear
Regression Trees”.
[20] Alin Dobra, “Classification and Regression Tree
Construction”, Thesis Proposal, Department of
Computer Science, Cornell university, Ithaca
NY, November 25, 2002
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
1
YOGA AS A TOOL OF FASHION
Dr. Roshni Rawal
Assistant Professor, Humanity Department,
SALITER, Sal Technical Campus,
Ahmedabad, Gujarat (INDIA)
Email id: [email protected]
Abstract
The paper underlines the emergence of international recognization of yoga and meditation as a
demand for fashion. Yoga emerged as a latest tool for fashion and adopted as well as accepted
worldwide. The paper depicts some recent trends in Yoga and Fashion. It shows the co-relation
between both. Yoga and meditation opens the new vista for fashion industry to think in another
direction of innovation from the roots of ancient India.
Conclusion: - Yoga not only gives popularity to fashion world but benefit it in economic terms at
large scale for long period.
Key words: - Fashion, Yoga, Meditation.
INTRODUCTION
Business of Fashion technology is increasing day by day. Now days, fashion is related to social
status also. There are various new sectors emerges in fashion industry. They are very innovative
and incredible sectors, which gives new horizon to fashion world. Yoga and Meditation is one of
them. From the day Yoga relate with fashion industry, it opens the new vista for it.
It provides a new and fresh view towards health in relation with fashion. Fashion itself related
with new trends of the world and Yoga is the latest trend among those. After introduction of this
concept, individuals are having a new view towards fashion and Yoga. They are taking it in a
very positive manner and that is the reason that make it very popular, not only in India but in
foreign countries also.
WHAT IS “YOGA” AND “MEDITATION”
In and itself this word “Yoga” means Union. Technically it is the union of the individual self
with the universal cosmic self and the transcendence of the entire thing although obviously not
simple as that. 1
Basically Yoga is an exercise to unite self with the supreme. Meditation is another can be said as
the extended part of Yoga. Meditation is done for the discipline for deep self – exploration and
transformation used for intense self –exploration, it is the best viewed component of a process
demanding and producing a thoroughgoing transformation of all the aspect of life and thought.2
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
2
RECENT TRENDS IN YOGA
Yoga originated in India more than 5000 years ago. Yoga and Meditation is an ancient Indian
discipline, but it seems to get popular and hotter now a days. Recently Yoga is used as a fashion
tool all around the world.
Fitness professionals ranked Yoga among top 10 trends for 2014-2015 in survey for the
American college of Sports medicine.3
There are various recent trends in Yoga and Meditation, as follows:-
1) POWER YOGA: - More formally called “ Vinyasa”. Power Yoga has remained popular
across the country for much of the last decade. Vinyasa Flow is an exceptionally athlete
form of Yoga, moving you through a sequence of fluid, dance – like poses. Synchronized
breaths and movements help energize and strengthen the body.
2) DEEP MEDITATIVE YOGA: - While all Yoga practices emphasize spiritual and mental
well- being, these classes focus on meditation, deep breathing and restorative poses.
3) DOGA: - This practice takes downward dog (a Yoga pose) to a completely new level. In
Doga, dogs and human works as a single unit on the mat. Pet owners help position their
dogs in various poses. Doga classes help strengthen the bond between human and dog.
4) BEACH YOGA: - YOGA at the beach is especially revitalizing – imagine meditating to
the rhythmic sound of water meeting the shore. Plus, practicing on an uneven send
surface helps tone secondary muscles.
5) AERO YOGA: - This practices blends acrobatics and yoga with a series of dynamics
aerial postures. Devotees claims it improves balance and overall body strength while
forgoing stronger human connections.4
6) TRAVEL YOGA: - People practices yoga at airport to relieve travel stress.
7) DESERT YOGA: - It is the yoga practices in desert.
8) DISCO YOGA: - In this yoga wireless headphones mat asana are there.
9) YOGA JOES: - The next generation boys may play with Yoga Joes instead of G.I.Joes.
10) WATER YOGA: - Six aqua yoga poses are there.
11) YOGATHON PARTY: - A Yogathon seva party to benefit Cancer patients.
12) BREAKTI: - A new trend to try Breakti (Yoga + Break dancing).
13) NEW YOGA WEAR: - From Mandulka to Beyonce and top shop, here are five new
collections worth exploring this year.
14) WHITE WEAR FOR YOGA: - Five Kandalin inspired ways to wear white.
15) YOGA AS A TOOL: - Yoga as a strategic tool for stress + trauma. Police officers, fire
fighters and others, who face extreme stress and trauma on a regular basis, can find peace
in asana, breath and affirmation.5
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
3
RECENT TRENDS IN FASHION
Fashion is now related to our day to day life. As soon as Globalization enters into this
fashion world, it gives the customers access to new style at very affordable price.
There are various styles and fashion are available in the world. Let’s
have a summarized glance over it:-
1) POINTED BOOTS, MEXICO: - Guarachero boots- which features extremely pointed
toes and worn by men in rural Mexico- have now found their way to mainstream
fashion.
2) EYEBALL TATTOOS, CANADA: - If you thought coloured contact lenses were
extreme , then get a load of this people are dyeing their eyeballs all sort of colours.
This procedure was originally prescribed for people with scratch- marked eye tissues
to improve their vision.
3) BEAN SPROUT HAIR CLIPS, CHINA: - A popular social media and street fashion
in China are bean sprout hair clips. These plastic springs of greenery are sold by street
vendors and are worn antennae style in one’s hair. And they aren’t just for women
and kids, men are wearing them too!
4) LOLITA FASHION, JAPAN: - This is a fashion subculture popular in Japan in which
girls dress up in Victorian- inspired attire like corsets, floor- length skirts, blouses,
knee-high socks, stockings and head dresses. There are types of Lolita style- Gothic
Lolita (a combination of Gothic and Lolita fashion) sweet Lolita (influenced by
Victorian and Edwardian clothing), classic Lolita( inspired by Regency and Victorian
styles) and old school Lolita( a version of any current sub – style of Lolita fashion).
5) HITLER, THAILAND, BANGKOK: - There are Hitlerized versions of all sort of
things from T- shirts to pandas and even Teletubbies being sold in the city.
6) INDIAN HANDLOOMS: - Indian handlooms are known for their richness, exquisite
designs, variety and fine quality. They have been an integral part of Indian culture
since ages. Apart from the six yards , these traditional prints and material have got a
modern twist and now features on sandals, sling bags, folders and even greeting
cards. There are incredible fashion material available in Indian market for clothes like
makhmuls and tugsar of Madhubani, bandhani of Rajasthan, Bagh print of Madhya
Pradesh, Kalamkari of Kashmir, Baluchari of Bengal, Warli of Maharstra, Sambalpuri
of Odisha etc.6
Other than this if we talk about Denim, it become the first choice for
everyone for fashion. It is a very convenient thin fabric with stylish look. All age
group people are using it. Stylish Reena Shah says that you can do various
experiment with Denim, according to Gujarat Samachar on 5th
March 2016.
I India to showcasing the potential of design, innovation and sustainability across
India, manufacturing sectors in the coming decade through “Make in India week”
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
4
CO- RELATION OF YOGA AND FASHION
Due to Globalization, Fashion becomes more popular among common people. Fashion includes
many things. It not only deals with footwear, hairstyle, jewellery, cosmetics etc. but it deals with
gym, beauty treatment, Yoga etc. also it is related with outer look of the body, which is an
important aspect of fashion. In today’s world everything is directly or indirectly related with
fashion. Anything that is odd one out is known as “Fashion”.
Whenever we talk about Fashion’s other aspects (which is more related to the inner aspect of the
body) like Yoga, Meditation etc. which is used to build the body in shape and more attractive
and suitable for fashion.
India is richer than any other country in this aspect (yoga and meditation). And even now, it
become trend and followed by many people all over the world, which make it “Fashion”.
In today’s Globalized overstressed and luxurious lifestyle every person is in the race of be a
winner. Where person want to be not only be the participants but stand outstanding and be the
winner. For that a person should be strong and beautiful enough from outer as well as inner part
of the body. Yoga and meditation is best solution for that.
“Ancient Yoga joins hands with Modern Science in helping mental men to grow further and
transform gradually into a Supermental Being” - T.R.Anantharaman, Ancient Yoga and Modern
Science(1996;92-93)
In this Fashion world, Yoga and Meditation provides outer as well as inner beauty to a person.
For this particular aspect the whole world is looking at India’s ancient heritage. In ancient India,
people use this power to make themselves empower from inner, but now a days it uses as
“Fashion”.
In India Baba Ramdev and Shilpa Shetty are known as fashion icon. Caulfield is the author of an
upcoming book called “ Is Gwyneth Paltrow wrong about Everything?”He says there is no doubt
that the culture surrounding Yoga including celebrity endorsements and those flattering pants-
explains much of the appeal.7 It clearly show the popularity of Yoga in Fashion.
