nirupan: an e-journal of rbims vol. 1, no. 2 issn:...

45
Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

Upload: others

Post on 13-Sep-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS

Vol. 1, No. 2

ISSN: 2395-7123

Page 2: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

1

Analysis of Malwares and Crypto-Ransomware

aDeepika G. Vaghela

bSweta Dargad

aAssistant Professor - Computer Science & Engineering Department, ITM Universe, Vadodara.

bAssistant Professor - Computer Science & Engineering Department, ITM Universe, Vadodara

Abstract — Ransomware which is a family of

malware that takes files on a PC or network

storage, encrypts them, and then extorts money to

unlock the files is often called CryptoLocker,

CryptoDefense or CryptoWall. Ransomware is one of

the most widespread and damaging threats that

internet users face today.

Keywords — Crypto-Ransomware, encryption,

decryption, Private key, Cryptography,

Kryloggers .

I. INTRODUCTION

This danger is supposed crypto-ransomware

(ransomware) and includes at littlest a half-dozen

variants, including CryptoLocker and CryptoWall.

Ransomware shows picayune Very light of dim with

a view familiar detection-based support, such as

antivirus, has proven ineffective at preventing

the pretend to. In surely, ransomware has been

proliferationin handsomeness in compensation it

crafty appeared in September 2013,

,leveraging original attack vector, embracing

advanced encryption algorithms and expanding the

number of file types it targets.

Trojan attacks turn this way strive

for to route origination and annex astute answer,

such as credit card numbers and bank account

credentials.

In preference to, force ware unreservedly makes

its illusion make public by encrypting stationery and

demanding payment for the keys to unlock them.

Victims of the trouble may consent

to consternation or be leery of, hence they

are forced to spare the compel to put an end

to the endanger, forever without reporting the crime

in order to avoid further embarrassment.

Among the most popular variants of ransomware, it

is estimated that CryptoLocker and CryptoWall have

collected millions of dollars from its victims.

Key highlights from the analysis include:

• Ransomware proliferates through new attack

vectors, such as malwartising, employing anti-

analysis and persistence techniques to ensure

system compromise

• Advanced encryption algorithms, such as

RSA and AES, prevent decryption without the

key

• Ransomware has shifted its attention to the

enterprise, targeting more than 230 file types

(up 200 percent from 70 file types in 2013)

There are 11 types of malware which is

mentioned below.

1. Adware : The least dangerous and most

lucrative Malware. Adware displays ads on

your computer.

2. Spyware:. Spyware is software that spies on

you, tracking your internet activities in order to

send advertising (Adware) back to your system.

3. Virus: A virus is a contagious program or code

that attaches itself to another piece of software,

and then reproduces itself when that software is

run. Most often this is spread by sharing

software or files between computers.

4. Worm: A program that replicates itself and

destroys data and files on the computer. Worms

work to “eat” the system operating files and

data files until the drive is empty.

5. Trojan: The most dangerous Malware. Trojans

are written with the purpose of discovering your

financial information, taking over your

computer‟s system resources, and in larger

systems creating a “denial-of-service

attack” Denial-of-service attack: an attempt to

Page 3: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

2

make a machine or network resource

unavailable to those attempting to reach it.

Example: AOL, Yahoo or your business

network becoming unavailable.

6. Rootkit: This one is likened to the burglar hiding

in the attic, waiting to take from you while you

are not home. It is the hardest of all Malware to

detect and therefore to remove; many experts

recommend completely wiping your hard drive

and reinstalling everything from scratch. It is

designed to permit the other information

gathering Malware in to get the identity

information from your computer without you

realizing anything is going on.

7. Backdoors: Backdoors are much the same as

Trojans or worms, except that they open a

“backdoor” onto a computer, providing a

network connection for hackers or other Malware

to enter or for viruses or SPAM to be sent.

8. Keyloggers: Records everything you type on

your PC in order to glean your log-in names,

passwords, and other sensitive information, and

send it on to the source of the keylogging

program. Many times keyloggers are used by

corporations and parents to acquire computer

usage information.

9. Rogue security software: This one deceives or

misleads users. It pretends to be a good program

to remove Malware infections, but all the while

it is the Malware. Often it will turn off the real

Anti-Virus software. The next image shows the

typical screen for this Malware program,

Antivirus 2010

10. Ransomware: If you see this screen that warns

you that you have been locked out of your

computer until you pay for your cybercrimes.

Your system is severely infected with a form of

Malware called Ransomware. It is not a real

notification from the FBI, but, rather an infection

of the system itself. Even if you pay to unlock the

system, the system is unlocked, but you are not

free of it locking you out again. The request for

money, usually in the hundreds of dollars is

completely fake.

11. Browser Hijacker: When your homepage

changes to one that looks like those in the images

inserted next, you may have been infected with

one form or another of a Browser Hijacker. This

dangerous Malware will redirect your normal

search activity and give you the results the

developers want you to see. Its intention is to

make money off your web surfing. Using this

homepage and not removing the Malware lets the

source developers capture your surfing interests.

This is especially dangerous when banking or

shopping online. These homepages can look

harmless, but in every case they allow other more

infectious

There are two types of ransomware

1) Encrypting ransomware, which incorporates

advanced encryption algorithms. It‟s

designed to block system files and demand

payment to provide to provide the victim

with the key that can decrypt the blocked

content.

Examples include CryptoLocker[2], Locky,

CrytpoWall[3] and more.

2) Locker ransomware, which locks the victim

out of the operating system, making it

impossible to access the desktop and any

apps or files. The files are not encrypted in

this case, but the attackers still ask for a

ransom to unlock the infected computer.

Example include the police-themed

ransomware or Winlocker.

II. KEY CHARACTERISTICS

Crypto-ransomware is rather different from

traditional malware:

• It doesn‟t steal victim‟s information—instead it

makes it impossible to access your information

• It doesn‟t try to remain stealthy after files are

encrypted because detection won‟t restore the lost

data

• It‟s relatively easy to produce—there are a

number of well-documented crypto-libraries

III. TIMELINE AND DATASET

Given Figure shows the dataset and how the

malware raise their intensity with time. The given

dates are based on various reports, coupled with

our own analysis.

Page 4: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

3

Fig 1: Diagram for Dataset and

Timeline[11]

CryptoLocker surfaced in the fall of 2013, and

remained among the most widespread of the

crypto-ransomware families until mid-2014

[2].

CryptoWall surfaced towards the end of 2013

[3], but didn‟t become prominent until 2014 .

New strains of CryptoWall have appeared as

recently as last month (October 2014).

Critroni behaves similarly to CryptoWall—

they both require using the TOR browser to

make payments, and they both were prominent

around the summer of 2014 [5]. Our sample of

DirtyDecrypt outdates CryptoLocker,

appearing in the summer of 2013—a few

months before CryptoLocker became

prominent[4]. This sample only targets and

encrypts eight different file formats, which

makes sense due to it being among the earliest

iterations of ransomware.

Steps to protect against Ransomware for

businesses and consumers:

1. Take regular backups of files, and test them to

make sure they‟re reliable. In case you do get

hit, you won‟t be put in the difficult position of

deciding whether to pay.

2. Keep all software up to date. Ransomware

often infects by taking advantage of security

flaws in outdated software, so keeping software

current will go a long way.

3. Use robust security software that employs a

layered approach to block known threats as well

as brand new threats that haven‟t yet been seen.

4. Watch out for spam and phishing emails.

For example, the post office will never send a

document as a .zip file. And so-called legal

documents that ask you to “enable content” are

traps. Businesses should also use a good email

filtering system, disable macro scripts from

Office files received via email, and educate

employees on current spam and phishing

schemes.

Fig 2: Diagram or Structure of Ransomware

Deployment [8].

1. Establish the Intial access : In this scenario ,

the access to the victim‟s computer/device has

establish with ransomware through network or

with some legal tools. This connection will start

the first step to enter into the victim‟s device.

2. Escalate Privileges: requires the attacker to

grant himself higher privileges.

Page 5: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

4

2. Identify Backup, snapshot & DR system: When

ransomware has granted to enter into victim‟s

device then have to find out the location of

backup, snapshot etc so it can easily attack on

data.

3. Identify mission critical system & data

4. Identify app distribution system

5. Deploy ransomware, leave network, wait for

ransom to be paid.

CONCLUSION AND FUTURE-

WORK:

This paper indicates the brief details of crypto-

Ransomware and how ransomware act as a

malware. Ransomware is a malicious software

that attacks on victim‟s confidential data. This

Encrypted data can‟t be decrypted till now. The

future enhancement of this paper is how to

protect or provide some security tool/software

from ransomware. So, Function of future work

is decryption of encrypted data.

REFERENCES

[1] Andronio, Nicoló, Stefano Zanero, and Federico

Maggi. "HelDroid: dissecting and detecting mobile

ransomware." International Workshop on Recent

Advances in Intrusion Detection. Springer

International Publishing, 2015.

[2] Scaife, Nolen, et al. "Cryptolock (and drop it):

stopping ransomware attacks on user

data." Distributed Computing Systems (ICDCS),

2016 IEEE 36th International Conference on. IEEE,

2016.

[3] Constantin, Lucian. "CryptoWall ransomware

held over 600K computers hostage, encrypted 5

billion files." PC-World. Tomado de www. pcworld.

com/article/2600543/cryptowall-heldover-

halfamillion-computers-hostageencrypted-5-billion-

files. html (2014).

[4] Atul Kumar, Sr. Analyst ,Chiranshu Ahuja, Sr.

Analyst : Cyber Security Research Developments

[5] Luo, Xin, and Qinyu Liao. "Ransomware: A new

cyber hijacking threat to enterprises." Handbook of

research on information security and

assurance(2009): 1-6.

[6] Valach, Anthony P. "What to Do After a

Ransomware Attack." Risk Management 63.5 (2016):

12.

[7] Jakobsson, Markus, and Zulfikar

Ramzan. Crimeware: understanding new attacks and

defenses. Addison-Wesley Professional, 2008.

[8]https://www.ransomware+diagram&oq=ransomwa

re+diagram&gs_l=serp

[9] J. Walter. Meet tox: Ransomware for the rest of

us. https://blogs.mcafee.com/mcafee-labs/meet-tox-

ransomware-for-the-rest-of-us/, 2015.

[10] H. Weisbaum. CryptoLocker crooks launch

„customer service‟ site.

http://www.cnbc.com/id/101195861, 2013.

[11] Co, Carl, et al. "Mechanism of action network

attachment to moving membranes: barbed end

capture by N-WASP WH2 domains." Cell 128.5

(2007): 901-913.

Page 6: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

1

Card Payment System Using By NN

ADR. RAMESH PATEL

B DARMSINGH RAGHUMANSHI

A Principal , M.A.Parikh Fine Arts& Arts College , Palanpur , B.K,Gujarat. [email protected]

B Lecturer Govt.Poly.college , Sonaghatti Betul M.P. [email protected]

Abstract: Companies and institutions move parts of their

business to bee grow, the entire business, towards online

services providing e-commerce, and fund Transfer ,

information and communication services for the purpose of

allowing their customers better efficiency, stability and

accessibility. Regardless of location, consumers can make the

same purchases as they previously did “over the desk” on his.

