BITM Journal 2017
BITM Journal 2017
BITM Journal 2017
ISSN No.0974-9527
International Journal
BITM Transactions on EECC
Editor
Soumen Bhowmik
Arun Kr. Bag
Selected papers of
National Conference on
Recent Advances in Science,
Engineering and Management
RASEM-2017
Technically cosupported by
IEEE, Kolkata Chapter
All rights reserved. No parts of this publication may be reproduced, stored in a retrieval
system, or transmitted, in any form or by any means, electronic, mechanical,
photocopying, recording, or otherwise, without the prior permission of the institute.
ISSN: 0974-9527
Preface
The National Conference on Recent Advances in Science, Engineering and
Management (RASEM-2017) was held on 11th and 12th of February, 2017. The
conference was organized by Bengal Institute of Technology and Management,
Santiniketan under the patronization of Camellia Group, Kolkata, with the technical
collaboration of IEEE Joint CSS-IMS, Kolkata Chapter. It focused not only on
isolated domain-specific-research-sharing but also delving into the convergence of this
trilogy and its possible triangulation. The conference was an Endeavour to track the
current research trends in Science, Engineering and Management and revealed
avenues for aspiring researchers to expand the existing body of know ledge. The
Conferences aim was to collate the recent researches and progress made in the fields of
science, engineering and management where harmonious and synergistic outputs hade
been observed in terms of its socioeconomic applications. Some specific objectives of
this Conference was: to create a research platform with multidisciplinary inputs; to share
and understand the recent trends in research pertaining to the fields of Science,
Engineering and Management with their convergence and to know the socioeconomic
impact of the same; to understand the opportunities and scope of research-applications in
industries namely patents, IPRs, prototypes, technology adoption etc; to expose the PG
students to the academic research domains.
Out of 145 number of research papers only 59 number of papers has been selected for the
conference presentation, out of that two (02) papers from University of KwaZula-Natal,
South Africa, one (01) paper from University of Wisconsin at Milwaukee, USA, one (01)
paper from IIT- Ropar, five (03) from Visva- Bharati University, two (02) from Aliah
University, two (02) from RCCIIT and the rest are from Jadavpur University, HIT,
NITTTR, CSIR- Indian Institute of Chemical Biology, NIT- Agartala , NIT-Durgapur,
IMS- Kolkata, CIT- Madhyamgram and BITM- Santiniketan.
The Chief Guest of the Conference was Dr. Sayed Rafikul Islam, Honorable Registrar,
Maulana Abul Kalam Azad University of Technology, Kolkata, West Bengal. He
delivered his speech on the topic Recent Advances in Science Technology &
Management. Professor (Dr.) A. Chattopadhyay, former Director, Indian school of
Mines University, Dhanbad was the Guest of Honour of the conference. He delivered his
speech on the topic New Trends of Scientific Innovations for Human-beings.
Professor (Dr.) Sukadev Sahoo, Associate Professor, Department of Physics, NIT,
Durgapur, Professor (Dr.) Radhikesh P. Nanda, Associate Professor, Department of
CIVIL Engineering, NIT, Durgapur, Dr. Arup Kumar Baksi, Associate Professor, Dept.
I, on behalf of the Organizing Committee of RASEM-2017, would like to thank all the
invited guests, dignitaries, keynote speakers, session chair, paper presenter and dear
students for their contribution and presence. Many thanks to the IEEE, Kolkata Chapter
for Technical Support. My special thanks to Sri. Nil Ratan Dutta, Managing Trusty cum
Chairman, MEMD Trust, Mr. Partha Pal, Deputy Director (Acad.), MEMD Trust and
all the stuff members of BITM for their direct and indirect help towards successful
completion of the RASEM-2017.
Soumen Bhowmik
Convener,
RASEM-2017
Bengal Institute of Technology and Management, Santiniketan
Date: 05/03/2017
Abstract
An analysis is presented to investigate the thermophoresis particle deposition and Soret-
Dufour effects on mixed convection boundary layer flow over a semi-infinite inclined flat
plate in the presence of heat generation and chemical reaction. The primary aim of this
study is to investigate and shade light on the mass deposition variation on the surface due
to thermophoresis. The governing differential equations are solved numerically using the
shooting algorithm with a Runge-Kutta-Fehlberg integration scheme over the entire range
of physical parameters. Numerical results are obtained for dimensionless velocity,
micropolar, temperature and concentration profiles and displayed graphically for
pertinent parameter. Favorable comparisons with previously published work on special
cases of the problem are obtained. Results show that the velocity decreases with an
increase in the Dufour number and decrease with the Soret number, while an increase in
the power index n and chemical reaction parameter leads to a decrease in the fluid
temperature and solute concentration respectively.
Key words: Micropolar fluid; Thermophoresis;Soret and Dufour effects; Chemical
Reaction;
Introduction
Mixed convection boundary layer flow over a non-linearly stretching surface is of great
interest in many industries for the design and reliable operation equipment. The effects of
thermophoresis on mixed convection flow play an important role in the context of space
technology and in processes which involve high temperatures. Thermophoresis plays an
important role in mass transfer mechanisms as small micron sized particles move
differently under the influence of large temperature gradients so that small sized particles
can be separated after mixing, or prevented from mixing if they are already separated.
Thermophoresis is used in industry to separate large or small polymer particles from their
solvent. It is Further, utilized in the manufactur of silicon dioxide and germanium dioxide
optical fibers used in communication cables. Also, thermoporetic radiation particle
deposition is one of the most important factors causing accidents in nuclear reactors
(Anbuchezhian et. al [1]). The first analysis related to the thermophoretic deposition in
geometry of engineering applications appeared in the paper by Hales et al. [2]. Talbot et
al. [3] solved numerically the problem related to thermophoresis for the velocity and
temperature fields in a laminar boundary layer adjacent to a heated plate. Selim et al. [4]
studied the effect of surface mass flux on mixed convective flow past a heated vertical
permeable plate with thermophoresis. In many chemical engineering processes
concentrations of species vary from point to point resulting in mass transfer. Energy flux
www.bitm.org.in Volume: 6 No: I February 2017 1|P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
can be generated not only due to temperature gradient but also due to concentration
gradient. The energy flux caused by concentration gradient is called the Dufour effect
whereas the flux caused by temperature gradient is called the Soret effect. These effects
are very significant when the temperature and he concentration gradients are high. The
importance of these effects in convective transport in clear fluids has been studied by
many authors in recent times. Pal and Mondal [5] studied the Soret effects on MHD non-
Darcy mixed convective diffusion of species over a stretching sheet embedded in a
porous medium in the presence of non-uniform heat source/sink and variable viscosity.
Thermophoresis particle deposition in a non-Darcy porous medium under the influence of
Soret, Dufour effects was studied by Partha [6]. Pal and Chatterjee [7] studied the mixed
convection magnetohydrodynamic heat and mass transfer past a stretching surface in a
micropolar fluid-saturated porous medium under the influence of Ohmic heating, Soret
and Dufour effects. In many transport processes in nature and in industrial applications in
which heat and mass transfer with variable viscosity is a consequence of buoyancy
effects caused by diffusion of heat and chemical species. The study of such processes is
useful for improving a number of chemical technologies, such as polymer production and
food processing. Thus the study of heat and mass transfer with chemical reaction is of
considerable importance in chemical and hydrometallurgical industries. Chemical
reaction can be codified as either heterogeneous or homogeneous processes depending on
whether they occur at an interface or as a single phase volume reaction. Kandasamy et al.
[8] studied the effects of chemical reaction, heat and mass transfer along a wedge with
heat source and concentration in the presence of suction or injection. Later Kandasamy
[9] presented thermophoresis and variable viscosity effects on MHD mixed convective
heat and mass transfer past a porous wedge in the presence of chemical reaction. Cortell
[10] analyzed MHD flow and mass transfer of an electrically conducting fluid of second
grade in a porous medium over a stretching sheet with chemically reactive species. Shaw
et al. [11] studied the homogeneous-heterogeneous reaction in micropolar fluid flow from
a permeable stretching or shrinking sheet in a porous medium. The objective of this paper
is to study the effects of micropolar fluid over a non-linear by stretching sheet on two-
dimensional steady mixed convection flow past a semi-infinite permeable inclined flat
plate in the presence of heat generation, Soret-Dufour effects and a chemical reaction.
The primary aim of this study is to investigate and shade light on the mass deposition
variation on the surface due to thermophoresis. Such a study, which is important in non-
Newtonian materals processing. The transformed dimensionless governing equations are
solved numerically using the fifth-order Runge-Kutta-Fehlberg method with a shooting
technique. The physical significance of interesting parameter on the flow and the thermal
field are shown through graphs and discussed in details.
Mathematical Formulations
Consider the steady two-dimensional incompressible flow of a micropolar fluid over a
non-linear stretching surface past a semi-infinite permeable inclined flat plate with an
acute angle to the vertical with the X-axis measured along the plate. The geometry
of the problem is shown in Fig. 1. The non-linear variation of the X- component of the
velocity is u w c x , c is a constant of proportionality and n is a power index. The
n
temperature of the surface is held uniform at T w which is higher than the ambient
www.bitm.org.in Volume: 6 No: I February 2017 2|P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
temperature T , Cw is the wall concentration of the solute and C is the concentration
of the solute far away from the sheet. The temperature difference between the body
surface and the surrounding micropolar fluid generates a buoyancy force, which results in
an upward convective flow. The effects of thermophoresis are taken into account in order
to understand the mass deposition variation on the surface. Under the above assumptions,
the boundary layer equations for a micropolar fluid are as follows:
u u (1)
0,
x y
u K * 2u K * N
u
u v 1 1 g T (T T ) g c (C C ) cos , (2)
x y y 2 y
2
N N
N * u
j u v
2
K1 2 N , (3)
x y y y
g T2 Q0 Dm KT 2C
T T
u v (T T ) , (4)
x y C p y 2 C p Cs C p y 2
2 Dm KT 2T
C C C
u
x
v
y
Dm
y
2 y T
V (C C )
Tm y 2
K1 (C C ), (5)
The above partial differential equations are subject to the following conditions:
n u 2n1
u u w cx , v 0, N m0 ,T Tw T C1x ,
y
2n1
C Cw C C2 x , at y 0, (6)
u 0, N 0, T T , C C , as y
In order to obtain a similarity solution of the problem, we introduce the following non-
dimensional variables:
n1 n1
c ( n 1) n c ( n 1) 2 T T
x 2 y , N cx x g ( ), ( ) ,
2 2 T w T
(7)
n1
C C n c ( n 1) 2 n 1
( ) , u cx f '( ), v x
f f '
Cw C 2 n 1
Through Eq. (7), the continuity Eq. (1) is identically satisfied. Now substituting Eq. (7) in
equations (2)-(5) we obtain a system of non-linear ordinary differential equations with
appropriate boundary conditions as follows:
(1 K )(1 n) 2 n 1 n 1
f ''' nf ' ff '' Kg ' (Grt Grc ) cos 0,
2 2 2
2 K 3n 1 2K
g '' f ' g fg ' (2 g f '') 0, (8)-
2 n 1 n 1
(11)
2(2n 1) 2
'' Pr f ' f ' Q D f '' 0,
n 1 n 1
2(2n 1) 2
'' Sc ( f ') ' f ' ( Sr ) '' R1 0
n 1 n 1
*
K1 g t (Tw T )
where, K is the vortex viscosity or the material parameter, Grt is
2 2n1
c x
g c (Cw C )
the local temperature Grashof number, Grc is the local concentration
2 2n1
c x
Grashof number,
C p Q0 x
Pr is the Prandtl number, Q is the local heat generation parameter,
g C p uw
K x Dm KT (Cw C )
R1 1 is the chemical reaction rate parameter, D is the
uw f Cs C p (Tw T )
*
K (Tw T )
Dufour number, sc is the Schmidt number, 1 is the
Dm Tref
Dm KT (Tw T )
thermophoretic parameter and Sr is the Soret number.
Tm (Cw C )
The Eqs. (8)-(11) constitute a highly non-linear coupled boundary value problem of third
and second order. Thus we have developed most effective numerical shooting technique
with fifth-order Runge-Kutta-Fehlberg integration algorithm. The results are presented
graphically in Figs. 2-12 and conclusions are drawn for flow field and other physical
quantities of interest that have significant effects. Comparisons of the present results with
previously published works are performed and excellent agreement has been obtained.
Comparison of our results of with those obtained by Abel and Mahesha [13] (see Table 1)
shows an excellent agreement in absence of Grashof number, Soret and Dufour. The
values of local Nusselt number are tabulated in Table 1 for different of Prandtl numbers.
It is noted that the values of the local Nusselt number increases with an increase in the
Prandtl number. Figs. 1-4 shows the effect of angle of inclination to the vertical direction
on the velocity profiles, temperature profile, concentration profile and micro-rotation
velocity profiles respectively. From this figure we observe that the velocity is decreased
by increasing the angle of inclination due to the fact that as the angle of inclination
increases the effect of the buoyancy force due to thermal diffusion decreases by a factor
of cos . Consequently, the driving force to the fluid decreases as a result there is
decrease in the velocity profile. Further, it is observed that the combined effects of
suction and the buoyancy force overshoots the main stream velocity significantly. From
Figs. 2-4 it is observed that both the temperature as well as concentration and micro-
rotation velocity profile in the boundary layer thickness increases as increasing the angle
0 0 0 0 0
of inclination 0 ,30 ,45 ,60 ,75 .
Table 1: Comparison of Local Nusselt number for various values of Pr with Abel and
Mahesha [13]
1.2
k = 0.2, Q = 0.5, m0= 0.5, Grt = 2.0
1.0 Grc=4.0, Pr = 0.7, Df = 0.6, Sr = 2.0, Sc=0.22
R1= 0.5, n = 2.0
0.8
f ' ( )
0.6
0.4
0.2
0.0
0 2 4 6 8 10
Fig1: Velocity profile for different values of 00 , 300 , 450 , 600 , 750 .
1.0
0.5
0.0
0 2 4 6 8 10
0 0 0 0 0
Fig2: Temperature profile for different values of 0 ,30 ,45 ,60 ,75 .
1.0
0.8
k = 0.2, Q = 0.5, m0= 0.5, Grt = 2.0
Grc=4.0, Pr = 0.7, Df = 0.6, Sr = 2.0, Sc=0.22
R1= 0.5, n = 2.0
0.6
0.4
0.2
0.0
0 2 4 6 8 10
0 0 0 0 0
Fig3: Concentration profile for different values of 0 ,30 ,45 ,60 ,75 .
0.4
k = 0.2, Q = 0.5, m0= 0.5, Grt = 2.0
Grc=4.0, Pr = 0.7, Df = 0.6, Sr = 2.0, Sc=0.22
R1= 0.5, n = 2.0
0.2
g ( )
0.0
-0.2
-0.4
0.0 0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0
0 0 0 0 0
Fig4: Micro-rotation Velocity profile for different values of 0 ,30 ,45 ,60 ,75 .
(i) The angular velocity decreases for increasing the power law index near the nonlinear
stretching sheet.
(ii) The microrotation velocity increasing for increasing the value of power index n.
References
Abstract
Introduction
Services branding with specific reference to tourism industry entails the experiential
quotient for brand building and therefore gives paramount importance to visitors
intention to choose and stay at a destination. Choice of a destination has been researched
as a process of evocation by the visitors (Tasei & Kozak, 2006). But mere inclusion of a
host of destinations in the evoked set of the visitors may not be enough, as individual
destinations are having unique differential features stimulating the choice decision (Qu et
al., 2011). Therefore the choice of destination is strongly grounded on the extent to which
they can be differentiated on the basis of destination attributes (Pawaskar & Goel, 2014).
Destination attributes contribute in the makeup of destination branding. Research in the
domain of destination branding have highlighted the concept of destination image as a
perception about a place visited as reflected by the associations preserved in the memory
of the visitor (Cai, 2002; Pike, 2009). While constructing propositions for destination
image researchers have often pondered on the possible associations between the visitors
and the destination visited. Based on the understanding that destination image is a
combination of cognitive and affective evaluations having strong inputs from sensory
perceptions (Hosany et al, 2007, Uysal et al., 2000), it is suggested that brand
associations should also include cognitive and affective image components (Pike, 2009).
These two components are accepted as influential indicators of destination image
(Hosany et al., 2007; Baloglu & Mangaloglu, 2001).
www.bitm.org.in Volume: 6 No: I February 2017 10 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
Destination branding, in general, has been identified as a set of marketing activities that
reinforces the differentiation between destinations based on attributes, conveys the
expectations of a memorable travel experience that is uniquely associated with the
destination, serves to consolidate the emotional attachment between the visitor and the
destination and reduces the perceived risk associated with the visit (Blain, 2005). With
markets overflowing with claims of superior brands it has become quite imperative to
penetrate the crowds and noise of brands. Marketers tried to move away from the
conventional form of mass marketing to more personalized relationship marketing setup
but, that too proved to be inadequate in the context of destination marketing. For years
the sensory perceptions of the consumers (sight, sound, smell, touch and taste) have
guided them towards selection and endorsement of brands, yet, they were largely
neglected as constructs in sensory image building by the researchers. Experience logic
defines the individual sensory perception of a consumer about a brand which, in essence,
is a cognitive projection of consumer- expectations from a brand. The experience logic
essentially is shaped up by the human brain in conjunction with the five senses (Hulten et
al., 2009). The most significant influencers as per Lindstrom & Kotler (2005) were found
to be vision and smell followed by hearing, taste and touch. Based on sensory
involvement in purchasing, marketers often used subliminal perception of consumers in
marketing products particularly in multi-branded retail outlets. Singapore Airlines, for
example, matches the aroma in the cabin with the interior colour scheme and the
uniforms worn by the flight attendants (sight) to create a unique sensory experience for
their customers (Joshua, 2008). Studies were also indicative of a significant relationship
between usage of stimulating aroma and increase in sales (Morrin & Chebat, 2005). The
tourism industry has also started using aroma in the waiting lounges, lobbies of hotels &
resorts, spas, wellness units and dining facilities as stimulant to favourable image
perception.
This study argues that sensory image of a destination needs to be considered as a
significant brand association to influence the image of a destination brand. Creating a
differentiated destination image has become a basis for sustainability of the competing
destinations in the global market place. Multisensory branding techniques can be used for
positioning destinations based on sensory images (Fan, 2006). Although sensory images
are understood to contribute a lot in branding, comprehensive research work towards
assimilating its effect in destination image building has remained inconclusive.
Literature review
The sensory influence on image component has not been explored empirically, although,
sensory perception of destination is apprehended to be quite critical in shaping the overall
destination image. The use of multi-sensory marketing strategies are emerging as a
paradigmatic shift from 2-dimensional marketing (use of sight & sound) to 5-dimensional
marketing (use of all five senses) to build up a comprehensive image of the destination.
Multi-sensory marketing creates an emotional make-up of the visitors by linking the
experiential output with the sensory organs which creates a memory-trap about the
destination (Pawaskar & Goel, 2014). Visual and olfactory senses were well used in the
www.bitm.org.in Volume: 6 No: I February 2017 12 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
retail industry to stimulate the subliminal perception of the consumers and assist them in
taking purchase decisions (Baksi, 2013). The visual existence of the destination often
play the numero-uno role in making lasting imprint on the sensory perception of the
visitors. Odours or aroma probe the human brain for impulse decision and often
differentiates between propositions (Russell & Pratt, 2008). Characterization of brands by
signature sound prevails in marketing (Hulten, 2009). Evocation of a sense of upscaling
or exclusivity has also been witnessed by using music and signature tune by the
marketers (Lindstrom, 2005). Destinations having profound indigenous ethno-cultural
backdrop can use the sound to lure visitors as witnessed in the tribe-infested destination
like Santiniketan in West Bengal. The sound of the Santhal (a tribe) drum and flute has
precipitated in the sub-conscious of the visitors to the extent that visitors on repeat
visitation exercise preferential sequence to expose themselves to the sound-of-
destination. The sensorial strategy of taste is probably one of the critical success factors
to destination branding. Gustative marketing or use of taste attempts to connect the
visitors with the local gastronomy and can contribute to create an image of a brand (Bertil
et al., 2009). Tactile marketing or use of touch has remained an elusive phenomenon in
the product-dominated industry, but, in tourism the human touch through service-
employees creates a sense of assurance and security for the visitors (Pawaskar & Goel,
2014). Rewatka (2009) observed that activation of five senses in visitors can facilitate
brand consciousness through emotional linkages. Qu et al. (2011), in one of their studies
introduced the concept of unique image, a construct that envisages the overall image of
the destination and was found to have an impact on visitors perception about destination
image. Uniqueness based on attributes and benefits differentiates between destinations
and can rather be used a positioning tool by the destination marketers. But sensory
images, at the micro level, can be a more potent contributor to destination image
building. Sensory assimilations of destinations attributes and activities contribute to
brand associations (Keller, 2008).
Therefore it is deduced that:
Literature supports the notion that image perception of a destination not only facilitates
destination choice but also triggers a host of behavioural pattern on part of the visitors
(Bigne et al., 2001). Two of most acknowledged post-visit behaviours of the visitors are
intention to revisit and word-of-mouth (WOM) advocacy. Previous studies have
confirmed that overall image is a pivotal factor to elicit the intention to revisit the
destination. (Alcaniz et al, 2005). WOM can reduce perceived risk associated with the
intangibility in services (Murray, 1991). WOM can influence visitors choice of
destination and therefore is a good indicator of favourable destination brand image
(Yvette & Turner, 2002; Weaver & Lawton, 2002; Oppermann, 2000). Bigne et al.
(2001) suggested visitors with positive destination image are likely to be involved in
positive WOM. Therefore it is understood that brand image shall act as a mediator in the
relationship between cognitive, affective and sensory inputs to destination image and
behavioural manifestations of the visitors. Therefore it is hypothesized that:
H4: Brand image perceived by visitors will mediate the relationships between destination
image inputs (cognitive, affective & sensory) and repeat visitation by visitors.
www.bitm.org.in Volume: 6 No: I February 2017 13 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
H5: Brand image perceived by visitors will mediate the relationships between destination
image inputs (cognitive, affective & sensory) and positive WOM by visitors.
Cognitive Repeat
image visitation
H H
1 4
H Destinatio
Affective
2 n Brand
image
image
H Positive
5 WOM
H
Sensory
3
image
Methodology
Data analysis
Exploratory factor analysis (EFA) was used to determine the underlying dimensions of
the cognitive and sensory image of the destination, Santiniketan. Confirmatory factor
analysis (CFA) and Structural Equation Modeling (SEM) were used to test the proposed
conceptual model of destination branding. IBM SPSS 21 and LISREL 8.8 were used to
process the data.