CONCLUSION AND SUGGESTIONS
CONCLUSION
There are various trends in Fashion world followed by many people. Yoga is used as a latest
fashion tool, all over the world, adopted and accepted worldwide. There is an emerging demand
for Yoga and Meditation in Fashion industry. It not only gives popularity to Fashion world but
benefit it in economic terms at large scale for long time of period. There are renowned Yoga-
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
5
fashion icons, who make this sector more popular. It opens the new vista for fashion industry to
think in other direction of innovation from the roots of ancient India.
SUGGESTIONS
1) This emerging sector should be promoted by Government of India, so that we can turn
these profits towards our economic benefits.
2) It should be promoted in such a manner that it directly lead to Indian tourism. As it
emerges from the roots of ancient India, if it will link to Indian tourism with lucrative
promotion, it will give us maximum return in terms of financial aspect.
3) We should adopt it but not only as fashion but as a habit. That ultimately benefits us in
long term and makes us competent enough to Globalized world.
REFERENCE
(1) Joseph S.Alter, “Yoga in Modern India”, The body between Science and
Philosophy, Princeton University Press, Princeton and Oxford , Historicizing
Yoga , Chapter 1;objective as search; page 10
(2) Roger Walsh1, “Mediation Practice and Research “; Social Science And
Medicine, Volume 65 issue 1 July 2007, page 112-124.
(3) www.usatoday.com/story/news/nation/2015/03/01/yoga-health-fitness-
trends/23881391/ (Accessed on 2016-10-13)
(4) http://Protips.dickssportinggoods.com/tips/yoga-checklist/workout-ideas-
alternatives-types-of-yoga/ (Accessed on 2016-10-13)
(5) www.yoga-journal.com/caterogy/lifestyle/yogatrend/page/2/ (Accessed on 2016-
10-14)
(6) http://timesofindia.indiatimes.com/life-style/fashion/buzz/quirky-twist-to-dest-
weaves-prints/articleshow/51423357.cms (Accessed on 2016-10-15)
(7) www.usatoday.com/story/news/nation/2015/03/01/yoga-health-fitness-
trends/23881391/ (Accessed on 2016-10-15)
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
1
E-WASTE CRITICAL ISSUE FOR ENTIRE WORLD Prof. (Dr.) Subhash Desai
SAL Institute of Technology and Engineering Research
Opp: Science City, Village – Bhadaj, Ahmedabad – 380 060
E-mail: [email protected]
ABSTRACT: In India day by day use of electronic items and goods are increasing. Hence,
amount of e-waste is also increasing rapidly. In near future in India, e-waste may become
dumping ground. It is natural because 105 countries of the world are dumping their waste
towards India.
Looking at this situation, by 2020 eight million ton e-waste will be collected in India. Items
purchased few days ago are getting obsolete due to rapid change in technology. Electronics
devices are going into wastage within months. This trend is increasing day by day and hence the
problem will become critical and very difficult to handle it. It will lead to health problems for
people and environment due to its adverse effects.
Keywords: Computers, E-waste, Electronics Devices, Human health
World Scenario on E-waste:
Every hour fashion is changing in PARISH and likewise every hour computers are changing in
USA. By the time you bring computer at home, one may find that beautiful and more powerful
computer is now available in market. This indicates the growth of computer technology is very
high. It is true also. But problems are equally moving fast near us. [2]
There are 500 million computers are old and outdated in USA itself and waited to be placed in
garbage. In addition to computers, TV, VCR, Tape Recorder, Video Camera, Cell phone,
Washing machines, and other household appliances are extra.
As per International agreement, these devices (mechanical or electronics) are to be upgraded and
to be reused. There could be another possibility to recycle these items. To save cost of recycle
these items in terms of valuable $(dollars), USA and other European countries are dumping the
e-waste in CHINA, PAKISTAN and INDIA.
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
2
Indian Scenario on E-waste: [1]
To import e-waste from other countries is restricted in India. However, it is being imported under
second hand PCs. There are many buyers for second hand PCs in NEW DELHI. They buy color
monitor PC in 10 to 15$ per piece and separating all its parts and sell it at 40 to 50$. Some of
clever business people will buy second hand PCs at price per kg and earn large profit.
Parts of PC will have many chemical components which produce dangerous pollutions. Business
people may not aware of it today. However, knowledgeable people are saying that in next 2-3
decades not only voice, water, and petrol pollution but e-waste will be big headache to mankind.
There was 3.3 lac ton e-wastage in India in year 2007 and additional 50,000 ton e-wastage was
brought illegally. Only 5.7% of it was recycled. As per study done by IMRB International e-
technology group on e-waste, it is estimated 6.5 lac ton by 2020. Lead is very dangerous
substance element. If you open TV or computer monitor then you get 2 kg lead.
Observations:
During the year (2013) it is estimated about 350 million TV and computer monitors will be
useless. Hence, 700 kg lead is released for spreading pollutions. USA government’s environment
protection agency has kept lead of cathode tube of monitor in harmful category. Separating lead
activity will not be done in USA. To avoid the responsibility, selfish manufacturers of USA are
diverting these monitors to India. [1]
Average life of computer in India is 4 years whereas life of computer in USA is just one year.
Spokesman of Toxic link private agency in Mumbai made a statement that “Even western
countries are in confusion to solve e-waste problem. The process of recycling is complex and
expensive. It requires hardworking and trained staff. Today people who are available in this field
are not having enough money and good staff is missing.”
As per IT Hardware association MAIT, there are various reasons responsible for low recycling
operation in India. Converting new products from old electronics goods and reuse it is low.
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
3
There is no sufficient infrastructure to recycle process. ‘e-waste’ recycling is limited to small
scale industries. These small units have poor technology and having limited capacity. Due to this
reason, pollution is spreading in the environment. E-waste includes electronics products whose
life is almost over. [3]
There was an attempt to verify e-waste assessment and its management by more than 200
corporate houses and about 400 householders. Government should check role of each vendor,
customer, recycler, and regulator for eco-friendly solutions. Working model is to be created
based on analysis and findings.
There were only 6.5 lac PCs in year 1996 and today it is almost 6.25 cores. Majority of MNC
branded computers are assemble in India. When these branded PCs are obsolete then
responsibility to recycle it is also with respective company. But due to silent law of India,
multinational companies are escaping from their responsibility. These companies also do
business in USA and they are not running away from their responsibility in USA. Useless PCs
are being dump in India under the name of “Re Sell”.
E-waste components and human health: [4]
Computer circuits and battery have large amount of lead. It will have mercury, hexavalent
chromium, and plastic components in major parts of PC. The plastic contains polyvinyl chloride
which produces pollution. Some of the circuits will have bromine flame retradence which is
agent for stomach diseases. If this element goes into pregnant woman then their milk will not be
healthy for their babies. It was seen more in mothers residing in California area.
Components like gold, silver, copper, aluminum, iron and some extent plastic may be utilized
from garbage PCs. whereas barium, platinum, cobalt, and nickel cannot be separated from parts
of PCs. These harmful parts to be put under ground at remote places. So it will not become origin
of pollution.
We have in Raigadh, Gujarat, and Andhra Pradesh such unutilized land which is used for giant
garbage collection center. On long run, this e-waste will damage land and trees around it. Lead is
very very harmful for human body and upset central control system in brain. There is cadmium
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
4
in computer chips and if enter in human body then it will create kidney problems. Mercury is
also harmful for brain and kidney. Mother board of PC is made with barium element which will
cause cancer to lungs and skin diseases.
Research indicates that even you are in touch with barium today; it can create physical problems
in years to come. Computer printer cartridge contains black carbon powder which while
breathing can reach and bring cancer in lungs. If you burn plastic then it generates dangerous
dioxin gas. Hence any process to destroy e-waste is likely to do adverse effects on human lives.
Conclusion:
Appliances kept in garbage if they are yet durable then there is possibility of reusing them.
Government has made rules for this matter. Environmental department feels that there is
violation of these rules. Hence, there is need of concrete steps to control e-waste issue on
immediate basis. If steps are not taken soon then, it will result in serious problems for next
generation.
Indian government is thinking of e-waste generated within the country but question of control
remains for e-waste coming from other countries. The same situation for pharmaceutical drug
items as well. We hope for steps by respective government departments at the earliest.
It is observed that almost 94% of corporate houses do not have policy to dispose of e-waste or
ICT products. It is also seen that most of the home appliances like TV, PC, CD player, Camera,
or mobile handset are given to small kids, neighbor, or friends. There is no proper arrangements
in big city like Mumbai, Delhi, Kolkata, and Chennai for e-waste and thus spread on ground
where ever they can find place. [5]
For protection of environment due to e-waste problems in year 1992, 159 countries have signed
the agreement. The main purpose was to avoid e-waste dumping from developed countries to
under developed countries. But as on today, USA did not sign it because their motive is bad.
