Vous êtes sur la page 1sur 180

International Journal BITM Transactions on EECC

ISSN No.0974-9527

International Journal
BITM Transactions on EECC

ISSN No.: 0974-9527

Volume 6 February 2017 No-1

Editor

Soumen Bhowmik
Arun Kr. Bag

Bengal Institute of Technology & Management,


Santiniketan
(Accredited by NAAC, UGC)
Sriniketan Bypass Road,
P.O.- Doranda, District: Birbhum, State: West Bengal, India
Ph.: 03463-271353/54, Telefax: 03463-271371
www.bitm.org.in

www.bitm.org.in Volume: 6 No: I February 2017 i|P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Selected papers of
National Conference on
Recent Advances in Science,
Engineering and Management
RASEM-2017

Technically cosupported by
IEEE, Kolkata Chapter

All rights reserved. No parts of this publication may be reproduced, stored in a retrieval
system, or transmitted, in any form or by any means, electronic, mechanical,
photocopying, recording, or otherwise, without the prior permission of the institute.

2017 Bengal Institute of Technology & Management, Santiniketan

ISSN: 0974-9527

Published and printed by


Bengal Institute of Technology & Management
Sriniketan Bypass

www.bitm.org.in Volume: 6 No: I February 2017 ii | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Preface
The National Conference on Recent Advances in Science, Engineering and
Management (RASEM-2017) was held on 11th and 12th of February, 2017. The
conference was organized by Bengal Institute of Technology and Management,
Santiniketan under the patronization of Camellia Group, Kolkata, with the technical
collaboration of IEEE Joint CSS-IMS, Kolkata Chapter. It focused not only on
isolated domain-specific-research-sharing but also delving into the convergence of this
trilogy and its possible triangulation. The conference was an Endeavour to track the
current research trends in Science, Engineering and Management and revealed
avenues for aspiring researchers to expand the existing body of know ledge. The
Conferences aim was to collate the recent researches and progress made in the fields of
science, engineering and management where harmonious and synergistic outputs hade
been observed in terms of its socioeconomic applications. Some specific objectives of
this Conference was: to create a research platform with multidisciplinary inputs; to share
and understand the recent trends in research pertaining to the fields of Science,
Engineering and Management with their convergence and to know the socioeconomic
impact of the same; to understand the opportunities and scope of research-applications in
industries namely patents, IPRs, prototypes, technology adoption etc; to expose the PG
students to the academic research domains.

The conference was three major tracks:


Track 1: Recent advances in Science
Track 2: Various fields of Engineering
Track 3: Management Science, Hospitality & Tourism Management

Out of 145 number of research papers only 59 number of papers has been selected for the
conference presentation, out of that two (02) papers from University of KwaZula-Natal,
South Africa, one (01) paper from University of Wisconsin at Milwaukee, USA, one (01)
paper from IIT- Ropar, five (03) from Visva- Bharati University, two (02) from Aliah
University, two (02) from RCCIIT and the rest are from Jadavpur University, HIT,
NITTTR, CSIR- Indian Institute of Chemical Biology, NIT- Agartala , NIT-Durgapur,
IMS- Kolkata, CIT- Madhyamgram and BITM- Santiniketan.

The Chief Guest of the Conference was Dr. Sayed Rafikul Islam, Honorable Registrar,
Maulana Abul Kalam Azad University of Technology, Kolkata, West Bengal. He
delivered his speech on the topic Recent Advances in Science Technology &
Management. Professor (Dr.) A. Chattopadhyay, former Director, Indian school of
Mines University, Dhanbad was the Guest of Honour of the conference. He delivered his
speech on the topic New Trends of Scientific Innovations for Human-beings.
Professor (Dr.) Sukadev Sahoo, Associate Professor, Department of Physics, NIT,
Durgapur, Professor (Dr.) Radhikesh P. Nanda, Associate Professor, Department of
CIVIL Engineering, NIT, Durgapur, Dr. Arup Kumar Baksi, Associate Professor, Dept.

www.bitm.org.in Volume: 6 No: I February 2017 iii | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
of Management & Business Administration, Aliah University, West Bengal, Prof. (Dr.)
Amitava Dasgupta, Advisor, Santiniketan Institute of Polytechnic, Prof. (Dr.) Ashoke
Kumar Mukhopadhyay, Director, Brainware University, Mr. Indranil Dey Sarker,
Director, Ardent Computech PVT LTD, Mr. Subhabrata Bhattacharya, Head- Eastern
Zone, NEN Global, Prof. (Dr.) Goutam Sarkar, Associate Professor, Jadavpur
University and Prf. (Dr.) Arabinda Das, Associate Professor, Jadavpur University ware
the Key-note speakers.
Prof. (Dr.) R. Sahoo, Director, BITM-Santiniketan, and Mr. Amitava Choudhury,
Registrar, BITM-Santiniketan also enlightened the conference with their valuable notes.

I, on behalf of the Organizing Committee of RASEM-2017, would like to thank all the
invited guests, dignitaries, keynote speakers, session chair, paper presenter and dear
students for their contribution and presence. Many thanks to the IEEE, Kolkata Chapter
for Technical Support. My special thanks to Sri. Nil Ratan Dutta, Managing Trusty cum
Chairman, MEMD Trust, Mr. Partha Pal, Deputy Director (Acad.), MEMD Trust and
all the stuff members of BITM for their direct and indirect help towards successful
completion of the RASEM-2017.