The evolution is a big step forward for the Improve

efficiency, accessibility and profitability to each point of view

but it also has some drawbacks. The evolution is most

efficient accompanied with a greater to vulnerability threats.

The problem with making business through the using Internet

lies in the fact that neither the card nor the cardholder needs to

be present at the point-of-sale. It is therefore impossible for

the merchant to check whether the customer is the genuine

cardholder or not. This problem is many time in over the

world through Account Payment card.

Companies and institutions loose huge amounts

annually due to fraud and fraudsters continuously seek

new ways to commit illegal actions and to be

continuing. The good news is that fraud tends to be

perpetrated to certain patterns and that it is possible to

detect such pattern all so good and efficient, hence

fraud. In this paper we will try to detect fraudulent

transaction through the neural network Naive Bayesian

algorithm. Find the transaction calcification which are

legal and fraudulent transaction using data cauterization

of regions of parameter value.

Keywords: Data mining. Neural network, E-

Commerce, Naive Bayesian algorithm

I. INTRODUCTION

Credit Card Fraud is one of the biggest threats to

business establishment’s today. However, to combat the

fraud effectively, it is important to first understand the

mechanisms of executing a fraud. Credit card fraudsters

employ a large number ormolus operandi to commit

fraud. In simple terms, as While fraudsters are using

sophisticated methods to gain access to credit card

information and perpetrate fraud, new technologies are

available to help merchant’s to detect and prevent

fraudulent transactions. Fraud detection technologies

enable merchants and banks to perform highly

automated and sophisticated screenings of incoming

transactions and flagging suspicious transactions.

II FRAUD DETECTION

There are some occasions when the transaction

made by algal user is of a quite different and there are

also possibilities that the illegal person made use of

card that fit into the pattern for what the neural network

is trained. Although it is rare, yet If the legal user can’t

complete a transaction due to these limitation then it is

not much about to worry But what about the illegal

person who is making use of card , hare also work

human tendency to some extent when a illegal person

gets accredit card he is not going to make use of this

card again and again by making number of small

transaction rather he will try to made as large purchase

as possible and as quickly that may totally mismatch

with the pattern for what the neural networks trained.

1. The prediction probabilities are sorted

in descending order.

2. The sorted list is divided into 10 segments

(deciles).

3. Count the number of actual hits (actual

responders in the modeling dataset) in each

docile.

4. Calculate the random expectation per docile by

dividing the total number of actual responders

by 10. This means that 10 percent of the total

responders are expected in each decile. If the

percentage of hits exceeds the random

expectation, the model provides a lift in that

decile (over random expectation).

III NAÏVE BAYESIAN CLASSIFIER

Algorithm

1. Check for base cases

Page 7: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

2

2. For each attribute a

3. Find the normalized information gain from splitting

on a

4. Let a_best be the attribute with the highest

normalized information gain

5. Create a decision node that splits on a_best

6. Recur on the sublists obtained by splitting on a_best

and add those nodes as children of node

Naïve Bayesian classifierTraining dataPosterior probabilities

Dataset

Figure: 1classifier on all attributes in dataset

IV CONCLUSION

As indicated above, there are many ways in which

fraudsters execute a credit card fraud. As technology

changes, so do the technology of fraudsters, and thus

the way in which they go about carrying out fraudulent

activities. Frauds can be broadly classified into three

categories, traditional card related frauds, merchant

related frauds and internet frauds. A major area of

concern is the issue of privacy.Consumers is hesitant to

use online business because they often have limited

guarantees about the privacy of their information. If

concerns like these can be reduced, electronic

commerce can play a positive role in helping improve

the world of business.

REFERENCES

[1] Dechang Pi, Xiaolin Qin and Qiang Wang,

“Fuzzy Clustering Algorithm Based on Tree

for Association Rules”, International Journal

of Information Technology, vol.12, No. 3,

2006.

[2] Fahim A.M., Salem A.M., “Efficient enhanced

k-means clustering algorithm”, Journal of

Zhejiang University Science, 1626 – 1633,

2006.

[3] Fang Yuag, Zeng Hui Meng, “A New

Algorithm to get initial centroid”, Third

International Conference on Machine Learning

and cybernetics, Shanghai, 26-29 August,1191

– 1193, 2004.

[4] Friedrich Leisch1 and Bettina Gr un2,

“Extending Standard Cluster Algorithms to

Allow for Group Constraints”, Compstat 2006,

Proceeding in Computational Statistics,

Physica verlag, Heidelberg, Germany,2006

[5] J. MacQueen, “Some method for classification

and analysis of multi varite observation”,

University of California, Los Angeles, 281 –

297.

[6] Maria Camila N. Barioni, Humberto L.

Razente, Agma J. M. Traina, “An efficient

approach to scale up k-medoid based

algorithms in large databases”, 265 – 279.

[7] Michel Steinbach, Levent Ertoz and Vipin

Kumar, “Challenges in high dimensional data

set”, International Conference of Data

management, Vol. 2,No. 3, 2005.

[8] Parsons L., Haque E., and Liu H., “Subspace

clustering for high dimensional data: A

review”, SIGKDD, Explor, Newsletter 6, 90 -

105, 2004.

[9] Rui Xu, Donlad Wunsch, “Survey of

Clustering Algorithm”, IEEE Transactions on

Neural Networks, Vol. 16, No. 3, may 2005.

[10] Sanjay garg, Ramesh Chandra Jain, “Variation

of k-mean Algorithm: A study for High

Dimensional Large data sets”, Information

Technology Journal5 (6), 1132 – 1135, 2006.

[11] Vance Febre, “Clustering and Continues k-

mean algorithm”, Los Alamos Science,

Georgain Electonics Scientific Journal:

Computer Science and Telecommunication,

vol. 4, No.3, 1994.

[12] Zhexue Huang, “A Fast Clustering Algorithm

to Cluster Very Large Categorical Data Sets in

Data Mining”.

[13] Prof. Brian D. Ripley, “Study of the pure

interaction dataset with CART algorithm”,

Professor of Applied Statistics

[14] Brin, S., Motwani, R., Ullman Jeffrey D., and

Tsur Shalom. Dynamic itemset counting and

implication rules for market basket data.

SIGMOD. 1997.

Page 8: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

3

[15] Nathan Rountree, “Further Data Mining:

Buildinm Decision Trees”, first presented 28

July 1999.

[16] Yang liu, “Introduction to Rough Set Theory and

Its Application in Decision Suppot System”

[17] Wei-YIn loh, “Regression trees with unbiased

variable selection and interaction detection”,

University of Wisconsin–Madison.

[18] S. Rasoul Safavian and David Landgrebe, “A

Survey of Decision Tree Classifier

Methodology”, School of Electrical Engineering

,Purdue University, West Lafayette, IN 47907.

[19] David S. Vogel, Ognian Asparouhov and Tobias

Scheffer, “Scalable Look-Ahead Linear

Regression Trees”.

[20] Alin Dobra, “Classification and Regression Tree

Construction”, Thesis Proposal, Department of

Computer Science, Cornell university, Ithaca

NY, November 25, 2002

Page 9: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

1

YOGA AS A TOOL OF FASHION

Dr. Roshni Rawal

Assistant Professor, Humanity Department,

SALITER, Sal Technical Campus,

Ahmedabad, Gujarat (INDIA)

Email id: [email protected]

Abstract

The paper underlines the emergence of international recognization of yoga and meditation as a

demand for fashion. Yoga emerged as a latest tool for fashion and adopted as well as accepted

worldwide. The paper depicts some recent trends in Yoga and Fashion. It shows the co-relation

between both. Yoga and meditation opens the new vista for fashion industry to think in another

direction of innovation from the roots of ancient India.

Conclusion: - Yoga not only gives popularity to fashion world but benefit it in economic terms at

large scale for long period.

Key words: - Fashion, Yoga, Meditation.

INTRODUCTION

Business of Fashion technology is increasing day by day. Now days, fashion is related to social

status also. There are various new sectors emerges in fashion industry. They are very innovative

and incredible sectors, which gives new horizon to fashion world. Yoga and Meditation is one of

them. From the day Yoga relate with fashion industry, it opens the new vista for it.

It provides a new and fresh view towards health in relation with fashion. Fashion itself related

with new trends of the world and Yoga is the latest trend among those. After introduction of this

concept, individuals are having a new view towards fashion and Yoga. They are taking it in a

very positive manner and that is the reason that make it very popular, not only in India but in

foreign countries also.

WHAT IS “YOGA” AND “MEDITATION”

In and itself this word “Yoga” means Union. Technically it is the union of the individual self

with the universal cosmic self and the transcendence of the entire thing although obviously not

simple as that. 1

Basically Yoga is an exercise to unite self with the supreme. Meditation is another can be said as

the extended part of Yoga. Meditation is done for the discipline for deep self – exploration and

transformation used for intense self –exploration, it is the best viewed component of a process

demanding and producing a thoroughgoing transformation of all the aspect of life and thought.2

Page 10: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

2

RECENT TRENDS IN YOGA

Yoga originated in India more than 5000 years ago. Yoga and Meditation is an ancient Indian

discipline, but it seems to get popular and hotter now a days. Recently Yoga is used as a fashion

tool all around the world.

Fitness professionals ranked Yoga among top 10 trends for 2014-2015 in survey for the

American college of Sports medicine.3

There are various recent trends in Yoga and Meditation, as follows:-

1) POWER YOGA: - More formally called “ Vinyasa”. Power Yoga has remained popular

across the country for much of the last decade. Vinyasa Flow is an exceptionally athlete

form of Yoga, moving you through a sequence of fluid, dance – like poses. Synchronized

breaths and movements help energize and strengthen the body.

2) DEEP MEDITATIVE YOGA: - While all Yoga practices emphasize spiritual and mental

well- being, these classes focus on meditation, deep breathing and restorative poses.

3) DOGA: - This practice takes downward dog (a Yoga pose) to a completely new level. In

Doga, dogs and human works as a single unit on the mat. Pet owners help position their

dogs in various poses. Doga classes help strengthen the bond between human and dog.

4) BEACH YOGA: - YOGA at the beach is especially revitalizing – imagine meditating to

the rhythmic sound of water meeting the shore. Plus, practicing on an uneven send

surface helps tone secondary muscles.

5) AERO YOGA: - This practices blends acrobatics and yoga with a series of dynamics

aerial postures. Devotees claims it improves balance and overall body strength while

forgoing stronger human connections.4

6) TRAVEL YOGA: - People practices yoga at airport to relieve travel stress.

7) DESERT YOGA: - It is the yoga practices in desert.

8) DISCO YOGA: - In this yoga wireless headphones mat asana are there.

9) YOGA JOES: - The next generation boys may play with Yoga Joes instead of G.I.Joes.

10) WATER YOGA: - Six aqua yoga poses are there.

11) YOGATHON PARTY: - A Yogathon seva party to benefit Cancer patients.