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
5
Experts say that in India every 1.5 years, life of computer is reducing. There is new software
which is not running on old computers. Hence, people are scraping their old PCs and tempted to
buy new PC. As per report by Toxics Link, places like Delhi, Mumbai, Bangalore, Kolkata,
Hyderabad, and Chennai new industry (business) emerged to separate parts of PC and dispose it.
[5]
It is therefore suggested to have permanent solution to handle e-waste for healthy and prosperous
life for human beings. We are already affected by global warming and other environmental
problems. We are working against nature which is likely to damage us very soon due to
cumulative climate change effects. So “JAGO…JAGO…JAGO” to save ourselves.
References
[1] Gujarat Samachar daily news paper dated 04/08/2013.
[2] Braddock, S.E., O'Mahony, M. (1998), Techno Textiles Revolutionary Fabrics for Fashion
and Design, Thames & Hudson, London,
[3] Brown, S. (1990), "The wheel of retailing: past and future", Journal of Retailing, Vol. 66
No.2, pp.143-9.
[4] Dicken, P. (1998), Global Shift: Transforming the World Economy, 3rd ed., Paul Chapman,
London.
[5] Williamson, Stephen and Randall Wright (1994) “Barter and monetary exchange under
private information” American Economic Review 84, 104-123
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
1
EFFECT OF SPORTS TRAINING ON SELECTED VARIABLES OF
PHYSICAL FITNESS ON HANDBALL PLAYERS
Dr. Hemraj D. Patel
Sports Officer
Institute of Technology & Management Universe, Vadodara.
ABSTRACT
Handball is also known as team handball, Olympic handball, European team handball,
European handball, or Borden ball is a team sport in which two teams of seven players each
six outfield players and a goalkeeper pass a ball to throw it into the goal of the other team.
In this paper the strength improvement parameters of handball playing players is
studies and explained in detail. The parameters include Shoulder Muscles, Leg Muscles,
abdominal muscles, cardiovascular endurance speed and agility.
INTRODUCTION
Handball is also known as team handball, Olympic handball, European team handball,
European handball, or Borden ballis a team sport in which two teams of seven players each
six outfield players and a goalkeeper pass a ball to throw it into the goal of the other team. A
standard match consists of two periods of 30 minutes, and the team that scores more goals
wins.
Modern handball is played on a court 40 by 20 meters (131 by 66 ft), with a goal in
the centre of each end. The goals are surrounded by a 6-meter zone where only the defending
goalkeeper is allowed; the goals must be scored by throwing the ball from outside the zone or
while "diving" into it. The sport is usually played indoors, but outdoor variants exist in the
forms of field handball and Czech handball (which were more common in the past) and beach
handball (also called handball). The game is quite fast and includes body contact, as the
defenders try to stop the attackers from approaching the goal. Goals are scored quite
frequently; usually both teams score at least 20 goals each, and it is not uncommon for both
teams to score more than 30 goals.
Team handball is a fast-paced, physically demanding game that combines elements of
soccer and basketball. Handball is an Olympic contact sport that requires a high standard of
preparation in order to complete 60 mines of competitive play and thus to achieve success.
Hence, physical characteristics of players have become major fields of interest for many
trainers and sport scientists. In response to different offensive and defensive situations,
players have to develop aerobic and anaerobic capacities as jumping, feinting, blocking,
sprinting and throwing (Gorostiaga et al 2007). Those characteristics are considered as
important aspects of the game that contribute to the high performance of the team (Marques
& Gonzalez 2006). Furthermore, anthropometric parameters are also considered as one of the
biological determinants of performance. Marques and Gonzalez (2006) demonstrated
appropriate morphological structure in top handball is highly beneficial especially in terms of
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
2
efficient execution of individuals kills related to individual playing positions. Therefore, in
top-quality team handball it would be sensible to select players whose morphological profiles
are most compatible with positional specificities in the demands of the game (Srhoj,
Marinovic and Rogulj 2002).
Rannou, Prioux, Zouhal and Delamarche (2001) found that in the game, the players
perform different tasks with different physical demands depending on their playing position.
Indeed, wings seem to cover the longest total distance and the longest distances while
sprinting, while backs seem to execute the largest number of throws13. Studies examining
top-level players have shown that backs are the tallest players with the largest arm span;
wings are the shortest players of the team, while pivots are the heaviest with the highest body
mass index (Ohnjec, Vuleta,MilanoviW and Grow 2003).
However, no study investigated whether there are any differences among playing
positions according to axes and lines. Recent changes to the game rules and the
implementation of the “fast centre” have placed greater tactical demands on handball players.
This finding relates to the attack end conduction after interchanging of position. The conduct
of attacks by players of the same axis or lines depends on their ability to adjust their
behaviours to the changes that occur over time in the offensive context of the handball game.
In fact, the left rear can change the three positions in the backline and even a player of the
front base.
METHODOLOGY
Selection of Subject:
To achieve the objectives of this study 16 male handball players selected for inter-university
participation were selected as the subject. Age of the selected group was ranging from 17 to
23. A five weeks training was given.
Data regarding selected variables were taken prior to the training and after the completion of
the training.
Criterion Measure:
No Variables Test Unit of Measurement
1 Strength of Shoulder
Muscles
Pull ups No. of pull ups in one
attempt
2 Strength of Abdominal
Muscles
Seat ups No. of seat ups in one
minute
3 Explosive Strength of
Leg Muscles
Standing Broad Jump cm.
4 Speed 50 M Dash Sec.
5 Agility 30‟ Shuttle Run Sec.
6 Cardiovascular
Endurance
1.5 Mile Run Test Min. & Sec
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
3
RESULT OF THE STUDY AND DISCUSSION
For the analysis of collected data„t‟ test was applied to compare the pre-test and post-test
means.
Table – 1
Table showing pre-test and post-test mean, mean difference and ‘t’ value
Of selected variables
No Test Variables Mean Mean Difference ‘t’
1 Push Ups Strength of
Shoulder Muscles
Pre-test 15.63 2.06 3.87*
Post-test 17.69
2 Seat Ups
Strength of
Abdominal
Muscles
Pre-test 18.38
2.56 4.34* Post-test 20.94
3 Standing
Broad Jump
Explosive
Strength of Leg
Muscles
Pre-test 2.03
5.00 5.57* Post-test 2.08
4 50 Yard Dash Speed Pre-test 6.93
0.02 0.71 Post-test 6.91
5 Shuttle Run Agility Pre-test 15.51
0.18 1.79 Post-test 15.33
6 Distance Run Cardiovascular
Endurance
Pre-test 10.32 0.43 3.58*
Post-test 09.43
„t‟ 0.05 (15) = 2.131
It is evident from table – 1 that the calculated„t‟ value of strength of shoulder muscles,
strength of abdominal muscles, explosive strength of leg muscles and cardiovascular is
significant at 0.05 level of significance. Whereas the calculated„t‟ value of speed and agility
is insignificant at 0.05 level of significance. The detail can be elaborated through graph-1.
Graph – 1
Graph showing the pre-test and post-test means of selected variables of physical fitness of handball
players
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
4
CONCLUSION
It was observed that strength of shoulder muscles, strength of abdominal muscles
explosive strength of leg muscles and cardiovascular endurance were improved significantly
with the training whereas there was no significant change observed in speed and agility. A
more specific training programme can be design to improve speed and agility.
REFERENCE
Gorostiaga, E., Granados,C., Ibanez, J., Gonzalez-Badillo, J., &Izquierdo, M.
Granados, C., Izquierdo, M., Ibanez, J., Bonnabau, (2007).Differences in physical
fitness and throwing velocity among elite andamateur female handball players.
International Journal of Sports Medicine, 28 p. 850-867
Fabrica, G., Gomez, M., &Farina, R. (2008). Angle and speed in female handball
penaltythrowing: effects of fatigue and player position. International Journal of
Performance Analysis in Sport, 8 (1) p. 56-67.
Ohnjec, K., Vuleta, D., MilanoviW, D., & Grui W, I. (2003). Performance indicators of
teams at the 2003 world handball championship for women in Croatia. Journal of
Human kinetics, 35 p. 109-118.
Buchheit, M, Bishop, D, Haydar, B, Nakamura, FY, and Ahmaidi, S. (2010).
Physiological responses to shuttle repeated-sprint running. International Journal of
Sports Medicine, 31p. 402-409.
Lohman TG. (1981). Skin folds and body density and their relation to body fatness a
review. Human Biology, 53 p. 181-225.
