Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

Analysis of and Crypto-

aDeepika G. Vaghela bSweta Dargad aAssistant Professor - Computer Science & Engineering Department, ITM Universe, Vadodara. bAssistant Professor - Computer Science & Engineering Department, ITM Universe, Vadodara

Abstract — Ransomware which is a family of Among the most popular variants of ransomware, it that takes files on a PC or network is estimated that CryptoLocker and CryptoWall have storage, encrypts them, and then extorts money to collected millions of dollars from its victims. unlock the files is often called CryptoLocker, CryptoDefense or CryptoWall. Ransomware is one of Key highlights from the analysis include: the most widespread and damaging threats that internet users face today. • Ransomware proliferates through new attack vectors, such as malwartising, employing anti- Keywords — Crypto-Ransomware, encryption, analysis and persistence techniques to ensure decryption, Private key, Cryptography, system compromise Kryloggers . • Advanced encryption algorithms, such as I. INTRODUCTION RSA and AES, prevent decryption without the key This danger is supposed crypto-ransomware • Ransomware has shifted its attention to the (ransomware) and includes at littlest a half-dozen enterprise, targeting more than 230 file types variants, including CryptoLocker and CryptoWall. (up 200 percent from 70 file types in 2013) Ransomware shows picayune Very light of dim with a view familiar detection-based support, such as There are 11 types of malware which is antivirus, has proven ineffective at preventing mentioned below. the pretend to. In surely, ransomware has been 1. : The least dangerous and most proliferationin handsomeness in compensation it lucrative Malware. Adware displays ads on crafty appeared in September 2013, your computer. ,leveraging original attack vector, embracing advanced encryption algorithms and expanding the 2. :. Spyware is software that spies on number of file types it targets. you, tracking your internet activities in order to send advertising (Adware) back to your system.

Trojan attacks turn this way strive 3. Virus: A virus is a contagious program or code for to route origination and annex astute answer, that attaches itself to another piece of software, such as credit card numbers and bank account and then reproduces itself when that software is credentials. run. Most often this is spread by sharing In preference to, force ware unreservedly makes software or files between computers. its illusion make public by encrypting stationery and demanding payment for the keys to unlock them. 4. Worm: A program that replicates itself and destroys data and files on the computer. Worms Victims of the trouble may consent work to “eat” the system operating files and to consternation or be leery of, hence they data files until the drive is empty. are forced to spare the compel to put an end to the endanger, forever without reporting the crime 5. Trojan: The most dangerous Malware. Trojans in order to avoid further embarrassment. are written with the purpose of discovering your financial information, taking over your computer‟s system resources, and in larger systems creating a “denial-of-service attack” Denial-of-service attack: an attempt to

1

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

make a machine or network resource search activity and give you the results the unavailable to those attempting to reach it. developers want you to see. Its intention is to Example: AOL, Yahoo or your business make money off your web surfing. Using this network becoming unavailable. homepage and not removing the Malware lets the source developers capture your surfing interests. 6. : This one is likened to the burglar hiding This is especially dangerous when banking or in the attic, waiting to take from you while you shopping online. These homepages can look are not home. It is the hardest of all Malware to harmless, but in every case they allow other more detect and therefore to remove; many experts infectious recommend completely wiping your hard drive There are two types of ransomware and reinstalling everything from scratch. It is designed to permit the other information 1) Encrypting ransomware, which incorporates gathering Malware in to get the identity advanced encryption algorithms. It‟s information from your computer without you designed to block system files and demand realizing anything is going on. payment to provide to provide the victim with the key that can decrypt the blocked 7. Backdoors: Backdoors are much the same as content. Trojans or worms, except that they open a Examples include CryptoLocker[2], Locky, “” onto a computer, providing a CrytpoWall[3] and more. network connection for hackers or other Malware 2) Locker ransomware, which locks the victim to enter or for viruses or SPAM to be sent. out of the operating system, making it

impossible to access the desktop and any 8. Keyloggers: Records everything you type on apps or files. The files are not encrypted in your PC in order to glean your log-in names, this case, but the attackers still ask for a passwords, and other sensitive information, and ransom to unlock the infected computer. send it on to the source of the keylogging Example include the police-themed program. Many times keyloggers are used by ransomware or Winlocker. corporations and parents to acquire computer usage information. II. KEY CHARACTERISTICS 9. : This one deceives or

misleads users. It pretends to be a good program Crypto-ransomware is rather different from to remove Malware infections, but all the while it is the Malware. Often it will turn off the real traditional malware: Anti-Virus software. The next image shows the typical screen for this Malware program, • It doesn‟t steal victim‟s information—instead it Antivirus 2010 makes it impossible to access your information

10. Ransomware: If you see this screen that warns • It doesn‟t try to remain stealthy after files are you that you have been locked out of your encrypted because detection won‟t restore the lost computer until you pay for your cybercrimes. data Your system is severely infected with a form of Malware called Ransomware. It is not a real • It‟s relatively easy to produce—there are a notification from the FBI, but, rather an infection number of well-documented crypto-libraries of the system itself. Even if you pay to unlock the system, the system is unlocked, but you are not III. TIMELINE AND DATASET free of it locking you out again. The request for money, usually in the hundreds of dollars is Given Figure shows the dataset and how the completely fake. malware raise their intensity with time. The given dates are based on various reports, coupled with 11. Browser Hijacker: When your homepage our own analysis. changes to one that looks like those in the images inserted next, you may have been infected with

one form or another of a Browser Hijacker. This dangerous Malware will redirect your normal

2

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

4. Watch out for spam and phishing emails. For example, the post office will never send a document as a .zip file. And so-called legal documents that ask you to “enable content” are traps. Businesses should also use a good email filtering system, disable macro scripts from Office files received via email, and educate employees on current spam and phishing schemes.

Fig 1: Diagram for Dataset and Timeline[11]

 CryptoLocker surfaced in the fall of 2013, and remained among the most widespread of the crypto-ransomware families until mid-2014 [2].  CryptoWall surfaced towards the end of 2013 [3], but didn‟t become prominent until 2014 . New strains of CryptoWall have appeared as recently as last month (October 2014).  Critroni behaves similarly to CryptoWall— they both require using the TOR browser to make payments, and they both were prominent around the summer of 2014 [5]. Our sample of DirtyDecrypt outdates CryptoLocker, appearing in the summer of 2013—a few months before CryptoLocker became prominent[4]. This sample only targets and encrypts eight different file formats, which makes sense due to it being among the earliest iterations of ransomware.

Steps to protect against Ransomware for businesses and consumers:

1. Take regular backups of files, and test them to make sure they‟re reliable. In case you do get hit, you won‟t be put in the difficult position of Fig 2: Diagram or Structure of Ransomware deciding whether to pay. Deployment [8].

2. Keep all software up to date. Ransomware 1. Establish the Intial access : In this scenario , often infects by taking advantage of security the access to the victim‟s computer/device has flaws in outdated software, so keeping software establish with ransomware through network or current will go a long way. with some legal tools. This connection will start the first step to enter into the victim‟s device. 3. Use robust security software that employs a 2. Escalate Privileges: requires the attacker to layered approach to block known threats as well grant himself higher privileges. as brand new threats that haven‟t yet been seen.

3

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

2. Identify Backup, snapshot & DR system: When [6] Valach, Anthony P. "What to Do After a ransomware has granted to enter into victim‟s Ransomware Attack." Risk Management 63.5 (2016): device then have to find out the location of 12. backup, snapshot etc so it can easily attack on [7] Jakobsson, Markus, and Zulfikar data. Ramzan. : understanding new attacks and 3. Identify mission critical system & data defenses. Addison-Wesley Professional, 2008. 4. Identify app distribution system 5. Deploy ransomware, leave network, wait for [8]https://www.ransomware+diagram&oq=ransomwa ransom to be paid. re+diagram&gs_l=serp [9] J. Walter. Meet tox: Ransomware for the rest of CONCLUSION AND FUTURE- us. https://blogs.mcafee.com/mcafee-labs/meet-tox- WORK: ransomware-for-the-rest-of-us/, 2015. [10] H. Weisbaum. CryptoLocker crooks launch This paper indicates the brief details of crypto- „customer service‟ site. Ransomware and how ransomware act as a http://www.cnbc.com/id/101195861, 2013. malware. Ransomware is a malicious software that attacks on victim‟s confidential data. This [11] Co, Carl, et al. "Mechanism of action network Encrypted data can‟t be decrypted till now. The attachment to moving membranes: barbed end future enhancement of this paper is how to capture by N-WASP WH2 domains." Cell 128.5 protect or provide some security tool/software (2007): 901-913. from ransomware. So, Function of future work is decryption of encrypted data.

REFERENCES

[1] Andronio, Nicoló, Stefano Zanero, and Federico Maggi. "HelDroid: dissecting and detecting mobile ransomware." International Workshop on Recent Advances in Intrusion Detection. Springer International Publishing, 2015.

[2] Scaife, Nolen, et al. "Cryptolock (and drop it): stopping ransomware attacks on user data." Distributed Computing Systems (ICDCS), 2016 IEEE 36th International Conference on. IEEE, 2016.

[3] Constantin, Lucian. "CryptoWall ransomware held over 600K computers hostage, encrypted 5 billion files." PC-World. Tomado de www. pcworld. com/article/2600543/cryptowall-heldover- halfamillion-computers-hostageencrypted-5-billion- files. html (2014).

[4] Atul Kumar, Sr. Analyst ,Chiranshu Ahuja, Sr. Analyst : Cyber Security Research Developments

[5] Luo, Xin, and Qinyu Liao. "Ransomware: A new cyber hijacking threat to enterprises." Handbook of research on information security and assurance(2009): 1-6.