Soumen Bhowmik
Convener,
RASEM-2017
Bengal Institute of Technology and Management, Santiniketan
Date: 05/03/2017

www.bitm.org.in Volume: 6 No: I February 2017 iv | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Contents
1. Micropolar fluid of heat mass transfer over an inclined plate with Soret-Dufour
and chemical reaction
Hiranmoy Mondal, Sicelo Goqo, Precious Sibanda 1
2. Destination branding: Using multisensory branding techniques in creating
destination image.
Arup Kumar Baksi 10
3. Doing good is doing well-Indias take on CSR: Indias Issues and Challenges.
Sreyasi Ray, Arpita Sil 25
4. Computing Reflectivity of Fiber Bragg Structure for Optical Communication
Payel Halder, Arpan Deyasi 34
5. Filtering Signal by Wavelet Transform
Tanay Mondal 42
6. A Study on Corporate Social Responsibility (CSR) in West Bengal
H. R. Biswas, Pradip Laha 48
7. A Literature Survey On LSB Color Image Steganograpgy
S. Bhowmik, Sheetal A Dabhi, S. Mukherjee, Aditi Ghosh 64
8. Submarine Wireless Sensor Networks (SWSN), Architecture, Routing Protocols,
Simulation in MATLAB
Arun Kumar Bag, Shayma Nand Kumar, Swagata Das 68
9. E-Learning: Opportunities and Challenges as a Prospective Sector of E-
Commerce in India.
Sudakshina Dutta Roy 78
10. A New Approach forLossless Image Cryptography followed by Image
Compression.
Sourav Dindaa , Raj Kumar Shrvanb 87
11. Impedance Estimation for Channel Estimation through OFDM Method for PLC.
Debprasad Sinha, Vipin Kumar Singh, Swagata Das 95
12. Guardian Response Mapping to CRM System: An Empirical Study Conducted
in A Private Institution in West Bengal
Bratin Maiti, Madhurima Banerjee 113
13. Calculating Surface Potential and Slope Factor using Potential Balance Model
for Long Channel MOSFET
A. Mazumdar, P. Halder, S. Mukherjee, A. Deyasi 122
14. Current and Future Trends in the Hospitality and Tourism Marketing and
Management.
Md Kamaruzzaman 131
15. Explaining Tourists Satisfaction and Intention to Revisit at Tripura
Nibir Khawash, Arup Kumar Baksi 139
16. Dielectric Antenna Design and Measurements
Deepshekha Mishra 148
17. Decay Channels of Higgs Boson
PriyaMaji, Debika Banerjee and SukadevSahoo 154
18. Accountability Of SHGs: Highlights on Accounting Practices and The Vogue
Accounting Information Systema
Pradip Laha, H. R. Biswas 162
www.bitm.org.in Volume: 6 No: I February 2017 v|P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
19. Molecular gastronomy is a scientific discipline, and note by note cuisine is the
next culinary trend.
Manoj Kumar Pal 168

www.bitm.org.in Volume: 6 No: I February 2017 vi | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Micropolar fluid of heat mass transfer over an inclined


plate with Soret-Dufour and chemical reaction
Hiranmoy Mondal1, Sicelo Goqo2, Precious Sibanda3
1,2,3
School of Mathematics, Statistics and Computer Science,University of KwaZula-
Natal,
Private Bag X01, Scottsvile, Pietermaritzburg-3209, South Africa

Abstract
An analysis is presented to investigate the thermophoresis particle deposition and Soret-
Dufour effects on mixed convection boundary layer flow over a semi-infinite inclined flat
plate in the presence of heat generation and chemical reaction. The primary aim of this
study is to investigate and shade light on the mass deposition variation on the surface due
to thermophoresis. The governing differential equations are solved numerically using the
shooting algorithm with a Runge-Kutta-Fehlberg integration scheme over the entire range
of physical parameters. Numerical results are obtained for dimensionless velocity,
micropolar, temperature and concentration profiles and displayed graphically for
pertinent parameter. Favorable comparisons with previously published work on special
cases of the problem are obtained. Results show that the velocity decreases with an
increase in the Dufour number and decrease with the Soret number, while an increase in
the power index n and chemical reaction parameter leads to a decrease in the fluid
temperature and solute concentration respectively.
Key words: Micropolar fluid; Thermophoresis;Soret and Dufour effects; Chemical
Reaction;

Introduction
Mixed convection boundary layer flow over a non-linearly stretching surface is of great
interest in many industries for the design and reliable operation equipment. The effects of
thermophoresis on mixed convection flow play an important role in the context of space
technology and in processes which involve high temperatures. Thermophoresis plays an
important role in mass transfer mechanisms as small micron sized particles move
differently under the influence of large temperature gradients so that small sized particles
can be separated after mixing, or prevented from mixing if they are already separated.
Thermophoresis is used in industry to separate large or small polymer particles from their
solvent. It is Further, utilized in the manufactur of silicon dioxide and germanium dioxide
optical fibers used in communication cables. Also, thermoporetic radiation particle
deposition is one of the most important factors causing accidents in nuclear reactors
(Anbuchezhian et. al [1]). The first analysis related to the thermophoretic deposition in
geometry of engineering applications appeared in the paper by Hales et al. [2]. Talbot et
al. [3] solved numerically the problem related to thermophoresis for the velocity and
temperature fields in a laminar boundary layer adjacent to a heated plate. Selim et al. [4]
studied the effect of surface mass flux on mixed convective flow past a heated vertical
permeable plate with thermophoresis. In many chemical engineering processes
concentrations of species vary from point to point resulting in mass transfer. Energy flux
www.bitm.org.in Volume: 6 No: I February 2017 1|P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
can be generated not only due to temperature gradient but also due to concentration
gradient. The energy flux caused by concentration gradient is called the Dufour effect
whereas the flux caused by temperature gradient is called the Soret effect. These effects
are very significant when the temperature and he concentration gradients are high. The
importance of these effects in convective transport in clear fluids has been studied by
many authors in recent times. Pal and Mondal [5] studied the Soret effects on MHD non-
Darcy mixed convective diffusion of species over a stretching sheet embedded in a
porous medium in the presence of non-uniform heat source/sink and variable viscosity.
Thermophoresis particle deposition in a non-Darcy porous medium under the influence of
Soret, Dufour effects was studied by Partha [6]. Pal and Chatterjee [7] studied the mixed
convection magnetohydrodynamic heat and mass transfer past a stretching surface in a
micropolar fluid-saturated porous medium under the influence of Ohmic heating, Soret
and Dufour effects. In many transport processes in nature and in industrial applications in
which heat and mass transfer with variable viscosity is a consequence of buoyancy
effects caused by diffusion of heat and chemical species. The study of such processes is
useful for improving a number of chemical technologies, such as polymer production and
food processing. Thus the study of heat and mass transfer with chemical reaction is of
considerable importance in chemical and hydrometallurgical industries. Chemical
reaction can be codified as either heterogeneous or homogeneous processes depending on
whether they occur at an interface or as a single phase volume reaction. Kandasamy et al.
[8] studied the effects of chemical reaction, heat and mass transfer along a wedge with
heat source and concentration in the presence of suction or injection. Later Kandasamy
[9] presented thermophoresis and variable viscosity effects on MHD mixed convective
heat and mass transfer past a porous wedge in the presence of chemical reaction. Cortell
[10] analyzed MHD flow and mass transfer of an electrically conducting fluid of second
grade in a porous medium over a stretching sheet with chemically reactive species. Shaw
et al. [11] studied the homogeneous-heterogeneous reaction in micropolar fluid flow from
a permeable stretching or shrinking sheet in a porous medium. The objective of this paper
is to study the effects of micropolar fluid over a non-linear by stretching sheet on two-
dimensional steady mixed convection flow past a semi-infinite permeable inclined flat
plate in the presence of heat generation, Soret-Dufour effects and a chemical reaction.
The primary aim of this study is to investigate and shade light on the mass deposition
variation on the surface due to thermophoresis. Such a study, which is important in non-
Newtonian materals processing. The transformed dimensionless governing equations are
solved numerically using the fifth-order Runge-Kutta-Fehlberg method with a shooting
technique. The physical significance of interesting parameter on the flow and the thermal
field are shown through graphs and discussed in details.