Lidor, R., Falk, B., Arnon, M., Cohen, Y., & Segal, G. (2005). Measurement of talent
in team handball: thequestionable use of motor and physical tests. Journal of Strength
and Conditioning Research, 19 (2) p. 318-325.
Marques, M., & Gonzalez-Badillo, J.( 2006): In-season resistance training and
detraining in professional team. Journal of Strength & Conditioning Research, 20(3) p.
563-571
Jens Bangsbo, F. Marcello Iaia and Peter Krustrup, (2008) The Yo-Yo Intermittent
Recovery Test: A Useful Tool for Evaluation of Physical Performance in Intermittent
Sports. Sports Medicine, 38 (1) p. 37-51.
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
1
Cloud Computing: A Boon to Computer Society
Krupali Mistry
1, Avneet Saluja
2
1,2Assistant Professor, Department of Computer Science and Engineering, ITM Universe, Vadodara
Abstract- The cloud computing is a new computing
model which provides a low-outlay, high accessible,
scalability, ease of use, ease of maintenance, reliability.
Cloud computing is a set of resources and services such
as sharing of resources, network infrastructure, less IT
are required for implementation. The cloud computing
does not need to pay the cost for infrastructure, its
installation. In this paper we will discuss about cloud
computing, features, architecture and benefits of cloud
computing.
Keywords: cloud computing; features;
architecture; cloud security.
I. INTRODUCTION
From the term “cloud computing” we can
understand the telecommunication of Private
Networks [1]. In cloud computing data access,
computing, software and storage forces may not
require the and awareness of physical location and
system configuration, cloud computing is latest for
those who will transform the from moveable devices
to large data centre. The importance’s, and tie them
to achieve highest output and will be able to solve
large scale computation problems, cloud computing
cooperate with superiority of forces and the
prominent computing models of cloud, that is
private, public, hybrid [2].
Cloud computing is a set of integrated and
networked hardware, software and Internet
infrastructure (called a platform).By means of the
Internet for communication and transport provides
hardware, software and networking services to
clients.These platforms conceal the intricacy and
details of the inventive infrastructure from users and
applications by providing very simple graphical
interface or API (Applications Programming
Interface).
Cloud computing is provides a low-outlay, highly
accessible, to make sure the security of data, high
expansibility, more prominent mode of computing,
more attainable, ease of employ and ease of
continuance.
II. CLOUD COMPUTING
To define cloud computing, data will be accessed
from any location, so people thought that their
privacy of a data will be disturbed, so it will be little
bit risky for using as far as privacy concern,
replication time and cost also play an important role,
how fast can the data be replicated is important.
Handling over the crucial data to another company
that give jitters to some people, corporate users will
definitely some extent in adopting cloud services as
they can keep their company information under lock
and key, customers pay these companies as they are
reliable in security measures. Otherwise they would
loose their clients, its their concentration to provide
best services to their clients. Figure 1 shows cloud
computing services.
Figure 1 Cloud Computing Services
III. FEATURES OF CLOUD COMPUTING
User will use the data, application or other
services with the help of browser regardless of
the devices used and the user location [2].
The infrastructure which is generally provided
the other party and it is accessed by internet, cost
is minimised to significant level.
Its provides the low set-up outlay.
Important services can be retained by using
multiple websites which is usable for commerce
purpose, and failure recovery.
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
2
Enormous scalability.
Blunder liberal & highly reliable.
Intra- & Inter-cloud load balance.
Instantaneous application deployment.
The suppleness and elasticity allows these
systems to scale up and down at will utilizing the
resources of all kinds (CPU, storage, server
capacity, load balancing, and databases).
Sharing of resources amongst a maximum
collection of users.
Cloud computing scalability so its performance
can be monitored.
Security can be as superior as conventional
systems. On the other hand, security still remains
an essential anxiety when data is quite
confidential [3,7].
IV. ARCHITECTURE OF CLOUD
COMPUTING
Cloud computing system can be divided into two
sections: the front end and the back end [8]. They
both are connected with each other through a
network, usually the internet. Front end is what the
client (user) sees whereas the back end is the cloud
of the system. Front end has the client's computer
and the application required to access the cloud and
the back has the cloud computing services like
various computers, servers and data storage.
Layers of Cloud Computing:
The below figure shows the different layers of cloud
computing architecture [4].
Figure 2 Layers of Cloud Computing
Architecture
Computer software and hardware which based on
cloud computing for reliable services collectively
called cloud client [5].
A cloud application delivers “Software as a Services
(SaaS)” [10] over the internet, an in that we don’t
required any installing [5].Examples are
SalesForce.com (SFDC), NetSuite, Oracle, IBM and
Microsoft [6, 9, 11].
Cloud computing delivers Platform services for
using the cloud infrastructure as a platform
“Platform as a Service (PaaS)”. Clients are provided
platforms access, which enables them to lay their
own adapted software’s [8]. Examples are GAE,
Microsoft’s Azure [6].
Cloud computing delivered the “Infrastructure as a
Services (IaaS)” and provides a infrastructure
according to usage, with use of these services client
has not purchase any servers data centre or any
network resources, as a result customer can achieve
faster services with low cost [2]. Examples are
GoGrid, Flexiscale, Layered Technilogies, Joyent
and Mosso/Rackspace [6].
V. TYPES OF CLOUD COMPUTING
SERVICES
Public Cloud: With the help of public cloud user can
access the cloud as much as they can and they have
to pay only for there usage i.e pay-per-use, it can
comparable to the internet bill in our homes
whatever we use the access the internet, only that
much.
h have to pay, this will help in IT cost reduction [2].
Private Cloud: A private cloud is used in with in the
infrastructure, the main usage of private cloud is that
we can sustain and deal with the security with in the
infrastructure and we can get the optimum result
from it, in other language private cloud can compare
is easily manageable [2].
Hybrid Cloud: As name defined hybrid means
mixture of two things, here also hybrid cloud is a
mixture of public and private cloud, it will need
private cloud for usage within the organization so we
can use the public cloud.
VI. BENEFITS OF CLOUD COMPUTING
Maintenance Easily: The maintenance of the
infrastructure in hardware and software is easier,
thus it is less hectic for the IT team also the
application which required more space it will easier
to use in the cloud environment as compare to using
the environment of its own.
Instantaneous Software Updates: In cloud
computing, no longer faced with choosing between
superseded software and high upgrade costs. When
the application is web-based, updates occur
automatically - obtainable the after that we log into
the cloud. When we access a web-based application,
Client
Application
Platform
Infrastructure
Server
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
3
we acquire the latest version - exclusive of needing
to pay for or download an upgrade.
Management Of Calamity: Cloud computing is very
reliable when any disaster is about to come or it
happen, backup of all the data is remain offsite for
future handling, it will also take backup of crucial
data because is always helpful.
Enhanced Performance: By means of little outsized
programs hogging your computer's memory, we will
see better recital from your PC. Computers in a cloud
computing system boot and scamper more rapidly
because they have fewer programs and processes
loaded into memory.
Green Computing: Due to large usage of the system,
harmful emission will be generated, electricity usage
will be larger so we can use cloud computing for
ignoring all that, energy consumption is the main
drawback of this present day systems but by using
the cloud computing we can save that energy at some
extent [2].
VII. CHALLENGES
As all others data communication fields or
technologies cloud computing is also facing
challenges. The mostly asked term is “security and
privacy”, the issue associated with all related areas.
Though many risks can be eliminated through new
security software’s such as encrypted file systems
and data loss prevention software. Hybrid cloud is
also a solution but organisations are still need some
specific workout to ensure privacy in their
enterprises.
Other challenge is the difficulties the contractual
relationship as the integrated ecosystems of
providers to provide complete solution and
practically it is hard to find solution in single
contract. Challenges can be concluded in managing
the cloud and lock in dealing problems [14].
However problems and challenges vary enterprise to
enterprise and many of them can be solved by proper
planning contracting and management of services
and mutual consciousness of client and service
provider.
VIII. CONCLUSION
In this paper we have discussed a new wave in the
field of information technology: cloud computing
technology. We have also explain all the advantages,
features, about the cloud computing, also the
architecture, there is no doubt cloud computing is
currently best technology that fulfil all the
requirement of business world. We can have
approximately infinite computing capabilities,
scalability, pay-per-use scheme and so on. However
this wave still needs to resolve some of its existing
issues with urgency.
REFERENCES
[I] John Harauz, Lorti M. Kaufinan. Bruce Potter,
"Data Security in the World of Cloud
Computing", IEEE Security & Privacy,
Copublished by the IEEE Computer and
Reliability Societies, July/August 2009.
[2] Yashpalsinh Jadeja, Kirit Modi, Pankaj "Cloud
Computing - Concepts, Architecture and
Challenges", International Conference on
Computing, Electronics and Electrical
Technologies [ICCEET],2012, 877-880.