The Barletts test of sphericity gave significant result (2 = 2897.32, p = 0.00)
establishing a nonzero correlation. The sample adequacy (MSA) was found to be 0.916
which surpassed the adequate value of 0.50 (Hair et al., 1998) and hence the data was
found amenable to EFA. Principal component analysis with orthogonal rotation using the
VARIMAX process was deployed to assess the underlying dimensions of cognitive and
sensory images. Based on the eigen values (>1), scree-plot criteria and the percentage of
variance 4 dimensions were identified with estimated variance of 64.7%. Among the 22
items initially used to describe cognitive image 2 items namely variety of
accommodations and availability of sports facility scored low (<0.40) on
communalities and loading and hence discarded (Hair et al., 1998). The deletion of these
two items increased the total variance explained to 67.7%. The results of the principal
component analysis are displayed in Table-1.
Dimension-4: Activities F4
Covariance matrix was obtained for conducting the confirmatory factor analysis (Table-
4). LISREL (8.80) was used to estimate the measurement model and construct
covariances.
Table-4: Covariance matrix for CFA
X1 Experience
18.42
quality
X2 Attraction for
13.21 17.27
tourism
X3 Infrastructure
8.73 11.92 11.26
& facilities
X4
Activities 5.42 8.72 8.56 7.09
The measurement model was estimated for assessing overall model fit. The fit statistics
assured a good fit for the model (2 = 159.04, df = 92, p<0.05, GFI = .95, AGFI = .93,
TLI = .90). Indicator loadings for statistical significance were obtained. Estimation of
reliability and variance extracted were also done. The results of the loadings with t values
are shown in Table-5. As far as reliability of the image constructs are concerned,
cognitive image (0.89), sensory image (0.79) and affective image (0.71) surpassed the
threshold level of 0.70 (Qu et al, 2011). The measures support the convergent validity of
the items. For variance extraction, all the three constructs namely cognitive image (0.71),
sensory image (0.63) and affective image (0.61) met the cut-off value of 0.50.
Table-5: SEM results: Standardized parameter estimates for SEM model construct
loadings
The structural model was accepted based on the results of CFA as the goodness-of-fit
indices supported the cause (2 = 148.63, df = 78, p<0.05, GFI = .94, AGFI = .91, TLI =
.89, RMSEA = .04, RMSR = 0.069). All the paths in the structural model were
statistically significant. Cognitive image was found influential in determining the
destination brand image (standardized coefficient = 0.71, t = 4.72, sig. 0.01).
Hypothesis-1 (H1) was accepted. Hypothesis-2 (H2) was also accepted as affective image
was also found to have moderate impact in the creation of destination brand image
(standardized coefficient = 0.41, t = 2.08, sig. 0.05). Sensory image, the introductory
www.bitm.org.in Volume: 6 No: I February 2017 18 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
concept, was also found to have a positive impact on the brand image of the destination
(standardized coefficient = 0.63, t = 3.44, sig. 0.01) leading to acceptance of
hypothesis-3 (H3). Hypothesis-4 and 5 were tested for mediation between brand
association inputs and post-travel behaviour by destination brand image and were found
significant for repeat visitation (standardized coefficient = 0.64, t = 4.81, sig. 0.01) and
for positive WOM (standardized coefficient = 0.56, t = 3.97, sig. 0.01). Nested model
approach was adopted as the proposed model was compared with the competing model.
The first model (Model-1) postulates a full mediation role of the destination brand image
between all three types of brand associations and post-travel behaviours. The second
model (Model-2) is based on both direct and indirect effects through mediation of
destination brand image on repeat visitations and positive WOM.
2
1
1
2
3
3
1 2
2 1
0.41 X1 0.79
Cognitiv Y2 0.72
e image 0.6
0.29 X1 0.84
0.78 1
0.71
0.8 (4.72**) Repeat
0.31 X1 visitation
6
0.64 (4.81**)
0.27 X1 0.6 0.41 (2.08*)
9 Destinatio
Affectiv n brand
0.30 X1 0.69 image
e image
0.56 (3.97*)
0.25 X1 0.73
The models were tested for significant difference with 2 difference. The result produce
insignificant difference between the models ( 2=2.19, df=3). Therefore the
parsimonious Model-1 was retained.
The study postulated a conceptual model of destination branding and aimed to test it. The
destination brand image was conceptualised as a three construct build-up namely
cognitive image, affective image and sensory image. Sensory image as a brand
association concept has been introduced for the first time based on theoretical inputs. It
was proposed that the brand association inputs have an impact on destination brand
image which subsequently had antecedent effects on post-travel behaviours namely
repeat visitation and positive WOM. It was further proposed that destination brand image
mediates the relationship between brand associations and post-travel behaviours. The
results revealed that the brand association inputs had a strong and positive impact in
shaping up destination brand image. Destination brand image was also found to have a
significant impact on the post-travel behaviours. Lastly, destination brand image was
found to have mediating effect on the relationship between brand associations and post-
[1] Aaker, D. A. (1996). Building strong brands, New York: The Free Press.
[2] Alcaniz, E. B., Garcia, I. S., & Blas, S. S. (2005). Relationships among
residents image, evaluation of the stay and post-purchase behavior, Journal of
Vacation Marketing, 11(4), 291-302
[3] Baker, B. (2007). Destination branding for small cities: The essentials for
successful place branding. Portland: Creative Leap Books
[4] Baksi, A. K. (2013), Moderating effects of CRM on e-tail atmospherics-
shopping behaviour link: A case of modified Mehrabian-Russell model, SIT
Journal of Management (online), Siliguri Institute of Technology 3 (Spl.), 1-27.
[5] Baloglu, S., & Brinberg, D. (1997). Affective images of tourism destination,
Journal of Travel Research, 35(4), 11-15
[6] Baloglu, S., & Mangaloglu, M. (2001). Tourism destination images of Turkey,
Egypt, Greece, and Italy as perceived by US-based tour operators and travel
agents. Tourism Management, 22(1), 1-9.
[7] Baloglu, S., & McCleary, K. (1999). A model of destination image formation,
Annals of Tourism Research, 26(4), 868-897.
[8] Bign, J. E., Snchez, M. I., & Snchez, J. (2001). Tourism image, evaluation
variables and after purchase behavior: inter-relationship, Tourism Management,
22(6), 607-616.
[9] Blain, C., Levy, S. E., & Ritchie, J. R. B. (2005). Destination branding: insights
and practices from destination management organizations. Journal of Travel
Research, 43(4), 328e338.
[10] Burns, A. C., & Bush, R. F. (1995). Marketing research, New Jersey: Prentice
Hall.
[11] Cai, A. (2002). Cooperative branding for rural destinations. Annals of Tourism
Research, 29(3), 720-742.
[12] Fan, Y. (2005). Branding the Nation: What is being branded, Journal of
Vacation Marketing , 12 , 1, 5-14.
[13] Florek, M., Insch, A., & Gnoth, J. (2006). City council websites as a means of
place brand identity communication, Place Branding, 2(4), 276-296.
[14] Gartner, W. C. (1993). Image formation process, Journal of Travel and Tourism
Marketing, 2(2/3), 191-215.
[15] Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998). Multivariate
data analysis (5th ed.). New Jersey: Prentice Hall.
[16] Hosany, S., Ekinci, Y., & Uysal, M. (2007). Destination image and destination
personality. International Journal of Culture, Tourism and Hospitality Research,
1(1), 62-81.
[17] Bertil, H., Broweur, N. & Van Dijk, M. (2009). Sensory Marketing. New York:
Palgrave Macmillan.
[18] Joshua G Giordmaina, (2008). Multisensory Marketing and its Application in
Tourism. [online] Available at http://www.scribd.com/doc/9296907/Multi-
Sensory-Marketing-and-Its-Application-in-Tourism [Accessed 11/11/2016]
[19] Kapferer, J. (1997). Strategic brand management. Great Britain: Kogan Page.
[20] Keller, K. L. (2008). Strategic brand management: Building, measuring, and
managing brand equity (3rd ed.). New Jersey: Prentice Hall.
www.bitm.org.in Volume: 6 No: I February 2017 22 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
[21] Keller, K. L. (1998). Strategic brand management: Building, measuring, and
managing brand equity, New Jersey: Prentice Hall
[22] Konecnik, M., & Go, F. (2008). Tourism destination brand identity: the case of
Slovenia. Brand Management, 15(3), 177e189.
[23] Lindstrom, M. & Kotler, P. (2005). Brand sense build powerful brands through
touch, taste, smell, sight, and sound. New York: Free press
[24] Low, G. S., & Lamb, C. W. (2000). The measurement and dimensionality of
brand associations, Journal of Product & Brand Management, 9(6), 350-368.
[25] Morrin, M. and Chebat J-C. (2005), Person-Place Congruency: The Interactive
Effects of Shop.er Style and Atmospherics on Consumer Expenditures, Journal
of Service Research, 8(2), 181-191.
[26] Morrison, A., & Anderson, D. (2002). Destination branding. Available from:
http:// www.macvb.org/intranet/presentation/DestinationBrandingLOzarks6-10-
02. ppt accessed on 11.11.16.
[27] Murray, K. B. (1991). A test of services marketing theory: consumer
information acquisition Activities, Journal of Marketing, 55(1), 10-25.
[28] Nandan, S. (2005). An exploration of the brand identity-brand image linkage: a
communications perspective, Brand Management, 12(4), 264-278.
[29] Oppermann, M. (2000). Tourism destination loyalty, Journal of Travel Research,
39 (1), 78-84
[30] Pawaskar, P. & Goel, M. (2014), A conceptual model: Multisensory marketing
and destination branding, Symbiosis Institute of Management Studies Annual
Research Conference (SIMSARC13), Procedia Economics and Finance, 11,
255-267.
[31] Pike, S. (2009). Destination brand positions of a competitive set of near-home
destinations. Tourism Management, 30(6), 857e866.
[32] Qu, H, Kim, L. H. & Im, H. H. (2011). A model of destination branding:
Integrating the concepts of the branding and destination image, Tourism
Management, 32, 465-476.
[33] Rewatkar, S. (2014). Factors Influencing Consumer Buying Behavior: A Review
(with reference to Online Shopping), International Journal of Science and
Research, 3(5), 1346-1349
[34] Russell, J. A. & Pratt, G. (1980). A Description of the Affective Quality
Attributed to Environments, Journal of Personality and Social Psychology, 38
(2), 311-22.
[35] Russel, J. A., Ward, L. M., & Pratt, G. (1981). Affective quality attributed to
environments: a factor analytic study, Environment and Behavior, 13(3), 259-
288.
[36] Ryan, C., & Gu, H. (2008). Destination branding and marketing: the role of
marketing organizations. In H. Oh (Ed.), Handbook of hospitality marketing
management (pp. 383-411). Oxford: Butterworth-Heinemann.
[37] Stern, E., & Krakover, S. (1993). The formation of composite urban image.
Geographical Analysis, 25(2), 130-146.
[38] Tasei, A. D. A., & Kozak, M. (2006). Destination brands vs destination images:
do we know what we mean? Journal of Vacation Marketing, 12(4), 299-317.
[39] Uysal, M., Chen, J., & Williams, D. (2000). Increasing state market share
through a regional positioning. Tourism Management, 21(1), 89-96.
www.bitm.org.in Volume: 6 No: I February 2017 23 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
[40] Weaver, D. B., & Lawton, L. J. (2002). Overnight ecotourist market
segmentation in the gold coast hinterland of Australia. Journal of Travel
Research, 40(3), 270-280.
[41] Woodside, A. G., & Lysonski, S. (1989). A general model of travel destination
choice, Journal of Travel Research, 27(4), 8-14.
[42] Yvette, R., & Turner, L. W. (2002). Cultural differences between Asian markets
and Australian hosts, part I. Journal of Travel Research, 40(3), 295-315
Abstract
This research paper, based on secondary observation moves around developing an
understanding of the concept of Corporate Social Responsibility and finding out its scope
in India taking the case studies of Infosys, Aditya Birla Nuvo Group, Bandhan and
Piramal. While most of the companies routed their CSR spends in the area of their
business operation, this research can be helpful for the development of the overall
economy of the country as encouragement of investment in CSR activities in the rural
unorganized sector would ultimately lead to an equitable development thereby reducing
the disparity of wealth distribution among the various strata of the society, leading to
inclusive development.
Keywords: CSR, Rural Development, Inclusive Growth
INTRODUCTION
As Indian corporates are constantly striving to be more efficient in the competitive global
business scenario, they need to become equally proactive, accountable and socially
receptive to their immediate environments. The concept of creating a shared value has
very much entered into the discussion in the Indian Corporate scenario. CSR policies help
companies win new business; increase customer retention; improve relationships with
customers and suppliers: attract, motivate, and retain a satisfied work force; save money
on operating and energy costs; manage risk; differentiate itself from competitors; provide
access to investment and funding opportunities; and generate positive publicity and
media opportunities; and generate positive publicity and media opportunities. Dispersing
a percentage of the accruing benefits to the millions of people who are in need of food,
healthcare, education and growth is only a part of Corporate Social Responsibility
(CSR).As far as India is concerned, in spite of a lot of developmental endeavor and
optimistic projections, growth and development of the country has really not been very
inclusive. To cater to an inclusive growth of the country, it has been found out that
government reforms have to be complemented with private sector through their corporate
social responsibility activities and hence, corporates have to play a proactive part to
achieve this inclusive growth by ensuring the prosperity of the poorer section of the
population (Carroll, 2015).
The work on several CSR initiatives has gained momentum during the year, resulting in a
spend of Rs. 9.61 crores (the same being 2.04% of the average net profits of the last 3
years as defined for the purposes of CSR). Highest spending was in the sector of Health
which is Rs. 518.16 lakhs, then Education, which is Rs. 102.63 lakhs, in the sector of
Environment, it was Rs. 75.78 lakhs, in the sector of rural development it was Rs. 25.64
lakhs, in the sector of Social Empowerment it was Rs. 30.15 lakhs.
The amount spend for CSR activities of Aditya Birla Nuvo Ltd. though is much less than
Infosys but its activities clearly depicts an effort to create inclusive development
www.bitm.org.in Volume: 6 No: I February 2017 27 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
concentrating mainly on health- which still remains a major area of lacunae in our
country. From the above data we also see that Aditya Birla Nuvo Ltd. concentrates on
creating a lot of awareness at the grass-root level and create an environment of social
empowerment and sustainability among the rural people of the country. Though from the
Annual Report we do not get the names of the collaborative partners of the company for
their CSR activities but their activity clearly implies that they have made the concept of
Private Public Partnership (PPP) a success in our country.
Aditya Birla Nuvo Ltd. in comparison to Infosys caters to much more states in India with
its social activities covering North, West and South and parts of the East. But North East
region of the country still remains an ignored area for their social activities too. Artistry
as an occupation which comprises as the second largest occupational sector after the
agriculturists, also require some attention in the CSR activities of the company.
C) a) CORPORATE CASE STUDY-III: BANDHAN GROUP
The focus of the Bandhans CSR activities is healthcare, education, livelihood
development, food security and physical living conditions. New areas are planned to be
added as and when required with the approval of the CSR Committee of the Board. The
services provided under the programmes, could be free or subsidized as per the
requirements of the beneficiaries, and the nature of the program. Different projects are
Bandhan Education Programme (BEP), Bandhan Health Programme (BHP)- , Targeting
the hardcore poor (THP), Employing the Unemployed Programme (EUP), Market
Linkage Programme (MLP), Renewable Energy Programme (REP)
b) Graph 3 Comparison with respect of number of states covered by various
Bandhan Programmes in the year 2012 and 2016
8
7
6
5
4
2012
3
2016
2
1
0 2016
THP 2012
BHP
BEP
EUP
From the above literature, facts and figures of Bandhan we can clearly make out that
Bandhans CSR activities have spreaded in wings in wide number of geographical areas
and cover a large number of beneficiaries at present than before. One of the major
www.bitm.org.in Volume: 6 No: I February 2017 28 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
programmes of Bandhan- Targetting the Hardcore Poor (THP) which covered 4 states in
2012, now covers 8 states in 2016 and has increased the no of beneficiaries from 8706 to
41,589. In August 2011, with an additional impetus by Axis Bank Foundation, the
programme became all the more intensified in the villages of Murshidabad and South 24
Parganas- the two districts of West Bengal. This particular programme has helped
Bandhan to increase their commercial venture too by identifying all the more people as
borrowers of their microfinance and targeting the people who are interested in various
savings and banking policies of their banks too. As huge population of this poor segment
includes artisans of various indigenous art and crafts, this programme has also helped
Bandhan Creations to identify various artisans, link them to the market linkage
programme, provide them the platform to supply products for their retail store, provide
technical training, transform designs and provide financial impetus thereby creating a
trickledown effect of creation of livelihood which is nevertheless a very crucial part of
inclusive development.
From the above literature we can establish the fact that Piramal thoroughly believes in
holistic development creating a sustainable society. It concentrates on health, hygiene and
education, all the three creating a trickledown effect all around. Through their Principal
Leadership programme Piramal believes in empowering millions through the eyes of few.
They believe that one Principal can change an entire school full of hundreds thereby
creating an atmosphere of motivation and reduce drop outs creating more literacy around.
For the youth involved in the programme, the fellowship has re-changed and re-shaped
their lives creating a transformation of their lives in totality thereby creating a
transformation of the society. There are direct stakeholders and subsidiary stakeholders
benefitting from the project as well.
LIMITATIONS
References:
[1] Aguilera R. V., Rupp D. E., Williams C. A., Ganapathi J. (2007), Putting The
S back in Corporate Social Responsibility: A Multilevel theory of Social Change
in Organisations, Academic of Management Review Vol.32 No. 3, pp 836-863
Abstract
Reflectivity spectrum of fiber Bragg grating (FBG) based sensor is analytically
calculated for optical communication at 1550 nm. Effect of grating length, induced
refractive index perturbation and number of grating periods are considered for
computation purpose; and spectrum is optimized by reducing the number of side lobes.
Coupled mode theory (CMT) is considered for analysis; and fiber parameters for
single mode propagation are incorporated for design purpose centered at 1550 nm
operating wavelength. FWHM is calculated as figure of merit of the proposed
sensor, and its variation with the number of grating layers is computed. Result
reveals that with proper choice of design parameters, the structure can be utilized
photonic sensor in all-optical circuit.
Keyword: Reflectivity; Bragg sensor, 1550 nm; FWHM; Coupled mode theory
Introduction
The Fiber Bragg grating is a one-dimensional optical structure with periodic variation of
refractive indices along the direction of electromagnetic wave propagation [1]. Its
narrow bandwidth reflectance property is utilized in making sensing device [2], after
successful experimental demonstration of permanent grating inside optical fiber [3].
The Bragg grating inside the fiber core produces Distributed Bragg Reflector [DBR]
which reflects the Bragg wavelength along with generation of minor side lobes in
the otherwise transmission zone [4]. This sensor has already replaced conventional
electronic sensor due to inherent immunity from electromagnetic interference,
multiplexing ability, better sustainability from environment [5], structural health
monitoring [6], communication [7], chemical sensing [8]. It is widely used in
communication applications now-a- days due to the properties of dispersion
compensation [9], EDFA gain stabilization, optical CDMA in high frequency
spectrum [10]. Proper suppression of side lobes by apodization technique makes it an
efficient candidate for WDMA [11], reduced cross-talk. It is already proposed for band-
notch filter applications [12].
The historical beginnings of photosensitivity and fiber Bragg grating (FBG) technology
are recounted [13]. Wider bandwidth is needed to reorganize the fiber Bragg grating,
which can be achieved by using a short grating length in design of fiber Bragg
grating [14-15]. Use of Fabry-Perot filter for observing the wavelength deviation of a
www.bitm.org.in Volume: 6 No: I February 2017 34 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
fiber Bragg grating sensor elements along a common fiber path is described by
researchers [16]. Researchers also analyzed the temperature and strain sensing
principle of FBG based sensor [17]. This variation occurs due to thermo-optic and
elasto-optic effects. In this paper, effect of induced refractive index modulation and
length of grating structure are investigated on the reflectance property of the FBG
structure where only single-mode property is considered. FWHM is calculated by
varying the number of grating periods. Results suggest that constant FWHM may be
optimized for large grating periods along with the tuning o f reflectivity bandwidth
for different application requirements.
Mathematical Modeling
For electromagnetic wave propagation inside Brag grating structure, reflectivity is given
by
sinh L
R
sinh L j cosh L (1)
where we assume the forward and backward waves are coupled inside the structure
(following coupled mode theory), is the difference of propagation constants, is the
coupling coefficient, L is the grating length, and
2 2
(2)
Coupling coefficient is defined by
(3)
where is overlap integral between the forward and reverse propagating guided modes
calculated over the fiber core of Bragg grating. It is defined as
=nF (4)
F is fractional modal power in fiber core given by
1
F=[1- ]
V2 (5)
www.bitm.org.in Volume: 6 No: I February 2017 35 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
where V is normalized frequency and n is amplitude of induced refractive index
perturbation. V is defined as
2
V= a n12 n2 2
(6)
where a is the core radius and n1 and n2 are core and cladding indices respectively. is
defined as
1 1
2 neff
B (7)
where neff is the effective refractive index of the fiber core at the free space centre
wavelength.
Results and Discussion
Fig 2 shows the reflectivity profile as a function of operating wavelength for different
grating lengths. From the plot it is observed that major lobe is centred on at 1550 nm.
Result is potted for three different lengths 40m, 50m, and 60m. From the graph, it can
be evaluated that respective maximum reflectivity are 91.2%, 97.8%, 99.98%. Thus higher
grating length provides higher reflectivity which speaks in favour of band-notch
application. But this is associated with increase in side-lobe. This restricts its operation for
electromagnetic wave sensor.
Fig 2: Spectral profiles for uniform fiber Bragg gratings with different grating lengths
Fig 3a: Spectral profiles for uniform fiber Bragg gratings with amplitude of induced
refractive index perturbation at 40 m grating length
Fig 3 exhibits reflectivity profile for different grating lengths individually by varying the
amplitude of induced refractive index perturbation. From Fig 3a, it is observed that higher
the perturbation, better the reflectivity. At grating length of L=40m amplitude of induced
refractive index is varied from n = 10-2 , 210-2, 310-2, the maximal reflectivity is
40.2%, 85%, 99.91%. Corresponding bandwidth is also increased.