12) BREAKTI: - A new trend to try Breakti (Yoga + Break dancing).

13) NEW YOGA WEAR: - From Mandulka to Beyonce and top shop, here are five new

collections worth exploring this year.

14) WHITE WEAR FOR YOGA: - Five Kandalin inspired ways to wear white.

15) YOGA AS A TOOL: - Yoga as a strategic tool for stress + trauma. Police officers, fire

fighters and others, who face extreme stress and trauma on a regular basis, can find peace

in asana, breath and affirmation.5

Page 11: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

3

RECENT TRENDS IN FASHION

Fashion is now related to our day to day life. As soon as Globalization enters into this

fashion world, it gives the customers access to new style at very affordable price.

There are various styles and fashion are available in the world. Let’s

have a summarized glance over it:-

1) POINTED BOOTS, MEXICO: - Guarachero boots- which features extremely pointed

toes and worn by men in rural Mexico- have now found their way to mainstream

fashion.

2) EYEBALL TATTOOS, CANADA: - If you thought coloured contact lenses were

extreme , then get a load of this people are dyeing their eyeballs all sort of colours.

This procedure was originally prescribed for people with scratch- marked eye tissues

to improve their vision.

3) BEAN SPROUT HAIR CLIPS, CHINA: - A popular social media and street fashion

in China are bean sprout hair clips. These plastic springs of greenery are sold by street

vendors and are worn antennae style in one’s hair. And they aren’t just for women

and kids, men are wearing them too!

4) LOLITA FASHION, JAPAN: - This is a fashion subculture popular in Japan in which

girls dress up in Victorian- inspired attire like corsets, floor- length skirts, blouses,

knee-high socks, stockings and head dresses. There are types of Lolita style- Gothic

Lolita (a combination of Gothic and Lolita fashion) sweet Lolita (influenced by

Victorian and Edwardian clothing), classic Lolita( inspired by Regency and Victorian

styles) and old school Lolita( a version of any current sub – style of Lolita fashion).

5) HITLER, THAILAND, BANGKOK: - There are Hitlerized versions of all sort of

things from T- shirts to pandas and even Teletubbies being sold in the city.

6) INDIAN HANDLOOMS: - Indian handlooms are known for their richness, exquisite

designs, variety and fine quality. They have been an integral part of Indian culture

since ages. Apart from the six yards , these traditional prints and material have got a

modern twist and now features on sandals, sling bags, folders and even greeting

cards. There are incredible fashion material available in Indian market for clothes like

makhmuls and tugsar of Madhubani, bandhani of Rajasthan, Bagh print of Madhya

Pradesh, Kalamkari of Kashmir, Baluchari of Bengal, Warli of Maharstra, Sambalpuri

of Odisha etc.6

Other than this if we talk about Denim, it become the first choice for

everyone for fashion. It is a very convenient thin fabric with stylish look. All age

group people are using it. Stylish Reena Shah says that you can do various

experiment with Denim, according to Gujarat Samachar on 5th

March 2016.

I India to showcasing the potential of design, innovation and sustainability across

India, manufacturing sectors in the coming decade through “Make in India week”

Page 12: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

4

CO- RELATION OF YOGA AND FASHION

Due to Globalization, Fashion becomes more popular among common people. Fashion includes

many things. It not only deals with footwear, hairstyle, jewellery, cosmetics etc. but it deals with

gym, beauty treatment, Yoga etc. also it is related with outer look of the body, which is an

important aspect of fashion. In today’s world everything is directly or indirectly related with

fashion. Anything that is odd one out is known as “Fashion”.

Whenever we talk about Fashion’s other aspects (which is more related to the inner aspect of the

body) like Yoga, Meditation etc. which is used to build the body in shape and more attractive

and suitable for fashion.

India is richer than any other country in this aspect (yoga and meditation). And even now, it

become trend and followed by many people all over the world, which make it “Fashion”.

In today’s Globalized overstressed and luxurious lifestyle every person is in the race of be a

winner. Where person want to be not only be the participants but stand outstanding and be the

winner. For that a person should be strong and beautiful enough from outer as well as inner part

of the body. Yoga and meditation is best solution for that.

“Ancient Yoga joins hands with Modern Science in helping mental men to grow further and

transform gradually into a Supermental Being” - T.R.Anantharaman, Ancient Yoga and Modern

Science(1996;92-93)

In this Fashion world, Yoga and Meditation provides outer as well as inner beauty to a person.

For this particular aspect the whole world is looking at India’s ancient heritage. In ancient India,

people use this power to make themselves empower from inner, but now a days it uses as

“Fashion”.

In India Baba Ramdev and Shilpa Shetty are known as fashion icon. Caulfield is the author of an

upcoming book called “ Is Gwyneth Paltrow wrong about Everything?”He says there is no doubt

that the culture surrounding Yoga including celebrity endorsements and those flattering pants-

explains much of the appeal.7 It clearly show the popularity of Yoga in Fashion.

CONCLUSION AND SUGGESTIONS

CONCLUSION

There are various trends in Fashion world followed by many people. Yoga is used as a latest

fashion tool, all over the world, adopted and accepted worldwide. There is an emerging demand

for Yoga and Meditation in Fashion industry. It not only gives popularity to Fashion world but

benefit it in economic terms at large scale for long time of period. There are renowned Yoga-

Page 13: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

5

fashion icons, who make this sector more popular. It opens the new vista for fashion industry to

think in other direction of innovation from the roots of ancient India.

SUGGESTIONS

1) This emerging sector should be promoted by Government of India, so that we can turn

these profits towards our economic benefits.

2) It should be promoted in such a manner that it directly lead to Indian tourism. As it

emerges from the roots of ancient India, if it will link to Indian tourism with lucrative

promotion, it will give us maximum return in terms of financial aspect.

3) We should adopt it but not only as fashion but as a habit. That ultimately benefits us in

long term and makes us competent enough to Globalized world.

REFERENCE

(1) Joseph S.Alter, “Yoga in Modern India”, The body between Science and

Philosophy, Princeton University Press, Princeton and Oxford , Historicizing

Yoga , Chapter 1;objective as search; page 10

(2) Roger Walsh1, “Mediation Practice and Research “; Social Science And

Medicine, Volume 65 issue 1 July 2007, page 112-124.

(3) www.usatoday.com/story/news/nation/2015/03/01/yoga-health-fitness-

trends/23881391/ (Accessed on 2016-10-13)

(4) http://Protips.dickssportinggoods.com/tips/yoga-checklist/workout-ideas-

alternatives-types-of-yoga/ (Accessed on 2016-10-13)

(5) www.yoga-journal.com/caterogy/lifestyle/yogatrend/page/2/ (Accessed on 2016-

10-14)

(6) http://timesofindia.indiatimes.com/life-style/fashion/buzz/quirky-twist-to-dest-

weaves-prints/articleshow/51423357.cms (Accessed on 2016-10-15)

(7) www.usatoday.com/story/news/nation/2015/03/01/yoga-health-fitness-

trends/23881391/ (Accessed on 2016-10-15)

Page 14: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

1

E-WASTE CRITICAL ISSUE FOR ENTIRE WORLD Prof. (Dr.) Subhash Desai

SAL Institute of Technology and Engineering Research

Opp: Science City, Village – Bhadaj, Ahmedabad – 380 060

E-mail: [email protected]

ABSTRACT: In India day by day use of electronic items and goods are increasing. Hence,

amount of e-waste is also increasing rapidly. In near future in India, e-waste may become

dumping ground. It is natural because 105 countries of the world are dumping their waste

towards India.

Looking at this situation, by 2020 eight million ton e-waste will be collected in India. Items

purchased few days ago are getting obsolete due to rapid change in technology. Electronics

devices are going into wastage within months. This trend is increasing day by day and hence the

problem will become critical and very difficult to handle it. It will lead to health problems for

people and environment due to its adverse effects.

Keywords: Computers, E-waste, Electronics Devices, Human health

World Scenario on E-waste:

Every hour fashion is changing in PARISH and likewise every hour computers are changing in

USA. By the time you bring computer at home, one may find that beautiful and more powerful

computer is now available in market. This indicates the growth of computer technology is very

high. It is true also. But problems are equally moving fast near us. [2]

There are 500 million computers are old and outdated in USA itself and waited to be placed in

garbage. In addition to computers, TV, VCR, Tape Recorder, Video Camera, Cell phone,

Washing machines, and other household appliances are extra.

As per International agreement, these devices (mechanical or electronics) are to be upgraded and

to be reused. There could be another possibility to recycle these items. To save cost of recycle

these items in terms of valuable $(dollars), USA and other European countries are dumping the

e-waste in CHINA, PAKISTAN and INDIA.

Page 15: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

2

Indian Scenario on E-waste: [1]

To import e-waste from other countries is restricted in India. However, it is being imported under

second hand PCs. There are many buyers for second hand PCs in NEW DELHI. They buy color

monitor PC in 10 to 15$ per piece and separating all its parts and sell it at 40 to 50$. Some of

clever business people will buy second hand PCs at price per kg and earn large profit.

Parts of PC will have many chemical components which produce dangerous pollutions. Business

people may not aware of it today. However, knowledgeable people are saying that in next 2-3

decades not only voice, water, and petrol pollution but e-waste will be big headache to mankind.

There was 3.3 lac ton e-wastage in India in year 2007 and additional 50,000 ton e-wastage was

brought illegally. Only 5.7% of it was recycled. As per study done by IMRB International e-

technology group on e-waste, it is estimated 6.5 lac ton by 2020. Lead is very dangerous

substance element. If you open TV or computer monitor then you get 2 kg lead.

Observations:

During the year (2013) it is estimated about 350 million TV and computer monitors will be

useless. Hence, 700 kg lead is released for spreading pollutions. USA government’s environment

protection agency has kept lead of cathode tube of monitor in harmful category. Separating lead

activity will not be done in USA. To avoid the responsibility, selfish manufacturers of USA are

diverting these monitors to India. [1]

Average life of computer in India is 4 years whereas life of computer in USA is just one year.

Spokesman of Toxic link private agency in Mumbai made a statement that “Even western

countries are in confusion to solve e-waste problem. The process of recycling is complex and

expensive. It requires hardworking and trained staff. Today people who are available in this field

are not having enough money and good staff is missing.”

As per IT Hardware association MAIT, there are various reasons responsible for low recycling

operation in India. Converting new products from old electronics goods and reuse it is low.

Page 16: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

3

There is no sufficient infrastructure to recycle process. ‘e-waste’ recycling is limited to small

scale industries. These small units have poor technology and having limited capacity. Due to this

reason, pollution is spreading in the environment. E-waste includes electronics products whose

life is almost over. [3]

There was an attempt to verify e-waste assessment and its management by more than 200

corporate houses and about 400 householders. Government should check role of each vendor,

customer, recycler, and regulator for eco-friendly solutions. Working model is to be created

based on analysis and findings.