Mathematical Formulations
Consider the steady two-dimensional incompressible flow of a micropolar fluid over a
non-linear stretching surface past a semi-infinite permeable inclined flat plate with an
acute angle to the vertical with the X-axis measured along the plate. The geometry
of the problem is shown in Fig. 1. The non-linear variation of the X- component of the
velocity is u w c x , c is a constant of proportionality and n is a power index. The
n

temperature of the surface is held uniform at T w which is higher than the ambient
www.bitm.org.in Volume: 6 No: I February 2017 2|P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
temperature T , Cw is the wall concentration of the solute and C is the concentration
of the solute far away from the sheet. The temperature difference between the body
surface and the surrounding micropolar fluid generates a buoyancy force, which results in
an upward convective flow. The effects of thermophoresis are taken into account in order
to understand the mass deposition variation on the surface. Under the above assumptions,
the boundary layer equations for a micropolar fluid are as follows:

u u (1)
0,
x y

u K * 2u K * N
u
u v 1 1 g T (T T ) g c (C C ) cos , (2)
x y y 2 y

2
N N
N * u
j u v
2
K1 2 N , (3)
x y y y
g T2 Q0 Dm KT 2C
T T
u v (T T ) , (4)
x y C p y 2 C p Cs C p y 2
2 Dm KT 2T
C C C
u
x
v
y
Dm
y

2 y T
V (C C )
Tm y 2
K1 (C C ), (5)

The above partial differential equations are subject to the following conditions:

n u 2n1
u u w cx , v 0, N m0 ,T Tw T C1x ,
y
2n1
C Cw C C2 x , at y 0, (6)
u 0, N 0, T T , C C , as y

In order to obtain a similarity solution of the problem, we introduce the following non-
dimensional variables:

n1 n1
c ( n 1) n c ( n 1) 2 T T
x 2 y , N cx x g ( ), ( ) ,
2 2 T w T
(7)
n1
C C n c ( n 1) 2 n 1
( ) , u cx f '( ), v x
f f '

Cw C 2 n 1

www.bitm.org.in Volume: 6 No: I February 2017 3|P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Through Eq. (7), the continuity Eq. (1) is identically satisfied. Now substituting Eq. (7) in
equations (2)-(5) we obtain a system of non-linear ordinary differential equations with
appropriate boundary conditions as follows:

(1 K )(1 n) 2 n 1 n 1
f ''' nf ' ff '' Kg ' (Grt Grc ) cos 0,
2 2 2

2 K 3n 1 2K
g '' f ' g fg ' (2 g f '') 0, (8)-
2 n 1 n 1
(11)
2(2n 1) 2
'' Pr f ' f ' Q D f '' 0,

n 1 n 1
2(2n 1) 2
'' Sc ( f ') ' f ' ( Sr ) '' R1 0

n 1 n 1

The boundary conditions are:


f 0, f ' 1, g m0 f '', 1, 1, at 0
f ' 0, g 0, 0, 0, as 0

*
K1 g t (Tw T )
where, K is the vortex viscosity or the material parameter, Grt is
2 2n1
c x
g c (Cw C )
the local temperature Grashof number, Grc is the local concentration
2 2n1
c x
Grashof number,
C p Q0 x
Pr is the Prandtl number, Q is the local heat generation parameter,
g C p uw
K x Dm KT (Cw C )
R1 1 is the chemical reaction rate parameter, D is the
uw f Cs C p (Tw T )
*
K (Tw T )
Dufour number, sc is the Schmidt number, 1 is the
Dm Tref

Dm KT (Tw T )
thermophoretic parameter and Sr is the Soret number.
Tm (Cw C )

www.bitm.org.in Volume: 6 No: I February 2017 4|P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Results and Discussion

The Eqs. (8)-(11) constitute a highly non-linear coupled boundary value problem of third
and second order. Thus we have developed most effective numerical shooting technique
with fifth-order Runge-Kutta-Fehlberg integration algorithm. The results are presented
graphically in Figs. 2-12 and conclusions are drawn for flow field and other physical
quantities of interest that have significant effects. Comparisons of the present results with
previously published works are performed and excellent agreement has been obtained.
Comparison of our results of with those obtained by Abel and Mahesha [13] (see Table 1)
shows an excellent agreement in absence of Grashof number, Soret and Dufour. The
values of local Nusselt number are tabulated in Table 1 for different of Prandtl numbers.
It is noted that the values of the local Nusselt number increases with an increase in the
Prandtl number. Figs. 1-4 shows the effect of angle of inclination to the vertical direction
on the velocity profiles, temperature profile, concentration profile and micro-rotation
velocity profiles respectively. From this figure we observe that the velocity is decreased
by increasing the angle of inclination due to the fact that as the angle of inclination
increases the effect of the buoyancy force due to thermal diffusion decreases by a factor
of cos . Consequently, the driving force to the fluid decreases as a result there is
decrease in the velocity profile. Further, it is observed that the combined effects of
suction and the buoyancy force overshoots the main stream velocity significantly. From
Figs. 2-4 it is observed that both the temperature as well as concentration and micro-
rotation velocity profile in the boundary layer thickness increases as increasing the angle
0 0 0 0 0
of inclination 0 ,30 ,45 ,60 ,75 .