Fig 3b: Spectral profiles for uniform fiber Bragg gratings with amplitude of induced
refractive index perturbation at 50 m grating length
Results are also plotted for 50 m and 60 m grating lengths respectively, which are
shown in Fig 3b and Fig 3c. The maximum reflectivities are obtained for these cases are
70%, 97%, 100% and 83%, 98%, 100% respectively. Hence a comparative analysis
suggests that for a specified magnitude of induced refractive index perturbation, higher
www.bitm.org.in Volume: 6 No: I February 2017 37 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
grating length provides higher reflectivity. But again for a given grating length, higher
magnitude of r.i perturbation leads to higher sidelobe magnitude. Hence optimization is
required.
Fig 3c: Spectral profiles for uniform fiber Bragg gratings with amplitude of induced
refractive index perturbation at 60 m grating length
Fig 4a: Spectral profiles for uniform fiber Bragg gratings with different number of
grating periods at 40 m grating length
Fig 4 shows the reflectivity profile for different number of grating periods. In Fig 4a, it is seen that
at grating length of 40m, no of grating is varied from N = 50, 100, 200; corresponding maximum
reflectivities are 46%, 87%, 98 %. Similar variations are observed in Fig 4b and Fig 4c.
Fig 4b: Spectral profiles for uniform fiber Bragg gratings with different number of
grating periods at 50 m grating length
Hence it may be stated that with increase of period, better noise rejection is achieved. But
again this enhances the magnitude of sidelobes, which limits its application. Thus a trade-
off is made. For L=50 m, maximal reflectivities are 58.6%, 92.3%, 99.98%; whereas for
60 m grating length, maximal reflectivities are 70.63%, 98.91%, 100%. These are
computed from Fig 4b and Fig 4c respectively.
Fig 4c: Spectral profiles for uniform fiber Bragg gratings with different number of
grating periods at 60 m grating length
Conclusion
Optical sensor using fiber Bragg grating structure is presented at 1550 nm. From the
analysis, it may be concluded that higher reflectivity is desired for better noise rejection,
which can be achieved with large grating length. But this advantage is coupled with
generation of larger sidelobes, which suggests excess power loss. Again, increase of
magnitude of induced refractive index perturbation enhances the noise rejection property
with the disadvantage of more sidelobes and also of greater magnitude. Increase in grating
period also enhances the reflectivity at center wavelength as well as FWHM. But this is
also associated with similar disadvantage. Hence optimization is required considering the
need of application.
References
[1] Ghatak, K. Thyagarajan, Introduction to Fiber Optics, Cambridge University
Press, 1999
[2] Kersey. A. D., Berkoff. T. A., Morey. W. W., Multiplexed Fiber Bragg Grating
Strain-Sensor System with a Fiber Fabry-Perot Wavelength Filter, Optics
Letters, 18, 1370-1372 (1993)
[3] Hill. K. O., Meltz. G., Fiber Bragg Grating Technology Fundamentals and
Overview, Journal of Lightwave Technology, 15(8), 1263-1276, 1997
[4] Ugale. S., Mishra. V., Fiber Bragg Grating Modeling Characterization and
optimization with different index profiles, International Journal of Engineering
Science and Technology vol.2 (9), 4463-4468, 2010
Abstract
Noise results in faulty information after processing the signals reducing their usability.
Daubechies wavelet was used to filter out the noise from a discretely sampled signal
by implementing a low pass filter in this work. H e r e Discrete wavelet transform has
been applied on the input vector, threshold it then inverse transformed it to finally
achieve a signal with very low noise. The main aim for this research work was to
develop wavelet based filters for ECG signal filtering and feature extraction with
better results as compared to FIR filters. To reduce the cost of the equipments where
such filter is being used as a component, the other primary aim.
Introduction
Some noise in signals associated with them, we find rare signals in real-life situations,
free from noise and can be directly employed for extracting information. Noise can
result in an output which may not be intended or not the characteristic of the quantity
being observed, giving rise to faults in the system of which the signal is a
component. It can also cause judgmental errors if the signal is being directly observed
and the impact can range from being minute in some cases to destructive in certain
critical systems like ECG machines.
For this, it is important that signals should comprise of components which are
relevant to the system and be free from unwanted, random values so that the errors
caused due to faulty representation of the original signal can be minimized. Many
times the noise found in the signals is of higher frequency as compared to the signal
produced by the quantity being measured or represented. It is, therefore, of utmost
importance that the noise from the signal is removed to the optimal extent.
The problem of noise in signals is not new as above explanation. Various solutions
have been proposed and are being employed in a number of systems. The solutions
range from hardware implemented active filters to Finite impulse response (FIR) filters.
The problem with most of the current filters in place is that they do not give sufficiently
good output results or alter the original signal itself, for e.g. the FIR filters effect the
signal because of the sinc function. Although such effects can be removed by the
application of appropriate processes, the involved overhead results in increase in the
cost of the system.
Also, in some cases, the desired output levels are still not observed.
Review of literature
Wavelets are mathematical functions with oscillatory nature similar to
sinusoidal waves with the difference being that they are of finite oscillatory
nature[1]. Essentially a finite length, decaying waveform, when scaled and
translated results in what is called a daughter wavelet of the original mother
wavelet. Hence different scaling and translation variables result in a different
daughter wavelet from a single mother wavelet.
Continuous wavelet transforms (CWT) and discrete wavelet transforms (DWT) are
the classification of Wavelet transforms [9]. The finite oscillatory nature of the
wavelets m a k e s t h e m e x t r e m e l y u s e f u l i n r e a l l i f e situations in
which signals are not stationary. While Fourier transform of a signal only offers
frequency resolution, wavelet transforms offer variable time- frequency resolution
which is the hallmark of wavelet transforms.
Decomposing by Wavelet transform, a signal into basis functions which are known
as wavelets [7]. Wavelet transform is calculated separately for different segments of
the time-domain signal at different frequencies resulting in Multi-resolution analysis. It
is designed in such a way that the product of time resolution and frequency resolution is
constant. Therefore it gives good time resolution and poor frequency resolution at high
frequencies whereas good frequency resolution and poor time resolution at low
frequencies. This feature of MRA makes it excellent for signals having high frequency
components for short durations and low frequency components for long duration .e.g.
noise in signals, images , video frames etc.
A. Discrete Wavelet Transform (DWT)
A wavelet transform in which the wavelets are discretely sampled are known as
discrete wavelet transform. The DWT gives a multi-resolution description of a signal
which is very useful in analyzing "real-world" signals [6]. Essentially, a discrete multi-
resolution description of a continuous-time signal is obtained by a DWT. It converts a
series a0, a1, a2. am into one low pass coefficient series known as approximation
and one high pass coefficient series known as detail. Length of each series is m/2.In
Figure 1. Signals sine wave with noise, after applying the wavelet transform to
the signal: a6 is the approximation at 6th level, d1- d6 are the detail coefficients
at respective levels which are set to 0in the threshold step.
[4] http://www.amara.com/current/wavelet.html
[5] Brani Vidakovic, Peter Mueller, Wavelets for Kids, A tutorial introduction
by Duke University.
[8] S.G. Mallat, A Wavelet Tour of Signal Processing Second Edition (Academic
Press, New York, 1999).
[9] http://www.bearcave.com/misl/misl_tech/wavelets/index.html350.
ABSTRACT
The social responsibilities are almost equally applicable to both private and public
enterprises, though there is some basic difference between the two. The basic difference
centres round profit motive so far as the social responsibilities are concerned. In this
respect, absence of profit motive differentiates the public sector from the private sector.
It is true that public enterprises can produce and distribute goods and services at cost
price or below price for public welfare, but that will, no doubt, amount to relief work and
increase public taxation. So in order to diminish the burden of taxation and to avoid
inefficient ant uneconomic working, the public enterprises should also be self-supporting
and reasonably profitable. Even the Soviet economists recommend profitability as the
standard to measure efficiency of a public enterprise. The extension of State-ownership
should not invite a crisis of confidence. Public sector is needed to supplement the private
sector which is generally shy in basic industries, heavy investments and in industries
demanding long gestation period. It is also required to improve abuses and malpractices
of private sector. So both of them should act as the two complementary wings of the
national economy and they should not forget their organic links. Every sector should play
its respective role to strengthen the national economy by showing a splendid sense of
urgency and high organisational ability with full use of the talent and resources of the
country.
Key Words: CSR,MNC,PSU,PAT,Stakeholders,Social Audit,PPP Model.
INTRODUCTION
The term 'social responsibility' has three different meanings, viz., social obligation, social
reaction and social responsiveness.According to Milton Friedman and his followers, a
corporation engages in social responsible behaviour when it pursues a profit within the
constraints of law as imposed by society. Since society permits business to exist, business
is obliged to repay society for that right by taking profits. This means that legal behaviour
in pursuit of profit is socially responsible behaviour, and any behaviour not legal or not in
pursuit of profit is socially irresponsible. As Friedman stated: "There is one and only one
social responsibility of business to use its resources and engage in activities designed
to increase its profits so long as it stays within the rules of the game, that is to say,
engages in open and free competition without deception or fraud".
The three general meanings of social responsibility can be depicted as a continuum. The
continuum formed by the three classes of socially responsible behaviour ranges from an
emphasis on profit making to an emphasis on social and economic concerns.
From the above table shows that at one extreme is social obligation business
behaviour that reflects the firm's economic and legal responsibilities. Social reaction
occupies the middle position behaviour that is demanded by groups having a direct
www.bitm.org.in Volume: 6 No: I February 2017 49 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
stake in the organisation's actions. The farthest extreme, social responsiveness is
anticipatory, proactive and preventive behaviour.
In the real world, a corporation can choose to be anywhere along the continuum. To be
socially reactive implies the firm's acceptance of social obligation as well. In a like
manner, to be socially responsive requires both social obligation and social reaction. In
short, the three meanings refer to different degrees of departure from the normal activities
and performance of profit-seeking business firms. Few terms have been defined in as
many different ways as social responsibility. Some of the more popular meaning include
"profit making only," "going beyond profit making", "voluntary activities," "concern for
the broader social system," and "social responsiveness." Most of the debate has focused
at the extremes. On one side, there is the classicalor purely economicview that
management's only social responsibility is to maximise profits. On the other side stands
the socio-economic position, which holds that management's responsibility goes well
beyond making profits to include protecting and improving society's welfare.
The classical view holds that management's only responsibility in running a business is to
maximise profits. This narrow "shareholder" model is supported by Milton Friedman, a
Nobel prize winner economist, who argues: "Few trends could so thoroughly undermine
the very foundations of our free society as the acceptance by corporate official of social
responsibility other than to make as much money for their stockholders as possible",
Among the arguments of this viewpoint against corporate social responsibility are:
The socio-economic view holds that any organisation must be concerned for the broader
social welfareand not just for corporate profits. Among the arguments for social
responsibility are :
There are four phases of CSR Development in West Bengal which are follows
(a) The First Phase
(b) The Second Phase
(c) The Third Phase
(d) The Fourth Phase
The history of CSR in West Bengal has its four phases which run parallel to India's
historical development and has resulted in different approaches towards CSR. However
the phases are not static and the features of each phase may overlap other phases.
The issue of corporate social responsibility drew little attention before the 1960s. But
managers are now regularly confronted with decisions that have a dimension of social
responsibilityphilanthropy, pricing, employee relations, resource conservation and
product quality.
It depicts how this environment takes meaning for a business firm as a network of other
organisations and institutions with which it must interact. In this context. Corporate social
responsibility is defined as an obligation of the organisation to act in ways that serve both
its own interests and the interests of its many external publics. These publics are
considered shareholders, the persons and groups who are affected is one way or another
by the behaviour of an organisation. They are people affected by the organisation's
performance and who may be affected in one way or another by its commitment to
social responsibility.
1. Public expectation: Social expectations of business have increased much since the
1960s. Public opinion in support of business pursuing social as well as economic goals is
now very strong.
2. Long-run profits: Socially responsible businesses tend to have more secure long-run
profits. This is the normal result of the better community relations and improved business
image that responsible behaviour brings.
3. Ethical obligation: A business firm can and should have a conscience. Business should
be socially responsible because responsible actions are right for their long-term survival.
5. Better environment: Involvement by business can solve difficult social problems, thus
creating a better quality of life and a more desirable community in which to attract and
hold skilled employees.
7. Balance of responsibility and power: Business has a large amount of power in society.
An equally large amount of responsibility is required to balance it. When power is
significantly greater than responsibility, the imbalance encourages irresponsible
behaviour that works against public (social) welfare.
8. Shareholder interests: Social responsibility will improve the price of a busincss's slocks
of shares in the long run. The stock market will view the socially responsible company as
less risky and open to public attack. Therefore, it will give its shares a higher price-
earning ratio.
9. Possession of resources: Business has the financial resources, technical experts, and
managerial talent to provide support to public and charitable projects that need assistance.
10. Superiority of prevention over cures: Social problems must be dealt with and if
necessary solved at some time. Business should act on them before they become more
serious and costly to correct and take management's energy away from achieving its goal
of producing goods and services.
The activities through which corporations meet their social responsibilities range from
producing safe, reliable, quality products to supporting the arts; from providing safe and
healthful working conditions to assisting minority enterprises. Each of these activities
benefits some group, often to the disadvantage of some other group. Managers must
make choices among various interests both inside and outside the corporation.
The beneficiaries of corporate action are either internal or external. Internal beneficiaries
include customers, owners, and employees. External beneficiaries include groups
representing minorities, women, the disabled, and the aged. The contemporary demands
placed on corporations are the result of an evolutionary process. In earlier times, when
corporations were relatively insignificant, society expected them to meet their social
obligations. As corporations became larger and more pervasive, society's expectations
shifted towards social reaction and responsive corporate behavior.
The socio-economic view holds that any organisation must be concerned for the broader
social welfareand not just for corporate profits. Among the arguments for social
responsibility are:
As per the list, the criteria progress toward ever-greater demonstrations of socially
responsible activities. As organisation is meeting its economic responsibility when it
earns a profit through the provision of goods and services desired by customers. This is
consistent with the classical view of social responsibility presented earlier. Legal
responsibility is fulfilled when an organisation operates within the law and according to
the requirements of various external regulations. This means that the organisation meets
minimum expectations of society's governing legal framework. Ideally economic
www.bitm.org.in Volume: 6 No: I February 2017 56 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
responsibilities are met in a legally responsible manner. An organisation meets its ethical
responsibility when its actions voluntarily conform not only to legal expectations, but
also to the broader values and moral expectations of society.
The Companies Bill, 2012 incorporates a provision of CSR under Clause 135 which
States that every company having net worth Rs. 500 crore or more, or a turnover of
Rs.1000 crore or more or a net profit of rupees five crore or more during any financial
year, shall constitute a CSR Committee of the Board consisting of three or more
Directors, including at least one Independent Director, to recommend activities for
discharging corporate social responsibilities in such a manner that the company would
spend at least 2 per cent of its average net profits of the previous three years on specified
CSR activities. It is proposed to have detailed rules after passing of Companies Bill 2012
by Rajya Sabha to give effect to this provision.
According to Schedule VII of Companies Bill, 2012 the following activities can be
included by companies in their CSR Policies:-
(i) Eradicating extreme hunger and poverty;
(ii) Promotion of education;
(iii) Promoting gender equality and empowering women;
(iv) Reducing child mortality and improving maternal health;
(v) Combating human immunodeficiency virus, acquired immune deficiency syndrome,
malaria
and other diseases;
(vi) Ensuring environmental sustainability;
(vii) Employment enhancing vocational skills;
www.bitm.org.in Volume: 6 No: I February 2017 57 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
(viii) Social business projects;
(ix) Contribution to the Prime Ministers National Relief Fund or any other fund set by
the Central
Government or the State Governments for socio-economic development and relief
and funds
for the welfare of the Scheduled Caste, the Scheduled Tribes, other backward classes,
minorities and women; and
(x) Such other matters as may be prescribed.
The Companies Bill, 2012, Clause 135 also provides for constitution of a CSR
Committee of the Board. The CSR Committee is required to;
(a) Formulate and recommend to the Board, a CSR Policy which shall indicate the
activities to be undertaken by the company as specified in Schedule VII;
(b) Recommend the amount of expenditure to be incurred on the activities referred to in
clause (a); and
(c) Monitor the Corporate Social Responsibility Policy of the company from time to time.
(d) The format for disclosure of CSR policy and the activities therein as part of Boards
report will be prescribed in the rules once the Bill is enacted.
The principles of corporate social responsibility (CSR) and good corporate citizenship are
key for success of any corporate sector. The four key areas should be the motto of any
business enterprise i.e. Client and marketplace, workplace, environment and community.
CRITICISM
1. Violation of profit maximization: This is the essence of the classical viewpoint.
Business is most socially responsible when it attends strictly to its economic interests and
leaves other activities to other institutions.
2. Loss of purpose: The pursuit of social goals leads to loss of business's basic purpose
economic productivity. Society may suffer as both economic and social goals are poorly
accomplished.
3. Costs: Many socially responsible activities dont pay their own way. Someone has to
pay these costs. Business normally passes them on to consumers in the form of higher
prices,
4. Too much power: Business is already one of the most powerful institutions in our
society. If it pursues social goals, it would have even more power. Society has given
business much power.
5. Lock of skills: The outlook and abilities of business leaders are oriented primarily
toward profits and gains. Business people are not competent enough to deal with social
issues and solve social problems.
6. Lack of accountability: Political representatives pursue social goals and are held
accountable for their actions. Such is not the case with business leaders.
7. Lack of broad public support: These are not much support from society for business to
become involved in social issues.
CONCLUSIONS
From the above discussions it can be concluded that not only PSUs are performing social
responsibilities but also private sector plays an important role in performing CSR. The
Top 35 companies of India performed in the CSR in the financial year 2015 and spent
funds in the following areas:
*The datum are expressed all in Rs. in crores.
S.L COMPANY REVENUE AVG PAT ACTUAL 2% OF
SPEND PAT
1 INDIAN OIL CORPORATION 442,459 7,783 83 156
2 RELIANCE INDUSTRIES 368, 571 21,138 288 423
30000
20000
10000 AV PAT
0
ACTUAL SPEND
The spending money for CSR purposes have emerged like Education, Health care,
Sustainable livelihood, Infrastructure development, and espousing social causes etc. All
of community projects are carried out under the aegis of The Aditya Birla Centre for
Community Initiatives and Rural Development. In Education, ones endeavour is to spark
the desire for learning and knowledge at every stage through :-
Formal schools
Quality primary education
Girl child education
Adult education programmes
In Health care ones goal is to render quality health care facilities to people living in the
villages and elsewhere through our Hospitals:-
Primary health care centres
Mother and Child care projects
Immunisation progr ammes with a thrust on polio eradication
Health care for visually impaired, and physically challenged
Preventive health through awareness programmes.
In Sustainable Livelihood, programmes aim at providing livelihood in a locally
appropriate and environmentally sustainable manner through:-
Formation of Self Help
Groups for women empowerment
Agriculture development and better farmer focus Watershed development
Partnership with Industrial Training Institutes.
In Infrastructure Development for setting up essential services that form the foundation of
sustainable development through:-
Basic infrastructure facilities
Housing facilities
Safe drinking water
To bring about Social Change, one should advocate and support:
Dowryless marriage
Widow remarriage
Awareness programmes on anti social issues
De-addiction campaigns and programmes
25000
20000
15000
10000
5000
0 NET PROFIT
COAL
ASIAN
HDFC
LIC
TCS
RELIANCE
SBI
WIPRO
ICICI BANK
INFOSYS
AXIS BANK
BRITANIA
2% of PAT
Abstract
In this paper we studied a secure data hiding process, where the existence of the data will
not been perceive by others except the intended recipient. It also provides a level of
security beside the cryptography. The main objective of cryptography is to secure
communications by changing the data into a form so that it cannot be understand by an
eavesdropper. On the other hand, steganography techniques tend to hide the existence of
the message itself, which makes it difficult for an observer to figure out where exactly the
message is. The spatial domain techniques manipulate the cover-image pixel bit values to
embed the secret information. The secret bits are written directly to the cover image pixel
bytes. Consequently, the spatial domain techniques are simple and easy to implement.
The Least Significant Bit (LSB) steganography is one of the main techniques in spatial
domain, where images are used as a cover medium. In this literature survey we tried to
figure out the advantages and disadvantages of Least Significant Bit (LSB) method.
Key Word: LSB; data hiding; embedding; extraction; gray scale;
Introduction
Steganography is the art and science of writing hidden messages in such a way that no
one apart from the intended recipient knows the existence of the message [1]. Due to
growing need for security of data, image steganography is gaining popularity .The main
goal of steganography is to communicate securely in a completely undetectable manner
and to avoid drawing suspicion to the transmission of a hidden data .This idea of data
hiding is not a novelty, it has been used for centuries [2] all across the world under
different regimes but to date it is still unknown to most people. Historical tricks include
invisible inks, tiny pin punctures on selected characters, minute differences between
handwritten characters, pencil marks on type written characters, grilles which cover most
of the message except for a few characters, and so on [3].
Cryptography was created as a technique for securing the secrecy of communication
and many different methods have been developed to encrypt and decrypt data in order to
keep the message secret. Unfortunately it is sometimes not enough to keep the contents of
a message secret, it may also be necessary to keep the existence of the message secret.
The technique used to implement is called steganography. Steganography is a technique
used to hide information within images. Using stenography, watermarks and copyrights
can be placed on an image to protect the rights of its owner without altering the
appearance of the image. Almost like magic, images, executable programs, and text
www.bitm.org.in Volume: 6 No: I February 2017 64 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
messages can hide in images. The cover image does not appear to be altered. People look
at the cover image and never suspect something is hidden. Your information is hidden in
plain sight
Liturature Servey
The traditional Image steganography algorithm is Least Significant Bit [4]
embedding, the advantage of LSB is its simplicity to embed the bits of the message
directly into the LSB plane of cover-image and many applications use this method [5].
But it can be easily detected by the attackers as it embeds data sequentially in all pixels.
If a steganography method causes someone to suspect that there is secret information in
the carrier medium, then this method fails [6].
In a gray scale image each pixel is represented in 8 bits. The last bit in a pixel is
called as Least Significant bit as its value will affect the pixel value only by 1. So, this
property is used to hide the data in the image. Here we have considered last two bits as
LSB bits as they will affect the pixel value only by 3. This helps in storing extra data.