There were only 6.5 lac PCs in year 1996 and today it is almost 6.25 cores. Majority of MNC

branded computers are assemble in India. When these branded PCs are obsolete then

responsibility to recycle it is also with respective company. But due to silent law of India,

multinational companies are escaping from their responsibility. These companies also do

business in USA and they are not running away from their responsibility in USA. Useless PCs

are being dump in India under the name of “Re Sell”.

E-waste components and human health: [4]

Computer circuits and battery have large amount of lead. It will have mercury, hexavalent

chromium, and plastic components in major parts of PC. The plastic contains polyvinyl chloride

which produces pollution. Some of the circuits will have bromine flame retradence which is

agent for stomach diseases. If this element goes into pregnant woman then their milk will not be

healthy for their babies. It was seen more in mothers residing in California area.

Components like gold, silver, copper, aluminum, iron and some extent plastic may be utilized

from garbage PCs. whereas barium, platinum, cobalt, and nickel cannot be separated from parts

of PCs. These harmful parts to be put under ground at remote places. So it will not become origin

of pollution.

We have in Raigadh, Gujarat, and Andhra Pradesh such unutilized land which is used for giant

garbage collection center. On long run, this e-waste will damage land and trees around it. Lead is

very very harmful for human body and upset central control system in brain. There is cadmium

Page 17: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

4

in computer chips and if enter in human body then it will create kidney problems. Mercury is

also harmful for brain and kidney. Mother board of PC is made with barium element which will

cause cancer to lungs and skin diseases.

Research indicates that even you are in touch with barium today; it can create physical problems

in years to come. Computer printer cartridge contains black carbon powder which while

breathing can reach and bring cancer in lungs. If you burn plastic then it generates dangerous

dioxin gas. Hence any process to destroy e-waste is likely to do adverse effects on human lives.

Conclusion:

Appliances kept in garbage if they are yet durable then there is possibility of reusing them.

Government has made rules for this matter. Environmental department feels that there is

violation of these rules. Hence, there is need of concrete steps to control e-waste issue on

immediate basis. If steps are not taken soon then, it will result in serious problems for next

generation.

Indian government is thinking of e-waste generated within the country but question of control

remains for e-waste coming from other countries. The same situation for pharmaceutical drug

items as well. We hope for steps by respective government departments at the earliest.

It is observed that almost 94% of corporate houses do not have policy to dispose of e-waste or

ICT products. It is also seen that most of the home appliances like TV, PC, CD player, Camera,

or mobile handset are given to small kids, neighbor, or friends. There is no proper arrangements

in big city like Mumbai, Delhi, Kolkata, and Chennai for e-waste and thus spread on ground

where ever they can find place. [5]

For protection of environment due to e-waste problems in year 1992, 159 countries have signed

the agreement. The main purpose was to avoid e-waste dumping from developed countries to

under developed countries. But as on today, USA did not sign it because their motive is bad.

Page 18: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

5

Experts say that in India every 1.5 years, life of computer is reducing. There is new software

which is not running on old computers. Hence, people are scraping their old PCs and tempted to

buy new PC. As per report by Toxics Link, places like Delhi, Mumbai, Bangalore, Kolkata,

Hyderabad, and Chennai new industry (business) emerged to separate parts of PC and dispose it.

[5]

It is therefore suggested to have permanent solution to handle e-waste for healthy and prosperous

life for human beings. We are already affected by global warming and other environmental

problems. We are working against nature which is likely to damage us very soon due to

cumulative climate change effects. So “JAGO…JAGO…JAGO” to save ourselves.

References

[1] Gujarat Samachar daily news paper dated 04/08/2013.

[2] Braddock, S.E., O'Mahony, M. (1998), Techno Textiles Revolutionary Fabrics for Fashion

and Design, Thames & Hudson, London,

[3] Brown, S. (1990), "The wheel of retailing: past and future", Journal of Retailing, Vol. 66

No.2, pp.143-9.

[4] Dicken, P. (1998), Global Shift: Transforming the World Economy, 3rd ed., Paul Chapman,

London.

[5] Williamson, Stephen and Randall Wright (1994) “Barter and monetary exchange under

private information” American Economic Review 84, 104-123

Page 19: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

1

EFFECT OF SPORTS TRAINING ON SELECTED VARIABLES OF

PHYSICAL FITNESS ON HANDBALL PLAYERS

Dr. Hemraj D. Patel

Sports Officer

Institute of Technology & Management Universe, Vadodara.

ABSTRACT

Handball is also known as team handball, Olympic handball, European team handball,

European handball, or Borden ball is a team sport in which two teams of seven players each

six outfield players and a goalkeeper pass a ball to throw it into the goal of the other team.

In this paper the strength improvement parameters of handball playing players is

studies and explained in detail. The parameters include Shoulder Muscles, Leg Muscles,

abdominal muscles, cardiovascular endurance speed and agility.

INTRODUCTION

Handball is also known as team handball, Olympic handball, European team handball,

European handball, or Borden ballis a team sport in which two teams of seven players each

six outfield players and a goalkeeper pass a ball to throw it into the goal of the other team. A

standard match consists of two periods of 30 minutes, and the team that scores more goals

wins.

Modern handball is played on a court 40 by 20 meters (131 by 66 ft), with a goal in

the centre of each end. The goals are surrounded by a 6-meter zone where only the defending

goalkeeper is allowed; the goals must be scored by throwing the ball from outside the zone or

while "diving" into it. The sport is usually played indoors, but outdoor variants exist in the

forms of field handball and Czech handball (which were more common in the past) and beach

handball (also called handball). The game is quite fast and includes body contact, as the

defenders try to stop the attackers from approaching the goal. Goals are scored quite

frequently; usually both teams score at least 20 goals each, and it is not uncommon for both

teams to score more than 30 goals.

Team handball is a fast-paced, physically demanding game that combines elements of

soccer and basketball. Handball is an Olympic contact sport that requires a high standard of

preparation in order to complete 60 mines of competitive play and thus to achieve success.

Hence, physical characteristics of players have become major fields of interest for many

trainers and sport scientists. In response to different offensive and defensive situations,

players have to develop aerobic and anaerobic capacities as jumping, feinting, blocking,

sprinting and throwing (Gorostiaga et al 2007). Those characteristics are considered as

important aspects of the game that contribute to the high performance of the team (Marques

& Gonzalez 2006). Furthermore, anthropometric parameters are also considered as one of the

biological determinants of performance. Marques and Gonzalez (2006) demonstrated

appropriate morphological structure in top handball is highly beneficial especially in terms of

Page 20: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

2

efficient execution of individuals kills related to individual playing positions. Therefore, in

top-quality team handball it would be sensible to select players whose morphological profiles

are most compatible with positional specificities in the demands of the game (Srhoj,

Marinovic and Rogulj 2002).

Rannou, Prioux, Zouhal and Delamarche (2001) found that in the game, the players

perform different tasks with different physical demands depending on their playing position.

Indeed, wings seem to cover the longest total distance and the longest distances while

sprinting, while backs seem to execute the largest number of throws13. Studies examining

top-level players have shown that backs are the tallest players with the largest arm span;

wings are the shortest players of the team, while pivots are the heaviest with the highest body

mass index (Ohnjec, Vuleta,MilanoviW and Grow 2003).

However, no study investigated whether there are any differences among playing

positions according to axes and lines. Recent changes to the game rules and the

implementation of the “fast centre” have placed greater tactical demands on handball players.

This finding relates to the attack end conduction after interchanging of position. The conduct

of attacks by players of the same axis or lines depends on their ability to adjust their

behaviours to the changes that occur over time in the offensive context of the handball game.

In fact, the left rear can change the three positions in the backline and even a player of the

front base.

METHODOLOGY

Selection of Subject:

To achieve the objectives of this study 16 male handball players selected for inter-university

participation were selected as the subject. Age of the selected group was ranging from 17 to

23. A five weeks training was given.

Data regarding selected variables were taken prior to the training and after the completion of

the training.

Criterion Measure:

No Variables Test Unit of Measurement

1 Strength of Shoulder

Muscles

Pull ups No. of pull ups in one

attempt

2 Strength of Abdominal

Muscles

Seat ups No. of seat ups in one

minute

3 Explosive Strength of

Leg Muscles

Standing Broad Jump cm.

4 Speed 50 M Dash Sec.

5 Agility 30‟ Shuttle Run Sec.

6 Cardiovascular

Endurance

1.5 Mile Run Test Min. & Sec

Page 21: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

3

RESULT OF THE STUDY AND DISCUSSION

For the analysis of collected data„t‟ test was applied to compare the pre-test and post-test

means.

Table – 1

Table showing pre-test and post-test mean, mean difference and ‘t’ value

Of selected variables

No Test Variables Mean Mean Difference ‘t’

1 Push Ups Strength of

Shoulder Muscles

Pre-test 15.63 2.06 3.87*

Post-test 17.69

2 Seat Ups

Strength of

Abdominal

Muscles

Pre-test 18.38

2.56 4.34* Post-test 20.94

3 Standing

Broad Jump

Explosive

Strength of Leg

Muscles

Pre-test 2.03

5.00 5.57* Post-test 2.08

4 50 Yard Dash Speed Pre-test 6.93

0.02 0.71 Post-test 6.91

5 Shuttle Run Agility Pre-test 15.51

0.18 1.79 Post-test 15.33

6 Distance Run Cardiovascular

Endurance

Pre-test 10.32 0.43 3.58*

Post-test 09.43

„t‟ 0.05 (15) = 2.131

It is evident from table – 1 that the calculated„t‟ value of strength of shoulder muscles,

strength of abdominal muscles, explosive strength of leg muscles and cardiovascular is

significant at 0.05 level of significance. Whereas the calculated„t‟ value of speed and agility

is insignificant at 0.05 level of significance. The detail can be elaborated through graph-1.

Graph – 1

Graph showing the pre-test and post-test means of selected variables of physical fitness of handball

players

Page 22: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

4

CONCLUSION

It was observed that strength of shoulder muscles, strength of abdominal muscles

explosive strength of leg muscles and cardiovascular endurance were improved significantly

with the training whereas there was no significant change observed in speed and agility. A

more specific training programme can be design to improve speed and agility.

REFERENCE

Gorostiaga, E., Granados,C., Ibanez, J., Gonzalez-Badillo, J., &Izquierdo, M.

Granados, C., Izquierdo, M., Ibanez, J., Bonnabau, (2007).Differences in physical

fitness and throwing velocity among elite andamateur female handball players.

International Journal of Sports Medicine, 28 p. 850-867

Fabrica, G., Gomez, M., &Farina, R. (2008). Angle and speed in female handball

penaltythrowing: effects of fatigue and player position. International Journal of

Performance Analysis in Sport, 8 (1) p. 56-67.

Ohnjec, K., Vuleta, D., MilanoviW, D., & Grui W, I. (2003). Performance indicators of

teams at the 2003 world handball championship for women in Croatia. Journal of

Human kinetics, 35 p. 109-118.

Buchheit, M, Bishop, D, Haydar, B, Nakamura, FY, and Ahmaidi, S. (2010).

Physiological responses to shuttle repeated-sprint running. International Journal of

Sports Medicine, 31p. 402-409.