[3] "Are security issues delaying adoption of cloud
computing?Networkworld.com.http://www.net
workworld.com/news/2010/022210-
virtualization-c1oud-security-debate.html.
[4] http://en.wikipedia.orglwikilCloud_computing
[5] Peeyush Mathur, Nikhil Nishchal, "Cloud
Computing: New challenge to the entire
computer industry", 2010 1st International
Conference on Parallel, Distributed and Grid
Computing (PDGC - 2010).
[6] haskar Prasad Rimal, Eunmi Choi, "A
taxonomy and survey of cloud computing
systems", 2009 Fifth International Joint
Conference on INC,IMS and IDC, published by
IEEE Computer Society.
[7] "Security of virtualization, cloud computing
divides IT and security pros ...
http://www.networkworld.com/newsI201
0/02221 O-virtualization c1oud-security-
debate.html.
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
4
[8] Engr: Farhan Bashir Shaikh, Sajjad Haider,“
Security Threats in Cloud Computing” 6th
International Conference on Internet
Technology and Secured Transactions,
December 2011.
[9] Amazon Elastic Compute Cloud,
http://www.amazon.com/ec2
[10] Amazon Rolls Out its Visionary WebOS
Strategy.[Online].Available:http://www.readwr
iteweb.com/archives/amazon_webos.php
[11] Google App Engine,
http://appengine.google.com
[12] Saleforce, http://www.salesforce.com/platform
[13] Ramgovind S, Eloff MM, Smith E, 'The
management of security in cloud computing",
IEEE – 2010.
[14] Leslie Willcocks, Will Venters, Edgar A.
Whitley, Meeting the challanges of cloud
computing", Accenture Outlook.html.
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
1
A SURVEY ON DATA COMPRESSION ALGORITHMS
UNDER CRYPTOGRAPHY & SECURITY
Vipin Nagar* Kavita Tiwari**
[email protected] [email protected]
Neotech Technical Campus,Vadodara BITS edu Campus,Vadodara
Abstract:
Data compression is the process of encoding information using fewer bits (or other information
bearing units) than an unencoded representation would use, through use of specific encoding
schemes. Using this we can achieve reduced resource consumption and security of data as well.
Data Compression may be categorized in following two categories.
(1) Lossless Compression algorithms usually exploit statistical redundancy in such a way as to
represent the sender’s data more concisely without error.
(2) Lossy Compression is possible if some loss of fidelity is acceptable.Lossy schemes accept
some loss of data in order to achieve higher compression .Lossy data compression is better
known as rate-distortion theory.
Shannon formulated the theory of data compression. Lossless data compression theory and rate-
distortion theories are known collectively as Source Coding theory.
1. INTRODUCTION
Data is defined as the raw facts, figures or
anything that is unprocessed .Data compression
is a technique in which the data/information is
encoded using fewer bits through use of
specific encoding schemes. Data compression
can be seen as a technique in which one
objective is to minimize the amount of data to
be stored or transmitted.Another objective may
be treated as the security of data as well
becauuse the data is send in encoded form. Data
Compression is useful because it helps in
reducing the consumption of resources, such as
hard disk space or transmission bandwidth.
This paper discusses the theory of data
compression.
Now if we talk about Data compression, it
may be divided into following 2 categories:
(1)Lossless (2) Lossy
We discuss them here.
(1) Lossless compression is the one which uses
the statistical redundancy that occurs in the data
in such a way as to represent the sender's data
more concisely without error. Lossless
compression schemes are reversible so that the
original data can be reconstructed
(2) Lossy compression is the one which is
possible only in the case where some loss of
fidelity is acceptable. .Lossy data compression
is better known as rate-distortion theory. Lossy
schemes accept some loss of data in order to
achieve higher compression.
Claude E. Shannon formulated the theory of
data compression. Lossless Data Compression
Theory and Rate-Distortion Theory are known
collectively as source coding theory. Now we
would discuss the Lossless Source Coding and
Rate-Distortion Theory for Lossy Data
Compression.
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
2
2. LOSSLESS SOURCE CODING
It has its base in the block coding. To show
this concept, we consider a source of string in
which the set of alphabets consists of only two
letters namely a and b :
(1)
But it is sure that if ‘a’ occurred in the
previous character, the probability that ‘a’
occurs again in the present character is 0.9.
Similarly, given that if ‘b’ occurred in the
previous character, the probability that ‘b’
occurs again in the present character is 0.9.
An n-th order block code is just a mapping
which assigns to each block of n consecutive
characters a sequence of bits of varying length.
. This can be shown by following 2 examples.
2.1. First-Order Block Code
Here each character is mapped to single bit.
Table I
Table of First-Order Block Code
Codeword
a 0.5 0
b 0.5 1
R=1 bit/character
Figure 1. Showing original and compressed
data ( First-Order Block Code)
Using Table I we refer to Fig . 1 and note
that here 24 bits are used to represent 24
characters -- an average of 1 bit/character.
2.2. Second-Order Block Code
Here pair of characters are mapped to either
one, two, or three bits.
Table II
Table of Second-Order Block Code
Codeword
aa 0.45 0
bb 0.45 10
ab 0.05 110
ba 0.05 111
R=0.825 bits/character
Figure 2. Showing original and compressed
data(Second –Order Block Code)
Using Table II we refer to Fig.2 and note
that here 20 bits are used to represent 24
characters ---an average of 0.83 bits/character.
What a decrease in consumption of bits/
character!!!!
2.3. Formula
Here we note that the rates shown in the
tables are calculated from
(2)
In (2) is the length of the codeword
for block . The higher the order, the lower
the rate that is better compression is achieved.
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
3
As we move to n Order Block Code the
consumption of bits / character decrease
significantly.
We are only interested in lossless data
compression code. That is, we are able to
rederive the original data. All of the examples
given above are lossless.
3. RATE-DISTORTION THEORY
In lossy data compression, the decompressed
data need not be exactly the same as the
original data. So some amount of distortion is
acceptable. A distortion measure specifies
exactly how close the approximation is.
Generally, it is a function which assigns to any
two letters and in the alphabet a non-
negative number denoted using
(3)
Here, is the original data, is the
approximation, and is the amount of
distortion between and . The most common
distortion measures are the Hamming distortion
measure given as:
(4)
4. CONCLUSION
We surveyed the data compression
algorithms both loosy and lossless.Both the
algorithms have their advantage in different
situations.These algorighms not only minimize
the amount of data to be stored or transmitted
but also the security of data is strengthened .
REFERENCES
[1] Willian M.Daley, Raymond G. Kammer,
DES, FIPS PUB 46-3, Federal Information,
Processing Standards Publication; 1999.
http://www.tropsoft.com/strongenc/des.htm
[2] Whitefield Diffie and Martin E.
Hellman,”Privacy and Authentication: An
Introduction to Cryptography” in Proc. IEEE
vol 67, no 3, pp 397-427, 1979.
[3] W.B. Pennebaker and J.L. Mitchell,
“JPEG: Still Image Data Compression
Standard”, Van Nostrand Reinhold, New York,
1993.
[4] C. H. Kuo , C.F.Chen , and W.Hsia ,”A
compression algorithm bassed on classified
interpolative block truncation coding and vector
quantization”,Journal of Information Science
and Engineering ,15:pp 1-9 ,1999.
[5] David Saloman , “Data Compression”.
[6] C. E. Shannon, A Mathematical Theory of
Communication.
[7] Sunder Rajan R, “An Efficient Operator
based Unicode Cryptograpy Algorithm for
Text, Audio and Video files”,in International
conference 2008.
[8] M. Nelson and J.-L. Gaily, the Data
Compression Book.
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
1
Recruit
ment
A good employee
lost
Resig
natio
n
Yes
No
Effective Retention
Policies
A good employee
retained
Retention
efforts
made ?
Time and
Money
Retention Incentives and Thoughts in Organisations
Mr. SANDEEP SHARMA Prof. B. K. NIRMAL
Joint CEO, SCOPE, Education Department, Director, RBIMS
Govt. of Gujarat, [email protected] [email protected]
Abstract
Introduction
It is said that the biggest asset of any organization happens to be its human capital. More we
honour it, more productive a company is. Almost any company or organization face the direct or
indirect challenges of 3Rs - Recruitment, Retention and Resignation. For many organisations,
recruitment is a lengthy, time consuming and judicious process. Apart from subject skill, the
candidate is judged on many parameters. A lot of time, energy and money go into the combined
effort. A new incumbent goes through induction programme, training programme, briefings, and
thorough understanding of the work and organisation culture. However, when he/she resigns, the
entire process recycles itself to accommodate another incumbent. To prevent this, many
companies try to negotiate with the person with or without a retention policy in existence. They
may succeed or fail in their efforts to convince the employee. The sad part of the story is that
most of the companies or institutions even do not try or feel the need to talk to the outgoing
employee. It leads to turbulent environment in the company and may turn into an avalanche
some day. It also adversely affects the image of the organisation. Therefore, a good and effective
retention policy is must for sustainable survival of any company /institute/organisation.