The Least Significant Bit (LSB) steganography is one such technique in which least
significant bit of the image is replaced with data bit. As this method is vulnerable to
steganalysis so as to make it more secure we encrypt the raw data before embedding it in
the image. Though the encryption process increases the time complexity, but at the same
time provides higher security also. This approach is very simple.In this method the least
significant bits of some or all of the bytes inside an image is replaced with a bits of the
secret message. The LSB embedding approach has become the basis of many techniques
that hide messages within multimedia carrier data. LSB embedding may even be applied
in particular data domains - for example, embedding a hidden message into the color
values of RGB bitmap data, or into the frequency coefficients of a JPEG image. LSB
embedding can also be applied to a variety of data formats and types. Therefore, LSB
embedding is one of the most important steganographic Techniques on use today.
In this algorithm data is hidden randomly i.e., data is hidden in some randomly
selected pixel. Random pixel is generated by using Fibonacci algorithm. The fatal
drawback of LSB embedding is the existence of detectable artifacts in the form of pairs
of values (PoVs). The proposed scheme breaks the regular pattern of (PoVs) in the
histogram domain, increasing the difficulty of steganalysis and thereby raising the level
of security. Two values whose binary representations differ only in the LSB are called a
pair of values (PoVs). For example, 68(01000100)2 and 69(01000101)2 are a PoVs. If
the numbers of 1s and 0s are equal and distributed randomly in the secret message that is
to be embedded steganographically, the frequency of two values in each PoVs will be
equal after message embedding. This regular equality pattern, called the PoVs artifact, is
an unusual characteristic in the histogram domain [7]. The sample value that will be
incremented or decremented depends on a series of predefined thresholds that are
generated by the user-specified stego-key. The new sample value not only depends on the
generated pseudorandom number but also depends on the original sample value. Using
the RLSB is therefore more secure than using traditional LSB embedding types.
www.bitm.org.in Volume: 6 No: I February 2017 65 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
The advantages of LSB are its simplicity to embed the bits of the message directly
into the LSB plane of cover-image and many techniques use these methods . Modulating
the LSB does not result in a human-perceptible difference because the amplitude of the
change is small. Therefore, to the human eye, the resulting stego-image will look
identical to the cover-image. This allows high perceptual transparency of LSB Efficient
Steganography using LSB and encryption technique
We noticed that in the approach discussed above, the time taken for generating the
random numbers depends on the size of the key. In our approach it means that it also
depends on the cover-image size.
Although the LSB embedding methods hide data in such a way that the humans do
not perceive it, such schemes can be easily destroyed by an opponent such as using lossy
compression algorithms or a filtering process.
Any process that modifies the values of some pixels, either directly or indirectly, may
result in degrading of the quality of the original object. A slight variation of this
technique allows for embedding the message in two or more of the least significant bits
per byte. This increases the hidden information capacity of the cover-object, but the
cover-object is degraded more, and therefore it is more detectable. Other variations on
this technique include ensuring that statistical changes in the image do not occur. Some
intelligent software also checks for areas that are made up of one solid color. Changes in
these pixels are then avoided because slight changes would cause noticeable variations in
the area and. While LSB insertion is easy to implement, it is also easily attacked. Slight
modifications in the color palette and simple image manipulations will destroy the entire
hidden message. Some examples of these simple image manipulations include image
resizing and cropping.
Conclution
In the present world, the data transfers using internet is rapidly growing because it is
so easier as well as faster to transfer the data to destination. So, many individuals and
business people use to transfer business documents, important information using internet.
Security is an important issue while transferring the data using internet because any
unauthorised individual can hack the data and make useless or obtain information
unintended to him. The future work on this project is to improve the compression ratio of
the image to the text.this project can be used for different types of image formats like.
Bmp. Jpeg. Tif, etc in the future. The security using lsb algorithm is good but we can
improve the level to a certain extent by varying the carriers as well as using different keys
for encryption and decryption.
Abstract
Submarine wireless sensor networks (SWSNs) are becoming popular everyday due to
their important role in different applications, such as offshore search and Submarine
monitoring. Submarine wireless sensor networks face unique conditions. Therefore,
particular routing protocols are needed to route the packets from a source to a destination.
Moreover, numerous SWSNs applications require deploying the security issue; which
routing protocols dont take in consideration. A survey on SWSN architectural view and
the routing protocols used for SWSNs are given in this paper. The routing protocols
studied and compared with respect to packet delivery ratio, packet delay, energy
consumption. Priority and drawbacks of each routing protocol are listed. In addition, a
survey of the security issue for SWSNs is presented, and the security requirements in
order to secure communication medium in this environment are listed
INTRODUCTION
The field of Wireless Sensor Networks (WSNs) has captured the imagination of the
world with their potential to enhance human lives. WSN has wide applications in fields
like agriculture monitoring, industrial monitoring, smart housing, automobile industry,
and in military applications. Wireless sensor network (WSN) consists of a large number
of small sensors capable of sensing, processing, and transmitting information to each
other. These sensors communicate with other parts of networks using wireless interface.
Figure 1 shows an example for WSN.
The design of WSNs depends on the environment, the applications objective, cost,
hardware, and system constraints such as a limited energy, shortage of communication
range and bandwidth, and limited processing and storage in each node. The environment
determines the networks factors like size, topology andschemes. There are five types of
WSNs: Terrestrial WSN, Underground WSN, Submarine WSN, Multi-media WSN, and
Mobile WSN [1].
The node with the lowest desirableness factor will forward the packet first. In this way, a
node may hear the same packet multiple times. The node computes its range in various
vectors from the packet received to the sink. If distance become more minimum but still
higher than the pre-defined lower distance threshold , this node will send the packet. if
not, it discards the packet. The bigger is the more nodes will forward the packet. So,
adjusting will control forwarding redundancy in HH VBF.
2.2 Advantages of HH-VBF
Less sensitive to the routing pipe radius than VBF.
The packet delivery ratio increased in dense networks.
Provide more paths to deliver data than VBF.
3. Void Detection
Void can be detected by node when listening to neighbours nodes transmission of
packets. For forwarding vector and a node N, we define the advance of node N as the
projection of the vector on the forwarding vector . Void node is node which all
neighbours advances are smaller than its own on sending data. In figure 4, the advances
of nodes B, C and F denoted as . Node F hasgreater advances than all
neighbours. Thus, node F is a void node [1]
4. Localization
Due to unavailability of GPS signal Submarine, WSN localization techniques cant be
applied to SWSN. Submarine communication is based on acoustic waves. These
www.bitm.org.in Volume: 6 No: I February 2017 71 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
localization methods are divided into two approaches: Range-based approaches and
Range-free approaches [4].
4.1 Range-Based Localization Schemes
Time of Arrival (TOA), Time Difference of Arrival (TDOA) or Received Signal Strength
Indicator (RSSI) is used for distance estimation. Some nodes which are known in
advance by anchor are known its location to localize the other nodes in the network. By
measuring the distance between anchor and the node, it can be specify the coordinates.
An Anchor Free Localization Algorithm (AFLA) is scheme, where no anchor nodes are
deployed. Nodes are tied to anchor by cable to prevent it from its mobility. It is self-
localization algorithm. It benefits from of adjacent nodes.
A Hierarchical Localization Approach (LSL) for large-scale 3D network is a distributed
approach used that is based on 3D Euclidean distance estimation. It classifies nodes into
three types: surface buoy, anchor node and normal node. GPS locate the surface buoy
where it locates the anchor node which is responsible for ordinary nodes localization. It is
simple and has low overhead communication.
A Time Synchronization Free Localization Scheme (LSLS) for large scale SWSN. Three
surface buoys hear each other using TDOA measured at a sensor
Noncommercial
Bug report Compatibility and
OMNeT++ C++ License,
probability.
Commercial License
In general, the various research issues facing SWSN researchers are in the following
aspects: network topology, physical layer, MAC layer, Network layer, and Application
layer. Reference [5] stated the problems related the network layer as follows:-
Two way
3DUL range based message No No Yes Yes
exchange
6. Conclusions
Interest in SWSNs is increasing, and related research studies are in progress. However,
Submarine environment is a special environment that has many restrictions. Considering
this restriction, many challenges face the design of the routing protocols of SWSNs. The
routing protocols in SWSNs have the common objective of trying to increase the delivery
ratio while decreasing the resource consumption and End-to-End delay. However, current
routing protocols have not designed to defend against security attacks that can block or
degrade network communication and performance.
REFERENCES
[1] Dina M. Ibrahim, Mohmoud M. Fahmy, Tarek E. ElTobely, and ElSayed A.
Sallam, Modelling and Performance Enhancement of Submarine Wireless
Sensor Networks by Petri Nets, Thesis submitted to the Engineering Faculty,
Tanta University, for the degree of Doctor of Philosophy in Electrical
Engineering, 2014.
[2] Jian S., Jin W., Jianwei Z. and Shunfeng W., A Comparative Study on Routing
Protocols in Submarine Sensor Networks, Advanced Technologies, Embedded
and Multimedia for Human-centric Computing, Lecture Notes in Electrical
Engineering 260, Springer Science & Business Media Dordrecht, 2014.
[3] M.Kiranmayi1and Dr. Kathirvel Ayyaswamy; Submarine Wireless Sensor
Networks: Applications, Challenges and Design Issues of the Network Layer - A
Review, International Journal of Emerging Trends in Engineering Research
(IJETER), Vol. 3 No.1, January 27, 2015, pp. 05 11.
[4] Mukesh Beniwal and Rishipal Singh, Localization Techniques and Their
Challenges in Submarine Wireless Sensor Networks, International Journal of
Computer Science and Information Technologies, Vol. 5 (3) , 2014, 4706-4710.
[5] Bhanu K., Muti-Metric Adaptive Routing Algorithm for Submarine Wireless
Sensor Networks, a thesis submitted in partial fulfillment of the requirements
for the Degree of master of science, Texas A&M University - Corpus Christi
Corpus Christi, Texas, 2011.
[6] Ahmed M., Iraqi Rivers Pollution Monitoring System Based on Submarine
Wireless Sensor Networks, a thesis submitted to the Computer Engineering
Department University of Technology in Partial Fulfillment of the requirements
for the Degree of Master of Science in computer engineering, 2013.
[7] Salvador Climent, Juan Vicente Capella, Nirvana Meratnia and Juan Jos
Serrano, Submarine Sensor Networks: A New Energy Efficient and Robust
Architecture, Sensors 2012, 12, pp.704-731.
[8] MohsinMurad, Adil A. Sheikh, Muhammad AsifManzoor, EmadFelemban, and
SaadQaisar, A Survey on Current Submarine Acoustic Sensor Network
Applications, International Journal of Computer Theory and Engineering, Vol.
7, No. 1, February 2015, pp.51-56.
[9] Parul Garg and Sandeep Waraich, Parametric Comparative Analysis of
Submarine Wireless Sensor Networks Routing Protocols, International Journal
of Computer Applications, Vol.116 No. 11, April 2015, pp. 29-35.
[10] Sihem Souiki, Maghnia Feham, Mohamed Feham and Nabila Labraoui,
Geographic Routing Protocols for Submarine Wireless Sensor Networks: A
www.bitm.org.in Volume: 6 No: I February 2017 76 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
SurveyInternational Journal of Wireless & Mobile Networks (IJWMN) Vol. 6,
No. 1, February 2014, pp.69-87.
Kifayat Ullah Jan and Zahoor Jan, Survey on Routing Protocols for Under
Water Sensor Networks, Journal of Computer Engineering (IOSR-JCE), Vol.
16, Issue 1, Ver. VI, Feb. 2014, pp. 44-46.
[11] Xie P., Cui J., and Lao L, Vector-based Forwarding Protocol for Submarine
Sensor Networks, International conference on networking (IFIP networking), 2
Abstract
E-Commerce in the retail sector is emerging at a rapid pace. E-Learning which is a
prospective sector of e-commerce is yet to gain that momentum. This paper studies the
advantages and disadvantages of e-learning in the Indian context to ascertain the
opportunities of e-learning and also looks at the challenges which are posing as barriers
towards the efficient implementation of e-learning in business organizations and more
prominently in the education sector. The paper looks at the literature review of the past
researches in this area to draw the inference that elearning in India is growing at a slow
pace and the same can be addressed by improving the infrastructure and elearning
strategies for educational and economic growth of the country.
Key Words: E-Commerce; E-Learning; Synchronous; Asynchronous; Blended Learning
Introduction
E-learning or electronic learning is learning with the help of electronic technologies like
the internet, intranet or extranets to acquire education outside the traditional classroom.
E-learning utilizes a computer and an internet to conduct a part or the entire course either
in a school or college or a distance learning course or even to provide training to
employees in business organizations.
E-learning includes computerized electronic learning, online learning, distance education,
MOOCs, mobile learning and many other forms (Arun Gaikwad and others, 2015).
Another characteristic of e-learning is in this process of imparting education the teacher
and the learners are separated by distance, time or both. Tarhini (2016) observes that e-
learning enhances the learner's learning experiences as well as performance of the learner
by eliminating the barriers of time and distance as the learners can take responsibility of
their own lifelong learning. (Almajali et al., 2016; Bouhnik and Marcus, 2006; Fletcher
2005).
E-commerce is anything that involves an online transaction (Alka Raghunath & Murli
Dhar Panga). This can range from ordering online, to financial transactions such as
transfer of money between bank accounts. E-commerce has been divided into two parts,
namely, e-merchandise and e-finance (Elizabeth Goldsmith and others, 2000). E-learning
falls under e-merchandise which is the selling of goods and services electronically. The
revolution in information technology has brought about a sea change in the way business
www.bitm.org.in Volume: 6 No: I February 2017 78 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
is conducted. The physical environment of buying and selling with which we had been
familiar has given way to online business which offers ubiquitous buying and selling, at
our own convenient time, from the comfort of our home and all this has been achieved
due to the extremely flexible nature of the internet which helps us to carry out a wide
range of tasks from online ordering, publishing, teaching and learning, banking and other
services (Farooq Ahmed, 2001).
E-commerce has created a new dimension and diverse opportunities for business.
Likewise, it has also created new opportunities for education and academics. It is quite
evident that there is tremendous potential for providing e-business education. E-learning
can serve as a catalyst to boost education and literacy in India. Acceptance and adoption
of e-learning in all spheres namely schools, colleges and universities and business, is
quite negligible at present. The Indian e-commerce market has gained popularity more in
the retail sector rather than the education sector. Compared to the potential of the Indian
market e-learning has a lot to achieve. Moreover, the Indian market is not considerable in
comparison to the International market (Sunil Kumar Sharma, Javed Wasim, Dr. Jamshed
Siddiqui, 2014).
This paper studies the opportunities and challenges along with the scope of e-learning as
a prospective sector of e-commerce in India by doing a literature review of the various
researches that have been conducted in this field over the decade. The concept of
electronic learning has been existing for more than a decade but it has witnessed
exponential growth in the last few years, mostly because of the revolution in information
technology and the internet.
Types of E-Learning
E-learning can be broadly divided into two types, namely, asynchronous and
synchronous.
Asynchronous generally means learning that does not occur at the same place or time. In
this form the students learn from pre recorded lectures or lessons that students complete
at their own pace and time. This kind of learning is not delivered in person or in real time.
Asynchronous learning is student centered that uses online learning resources to facilitate
information and knowledge sharing outside the constraints of time and place usually
among a group of people. Symbiosis center for Health Care (SCHC) has successfully
applied asynchronous elearning and is successfully conducting Post Graduate courses in
MedicoLegal and Health Care Management for doctors, nurses and other medical related
professionals.
Synchronous stands for learning 'at the same time'. Synchronous learning requires
advanced tools like video conferencing, interactive webinars, chat-based online
discussions and lectures. This is a more effective way of imparting online education as it
is in real time and helps to minimise the challenges associated with distance. Indian
Institute of Management Ahmedabad (IIMA) has started an initiative in this direction by
providing management education to working executives through Virtual Learning
Other than these two types of e-learning, blended learning and self paced independent
study is gaining popularity among learners and educators. Blended learning is a
combination of traditional classroom teaching and learning and e-learning for better
learning experiences and outcomes. Blended learning carries with it the advantages of
both online learning while ripping the benefits of face to face classroom interaction. It
provides greater flexibility to the learner as they help to meet the different learning styles
and levels of the learner. In self paced independent study students determine their pace of
completing a course. They can examine and analyse the study material for as long as they
deem essential for knowledge acquisition. There is no instructor or guide to help them
during the program. Self motivation should be highest in self paced independent study.
Advantages of E-learning
E-Learning is being accepted and is gaining popularity in India but at a rather slow pace
compared to other countries. It is an effective medium to achieve the target of the Indian
constitution to provide quality education to all the citizens as e-learning can take literacy
to the remotest areas of the country. The government has identified the advantages of e-
learning and taken a huge step towards achieving this goal by initiating the Digital India
Programme which aims to connect rural areas with high speed internet networks.
Amongst the many advantages of e learning, a few prominent ones are listed below:
c) Self paced
This is the most advantageous characteristic of e-learning, though it requires a lot of self
motivation. E-learning provides the learner with the option of ubiquitous learning or
anytime, anywhere learning. The study material can be reviewed by the learner as long as
the learner wants to understand and grasp the concept. It helps in achieving learner
autonomy.
g) Mobile Learning
It is worthwhile to mention here that a vast percentage of Indian population has accepted
mobile phones and are comfortable navigating the different applications. E- Learning
courses can also be accesses with the help of smart Mobile phones which would make
knowledge sharing even more accessible.
Disadvantages of E-learning
E-Learning is multifaceted and has innumerable advantages, but, at the same time it is
important to note that there are certain disadvantages which we need to bear in mind.
5 E-Learning in India (Sunil Kr. Sharma, Indian education scenario, E-Learning should be
Javed Wasim, Dr. presentation tools for e-learning, used for informal and
Jamshed Siddiqui, challenges faced by e-learning in vocational training in a
2014) India and the future of e-learning developing country like
in India India where majority of
the population live in
rural areas and has
received negligible
formal education
6 E-Learning: New trend in (Ekta Srivastava, Advantages and disadvantages of E-learning is growing in
Education and Training Dr. Nisha Agarwal, e-learning and the types of e- education and training
2013) learning sector
8 Models for Measuring E- (Iuliana Dorobat, Research conducted in order to E-Learning system offers
Learning Successin 2014) develop a comprehensive model many advantages and
Universities: A Literature for measuring e-learning system compensates the
Review successfully in Univrsities weaknesses of the
traditional learning
methods
9 Future of E-Commerce in (Nisha Chanana, Factors essential for the growth Overall E-Commerce
India Sangeeta Goele, of Indian E-Commerce will increase
2012) exponentially in coming
years in the emerging
market of India
a) Majority of the Indian population stays in rural areas and to make them aware of the
concept and benefits of e-learning is a major challenge.
b) Lack of proper infrastructure, internet bandwidth and connectivity is another major
constraint in executing e-learning in rural areas. Government has taken initiatives in the
form of Digital India Programme to overcome these barriers.
c) Culture, gender, lifestyle, geographical barriers, religious barriers, literacy, disabilities,
are some of the social repercussion of e-learning in India.
i) Culture: Content, multimedia and writing styles might not be
acceptable and conducive for all cultures.
ii) Gender: Women are conscious about gender neutrality. The instructor
has to maintain a balance and be sensitive towards them.
www.bitm.org.in Volume: 6 No: I February 2017 83 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
iii) Lifestyle: Rural and urban India does not have the same lifestyle.
Further people from different countries have different lifestyles
and hence their learning styles are also different.
iv) Geographical barriers: In a chat room or video conference the
different time zones need to be considered.
v) Religious Beliefs: Sensitivity to religion is crucial. Different
cultures observe different religions on different days.
vi) Digital Divide: Accessibility to technology and the adequate
training to use the technology can reduce the digital divide even
when learners come from diverse backgrounds.
Scope of E-Learning in India
The first adopters of e-learning have been the business organizations who used it for
trainings, lectures, meetings and so on as a substitute for face to face communication. E-
learning can be adopted at two levels the educators level and the trainers level.
Educators can use it in both elementary education in schools and for higher education in
colleges and universities, whereas, trainers can use it for imparting trainings and
upgrading the employees knowledge. But, at both these levels adoption of e-learning is
very slow paced. Internationally e-learning has become widely accepted as compared to
India.
It can be said that e-learning has been successful in the corporate sector for achieving
business goals and for motivating employees. It is used by organizations to educate their
employees on knowledge distribution, training and the like. In this way the organizations
can save huge amounts of money. A long road has to be traveled as far as inculcating e-
learning in formal and informal education is concerned. It is essential for learners to
develop faith in online degrees conducted by universities other than the renowned Indian
institutions like IIT.
The most important step is to take e-learning to the rural areas of the country and make
the rural people aware of the benefits of e-learning. E-learning can reach out to the
masses and provide them with necessary knowledge in all relevant fields. The only
requirement for this is proper internet connectivity.
Moreover, the present universities are unable to accommodate all aspiring learners. E
learning can play a critical role here by providing Distance and Online Education to all.
India is one of the leading IT service provider countries internationally. India can become
one of the leading E-Learning service providers as we have the best IT professionals. We
need to build world class infrastructure to support e learning. The government is also
taking active measures to encourage the e-learning environment in India. Internet kiosks
have been set up in rural areas which can be utilized for e-learning.
According to a report Indias online education market size is expected to grow to $40
billion by 2017 from the current $20 billion. India has more than 1 million schools and
18,000 higher education institutions which is one of the largest education systems in the
world. Each and every industry and educational institution is required to connect with e-
learning.
References
[1] Almajali, D., & Al-Lozi, M. (2016). Determinants of the Actual Use of E-
Learning Systems: An Empirical Study on Zarqa University in Jordan. Journal
of Social Sciences, 5 (2), 1-29.
[2] Almajali, D. A. Masa'deh, R., & Al-Dmour, R. (2016). The Role of
Information Technology in Motivating Students to Accept E-Learning Adoption
in Universities: A Case Study in Jordanian Universities. Journal of Business &
Management (COES&RJ-JBM), 4 (1), 36-46.
[3] Bouhnik, D., & Marcus, T. (2006). Interaction in Distance Learning Courses.
Journal of the American Society for Information Science and Technology, 57,
299-305.
[4] Chanana, N., Goele, S. (2012) Future of E-Commerce in India
International Journal of Computing & Business Research
[5] Diana Oblinger(2001); Will E-business Shape the Future of Open and Distance
Learning? Open Learning; Vol. 16, No. 1, 2001; pp.9-25.
[6] Dorobat, I. (2014) Models for Measuring E-Learning Success in Universities:
A Literature Review Informatica Economica, Volume 18 no. 3
[7] Elizabeth Goldsmith and Sue L.T. McGregor (2000); Ecommerce: consumer
protection issues and implications for research and education; J Consumer
Studies & Home Economics; Vol.24, No.2, June 2000, pp.124127.