4

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 Card Payment System Using By NN

ADR. RAMESH PATEL B DARMSINGH RAGHUMANSHI A Principal , M.A.Parikh Fine Arts& Arts College , Palanpur , B.K,Gujarat. [email protected] B Lecturer Govt.Poly.college , Sonaghatti Betul M.P. [email protected]

Abstract: Companies and institutions move parts of their fraudulent transactions. Fraud detection technologies business to bee grow, the entire business, towards online enable merchants and banks to perform highly services providing e-commerce, and fund Transfer , automated and sophisticated screenings of incoming information and communication services for the purpose of transactions and flagging suspicious transactions. allowing their customers better efficiency, stability and accessibility. Regardless of location, consumers can make the II FRAUD DETECTION same purchases as they previously did “over the desk” on his. The evolution is a big step forward for the Improve efficiency, accessibility and profitability to each point of view There are some occasions when the transaction but it also has some drawbacks. The evolution is most made by algal user is of a quite different and there are efficient accompanied with a greater to vulnerability threats. also possibilities that the illegal person made use of The problem with making business through the using Internet card that fit into the pattern for what the neural network lies in the fact that neither the card nor the cardholder needs to is trained. Although it is rare, yet If the legal user can’t be present at the point-of-sale. It is therefore impossible for complete a transaction due to these limitation then it is the merchant to check whether the customer is the genuine not much about to worry But what about the illegal cardholder or not. This problem is many time in over the world through Account Payment card. person who is making use of card , hare also work human tendency to some extent when a illegal person Companies and institutions loose huge amounts gets accredit card he is not going to make use of this annually due to fraud and fraudsters continuously seek card again and again by making number of small new ways to commit illegal actions and to be transaction rather he will try to made as large purchase continuing. The good news is that fraud tends to be as possible and as quickly that may totally mismatch perpetrated to certain patterns and that it is possible to with the pattern for what the neural networks trained. detect such pattern all so good and efficient, hence fraud. In this paper we will try to detect fraudulent 1. The prediction probabilities are sorted transaction through the neural network Naive Bayesian in descending order. algorithm. Find the transaction calcification which are 2. The sorted list is divided into 10 segments legal and fraudulent transaction using data cauterization (deciles). of regions of parameter value. 3. Count the number of actual hits (actual responders in the modeling dataset) in each Keywords: Data mining. Neural network, E- docile. Commerce, Naive Bayesian algorithm 4. Calculate the random expectation per docile by dividing the total number of actual responders I. INTRODUCTION by 10. This means that 10 percent of the total responders are expected in each decile. If the Credit Card Fraud is one of the biggest threats to percentage of hits exceeds the random business establishment’s today. However, to combat the expectation, the model provides a lift in that fraud effectively, it is important to first understand the decile (over random expectation). mechanisms of executing a fraud. Credit card fraudsters employ a large number ormolus operandi to commit fraud. In simple terms, as While fraudsters are using III NAÏVE BAYESIAN CLASSIFIER sophisticated methods to gain access to credit card Algorithm information and perpetrate fraud, new technologies are available to help merchant’s to detect and prevent 1. Check for base cases 1

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

2. For each attribute a and cybernetics, Shanghai, 26-29 August,1191 3. Find the normalized information gain from splitting – 1193, 2004. on a 4. Let a_best be the attribute with the highest [4] Friedrich Leisch1 and Bettina Gr un2, normalized information gain “Extending Standard Cluster Algorithms to 5. Create a decision node that splits on a_best Allow for Group Constraints”, Compstat 2006, 6. Recur on the sublists obtained by splitting on a_best Proceeding in Computational Statistics, and add those nodes as children of node Physica verlag, Heidelberg, Germany,2006

[5] J. MacQueen, “Some method for classification Dataset and analysis of multi varite observation”, University of California, Los Angeles, 281 – 297.

[6] Maria Camila N. Barioni, Humberto L. Razente, Agma J. M. Traina, “An efficient approach to scale up k-medoid based Training data Naïve Bayesian classifier Posterior probabilities algorithms in large databases”, 265 – 279.

[7] Michel Steinbach, Levent Ertoz and Vipin Figure: 1classifier on all attributes in dataset Kumar, “Challenges in high dimensional data set”, International Conference of Data IV CONCLUSION management, Vol. 2,No. 3, 2005.

[8] Parsons L., Haque E., and Liu H., “Subspace As indicated above, there are many ways in which clustering for high dimensional data: A fraudsters execute a credit card fraud. As technology changes, so do the technology of fraudsters, and thus review”, SIGKDD, Explor, Newsletter 6, 90 - the way in which they go about carrying out fraudulent 105, 2004. activities. Frauds can be broadly classified into three [9] Rui Xu, Donlad Wunsch, “Survey of categories, traditional card related frauds, merchant Clustering Algorithm”, IEEE Transactions on related frauds and internet frauds. A major area of Neural Networks, Vol. 16, No. 3, may 2005. concern is the issue of privacy.Consumers is hesitant to use online business because they often have limited [10] Sanjay garg, Ramesh Chandra Jain, “Variation guarantees about the privacy of their information. If of k-mean Algorithm: A study for High concerns like these can be reduced, electronic Dimensional Large data sets”, Information commerce can play a positive role in helping improve Technology Journal5 (6), 1132 – 1135, 2006. the world of business. [11] Vance Febre, “Clustering and Continues k- REFERENCES mean algorithm”, Los Alamos Science, Georgain Electonics Scientific Journal: [1] Dechang Pi, Xiaolin Qin and Qiang Wang, Computer Science and Telecommunication, “Fuzzy Clustering Algorithm Based on Tree vol. 4, No.3, 1994. for Association Rules”, International Journal of Information Technology, vol.12, No. 3, [12] Zhexue Huang, “A Fast Clustering Algorithm 2006. to Cluster Very Large Categorical Data Sets in Data Mining”. [2] Fahim A.M., Salem A.M., “Efficient enhanced k-means clustering algorithm”, Journal of [13] Prof. Brian D. Ripley, “Study of the pure Zhejiang University Science, 1626 – 1633, interaction dataset with CART algorithm”, 2006. Professor of Applied Statistics

[3] Fang Yuag, Zeng Hui Meng, “A New [14] Brin, S., Motwani, R., Ullman Jeffrey D., and Algorithm to get initial centroid”, Third Tsur Shalom. Dynamic itemset counting and International Conference on Machine Learning implication rules for market basket data. SIGMOD. 1997. 2

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

[15] Nathan Rountree, “Further Data Mining: Buildinm Decision Trees”, first presented 28 July 1999. [16] Yang liu, “Introduction to Rough Set Theory and Its Application in Decision Suppot System”

[17] Wei-YIn loh, “Regression trees with unbiased variable selection and interaction detection”, University of Wisconsin–Madison.

[18] S. Rasoul Safavian and David Landgrebe, “A Survey of Decision Tree Classifier Methodology”, School of Electrical Engineering ,Purdue University, West Lafayette, IN 47907.

[19] David S. Vogel, Ognian Asparouhov and Tobias Scheffer, “Scalable Look-Ahead Linear Regression Trees”.

[20] Alin Dobra, “Classification and Regression Tree Construction”, Thesis Proposal, Department of Computer Science, Cornell university, Ithaca NY, November 25, 2002

3

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

YOGA AS A TOOL OF FASHION

Dr. Roshni Rawal Assistant Professor, Humanity Department, SALITER, Sal Technical Campus, Ahmedabad, Gujarat (INDIA) Email id: [email protected]

Abstract The paper underlines the emergence of international recognization of yoga and meditation as a demand for fashion. Yoga emerged as a latest tool for fashion and adopted as well as accepted worldwide. The paper depicts some recent trends in Yoga and Fashion. It shows the co-relation between both. Yoga and meditation opens the new vista for fashion industry to think in another direction of innovation from the roots of ancient India.

Conclusion: - Yoga not only gives popularity to fashion world but benefit it in economic terms at large scale for long period.

Key words: - Fashion, Yoga, Meditation.

INTRODUCTION

Business of Fashion technology is increasing day by day. Now days, fashion is related to social status also. There are various new sectors emerges in fashion industry. They are very innovative and incredible sectors, which gives new horizon to fashion world. Yoga and Meditation is one of them. From the day Yoga relate with fashion industry, it opens the new vista for it.

It provides a new and fresh view towards health in relation with fashion. Fashion itself related with new trends of the world and Yoga is the latest trend among those. After introduction of this concept, individuals are having a new view towards fashion and Yoga. They are taking it in a very positive manner and that is the reason that make it very popular, not only in India but in foreign countries also.

WHAT IS “YOGA” AND “MEDITATION”

In and itself this word “Yoga” means Union. Technically it is the union of the individual self with the universal cosmic self and the transcendence of the entire thing although obviously not simple as that. 1

Basically Yoga is an exercise to unite self with the supreme. Meditation is another can be said as the extended part of Yoga. Meditation is done for the discipline for deep self – exploration and transformation used for intense self –exploration, it is the best viewed component of a process demanding and producing a thoroughgoing transformation of all the aspect of life and thought.2

1

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

RECENT TRENDS IN YOGA

Yoga originated in India more than 5000 years ago. Yoga and Meditation is an ancient Indian discipline, but it seems to get popular and hotter now a days. Recently Yoga is used as a fashion tool all around the world.

Fitness professionals ranked Yoga among top 10 trends for 2014-2015 in survey for the American college of Sports medicine.3

There are various recent trends in Yoga and Meditation, as follows:-

1) POWER YOGA: - More formally called “ Vinyasa”. Power Yoga has remained popular across the country for much of the last decade. Vinyasa Flow is an exceptionally athlete form of Yoga, moving you through a sequence of fluid, dance – like poses. Synchronized breaths and movements help energize and strengthen the body. 2) DEEP MEDITATIVE YOGA: - While all Yoga practices emphasize spiritual and mental well- being, these classes focus on meditation, deep breathing and restorative poses. 3) DOGA: - This practice takes downward dog (a Yoga pose) to a completely new level. In Doga, dogs and human works as a single unit on the mat. Pet owners help position their dogs in various poses. Doga classes help strengthen the bond between human and dog. 4) BEACH YOGA: - YOGA at the beach is especially revitalizing – imagine meditating to the rhythmic sound of water meeting the shore. Plus, practicing on an uneven send surface helps tone secondary muscles. 5) AERO YOGA: - This practices blends acrobatics and yoga with a series of dynamics aerial postures. Devotees claims it improves balance and overall body strength while forgoing stronger human connections.4 6) TRAVEL YOGA: - People practices yoga at airport to relieve travel stress. 7) DESERT YOGA: - It is the yoga practices in desert. 8) DISCO YOGA: - In this yoga wireless headphones mat asana are there. 9) YOGA JOES: - The next generation boys may play with Yoga Joes instead of G.I.Joes. 10) WATER YOGA: - Six aqua yoga poses are there. 11) YOGATHON PARTY: - A Yogathon seva party to benefit Cancer patients. 12) BREAKTI: - A new trend to try Breakti (Yoga + Break dancing). 13) NEW YOGA WEAR: - From Mandulka to Beyonce and top shop, here are five new collections worth exploring this year. 14) WHITE WEAR FOR YOGA: - Five Kandalin inspired ways to wear white. 15) YOGA AS A TOOL: - Yoga as a strategic tool for stress + trauma. Police officers, fire fighters and others, who face extreme stress and trauma on a regular basis, can find peace in asana, breath and affirmation.5