Objective
Please consider the following flowchart of the journey of an employee from recruitment to
resignation and how a turn towards retention may come in the path.
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
2
A good retention policy is generally succeeded to retain the employee. On the other hand,
retention of each and every employee is not needed - sometimes for the benefit of the company
and sometimes for the benefit of the employee.
The objective of this paper is to study the best and working retention methodologies adopted by
the companies and organisations including PSUs and government sector. The paper also
discusses the noticeable affect on the performance in the case of there is no retention policy or
flawed retention policies. Exit interviews are not conducted at most of the places and the
employer is never able to know the exact cause of root problem.
Keywords : Recruitment, Retention, Exit Interview, Resignation, Notice Period, RRR (Recovery
from Resignation Row).
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
3
Full Paper
1.0 Introduction
The HR (Human Resource) cell or wing or department is fearsome one for some and rewarding
one for some. But it is an integral function of any company/organisation. It has many synonyms
like Personnel, Staff, Establishment, Forces, Manpower etc. While recruitment and management
are considered the important functions of HR division, the Retention is mostly the ignored or the
left out activity of the division. On the other hand, it is not entirely the recruiter's responsibility
to retain the workforce but lies on the recruitee as well to maintain his/her impression to be
considered for retention.
The paper discusses the responsibilities at two fronts:
1. Organisational front
2. Employee front
The paper is mainly focusing on the best practices which an organisation may adopt to retain the
good and productive manpower and the outputs, expectations and experience which an employee
may bring along that maybe useful to achieve the objectives of the company. There are various
low cost innovative mechanisms adopted by various companies but are largely unknown or
undisclosed. Similarly, the basic qualities in an employee are often ignored to be discussed and
hence a prospective employee does not tend to develop such qualities which may be paramount
to his/her success in the organisation.
This is to be noted that while money (salary package) has been the biggest attraction for
poaching, shifting, resignation, succession, promotion, transfer, location change; it is not the only
factor. There are various other incentives which can be considered by the employers that may
develop a strong bond between an employee and employer. For example, an employee may not
be willing to shift to a metro city even at double the package if the living cost outwits the
package he/she gets compared to a living cost scenario in a smaller city where he/she can
manage well. Similarly, an employee may not be leaving the company if the turnover is
reasonably good, market share value is soaring and it is on the verge of declaring the ESOP
(Employee Stock Option Plan) option for its employees.
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
4
However, the question is if a company is doing the routine job i.e. regularly paying the wages,
giving due promotions, doing well, big plans are in the foray; it still faces the problem of high
attrition rate. What are the doable and workable 'Retention Techniques' and methodologies which
may help an organisation to manage attrition and reduce resignations? There are techniques
available for different levels and positions (Horizontal and Vertical structure).
2.0 Retention Techniques at the Organizational Front
Retention is always more important than the recruitment. However, it is the least focused one in
many organisations. It is the time that companies and corporates seriously think over retaining
good employees by means of monetary or non-monetary incentives.
2.1 Family Chalo Office-e-Abhiyan
In order to increase work productivity, increased consciousness towards work and treating office
(when duty is concerned) as extension of home and according same seriousness as we accord to
our home, a thought was discussed during a Chintan Shibir at one government institution. The
name accorded to it was "Family Chalo Office-e-Abhiyan".
Under the Abhiyan, families of employees are invited to visit the work place and are told to
monitor the natural working style and behaviour of their kins at work place without actually
disturbing them or seeking their attention. It serves two purposes - a get together during recess
period or tea time and monitoring mechanism by family members. The purpose is to report the
hygiene conditions, behaviour, working style and way of discharging the duties of kins to the top
authority in a congenial way.
2.1.1 Methodology
Any date can be decided as per the convenience of all. The time of visit is usually kept during
lunch hours (01.00 pm - 5.00 pm). Those who come from distant place are allowed to bring their
families from morning as it will be difficult for them to manage it after lunch hours. Families,
then, can take a visit to the office and the entire process of working briefly. The person given
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
5
such responsibility should be very communicative and clear in explaining the working. The
lunch can be arranged by the office or a "potluck" (Dabba Party) arrangement can also be made.
Post lunch, the presentations/videos of respective department to be done by concerned
department before families. A small kit can be distributed among families containing information
of all wings/units and related activities in a sequential manner.
A meeting of all families can be held with MD or CEO or any other top authority in the evening.
Each family member is asked to share the experience and minor/major lapses in the functions
from an outsider point of view. Family members are also asked to write a small paragraph
/suggestion on working style/hygience/sanitation/ food etc. based on their observation in any
language they prefer.
Besides reducing resignations, it is an effective method conducive to curb corruption as well as
the employee would avoid any wrong-doing before family members and would try to behave
sensibly and in a most efficient manner.
2.2 Periodic training
Training is necessary to keep employees abreast of happenings in the sector across the globe.
The routine becomes quite monotonous without training modules. The training is required at all
levels immaterial of designation or position. The training can be a residential training or day-
training. Sometimes, companies allow their employees for a sabbatical for a social cause. For
example, US Peace Corp seeks help in terms of manpower support and sends them for a smaller
period to work in a village or sub urban town. Surveys show that such initiatives are helpful for
the individual and company as the employees come back as a better human beings and enhanced
work productivity.
Apart from the subject matter, training should involve certain generic modules and Life Skills
component. The purpose of training is to build their capabilities of the highest order. Training
requirements for the purpose of implementing initiatives at the levels of head office, region, area,
zone or unit are required to be met with. A training should lead to knowledge creation and
preservation through different activities and projects in a workshop mode. Further, it is expected
that their output is quantitatively and qualitatively enhanced.
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
6
2.3 Visits Abroad
Exposure visits are another attraction for the employees. Wherever possible, the companies
should send their employees abroad to attend convocations / ceremonies/business meetings etc.
Generally, it is seen that every time only top people in the hierarchical structure get the chance to
visit. Thought the top management is needed in such visits to take certain decisions, few
vacancies should be reserved for the lower positions to build their capacities and maintain their
interest. It is also a good step in creating a second line of leadership.
2.4 Promoting participation or presentation in Seminars /conferences/symposiums
Employees are always willing to participate or present their findings /experience in seminars and
conferences. But they do not get such opportunities quite often. Following are the issues striking
to an employee while considering to participate in a seminar :
1. Who will pay the registration fee?
2. Even if registration fee is arranged, whether the leaves would be granted for the day of
seminar and for the days when the person is in transit?
3. Who will bear the cost of logistics and transportation?
4. Who will take care of the work in absence of participant?
5. If the employee is allowed to participate, can he/she use some of the case studies or logo or
brand image or events or photographs or equipments of the company (laptop, camera, handy
cam etc.)?
If companies can take care of the above issues, it is likely to create a happy and positive
environment in the organisation.
2.5 More privileges and spending limits at various levels in some cases
The travel and logistics rules are mostly defined in many companies. Though it seems that
everything is well settled, there are cases where the given limits and privileges do not help the
employee. For example, in a hilly terrain or famous tourist places or during a festival event or
during important function of the company, the case is that material and other services (travel,
lodging and boarding) are available at a premium rate. In these cases, the employees can be
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
7
given special privileges to spend slightly more than the permissible limits. For example, if a desk
employee is eligible to travel in a train, he/she should be allowed to travel in flight during Diwali
days to discharge an assigned official duty at some place with no availability in train.
2.6 Club membership
Various clubs offer corporate membership for firms and organisations. The Corporate
Membership allows a corporation or company in the club’s area to become a member of the club,
through an established membership approval process, and to appoint few designees as the
individuals. This option is more suitable in case of government or NGOs as the increment is
fixed or negligible and to retain good manpower is quite difficult. If such organisations can not
provide good increment (monetary), they can do it in non-monetary way. The Club membership
for the efficient employees and their families is an attractive perk which can be thought of.
2.7 Corporate credit card
Like club membership, the corporate credit card is another attraction where employee does not
need to depend on a risky personal card but may utilize the company given card for personal
spending. Similarly various services like domain name booking, air tickets, rail tickets, hotel
booking etc. can be done through such cards which may otherwise take long time in a
conventional way such as preparing cheque, courier, receipt etc.
2.8 Remuneration through other projects
Organisations can consider their employees for cross projects. A cross project system is one
where an employee is not bound to only a single project. They can be assigned different projects
at different sites. The reporting in this case is in the form of a matrix relationship. There are the
following advantages of a cross-project system :
1. Increase the Knowledge/working Domain of the company
2. Increase in the knowledge base and greater exposure for the individual
3. Building an alternate arrangement in case of team scarcity for a particular skill
4. Additional income for the employee
Such projects funded by the parent company or from other resources can have some component
of reimbursing the working professionals from other projects.