[8] Fletcher, K. M. (2005). Self-Efficacy as an Evaluation Measure for Programs
in Support of Online Learning Literacies for Undergraduates The Internet and
Higher Education, 8 (3), 307-322
[9] Farooq Ahmed (2001); Electronic Commerce : An Indian perspective;
International Journal of Law and Information Technology; Vol.9, No.2,
2001;pp.133- 170.
[10] Gaikwad, A., Randhir, V.S. (2016) E-Learning in India:
Wheel of Change IJEEE, Volume 6, Issue 1, page 40-45
[11] Holmes, B., & Gardner, J. (2006). E-Learning: Concepts and Practice. Sage.
www.bitm.org.in Volume: 6 No: I February 2017 85 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
[12] Kattoua, T., Al-Lozi, M., Alrowwad, A., (2016) A Review of Literature
on E-Learning Systems in Higher EducationIJBMER, Volume 7, Issue 5, 754-
762
[13] Pande, D., Wadhai, V.M., Thakre, V.M. (2016) Current Trends of E-
Learning in India IRJET Volume 3, Issue 1, January 2016
[14] Raghunath, A., Panga, M.D. (2013) Problem and Prospects of E-Commerce
IJRDMR Volume-2, Issue 1
[15] Rajpal, S., Singh, S., Bhardwaj, A., Mittal, A. (2008) E-Learning Revolution:
Status of Educational Programs in India IMECS, 19-21 March, 2008, Hong
Kong
[16] Sharma, S.K., Wasim, J., Siddqui, J. (2014) E-Learning in IndiaIJARCET
Volume no. 3, Issue no. 1, January 2014
[17] Srivastava, E., Agarwal, N. (2013) E-Learning: New trend in Education and
Training International Journal of Advanced Research, Volume 1, Issue 8, 797-
810
[18] Tarhini, A., Elyas, T., Akour, M. A., & Al-Salti, Z. (2016). Technology,
Demographic Characteristics and E-Learning Acceptance: A Conceptual Model
Based on Extended Technology Acceptance Model. Higher Education Studies,
6 (3), 72-89.
[19] Tarhini, A., Teo, T., & Tarhini, T. (2016). A Cross-Cultural Validity of the E-
Learning Acceptance Measure (ElAM) in Lebanon and England: A
Confirmatory Factor Analysis. Education and Information Technologies, 21
(5), 12691282
[20] Tayar, M. (2013) Challenges and opportunities for growth of e-learning
enrolments: an international business perspective 30th ascilite Conference,
1-4 December 2013
[21] Wagner, E. D. (2008). Minding the Gap: Sustaining eLearning Innovation.
World Conference on E-Learning in Corporate, Government, Healthcare, and
Higher Education AACE.
Abstract
This paper proposes a lossless symmetric key image cryptographic technique which is
based on thespatial domainand frequency domaincryptographic techniquefollowed by a
compression technique. Here, the image pixels are at first shuffled by taking image
blocks of size 2x2 and entered it into a row vector. From the shuffled image the
symmetric key is generated for identifying the true sender at receiver side. Now the
shuffled image isdecomposed into frequency domain using haar wavelet transformation.
By using Birge-Massart strategy the encrypted image is compressed and ensure a high
level of secured image. In the reverse way, by using its decryption technique where the
image converted from frequency domain to pixel domain and formed lossless decrypted
image.Empirical results are presented to show the satisfactory performance of its
imperceptibility and security.Efficiency of the proposed method is also measured for the
compression scoreand compression ratiofor different gray scale images.
Keywords: Image Cryptography; Haar wavelet; Birge-Massart strategy, Symmetric key,
Security analysis
Introduction
In the cryptographic concept, hide sender's original message (in form of a text, audio,
video and image) from the intruder and send over a unsecured network medium in a
unrecognizable form to the intended recipient and decrypted by human or machine to get
the original message[1][29]. In Figure (1), the basic schematic view of image
cryptography is shown where the plain image is converted into a cipher image by an
encryption technique and an encrypted key. Again the cipher image will be decrypted
using a decryption technique and with a decrypted key [8].
Key-e Key-d
Convert
Image Image Recove
cipher
Encryption Decryption r Plain Image
Plain Image image
Technique Technique
Image compression [4] plays a key role in many important applications, including image
database, image communications and remote sensing (the use of satellite imagery for
weather and other earth-resource application).
Encoding Process
Input
Transform Symbol
Image Quantization Encoding Bitstream
Coding
(a)
Decoding Process
(b)
Figure 2 Basic image compression model (a) Encoding Process (b) Decoding Process
The image(s) to be compressed are gray scale with pixel values between 0 to 255. An
image is called compressed image when the number of bits is reduced in with compared
to original pixel value. Fig 2 [4] shows the basic image compression model for encoding
and decoding technique.The rest of the paper organised as in section 2 related work have
been done for the image cryptography and image compression. In section 3 the propose
image encryption and image compression are illustrated. In section 4 result analysis with
quality assessment and compression are measured. In section 5 different security and
statistical analysis have been done. In that respect the histogram analysis, coefficient
correlation and image entropy have been done. In the last section conclusion, future
scope and algorithm limitation are also incorporated.
Related Works
Sofar many research papers has been accepted in pixel based cryptography. S. Zhang, M.
Karim [13] proposed for color image encryption technique where the color image are
www.bitm.org.in Volume: 6 No: I February 2017 88 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
converted into indexed image format and image are encrypted with white noise filter
using two mask, one for input plane and other for Fourier plane. The color image is
reconstructed by converting decrypted index image into RGB format. Chen and Li [15]
presented a technique where multiple secrete images are encrypted into two circular
cipher-grids. By stacking the two circular cipher-grids, decrypt the first secret image and
gradually rotating one circular cipher-grid at a fixed degree decrypt the other. In this
regards, S.Tedmari, N.A.Najdawi [3] proposed a lossless image encryption technique
where image is sub-banded into frequency domain up to second level using haar wavelet
and diminish the LL bands by diving its dimension, change the sign of other bands and
swap the contents of bands and after IDWT on the image the encoded image is found.
Samson and Sastry [5] proposed an image Encryption with lossy compression using
multilevel wavelet transformation. In their work, the image is decomposed using
multilevel 2-D wavelet transform and based on Birge-Massart strategy threshold is
applied on decomposed image to get compressed image.
In [30], the authors introduce a compressive sensing technique to achieve lossy
compression of encrypted image data, and a basis pursuit algorithm is appropriately
modified to enable joint decompression and decryption.
Proposed Algorithms
In this paper authors presented the proposed algorithm for compression followed by
encryption and decryption technique.
Decompression:
Step 1: Read the compressed and encrypted image at the receiver end.
Step 2: By using haar wavelet authors done the wavelet reconstruction
Decrypted Key Generate:
Step 3: From the reconstructed image matrix authors found the decrypted key from the
reconstructed image details by summing the diagonal and last row of the matrix.
Decryption:
Step 4: Put all pixel element into a vector in row-wise from the reconstructed image
matrix.
Step 5: Construct 2 by 2 matrix subsequently taking elements from the vector and
interchange element diagonally from each sub-matrices.
Step 6: Construct the decrypted image matrix from the shuffled sub-matrices and that
is exactly similar to the original image matrix.
In this research authors proposed a lossless technique i.e., original and decrypted
images are identical. For measuring quality of the processed image with respect to
original image Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) are
measured. [21][22]
PSNR: The most important terms with respect to measure the equality of an original
and processed image (encrypted or decrypted). The following mathematical equation (1)
is used for measuring PSNR
M
PSNR 10 log 10 .........................................(1)
MSE 2
Where M stands for maximum pixel value (for gray scale image M=255) of the image
and MSE is measured by the following mathematical equation (2):
MSE
1 N ,N
N i 1, j 1
2
xi , j yi , j .......... .......... .......... .( 2)
Table 1. The PSNR(dB) results of the proposed work applied using the original,
encrypted and decrypted images, O-D: Original-Decrypted, O-E: Original-Encrypted
Results of these tests are summarized in Table 1 where the proposed technique ensure
the less PSNR value for original to encrypted images and indefinite for original to
decrypted images.
Standard Images, Dimension and type Compression Score (%) Compression Factor
Table 1The Compression Score and Compression Ratio obtained from the Proposed
Technique
In the Table 2 shows the compression score (%) and the compression ratio result for
some gray scale images. The average result shows that the proposed method compressed
a still image more than 51% and with respect to an original image size the compressed
image size reduces by 2.0487.
References
[1] Y.Chen Cheating in visual cryptography in visual cryptography, IEEE Trans.
Image Process.21 (7) (2012), 3319-3323
[2] S.Tedmari, N.A.Najdawi, Noiseless image cryptography algorithm based on
discrete cosine transform, Int.ArabJ.Inform, Techno.9 (5) (2012) 471-478
Abstract
With the approach of latest Communication technologies, there are such an outsized
range of enhancements has been placed. Further the channel from that the
Communication knowledge sends are thus very important and therefore the technique
used is likewise exceptionally basic a part of the specialized development within the line
of Communication. This research work can show an influence line Communication and
therefore the strategy used to it. Orthogonal frequency division multiplexing (OFDM) is
one key technology most used so OFDM based system is the fundamental center of this
paper.Details of PLC communication model is given in this paper. It's channel line
device, and therefore the rising plan for communication and which may be engineered up
effectively and existing wiring of power. In this research paper we estimate the
impedence and channel for broadband PLC. PLC as of currently provides a medium to
broadband net network and observant management capacities for each business enterprise
and houses. The electric resistance mismatching is taken into account and, with the
channel model, are calculable at the receiver. Completely different schemes were
simulated to check the bit error rate (BER) for various impulsive noise parameters. More
results indicate that the projected approach enhances the transmission throughput
provides higher performance for impulsive noise, and will increase the efficiency of the
PLC system as a whole.
Key words: Power Line Communication, OFDM, impulsive noise, CAZAC, Zimer model,
Channel and impedance estimation
1. INTRODUCTION
Using the formulae presented, it is possible to derive a two-port model for the line.
Consider the circuit in figure 1. It can be made to represent a stub-less transmission line
were 0 is the near end and 1 is the far end.
Fig. 1 A two-port network circuit with the indication of the current and voltage signals.
This circuit can be represented by a two-port network, using the hybrid parameters as The
hybrid parameters were chosen because they have a simple physical connection. Note
that the inverse of the matrix is itself. Considering a frequency dependent attenuation as
in the Zimmermann model results in the following model.
------------------------------------(1)
---------(2)
------(3)
---------------------(4)
------(5)
I. Impulsive Noise
www.bitm.org.in Volume: 6 No: I February 2017 97 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
1-Impulsive noise that is synchronous with the mains frequency and is occasional: This
sort of impulsivenoise is cyclostationary and is synchronous with the mains frequency. It
is created by silicon controlled rectifiers in various power supplies.
2-Impulsive noise that is occasional yet offbeat with the mains frequency: This
classification of impulsivenoise is created by intermittent driving powers whose
redundancy rates are between 50 to 200 kHz.
PLC is like other communication technology where a sender modulates sent the data, it
injects onto medium, and the receiver de-modulates the data to read. The major
difference is that PLC does not need any extra cabling and it re-uses existing wiring.
Considering with pervasiveness of power lines. So, the PLC is virtually in all line. The
powered devices can be controlled or monitored. When we discuss about the
communication technology, it is often useful to refer to the 7-layer of OSI model. Some
PLC chips can implement only in the Physical Layer of the OSI model while others
integrate in all seven layers. One could use as a Digital Signal Processor (DSP) with a
pure software realization of MAC, PHY circuit or an optimized System-on-Chip (SoC)
solution, which includes the complete PLC like MAC and PHY. The Cypress
CY8CPLCXX series is an example of the latter with a ready-to-use Physical and
Network layer and a user-programmable application layer. Before moving to the
applications of PLC we lets first understand the various aspects of the Physical layer by
viewing it as three segments on the basis of data rate.
The model of PLC Communication is made by a transmitter, recipient and channel block.
It serves for a making of a source and destination of dataCommunication for consequent
simulations of the line model which they are replaced by a blockby channel. The basic
PLC Communication model with OFDM system is appeared in the Fig.1
The control block is utilized just to enable or incapacitating a few functionalities of the
system, similar to the estimation/evening out plan, the begin block is capable of creating
the arbitrary stream of bits and selecting the corresponding mapping in every sub-
transporter concerning the SNRs evaluated by the channel estimation block. No error
redressing code is utilized which as a part of expansion to an interleave can enhance the
exhibitions introduced underneath. A lot of images is comingbecause of the mapping; this
serial data got is changed over to parallel and the pilots are added which are important to
include to the transmission in the event of persistent channel estimation. The estimation
of the divert in an OFDM system asks for an embeddings of known images or a pilot
structure to the OFDM signal. The quantity of parallel streams coming about because of
the data and pilots ought to match to the quantity of transporters. IFFT block changes
data from frequency to time area. A secure interim is utilized as a part of OFDM to
forestall of ISI (bury image obstruction). A cyclic prefix (CP) is made by a couple of the
last specimens of OFDM images. CP makes an ensure interim between adjoining moved
OFDM images in the time range. This is a path how to keep orthogonally conveys. Once
more, the parallel streams are changed over into serial, and an insertion channel is
utilized to change over the advanced sign into simple to be unconverted by the modulator
to a specific transporter frequency, here, fc = 46.5 MHz
Figure 2 shows the power spectral density of the transmitted signals. The variety in the
powerspectral exhibited in Fig.2 is because of the diverse spectral of mapping, so
distinctive powerspectral, utilized as a part of the transmitted sign.
After the channel which is considered as a multipath divert notwithstanding the noise
sources included, the beneficiary's blocks will do the backwards work of the transmitter's
blocks. So the demodulator will down-proselyte the sign into baseband, and the
obliteration channel is utilized to digitize the sign. The cyclic prefix is evacuated and the
sign is changed infrequency space. The most basicblocks here are: the line impedance
estimation, the channel estimation, and the adjustment and recognition blocks.
The line impedance estimation block works just in the main channel use, where all the
data sent from the transmitter are known at the recipient and utilized for this estimation.
This block is spoken to in Fig. 3, it is exceptionally straightforward where we ought to
make a specific division with the known data (Training) and after that a normal is done to
get the impedance evaluated on every sub-carrier. These impedances are forward to the
channel estimation block and the balance and identification obstruct for the following
channel use.
For the second channel utilize, the impedance estimator will be stopped and the channel
estimator block and the equalizer block can work typically beginning from this second
channel use until the end of the association. In this time, the sign contains data data and a
little preparing arrangement utilized by the divert estimator spoke to in Fig. 4.
Since we work in the frequency area here after the FFT, so the equalizer's work is
extremely straightforward, it has quite recently to isolate the got grouping by the
evaluated channel (ensure that the assessed direct is in frequency space). The subsequent
succession is than demapping with an alternate de-mapper on every sub-carrier. At last
the bit stream yielded by the de-mapping is contrasted and the irregular bits produced at
the transmitter and the BER is computed.
The transmission rate (or phantom proficiency) of every transmission is fundamentally
controlled by the tweak and channel coding mix. Three primary regulation plan are
considered here: i) Quadrature Phase Shift Keying (QPSK), ii) 16-Quadrature Amplitude
Modulation (16-QAM) and iii) 64-QAM. For every situation, the tweak proficiency is
equivalent to the quantity of bits per image that can be sent. On the off chance that the
channel coding is utilized the productivity is duplicated by the coding rate. By altered
Target BER, which represents application or administration sorts, the base SNR limit is
set to accomplish the sought mapping plan as appeared in the Fig. 5. We note here that
the objective BER decided for those qualities are thought to be equivalent to 10-3,
however all in all it might to take a positive worth depending upon the administration
advertised.
1- Mismatched impedance
2- Attenuation on the communication channel
3- Noise and Noise changing in time.
Figure 6 shows a rearranged block model of the PLC channel, in which the depicted
qualities and parameters are included. The parameters of impedance, with the exception
of noise, are spoken to as a period variable direct channel portrayed by the frequency
parameters. Noise is delineated as added substance irregular procedure. This model
catches the entire scope of parameters which are important for a model of the
Communicationsystem with correspondence qualities, despite the fact that this model is
schematically streamlined in the figure. The impulse reaction of the direct channel and
the noise can be either evaluated from the estimation or got from the hypothetical
investigation. Here, they are figured by an immense number of estimations and the
www.bitm.org.in Volume: 6 No: I February 2017 103 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
normal of every taken estimation is considered as a delegate model for the straight
channel and the summation of various sort of noise introduced in Fig. 6. The impulse
reaction and the frequency reaction of the direct channel are spoken to in Fig.7 and figure
8 shows a one shot time area estimation of the noise considered here.
3. Simulation Result
Simulation is done in MATLAB. The info data is randomly created at the transmitted
end. The preparation grouping i.e. Constant Amplitude Zero Autocorrelation (CAZAC)
succession as appeared in figure is utilized for casing era which is one kind of poly stage
codes and has numerous applications in channel estimation and time synchronization,
since it has great intermittent connection properties.
The one possible approach to see the impact of Interference is through constellation
grouping chart. Consequently the impact of obstruction to the images is simulated in
constellation grouping graph for QAM .It can be seen that the more the separation of the
sign/noise proportion (SNR) is diminished the more the images are dispersed in the
heavenly body outline.
The Line impedances which is best suited for Power line communication is estimated and
shown in Fig. 14 & 15. These impedances are forward to the channel estimation block.
The Channel estimation is done before FFT, which improves BER performance of the
PLC network.
To assess the proposed system, we ascertained the BER of PLCnetwork .Bit Error Rate
(BER) of the PLC system increments with expansion in noise meddled with the OFDM
data. The bit error rate (BER) is the rate of bits that have errors in respect to the aggregate
number of bits got. Fig.5.10 shows the BER of the PLC system with QPSK, 16QAM,
64QAM, 256QAM, 1024QAM and Proposed model. Bit error rate diminishes as vitality
per bit is expanded. The BER of proposed model is 10^-3 at 23dB SNR which is near
1024 QAM.
In figure 20 compare BER graph with different types of modulation plans with proposed
model. MATLAB BER tool is used for trace these curve.
We manage configuration of the PLC Communication system model. The model is made
out of the OFDM Communication show, the model of power lines and noise model. The
impedance crisscrossing is considered and, with the channel model, is assessed at the
collector. Distinctive plan was mimicked to think about the bit error rate (BER) .The
reproduction model of the PLC-OFDM system connects well with run of the mill
www.bitm.org.in Volume: 6 No: I February 2017 110 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
pragmatic systems. The error revision code is not utilized here. In the future work, we
will plan a correspondence channel code which will be adapted and particularly to this
application. The results of reproductions taking into account the model will be contrasted
and estimations future work.
REFERENCES
[1] [Mlynek 2008] P. Mlynek, J. Misurec, M. Koutny, "The communication unit for
wireless data acquisition via theInternet, In Proceedings of the 7th
WSEASInternational Conference on Circuits, networks, power, control and
signal processing (CSES'08). Puerto de La Cruz, Spain: WSEAS Press, 2008.
[2] [Achmad 2007] R. Achmad, U. Agung, F. Tetsuo, K. Hidehiro,Y. T. Kyaw, U.
Yoshiyori, U. Yuki, U. Yosuke , WirelessLAN and power line communication
platform for e-learning multichannelnetwork in underdeveloped area in Lombok
island, in 6th WSEAS Int. Conf. on Power,Hardware, Wireless and Optical
Communications, pages 2328, 2007.
[3] [Koinakis 2009] C. J. Koinakis, J. K. Sakellaris, Integration of building
envelope and services via control technologies, in Proceedings of the 13th
WSEAS international Conference on Networks, Rodos, Greece, July 22 - 24,
2009.
[4] [Orgon 2007] M. Orgon, PLC/BPL and Next Generation Networks, in
POWERCOM - Conference Communication over MV and LV power lines,
Praha, 2007.
[5] [Berger 2013] L. T. Berger, A. Schwager, and J. J. Escudero-Garzas, Power
line communications for smart grid applications, Journal of Power and
ComputerEngineering, Vol. 2013, Article 712376, 16 pages, 2013.
[6] [Ferreira 1996] H. C. Ferreira, et al., Power line communications: An
overview, IEEE AFRICON 1996,558-563, Stellenbosch, September 24-27,
1996.
[7] [Zwane 2014] F. Zwane, and T. J. Afullo, An alternative approach in power
line communication channel modeling, Progress In Electromagnetics Research
C,Vol. 47, 85-93, 2014.
[8] [Lazaropoulos 2012] A. G. Lazaropoulos, Broadband transmission
characteristics of overhead high-voltage power line communication channels,
Progress In
[9] Electromagnetics Research B, Vol. 36, 373-398, 2012.
[10] [Zimmermann 2002] M. Zimmermann, and K. Dostert, A multipath model for
the power line channel, IEEETransactions on Communications, Vol. 50, No. 4,
553-559, April 2002.
[11] [Mulangu 2011] C. T. Mulangu, T. J. Afullo, and N. M. Ijumba, Modelling of
broadband power line communication channels, SAIEE, Vol. 102, No. 4, 107-
112, December 2011.
[12] [Mulangu 2012] C. T. Mulangu, T. J. Afullo, and N. M. Ijumba,Estimation of
specific attenuation due to scattering points for broadband PLC channels,
PIERS
[13] Proceedings, Kuala Lumpur, Malaysia, 92-96, March 27-30, 2012.
ABSTRACT
Serving customers is the key essence of any business. To understand and provide
standard service to the customers, every business is trying to exploit the customer
resource management system. With advent of technology, software based CRM systems
are getting readily available in the market.
This paper analyses the education sector, which is a prime business sector as of today
where students and their parents, both form a part of customer base.
In todays education sector, student attrition is a major problem faced by the education
providers. In this paper we have considered the proposed success mantra of Kristopher
Krost and how private institutes are trying to help the attrition problem.
This paper considers the guardian customers of the institute and analyzes their responses
to comprehend the condition of the student customers, whom the institute holds the risk
of losing.
Keywords: customers, education sector, resource management, problems, attrition rate
INTRODUCTION
Every business grows with its customers. The relationship between business and
customers can be stated in a single statement as follows: No Customer, No Business.
Thus customer is an essential and non compromisable aspect of any business.
Therefore, while developing and maintaining business, acquiring new customers and
maintaining relationship with older customers are a mammoth task.
Customer relationship management (CRM) deals with managing customer base for a
business. Using CRM, business houses collect and maintain data about its customers.
This data is then analyzed and compiled to understand the requirements of the
customers and how customers can be served better by the business.