2

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

RECENT TRENDS IN FASHION Fashion is now related to our day to day life. As soon as Globalization enters into this fashion world, it gives the customers access to new style at very affordable price. There are various styles and fashion are available in the world. Let’s have a summarized glance over it:- 1) POINTED BOOTS, MEXICO: - Guarachero boots- which features extremely pointed toes and worn by men in rural Mexico- have now found their way to mainstream fashion. 2) EYEBALL TATTOOS, CANADA: - If you thought coloured contact lenses were extreme , then get a load of this people are dyeing their eyeballs all sort of colours. This procedure was originally prescribed for people with scratch- marked eye tissues to improve their vision. 3) BEAN SPROUT HAIR CLIPS, CHINA: - A popular social media and street fashion in China are bean sprout hair clips. These plastic springs of greenery are sold by street vendors and are worn antennae style in one’s hair. And they aren’t just for women and kids, men are wearing them too! 4) LOLITA FASHION, JAPAN: - This is a fashion subculture popular in Japan in which girls dress up in Victorian- inspired attire like corsets, floor- length skirts, blouses, knee-high socks, stockings and head dresses. There are types of Lolita style- Gothic Lolita (a combination of Gothic and Lolita fashion) sweet Lolita (influenced by Victorian and Edwardian clothing), classic Lolita( inspired by Regency and Victorian styles) and old school Lolita( a version of any current sub – style of Lolita fashion). 5) HITLER, THAILAND, BANGKOK: - There are Hitlerized versions of all sort of things from T- shirts to pandas and even Teletubbies being sold in the city. 6) INDIAN HANDLOOMS: - Indian handlooms are known for their richness, exquisite designs, variety and fine quality. They have been an integral part of Indian culture since ages. Apart from the six yards , these traditional prints and material have got a modern twist and now features on sandals, sling bags, folders and even greeting cards. There are incredible fashion material available in Indian market for clothes like makhmuls and tugsar of Madhubani, bandhani of Rajasthan, Bagh print of Madhya Pradesh, Kalamkari of Kashmir, Baluchari of Bengal, Warli of Maharstra, Sambalpuri of Odisha etc.6 Other than this if we talk about Denim, it become the first choice for everyone for fashion. It is a very convenient thin fabric with stylish look. All age group people are using it. Stylish Reena Shah says that you can do various experiment with Denim, according to Gujarat Samachar on 5th March 2016. I India to showcasing the potential of design, innovation and sustainability across India, manufacturing sectors in the coming decade through “Make in India week”

3

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

CO- RELATION OF YOGA AND FASHION

Due to Globalization, Fashion becomes more popular among common people. Fashion includes many things. It not only deals with footwear, hairstyle, jewellery, cosmetics etc. but it deals with gym, beauty treatment, Yoga etc. also it is related with outer look of the body, which is an important aspect of fashion. In today’s world everything is directly or indirectly related with fashion. Anything that is odd one out is known as “Fashion”.

Whenever we talk about Fashion’s other aspects (which is more related to the inner aspect of the body) like Yoga, Meditation etc. which is used to build the body in shape and more attractive and suitable for fashion.

India is richer than any other country in this aspect (yoga and meditation). And even now, it become trend and followed by many people all over the world, which make it “Fashion”.

In today’s Globalized overstressed and luxurious lifestyle every person is in the race of be a winner. Where person want to be not only be the participants but stand outstanding and be the winner. For that a person should be strong and beautiful enough from outer as well as inner part of the body. Yoga and meditation is best solution for that.

“Ancient Yoga joins hands with Modern Science in helping mental men to grow further and transform gradually into a Supermental Being” - T.R.Anantharaman, Ancient Yoga and Modern Science(1996;92-93)

In this Fashion world, Yoga and Meditation provides outer as well as inner beauty to a person. For this particular aspect the whole world is looking at India’s ancient heritage. In ancient India, people use this power to make themselves empower from inner, but now a days it uses as “Fashion”.

In India Baba Ramdev and Shilpa Shetty are known as fashion icon. Caulfield is the author of an upcoming book called “ Is Gwyneth Paltrow wrong about Everything?”He says there is no doubt that the culture surrounding Yoga including celebrity endorsements and those flattering pants- explains much of the appeal.7 It clearly show the popularity of Yoga in Fashion.

CONCLUSION AND SUGGESTIONS

CONCLUSION

There are various trends in Fashion world followed by many people. Yoga is used as a latest fashion tool, all over the world, adopted and accepted worldwide. There is an emerging demand for Yoga and Meditation in Fashion industry. It not only gives popularity to Fashion world but benefit it in economic terms at large scale for long time of period. There are renowned Yoga-

4

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 fashion icons, who make this sector more popular. It opens the new vista for fashion industry to think in other direction of innovation from the roots of ancient India.

SUGGESTIONS

1) This emerging sector should be promoted by Government of India, so that we can turn these profits towards our economic benefits. 2) It should be promoted in such a manner that it directly lead to Indian tourism. As it emerges from the roots of ancient India, if it will link to Indian tourism with lucrative promotion, it will give us maximum return in terms of financial aspect. 3) We should adopt it but not only as fashion but as a habit. That ultimately benefits us in long term and makes us competent enough to Globalized world.

REFERENCE (1) Joseph S.Alter, “Yoga in Modern India”, The body between Science and Philosophy, Princeton University Press, Princeton and Oxford , Historicizing Yoga , Chapter 1;objective as search; page 10 (2) Roger Walsh1, “Mediation Practice and Research “; Social Science And Medicine, Volume 65 issue 1 July 2007, page 112-124. (3) www.usatoday.com/story/news/nation/2015/03/01/yoga-health-fitness- trends/23881391/ (Accessed on 2016-10-13) (4) http://Protips.dickssportinggoods.com/tips/yoga-checklist/workout-ideas- alternatives-types-of-yoga/ (Accessed on 2016-10-13) (5) www.yoga-journal.com/caterogy/lifestyle/yogatrend/page/2/ (Accessed on 2016- 10-14) (6) http://timesofindia.indiatimes.com/life-style/fashion/buzz/quirky-twist-to-dest- weaves-prints/articleshow/51423357.cms (Accessed on 2016-10-15) (7) www.usatoday.com/story/news/nation/2015/03/01/yoga-health-fitness- trends/23881391/ (Accessed on 2016-10-15)

5

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

E-WASTE CRITICAL ISSUE FOR ENTIRE WORLD Prof. (Dr.) Subhash Desai SAL Institute of Technology and Engineering Research Opp: Science City, Village – Bhadaj, Ahmedabad – 380 060 E-mail: [email protected]

ABSTRACT: In India day by day use of electronic items and goods are increasing. Hence, amount of e-waste is also increasing rapidly. In near future in India, e-waste may become dumping ground. It is natural because 105 countries of the world are dumping their waste towards India.

Looking at this situation, by 2020 eight million ton e-waste will be collected in India. Items purchased few days ago are getting obsolete due to rapid change in technology. Electronics devices are going into wastage within months. This trend is increasing day by day and hence the problem will become critical and very difficult to handle it. It will lead to health problems for people and environment due to its adverse effects. Keywords: Computers, E-waste, Electronics Devices, Human health

World Scenario on E-waste: Every hour fashion is changing in PARISH and likewise every hour computers are changing in USA. By the time you bring computer at home, one may find that beautiful and more powerful computer is now available in market. This indicates the growth of computer technology is very high. It is true also. But problems are equally moving fast near us. [2]

There are 500 million computers are old and outdated in USA itself and waited to be placed in garbage. In addition to computers, TV, VCR, Tape Recorder, Video Camera, Cell phone, Washing machines, and other household appliances are extra.

As per International agreement, these devices (mechanical or electronics) are to be upgraded and to be reused. There could be another possibility to recycle these items. To save cost of recycle these items in terms of valuable $(dollars), USA and other European countries are dumping the e-waste in CHINA, PAKISTAN and INDIA.

1

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

Indian Scenario on E-waste: [1] To import e-waste from other countries is restricted in India. However, it is being imported under second hand PCs. There are many buyers for second hand PCs in NEW DELHI. They buy color monitor PC in 10 to 15$ per piece and separating all its parts and sell it at 40 to 50$. Some of clever business people will buy second hand PCs at price per kg and earn large profit.

Parts of PC will have many chemical components which produce dangerous pollutions. Business people may not aware of it today. However, knowledgeable people are saying that in next 2-3 decades not only voice, water, and petrol pollution but e-waste will be big headache to mankind.

There was 3.3 lac ton e-wastage in India in year 2007 and additional 50,000 ton e-wastage was brought illegally. Only 5.7% of it was recycled. As per study done by IMRB International e- technology group on e-waste, it is estimated 6.5 lac ton by 2020. Lead is very dangerous substance element. If you open TV or computer monitor then you get 2 kg lead.

Observations: During the year (2013) it is estimated about 350 million TV and computer monitors will be useless. Hence, 700 kg lead is released for spreading pollutions. USA government’s environment protection agency has kept lead of cathode tube of monitor in harmful category. Separating lead activity will not be done in USA. To avoid the responsibility, selfish manufacturers of USA are diverting these monitors to India. [1]

Average life of computer in India is 4 years whereas life of computer in USA is just one year. Spokesman of Toxic link private agency in Mumbai made a statement that “Even western countries are in confusion to solve e-waste problem. The process of recycling is complex and expensive. It requires hardworking and trained staff. Today people who are available in this field are not having enough money and good staff is missing.”

As per IT Hardware association MAIT, there are various reasons responsible for low recycling operation in India. Converting new products from old electronics goods and reuse it is low.

2

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

There is no sufficient infrastructure to recycle process. ‘e-waste’ recycling is limited to small scale industries. These small units have poor technology and having limited capacity. Due to this reason, pollution is spreading in the environment. E-waste includes electronics products whose life is almost over. [3]

There was an attempt to verify e-waste assessment and its management by more than 200 corporate houses and about 400 householders. Government should check role of each vendor, customer, recycler, and regulator for eco-friendly solutions. Working model is to be created based on analysis and findings.

There were only 6.5 lac PCs in year 1996 and today it is almost 6.25 cores. Majority of MNC branded computers are assemble in India. When these branded PCs are obsolete then responsibility to recycle it is also with respective company. But due to silent law of India, multinational companies are escaping from their responsibility. These companies also do business in USA and they are not running away from their responsibility in USA. Useless PCs are being dump in India under the name of “Re Sell”.