Table 1: Comparison of Local Nusselt number for various values of Pr with Abel and
Mahesha [13]

Pr Abel and Mahesha [13] Present Results

1.0 1.0 1.0

3.0 1.92368 1.92466

10.0 3.72067 3.72159

www.bitm.org.in Volume: 6 No: I February 2017 5|P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

1.2
k = 0.2, Q = 0.5, m0= 0.5, Grt = 2.0
1.0 Grc=4.0, Pr = 0.7, Df = 0.6, Sr = 2.0, Sc=0.22
R1= 0.5, n = 2.0

0.8
f ' ( )

0.6




0.4




0.2

0.0
0 2 4 6 8 10

Fig1: Velocity profile for different values of 00 , 300 , 450 , 600 , 750 .

1.0

k = 0.2, Q = 0.5, m0= 0.5, Grt = 2.0


Grc=4.0, Pr = 0.7, Df = 0.6, Sr = 2.0, Sc=0.22
R1= 0.5, n = 2.0

0.5








0.0
0 2 4 6 8 10

0 0 0 0 0
Fig2: Temperature profile for different values of 0 ,30 ,45 ,60 ,75 .

www.bitm.org.in Volume: 6 No: I February 2017 6|P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

1.0

0.8
k = 0.2, Q = 0.5, m0= 0.5, Grt = 2.0
Grc=4.0, Pr = 0.7, Df = 0.6, Sr = 2.0, Sc=0.22
R1= 0.5, n = 2.0
0.6




0.4




0.2

0.0
0 2 4 6 8 10

0 0 0 0 0
Fig3: Concentration profile for different values of 0 ,30 ,45 ,60 ,75 .

0.4
k = 0.2, Q = 0.5, m0= 0.5, Grt = 2.0
Grc=4.0, Pr = 0.7, Df = 0.6, Sr = 2.0, Sc=0.22
R1= 0.5, n = 2.0
0.2
g ( )

0.0






-0.2



-0.4
0.0 0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0

0 0 0 0 0
Fig4: Micro-rotation Velocity profile for different values of 0 ,30 ,45 ,60 ,75 .

www.bitm.org.in Volume: 6 No: I February 2017 7|P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Conclusion

The problem of two-dimensional mixed convection flow due to a micropolar in the


presence of Soret-Dufour and chemical reaction was investigated. The governing
boundary layer non-linear differential equations are solved numerically. The influence of
the micropolar material parameter, n and the Prandtl number have been systematically
examined. From the results and discussion section, the following conclusions are drawn:

(i) The angular velocity decreases for increasing the power law index near the nonlinear
stretching sheet.
(ii) The microrotation velocity increasing for increasing the value of power index n.

References

[1] N. Anbuchezhian, K. Srinivasan, R. Kandasamy , Magnetohydrodynamics laminar


boundary-layer over a porous wedge with thermophoresis particle deposition in the
presence of variable stream conditions, Meccanica, DOI: 10. 1007/ s11012-011-9465-
6,(2011).
[2] J. H. Hales, L. C. Schwendiman, T. W. Horst, Aerosol transport in a naturally
convected boundary layer, Int. J. Heat Mass Transfer 15 (1972) 1837-1849.
[3] Talbot L, Chang RK, Schefer AW, Wills DR. Thermophoresis of particles in a heated
boundary layer. J Fluid Mech 1980;101:73758.
[4] A. Selim, M.A. Hossain, D.A.S. Rees, The effect of surface mass transfer on mixed
convection flow past a heated vertical flat permeable plate with thermophoresis, Int.
Therm Sci. 42 (2003) 973-982.
[5] D. Pal, H. Mondal, MHD non-Darcy mixed convective diffusion of species over a
stretching sheet embedded in a porous medium with non-uniform heat source/sink,
variable viscosity and Soret effect, Commun Nonlinear Sci. Numer Simulat 17 (2012)
672-684.
[6] M.K. Partha, Thermophoresis particle deposition in a non-Darcy porous medium
under the influence of Soret, Dufour effects, Heat Mass Transf. 44 (2008) 969-977.
[7] D. Pal and S. Chatterjee, Mixed convection magnetohydrodynamic heat and mass
transfer past a stretching surface in a micropolar fluid-saturated porous medium under the
influence of Ohmic heating, Soret and Dufour effects. Commun Nonlinear Sci Numer
Simulat 16 (2011) 1329-1346
[8] R. Kandasamy, K. Periasamy, K.K. Sivagnana Prabhu, Effects of chemical reaction,
heat and mass transfer along a wedge with heat source and concentration in the presence
of suction or injection, Int. J. Heat Mass Transf. 48 (2005) 13881394.
[9] R. Kandasamy, I. Muhaimin, A.B. Khamis, Thermophoresis and variable viscosity
effects on MHD mixed convective heat and mass transfer past a porous wedge in the
presence of chemical reaction, Heat Mass Transf. 45 (2009) 703-712.
[10] R. Cortell, MHD flow and mass transfer of an electrically conducting fluid of second
grade in a porous medium over a stretching sheet with chemically reactive species. Chem
Eng. Process 46 (2007) 721-728.

www.bitm.org.in Volume: 6 No: I February 2017 8|P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
[11] S. Shaw, P.K. Kameswaran and P. Sibanda, Homogeneous-heterogeneous reaction
in micropolar fluid flow from a permeable stretching or shrinking sheet in a porous
medium, Boundary value problems 77 (2013) 1-10.
[12] Alam MS, Rahman MM, Sattar MA. Similarity solutions for hydromagnetic free
convective heat and mass transfer flow along a semi-infinite permeable inclined flat plate
with heat generation and thermophoresis. Nonlinear Anal Model Control 2007: 12(4);
433-445.
[13] Abel, M.S., Mahesha, N., 2008. Heat transfer in MHD viscoelastic fluid flow over a
stretching sheet with variable thermal conductivity, non-uniform heat source and
radiation. Appl. Math. Model. 32, 1965-1983.