In a case study The importance of excellent customer service undertaken by
Portakabin group, following diagram has been used to show the importance of
[1]
customer satisfaction :
From the above diagram, it is clear that business revolves round customer satisfaction.
In current scenario, education sector is getting marked as service industry where students
are the most crucial and important customers. The term customers may sound
disturbing when referring to students in education sector. Faculty members may feel that
considering students as customers might weaken the pillars of discipline, respect,
courtesy and faith that exists between the preacher and the preached. However, colleges
and Universities are covered under Consumer Protection Law and thus, education falls in
the ambit of service of the Consumer protection Act. Since students pay fees for
education, they become the consumer of the education sector [2].
While expanding the scope of Consumer Law, National Commission stated that
imparting education falls within the ambit of service as defined under CPA. It was held
that fees are paid for services and thus by paying fees, any student becomes a consumer
when he/she attends an educational institution & hires the services of that institution for
attending classes and writing examinations. The educational Institute becomes service
provider on accepting the fees from him/her [2].
Kristopher Krost, an expert CRM Manager, United States in summary of CRM on
universities has stated that the major problem that troubles public and private universities
is student attrition. His article further states that many institutions are referring to student
data that include: attendance, grade, assignment completion, class participation etc., to
help the institute comprehend the shortcomings and intervene early using technology
available in many higher education CRM systems. Kristopher Krost has coined the term
at-risk for students whose performance are weak and bears a chance of leaving the
institute [3].
According to Kristopher Krost, the first I is to identify the at-risk students. This
can be done by maintaining database of the students, manually or using software CRM
tool. Data about the attendance of the student, performance in examinations, and
active participation in institution level activities can help the institute to judge whether
the institute holds the risk of losing the student. Some of the parameters that marks a
student as at risk students are:
www.bitm.org.in Volume: 6 No: I February 2017 114 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
1. Decreasing attendance
2. Decreasing academic performance
3. Adverse in positive attitude towards the institute or faculty members.
Though above reasons mark a student as one losing interest in the pursuing course, yet
the reasons are not exhaustive or watertight.
After identification of at-risk students, comes the crucial and critical task of
intervention by the institute. Intervention is the process or steps that the institute
follows to curtail the chance of losing the student and arrest student attrition.
The process of intervention leads to handling the problems of the at-risk students and
converting them into stable customers.
2. RESEARCH METHODOLOGY
This study started as an exploratory study that eventually led to the descriptive cross-
sectional study focusing on understanding the education sector as an industry, to study
the need for using CRM tools for increasing the number of students in the institute.
The primary data has been collected using a questionnaire. The questionnaire contained
both close ended and open ended questions.
For our research, we have collected data from 478 respondents from a private college in
Kolkata, West Bengal. The secondary data has been collected using different published
and non-published papers & electronic sources and websites as given in the references.
2.1 Sampling Plan
The data has been collected from a college in Kolkata, West Bengal. The data has been
collected through questionnaire from 478 respondents.
2.2 Sampling method
The respondents were the guardians and students of a private college and they were
selected by convenience and non-random sampling; i.e. only those guardians who were
willing to respond to the questionnaire were selected. The sample size selected was 478,
out of which 290 were students and rest were guardians.
3. DATA ANALYSIS
In our study, we have used simple tabulation, pie chart for the analysis of data. We have
analyzed the respondents feedback on each question in the tables below and have
depicted the summary of responses of the respondents.
TABLE 1: Frequency Table
www.bitm.org.in Volume: 6 No: I February 2017 115 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
Number of Students
Managem
ent Management
Technical 37% Technical
63%
Interpretation: 37% of the students belonged to management discipline and 63% of the
students belonged to technical discipline.
TABLE 2: Stream wise Frequency Table
Do you think this intervention will help you to improve your performance in college?
No 16 15
No 24 13
Management Students on
Whether They Think
15% Yes
85% No
Interpretation: 85% of the management students agreed that intervention system has
helped them to improve their performance in college, whereas 15% of the management
students felt that intervention system does not have any effect on their performance in
college.
www.bitm.org.in Volume: 6 No: I February 2017 116 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
Figure 5: Pie Chart Showing Stream wise Frequency-Technical
Technical Students on
Whether They Think that
13% Yes
87% No
Interpretation: 87% of the technical students agreed that intervention system helped them
to improve their performance in college, whereas 13% of the technical students felt that
intervention system does not have any effect on their performance in college.
All the students agreed that intervention system does exist in the institute, but the institute
is using a non automated, non software based CRM system.
Analyzing the response of the surveyed students, the following intervention ways were
inferred:
1. Regular monitoring of the attendance of the students
2. Regular monitoring of the students on performance paradigm in examination
and college activities
3. Regular communication to the guardians about the performance of the irregular
students.
TABLE 3: Intervention Result
Average number written communication with guardian of at-risk as student : 46
Classification of
Students
Written
9%
26%
65% Communicati
on
Interpretation: Considering the total capacity of students in the institute, in average out of
the total, 35% of the students were identified every month as at-risk students and their
guardians were communicated regarding their low performance or degrading
Guardian Response
Guardian with
42%
58% positive
response
Interpretation: 58% of the guardians took this intervention positively and acted readily on
the issues faced by their wards. 42% of the guardians either did not respond to the
communication from the institute or were oblivious of performance of their wards in the
institute.
TABLE 4: Response from Interested Guardians
Possible reasons for being At-Risk student
Considering the responses of the guardians, who wanted to focus on the betterment of
their wards and took the initiative from the institute seriously, brought to light the
following reasons in the socio-economic silhouette which are transforming their wards to
at-risk students.
39% of the guardians felt that their ward is addicted to the newest technical gadget which
hinders their seriousness towards their course.
9% of the students were from out station, and guardians felt that they have lost their
control on their wards.
52% of the guardians felt that the students in the current sociological scenario is
becoming disobedient towards their parents and thus going beyond their control.
Parents are too busy to look into the academic progress of the students 34
Parents are too consumed in their own personal problems to look into the 8
progress of their kids
Figure 7: Pie Chart showing reason for parents for being disinterest in CRM system
The survey has shown that there are few parents who are not interested in the initiative
from the institute. The reason for such behavioral trend from the parents has been
summarized as follows:
46% of the contacted parents have declared that both parents of the student are working
and therefore they are too busy to look into the academic progress of the students.
25% of the parents feel that they are quite well to do and intend to float a self employed
job for their ward and for them the degree is the only requirement, not the academic
performance.
18% of the parents have been found to be too fond of their wards to realize their
shortcomings.
11% of the parents have their own societal and mnage issues and is not interested in the
academic performance of their wards.
2. FINDINGS
From the above study, we find that 85% of the management students and 87% of the
technical students agree that intervention initiative from the institute helps them to
improve their performance in college, whereas 15% of the management students and 13%
of the technical students feel that intervention does not have any effect on their
performance in college. When contacted, 58% of the guardians took this intervention
positively and acted readily on the issues faced by their wards. 42% of the guardians
either did not respond to the communication from the institute or are indifferent towards
the performance of their wards in the institute.
3. CONCLUSIONS
Software based CRM process can be used to maintain student database in an
institute, but for interacting with guardian and students, one to one interactive
method is preferred more. As per the study, students agree that with close
monitoring from the institute, their performance is likely to improve. Most of
the parents are also keen on understanding the position of their wards in the
institute, but there are some sociological issues that are playing part in
converting a student as an at-risk student. Some of the above mentioned
issues might even fall beyond the paradigm of the institute. The study also
shows that the initiative of the institute at creating this interactive CRM
sometimes fail for those students whose parents are themselves entangled in
various problems.
REFERENCES
[1] Business Case Studies, The importance of excellent customer service, prepared
by Portakabin Group for Business Case Studies
[2] VakilNo1. n.d., Colleges and Universities covered under Consumer
Protection Law, viewed 7 March 2016, from
http://www.vakilno1.com/consumer-protection/colleges-and-universities-
covered-under-consumer-protection-law.html.
[3] Krost, K., n.d., Summary of Customer Relationship Management CRM,
viewed 8 March 2016, from
http://www.12manage.com/forum.asp?TB=customer_relationship_manage
ment&S=50.
[4] Gary B. Grant and Greg Anderson, Customer Relationship Management: A
Vision for Higher Education, 2002
[5] Rigo G.E., et al, 2016, CRM adoption in a higher education institution,
JISTEM: Journal of Information Systems and Technology Management,
April, Vol. 13 Iss: 1
[6] Singh S et al, 2016, CRM in Higher Education in India-A Clinical
Approach, IOSR Journal of Electrical and Electronics Engineering, April,
Vol. 11 Iss: 2, pp 14-18.
[7] 2014-2015 State of CRM Use in Higher Education Report, prepared by The
American Association of Collegiate Registrars and Admissions Officers,
USA.
Abstract
Surface potential and slope factor of long channel MOSFET are analytically calculated
by solving Poissons equation. Potential balance model is applied for computation
purpose. Effect of background concentration, relative permittivities and oxide thickness
are varied to analyze the variation as a function of gate voltage. Optimized surface
potential and corresponding slope factor gives the interpretation that proper choice of the
parameters provide reduced surface potential, and peak position of the slope can also be
controlled. Result may be extendable for medium channel MOSFET in power device
applications.
Keyword: Surface Potential, Slope factor, Long channel MOSFET, Background
concentration, Oxide Thickness, Relative permittivity
Introduction
Design of long channel MOSFET for various power electronic applications is not new in
the domain of semiconductor device. However, surface potential calculation is always
considered as one of the ever-important parameter as it reflects the operating condition of
MOSFET. Hence its variation with the applied vertical field indicates the suitability of
the device for communication applications several structural and fabrication parameters
[1] affects its variation and this is better represented by slope factor profile where peak
position reflects the maximum change.
Mathematical Modeling
For analysis purpose, we consider that charges are not present inside oxide layer. Hence
Poissons equations given by
d 2 (1)
0
dz 2
( z) C1 z C2 (2)
VGB s
( z) z s (3)
Tox
Differentiating both sides w.r.t. z for a given s, electric
field variation in the oxide as
VGB s
F ( z) (4)
Tox
As the surface potential is controlled by gate voltage, hence from
practical viewpoint, potential balance equation may be written as
VGB s Vox
(5)
where Vox is the potential drop across the oxide. Further detailed calculation gives
Qx ' exp( s / t 1) (s / t )(1 exp( 2 F / t ) exp( 2 F / t ) exp( s / t 1)
VGB s
Cox
The slope dVGB/ds is an important parameter, as it gives a physical insight about the way
the surface potential varies with the change of gate voltage. The slope factor n is
defined as:
dVGB
n
d s (7)
1 s 2F
n 1 1 xp (8)
2 s 2F t
s t exp
t
Fig. 1 shows the variation of Surface potential (s) with Gate voltage (V GS) for the given
structure for three different background concentrations (N B). From the plot, it may be
observed that for lower values of gate voltage, potential increases almost linearly and for
the given structural parameters, it starts saturating when V GS exceeds 2V. The result is
plotted for four different ranges of s in where the calculation includes effects of body
effect co-efficient. It is seen from the graph that with increase of N B slope decreases in
lower gate voltage region which makes a right shift of the saturation point. This is due to
the fact that higher background concentration increases body effect coefficient which
requires higher gate voltage to make the device in saturation condition.
Fig. 2: Surface potential with gate voltage for different dielectric thicknesses for Si-SiO2
material composition
Fig. 2 shows the variation of Surface potential (s) with Gate voltage (V GS) for three
different values of Oxide thicknesses (T ox). It is seen from the graph that with increase of
Tox slope decreases in lower gate voltage region which makes a right shift of the
saturation point. This is due to the fact that lower oxide capacitance (Cox= ox/Tox)
increases body effect coefficient which requires higher gate voltage to make the device in
saturation condition.
Fig. 3 shows the variation of Surface potential (s) with Gate voltage (V GS) for three
different dielectric materials (ox). The oxide permittivity we have taken here are for
Silicon dioxide (3.97), Hafnium Dioxide (25) and Zarconium Oxide (40). It is seen from
the graph that with increase of ox slope decreases in lower gate voltage region which
makes a right shift of the saturation point. This is due to the fact that lower oxide
permittivity increases body effect coefficient which requires higher gate voltage to make
the device in saturation condition.
Fig. 4: Surface potential with gate voltage for GaAs substrate/high-k dielectric
composition with different background concentrations
Fig. 4 shows the variation of Surface potential (s) with Gate voltage (VGS) for three
different background concentration (NB) for Hafnium Dioxide (high-k dielectric). It is
seen from the graph that with increase of NB slope decreases in lower gate voltage region
which makes a right shift of the saturation point. This is due to the fact that higher
background concentration increases body effect coefficient which requires higher gate
voltage to make the device in saturation condition.
Fig. 5 shows the variation of Slope Factor (1/n) with Gate Voltage (V GS) for three
different background concentrations (NB). It is seen from the graph that with increase of
NB, slope factor increases rapidly and attains a peak point. With further increase of N B,
the parameter decreases exponentially and becomes negligible.
Fig 5: slope factor with gate voltage for different background concentrations
Fig 6: slope factor with gate voltage for different dielectric materials
Fig. 6 shows the variation of Slope Factor (1/n) with Gate Voltage (V GS) for three
different values of permittivity of oxide (ox).The oxide permittivity we have taken here
are for Silicon dioxide (3.97), Hafnium Dioxide (25) and Zarconium Oxide (40). It is
seen from the graph that with increase of ox, slope factor increases rapidly which makes
a right shift of the saturation point and attains a peak point. With further increase of ox,
the parameter decreases exponentially and becomes negligible.
Fig. 7: Slope factor with gate voltage for different dielectric thicknesses for Si-SiO2
material composition
Fig. 8: Slope factor with gate voltage for GaAs substrate/high-k dielectric composition
with different background concentrations
Fig. 7 shows the variation of Slope Factor (1/n) with Gate Voltage (V GS) for three
different values of Oxide thicknesses (T ox). It is seen from the graph that with increase of
Tox, slope factor increases rapidly and attains a peak point. With further increase of T ox,
the parameter decreases exponentially and becomes negligible.
Fig. 8 shows the variation of Slope Factor (1/n) with Gate Voltage (V GS) for three
different background concentrations (NB). Noted that the semiconductor material we have
taken here is Gallium Arsenide and the dielectric permittivity we have taken here for
Hafnium Dioxide (25). It is seen from the graph that with increase of NB, slope factor
increases rapidly and attains a peak point. With further increase of N B, the parameter
decreases exponentially and becomes negligible.
In this paper, electrical characteristic of Long channel MOSFET using Potential balance
model is studied. Surface potential and slope factor are estimated as a function of gate
voltage. Different parameters like background concentrations, dielectric thicknesses,
dielectric compositions for Si and GaAs substrate and for different substrate dielectric
compositions are varied for optimized result. Result shows that peak point of the slope
factor can be tuned for desired application.
References
Abstract
This paper identifies some of the current and future trends affecting the tourism and
hospitality industry, including globalization, guests safety and security, the importance
of offering outstanding services, the new technologies that enhance competitiveness, the
population ageing that impacts directly on tourist demand and the correlation between
price and value. Reference is also made to the trends in the development of tourism
lodgings. Furthermore, the paper attempts to analyze the Indian tourism performance
indicators for the last 10 years and suggest ways out of the recession for the tourism
entrepreneurs. Hospitality industry in India has generated tremendous employment
opportunities and is a big source of foreign exchange for India. As per the planning
commission the hospitality sector is responsible for more jobs per million rupee of
investment than any other sector. This sector provided varieties of jobs which satisfies
unskilled people to specialized one. The govt. of India and the ministry of tourism have
contributed significantly to the development and growth of the industry by providing
various tax incentives, policy measures and other various supports. The suggestions to the
hoteliers include careful analysis of the current and future trends and application of the
proper adaptations, investing in exceptional services and sustainability of their lodging,
as well as utilizing the new technologies, the social networks and they must seek ways to
retain effective, diverse and competent staff. The hospitality industry includes the sectors
like Hotels, Hostels, Motels, Restaurants, Bars, Cafs, Nightclubs, Flight attendant etc.
Key words: employment, India, services, tourism and hospitality, trends.
1. Introduction
Hospitality means providing service to others, as well as demonstrating consistent
excellence and quality. It should also mean profitably providing value at any price level,
while demonstrating your own unique points of distinction. Most of all, hospitality should
be a place, where people can still be exceptional individuals and they can extend their
own personality and style.
The hospitality industry is part of a huge group of companies known as travel and
tourism industry, which provides the necessary or desirable goods and services to
travelers. The hospitality and tourism industries are the largest and fastest-growing
industries in the world.
The travel and tourism industry is composed of five parts: a) the tourism lodgings (hotels,
motels, camps, cruise ships), b) the transportation services (ships, airplanes, trains), c)
food and beverage operations (restaurants, bars, taverns, catering), d) retail stores (gifts,
souvenir, arts/crafts shops) and e) the activities (recreation, educational trips, business,
festivals, sport events).
www.bitm.org.in Volume: 6 No: I February 2017 131 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
The new philosophy in hospitality is that managers are counseling their associates, give
them resources and help them to think for themselves. Do whatever it takes is critical
for success.
For success in service the hospitality operations, among others, should focus on the guest,
emphasize high-touch instead of just high-tech and encourage changes, as well as
innovations
The hospitality industry includes the tourism lodgings, the catering companies, as well as
the food and beverage departments operating within the lodgings.
2. Purpose of the study
The purpose of this study is to identify, analyze, and noted the future trends that has
been done that now related to hospitality and tourism sector. This kind of study will be
helpful to identify both the advancement and some gaps in this field, thus help to
establish a more efficient, effective, and accountable tourism research to support practical
work.
3. Objectives of the study
"In this paper, attempts to analyze the Indian tourism performance indicators for the last
10 years and suggest ways out of the recession for the tourism entrepreneurs. Hospitality
industry in India has generated tremendous employment opportunities and is a big source
of foreign exchange for India. The characteristics of the hospitality industry are:
It is a truly unique and fun workplace and diverse in the scope of responsibilities that
one can attain.
It is an industry with many career options and a source for a respectful income.
Its outstanding dimension is the orientation towards guest satisfaction at ultimate level.
It offers intangible and perishable products (if for example 25 rooms are not sold on a
specific night, their revenues will be lost for ever).
The hospitality businesses make continuous efforts for maintaining a positive image
along with great guest service. It appears that quality service is the basis to industry
success. Thus, those organizations that focus on quality become the leaders for on-going
guest satisfaction, creating loyalty and influencing.
INBOUND OUTBOUND
2012 2013 2012 2013
WORLD 4.80% 3.90% 5.10% 4.10%
AMERICAS 4.90% 4.30% 5.20% 4.20%
EUROPE 3.90% 3.30% 4.20% 3.90%
ASIA 6.90% 4.70% 7.00% 4.20%
AFRICA 5.10% 4.10% 5.60% 4.80%
The above data show that for 2012 Asia is ranked first among all the other continents
concerning the outbound travels (7%). This is mainly owed to the emerging market of
China. For 2013 Africa holds the scepter with 4.8% growth. For both years Europe has
the lowest growth regarding the inbound, as well as the outbound travels.
ON AN EMPLOYMENT SCALE
Countries expected to generate the largest amount of Travel and Tourism Economy
Employment in 2017 (000 of Jobs):
1. China 75,710
2. India 28,322
3. United States 16,125
4. Japan 9,422
5. Brazil 7,773
6. Indonesia 6,853
7. Mexico 5,469
8. Germany 4,962
9. Spain 4,858
10. Thailand 4,766
Countries expected to generate the largest amount of travel & tourism economy
employment in 2017
Most of the organizations in the hotel industry (34 per cent) provide induction training for
the newly appointed employees. But another major part of the organizations in the
(I)India
Foreign Exchange Earnings from Tourism In INR terms 135193 Crore (#2)
(II) World
P : Provisional
#2: Provisionally Revised Estimates (based on final FTA received from BOI).
References
Abstract
The purpose of this study is to find out how tourist evaluates the various qualities of
different facets or attributes of a destination image of Tripura, how much they are
satisfied with this destination. This study is trying to find out satisfaction create any
destination loyalty or not. This paper also tries to understand how satisfaction and other
factors (e.g., demographic characteristics, variety seeking) influence destination loyalty
intention to revisit and willingness to recommend to others.The measurement scales used
here were adapted literature review.This study may provide some useful information
about local culture and prospect about tourism markets in Tripura,some strategies for
promoting and improving national and international visitor satisfaction and intentional
loyalty towards Tripura tourism.
Keywords: Destination image, Tourists satisfaction, Intentional loyalty.
Introduction
Tourism is identified as one of the most potentialindustries of Tripura. It not only creates
jobsopportunity, but increased domestic revenue. Within its small geographical area,
Tripura offers plenty of attractions for the tourists in the form of magnificent palaces. The
number of foreign tourists visiting the state grew at a compound annual growth rate
(CAGR) of 50.4 per cent from 2010-11 to 2014-15(IBEF).
This was a very low figure if compared to the average growth of the nation. The global
tourism industry has driven into an area of menacing competition, and a fundamental
challenge for marketers is to envision the distinguishing characteristics of tourist
experiences (Perdue, 2002). Towards the tourism industry of Tripura, to survive in the
fierce international environment and compete with the tourism development in the region
the authorities and the Governmentneeds a strong relationship, trying to keep up with the
www.bitm.org.in Volume: 6 No: I February 2017 139 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
development speed of nations which has more progressive in tourism. Therefore, what
motivates do tourists visit/revisit Tripura? In order to meet the competition from other
tourist destinations around the northeast, the tourism industry in Tripura needs to
understand tourists' preferences and motives for choosing Tripura as their visit
alternative. What is their main motivation for visiting Tripura and how do they evaluate
Tripura as a tourist destination? For the tourism industry, it is also important to know if
they intend to return or revisit Tripura and if they recommend this destination to others.
The objective of the study on identifying the destination attributes, and personal
characteristics which influence satisfaction and intentional loyalty of tourists toward
intention to revisit or recommend the destination to others.
Review of literature
Lawson and Baud Bovy, (1977) defined a destination image as the expression of all
knowledge, impressions, prejudices and emotional thoughts an individual or group has a
particular object or place. A Destination image as perceived quality evaluation of a
combination of five different attributes/facets such as environment, infrastructure &
accessibility, culture & social, tourist, leisure& entertainment and local food . The
destination image is not only the perceptions of individual destination attributes, but also
the holistic impression made by the destination (Echtner & Ritchie, 2003). Researchers in
several disciplines and fields agree that the image construct has both perceptual/cognitive
and affective evaluations. Baloglu and McCleary, (1999a, b) and Stern & Krakover,
(1993) show empirically that the affective evaluations have a direct influence on the
overall image.In content of tourism, satisfaction has been recognized to be the outcome
of the comparison between expectations and experiences (Truong & Foster, 2006).