E-waste components and human health: [4] Computer circuits and battery have large amount of lead. It will have mercury, hexavalent chromium, and plastic components in major parts of PC. The plastic contains polyvinyl chloride which produces pollution. Some of the circuits will have bromine flame retradence which is agent for stomach diseases. If this element goes into pregnant woman then their milk will not be healthy for their babies. It was seen more in mothers residing in California area.

Components like gold, silver, copper, aluminum, iron and some extent plastic may be utilized from garbage PCs. whereas barium, platinum, cobalt, and nickel cannot be separated from parts of PCs. These harmful parts to be put under ground at remote places. So it will not become origin of pollution. We have in Raigadh, Gujarat, and Andhra Pradesh such unutilized land which is used for giant garbage collection center. On long run, this e-waste will damage land and trees around it. Lead is very very harmful for human body and upset central control system in brain. There is cadmium

3

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 in computer chips and if enter in human body then it will create kidney problems. Mercury is also harmful for brain and kidney. Mother board of PC is made with barium element which will cause cancer to lungs and skin diseases.

Research indicates that even you are in touch with barium today; it can create physical problems in years to come. Computer printer cartridge contains black carbon powder which while breathing can reach and bring cancer in lungs. If you burn plastic then it generates dangerous dioxin gas. Hence any process to destroy e-waste is likely to do adverse effects on human lives.

Conclusion: Appliances kept in garbage if they are yet durable then there is possibility of reusing them. Government has made rules for this matter. Environmental department feels that there is violation of these rules. Hence, there is need of concrete steps to control e-waste issue on immediate basis. If steps are not taken soon then, it will result in serious problems for next generation.

Indian government is thinking of e-waste generated within the country but question of control remains for e-waste coming from other countries. The same situation for pharmaceutical drug items as well. We hope for steps by respective government departments at the earliest.

It is observed that almost 94% of corporate houses do not have policy to dispose of e-waste or ICT products. It is also seen that most of the home appliances like TV, PC, CD player, Camera, or mobile handset are given to small kids, neighbor, or friends. There is no proper arrangements in big city like Mumbai, Delhi, Kolkata, and Chennai for e-waste and thus spread on ground where ever they can find place. [5]

For protection of environment due to e-waste problems in year 1992, 159 countries have signed the agreement. The main purpose was to avoid e-waste dumping from developed countries to under developed countries. But as on today, USA did not sign it because their motive is bad.

4

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

Experts say that in India every 1.5 years, life of computer is reducing. There is new software which is not running on old computers. Hence, people are scraping their old PCs and tempted to buy new PC. As per report by Toxics Link, places like Delhi, Mumbai, Bangalore, Kolkata, Hyderabad, and Chennai new industry (business) emerged to separate parts of PC and dispose it. [5]

It is therefore suggested to have permanent solution to handle e-waste for healthy and prosperous life for human beings. We are already affected by global warming and other environmental problems. We are working against nature which is likely to damage us very soon due to cumulative climate change effects. So “JAGO…JAGO…JAGO” to save ourselves.

References [1] Gujarat Samachar daily news paper dated 04/08/2013. [2] Braddock, S.E., O'Mahony, M. (1998), Techno Textiles Revolutionary Fabrics for Fashion and Design, Thames & Hudson, London, [3] Brown, S. (1990), "The wheel of retailing: past and future", Journal of Retailing, Vol. 66 No.2, pp.143-9.

[4] Dicken, P. (1998), Global Shift: Transforming the World Economy, 3rd ed., Paul Chapman, London.

[5] Williamson, Stephen and Randall Wright (1994) “Barter and monetary exchange under private information” American Economic Review 84, 104-123

5

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

EFFECT OF SPORTS TRAINING ON SELECTED VARIABLES OF PHYSICAL FITNESS ON HANDBALL PLAYERS

Dr. Hemraj D. Patel Sports Officer Institute of Technology & Management Universe, Vadodara.

ABSTRACT

Handball is also known as team handball, Olympic handball, European team handball, European handball, or Borden ball is a team sport in which two teams of seven players each six outfield players and a goalkeeper pass a ball to throw it into the goal of the other team.

In this paper the strength improvement parameters of handball playing players is studies and explained in detail. The parameters include Shoulder Muscles, Leg Muscles, abdominal muscles, cardiovascular endurance speed and agility.

INTRODUCTION

Handball is also known as team handball, Olympic handball, European team handball, European handball, or Borden ballis a team sport in which two teams of seven players each six outfield players and a goalkeeper pass a ball to throw it into the goal of the other team. A standard match consists of two periods of 30 minutes, and the team that scores more goals wins.

Modern handball is played on a court 40 by 20 meters (131 by 66 ft), with a goal in the centre of each end. The goals are surrounded by a 6-meter zone where only the defending goalkeeper is allowed; the goals must be scored by throwing the ball from outside the zone or while "diving" into it. The sport is usually played indoors, but outdoor variants exist in the forms of field handball and Czech handball (which were more common in the past) and beach handball (also called handball). The game is quite fast and includes body contact, as the defenders try to stop the attackers from approaching the goal. Goals are scored quite frequently; usually both teams score at least 20 goals each, and it is not uncommon for both teams to score more than 30 goals.

Team handball is a fast-paced, physically demanding game that combines elements of soccer and basketball. Handball is an Olympic contact sport that requires a high standard of preparation in order to complete 60 mines of competitive play and thus to achieve success. Hence, physical characteristics of players have become major fields of interest for many trainers and sport scientists. In response to different offensive and defensive situations, players have to develop aerobic and anaerobic capacities as jumping, feinting, blocking, sprinting and throwing (Gorostiaga et al 2007). Those characteristics are considered as important aspects of the game that contribute to the high performance of the team (Marques & Gonzalez 2006). Furthermore, anthropometric parameters are also considered as one of the biological determinants of performance. Marques and Gonzalez (2006) demonstrated appropriate morphological structure in top handball is highly beneficial especially in terms of

1

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

efficient execution of individuals kills related to individual playing positions. Therefore, in top-quality team handball it would be sensible to select players whose morphological profiles are most compatible with positional specificities in the demands of the game (Srhoj, Marinovic and Rogulj 2002).

Rannou, Prioux, Zouhal and Delamarche (2001) found that in the game, the players perform different tasks with different physical demands depending on their playing position. Indeed, wings seem to cover the longest total distance and the longest distances while sprinting, while backs seem to execute the largest number of throws13. Studies examining top-level players have shown that backs are the tallest players with the largest arm span; wings are the shortest players of the team, while pivots are the heaviest with the highest body mass index (Ohnjec, Vuleta,MilanoviW and Grow 2003).

However, no study investigated whether there are any differences among playing positions according to axes and lines. Recent changes to the game rules and the implementation of the “fast centre” have placed greater tactical demands on handball players. This finding relates to the attack end conduction after interchanging of position. The conduct of attacks by players of the same axis or lines depends on their ability to adjust their behaviours to the changes that occur over time in the offensive context of the handball game. In fact, the left rear can change the three positions in the backline and even a player of the front base.

METHODOLOGY

Selection of Subject:

To achieve the objectives of this study 16 male handball players selected for inter-university participation were selected as the subject. Age of the selected group was ranging from 17 to 23. A five weeks training was given.

Data regarding selected variables were taken prior to the training and after the completion of the training.

Criterion Measure:

No Variables Test Unit of Measurement Strength of Shoulder Pull ups No. of pull ups in one 1 Muscles attempt Strength of Abdominal Seat ups No. of seat ups in one 2 Muscles minute Explosive Strength of Standing Broad Jump cm. 3 Leg Muscles 4 Speed 50 M Dash Sec. 5 Agility 30‟ Shuttle Run Sec. Cardiovascular 1.5 Mile Run Test Min. & Sec 6 Endurance

2

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

RESULT OF THE STUDY AND DISCUSSION

For the analysis of collected data„t‟ test was applied to compare the pre-test and post-test means. Table – 1

Table showing pre-test and post-test mean, mean difference and ‘t’ value Of selected variables

No Test Variables Mean Mean Difference ‘t’ Strength of Pre-test 15.63 1 Push Ups 2.06 3.87* Shoulder Muscles Post-test 17.69 Strength of Pre-test 18.38 2 Seat Ups Abdominal 2.56 4.34* Post-test 20.94 Muscles Explosive Pre-test 2.03 Standing 3 Strength of Leg 5.00 5.57* Broad Jump Post-test 2.08 Muscles Pre-test 6.93 4 50 Yard Dash Speed 0.02 0.71 Post-test 6.91 Pre-test 15.51 5 Shuttle Run Agility 0.18 1.79 Post-test 15.33 Cardiovascular Pre-test 10.32 6 Distance Run 0.43 3.58* Endurance Post-test 09.43 „t‟ 0.05 (15) = 2.131

It is evident from table – 1 that the calculated„t‟ value of strength of shoulder muscles, strength of abdominal muscles, explosive strength of leg muscles and cardiovascular is significant at 0.05 level of significance. Whereas the calculated„t‟ value of speed and agility is insignificant at 0.05 level of significance. The detail can be elaborated through graph-1.

Graph – 1 Graph showing the pre-test and post-test means of selected variables of physical fitness of handball players

3

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

CONCLUSION

It was observed that strength of shoulder muscles, strength of abdominal muscles explosive strength of leg muscles and cardiovascular endurance were improved significantly with the training whereas there was no significant change observed in speed and agility. A more specific training programme can be design to improve speed and agility.

REFERENCE

 Gorostiaga, E., Granados,C., Ibanez, J., Gonzalez-Badillo, J., &Izquierdo, M. Granados, C., Izquierdo, M., Ibanez, J., Bonnabau, (2007).Differences in physical fitness and throwing velocity among elite andamateur female handball players. International Journal of Sports Medicine, 28 p. 850-867

 Fabrica, G., Gomez, M., &Farina, R. (2008). Angle and speed in female handball penaltythrowing: effects of fatigue and player position. International Journal of Performance Analysis in Sport, 8 (1) p. 56-67.

 Ohnjec, K., Vuleta, D., MilanoviW, D., & Grui W, I. (2003). Performance indicators of teams at the 2003 world handball championship for women in Croatia. Journal of Human kinetics, 35 p. 109-118.

 Buchheit, M, Bishop, D, Haydar, B, Nakamura, FY, and Ahmaidi, S. (2010). Physiological responses to shuttle repeated-sprint running. International Journal of Sports Medicine, 31p. 402-409.

 Lohman TG. (1981). Skin folds and body density and their relation to body fatness a review. Human Biology, 53 p. 181-225.