Lohman TG. (1981). Skin folds and body density and their relation to body fatness a

review. Human Biology, 53 p. 181-225.

Lidor, R., Falk, B., Arnon, M., Cohen, Y., & Segal, G. (2005). Measurement of talent

in team handball: thequestionable use of motor and physical tests. Journal of Strength

and Conditioning Research, 19 (2) p. 318-325.

Marques, M., & Gonzalez-Badillo, J.( 2006): In-season resistance training and

detraining in professional team. Journal of Strength & Conditioning Research, 20(3) p.

563-571

Jens Bangsbo, F. Marcello Iaia and Peter Krustrup, (2008) The Yo-Yo Intermittent

Recovery Test: A Useful Tool for Evaluation of Physical Performance in Intermittent

Sports. Sports Medicine, 38 (1) p. 37-51.

Page 23: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

1

Cloud Computing: A Boon to Computer Society

Krupali Mistry

1, Avneet Saluja

2

1,2Assistant Professor, Department of Computer Science and Engineering, ITM Universe, Vadodara

Abstract- The cloud computing is a new computing

model which provides a low-outlay, high accessible,

scalability, ease of use, ease of maintenance, reliability.

Cloud computing is a set of resources and services such

as sharing of resources, network infrastructure, less IT

are required for implementation. The cloud computing

does not need to pay the cost for infrastructure, its

installation. In this paper we will discuss about cloud

computing, features, architecture and benefits of cloud

computing.

Keywords: cloud computing; features;

architecture; cloud security.

I. INTRODUCTION

From the term “cloud computing” we can

understand the telecommunication of Private

Networks [1]. In cloud computing data access,

computing, software and storage forces may not

require the and awareness of physical location and

system configuration, cloud computing is latest for

those who will transform the from moveable devices

to large data centre. The importance’s, and tie them

to achieve highest output and will be able to solve

large scale computation problems, cloud computing

cooperate with superiority of forces and the

prominent computing models of cloud, that is

private, public, hybrid [2].

Cloud computing is a set of integrated and

networked hardware, software and Internet

infrastructure (called a platform).By means of the

Internet for communication and transport provides

hardware, software and networking services to

clients.These platforms conceal the intricacy and

details of the inventive infrastructure from users and

applications by providing very simple graphical

interface or API (Applications Programming

Interface).

Cloud computing is provides a low-outlay, highly

accessible, to make sure the security of data, high

expansibility, more prominent mode of computing,

more attainable, ease of employ and ease of

continuance.

II. CLOUD COMPUTING

To define cloud computing, data will be accessed

from any location, so people thought that their

privacy of a data will be disturbed, so it will be little

bit risky for using as far as privacy concern,

replication time and cost also play an important role,

how fast can the data be replicated is important.

Handling over the crucial data to another company

that give jitters to some people, corporate users will

definitely some extent in adopting cloud services as

they can keep their company information under lock

and key, customers pay these companies as they are

reliable in security measures. Otherwise they would

loose their clients, its their concentration to provide

best services to their clients. Figure 1 shows cloud

computing services.

Figure 1 Cloud Computing Services

III. FEATURES OF CLOUD COMPUTING

User will use the data, application or other

services with the help of browser regardless of

the devices used and the user location [2].

The infrastructure which is generally provided

the other party and it is accessed by internet, cost

is minimised to significant level.

Its provides the low set-up outlay.

Important services can be retained by using

multiple websites which is usable for commerce

purpose, and failure recovery.

Page 24: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

2

Enormous scalability.

Blunder liberal & highly reliable.

Intra- & Inter-cloud load balance.

Instantaneous application deployment.

The suppleness and elasticity allows these

systems to scale up and down at will utilizing the

resources of all kinds (CPU, storage, server

capacity, load balancing, and databases).

Sharing of resources amongst a maximum

collection of users.

Cloud computing scalability so its performance

can be monitored.

Security can be as superior as conventional

systems. On the other hand, security still remains

an essential anxiety when data is quite

confidential [3,7].

IV. ARCHITECTURE OF CLOUD

COMPUTING

Cloud computing system can be divided into two

sections: the front end and the back end [8]. They

both are connected with each other through a

network, usually the internet. Front end is what the

client (user) sees whereas the back end is the cloud

of the system. Front end has the client's computer

and the application required to access the cloud and

the back has the cloud computing services like

various computers, servers and data storage.

Layers of Cloud Computing:

The below figure shows the different layers of cloud

computing architecture [4].

Figure 2 Layers of Cloud Computing

Architecture

Computer software and hardware which based on

cloud computing for reliable services collectively

called cloud client [5].

A cloud application delivers “Software as a Services

(SaaS)” [10] over the internet, an in that we don’t

required any installing [5].Examples are

SalesForce.com (SFDC), NetSuite, Oracle, IBM and

Microsoft [6, 9, 11].

Cloud computing delivers Platform services for

using the cloud infrastructure as a platform

“Platform as a Service (PaaS)”. Clients are provided

platforms access, which enables them to lay their

own adapted software’s [8]. Examples are GAE,

Microsoft’s Azure [6].

Cloud computing delivered the “Infrastructure as a

Services (IaaS)” and provides a infrastructure

according to usage, with use of these services client

has not purchase any servers data centre or any

network resources, as a result customer can achieve

faster services with low cost [2]. Examples are

GoGrid, Flexiscale, Layered Technilogies, Joyent

and Mosso/Rackspace [6].

V. TYPES OF CLOUD COMPUTING

SERVICES

Public Cloud: With the help of public cloud user can

access the cloud as much as they can and they have

to pay only for there usage i.e pay-per-use, it can

comparable to the internet bill in our homes

whatever we use the access the internet, only that

much.

h have to pay, this will help in IT cost reduction [2].

Private Cloud: A private cloud is used in with in the

infrastructure, the main usage of private cloud is that

we can sustain and deal with the security with in the

infrastructure and we can get the optimum result

from it, in other language private cloud can compare

is easily manageable [2].

Hybrid Cloud: As name defined hybrid means

mixture of two things, here also hybrid cloud is a

mixture of public and private cloud, it will need

private cloud for usage within the organization so we

can use the public cloud.

VI. BENEFITS OF CLOUD COMPUTING

Maintenance Easily: The maintenance of the

infrastructure in hardware and software is easier,

thus it is less hectic for the IT team also the

application which required more space it will easier

to use in the cloud environment as compare to using

the environment of its own.

Instantaneous Software Updates: In cloud

computing, no longer faced with choosing between

superseded software and high upgrade costs. When

the application is web-based, updates occur

automatically - obtainable the after that we log into

the cloud. When we access a web-based application,

Client

Application

Platform

Infrastructure

Server

Page 25: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

3

we acquire the latest version - exclusive of needing

to pay for or download an upgrade.

Management Of Calamity: Cloud computing is very

reliable when any disaster is about to come or it

happen, backup of all the data is remain offsite for

future handling, it will also take backup of crucial

data because is always helpful.

Enhanced Performance: By means of little outsized

programs hogging your computer's memory, we will

see better recital from your PC. Computers in a cloud

computing system boot and scamper more rapidly

because they have fewer programs and processes

loaded into memory.

Green Computing: Due to large usage of the system,

harmful emission will be generated, electricity usage

will be larger so we can use cloud computing for

ignoring all that, energy consumption is the main

drawback of this present day systems but by using

the cloud computing we can save that energy at some

extent [2].

VII. CHALLENGES

As all others data communication fields or

technologies cloud computing is also facing

challenges. The mostly asked term is “security and

privacy”, the issue associated with all related areas.

Though many risks can be eliminated through new

security software’s such as encrypted file systems

and data loss prevention software. Hybrid cloud is

also a solution but organisations are still need some

specific workout to ensure privacy in their

enterprises.

Other challenge is the difficulties the contractual

relationship as the integrated ecosystems of

providers to provide complete solution and

practically it is hard to find solution in single

contract. Challenges can be concluded in managing

the cloud and lock in dealing problems [14].

However problems and challenges vary enterprise to

enterprise and many of them can be solved by proper

planning contracting and management of services

and mutual consciousness of client and service

provider.

VIII. CONCLUSION

In this paper we have discussed a new wave in the

field of information technology: cloud computing

technology. We have also explain all the advantages,

features, about the cloud computing, also the

architecture, there is no doubt cloud computing is

currently best technology that fulfil all the

requirement of business world. We can have

approximately infinite computing capabilities,

scalability, pay-per-use scheme and so on. However

this wave still needs to resolve some of its existing

issues with urgency.

REFERENCES

[I] John Harauz, Lorti M. Kaufinan. Bruce Potter,

"Data Security in the World of Cloud

Computing", IEEE Security & Privacy,

Copublished by the IEEE Computer and

Reliability Societies, July/August 2009.

[2] Yashpalsinh Jadeja, Kirit Modi, Pankaj "Cloud

Computing - Concepts, Architecture and

Challenges", International Conference on

Computing, Electronics and Electrical

Technologies [ICCEET],2012, 877-880.

[3] "Are security issues delaying adoption of cloud

computing?Networkworld.com.http://www.net

workworld.com/news/2010/022210-

virtualization-c1oud-security-debate.html.

[4] http://en.wikipedia.orglwikilCloud_computing

[5] Peeyush Mathur, Nikhil Nishchal, "Cloud

Computing: New challenge to the entire

computer industry", 2010 1st International

Conference on Parallel, Distributed and Grid

Computing (PDGC - 2010).

[6] haskar Prasad Rimal, Eunmi Choi, "A

taxonomy and survey of cloud computing

systems", 2009 Fifth International Joint

Conference on INC,IMS and IDC, published by

IEEE Computer Society.

[7] "Security of virtualization, cloud computing

divides IT and security pros ...

http://www.networkworld.com/newsI201

0/02221 O-virtualization c1oud-security-

debate.html.

Page 26: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

4

[8] Engr: Farhan Bashir Shaikh, Sajjad Haider,“

Security Threats in Cloud Computing” 6th

International Conference on Internet

Technology and Secured Transactions,

December 2011.

[9] Amazon Elastic Compute Cloud,

http://www.amazon.com/ec2

[10] Amazon Rolls Out its Visionary WebOS

Strategy.[Online].Available:http://www.readwr

iteweb.com/archives/amazon_webos.php

[11] Google App Engine,

http://appengine.google.com

[12] Saleforce, http://www.salesforce.com/platform

[13] Ramgovind S, Eloff MM, Smith E, 'The

management of security in cloud computing",

IEEE – 2010.

[14] Leslie Willcocks, Will Venters, Edgar A.

Whitley, Meeting the challanges of cloud

computing", Accenture Outlook.html.

Page 27: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

1

A SURVEY ON DATA COMPRESSION ALGORITHMS

UNDER CRYPTOGRAPHY & SECURITY

Vipin Nagar* Kavita Tiwari**

[email protected] [email protected]

Neotech Technical Campus,Vadodara BITS edu Campus,Vadodara

Abstract:

Data compression is the process of encoding information using fewer bits (or other information

bearing units) than an unencoded representation would use, through use of specific encoding

schemes. Using this we can achieve reduced resource consumption and security of data as well.