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
8
2.8.1 Remuneration through organizing a workshop in other project
Some government organisations or NGOs, who are not a good pay master, manage the attrition
by compensating employees through other benefits. For example, various projects have the
component of training and capacity building where workshops and round table discussions are
encouraged. There is a separate budget for each workshop. The employee, worth retentive, can
be engaged in such workshops and be paid some remuneration based on scheduling of each such
event. This remuneration would be extra to the prevailing salary of the employee.
2.9 Charge Transfer Allowance
It is a usual phenomenon in many organisations that when a person leaves the organisation due to
any reason (resignation, termination, transfer, end of contract, sabbatical, study leave or any
other leave), his/her charge is transferred to another person (transferee). The transferee, apart
from the responsibilities of his own work, handles the task of the transferor. Generally, the
additional load of work is discharged without any additional remuneration to the transferee. This
practice can be changed and contribution to a congenial and happy environment can be made by
making transferee eligible for extra 10%-15% of the salary of the transferor.
2.10 Permitting leaves for sandwich days
Consider a scenario where 15th
August, the public holiday, is Tuesday. Saturday and Sunday
would be on 12th
and 13th
respectively. The Monday, 14th
August, is termed as Sandwich Day as
it is sandwiched between holidays. At most work places, more than 50% of the workforce would
not wish to report on sandwich day in such a scenario. Even if they come, as per a survey, they
are not intended to work wholeheartedly. The callousness is reported in the behaviour and work
style leading to reduction in work efficiency. To prevent this, it is better to allow for sandwich
holiday for a group of employees at one instance and second group of employees at second
instance. When in policy, the chances of callousness are very less.
2.11 Proper Administration Procedures
It is often observed that weak administration policies lead to confusion, tensions and bitter heart
among employees and between employee and employer. There should be a way of faster
clearance of eligible bills/invoices and timely release of wages of employees. Similarly, the
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
9
office should maintain maximum hygiene conditions at work place. Sometimes, the less attention
seeking sanitation activity plays a major role in making the mindset of a prospective candidate to
join or reject a position, particularly in case of female candidates. The toilets, washrooms,
kitchen, foyers and other places of work should be neat and clean and also as a brand building
exercise. Admin support while in transit is a great help or when bookings are to be made or
changed.
3.0 The desirables from an employee
Employees need to understand their functional and ethical responsibilities at their place of work.
The personal differences and dislikes should be left apart while in a professional environment.
3.1 Life Long Learning (LLL) and continuous skill mapping
When a person is employed in a firm, his/her induction programme is initiated. It is a new
learning for him/her. After few years of work, a new machine is purchased by the company and
all the employees are trained to work on the new machine. Similarly, in IT field, the technology
undergoes a major change after every six months. If an employee is not keeping pace with the
changing technology, he/she is likely to meet difficulties. It means the learning does not end
beyond classrooms or colleges but takes place throughout the life and in various contexts. Life
Long Learning (LLL) is a voluntary and self-motivated activity which may or may not relate to
the work area of the person. It may be a learning leading to social inclusion, personality
development, acquiring a skill, citizenship or spiritual understanding. It is independent of place
and time. Similarly, an employee has to maintain his worth and value by contributing in the
company's growth through application of his/her various skills and upgrading these skills time to
time. The skill mapping with the company needs and then industry needs should be the prime
concern of a good employee.
3.2 Prevent Self Poaching
Companies and organisations should restrain themselves from poaching and similarly the
employee should be educated enough not to find himself/herself in the poaching trap. A
poaching is a term given to the effort made by a company to attract or lure or entice the
utilitarian employee of another competing company by any means (ethical or unethical). It’s
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
10
underhanded and unethical to recruit out of the competition’s talent pool. In job market,
poaching is quite common but lacks respect. Poaching is high at senior levels where decision
making affects millions in monetary and clientele terms. Poaching is also done when a senior
employee takes his entire team when he/she is recruited by other company as he/she is more
comfortable to work with his/her own team. While some say that it helps drive economic growth;
in long term, it is not desirable out of an employee.
4.0 Conclusion
There is a serious need to mull over retaining good employees in the public, private or
government sector. The retention is as important as recruitment or more than that. The exit
interviews may give some insights on the choices and aspirations of the employees. Companies
must think over the various policies and incentives which can be thought to make the work place
more attractive and productive. While recruitment focuses on the new talent, new requirement
and counting on the new incumbent, the other side of the coin is that the existing employee is
already experienced, familiar with the office procedures and codes and tested by the seniors. The
experienced and efficient employees are very important pool for any organisation and it would
not want to loose them. The onus lies on both the employer and employee. There are some
retention techniques (monetary and non-monetary), a company can bank upon. Companies
should learn that it is not all about money; it is about investing in and respecting other human
characteristics. The employees also have to widen and deepen their thinking in their own interest
while switching to other jobs. At many times, it may seem quite lucrative to join another
company. However, it should be viewed in terms of long term career goals and expected
achievements.
References :
1. (Office Documentation), Sharma, Sandeep, "Office Processes Documentation", Office of
Commissioner, Higher Education, Government of Gujarat, 2012.
2. Wikipedia
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
1
Frequent Item set Using Transaction Reduction Technique in
Data Mining-A survey
Sefali Patel Dheeraj Kumar Singh
Information Technology, Information Technology,
Parul University (PIET), Parul University (PIET),
Vadodara, Gujarat, India Vadodara, Gujarat, India
[email protected] [email protected]
Abstract: - At present, due to the developments in Database Technology, large volumes of data are produced by
everyday operations and they have introduced the necessity of representing the data in High Dimensional
Datasets. Discovering Frequent Determinant Patterns and Association Rules from these High Dimensional
Datasets has become very tedious since these databases contain large number of different attributes. For the
reason that, it generates extremely large number of redundant rules which makes the algorithms inefficient and it
does not fit in main memory. In this paper, a new Association Rule Mining approach is presented, and it efficiently
discovers Frequent Determinant Patterns and Association Rules from High Dimensional Datasets. Association
rules are the main technique to determine the frequent item set in data mining. Apriori algorithm is a classical
algorithm of association rule mining. This classical algorithm is inefficient due to so many scans of database. And
if the database is large, it takes too much time to scan the database. In this paper, we proposed an Improved
Apriori algorithm which reduces the scanning time by cutting down unnecessary transaction records as well as
reduce the redundant generation of sub-items during pruning the candidate item sets, which can form directly the
set of frequent itemsets and eliminate candidate having a subset that is not frequent.
Keywords: Association Rule, Frequent Item Set, Support Count, Apriori, Transaction Reduction Technique.
1. INTRODUCTION: Data mining is a Process of analyzing data from different perspectives and summarizing it into useful
information. Data mining has evolved in to an important area of research because of the theoretical
challenges and practical applications associated with the problem of discovering interesting and
previously unknown know ledge from real world databases. There are many technique of data mining
such as Classification, Clustering, Association rule mining, Regression etc.
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
2
1.1 Data Mining Task Data Mining is the semi-automatic discovery of patterns, associations, changes, anomalies and
statistically significant structures and events in data. Data Mining a s a term used for the specific set of
tasks or activities as follow
1.2 Association Rule Mining
In Data mining, the definition of association rule mining finds interesting association or corr elation
relationships among a large set of data items. Association rule mining finding frequent pattern,
correlations among the items or object in transactional database, or relational database. Association rule
can create analyzing data for frequent pattern using the criteria Support & Confidence to identify the
relationship. Support is indicating of how frequently the item appears in the database. Confidence
indicates the number of time has been found. There are many algorithms used in association rule mining.
The main goal of association rule mining is:
• Frequent item set generation
• Rule generation (Find large item set).
1.3 Frequent Item set Mining
Frequent pattern mining has been an important subject matter in data mining from many years. A
remarkable progress in this field has been made and lots of efficient algorithms have been designed to
search frequent patterns in a transactional database. Frequent pattern mining can be used in a variety of
real world applications. It can be used in super markets for selling, product placement on sh elves, for
promotion rules and in text searching.
2. RELATED WORKS:
Since its introduction by Agrawal et al [1], it has received a great deal of attention and various efficient
and sophisticated algorithms have been proposed to do frequent itemset mining. Among the best-known
algorithms are Apriori, Eclat and FP-Growth.