 Lidor, R., Falk, B., Arnon, M., Cohen, Y., & Segal, G. (2005). Measurement of talent in team handball: thequestionable use of motor and physical tests. Journal of Strength and Conditioning Research, 19 (2) p. 318-325.

 Marques, M., & Gonzalez-Badillo, J.( 2006): In-season resistance training and detraining in professional team. Journal of Strength & Conditioning Research, 20(3) p. 563-571

 Jens Bangsbo, F. Marcello Iaia and Peter Krustrup, (2008) The Yo-Yo Intermittent Recovery Test: A Useful Tool for Evaluation of Physical Performance in Intermittent Sports. Sports Medicine, 38 (1) p. 37-51.

4

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 Cloud Computing: A Boon to Computer Society

Krupali Mistry1, Avneet Saluja2 1,2Assistant Professor, Department of Computer Science and Engineering, ITM Universe, Vadodara

Abstract- The cloud computing is a new computing privacy of a data will be disturbed, so it will be little model which provides a low-outlay, high accessible, bit risky for using as far as privacy concern, scalability, ease of use, ease of maintenance, reliability. replication time and cost also play an important role, Cloud computing is a set of resources and services such how fast can the data be replicated is important. as sharing of resources, network infrastructure, less IT Handling over the crucial data to another company are required for implementation. The cloud computing does not need to pay the cost for infrastructure, its that give jitters to some people, corporate users will installation. In this paper we will discuss about cloud definitely some extent in adopting cloud services as computing, features, architecture and benefits of cloud they can keep their company information under lock computing. and key, customers pay these companies as they are reliable in security measures. Otherwise they would Keywords: cloud computing; features; loose their clients, its their concentration to provide architecture; cloud security. best services to their clients. Figure 1 shows cloud computing services. I. INTRODUCTION

From the term “cloud computing” we can understand the telecommunication of Private Networks [1]. In cloud computing data access, computing, software and storage forces may not require the and awareness of physical location and system configuration, cloud computing is latest for those who will transform the from moveable devices to large data centre. The importance’s, and tie them to achieve highest output and will be able to solve large scale computation problems, cloud computing cooperate with superiority of forces and the prominent computing models of cloud, that is private, public, hybrid [2].

Cloud computing is a set of integrated and networked hardware, software and Internet infrastructure (called a platform).By means of the Internet for communication and transport provides Figure 1 Cloud Computing Services hardware, software and networking services to clients.These platforms conceal the intricacy and III. FEATURES OF CLOUD COMPUTING details of the inventive infrastructure from users and applications by providing very simple graphical  User will use the data, application or other interface or API (Applications Programming services with the help of browser regardless of Interface). the devices used and the user location [2]. Cloud computing is provides a low-outlay, highly  The infrastructure which is generally provided accessible, to make sure the security of data, high expansibility, more prominent mode of computing, the other party and it is accessed by internet, cost more attainable, ease of employ and ease of is minimised to significant level. continuance.  Its provides the low set-up outlay. II. CLOUD COMPUTING  Important services can be retained by using To define cloud computing, data will be accessed multiple websites which is usable for commerce from any location, so people thought that their purpose, and failure recovery. 1

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

 Enormous scalability. required any installing [5].Examples are SalesForce.com (SFDC), NetSuite, Oracle, IBM and  Blunder liberal & highly reliable. Microsoft [6, 9, 11].

 Intra- & Inter-cloud load balance. Cloud computing delivers Platform services for using the cloud infrastructure as a platform  Instantaneous application deployment. “Platform as a Service (PaaS)”. Clients are provided platforms access, which enables them to lay their  The suppleness and elasticity allows these own adapted software’s [8]. Examples are GAE, systems to scale up and down at will utilizing the Microsoft’s Azure [6]. resources of all kinds (CPU, storage, server capacity, load balancing, and databases). Cloud computing delivered the “Infrastructure as a Services (IaaS)” and provides a infrastructure  Sharing of resources amongst a maximum according to usage, with use of these services client collection of users. has not purchase any servers data centre or any network resources, as a result customer can achieve  Cloud computing scalability so its performance faster services with low cost [2]. Examples are can be monitored. GoGrid, Flexiscale, Layered Technilogies, Joyent and Mosso/Rackspace [6].  Security can be as superior as conventional systems. On the other hand, security still remains V. TYPES OF CLOUD COMPUTING an essential anxiety when data is quite SERVICES confidential [3,7]. Public Cloud: With the help of public cloud user can IV. ARCHITECTURE OF CLOUD access the cloud as much as they can and they have COMPUTING to pay only for there usage i.e pay-per-use, it can comparable to the internet bill in our homes Cloud computing system can be divided into two whatever we use the access the internet, only that sections: the front end and the back end [8]. They much. both are connected with each other through a network, usually the internet. Front end is what the h have to pay, this will help in IT cost reduction [2]. client (user) sees whereas the back end is the cloud of the system. Front end has the client's computer Private Cloud: A private cloud is used in with in the and the application required to access the cloud and infrastructure, the main usage of private cloud is that the back has the cloud computing services like we can sustain and deal with the security with in the various computers, servers and data storage. infrastructure and we can get the optimum result from it, in other language private cloud can compare Layers of Cloud Computing: is easily manageable [2].

The below figure shows the different layers of cloud Hybrid Cloud: As name defined hybrid means computing architecture [4]. mixture of two things, here also hybrid cloud is a mixture of public and private cloud, it will need Client private cloud for usage within the organization so we can use the public cloud. Application VI. BENEFITS OF CLOUD COMPUTING Platform Maintenance Easily: The maintenance of the Infrastructure infrastructure in hardware and software is easier, thus it is less hectic for the IT team also the Server application which required more space it will easier to use in the cloud environment as compare to using Figure 2 Layers of Cloud Computing the environment of its own. Architecture Instantaneous Software Updates: In cloud Computer software and hardware which based on cloud computing for reliable services collectively computing, no longer faced with choosing between called cloud client [5]. superseded software and high upgrade costs. When the application is web-based, updates occur A cloud application delivers “Software as a Services automatically - obtainable the after that we log into (SaaS)” [10] over the internet, an in that we don’t the cloud. When we access a web-based application, 2

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 we acquire the latest version - exclusive of needing However problems and challenges vary enterprise to to pay for or download an upgrade. enterprise and many of them can be solved by proper planning contracting and management of services Management Of Calamity: Cloud computing is very and mutual consciousness of client and service reliable when any disaster is about to come or it provider. happen, backup of all the data is remain offsite for future handling, it will also take backup of crucial VIII. CONCLUSION data because is always helpful. In this paper we have discussed a new wave in the Enhanced Performance: By means of little outsized field of information technology: cloud computing programs hogging your computer's memory, we will technology. We have also explain all the advantages, see better recital from your PC. Computers in a cloud features, about the cloud computing, also the computing system boot and scamper more rapidly architecture, there is no doubt cloud computing is because they have fewer programs and processes currently best technology that fulfil all the loaded into memory. requirement of business world. We can have approximately infinite computing capabilities, scalability, pay-per-use scheme and so on. However this wave still needs to resolve some of its existing issues with urgency.

REFERENCES

[I] John Harauz, Lorti M. Kaufinan. Bruce Potter, "Data Security in the World of Cloud Computing", IEEE Security & Privacy, Copublished by the IEEE Computer and Reliability Societies, July/August 2009.

[2] Yashpalsinh Jadeja, Kirit Modi, Pankaj "Cloud Computing - Concepts, Architecture and Challenges", International Conference on Green Computing: Due to large usage of the system, Computing, Electronics and Electrical harmful emission will be generated, electricity usage Technologies [ICCEET],2012, 877-880. will be larger so we can use cloud computing for ignoring all that, energy consumption is the main [3] "Are security issues delaying adoption of cloud drawback of this present day systems but by using computing?Networkworld.com.http://www.net the cloud computing we can save that energy at some workworld.com/news/2010/022210- extent [2]. virtualization-c1oud-security-debate.html.

VII. CHALLENGES [4] http://en.wikipedia.orglwikilCloud_computing

As all others data communication fields or [5] Peeyush Mathur, Nikhil Nishchal, "Cloud technologies cloud computing is also facing Computing: New challenge to the entire challenges. The mostly asked term is “security and computer industry", 2010 1st International privacy”, the issue associated with all related areas. Conference on Parallel, Distributed and Grid Though many risks can be eliminated through new Computing (PDGC - 2010). security software’s such as encrypted file systems and data loss prevention software. Hybrid cloud is [6] haskar Prasad Rimal, Eunmi Choi, "A also a solution but organisations are still need some taxonomy and survey of cloud computing specific workout to ensure privacy in their systems", 2009 Fifth International Joint enterprises. Conference on INC,IMS and IDC, published by IEEE Computer Society. Other challenge is the difficulties the contractual relationship as the integrated ecosystems of [7] "Security of virtualization, cloud computing providers to provide complete solution and divides IT and security pros ... practically it is hard to find solution in single http://www.networkworld.com/newsI201 contract. Challenges can be concluded in managing 0/02221 O-virtualization c1oud-security- the cloud and lock in dealing problems [14]. debate.html.

3

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

[8] Engr: Farhan Bashir Shaikh, Sajjad Haider,“ Security Threats in Cloud Computing” 6th International Conference on Internet Technology and Secured Transactions, December 2011.

[9] Amazon Elastic Compute Cloud, http://www.amazon.com/ec2

[10] Amazon Rolls Out its Visionary WebOS Strategy.[Online].Available:http://www.readwr iteweb.com/archives/amazon_webos.php

[11] Google App Engine, http://appengine.google.com

[12] Saleforce, http://www.salesforce.com/platform

[13] Ramgovind S, Eloff MM, Smith E, 'The management of security in cloud computing", IEEE – 2010.

[14] Leslie Willcocks, Will Venters, Edgar A. Whitley, Meeting the challanges of cloud computing", Accenture Outlook.html.

4

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

A SURVEY ON DATA COMPRESSION ALGORITHMS UNDER CRYPTOGRAPHY & SECURITY

Vipin Nagar* Kavita Tiwari** [email protected] [email protected] Neotech Technical Campus,Vadodara BITS edu Campus,Vadodara

Abstract:

Data compression is the process of encoding information using fewer bits (or other information bearing units) than an unencoded representation would use, through use of specific encoding schemes. Using this we can achieve reduced resource consumption and security of data as well. Data Compression may be categorized in following two categories. (1) Lossless Compression algorithms usually exploit statistical redundancy in such a way as to represent the sender’s data more concisely without error. (2) Lossy Compression is possible if some loss of fidelity is acceptable.Lossy schemes accept some loss of data in order to achieve higher compression .Lossy data compression is better known as rate-distortion theory.