Data Compression may be categorized in following two categories.

(1) Lossless Compression algorithms usually exploit statistical redundancy in such a way as to

represent the sender’s data more concisely without error.

(2) Lossy Compression is possible if some loss of fidelity is acceptable.Lossy schemes accept

some loss of data in order to achieve higher compression .Lossy data compression is better

known as rate-distortion theory.

Shannon formulated the theory of data compression. Lossless data compression theory and rate-

distortion theories are known collectively as Source Coding theory.

1. INTRODUCTION

Data is defined as the raw facts, figures or

anything that is unprocessed .Data compression

is a technique in which the data/information is

encoded using fewer bits through use of

specific encoding schemes. Data compression

can be seen as a technique in which one

objective is to minimize the amount of data to

be stored or transmitted.Another objective may

be treated as the security of data as well

becauuse the data is send in encoded form. Data

Compression is useful because it helps in

reducing the consumption of resources, such as

hard disk space or transmission bandwidth.

This paper discusses the theory of data

compression.

Now if we talk about Data compression, it

may be divided into following 2 categories:

(1)Lossless (2) Lossy

We discuss them here.

(1) Lossless compression is the one which uses

the statistical redundancy that occurs in the data

in such a way as to represent the sender's data

more concisely without error. Lossless

compression schemes are reversible so that the

original data can be reconstructed

(2) Lossy compression is the one which is

possible only in the case where some loss of

fidelity is acceptable. .Lossy data compression

is better known as rate-distortion theory. Lossy

schemes accept some loss of data in order to

achieve higher compression.

Claude E. Shannon formulated the theory of

data compression. Lossless Data Compression

Theory and Rate-Distortion Theory are known

collectively as source coding theory. Now we

would discuss the Lossless Source Coding and

Rate-Distortion Theory for Lossy Data

Compression.

Page 28: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

2

2. LOSSLESS SOURCE CODING

It has its base in the block coding. To show

this concept, we consider a source of string in

which the set of alphabets consists of only two

letters namely a and b :

(1)

But it is sure that if ‘a’ occurred in the

previous character, the probability that ‘a’

occurs again in the present character is 0.9.

Similarly, given that if ‘b’ occurred in the

previous character, the probability that ‘b’

occurs again in the present character is 0.9.

An n-th order block code is just a mapping

which assigns to each block of n consecutive

characters a sequence of bits of varying length.

. This can be shown by following 2 examples.

2.1. First-Order Block Code

Here each character is mapped to single bit.

Table I

Table of First-Order Block Code

Codeword

a 0.5 0

b 0.5 1

R=1 bit/character

Figure 1. Showing original and compressed

data ( First-Order Block Code)

Using Table I we refer to Fig . 1 and note

that here 24 bits are used to represent 24

characters -- an average of 1 bit/character.

2.2. Second-Order Block Code

Here pair of characters are mapped to either

one, two, or three bits.

Table II

Table of Second-Order Block Code

Codeword

aa 0.45 0

bb 0.45 10

ab 0.05 110

ba 0.05 111

R=0.825 bits/character

Figure 2. Showing original and compressed

data(Second –Order Block Code)

Using Table II we refer to Fig.2 and note

that here 20 bits are used to represent 24

characters ---an average of 0.83 bits/character.

What a decrease in consumption of bits/

character!!!!

2.3. Formula

Here we note that the rates shown in the

tables are calculated from

(2)

In (2) is the length of the codeword

for block . The higher the order, the lower

the rate that is better compression is achieved.

Page 29: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

3

As we move to n Order Block Code the

consumption of bits / character decrease

significantly.

We are only interested in lossless data

compression code. That is, we are able to

rederive the original data. All of the examples

given above are lossless.

3. RATE-DISTORTION THEORY

In lossy data compression, the decompressed

data need not be exactly the same as the

original data. So some amount of distortion is

acceptable. A distortion measure specifies

exactly how close the approximation is.

Generally, it is a function which assigns to any

two letters and in the alphabet a non-

negative number denoted using

(3)

Here, is the original data, is the

approximation, and is the amount of

distortion between and . The most common

distortion measures are the Hamming distortion

measure given as:

(4)

4. CONCLUSION

We surveyed the data compression

algorithms both loosy and lossless.Both the

algorithms have their advantage in different

situations.These algorighms not only minimize

the amount of data to be stored or transmitted

but also the security of data is strengthened .

REFERENCES

[1] Willian M.Daley, Raymond G. Kammer,

DES, FIPS PUB 46-3, Federal Information,

Processing Standards Publication; 1999.

http://www.tropsoft.com/strongenc/des.htm

[2] Whitefield Diffie and Martin E.

Hellman,”Privacy and Authentication: An

Introduction to Cryptography” in Proc. IEEE

vol 67, no 3, pp 397-427, 1979.

[3] W.B. Pennebaker and J.L. Mitchell,

“JPEG: Still Image Data Compression

Standard”, Van Nostrand Reinhold, New York,

1993.

[4] C. H. Kuo , C.F.Chen , and W.Hsia ,”A

compression algorithm bassed on classified

interpolative block truncation coding and vector

quantization”,Journal of Information Science

and Engineering ,15:pp 1-9 ,1999.

[5] David Saloman , “Data Compression”.

[6] C. E. Shannon, A Mathematical Theory of

Communication.

[7] Sunder Rajan R, “An Efficient Operator

based Unicode Cryptograpy Algorithm for

Text, Audio and Video files”,in International

conference 2008.

[8] M. Nelson and J.-L. Gaily, the Data

Compression Book.

Page 30: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

1

Recruit

ment

A good employee

lost

Resig

natio

n

Yes

No

Effective Retention

Policies

A good employee

retained

Retention

efforts

made ?

Time and

Money

Retention Incentives and Thoughts in Organisations

Mr. SANDEEP SHARMA Prof. B. K. NIRMAL

Joint CEO, SCOPE, Education Department, Director, RBIMS

Govt. of Gujarat, [email protected] [email protected]

Abstract

Introduction

It is said that the biggest asset of any organization happens to be its human capital. More we

honour it, more productive a company is. Almost any company or organization face the direct or

indirect challenges of 3Rs - Recruitment, Retention and Resignation. For many organisations,

recruitment is a lengthy, time consuming and judicious process. Apart from subject skill, the

candidate is judged on many parameters. A lot of time, energy and money go into the combined

effort. A new incumbent goes through induction programme, training programme, briefings, and

thorough understanding of the work and organisation culture. However, when he/she resigns, the

entire process recycles itself to accommodate another incumbent. To prevent this, many

companies try to negotiate with the person with or without a retention policy in existence. They

may succeed or fail in their efforts to convince the employee. The sad part of the story is that

most of the companies or institutions even do not try or feel the need to talk to the outgoing

employee. It leads to turbulent environment in the company and may turn into an avalanche

some day. It also adversely affects the image of the organisation. Therefore, a good and effective

retention policy is must for sustainable survival of any company /institute/organisation.

Objective

Please consider the following flowchart of the journey of an employee from recruitment to

resignation and how a turn towards retention may come in the path.

Page 31: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

2

A good retention policy is generally succeeded to retain the employee. On the other hand,

retention of each and every employee is not needed - sometimes for the benefit of the company

and sometimes for the benefit of the employee.

The objective of this paper is to study the best and working retention methodologies adopted by

the companies and organisations including PSUs and government sector. The paper also

discusses the noticeable affect on the performance in the case of there is no retention policy or

flawed retention policies. Exit interviews are not conducted at most of the places and the

employer is never able to know the exact cause of root problem.

Keywords : Recruitment, Retention, Exit Interview, Resignation, Notice Period, RRR (Recovery

from Resignation Row).

Page 32: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

3

Full Paper

1.0 Introduction

The HR (Human Resource) cell or wing or department is fearsome one for some and rewarding

one for some. But it is an integral function of any company/organisation. It has many synonyms

like Personnel, Staff, Establishment, Forces, Manpower etc. While recruitment and management

are considered the important functions of HR division, the Retention is mostly the ignored or the

left out activity of the division. On the other hand, it is not entirely the recruiter's responsibility

to retain the workforce but lies on the recruitee as well to maintain his/her impression to be

considered for retention.

The paper discusses the responsibilities at two fronts:

1. Organisational front

2. Employee front

The paper is mainly focusing on the best practices which an organisation may adopt to retain the

good and productive manpower and the outputs, expectations and experience which an employee

may bring along that maybe useful to achieve the objectives of the company. There are various

low cost innovative mechanisms adopted by various companies but are largely unknown or

undisclosed. Similarly, the basic qualities in an employee are often ignored to be discussed and

hence a prospective employee does not tend to develop such qualities which may be paramount

to his/her success in the organisation.

This is to be noted that while money (salary package) has been the biggest attraction for

poaching, shifting, resignation, succession, promotion, transfer, location change; it is not the only

factor. There are various other incentives which can be considered by the employers that may

develop a strong bond between an employee and employer. For example, an employee may not

be willing to shift to a metro city even at double the package if the living cost outwits the

package he/she gets compared to a living cost scenario in a smaller city where he/she can

manage well. Similarly, an employee may not be leaving the company if the turnover is

reasonably good, market share value is soaring and it is on the verge of declaring the ESOP

(Employee Stock Option Plan) option for its employees.

Page 33: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

4

However, the question is if a company is doing the routine job i.e. regularly paying the wages,

giving due promotions, doing well, big plans are in the foray; it still faces the problem of high

attrition rate. What are the doable and workable 'Retention Techniques' and methodologies which

may help an organisation to manage attrition and reduce resignations? There are techniques

available for different levels and positions (Horizontal and Vertical structure).

2.0 Retention Techniques at the Organizational Front

Retention is always more important than the recruitment. However, it is the least focused one in

many organisations. It is the time that companies and corporates seriously think over retaining

good employees by means of monetary or non-monetary incentives.

2.1 Family Chalo Office-e-Abhiyan

In order to increase work productivity, increased consciousness towards work and treating office

(when duty is concerned) as extension of home and according same seriousness as we accord to

our home, a thought was discussed during a Chintan Shibir at one government institution. The

name accorded to it was "Family Chalo Office-e-Abhiyan".

Under the Abhiyan, families of employees are invited to visit the work place and are told to

monitor the natural working style and behaviour of their kins at work place without actually

disturbing them or seeking their attention. It serves two purposes - a get together during recess

period or tea time and monitoring mechanism by family members. The purpose is to report the

hygiene conditions, behaviour, working style and way of discharging the duties of kins to the top

authority in a congenial way.

2.1.1 Methodology

Any date can be decided as per the convenience of all. The time of visit is usually kept during

lunch hours (01.00 pm - 5.00 pm). Those who come from distant place are allowed to bring their

families from morning as it will be difficult for them to manage it after lunch hours. Families,

then, can take a visit to the office and the entire process of working briefly. The person given

Page 34: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

5

such responsibility should be very communicative and clear in explaining the working. The

lunch can be arranged by the office or a "potluck" (Dabba Party) arrangement can also be made.