Tourist experiences compared to their expectations result in feelings of gratification, the
tourist is satisfied (Reisinger & Turner, 2003) and leaves that destination with their good
memory. Chon, (1989) examined tourist satisfaction by comparing travelers previous
images of the destination and what they actually see, feel and achieve at the destination.
He reported that tourist satisfaction is the result of the relationship between tourists
expectations about the destination based on their previous images of the destination and
their evaluation of the outcome of their experience at the destination area. Loyalty has
been describing and measures in different ways. Behavioral, attitudinal and compound is
main loyalty perspectives. From a behavioral point of view,we can say that it refers to the
future product or service repeat purchase commitment despite situational influences and
marketing efforts directed at causing changes in behavior (Oliver 1997). When a touristis
satisfied they likely to recommend their friends, relatives or other potential tourists to a
product/service by acting as free word of mouth advertising agents (Shoemaker & Lewis,
1999). The degree of destination loyalty is frequently reflected in tourists intentions to
revisit the destination and in their willingness to recommend it (Chen & Tsai, 2007;
Oppermann, 2000).
Previous studies confirm that satisfaction with a tourist experience contributes positively
to loyalty (Pritchard & Howard, 1997; Oppermann, 2000; Alexandris et al., 2006;
Yuksel, 2007; Chi & Qu, 2008). Some empirical studies showing a relationship between
www.bitm.org.in Volume: 6 No: I February 2017 140 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
satisfaction and perceived or actual behavioral loyalty (not attitudinal) has a moderate to
low relationship (e.g., Mittal & Kamakura, 2001). Although satisfaction does not
guarantee loyalty, it is true that loyal customers are satisfied (Jones & Sasser, 1995).
Satisfaction and loyalty both can evaluate by revisited or by a recommendation to other
consumers (friends and family who are potential tourists) (Pine et. al., 1995; Yoon &
Uysal, 2005). Empirical research shows that tourist satisfaction is a good indicator of
intentions to revisit and recommend to others (Kozak & Rimmington, 2000; Yoon &
Uysal, 2005; San Martin et al., 2008).From a marketing point of view Dept. of Tripura
tourism can understand that satisfaction and loyalty are key to long-term survival
(Nicholls et al., 1998) and the future of any tourism products and services (Gursoy et al.,
2003, 2007). Moreover, according to Day & Crash, (2000); Oh, (2003) considered that
perceived quality and perceived value are these variables which best explain satisfaction
and loyalty. From the literature review, we can identify the first variable is perceived
quality which is influenced by the expectations of the consumer. Parasuraman et al.,
(1985) defined perceived quality as an attitude that results from the comparison of
consumer expectations with the actual performance.Tourism research,/ explained
perceived quality of a holiday destination is a combination of tourists trip experiences
and perceived service received in relation to their expectations of the actual service
performance (Bolton & Drew, 1991). The next variable is perceived value. Woodruff,
(1997) considered that value concepts differ according to the circumstances in which
customers think about the value (i.e., customers could perceive value different before and
after purchase). Perceived value is defined as the consumers overall assessment of the
utility of a product (or service) based on perceptions of what is received (results and
desired benefits) and what is given (money, effort, time) (Zeithaml, 1988). Tripura is
identified as one of the attractive tourism centers of the North-East .Its advantages are
based on unique characteristics and potential such as beautiful scenery, fresh air, fresh
food, so on. In recent years, state tourism department has organized many cultural and
tourism events which attract more tourist in future.
The conceptual model of this study source-TRAN THI AI CAM Master Thesis, NOMA
FAME, 2011
Methodology
This survey has been done in Agartala the capital city of Tripura. Because Agartala is one
of the most famous tourist destinations in Tripura. The process of data collection was
divided into two groups. The first group, including 100 questionnaires was delivered to
local hotels, and second group, including 150 questionnaires was given to tourists at
restaurants and coffee bar, where most of the tourists are focused capital city. 250
questionnaires were delivered to tourists at random from 30th March to 10th April, 2016.
201 questionnaires were returned in a usable quality, account for 80.4 % of total given
questionnaires.
Measurement of variables
Travel behavior . The travel behavior was measured by past and present experience of
visitors . The tourists were asked to indicate by nine-point scale, 1 = 1-2 days, 2 = 3-6
days, 3 = 7-10 days, 4 = 11-14 days, 5 = 15-20 days, 6 = 3-5 weeks, 7 = 6-9 weeks, 8 =
10 weeks, 9 = more 10 weeks the level of experience they are familiar with Agartala.
Exploratory factor analysis was performed in order to select the most appropriate items
for the confirmatory model: to reduce a set of multivariate observations into a set of
variables (called factors) to make them more meaningful (Hair, 1998). Principal
component analysis (the most common form of factor analysis) was applied with rotation
(varimax) to test the convergent validity and factor loadings of items (Hair et al, 1995).
Bartlett's Test of Sphericity and Kaiser-Meyer-Olkin Measure of Sampling Adequacy
(KMO) are used to determine the factorability of the data (Pallant, 2005). Items of factors
are retained only if a factor loading greater than or equal 0.5, 0.5 =< KMO <= 1). Bartlett
test of sphericity suggests the probability is less than 0.05 (Pallant, 2005). Reliability
analysis for each of the factor was obtained using the calculation of a Cronbach a
coefficient. The value of Cronbachs alpha of 0.6 is the criterion-in-use (Nunnally,
1978; Peterson, 1994).Two-tailed t-test and One-way Analysis of Variance (ANOVA)
were used to identify the mean differences of satisfaction by demographic characteristics
of the respondents and identify the demographic characteristic differences influenced to
loyalty intention to revisit and recommendation. Finally, we used Statistical Package for
Social Sciences (SPSS 16.0) and Amos 16.0 software.
CFA was used in this study to confirm the convergent validity, discriminate validity and
to test appropriate constructs in the conceptual model in figure. Convergent validity is
tested by the standardized factor loading. Composite reliability and variance extracted a
measure for each construct were calculated via a standardized factor loading and
measurement error for the each indicator (Hair at el, 1995). An acceptable value for
composite reliability is above 0.7 and the variance extracted is exceeded 0.5 (Fornell &
Larcker, 1981 and Hair et al., 1998). Moreover, some indexes will be used to assess
overall model fit (Chen & Chen, 2010). such as: Chi-square (2), 2/d.f ratio, Goodness
of fit index (GFI), Comparative fit index (CFI), Root mean square error of
approximation (RMSEA). The 2/d.f. ratio of less than 5 is used as the common decision
rule of an acceptable overall model fit (Chen & Chen, 2010). Following the
recommendation of Hair et al., (1998), an acceptable model fits are indicated that the
values for Comparative fit index (CFI), and Goodness of fit index (GFI) were greater
than 0.9; values for Root mean square error of approximation (RMSEA) were less than
0.08 represent a moderate fit, while values less than 0.05 are close fit (Browne & Cudeck,
1992). In this study, the author uses the value of Chi-square, 2/d.f. ratio, GFI, CFI and
RMSEA to test the Goodness of Fit of the models. After confirming convergent validity
and discriminant validity by measurement models, Structural Equation Modeling (SEM)
were estimated to test the relationship among constructs.
Both the exploratory and confirmatory factor analysis of the structure of destination
image confirmed a five-factor solution: environment, local food, culture & social,
infrastructure & accessibility and tourist leisure & entertainment. In this study, the
tourists reported that they had strongly positive interesting the local food toward visiting
Tripura . Moreover, local food is found to significantly affect on satisfaction with visiting
Tripura a destination . Environment and culture & social are slightly attractiveness to
tourists visiting. Beside that, the causual effect environment and culture & social on
satisfaction are significant. In addition, the findings explore that variety seeking had a
positive influence on satisfaction. This indicates that travellers who want to discover and
find to the variety that they have not experienced yet in their life before.
Implications
Based on the findings of this study, several implications could be made to promote and
increase international tourist satisfaction and intentional loyalty toward recommend to
other and revisit to Tripura. This study has shown that the environment, local food,cuture
& social have a significant relationship with the satisfaction of tourists. This result can be
useful to the tourism planners and marketers focus more on enhancing, improving and
maintaining factors that contribute to tourists satisfaction. For environment, local
authorities and planners should educate citizen to have a sense of protect life environment
and tourism environment; behave to tourists cuturally, friendly and condescending. For
References.
[1] http://www.ibef.org/states/tripura.aspx.
[2] ECONOMIC REVIEW OF TRIPURA, 2014-15.
[3] Alexandris, K., Kouthouris, C. & Meligdis, A. (2006). Increasing customers
loyalty in a skiing resort: the contribution of place attachment and service
quality. International Journal of Contemporary Hospitality Management, 18(5):
414425
[4] Baloglu, S. & McCleary, K. W. (1999a). A model of destination image
formation. Annals of Tourism Research, 26: 868897.
[5] Baloglu, S. & McCleary, K. W. (1999b). US international pleasure travelers
images of four Mediterranean destinations: A comparison of visitors and non
visitors. Journal of Travel Research, 38 (2), 114129.
[6] Beerli, A. & Martin, D. (2004). Factors influencing destination image. Annals of
Tourism Research, Vol. 31, No. 3, pp. 657 681
[7] Bolton, R. N. & Drew, J. H. (1991). A multistage model of customers
assessments of service quality and value. Journal of Consumer Research,
17(March), 375384.
[8] Browne, M. W. & Cudeck, R. (1992). Alternative ways of assessing model fit.
Sociological Methods & Research, 21: 230 -258
[9] Chen, C. & Tsai, D. (2007). How destination image and evaluative factors affect
behavioral intentions? Tourism Management, 28: 11151122.
[10] Chon, K. (1989). Understanding recreational travelers motivation, attitude and
satisfaction. Tourist Review, 44 (1): 3-7.
[11] Chi, C. & Qu, H. (2008). Examining the structural relationship of destination
image, tourist satisfaction and destination loyalty: an integrated approach.
Tourism Management 29(4): 624636.
[12] Chen, C. & Chen, F. (2010). Experience quality, perceived value, satisfaction
and behavioral intentions for heritage tourists. Tourism Management, 31: 2935.
Abstract
The first300GHz linearly-tapered slot antenna with the average gain of 13dBi has been
designed, fabricated, and tested. To reduce the cost of testing, this paper also proposes to
pair relatively low-cost 300-320GHz communication system with 10MHz-30GHz vector
network analyzer and use the signal processing techniques.
1. Introduction
Ultra-broadband terahertz (THz) communication systems are expected to help satisfy the
ever-growing need for smaller devices that can offer higher speed wireless
communication anywhere and anytime. In the past years it has become obvious that
wireless data rates exceeding 10 Gbit/s will be required in several years from now [1].
The opening up of carrier frequencies in the terahertz-range is the most promising
approach to provide sufficient bandwidth required for ultra-fast and ultra-broadband data
transmissions [2]. A suitable frequency window can be found around 300 GHz, offering
an unregulated bandwidth of 47 GHz [2]. This large bandwidth paired with higher speed
wireless links opens up the door to a large number of novel applications such as ultra-
high-speed cellular links, wireless short-range communications, secure wireless
communications for military and defense applications, and on-body sensors for health
monitoring systems. To design
The dielectric constant of the material is 2.2 and the copper thickness is 36 m. The
design parameters (i.e., initial slot width, a, tapered end slot width, b, slot length, h,
www.bitm.org.in Volume: 6 No: I February 2017 148 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
substrate thickness, t, and the flare angle of the tapered slot, ) and their numerical values
are summarized in Table 1.
3. Measurement Setup
The measurement setup consists of the N5224A PNA vectornetwork analyzer (VNA), the
VDI transmitter(Tx210) andthe VDI receiver (Rx148). The input signal provided bythe
VNA at the Intermediate Frequency (IF) port of the Schottky diode mixer is mixed with
the Local Oscillator(LO) signal, generated by subsequent doubling and triplingof the 25
GHz signal from a phase-locked dielectric resonatoroscillator (DPRO). The sub-harmonic
mixer plays a dual roleof doubling the carrier frequency and mixing it with thebaseband
signal (10 MHz20 GHz, delivered by the VNA).The resultant terahertz-range signal is
then transmitted bythe horn antenna that has a gain of 23 dBi in the range280-320 GHz.
At the receiver side, the same componentsare used to down-convert the signal, except
that the DPROis tuned to 24.2 GHz, resulting in a down-conversion ofthe received RF
signal to an IF signal of 9.6 GHz. Theupper sideband of the down-converted signal is
thenrecordedby the VNA in the frequency range of 9.6-29.6 GHz. Thecorresponding
block diagram is shown in Fig. 3. By recordingthe frequency dependent scattering
parameter S21 for the test signal frequencies ftest = 10MHz20 GHz at the VNA,
thechannel transfer function at f = 300GHz+ ftest is measured.
It has been found that the inherent loss in the transceiver isvery high (40-50 dB) and that
this loss has to be de-embeddedfrom any S21 measurements to obtain true S21 transfer
functions.The bandwidth of 15 GHz is used in all measurements toavoid the Tx amplifier
distortions present in the range of 300305 GHz. This provides the temporal resolution of
0.067 ns.
The start frequency is bound to a minimum of 10 MHzby the VNA and the stop
frequency could not exceed the system limitations of 20 GHz. Due to input power
restrictionsof the mixers, a test signal with a power of 5 dBm isused, providing a
dynamic range of approximately 90 dBfor the chosen intermediate frequency filter
bandwidth of IF = 10 kHz. The number of sweep points is set to 801,and the maximum
excess delay is 53 ns.
1)The transceiver loss is de-embedded from the measuredS21. This step is necessary
because the systemcalibrationcan only be performed at the input and the output ofthe Tx
and Rx modules, while the transceiver introducessignificant frequency-dependent loss
into the system.
2)The measured channel transfer function between twohorn antennas is used to calculate
the frequencydependentgain and S11 of the horn.
3)The obtained gain and S11 of the horn from Step 2 alongwith the measured S21
between the horn and LTSA areused to calculate the frequency dependent gain and S11of
the LTSA.
The following two subsections describe the detailed signal processing techniques used in
steps 2 and 3.
(1) where is the measured transfer function S21, Ghornis the frequency-dependent gain
of the horn antenna, and PListhe free-space path loss, which can be theoretically
calculatedas [21]
PL = 20 10 4 ,(2)
where ddenotes the distance between two horn antennas, andis the wavelength. In this
measurement scenario, the distancebetween the horn antennas was d = 10 cm.
To find the S11 of the horn, we consider the diagram shownin Fig. 6. Here, the Tx and
the Rx antennas have the samereflection and transmission coefficients, S11 and S21 ,
since twoidentical horn antennas are used. Assuming that the horn has100% efficiency,
the relationship between the Sh11 and Sh21 canbe defined as [22]:
| 11 |2 + | 21 |2 = 1.(3)
whereS21deembed refers to the measured S21 after the de-embeddingof the transceiver
loss, and Gh is the average ofthe frequency dependent horn gain. From Fig. 6, we can
relate 21 and 21 as follows:
| 21 |2 = | 21 |2| 21 |2 ,(5)
which leads to
| 21 |2 = | 21 |. (6)
Finally, 11 can be found by substituting (6) into
(3) as
| 11 | = 1 | 21 |. (7)
The measured (i.e., post-processed) S11 and gain of the hornare shown in Fig. 7. They
are also compared with simulatedS11 and gain of the horn antenna to verify our
approach. Thecomparison is further discussed inSection 5.
where 21 is the de-embedded S21 between the horn and theLTSA that has been
compensated for path loss and the gainsof the two antennas, 21 is the S21 of a single
horn that wasfound in the previous section, and 21 is the S21 of the LTSAthat needs to be
calculated.
The measured S11 and gain of the LTSA are shown in Fig. 8.They are also compared
with the simulated S11 and gain ofthe LTSA to verify our approach. The comparison is
furtherdiscussed in Section 5.
In Figs. 7 and 8, it is observed that the measured gainand S11 are quite comparable with
the simulated ones forboth the horn and LTSA. The ripples seen in the measuredgain are
confirmed by simulation, and it has been found thatthey are the result of multiple
reflections between Tx andRx hardware. The fabricated LTSA achieves a high gain
ofaround 13 dBi, and below 10 dB return loss for most of themeasured bandwidth of
305 320 GHz, as observed in Fig. 8.Although the measured results have been plotted for
only theupper sideband with additional loss of 5 GHz due to amplifierdistortion present
in 300305 GHz, simulation has proven that,in principle, the LTSA has a high gain and
low S11 below10 dB across the entire bandwidth of 280320 GHz asshown in Fig. 2,
confirming the wideband (13.3 % fractionalbandwidth) characteristic of the proposed
antenna. The slightdiscrepancies observed between measurement and simulationcan be
attributed to imperfections in fabrication, transitionsbetween the waveguide and antenna,
rough surfaces, etc.that would introduce additional losses not accounted in ourpost-
processing algorithm. It can be expected that at suchhigh frequencies, the slightest
dimensional irregularity of thestructure that is in direct contact with the propagating
wavecan result in considerable reflections.
6. CONCLUSIONS
A broadband linearly-tapered slot antenna with the average gain of 13 dB across 280320
GHz range has been designed,fabricated, and tested. The LTSA has been fabricated
usinga standard PCB milling machine and the Rogers RT/Duroid5880 material. To
reduce testing cost, this paper proposed topair relatively low-cost 300320 GHz
communication systemwith 10 MHz30 GHz vector network analyzer (VNA) anduse
signalprocessing to extract the gain and return loss of thetested antenna. The results show
that the measured averagegain and return loss are in good agreement with the
simulationresults, suggesting that the fabricated LTSA has a high gainand wideband
characteristics.
References
[1] S. Cherry, Edholms law of bandwidth,IEEE Spectrum, vol. 41, pp. 58-60,
July 2004.
[2] P. H. Siegel, Terahertz technology, IEEE Transactions onMicrowave Theory
and Techniques, vol. 50, pp. 910928, March 2002.
[3] J. D. Kraus, Antennas, McGraw-Hill Book Company, 2nd edition, New York
NY, 1988.
[4] D. B. Rutledge and M. S. Muha, Imaging antenna arrays,IEEE Transactions
on Antennas and Propagation, vol. 30, no. 4,pp. 535540, July 1982.
[5] D. F. Filipovic, S. S. Gearhart, and G. M. Rebeiz, Doubleslot antennas on
extended hemispherical and elliptical silicon dielectriclenses, IEEE
Transactions on Microwave Theory and Techniques,vol. 41, no. 10, pp. 1738
1749, October 1993.
[6] X. Wu, G. Eleftheriades, and T. E. van Deventer-Perkins,Design and
characterization of single- and multiple-beam mm- wavecircularly polarized
Abstract
The discovery of Higgs boson has marked a new era of exploration in fundamental
physics. It is an important particle because it is responsible for the Higgs mechanism by
which all particles acquire mass. There are certain decay modes of Higgs boson which
are relevant events of Standard Model(SM) such
as: (l is a lepton).Apart from
these, Lepton Flavor Violating (LFV) decays of Higgs boson )
are precisely excluded under SM theory. But recently some evidences are found at LHC
signalswith 95% CL in the CMS experiment which could be conclusive for beyond
SM(BSM) theory. In this paper, we discuss different decay channels of Higgs bosonwith
the recent searches of LFV Higgs decays.
Keywords: Higgs boson, Higgs mechanism, Higgs decays, Standard Model, Beyond
Standard Model
1. Introduction
The Higgs boson is a special boson which was proposed by Englert,Brout& Higgs [1-3]
around 50 years ago and finally confirmed on 4 th July, 2012 by CERN at LHC. It is
responsible for the mass generation of the gauge bosons (W and Z bosons) of SM [4]
which are carrying the weak forces. When we impose the spontaneous breaking of gauge
symmetries to the electroweak theory, the solution of this mass conundrum could be
found by presuming a complex scalar field. This field is called as Higgs field and it
permeates over the whole space from the instant of Big Bang. All particles acquire some
mass due to the dragging force given by this Higgs field while moving through itand
stronger the interaction of the particle with Higgs field, larger the mass is. As the Higgs
field is constant over whole space so the mass becomes a fixed property for any particle.
The quantum excitation of this field is known to be the Higgs boson. As the field is
scalar, the Higgs boson has spin-0 and this property provides the uniqueness to it. If it
were spin-1, like other bosons then all the particles moving through it would be
accelerated in ground state violating momentum conservation laws.The Higgs boson also
has self-interaction which means it also provides the mass to itself. The mass of the Higgs
boson has been found to be aboutmH~125-126 GeV by ATLAS [5] and CMS [6].
From the signals of various colliders it is found that Higgs boson is very unstable
(lifetime ~ 10-22sec) and decays very fast into fermion-anti fermion pair or pair of other
www.bitm.org.in Volume: 6 No: I February 2017 154 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
bosons. To interpret the experimental measurements, computation of all Higgs boson
partial decay widths i is essential. Because the fraction of each decays modes (that could
not be observed in colliders) has a relation with total decay width total. A Higgs boson
with mass mH~125 GeV has been observed by LHC with some dominant decays which
are followed by . The Higgs decays
are difficult to detect due to their low decay rates. The total width of
SM-like Higgs with mH= 125 GeV is measured to be H= 4.07 10-3GeV with an
uncertainty of 4% [7].Besides these decay channels there is no tree level flavour changing
neutral current (FCNC) [8] in SM. Therefore FCNC processes are excellent probes to
reach the extent of BSM [9]. Run-I results of CMS collaboration have found a surplus of
events of the decay mode with local significance 2.4 [10]. In the following
sections we will get a review of decays of the Higgs boson under SM background and
also follow up some signals of BSM theory.
In the last few decades, many theoretical computations have been built up for Higgs
boson production and its decay channels, which are having a good agreement with the
experimental claims till today. To get the evidence of the Higgs boson one needs enough
high experimental energy of the order of TeV range.A Higgs-boson coupling to SM
particles is the origin for their corresponding masses. For the SM-like Higgs boson, its
couplings to the intermediate gauge bosons W, Z and to the top and bottom quarks as
well as -leptons are the most relevant ones for decay and production processes.Among
all events of SM, Higgs boson decays to various heavy particles through different decay
modes. But not all modes are equally significant or easy to detect in high energy colliders
(e.g. LHC, Tevatron).