Shannon formulated the theory of data compression. Lossless data compression theory and rate- distortion theories are known collectively as Source Coding theory.

1. INTRODUCTION

Data is defined as the raw facts, figures or (1) Lossless compression is the one which uses anything that is unprocessed .Data compression the statistical redundancy that occurs in the data is a technique in which the data/information is in such a way as to represent the sender's data encoded using fewer bits through use of more concisely without error. Lossless specific encoding schemes. Data compression compression schemes are reversible so that the can be seen as a technique in which one original data can be reconstructed objective is to minimize the amount of data to be stored or transmitted.Another objective may (2) Lossy compression is the one which is be treated as the security of data as well possible only in the case where some loss of becauuse the data is send in encoded form. Data fidelity is acceptable. .Lossy data compression Compression is useful because it helps in is better known as rate-distortion theory. Lossy reducing the consumption of resources, such as schemes accept some loss of data in order to hard disk space or transmission bandwidth. achieve higher compression. This paper discusses the theory of data compression. Claude E. Shannon formulated the theory of Now if we talk about Data compression, it data compression. Lossless Data Compression may be divided into following 2 categories: Theory and Rate-Distortion Theory are known collectively as source coding theory. Now we (1)Lossless (2) Lossy would discuss the Lossless Source Coding and Rate-Distortion Theory for Lossy Data We discuss them here. Compression.

1

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

2. LOSSLESS SOURCE CODING 2.2. Second-Order Block Code

It has its base in the block coding. To show Here pair of characters are mapped to either this concept, we consider a source of string in one, two, or three bits. which the set of alphabets consists of only two letters namely a and b : Table II

Table of Second-Order Block Code (1)

But it is sure that if ‘a’ occurred in the Codeword previous character, the probability that ‘a’ occurs again in the present character is 0.9. aa 0.45 0 Similarly, given that if ‘b’ occurred in the previous character, the probability that ‘b’ occurs again in the present character is 0.9. bb 0.45 10

An n-th order block code is just a mapping ab 0.05 110 which assigns to each block of n consecutive characters a sequence of bits of varying length. ba 0.05 111 . This can be shown by following 2 examples. R=0.825 bits/character 2.1. First-Order Block Code

Here each character is mapped to single bit.

Table I Figure 2. Showing original and compressed Table of First-Order Block Code data(Second –Order Block Code)

Using Table II we refer to Fig.2 and note Codeword that here 20 bits are used to represent 24 characters ---an average of 0.83 bits/character. a 0.5 0 What a decrease in consumption of bits/ character!!!! b 0.5 1 2.3. Formula R=1 bit/character Here we note that the rates shown in the tables are calculated from

(2) Figure 1. Showing original and compressed data ( First-Order Block Code) In (2) is the length of the codeword Using Table I we refer to Fig . 1 and note that here 24 bits are used to represent 24 for block . The higher the order, the lower characters -- an average of 1 bit/character. the rate that is better compression is achieved. 2

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

As we move to n Order Block Code the REFERENCES consumption of bits / character decrease significantly. [1] Willian M.Daley, Raymond G. Kammer, DES, FIPS PUB 46-3, Federal Information, We are only interested in lossless data Processing Standards Publication; 1999. compression code. That is, we are able to rederive the original data. All of the examples http://www.tropsoft.com/strongenc/des.htm given above are lossless. [2] Whitefield Diffie and Martin E. 3. RATE-DISTORTION THEORY Hellman,”Privacy and Authentication: An Introduction to Cryptography” in Proc. IEEE In lossy data compression, the decompressed vol 67, no 3, pp 397-427, 1979. data need not be exactly the same as the original data. So some amount of distortion is [3] W.B. Pennebaker and J.L. Mitchell, acceptable. A distortion measure specifies “JPEG: Still Image Data Compression exactly how close the approximation is. Standard”, Van Nostrand Reinhold, New York, Generally, it is a function which assigns to any 1993. two letters and in the alphabet a non- negative number denoted using [4] C. H. Kuo , C.F.Chen , and W.Hsia ,”A compression algorithm bassed on classified (3) interpolative block truncation coding and vector quantization”,Journal of Information Science Here, is the original data, is the and Engineering ,15:pp 1-9 ,1999. approximation, and is the amount of [5] David Saloman , “Data Compression”. distortion between and . The most common [6] C. E. Shannon, A Mathematical Theory of distortion measures are the Hamming distortion Communication. measure given as: [7] Sunder Rajan R, “An Efficient Operator based Unicode Cryptograpy Algorithm for Text, Audio and Video files”,in International (4) conference 2008.

[8] M. Nelson and J.-L. Gaily, the Data Compression Book. 4. CONCLUSION

We surveyed the data compression algorithms both loosy and lossless.Both the algorithms have their advantage in different situations.These algorighms not only minimize the amount of data to be stored or transmitted but also the security of data is strengthened .

3

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

Retention Incentives and Thoughts in Organisations

Mr. SANDEEP SHARMA Prof. B. K. NIRMAL Joint CEO, SCOPE, Education Department, Director, RBIMS Govt. of Gujarat, [email protected] [email protected]

Abstract

Introduction It is said that the biggest asset of any organization happens to be its human capital. More we honour it, more productive a company is. Almost any company or organization face the direct or indirect challenges of 3Rs - Recruitment, Retention and Resignation. For many organisations, recruitment is a lengthy, time consuming and judicious process. Apart from subject skill, the candidate is judged on many parameters. A lot of time, energy and money go into the combined effort. A new incumbent goes through induction programme, training programme, briefings, and thorough understanding of the work and organisation culture. However, when he/she resigns, the entire process recycles itself to accommodate another incumbent. To prevent this, many companies try to negotiate with the person with or without a retention policy in existence. They may succeed or fail in their efforts to convince the employee. The sad part of the story is that most of the companies or institutions even do not try or feel the need to talk to the outgoing employee. It leads to turbulent environment in the company and may turn into an avalanche some day. It also adversely affects the image of the organisation. Therefore, a good and effective retention policy is must for sustainable survival of any company /institute/organisation.

Objective Please consider the following flowchart of the journey of an employee from recruitment to resignation and how a turn towards retention may come in the path.

Time and

Money Effective Retention Policies Retention Recruit Resig A good employee efforts ment natio Yes retained made ? n

No A good employee lost 1

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

A good retention policy is generally succeeded to retain the employee. On the other hand, retention of each and every employee is not needed - sometimes for the benefit of the company and sometimes for the benefit of the employee.

The objective of this paper is to study the best and working retention methodologies adopted by the companies and organisations including PSUs and government sector. The paper also discusses the noticeable affect on the performance in the case of there is no retention policy or flawed retention policies. Exit interviews are not conducted at most of the places and the employer is never able to know the exact cause of root problem.

Keywords : Recruitment, Retention, Exit Interview, Resignation, Notice Period, RRR (Recovery from Resignation Row).

2 Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

Full Paper

1.0 Introduction

The HR (Human Resource) cell or wing or department is fearsome one for some and rewarding one for some. But it is an integral function of any company/organisation. It has many synonyms like Personnel, Staff, Establishment, Forces, Manpower etc. While recruitment and management are considered the important functions of HR division, the Retention is mostly the ignored or the left out activity of the division. On the other hand, it is not entirely the recruiter's responsibility to retain the workforce but lies on the recruitee as well to maintain his/her impression to be considered for retention.

The paper discusses the responsibilities at two fronts:

1. Organisational front

2. Employee front

The paper is mainly focusing on the best practices which an organisation may adopt to retain the good and productive manpower and the outputs, expectations and experience which an employee may bring along that maybe useful to achieve the objectives of the company. There are various low cost innovative mechanisms adopted by various companies but are largely unknown or undisclosed. Similarly, the basic qualities in an employee are often ignored to be discussed and hence a prospective employee does not tend to develop such qualities which may be paramount to his/her success in the organisation.

This is to be noted that while money (salary package) has been the biggest attraction for poaching, shifting, resignation, succession, promotion, transfer, location change; it is not the only factor. There are various other incentives which can be considered by the employers that may develop a strong bond between an employee and employer. For example, an employee may not be willing to shift to a metro city even at double the package if the living cost outwits the package he/she gets compared to a living cost scenario in a smaller city where he/she can manage well. Similarly, an employee may not be leaving the company if the turnover is reasonably good, market share value is soaring and it is on the verge of declaring the ESOP (Employee Stock Option Plan) option for its employees.

3 Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

However, the question is if a company is doing the routine job i.e. regularly paying the wages, giving due promotions, doing well, big plans are in the foray; it still faces the problem of high attrition rate. What are the doable and workable 'Retention Techniques' and methodologies which may help an organisation to manage attrition and reduce resignations? There are techniques available for different levels and positions (Horizontal and Vertical structure).

2.0 Retention Techniques at the Organizational Front

Retention is always more important than the recruitment. However, it is the least focused one in many organisations. It is the time that companies and corporates seriously think over retaining good employees by means of monetary or non-monetary incentives.

2.1 Family Chalo Office-e-Abhiyan

In order to increase work productivity, increased consciousness towards work and treating office (when duty is concerned) as extension of home and according same seriousness as we accord to our home, a thought was discussed during a Chintan Shibir at one government institution. The name accorded to it was "Family Chalo Office-e-Abhiyan".

Under the Abhiyan, families of employees are invited to visit the work place and are told to monitor the natural working style and behaviour of their kins at work place without actually disturbing them or seeking their attention. It serves two purposes - a get together during recess period or tea time and monitoring mechanism by family members. The purpose is to report the hygiene conditions, behaviour, working style and way of discharging the duties of kins to the top authority in a congenial way.

2.1.1 Methodology Any date can be decided as per the convenience of all. The time of visit is usually kept during lunch hours (01.00 pm - 5.00 pm). Those who come from distant place are allowed to bring their families from morning as it will be difficult for them to manage it after lunch hours. Families, then, can take a visit to the office and the entire process of working briefly. The person given

4 Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 such responsibility should be very communicative and clear in explaining the working. The lunch can be arranged by the office or a "potluck" (Dabba Party) arrangement can also be made.

Post lunch, the presentations/videos of respective department to be done by concerned department before families. A small kit can be distributed among families containing information of all wings/units and related activities in a sequential manner.