Post lunch, the presentations/videos of respective department to be done by concerned

department before families. A small kit can be distributed among families containing information

of all wings/units and related activities in a sequential manner.

A meeting of all families can be held with MD or CEO or any other top authority in the evening.

Each family member is asked to share the experience and minor/major lapses in the functions

from an outsider point of view. Family members are also asked to write a small paragraph

/suggestion on working style/hygience/sanitation/ food etc. based on their observation in any

language they prefer.

Besides reducing resignations, it is an effective method conducive to curb corruption as well as

the employee would avoid any wrong-doing before family members and would try to behave

sensibly and in a most efficient manner.

2.2 Periodic training

Training is necessary to keep employees abreast of happenings in the sector across the globe.

The routine becomes quite monotonous without training modules. The training is required at all

levels immaterial of designation or position. The training can be a residential training or day-

training. Sometimes, companies allow their employees for a sabbatical for a social cause. For

example, US Peace Corp seeks help in terms of manpower support and sends them for a smaller

period to work in a village or sub urban town. Surveys show that such initiatives are helpful for

the individual and company as the employees come back as a better human beings and enhanced

work productivity.

Apart from the subject matter, training should involve certain generic modules and Life Skills

component. The purpose of training is to build their capabilities of the highest order. Training

requirements for the purpose of implementing initiatives at the levels of head office, region, area,

zone or unit are required to be met with. A training should lead to knowledge creation and

preservation through different activities and projects in a workshop mode. Further, it is expected

that their output is quantitatively and qualitatively enhanced.

Page 35: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

6

2.3 Visits Abroad

Exposure visits are another attraction for the employees. Wherever possible, the companies

should send their employees abroad to attend convocations / ceremonies/business meetings etc.

Generally, it is seen that every time only top people in the hierarchical structure get the chance to

visit. Thought the top management is needed in such visits to take certain decisions, few

vacancies should be reserved for the lower positions to build their capacities and maintain their

interest. It is also a good step in creating a second line of leadership.

2.4 Promoting participation or presentation in Seminars /conferences/symposiums

Employees are always willing to participate or present their findings /experience in seminars and

conferences. But they do not get such opportunities quite often. Following are the issues striking

to an employee while considering to participate in a seminar :

1. Who will pay the registration fee?

2. Even if registration fee is arranged, whether the leaves would be granted for the day of

seminar and for the days when the person is in transit?

3. Who will bear the cost of logistics and transportation?

4. Who will take care of the work in absence of participant?

5. If the employee is allowed to participate, can he/she use some of the case studies or logo or

brand image or events or photographs or equipments of the company (laptop, camera, handy

cam etc.)?

If companies can take care of the above issues, it is likely to create a happy and positive

environment in the organisation.

2.5 More privileges and spending limits at various levels in some cases

The travel and logistics rules are mostly defined in many companies. Though it seems that

everything is well settled, there are cases where the given limits and privileges do not help the

employee. For example, in a hilly terrain or famous tourist places or during a festival event or

during important function of the company, the case is that material and other services (travel,

lodging and boarding) are available at a premium rate. In these cases, the employees can be

Page 36: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

7

given special privileges to spend slightly more than the permissible limits. For example, if a desk

employee is eligible to travel in a train, he/she should be allowed to travel in flight during Diwali

days to discharge an assigned official duty at some place with no availability in train.

2.6 Club membership

Various clubs offer corporate membership for firms and organisations. The Corporate

Membership allows a corporation or company in the club’s area to become a member of the club,

through an established membership approval process, and to appoint few designees as the

individuals. This option is more suitable in case of government or NGOs as the increment is

fixed or negligible and to retain good manpower is quite difficult. If such organisations can not

provide good increment (monetary), they can do it in non-monetary way. The Club membership

for the efficient employees and their families is an attractive perk which can be thought of.

2.7 Corporate credit card

Like club membership, the corporate credit card is another attraction where employee does not

need to depend on a risky personal card but may utilize the company given card for personal

spending. Similarly various services like domain name booking, air tickets, rail tickets, hotel

booking etc. can be done through such cards which may otherwise take long time in a

conventional way such as preparing cheque, courier, receipt etc.

2.8 Remuneration through other projects

Organisations can consider their employees for cross projects. A cross project system is one

where an employee is not bound to only a single project. They can be assigned different projects

at different sites. The reporting in this case is in the form of a matrix relationship. There are the

following advantages of a cross-project system :

1. Increase the Knowledge/working Domain of the company

2. Increase in the knowledge base and greater exposure for the individual

3. Building an alternate arrangement in case of team scarcity for a particular skill

4. Additional income for the employee

Such projects funded by the parent company or from other resources can have some component

of reimbursing the working professionals from other projects.

Page 37: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

8

2.8.1 Remuneration through organizing a workshop in other project

Some government organisations or NGOs, who are not a good pay master, manage the attrition

by compensating employees through other benefits. For example, various projects have the

component of training and capacity building where workshops and round table discussions are

encouraged. There is a separate budget for each workshop. The employee, worth retentive, can

be engaged in such workshops and be paid some remuneration based on scheduling of each such

event. This remuneration would be extra to the prevailing salary of the employee.

2.9 Charge Transfer Allowance

It is a usual phenomenon in many organisations that when a person leaves the organisation due to

any reason (resignation, termination, transfer, end of contract, sabbatical, study leave or any

other leave), his/her charge is transferred to another person (transferee). The transferee, apart

from the responsibilities of his own work, handles the task of the transferor. Generally, the

additional load of work is discharged without any additional remuneration to the transferee. This

practice can be changed and contribution to a congenial and happy environment can be made by

making transferee eligible for extra 10%-15% of the salary of the transferor.

2.10 Permitting leaves for sandwich days

Consider a scenario where 15th

August, the public holiday, is Tuesday. Saturday and Sunday

would be on 12th

and 13th

respectively. The Monday, 14th

August, is termed as Sandwich Day as

it is sandwiched between holidays. At most work places, more than 50% of the workforce would

not wish to report on sandwich day in such a scenario. Even if they come, as per a survey, they

are not intended to work wholeheartedly. The callousness is reported in the behaviour and work

style leading to reduction in work efficiency. To prevent this, it is better to allow for sandwich

holiday for a group of employees at one instance and second group of employees at second

instance. When in policy, the chances of callousness are very less.

2.11 Proper Administration Procedures

It is often observed that weak administration policies lead to confusion, tensions and bitter heart

among employees and between employee and employer. There should be a way of faster

clearance of eligible bills/invoices and timely release of wages of employees. Similarly, the

Page 38: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

9

office should maintain maximum hygiene conditions at work place. Sometimes, the less attention

seeking sanitation activity plays a major role in making the mindset of a prospective candidate to

join or reject a position, particularly in case of female candidates. The toilets, washrooms,

kitchen, foyers and other places of work should be neat and clean and also as a brand building

exercise. Admin support while in transit is a great help or when bookings are to be made or

changed.

3.0 The desirables from an employee

Employees need to understand their functional and ethical responsibilities at their place of work.

The personal differences and dislikes should be left apart while in a professional environment.

3.1 Life Long Learning (LLL) and continuous skill mapping

When a person is employed in a firm, his/her induction programme is initiated. It is a new

learning for him/her. After few years of work, a new machine is purchased by the company and

all the employees are trained to work on the new machine. Similarly, in IT field, the technology

undergoes a major change after every six months. If an employee is not keeping pace with the

changing technology, he/she is likely to meet difficulties. It means the learning does not end

beyond classrooms or colleges but takes place throughout the life and in various contexts. Life

Long Learning (LLL) is a voluntary and self-motivated activity which may or may not relate to

the work area of the person. It may be a learning leading to social inclusion, personality

development, acquiring a skill, citizenship or spiritual understanding. It is independent of place

and time. Similarly, an employee has to maintain his worth and value by contributing in the

company's growth through application of his/her various skills and upgrading these skills time to

time. The skill mapping with the company needs and then industry needs should be the prime

concern of a good employee.

3.2 Prevent Self Poaching

Companies and organisations should restrain themselves from poaching and similarly the

employee should be educated enough not to find himself/herself in the poaching trap. A

poaching is a term given to the effort made by a company to attract or lure or entice the

utilitarian employee of another competing company by any means (ethical or unethical). It’s

Page 39: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

10

underhanded and unethical to recruit out of the competition’s talent pool. In job market,

poaching is quite common but lacks respect. Poaching is high at senior levels where decision

making affects millions in monetary and clientele terms. Poaching is also done when a senior

employee takes his entire team when he/she is recruited by other company as he/she is more

comfortable to work with his/her own team. While some say that it helps drive economic growth;

in long term, it is not desirable out of an employee.

4.0 Conclusion

There is a serious need to mull over retaining good employees in the public, private or

government sector. The retention is as important as recruitment or more than that. The exit

interviews may give some insights on the choices and aspirations of the employees. Companies

must think over the various policies and incentives which can be thought to make the work place

more attractive and productive. While recruitment focuses on the new talent, new requirement

and counting on the new incumbent, the other side of the coin is that the existing employee is

already experienced, familiar with the office procedures and codes and tested by the seniors. The

experienced and efficient employees are very important pool for any organisation and it would

not want to loose them. The onus lies on both the employer and employee. There are some

retention techniques (monetary and non-monetary), a company can bank upon. Companies

should learn that it is not all about money; it is about investing in and respecting other human

characteristics. The employees also have to widen and deepen their thinking in their own interest

while switching to other jobs. At many times, it may seem quite lucrative to join another

company. However, it should be viewed in terms of long term career goals and expected

achievements.

References :

1. (Office Documentation), Sharma, Sandeep, "Office Processes Documentation", Office of

Commissioner, Higher Education, Government of Gujarat, 2012.

2. Wikipedia

Page 40: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

1

Frequent Item set Using Transaction Reduction Technique in

Data Mining-A survey

Sefali Patel Dheeraj Kumar Singh

Information Technology, Information Technology,

Parul University (PIET), Parul University (PIET),

Vadodara, Gujarat, India Vadodara, Gujarat, India

[email protected] [email protected]

Abstract: - At present, due to the developments in Database Technology, large volumes of data are produced by

everyday operations and they have introduced the necessity of representing the data in High Dimensional

Datasets. Discovering Frequent Determinant Patterns and Association Rules from these High Dimensional

Datasets has become very tedious since these databases contain large number of different attributes. For the

reason that, it generates extremely large number of redundant rules which makes the algorithms inefficient and it

does not fit in main memory. In this paper, a new Association Rule Mining approach is presented, and it efficiently

discovers Frequent Determinant Patterns and Association Rules from High Dimensional Datasets. Association

rules are the main technique to determine the frequent item set in data mining. Apriori algorithm is a classical

algorithm of association rule mining. This classical algorithm is inefficient due to so many scans of database. And

if the database is large, it takes too much time to scan the database. In this paper, we proposed an Improved

Apriori algorithm which reduces the scanning time by cutting down unnecessary transaction records as well as

reduce the redundant generation of sub-items during pruning the candidate item sets, which can form directly the

set of frequent itemsets and eliminate candidate having a subset that is not frequent.