The Apriori algorithm [2] uses a breadth-first search and the downward closure property, in which any
superset of an infrequent itemset is infrequent, to prune the search tree. Apriori usually adopts a
horizontal layout to represent the transaction database and the frequency of an itemset is computed by
counting its occurrence in each transaction. FP-Growth [3] employs a divide-and-conquer strategy and a
FP-tree data structure to achieve a condensed representation of the transaction database. It is currently
one of the fastest algorithms for frequent pattern mining. Eclat[4] takes a depth-first search and adopts a
vertical layout to represent databases, in which each item is represented by a set of transaction IDs (called
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
3
a tidset) whose transactions contain the item. Tidset of an itemset is generated by intersecting tidsets of
its items. Because of the depth-first search, it is difficult to utilize the downward closure property like in
Apriori. However, using tidsets has an advantage that there is no need for counting support, the support
of an itemset is the size of the tidset representing it. The main operation of Eclat is intersecting tidsets,
thus the size of tidsets is one of main factors affecting the running time and memory usage of Eclat. The
bigger tidsets are, the more time and memory are needed.
Zaki and Gouda[5] proposed a new vertical data representation, called Diffset, and introduced dEclat, an
Eclat-based algorithm using diffset. Instead of using tidsets, they use the difference of tidsets (called
diffsets). Using diffsets has reduced drastically the set size representing item sets and thus operations on
sets are much faster. Eclat had been shown to achieve significant improvements in performance as well as
memory usage over Eclat, especially on dense databases[5]. However, when the dataset is sparse, diffset
loses its advantage over tidset. Therefore, Zaki and Gouda suggested using tidset format at the start for
sparse databases and then switching to different set format later when a switching condition is met.
Table 1: Comparative Analysis of Pattern Mining Algorithm
Apriori RARM ECLAT FP-Growth ASPMS
Techniques Breadth first Depth first search Depth first Search & Divide and Conquer BSM(Branch
search and intersection of t-id Sort Method) Apriori using merge property(for method pruning)
Database Database is Database is scanned Database is scanned few Database id scanned Database is
Scan scanned for few times to times two times only scanned only one each time a construct. time candidate
item set is generated
Drawback -requires -Difficult to use in It requires the virtual FP-Tree is expensive ----
large memory interactive system memory to perform the to build consumes
space. mining transaction. more memory.
-Too many candidate
item set.
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
4
3. LITRETURE REVIEW:
3.1 Find frequent item sets using Apriori algorithm: The most famous is the Apriori algorithm which
has been brought in 1993 by Agrawal which uses association rule mining [6]. Association rules are
usually required to satisfy a user-specified minimum support and a user-specified minimum confidence at
the same time. Association rule generation is usually split up into two separate steps:
1. Minimum support is applied to find all frequent item-sets in a database.
2. These frequent item-sets and the minimum confidence constraints are used to form rules.
Advantage of this algorithm, it is easy to find frequent item sets if database is small but it has two deadly
bottlenecks. First, It needs great I/O load when frequently scans database and Second, It may produce
overfull candidates of frequent item-sets.
3.2 Find frequent item sets using PAFI as well as Apriori algorithm:
D.Kerana Hanirex and Dr.M.A.Dorai Rangaswamy proposed efficient algorithm for mining frequent item
sets using clustering techniques. They presents an efficient Partition Algorithm for Mining Frequent Item
sets (PAFI) using clustering. This algorithm finds the frequent itemsets by partitioning the database
transactions into clusters and after clustering it finds the frequent itemsets with the transactions in the
clusters directly using improved Apriori algorithm which further reduces the number of scans in the
database as well as easy to manage and available easily, hence improve the efficiency as well as new
algorithm better than the Apriori in the space complexity but again it uses apriori algorithm hence
efficiency not increase as much as required.
Advantages -Easy to -No candidate -No need to scan -Database is scanned -It requires less implement. generation. database each time only two times. memory.
-Use large -Highly suitable item set for interactive property. mining
Data format Horizontal Horizontal Vertical Horizontal Horizontal
Storage Array Tree Array Tree(FP Tree) Tree(Asp tree) structure
Time More Less execution time Execution time is less Less time as Less execution
execution as compared to than Apriori algorithm compared to Apriori time as compared time Apriori & FP algorithm to FP growth Growth algorithm
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
5
3.3 Find frequent itemsets using Improved Apriori algorithm based on matrix:
Feng WANG and Yong-hua proposed An improved Apriori algorithm based on the matrix. To solve the
bottleneck of the Apriori algorithm, they introduce an improved algorithm based on the matrix [8]. It uses
the matrix effectively indicate the affairs in the database and uses the “AND operation” to deal with the
matrix to produce the largest frequent itemsets and others. The algorithm based on matrix don’t scan
database frequently, which reduce the spending of I/O. So the new algorithm is better than the Apriori in
the time complexity but it is not suitable for large database.
3.4 Transaction Reduction In Actionable Pattern Mining For High Voluminous Datasets Based On
Bitmap and Class Labels :
Frequent pattern mining in databases plays an indispensable role in many data mining tasks namely,
classification, clustering, and association rules analysis. When a large number of item sets are processed
by the database, it needs to be scanned multiple times. Consecutively, multiple scanning of the database
increases the number of rules generation, which then consume more system resources. Existing CCARM
(Combined and Composite Association Rule Mining) algorithm used minimum support in order to
generate combined actionable association rules, which in turn suffer from the large number of generating
rules. Explosion of a large number of rules is the major problem in frequent pattern mining that adds
difficult to find the interesting frequent patterns.
4. CONCLUSION:
We have analyzed the comparative study of various frequent patterns mining algorithms. A comparison
framework has developed to allow the flexible comparison of Apriori, Eclat and FP-growth algorithms.
Using this framework this paper presented the comparative performance study of these algorithms such
as, Apriori, Eclat and FP-growth. This study also focuses on each of the algorithm’s advantages,
disadvantages and limitations for finding patterns among large item sets in database systems.
5. REFERENCES:
[1]V.Vijayalakshmia, Dr.A.Pethalakshmib “An Efficient Count Based Transaction Reduction Approach
For Mining Frequent Patterns” Published by Elsevier 2015.03.183
[2]Anjani Pandey, Gayatri Singh,“An Association of Efficient Mining by Compressed Database” Binary
Journal of Data Mining & Networking 5 (2015) 33-35
[3]Mr.Vaibhav Kumar Sharma, Mr.Anil Gupta, Mr. B.L. Pal ,“An Efficient Approach for Data Mining
with Compressed Data” International Journal of Computer Trends and Technology (IJCTT) – volume 28
Number 5 – October 2015
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123
6
[4]K.Prasanna , Dr. M.Seetha , Dr. A. P. Siva Kumar “CApriori: Conviction Based Apriori Algorithm for
Discovering Frequent Determinant Patterns from High Dimensional Datasets” International Conference
on Science, Engineering and Management Research, IEEE 2014
[5]Dr.V.Vaithiyanathan,K.Rajeswari, Prof. Rashmi Phalnikar,Mrs.Swati Tonge“Improved Apriori
algorithm based on Selection Criterion” Computational Intelligence and Computing Research IEEE 2012.
[6]Loan T.T.Nguyen, Bay Vo, Tzung-Pei Hong,Hoang Chi Thanh,“CAR-Miner: An Efficient Algorithm
For Mining Class-Association Rules,”Expert system With Applications 40(2013) 2305-2311,
2012@Elsevier Ltd. All Rights.
[7]Wael Ahmad AlZoubi, Khairuddin Omar, Azuraliza Abu Bakar” An Efficient Mining of Trasactional
Data Using Graph-Based Technique” 2011 3rd Conference on Data Mining and Optimization (DMO) 28-
29 June 2011, Selangor, Malaysia
[8]Fan Zhang, Yan Zhang Jason Bakos,” GP Apriori: GPU-Accelerated Frequent Itemset Mining”. 2011
IEEE International Conference On Cluster Computing
[9]Anil Vasoya ,Dr. Nitin Koli “Mining of association rules on large database using distributed and
parallel computing”Elsevier 2016.
[10]V.Vijayalakshmi, A.Pethalakshmi “A Performance based Transaction Reduction Algorithm for
Discovering Frequent Patterns” International Journal of Computer Applications, 2014
[11] Jaishree Singh, Hari Ram, Dr. J.S. Sodhi “Improving Efficiency of Apriori Algorithm Using
Transaction Reduction ” International Journal of Scientific and Research Publications, 2013
[12]Rupesh Panwar, Prof. Abhishek Raghuvanshi “A Novel Transaction Reduction & Data Elimination
Based Technique For Mining Frequent Item Sets From A Transaction Data Base” International Journal of
Scientific Development and Research (IJSDR), 2016
[13]K. Kavitha, Dr.E. Ramaraj, “Efficient Transaction Reduction In Actionable Pattern Mining For High
Voluminous Datasets Based On Bitmap And Class Labels”International Journal On Computer Science
And Engineering (Ijcse), 2013.