A meeting of all families can be held with MD or CEO or any other top authority in the evening. Each family member is asked to share the experience and minor/major lapses in the functions from an outsider point of view. Family members are also asked to write a small paragraph /suggestion on working style/hygience/sanitation/ food etc. based on their observation in any language they prefer.

Besides reducing resignations, it is an effective method conducive to curb corruption as well as the employee would avoid any wrong-doing before family members and would try to behave sensibly and in a most efficient manner.

2.2 Periodic training Training is necessary to keep employees abreast of happenings in the sector across the globe. The routine becomes quite monotonous without training modules. The training is required at all levels immaterial of designation or position. The training can be a residential training or day- training. Sometimes, companies allow their employees for a sabbatical for a social cause. For example, US Peace Corp seeks help in terms of manpower support and sends them for a smaller period to work in a village or sub urban town. Surveys show that such initiatives are helpful for the individual and company as the employees come back as a better human beings and enhanced work productivity.

Apart from the subject matter, training should involve certain generic modules and Life Skills component. The purpose of training is to build their capabilities of the highest order. Training requirements for the purpose of implementing initiatives at the levels of head office, region, area, zone or unit are required to be met with. A training should lead to knowledge creation and preservation through different activities and projects in a workshop mode. Further, it is expected that their output is quantitatively and qualitatively enhanced.

5 Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

2.3 Visits Abroad Exposure visits are another attraction for the employees. Wherever possible, the companies should send their employees abroad to attend convocations / ceremonies/business meetings etc. Generally, it is seen that every time only top people in the hierarchical structure get the chance to visit. Thought the top management is needed in such visits to take certain decisions, few vacancies should be reserved for the lower positions to build their capacities and maintain their interest. It is also a good step in creating a second line of leadership.

2.4 Promoting participation or presentation in Seminars /conferences/symposiums

Employees are always willing to participate or present their findings /experience in seminars and conferences. But they do not get such opportunities quite often. Following are the issues striking to an employee while considering to participate in a seminar : 1. Who will pay the registration fee? 2. Even if registration fee is arranged, whether the leaves would be granted for the day of seminar and for the days when the person is in transit? 3. Who will bear the cost of logistics and transportation? 4. Who will take care of the work in absence of participant? 5. If the employee is allowed to participate, can he/she use some of the case studies or logo or brand image or events or photographs or equipments of the company (laptop, camera, handy cam etc.)? If companies can take care of the above issues, it is likely to create a happy and positive environment in the organisation.

2.5 More privileges and spending limits at various levels in some cases

The travel and logistics rules are mostly defined in many companies. Though it seems that everything is well settled, there are cases where the given limits and privileges do not help the employee. For example, in a hilly terrain or famous tourist places or during a festival event or during important function of the company, the case is that material and other services (travel, lodging and boarding) are available at a premium rate. In these cases, the employees can be

6 Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 given special privileges to spend slightly more than the permissible limits. For example, if a desk employee is eligible to travel in a train, he/she should be allowed to travel in flight during Diwali days to discharge an assigned official duty at some place with no availability in train.

2.6 Club membership Various clubs offer corporate membership for firms and organisations. The Corporate Membership allows a corporation or company in the club’s area to become a member of the club, through an established membership approval process, and to appoint few designees as the individuals. This option is more suitable in case of government or NGOs as the increment is fixed or negligible and to retain good manpower is quite difficult. If such organisations can not provide good increment (monetary), they can do it in non-monetary way. The Club membership for the efficient employees and their families is an attractive perk which can be thought of.

2.7 Corporate credit card Like club membership, the corporate credit card is another attraction where employee does not need to depend on a risky personal card but may utilize the company given card for personal spending. Similarly various services like domain name booking, air tickets, rail tickets, hotel booking etc. can be done through such cards which may otherwise take long time in a conventional way such as preparing cheque, courier, receipt etc.

2.8 Remuneration through other projects Organisations can consider their employees for cross projects. A cross project system is one where an employee is not bound to only a single project. They can be assigned different projects at different sites. The reporting in this case is in the form of a matrix relationship. There are the following advantages of a cross-project system : 1. Increase the Knowledge/working Domain of the company 2. Increase in the knowledge base and greater exposure for the individual 3. Building an alternate arrangement in case of team scarcity for a particular skill 4. Additional income for the employee Such projects funded by the parent company or from other resources can have some component of reimbursing the working professionals from other projects.

7 Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

2.8.1 Remuneration through organizing a workshop in other project Some government organisations or NGOs, who are not a good pay master, manage the attrition by compensating employees through other benefits. For example, various projects have the component of training and capacity building where workshops and round table discussions are encouraged. There is a separate budget for each workshop. The employee, worth retentive, can be engaged in such workshops and be paid some remuneration based on scheduling of each such event. This remuneration would be extra to the prevailing salary of the employee.

2.9 Charge Transfer Allowance It is a usual phenomenon in many organisations that when a person leaves the organisation due to any reason (resignation, termination, transfer, end of contract, sabbatical, study leave or any other leave), his/her charge is transferred to another person (transferee). The transferee, apart from the responsibilities of his own work, handles the task of the transferor. Generally, the additional load of work is discharged without any additional remuneration to the transferee. This practice can be changed and contribution to a congenial and happy environment can be made by making transferee eligible for extra 10%-15% of the salary of the transferor.

2.10 Permitting leaves for sandwich days Consider a scenario where 15th August, the public holiday, is Tuesday. Saturday and Sunday would be on 12th and 13th respectively. The Monday, 14th August, is termed as Sandwich Day as it is sandwiched between holidays. At most work places, more than 50% of the workforce would not wish to report on sandwich day in such a scenario. Even if they come, as per a survey, they are not intended to work wholeheartedly. The callousness is reported in the behaviour and work style leading to reduction in work efficiency. To prevent this, it is better to allow for sandwich holiday for a group of employees at one instance and second group of employees at second instance. When in policy, the chances of callousness are very less.

2.11 Proper Administration Procedures It is often observed that weak administration policies lead to confusion, tensions and bitter heart among employees and between employee and employer. There should be a way of faster clearance of eligible bills/invoices and timely release of wages of employees. Similarly, the

8 Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 office should maintain maximum hygiene conditions at work place. Sometimes, the less attention seeking sanitation activity plays a major role in making the mindset of a prospective candidate to join or reject a position, particularly in case of female candidates. The toilets, washrooms, kitchen, foyers and other places of work should be neat and clean and also as a brand building exercise. Admin support while in transit is a great help or when bookings are to be made or changed.

3.0 The desirables from an employee Employees need to understand their functional and ethical responsibilities at their place of work. The personal differences and dislikes should be left apart while in a professional environment.

3.1 Life Long Learning (LLL) and continuous skill mapping When a person is employed in a firm, his/her induction programme is initiated. It is a new learning for him/her. After few years of work, a new machine is purchased by the company and all the employees are trained to work on the new machine. Similarly, in IT field, the technology undergoes a major change after every six months. If an employee is not keeping pace with the changing technology, he/she is likely to meet difficulties. It means the learning does not end beyond classrooms or colleges but takes place throughout the life and in various contexts. Life Long Learning (LLL) is a voluntary and self-motivated activity which may or may not relate to the work area of the person. It may be a learning leading to social inclusion, personality development, acquiring a skill, citizenship or spiritual understanding. It is independent of place and time. Similarly, an employee has to maintain his worth and value by contributing in the company's growth through application of his/her various skills and upgrading these skills time to time. The skill mapping with the company needs and then industry needs should be the prime concern of a good employee.

3.2 Prevent Self Poaching Companies and organisations should restrain themselves from poaching and similarly the employee should be educated enough not to find himself/herself in the poaching trap. A poaching is a term given to the effort made by a company to attract or lure or entice the utilitarian employee of another competing company by any means (ethical or unethical). It’s

9 Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 underhanded and unethical to recruit out of the competition’s talent pool. In job market, poaching is quite common but lacks respect. Poaching is high at senior levels where decision making affects millions in monetary and clientele terms. Poaching is also done when a senior employee takes his entire team when he/she is recruited by other company as he/she is more comfortable to work with his/her own team. While some say that it helps drive economic growth; in long term, it is not desirable out of an employee.

4.0 Conclusion There is a serious need to mull over retaining good employees in the public, private or government sector. The retention is as important as recruitment or more than that. The exit interviews may give some insights on the choices and aspirations of the employees. Companies must think over the various policies and incentives which can be thought to make the work place more attractive and productive. While recruitment focuses on the new talent, new requirement and counting on the new incumbent, the other side of the coin is that the existing employee is already experienced, familiar with the office procedures and codes and tested by the seniors. The experienced and efficient employees are very important pool for any organisation and it would not want to loose them. The onus lies on both the employer and employee. There are some retention techniques (monetary and non-monetary), a company can bank upon. Companies should learn that it is not all about money; it is about investing in and respecting other human characteristics. The employees also have to widen and deepen their thinking in their own interest while switching to other jobs. At many times, it may seem quite lucrative to join another company. However, it should be viewed in terms of long term career goals and expected achievements.

References : 1. (Office Documentation), Sharma, Sandeep, "Office Processes Documentation", Office of Commissioner, Higher Education, Government of Gujarat, 2012. 2. Wikipedia

10

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

Frequent Item set Using Transaction Reduction Technique in Data Mining-A survey

Sefali Patel Dheeraj Kumar Singh Information Technology, Information Technology, Parul University (PIET), Parul University (PIET), Vadodara, Gujarat, India Vadodara, Gujarat, India [email protected] [email protected]

Abstract: - At present, due to the developments in Database Technology, large volumes of data are produced by everyday operations and they have introduced the necessity of representing the data in High Dimensional Datasets. Discovering Frequent Determinant Patterns and Association Rules from these High Dimensional Datasets has become very tedious since these databases contain large number of different attributes. For the reason that, it generates extremely large number of redundant rules which makes the algorithms inefficient and it does not fit in main memory. In this paper, a new Association Rule Mining approach is presented, and it efficiently discovers Frequent Determinant Patterns and Association Rules from High Dimensional Datasets. Association rules are the main technique to determine the frequent item set in data mining. Apriori algorithm is a classical algorithm of association rule mining. This classical algorithm is inefficient due to so many scans of database. And if the database is large, it takes too much time to scan the database. In this paper, we proposed an Improved Apriori algorithm which reduces the scanning time by cutting down unnecessary transaction records as well as reduce the redundant generation of sub-items during pruning the candidate item sets, which can form directly the set of frequent itemsets and eliminate candidate having a subset that is not frequent.

Keywords: Association Rule, Frequent Item Set, Support Count, Apriori, Transaction Reduction Technique.