www.bitm.org.in Volume: 6 No: I February 2017 9|P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Destination branding: Using multisensory branding


techniques in creating destination image
Arup Kumar Baksi
Associate Professor, Dept. of Management & Business Administration
Aliah University, West Bengal
Contact: +91-9434155575, Email: baksi.arup@gmail.com

Abstract

Destination branding has been acknowledged to be critical in communication with the


visitors, yet, there has been a substantial dearth of research focus on the issue. This paper
aims to develop and test a theoretical causal model of destination branding by integrating
the concepts of multisensory branding and destination image. The study develops the
concept of sensory image as a new component of destination brand associations based on
the sequential steps of multisensory branding. It is proposed that brand image of
destination mediates the relationship between brand associations and behavioural pattern
of the visitors. The results confirmed the hypotheses as sensory image proved to be a
significant contributor to shape destination brand image, which, in turn, was found to
have a significant mediating effect on the relationship between brand associations and
visitors behavioural pattern. Multisensory branding process seemed to have an impact on
cognitive image too.
Key words: branding, multisensory, destination, brand associations, image

Introduction

Services branding with specific reference to tourism industry entails the experiential
quotient for brand building and therefore gives paramount importance to visitors
intention to choose and stay at a destination. Choice of a destination has been researched
as a process of evocation by the visitors (Tasei & Kozak, 2006). But mere inclusion of a
host of destinations in the evoked set of the visitors may not be enough, as individual
destinations are having unique differential features stimulating the choice decision (Qu et
al., 2011). Therefore the choice of destination is strongly grounded on the extent to which
they can be differentiated on the basis of destination attributes (Pawaskar & Goel, 2014).
Destination attributes contribute in the makeup of destination branding. Research in the
domain of destination branding have highlighted the concept of destination image as a
perception about a place visited as reflected by the associations preserved in the memory
of the visitor (Cai, 2002; Pike, 2009). While constructing propositions for destination
image researchers have often pondered on the possible associations between the visitors
and the destination visited. Based on the understanding that destination image is a
combination of cognitive and affective evaluations having strong inputs from sensory
perceptions (Hosany et al, 2007, Uysal et al., 2000), it is suggested that brand
associations should also include cognitive and affective image components (Pike, 2009).
These two components are accepted as influential indicators of destination image
(Hosany et al., 2007; Baloglu & Mangaloglu, 2001).
www.bitm.org.in Volume: 6 No: I February 2017 10 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
Destination branding, in general, has been identified as a set of marketing activities that
reinforces the differentiation between destinations based on attributes, conveys the
expectations of a memorable travel experience that is uniquely associated with the
destination, serves to consolidate the emotional attachment between the visitor and the
destination and reduces the perceived risk associated with the visit (Blain, 2005). With
markets overflowing with claims of superior brands it has become quite imperative to
penetrate the crowds and noise of brands. Marketers tried to move away from the
conventional form of mass marketing to more personalized relationship marketing setup
but, that too proved to be inadequate in the context of destination marketing. For years
the sensory perceptions of the consumers (sight, sound, smell, touch and taste) have
guided them towards selection and endorsement of brands, yet, they were largely
neglected as constructs in sensory image building by the researchers. Experience logic
defines the individual sensory perception of a consumer about a brand which, in essence,
is a cognitive projection of consumer- expectations from a brand. The experience logic
essentially is shaped up by the human brain in conjunction with the five senses (Hulten et
al., 2009). The most significant influencers as per Lindstrom & Kotler (2005) were found
to be vision and smell followed by hearing, taste and touch. Based on sensory
involvement in purchasing, marketers often used subliminal perception of consumers in
marketing products particularly in multi-branded retail outlets. Singapore Airlines, for
example, matches the aroma in the cabin with the interior colour scheme and the
uniforms worn by the flight attendants (sight) to create a unique sensory experience for
their customers (Joshua, 2008). Studies were also indicative of a significant relationship
between usage of stimulating aroma and increase in sales (Morrin & Chebat, 2005). The
tourism industry has also started using aroma in the waiting lounges, lobbies of hotels &
resorts, spas, wellness units and dining facilities as stimulant to favourable image
perception.
This study argues that sensory image of a destination needs to be considered as a
significant brand association to influence the image of a destination brand. Creating a
differentiated destination image has become a basis for sustainability of the competing
destinations in the global market place. Multisensory branding techniques can be used for
positioning destinations based on sensory images (Fan, 2006). Although sensory images
are understood to contribute a lot in branding, comprehensive research work towards
assimilating its effect in destination image building has remained inconclusive.

Literature review

Destination branding is the strategy of communicating differentiation with the visitor


based on destination attributes (Morrison & Anderson, 2002). Considering the complex
nature of a destination to be a brand it is quite inevitable that creation of identity is
equally important as differentiation (Qu et al., 2011). Based on the projected brand
identity of a destination the visitors tend to develop a bonding with the destination which
apparently is a culmination of perceived travel experience (Konecnik & Go, 2008). Apart
from creating a brand identity, a destination brand differentiates itself from its competing
destinations in terms of the unique attributes and offerings that serve as an attachment
factor for the visitors namely quality of accommodations, dining facilities, public utilities,
accessibility, ethno-cultural phenomenon and physical landscape (Baker, 2007). Point of