While studying the decay of Higgs boson into WW * and ZZ*, it is observed that
each gauge boson pair decays into four fermions (leptonic, semileptonicetc). In the
decay channel (Fig 2(a)[7]] (where l refers to e or ) under the
background of dominant Higgs production from gluon gluon fusion process, Z 2 is
always produced via an off-shell Z boson and tends towards highest possible masses.
Whereas, for annihilation background, Z2 tends toward lower mass. Signal
strength for this decay channel ( is measured by ATLAS and CMS
experiments as and respectively [7].
Among all other SM background events difermionic decay modes of Higgs boson,
[16]
Fig 3
Being the heaviest lepton among all, has the highest leptonic Higgs
bosonbranching ratio, 6.2% in the SM which helps in study of Higgs interaction with
fermions ( . and are denoted as radiative modes in the field
of Higgs fermionic decay. The partial decay width is given as
Same as diphotonic mode, Higgs decays to photon and Z boson ( ) (Fig 4 [15])
proceeded by fermion and W boson loops. This decay mode is considered to be a rare
decay although the branching ratio is comparable to . The partial decay width is
given by eq. 6 [17,18]
Table 1
1-2%
1-2%
~15%
~15%
~10%
Branching ratios for relevant channels of a SM Higgs boson with mH= 125 GeV are given
in Table 2 [7]
Decay
channels
Among many different plausible non-standard decay modes of the Higgs boson, one of
the most fascinating are flavour violating Higgs decays. In the SM, these decays are
supressed by other background events due to low decay rates. LFV decays have been
studied theoretically in the context of supersymmetry, extended Higgs sectors and other
BSM models. The results observed by the Super-Kamiokande Collaboration shows
evidence for neutrino oscillation which indicate lepton number is not conserved in SM.
So, in certain extensions of SM flavour violation decays could be identified precisely. In
collider aspect, during various direct and indirect experimental searches at LHC and
comparing their sensitivities some signals of LFV decay modes, such
as , are found which are highly correlated with flavour violation
in low energy processes ( etc) [10]. These couplings of Higgs are
associated with Yukawa interactions. Considering that Higgs production cross section
and total decay width are same as that of SM,CMS ATLAS have given the best fit for the
decay mode as [21]and [22]
respectively, and the upper limit is found as [21] with local
significance of 2.4 and [22] with 1.3 respectively. Both CMS
and ATLAS are searching good results for another flavour violation of e and e
channels which are described in ref. [23,24]. The Feynman diagram for one loop radiative
lepton decay and FLV decay are given in Fig 5 [25]
Fig 5
3. Conclusion
Before the discovery of Higgs particle all the elementary particles have spin or 1. Since
Higgs particle has spin-0, so it opens a perception of new type particles. So the discovery
can be considered as an important step forward to particle physics. In the above
discussion we recall the dominant decays of Higgs under SM events. Results associated
with CMS and ATLAS collab. shows that mode higher event rate compared to
the SM predictions [26]. and channels play a special role
due to their excellent mass resolution (Table 3). The decay is often
referred to as golden channel due to final state of four charged leptons. On the other hand,
in spite of having poor mass resolution, channel provides the best chance of
discovering Higgs particle because of its large branching ratio. The decay can
have two possible modes, one is hadronic (with one neutrino) and another is leptonic
(with two neutrinos). Having (atleast two) neutrinos in final state the events are unable
for determination of Higgs mass, but low mass of (1.78 GeV/c2) helps to analyse the
problem. All the decay events of SM are observed within 2 measurements of LHC (run-
I worked in 7 TeV, run-II is operated in 13 TeV). Along with these possible SM Higgs
decays the LFV decays are being observed with 95% CL at LHC. Previously it was
predicted that branching ratios of the modes are sizeable uptoO (10%)
[27]. Recently various experiments are going on in search of LFV Higgs decays and they
are also assumed to be confirmed in near future. As these decays are exclusive for SM
events so their confirmation could be a notable step towards the new physics beyond SM.
Acknowledgment
P. Maji and D. Banerjee acknowledge the Department of Science and Technology, Govt.
of India for providing INSPIRE Fellowship through IF160115 and IF140258 respectively
for their research. S. Sahoo would like to thank Science and Engineering Research Board
www.bitm.org.in Volume: 6 No: I February 2017 160 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
(SERB), Department of Science and Technology, Govt. of India for financial support
through grant no. EMR/2015/000817.
References
Abstract
Self help groups are basically business units. These are formed in small group to earn
profit. For earning legitimate profit SHGs are required to keep books of accounts.
Accounting is the business language in which most transactional are expressed. Language
serves as the medium of communication. Similarly what an entity expresses as results of
activities through accounting is communicated to others. SHGs are not well versed with
accounting process, not only would their reports and statements be questioned by other
interested parties but also would they fail to take proper decisions. This study there fore
first investigates into the nature and type of accounting practices followed by SHGs and
then examines their effectiveness. On the basis of findings of the prevalent practices
followed by SHGs, their limitations are delineated so that an appropriate accounting
system for these micro business unit could emerge.
Key Words: SHGs,NABARD,PPP Model,Double Entry System,Micro Business Unit
Introduction
Poverty is the greatest bane in the developing countries. India is no exception. In fact
the focus of economic planning, programmes and cognate activities in India has been
eradication of poverty. Poverty alleviation involves several challenges to the Govt. of
India and of the states for the purpose of eradication of poverty, Self help Groups (
SHGs) have emerged as a ray of hope for the poor. Being actively promoted by the State
Banking system , the movement of SHG has come to the literature in the mid-1980s in
India and it currently forms the basic constituent of microfinance. A SHG is a group of
few individuals, usually poor and often women who pool their savings into a fund from
which they can borrow as and when necessary. Such a group is linked with a bank where
they maintain a group account. Over time the bank begins to lend to the group as a unit,
without collateral, relying on self-monitoring and peer pressure within the group for
repayment of these loans (Karmakar. A, The Management Accountant Kolkata, Nov.
2008).
Moreover A Self Help Group is a small and informal association of poor having
preferably similar socio-economic background and who have come together to realize
some common goal based on self help and collective responsibility. SHGs have become
relevant because of the following reasons . First, an SHG working on the principle of
solidarity helps the poor to come together to pool their savings and access credit
facilities. An SHG builds social capital like trust and reciprocation, that helps in
replacing physical collateral, a major hurdle faced by the poor in obtaining formal credit.
Then through the principles of joint liability and peer pressure, a SHG ensures prompt
Literature Review
In India, Andhra Pradesh has a large share of over 18% of all linked SHGs, Tamilnadu
has a share of 12%, Karnataka has a share of 11% followed by Kerala of 9%. The rest of
country accounts for about a quarter of the total number of SHGs, West Bengal has a
share of only 7.4% of the network of SHGs. Some Research Studies have recently been
initiated in the districts of Burdwan, Bankura, Howrah, Hooghly and some others.
Mention here may be made of a few of them e.g Self Employment Programme, W.B.
(Roy, Durgadas, 2007), Cost Model of SHG Bank Linkage Programme in W.B.
(Venugopalan. Puhazhundhi, 2006), Impact of SGSY Scheme on Self Help Group
members of W.B. (Kundu. Amit, 2008), Study of SHG and Microfinance in W.B.
(Sen. Manab, 2005), Womens Dependents on Forest and Participation in Forest
(Sarkar, Debnarayan, 2006), Technology and Sustainable Development in North-South
Perspective (Sinha. Shirish, 2003), Institutional credit absorption in rural areas
(Chatterjee. Manik,2001) etc. With the backdrop of the above mentioned studies, I
propose to do research work on the subject which may help the rural people of Birbhum
district. Besides this, Birbhum is industrially backward, poverty stricken and agriculture
based district. Thus this region is chosen for deeper probe into the present state of affairs
of SHG and future prospect.
Before explaining the theme of the study, a close look into the functions of the
accounting process is required so as to appreciate its role in poverty alleviation.
Custodianship and control of resources employed in enterprise activities, providing
necessary information to those individuals responsible for day-to day operations,
planning and co-ordinating business activities.These are the functions required of
accounting at any period in history and in any socio-economic environment , be it that
of a developed, developing or socialist country observed by Kyojiro Someya in a paper
entitled Socio -economic environment and its functioning of accounting-Does
accounting have a larger role than rational financial reporting?. He also expresses his
view that perhaps no persons ,no organisation or no country, would be successful in its
endeavour unless it has effective method of recording and controlling of its activities. In
fact, it is almost impossible to record and control of financial activities of an individual or
an organisation without adopting proper accounting methods and techniques. It may at
the outset appear irrelevant when one refers to accounting in the context of poverty
alleviation or activities of SHGs, but if one looks into the issue deeply and seriously,one
will realize that the role of accounting is very important for the success of gamut
activities or programmes, whether it is poverty alleviation or activities of SHGs. Failures
in Gram Panchayats are largely related to ineffective accounting and control systems.
Poor people often are exploited and cheated for their illiteracy and lack of accounting
knowledge. Unless an appropriate accounting system is developed and adopted in
practice ,activities of SHGs could hardly be sustained for long. It is important therefore
to study at depth the accountability aspects of SHGsas to wherefrom money comes and
SHGs are basically a business unit. These are formed in small group to earn profit.
Therefore, SHGs aim at profit from their operations.. For earning legitimate profit, SHGs
are required to keep books of accounts. Accounting is the business language in which
most transactional activities are expressed .A man expresses himself through his
language. What one man speaks or writes in a language is heard or read by others.
Language serves as the medium of communication. Similarly what an entity expresses as
the results of its activities through accounting is communicated to others. A business unit
prepares financial accounts, reports or statements. It analyses and interprets its book-
keeping records through analysis. Accounting serves as the medium of communication. If
SHGs are not well versed with accounting process, not only would their reports and
statements be questioned by other interested parties, but also would they fail to take
proper decisions. In fact, all existing SHGs apply some kind of accounting systems to
record their commercial activities and determine the results of these activities at the end
of a particular period. This study therefore first investigates into the nature and type of
accounting practices followed by SHGs and then examine their effectiveness. On the
basis of findings of the prevalent practices followed by the SHGs, their limitations are
delineated so that an appropriate accounting system for these micro business units could
emerge.
1. To investigate into the present accounting system recently followed by SHGs for
recording their business activities.
2. To examine whether the present accounting systems is useful and effective in
determining the periodical results of working of the SHGs.
3. To assess whether the present accounting systems are able to provide necessary
information to internal stake holders as well as external stake holders for their purposes
upto their satisfaction. There should be no concealment of material facts , ambiguity or
distortion with a view to achieve these objectives.
In the light of the above objectives, the study proposes to examine whether the present
accounting system followed by some of the SHGs are related to the unsatisfactory
performance of several SHGs .
Lastly , if it is found that present accounting system is not proper and adequate for
effective management of the SHGs , an endeavour would be made to develop a simple
accounting model for the SHGs. The proposed model would follow the commonly
accepted rules , methods, procedures in the light of accounting concepts and conventions
, accepted principles and practices, so that members of SHGs can easily apply this model
for effectively recording transactions and other business activities of their organizations.
The proposed model may provide the Bankers and other interested persons with relevant
information.
For this purpose , the following hypotheses are sought to be tested:
a. The SHGs do follow the scientific accounting system based on double entry principles;
b. The present accounting system does not fail to provide necessary information, either
internal or external stake holders for forecasting and future decision making.
c. The vogue accounting system has not failed to determine the dependable periodical
results of the activities of SHGs.
d. The present accounting practices followed by SHGs are not incomplete in respect to
recording business transactions. The above hypotheses are desired to be tested and
verified with the help of empirical data to be collected for this study. If the hypotheses
are accepted,a thorough examination and analysis of the present system is proposed for
arriving at proper recommendations for the improvement of the accounting system
along with an appropriate accounting model for SHGs.
The proposed study would cover a period of five years starting from 2001.It would
primarily be a sample study. SHGs of the district would be selected on the basis of
random stratified sampling. Data would be collected also from Self Help Group
members. For this purpose, several sets of questionnaire would be prepared and
addressed to the members of the selected SHGs. Besides, data would be collected directly
from a) District Industries Centers, b) Panchayet Offices, c) Block Offices, d) Banks and
other Financial Institutions who are offering loans to the SHGs, e) Birbhum Zilla Parisad,
f) Beneficiaries i.e, the loanee members, and g) Financial association of beneficiaries.
Secondary data would also be collected from the annual reports, newspapers, magazines,
periodical journals, internet etc. The scope and application of the secondary data would
be rather limited to benchmarking.
Proposed Data Analysis:
Data would be analyzed on the basis of Descriptive Statistics, Inferential statistics,
correlation analysis as well as Multivariate analysis and factor analysis.
In this study exploratory research design would be applied to explore the data and to
find out significant differences among and between variables. The question pattern
would be culture- free. From the above analysis the conclusions and suggestions for the
study would be drawn.
References
[1] Basu.K and K.Jindal,Micro-Finance; Emerging Challenges, Tata McGraw
Hill Publishing Co. Delhi, 2006.
[2] Community Development 2006 on an evaluation of womens SHGs in an area
in South India.
[3] Chartered Financial Analyst, March 2007,The Icfai University Press,Hyderabad.
[4] Datt.Ruddar & Sundaram ,K.P.M , Indian Economy,-S.Chand & Co.Ltd ,New
Delhi,2007.
[5] Dash, Anup (2003): Strategies for Poverty alleviation in India.
[6] Economic Survey, 2007, The Govt of India
[7] Economic and Political Weekly,vol .XLII No.13,March 31-April 6,2008.
[8] Indian Journal of Gender Studies, Vol. 13, 56-73
[9] International Journal of Rural Studies (IJRS) Vol. 14, No. 2, Oct. 2007.
[10] Journal of Institute of Productivity & Management (IPM) Meerut (Vol. 9, No. 1,
January June, 2008).
[11] Lahiri, Dutt Kuntala and Samanta, Gopa (2006) Constructing Social Capital
(SHGs and Rural Womens Development in India).
[12] RBI, Report on Trend and Progress of Banking in India, 2005-2006
[13] Report of State Level Review Committee on SHGs-Bank Linkage Programme,
NABARD 2006.
[14] Saraswathy.A (May,2009) Micro-Finance In Krishnagiri District: A Tool for
Poverty Alleviation,Indian Journal of Marketing,vol.XXXIX,No.5.
[15] Sen, Amartya K (1985) Well being Agency and freedom (The Dewey
Lectures) Journal of Philosophy, SHGs Social Welfare Department of W.B.
(2006).
[16] Shome, M.K. (2009). A Critique of the Blue Print of SHGs in India.
[17] The Chartered Accountant ,Vol 54,No.8,Feb 2008
[18] The Indian Journal of Commerce Vol 61 ,No-4 Page-166,Oct-Dec 2008.
[19] The Management Accountant Journal Page-816,Nov. 2008.
[20] Vikalpa-The Journal for Decision Makers,vol.30,April-June,2005.
[21] Yojana,2008, The Govt of India.
Abstract
The most beautiful works of life have always exhibited a dexterous blend of Arts and
Science. The Taj Mahal, for example, is the most scientifically architectured artistic
monument. Similarly, since time immemorial, cooking has been an outstanding art
inclined on a scientific plane and to specify this culinary skill the term Molecular
Gastronomy has been coined for it. Similar to molecular biology, molecular
gastronomy is a scientific discipline that looks for the mechanisms of phenomena
occurring during dish preparation and consumption. As with any other scientific
discipline, it can have many applications. One of the first was molecular cuisine but
since 1994, note by note cuisine has also been promoted. The latter involves preparing
dishes using pure compounds, or more practically mixture of compounds obtained by
fractioning plant or animal tissues, instead of using these tissues themselves. Note by
note cuisine raises issues in various fields: science, technology, nutrition, physiology,
toxicology and politics. This paper seeks to delve into the prospects of this recently
developed nomenclature along with its historic background and the scope and promise it
holds for future cuisine enhancement.
Keywords: Cuisine, Molecular cuisine, Molecular gastronomy, Note by Note cuisine.
Background
The term "molecular gastronomy" was coined in 1988 by late Oxford
physicistNicholasKurtiand the French INRAchemistHerve This. Some chefs associated
with the term choose to reject its use, preferring other terms such as multi-sensory
cooking, modernist cuisine, culinary physics, and experimental cuisine.
Molecular gastronomy is not a media-driven gimmick. Gastronomy is the intelligent
knowledge of whatever concerns mans nourishment. Its purpose is to watch over
conservation by suggesting the best possible sustenance. The term Molecular
Gastronomy is commonly used to describe a style of cuisine in which chefs explore
culinary possibilities by borrowing tools from the science lab and ingredients from the
food industry. Formally, the term molecular gastronomy refers to the scientific discipline
that studies the physical and chemical processes that occur while cooking.
Objectives
The objectives of molecular gastronomy, as defined by Herve this, are:
Current objectives
Looking for the mechanisms of culinary transformations and processes (from a chemical
and physical point of view) in three areas:
Stability of
flavour
Techniques,
tools and
ingredients
Carbon dioxidesource, for adding bubbles and making foams
Foam scan also be made with animmersion blender
www.bitm.org.in Volume: 6 No: I February 2017 169 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
Liquid nitrogen, for flash freezing and shattering
Ice cream maker, often used to make unusual flavors, including savory
Anti-griddle, for cooling and freezing
Thermal immersion circulatorforsous-vide(low temperature cooking)
Food dehydrator
Centrifuge
Maltodextrin- can turn a high-fat liquid into a powder
Sugar substitutes
Enzymes
Lecithin- anemulsifierand non-stick agent
Hydrocolloids such as starch gelatin, pectinandnatural gums- used
asthickeningagents, gelling agents, emulsifying agentsandstabilizers,
sometimes needed for foams
Transglutaminase- a protein binder, called meat glue
Spherification- a caviar-like effect
Syringe, for injecting unexpected fillings
Spherification - for producing acaviar-like spheres with new flavors (apple, olive
oil ...)
The use of emulsifiers
Aromatic component - gases trapped in a bag, a serving device, or the food itself
Whimsical or avant-garde presentation style
Unusual flavor combinations, such as combining savory and sweet and flavor
juxtaposition
Flash freezing
Creating new food textures (gels, foams, glass like food)
Cooking in a microwave for creating dishes that are cold or even frozen on the
outside with a hot liquid in the center
High pressure cooking
Improved temperature control
High-power mixing and cutting machines for example ultrasonic agitation to create
emulsions
Tools
Liquid nitrogen, for flash freezing without allowing the formation of large ice
crystals. Also used for freezing and shattering
Anti-griddle (chilled metal top), for cooling and freezing
Well controlled water baths for low temperature cooking
Food dehydrator
Centrifuge
www.bitm.org.in Volume: 6 No: I February 2017 172 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
Syringe, for injecting unexpected fillings
Ultrasound
Vacuum machine
Pressure cookers
pH meters
Tabletop distilleries
Ingredients
Gelling agents like methylcellulose
Sugar substitutes
Emulsifiers like soy lecithin and xanthan gum
Non-stick agents
Enzymes, for example transglutaminase - a protein binder, also called meat glue
Carbon dioxide, for adding bubbles and making foams
Hydrocolloids such as starch, gelatin, pectin and natural gums - used as
thickening agents, ellingagents, emulsifying agents and stabilizers, sometimes
needed for foams
Note by note cuisine:
Note by note cuisine was first proposed in 1994 (in the magazine Scientific American)
.The initial proposal was to improve food, and to make dishes entirely from compounds.
On 24 April 2009, the French chef Pierre Gagnaire (who has restaurants in a dozen cities
of the world: Paris, London, Las Vegas, Tokyo, Dubai, Hong Kong...) showed the first
note by note dish to the international press in Hong Kong. Then, in May 2010, two note
by note dishes were shown by the Alsatian chefs Hubert Maetz and Aline Kuentz at the
French-Japanese Scientific Meeting in Strasbourg. On 26 January 2011, at a banquet
before the Launching event of the International Year of Chemistry at the United Nations
Educational, Scientific and Cultural Organization, Paris, a whole note by note meal for
about 150 people was served by Potel et Chabot Catering Company. This meal was again
served in April 2011 to about 500 chefs receiving Michelin stars in Paris. And since the
number of note by note initiatives is becoming too big to be tracked Molecular
Gastronomy blends physics and chemistry to transform the tastes and textures of food
resulting in new and innovative dining experiences.
How Safe?
When people hear the words molecular gastronomy or molecular cuisine for the first time
they often mistakenly view it as unhealthy, synthetic, chemical, dehumanizing and
unnatural. This is not surprising given that molecular gastronomy often relies on fuming
flasks of liquid nitrogen, led-blinking water baths, syringes, tabletop distilleries, PH
meters and shelves of food chemicals with names like carrageenan, maltodextrin and
xanthan.The truth is that the "chemicals" used in molecular gastronomy are all of
biological origin. Even though they have been purified and some of them processed, the
raw material origin is usually marine, plant, animal or microbial. These additives have
been approved by EU standards and are used in very, very small amounts. The science
lab equipment used just helps modern gastronomy cooks to do simple things like
maintaining the temperature of the cooking water constant (water bath) , cooling food at
Gibbs - infusing vanilla pods in egg white with sugar, adding olive oil and
then microwave cooking. Named after physicist Josiah Willard Gibbs (1839-1903).
Vauquelin - using orange juice or cranberry juice with added sugar when whipping
eggs to increase the viscosity and to stabilize the foam, and then microwave
cooking. Named after Nicolas Vauquelin (1763-1829), one of Lavoisier's teachers.
Baume - soaking a whole egg for a month in alcohol to create a coagulated egg.
Named after the French chemist Antoine Baume (1728-1804).
References
[1] This H: La gastronomie moleculaire. Sciences des aliments. 2003, 23 (2): 187-
198. 10.3166/sda.23.187- 198. Article Google
[2] This H: La gastronomie moleculaire et physique. PhD thesis. 1995, Paris: VI
University Google
[3] Tresor de la langue franqaise: 2006, electronic version
[http://atilf.atilf.fr/tlf.htm], access 01/10/2006
[4] This H: Solutions are solutions, and gels are almost
solutions. Pure Appl Chem. ASAP article.
http://dx.doi.org/10.1351/PAC-CON-12-01-01, Published
online 2012-09-10
[5] Barham P, Skibsted LH, Bredie WL, Fr0st MB, M0ller P, Risbo J, Snitkjaer P,
Mortensen LM. Molecular gastronomy: a new emerging scientific discipline.
Chem Rev. 2010 Apr 14; 110(4):2313-65.
[6] This H.Food for tomorrow? How the scientific discipline of molecular
gastronomy couldchange the way we eat. EMBO Rep. 2006 Nov; 7(11):1062-6.