1. INTRODUCTION:

Data mining is a Process of analyzing data from different perspectives and summarizing it into useful information. Data mining has evolved in to an important area of research because of the theoretical challenges and practical applications associated with the problem of discovering interesting and previously unknown know ledge from real world databases. There are many technique of data mining such as Classification, Clustering, Association rule mining, Regression etc.

1

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

1.1 Data Mining Task

Data Mining is the semi-automatic discovery of patterns, associations, changes, anomalies and statistically significant structures and events in data. Data Mining a s a term used for the specific set of tasks or activities as follow

1.2 Association Rule Mining In Data mining, the definition of association rule mining finds interesting association or corr elation relationships among a large set of data items. Association rule mining finding frequent pattern, correlations among the items or object in transactional database, or relational database. Association rule can create analyzing data for frequent pattern using the criteria Support & Confidence to identify the relationship. Support is indicating of how frequently the item appears in the database. Confidence indicates the number of time has been found. There are many algorithms used in association rule mining. The main goal of association rule mining is: • Frequent item set generation • Rule generation (Find large item set).

1.3 Frequent Item set Mining Frequent pattern mining has been an important subject matter in data mining from many years. A remarkable progress in this field has been made and lots of efficient algorithms have been designed to search frequent patterns in a transactional database. Frequent pattern mining can be used in a variety of real world applications. It can be used in super markets for selling, product placement on sh elves, for promotion rules and in text searching. 2. RELATED WORKS:

Since its introduction by Agrawal et al [1], it has received a great deal of attention and various efficient and sophisticated algorithms have been proposed to do frequent itemset mining. Among the best-known algorithms are Apriori, Eclat and FP-Growth. The Apriori algorithm [2] uses a breadth-first search and the downward closure property, in which any superset of an infrequent itemset is infrequent, to prune the search tree. Apriori usually adopts a horizontal layout to represent the transaction database and the frequency of an itemset is computed by counting its occurrence in each transaction. FP-Growth [3] employs a divide-and-conquer strategy and a FP-tree data structure to achieve a condensed representation of the transaction database. It is currently one of the fastest algorithms for frequent pattern mining. Eclat[4] takes a depth-first search and adopts a vertical layout to represent databases, in which each item is represented by a set of transaction IDs (called

2

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 a tidset) whose transactions contain the item. Tidset of an itemset is generated by intersecting tidsets of its items. Because of the depth-first search, it is difficult to utilize the downward closure property like in Apriori. However, using tidsets has an advantage that there is no need for counting support, the support of an itemset is the size of the tidset representing it. The main operation of Eclat is intersecting tidsets, thus the size of tidsets is one of main factors affecting the running time and memory usage of Eclat. The bigger tidsets are, the more time and memory are needed. Zaki and Gouda[5] proposed a new vertical data representation, called Diffset, and introduced dEclat, an Eclat-based algorithm using diffset. Instead of using tidsets, they use the difference of tidsets (called diffsets). Using diffsets has reduced drastically the set size representing item sets and thus operations on sets are much faster. Eclat had been shown to achieve significant improvements in performance as well as memory usage over Eclat, especially on dense databases[5]. However, when the dataset is sparse, diffset loses its advantage over tidset. Therefore, Zaki and Gouda suggested using tidset format at the start for sparse databases and then switching to different set format later when a switching condition is met.

Table 1: Comparative Analysis of Pattern Mining Algorithm Apriori RARM ECLAT FP-Growth ASPMS

Techniques Breadth first Depth first search Depth first Search & Divide and Conquer BSM(Branch search and intersection of t-id Sort Method) Apriori using merge property(for method pruning)

Databas Database Database is Database is scanned Database is scanned few Database id scanned e is Scan scanned for few times to times two times only scanned only one each time a construct. time candidate item set is generated

Drawback -requires -Difficult to use in It requires the virtual FP-Tree is expensive ---- interactive large memory system memory to perform the to build consumes space. mining transaction. more memory.

-Too many candidate item set.

3

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123 Advantages -Easy to -No candidate -No need to scan -Database is scanned -It requires less implement. generation. database each time only two times. memory.

-Use large -Highly suitable item set for interactive property. mining

Data format Horizontal Horizontal Vertical Horizontal Horizontal

Storage Array Tree Array Tree(FP Tree) Tree(Asp tree) structure

Time More Less execution time Execution time is less Less time as Less execution execution as compared to than Apriori algorithm compared to Apriori time as compared time Apriori & FP algorithm to FP growth Growth algorithm

3. LITRETURE REVIEW: 3.1 Find frequent item sets using Apriori algorithm: The most famous is the Apriori algorithm which has been brought in 1993 by Agrawal which uses association rule mining [6]. Association rules are usually required to satisfy a user-specified minimum support and a user-specified minimum confidence at the same time. Association rule generation is usually split up into two separate steps: 1. Minimum support is applied to find all frequent item-sets in a database. 2. These frequent item-sets and the minimum confidence constraints are used to form rules.

Advantage of this algorithm, it is easy to find frequent item sets if database is small but it has two deadly bottlenecks. First, It needs great I/O load when frequently scans database and Second, It may produce overfull candidates of frequent item-sets.

3.2 Find frequent item sets using PAFI as well as Apriori algorithm: D.Kerana Hanirex and Dr.M.A.Dorai Rangaswamy proposed efficient algorithm for mining frequent item sets using clustering techniques. They presents an efficient Partition Algorithm for Mining Frequent Item sets (PAFI) using clustering. This algorithm finds the frequent itemsets by partitioning the database transactions into clusters and after clustering it finds the frequent itemsets with the transactions in the clusters directly using improved Apriori algorithm which further reduces the number of scans in the database as well as easy to manage and available easily, hence improve the efficiency as well as new algorithm better than the Apriori in the space complexity but again it uses apriori algorithm hence efficiency not increase as much as required.

4

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

3.3 Find frequent itemsets using Improved Apriori algorithm based on matrix: Feng WANG and Yong-hua proposed An improved Apriori algorithm based on the matrix. To solve the bottleneck of the Apriori algorithm, they introduce an improved algorithm based on the matrix [8]. It uses the matrix effectively indicate the affairs in the database and uses the “AND operation” to deal with the matrix to produce the largest frequent itemsets and others. The algorithm based on matrix don’t scan database frequently, which reduce the spending of I/O. So the new algorithm is better than the Apriori in the time complexity but it is not suitable for large database.

3.4 Transaction Reduction In Actionable Pattern Mining For High Voluminous Datasets Based On Bitmap and Class Labels : Frequent pattern mining in databases plays an indispensable role in many data mining tasks namely, classification, clustering, and association rules analysis. When a large number of item sets are processed by the database, it needs to be scanned multiple times. Consecutively, multiple scanning of the database increases the number of rules generation, which then consume more system resources. Existing CCARM (Combined and Composite Association Rule Mining) algorithm used minimum support in order to generate combined actionable association rules, which in turn suffer from the large number of generating rules. Explosion of a large number of rules is the major problem in frequent pattern mining that adds difficult to find the interesting frequent patterns.

4. CONCLUSION: We have analyzed the comparative study of various frequent patterns mining algorithms. A comparison framework has developed to allow the flexible comparison of Apriori, Eclat and FP-growth algorithms. Using this framework this paper presented the comparative performance study of these algorithms such as, Apriori, Eclat and FP-growth. This study also focuses on each of the algorithm’s advantages, disadvantages and limitations for finding patterns among large item sets in database systems.

5. REFERENCES:

[1]V.Vijayalakshmia, Dr.A.Pethalakshmib “An Efficient Count Based Transaction Reduction Approach For Mining Frequent Patterns” Published by Elsevier 2015.03.183 [2]Anjani Pandey, Gayatri Singh,“An Association of Efficient Mining by Compressed Database” Binary Journal of Data Mining & Networking 5 (2015) 33-35 [3]Mr.Vaibhav Kumar Sharma, Mr.Anil Gupta, Mr. B.L. Pal ,“An Efficient Approach for Data Mining with Compressed Data” International Journal of Computer Trends and Technology (IJCTT) – volume 28 Number 5 – October 2015

5

Nirupan: An e-Journal of RBIMS Vol. 1, No. 2 ISSN: 2395-7123

[4]K.Prasanna , Dr. M.Seetha , Dr. A. P. Siva Kumar “CApriori: Conviction Based Apriori Algorithm for Discovering Frequent Determinant Patterns from High Dimensional Datasets” International Conference on Science, Engineering and Management Research, IEEE 2014 [5]Dr.V.Vaithiyanathan,K.Rajeswari, Prof. Rashmi Phalnikar,Mrs.Swati Tonge“Improved Apriori algorithm based on Selection Criterion” Computational Intelligence and Computing Research IEEE 2012. [6]Loan T.T.Nguyen, Bay Vo, Tzung-Pei Hong,Hoang Chi Thanh,“CAR-Miner: An Efficient Algorithm For Mining Class-Association Rules,”Expert system With Applications 40(2013) 2305-2311, 2012@Elsevier Ltd. All Rights. [7]Wael Ahmad AlZoubi, Khairuddin Omar, Azuraliza Abu Bakar” An Efficient Mining of Trasactional Data Using Graph-Based Technique” 2011 3rd Conference on Data Mining and Optimization (DMO) 28- 29 June 2011, Selangor, Malaysia [8]Fan Zhang, Yan Zhang Jason Bakos,” GP Apriori: GPU-Accelerated Frequent Itemset Mining”. 2011 IEEE International Conference On Cluster Computing [9]Anil Vasoya ,Dr. Nitin Koli “Mining of association rules on large database using distributed and parallel computing”Elsevier 2016. [10]V.Vijayalakshmi, A.Pethalakshmi “A Performance based Transaction Reduction Algorithm for Discovering Frequent Patterns” International Journal of Computer Applications, 2014 [11] Jaishree Singh, Hari Ram, Dr. J.S. Sodhi “Improving Efficiency of Apriori Algorithm Using Transaction Reduction ” International Journal of Scientific and Research Publications, 2013 [12]Rupesh Panwar, Prof. Abhishek Raghuvanshi “A Novel Transaction Reduction & Data Elimination Based Technique For Mining Frequent Item Sets From A Transaction Data Base” International Journal of Scientific Development and Research (IJSDR), 2016 [13]K. Kavitha, Dr.E. Ramaraj, “Efficient Transaction Reduction In Actionable Pattern Mining For High Voluminous Datasets Based On Bitmap And Class Labels”International Journal On Computer Science And Engineering (Ijcse), 2013.

6