www.bitm.org.in Volume: 6 No: I February 2017 11 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
differentiation facilitate visitors to perceive destinations based on the identity created and
forms an image of the same (Keller, 2008).
Research thus far have argued that brand identity and brand image are critical inputs for a
vibrant destination brand (Florek et al., 2006; Nandan, 2005) with the identity being
created by the sender (Destination Marketing Organizations) and the image being
perceived by the visitors (Kapferer, 1997). Brand identity reflects the contribution of the
brand elements, assigns direction to the strategic vision of the brand and acts as the driver
of brand associations (Keller, 1998; Aaker, 1996). Brand image, on the other hand, is
conceptualized as perceptions of consumers regarding a brand as reflected by the brand
associations (Keller, 2008). While branding a destination the sender (destination
marketers) propagates the brand identity (a composition of destination attributes and
scope of activities) as a potent differentiator and the receiver (visitors) perceives the
destination image (Florek et al., 2006). Destination marketers can create a positive
destination brand image by emphasizing on unique brand associations (Qu et al., 2011).
Brand associations stimulate consumer decision about brand preference (Low & Lamb,
2000) and can be classified into attributes, benefits and attitudes (Keller, 1998). While
attributes are perceived to be the brand offerings, the benefits are the experiential
attachment with the brand based on the offerings (Qu et al., 2011). Brand attitudes are
consumers overall evaluation about a brand based on attributes and benefits and are
significant determinants of post-purchase behaviours. Image perception of a destination
has been identified as a critical brand asset and often determines the behavioural pattern
of the visitors (Ryan & Gu, 2008). Research, thus far, has identified cognitive and
affective dimensions of destination image (Hosany et al., 2007) whereby cognitive
aspects are beliefs and affective evaluation refers to the feelings associated with the
destination (Baloglu & Brinberg, 1997). The Image Formation Process laid down by
Gartner (1993) has been acknowledged as a comprehensive model for destination
branding which, in turn, is compatible with Kellers (1998) concept of brand association.
This paper, therefore, proposes that destination brand image is influenced by the
cognitive and affective image perceived by the visitors about the destination and draws
rationale from the existing literature on destination image and brand associations. The
cognitive and affective components are apprehended to have mutually exclusive impact
on the formation of perceived destination image unlike the previous research
observations where these components were considered to have an amalgamated impact
on destination image (Cai, 2002; Woodside & Lysonski, 1989). Therefore the following
hypotheses were proposed:

H1: Destination image is influenced by cognitive image perception of visitors


H2: Destination image is influenced by affective image perception of visitors

The sensory influence on image component has not been explored empirically, although,
sensory perception of destination is apprehended to be quite critical in shaping the overall
destination image. The use of multi-sensory marketing strategies are emerging as a
paradigmatic shift from 2-dimensional marketing (use of sight & sound) to 5-dimensional
marketing (use of all five senses) to build up a comprehensive image of the destination.
Multi-sensory marketing creates an emotional make-up of the visitors by linking the
experiential output with the sensory organs which creates a memory-trap about the
destination (Pawaskar & Goel, 2014). Visual and olfactory senses were well used in the
www.bitm.org.in Volume: 6 No: I February 2017 12 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
retail industry to stimulate the subliminal perception of the consumers and assist them in
taking purchase decisions (Baksi, 2013). The visual existence of the destination often
play the numero-uno role in making lasting imprint on the sensory perception of the
visitors. Odours or aroma probe the human brain for impulse decision and often
differentiates between propositions (Russell & Pratt, 2008). Characterization of brands by
signature sound prevails in marketing (Hulten, 2009). Evocation of a sense of upscaling
or exclusivity has also been witnessed by using music and signature tune by the
marketers (Lindstrom, 2005). Destinations having profound indigenous ethno-cultural
backdrop can use the sound to lure visitors as witnessed in the tribe-infested destination
like Santiniketan in West Bengal. The sound of the Santhal (a tribe) drum and flute has
precipitated in the sub-conscious of the visitors to the extent that visitors on repeat
visitation exercise preferential sequence to expose themselves to the sound-of-
destination. The sensorial strategy of taste is probably one of the critical success factors
to destination branding. Gustative marketing or use of taste attempts to connect the
visitors with the local gastronomy and can contribute to create an image of a brand (Bertil
et al., 2009). Tactile marketing or use of touch has remained an elusive phenomenon in
the product-dominated industry, but, in tourism the human touch through service-
employees creates a sense of assurance and security for the visitors (Pawaskar & Goel,
2014). Rewatka (2009) observed that activation of five senses in visitors can facilitate
brand consciousness through emotional linkages. Qu et al. (2011), in one of their studies
introduced the concept of unique image, a construct that envisages the overall image of
the destination and was found to have an impact on visitors perception about destination
image. Uniqueness based on attributes and benefits differentiates between destinations
and can rather be used a positioning tool by the destination marketers. But sensory
images, at the micro level, can be a more potent contributor to destination image
building. Sensory assimilations of destinations attributes and activities contribute to
brand associations (Keller, 2008).
Therefore it is deduced that:

H3: Sensory image will affect visitors destination image perception.

Literature supports the notion that image perception of a destination not only facilitates
destination choice but also triggers a host of behavioural pattern on part of the visitors
(Bigne et al., 2001). Two of most acknowledged post-visit behaviours of the visitors are
intention to revisit and word-of-mouth (WOM) advocacy. Previous studies have
confirmed that overall image is a pivotal factor to elicit the intention to revisit the
destination. (Alcaniz et al, 2005). WOM can reduce perceived risk associated with the
intangibility in services (Murray, 1991). WOM can influence visitors choice of
destination and therefore is a good indicator of favourable destination brand image
(Yvette & Turner, 2002; Weaver & Lawton, 2002; Oppermann, 2000). Bigne et al.
(2001) suggested visitors with positive destination image are likely to be involved in
positive WOM. Therefore it is understood that brand image shall act as a mediator in the
relationship between cognitive, affective and sensory inputs to destination image and
behavioural manifestations of the visitors. Therefore it is hypothesized that:

H4: Brand image perceived by visitors will mediate the relationships between destination
image inputs (cognitive, affective & sensory) and repeat visitation by visitors.
www.bitm.org.in Volume: 6 No: I February 2017 13 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
H5: Brand image perceived by visitors will mediate the relationships between destination
image inputs (cognitive, affective & sensory) and positive WOM by visitors.