Keywords: Association Rule, Frequent Item Set, Support Count, Apriori, Transaction Reduction Technique.

1. INTRODUCTION: Data mining is a Process of analyzing data from different perspectives and summarizing it into useful

information. Data mining has evolved in to an important area of research because of the theoretical

challenges and practical applications associated with the problem of discovering interesting and

previously unknown know ledge from real world databases. There are many technique of data mining

such as Classification, Clustering, Association rule mining, Regression etc.

Page 41: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

2

1.1 Data Mining Task Data Mining is the semi-automatic discovery of patterns, associations, changes, anomalies and

statistically significant structures and events in data. Data Mining a s a term used for the specific set of

tasks or activities as follow

1.2 Association Rule Mining

In Data mining, the definition of association rule mining finds interesting association or corr elation

relationships among a large set of data items. Association rule mining finding frequent pattern,

correlations among the items or object in transactional database, or relational database. Association rule

can create analyzing data for frequent pattern using the criteria Support & Confidence to identify the

relationship. Support is indicating of how frequently the item appears in the database. Confidence

indicates the number of time has been found. There are many algorithms used in association rule mining.

The main goal of association rule mining is:

• Frequent item set generation

• Rule generation (Find large item set).

1.3 Frequent Item set Mining

Frequent pattern mining has been an important subject matter in data mining from many years. A

remarkable progress in this field has been made and lots of efficient algorithms have been designed to

search frequent patterns in a transactional database. Frequent pattern mining can be used in a variety of

real world applications. It can be used in super markets for selling, product placement on sh elves, for

promotion rules and in text searching.

2. RELATED WORKS:

Since its introduction by Agrawal et al [1], it has received a great deal of attention and various efficient

and sophisticated algorithms have been proposed to do frequent itemset mining. Among the best-known

algorithms are Apriori, Eclat and FP-Growth.

The Apriori algorithm [2] uses a breadth-first search and the downward closure property, in which any

superset of an infrequent itemset is infrequent, to prune the search tree. Apriori usually adopts a

horizontal layout to represent the transaction database and the frequency of an itemset is computed by

counting its occurrence in each transaction. FP-Growth [3] employs a divide-and-conquer strategy and a

FP-tree data structure to achieve a condensed representation of the transaction database. It is currently

one of the fastest algorithms for frequent pattern mining. Eclat[4] takes a depth-first search and adopts a

vertical layout to represent databases, in which each item is represented by a set of transaction IDs (called

Page 42: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

3

a tidset) whose transactions contain the item. Tidset of an itemset is generated by intersecting tidsets of

its items. Because of the depth-first search, it is difficult to utilize the downward closure property like in

Apriori. However, using tidsets has an advantage that there is no need for counting support, the support

of an itemset is the size of the tidset representing it. The main operation of Eclat is intersecting tidsets,

thus the size of tidsets is one of main factors affecting the running time and memory usage of Eclat. The

bigger tidsets are, the more time and memory are needed.

Zaki and Gouda[5] proposed a new vertical data representation, called Diffset, and introduced dEclat, an

Eclat-based algorithm using diffset. Instead of using tidsets, they use the difference of tidsets (called

diffsets). Using diffsets has reduced drastically the set size representing item sets and thus operations on

sets are much faster. Eclat had been shown to achieve significant improvements in performance as well as

memory usage over Eclat, especially on dense databases[5]. However, when the dataset is sparse, diffset

loses its advantage over tidset. Therefore, Zaki and Gouda suggested using tidset format at the start for

sparse databases and then switching to different set format later when a switching condition is met.

Table 1: Comparative Analysis of Pattern Mining Algorithm

Apriori RARM ECLAT FP-Growth ASPMS

Techniques Breadth first Depth first search Depth first Search & Divide and Conquer BSM(Branch

search and intersection of t-id Sort Method) Apriori using merge property(for method pruning)

Database Database is Database is scanned Database is scanned few Database id scanned Database is

Scan scanned for few times to times two times only scanned only one each time a construct. time candidate

item set is generated

Drawback -requires -Difficult to use in It requires the virtual FP-Tree is expensive ----

large memory interactive system memory to perform the to build consumes

space. mining transaction. more memory.

-Too many candidate

item set.

Page 43: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

4

3. LITRETURE REVIEW:

3.1 Find frequent item sets using Apriori algorithm: The most famous is the Apriori algorithm which

has been brought in 1993 by Agrawal which uses association rule mining [6]. Association rules are

usually required to satisfy a user-specified minimum support and a user-specified minimum confidence at

the same time. Association rule generation is usually split up into two separate steps:

1. Minimum support is applied to find all frequent item-sets in a database.

2. These frequent item-sets and the minimum confidence constraints are used to form rules.

Advantage of this algorithm, it is easy to find frequent item sets if database is small but it has two deadly

bottlenecks. First, It needs great I/O load when frequently scans database and Second, It may produce

overfull candidates of frequent item-sets.

3.2 Find frequent item sets using PAFI as well as Apriori algorithm:

D.Kerana Hanirex and Dr.M.A.Dorai Rangaswamy proposed efficient algorithm for mining frequent item

sets using clustering techniques. They presents an efficient Partition Algorithm for Mining Frequent Item

sets (PAFI) using clustering. This algorithm finds the frequent itemsets by partitioning the database

transactions into clusters and after clustering it finds the frequent itemsets with the transactions in the

clusters directly using improved Apriori algorithm which further reduces the number of scans in the

database as well as easy to manage and available easily, hence improve the efficiency as well as new

algorithm better than the Apriori in the space complexity but again it uses apriori algorithm hence

efficiency not increase as much as required.

Advantages -Easy to -No candidate -No need to scan -Database is scanned -It requires less implement. generation. database each time only two times. memory.

-Use large -Highly suitable item set for interactive property. mining

Data format Horizontal Horizontal Vertical Horizontal Horizontal

Storage Array Tree Array Tree(FP Tree) Tree(Asp tree) structure

Time More Less execution time Execution time is less Less time as Less execution

execution as compared to than Apriori algorithm compared to Apriori time as compared time Apriori & FP algorithm to FP growth Growth algorithm

Page 44: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

5

3.3 Find frequent itemsets using Improved Apriori algorithm based on matrix:

Feng WANG and Yong-hua proposed An improved Apriori algorithm based on the matrix. To solve the

bottleneck of the Apriori algorithm, they introduce an improved algorithm based on the matrix [8]. It uses

the matrix effectively indicate the affairs in the database and uses the “AND operation” to deal with the

matrix to produce the largest frequent itemsets and others. The algorithm based on matrix don’t scan

database frequently, which reduce the spending of I/O. So the new algorithm is better than the Apriori in

the time complexity but it is not suitable for large database.

3.4 Transaction Reduction In Actionable Pattern Mining For High Voluminous Datasets Based On

Bitmap and Class Labels :

Frequent pattern mining in databases plays an indispensable role in many data mining tasks namely,

classification, clustering, and association rules analysis. When a large number of item sets are processed

by the database, it needs to be scanned multiple times. Consecutively, multiple scanning of the database

increases the number of rules generation, which then consume more system resources. Existing CCARM

(Combined and Composite Association Rule Mining) algorithm used minimum support in order to

generate combined actionable association rules, which in turn suffer from the large number of generating

rules. Explosion of a large number of rules is the major problem in frequent pattern mining that adds

difficult to find the interesting frequent patterns.

4. CONCLUSION:

We have analyzed the comparative study of various frequent patterns mining algorithms. A comparison

framework has developed to allow the flexible comparison of Apriori, Eclat and FP-growth algorithms.

Using this framework this paper presented the comparative performance study of these algorithms such

as, Apriori, Eclat and FP-growth. This study also focuses on each of the algorithm’s advantages,

disadvantages and limitations for finding patterns among large item sets in database systems.

5. REFERENCES:

[1]V.Vijayalakshmia, Dr.A.Pethalakshmib “An Efficient Count Based Transaction Reduction Approach

For Mining Frequent Patterns” Published by Elsevier 2015.03.183

[2]Anjani Pandey, Gayatri Singh,“An Association of Efficient Mining by Compressed Database” Binary

Journal of Data Mining & Networking 5 (2015) 33-35

[3]Mr.Vaibhav Kumar Sharma, Mr.Anil Gupta, Mr. B.L. Pal ,“An Efficient Approach for Data Mining

with Compressed Data” International Journal of Computer Trends and Technology (IJCTT) – volume 28

Number 5 – October 2015

Page 45: Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123rbi.edu.in/wp-content/uploads/2019/08/NIRUPAN-2017.pdfNirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 1 Analysis

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

6

[4]K.Prasanna , Dr. M.Seetha , Dr. A. P. Siva Kumar “CApriori: Conviction Based Apriori Algorithm for

Discovering Frequent Determinant Patterns from High Dimensional Datasets” International Conference

on Science, Engineering and Management Research, IEEE 2014

[5]Dr.V.Vaithiyanathan,K.Rajeswari, Prof. Rashmi Phalnikar,Mrs.Swati Tonge“Improved Apriori

algorithm based on Selection Criterion” Computational Intelligence and Computing Research IEEE 2012.

[6]Loan T.T.Nguyen, Bay Vo, Tzung-Pei Hong,Hoang Chi Thanh,“CAR-Miner: An Efficient Algorithm

For Mining Class-Association Rules,”Expert system With Applications 40(2013) 2305-2311,

2012@Elsevier Ltd. All Rights.

[7]Wael Ahmad AlZoubi, Khairuddin Omar, Azuraliza Abu Bakar” An Efficient Mining of Trasactional

Data Using Graph-Based Technique” 2011 3rd Conference on Data Mining and Optimization (DMO) 28-

29 June 2011, Selangor, Malaysia

[8]Fan Zhang, Yan Zhang Jason Bakos,” GP Apriori: GPU-Accelerated Frequent Itemset Mining”. 2011

IEEE International Conference On Cluster Computing

[9]Anil Vasoya ,Dr. Nitin Koli “Mining of association rules on large database using distributed and

parallel computing”Elsevier 2016.

[10]V.Vijayalakshmi, A.Pethalakshmi “A Performance based Transaction Reduction Algorithm for

Discovering Frequent Patterns” International Journal of Computer Applications, 2014

[11] Jaishree Singh, Hari Ram, Dr. J.S. Sodhi “Improving Efficiency of Apriori Algorithm Using

Transaction Reduction ” International Journal of Scientific and Research Publications, 2013

[12]Rupesh Panwar, Prof. Abhishek Raghuvanshi “A Novel Transaction Reduction & Data Elimination

Based Technique For Mining Frequent Item Sets From A Transaction Data Base” International Journal of

Scientific Development and Research (IJSDR), 2016

[13]K. Kavitha, Dr.E. Ramaraj, “Efficient Transaction Reduction In Actionable Pattern Mining For High

Voluminous Datasets Based On Bitmap And Class Labels”International Journal On Computer Science

And Engineering (Ijcse), 2013.