Fig. 1 represents the conceptual model involving all the variables:

Cognitive Repeat
image visitation
H H
1 4
H Destinatio
Affective
2 n Brand
image
image
H Positive
5 WOM
H
Sensory
3
image

Fig.1: A conceptual model of destination branding

Methodology

Domestic visitors visiting Santiniketan, an ethno-cultural heritage destination, during the


two most prominent events namely Poush Mela (The Winter Fare) and Basantotsav (The
Spring Fest) in 2015-2016 were targeted as respondents. The sample size was determined
by confidence interval approach (Burns & Bush, 1995). With 60% of the estimated
variability in the population the sample size was set to 435 at 95% confidence level. The
response rate and un-usability of response were assumed to be 30% and 5% respectively.
Therefore 1243 (435/.35) visitors (respondents) were approached for the study. Two
stage sampling was used for the study. The five most thickly populated hotels/ resorts
were identified. The subsample of these five hotels/ resorts with maximum attendance
was stratified proportionately. The next step was to implement systematic random
sampling (SRS). The interval of the samples (nth) was determined by taking a ratio of the
total attendance of all the five top-attended hotels/resorts and individual attendance of
each hotel/ resort. The survey instrument was a structured questionnaire. The factor
construct for cognitive image perception were adopted from Qu et al. (2011) and a host of
allied literature reviewed. Initially a list of 43 items was used to portray the cognitive
image as an input for destination brand image. A focus group was engaged comprising of
academic experts and practitioners in the field of tourism and travel to refine the
construct. The exercise finalised 22 items to describe cognitive image and the response
sheet was fit to a five point scale from strongly disagree (1) to strongly agree (5).
Affective image construct was adopted from the bi-polar scale developed by Russel et al.
(1981). The four dichotomy of the scale includes: arousing-sleepy, pleasant-unpleasant,
exciting-gloomy and relaxing-distressing. A 7 point Likert scale was assigned with the
positive poles assuming the lower values. The respondents were also asked to franchise
their opinion about the overall brand image of Santiniketan as a destination for tourism
on a 7 point Likert scale with 1 being very negative and 7 being very positive. The
www.bitm.org.in Volume: 6 No: I February 2017 14 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
items determining sensory image perception were adopted from the studies made by
Russel (1981), Pawaskar & Goel (2014), Rewatka (2009) and Bertil et al. (2009). The
questions regarding post purchase behaviour of the visitors namely repeat visitation and
positive WOM were fitted in a 5 point scale with 1being most unlikely and 5being
most likely. A pilot study was conducted to understand the capability of the instrument to
capture the constructs adequately. The questionnaire was randomly distributed to 50
visitors in Santiniketan who availed hospitality in the top 5 hotels / resorts. All 50 filled
up questionnaires were collected individually. A reliability test was conducted which
revealed Cronbachs alpha of 0.93 for cognitive image items, 0.89 for the affective image
items and 0.91 for the sensory image items which were considered acceptable as standard
reliability measure (Hair et al., 1998).

Data analysis
Exploratory factor analysis (EFA) was used to determine the underlying dimensions of
the cognitive and sensory image of the destination, Santiniketan. Confirmatory factor
analysis (CFA) and Structural Equation Modeling (SEM) were used to test the proposed
conceptual model of destination branding. IBM SPSS 21 and LISREL 8.8 were used to
process the data.
The Barletts test of sphericity gave significant result (2 = 2897.32, p = 0.00)
establishing a nonzero correlation. The sample adequacy (MSA) was found to be 0.916
which surpassed the adequate value of 0.50 (Hair et al., 1998) and hence the data was
found amenable to EFA. Principal component analysis with orthogonal rotation using the
VARIMAX process was deployed to assess the underlying dimensions of cognitive and
sensory images. Based on the eigen values (>1), scree-plot criteria and the percentage of
variance 4 dimensions were identified with estimated variance of 64.7%. Among the 22
items initially used to describe cognitive image 2 items namely variety of
accommodations and availability of sports facility scored low (<0.40) on
communalities and loading and hence discarded (Hair et al., 1998). The deletion of these
two items increased the total variance explained to 67.7%. The results of the principal
component analysis are displayed in Table-1.

Table-1: Results of Exploratory Factor Analysis (Dimensions of cognitive image)


Attributes Factor loadings Communality
Dimension-1: Experience quality F1

Ease of access to the destination .871 .791

Friendliness of the local community .823 .772

Physical landscape of the destination .798 .687

Ethno-cultural attraction of the destination .731 .634

Accommodation facilities .683 .597

Dimension-2: Attraction for tourism F2

Local cuisine .712 .688

Festivals of the destination .698 .653

www.bitm.org.in Volume: 6 No: I February 2017 15 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Local handicraft clusters .654 .629

Serenity of the destination .629 .597

Good place for family visit .617 .571

Heritage associated with the destination .603 .560

Dimension-3: Infrastructure & facilities F3

Unpolluted environment .823 .754

Well supported infrastructure .784 .699

Availability of travel information .735 .701

Safe & secure environment .690 .655

Availability of local logistic and other amenities .621 .583

Dimension-4: Activities F4

Entertainment in festivals .727 .707

Visit to sites of heritage .672 .644

Visit to artisan hub and handicraft clusters .615 .601

Pilgrim tour .593 .569

Eigenvalues 7.1 3.2 2.3 1.1

Variance (%) 24.8 19.6 12.9 10.4

Cumulative variance (%) 21.8 44.4 57.3 67.7

Cronbachs alpha 0.91 0.89 0.84 0.81

To understand the underlying dimensions of sensory image principal component analysis


(PCA) with VARIMAX rotation was deployed. The Barletts test of sphericity and MSA
supported data type for PCA. Based on the extraction of factors, four dimensions were
identified for sensory image explaining 58.6% variance. The results of PCA are displayed
in Table-2.
Table-2: Results of Principal Component Analysis (Dimensions of sensory image)
Attributes Factor loadings Communality
Dimension-1: Optic image F1
Destination atmospherics is pleasing to eyes .772 .752
Festivals offer visual feast .749 .715

Traditional artwork are visually attractive .668 .621

Local rituals are visually exciting .637 .587

Dimension-1: Olfactory image F2

Unpolluted rustic smell of environment .704 .674

Dimension-3: Gustative image F3

Local cuisine offers satisfactory culinary experience .729 .678

www.bitm.org.in Volume: 6 No: I February 2017 16 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Local cuisine includes exotic offerings .691 .663
Farm-to-table experience .652 .638

Dimension-3: Auditory image F4

Silence and tranquillity of the environment .69 .664


Local folk-based traditional hymns 1
.64 .627
Chirping of birds in natural backdrop 1
.58 .564

Eigenvalues 3.1 2.1 1.4 7


1.1

Variance (%) 21.5 15.8 11.2 10.

Cumulative variance (%) 21.5 37.3 48.5 158.

Cronbachs alpha 0.79 0.74 0.71 6


0.7
8
The response on affective image based on dichotomous choice option for the respondents
were significantly and positively loaded in favour of the positive descriptors of the
destination under study.
Therefore the three-construct measurement model can be represented as in Table-3

Table-3: Three-construct measurement model


Factor loadings on constructs
Dimensions
Cognitive image Sensory image Affective image
Experience quality FL1
Attraction for tourism FL2
Infrastructure & facilities FL3
Activities FL4
Optic image FL5
Olfactory image FL6
Gustative image FL7
Auditory image FL8
Pleasant FL9
Arousing FL10
Relaxing FL11
Exciting FL12

Covariance matrix was obtained for conducting the confirmatory factor analysis (Table-
4). LISREL (8.80) was used to estimate the measurement model and construct
covariances.
Table-4: Covariance matrix for CFA

Variables X1 X2 X3 X4 X5 X6 X7 X8 X9 X10 X11 X12

X1 Experience
18.42
quality
X2 Attraction for
13.21 17.27
tourism
X3 Infrastructure
8.73 11.92 11.26
& facilities
X4
Activities 5.42 8.72 8.56 7.09

www.bitm.org.in Volume: 6 No: I February 2017 17 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
X5
Optic image 3.61 6.96 4.31 4.39 4.82
X6 Olfactory
2.87 4.32 2.91 2.74 2.73 2.64
image
X7 Gustative
2.76 2.09 2.09 2.01 1.72 1.08 1.32
image
X8
Auditory image 1.98 1.64 1.27 1.67 0.92 0.86 0.91 1.01
X9
Pleasant 1.72 -0.33 -0.62 0.85 0.91 -1.02 -1.08 0.87 0.92
X10
Arousing -0.67 1.02 1.12 -1.17 -0.71 0.95 0.63 -0.21 0.69 0.73
X11
Relaxing 0.09 -0.91 -0.42 -0.72 -0.56 -0.44 -0.77 -0.39 0.71 -0.69 1.29
X12
Exciting -1.21 -1.28 -0.31 -0.69 -0.43 -0.38 -0.65 -0.59 -0.55 0.52 0.32 2.09

The measurement model was estimated for assessing overall model fit. The fit statistics
assured a good fit for the model (2 = 159.04, df = 92, p<0.05, GFI = .95, AGFI = .93,
TLI = .90). Indicator loadings for statistical significance were obtained. Estimation of
reliability and variance extracted were also done. The results of the loadings with t values
are shown in Table-5. As far as reliability of the image constructs are concerned,
cognitive image (0.89), sensory image (0.79) and affective image (0.71) surpassed the
threshold level of 0.70 (Qu et al, 2011). The measures support the convergent validity of
the items. For variance extraction, all the three constructs namely cognitive image (0.71),
sensory image (0.63) and affective image (0.61) met the cut-off value of 0.50.

Table-5: SEM results: Standardized parameter estimates for SEM model construct
loadings

Exogenous constructs Structural


Endogenous Brand Repeat Positive
Cognitive Sensory Affective equation
constructs image visitation WOM
dimension dimension dimension fit (R2)
Brand image 0.000 0.000 0.000 0.71 (4.72**) 0.63 (3.44**) 0.41 (2.08*) 0.61
Repetition of 0.64
0.000 0.000 0.000 0.000 0.000 0.54
visit (4.81**)
Positive 0.56
0.000 0.000 0.000 0.000 0.000 0.39
WOM (3.97*)
*Significant at 0.05 level (critical value=1.96)
**Significant at 0.01 level (critical value=2.576)

The structural model was accepted based on the results of CFA as the goodness-of-fit
indices supported the cause (2 = 148.63, df = 78, p<0.05, GFI = .94, AGFI = .91, TLI =
.89, RMSEA = .04, RMSR = 0.069). All the paths in the structural model were
statistically significant. Cognitive image was found influential in determining the
destination brand image (standardized coefficient = 0.71, t = 4.72, sig. 0.01).
Hypothesis-1 (H1) was accepted. Hypothesis-2 (H2) was also accepted as affective image
was also found to have moderate impact in the creation of destination brand image
(standardized coefficient = 0.41, t = 2.08, sig. 0.05). Sensory image, the introductory
www.bitm.org.in Volume: 6 No: I February 2017 18 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
concept, was also found to have a positive impact on the brand image of the destination
(standardized coefficient = 0.63, t = 3.44, sig. 0.01) leading to acceptance of
hypothesis-3 (H3). Hypothesis-4 and 5 were tested for mediation between brand
association inputs and post-travel behaviour by destination brand image and were found
significant for repeat visitation (standardized coefficient = 0.64, t = 4.81, sig. 0.01) and
for positive WOM (standardized coefficient = 0.56, t = 3.97, sig. 0.01). Nested model
approach was adopted as the proposed model was compared with the competing model.
The first model (Model-1) postulates a full mediation role of the destination brand image
between all three types of brand associations and post-travel behaviours. The second
model (Model-2) is based on both direct and indirect effects through mediation of
destination brand image on repeat visitations and positive WOM.

2
1

1
2

3
3

Fig.2: Full mediation model

1 2

2 1

Fig.3: Partial mediation model


(1- cognitive image, 2- affective image, 3- sensory image,
1- destination brand image, 1- repeat visitation, 1- positive WOM)

www.bitm.org.in Volume: 6 No: I February 2017 19 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

0.36 X1 0.71 Y1 0.65

0.41 X1 0.79
Cognitiv Y2 0.72
e image 0.6
0.29 X1 0.84
0.78 1
0.71
0.8 (4.72**) Repeat
0.31 X1 visitation
6
0.64 (4.81**)
0.27 X1 0.6 0.41 (2.08*)
9 Destinatio
Affectiv n brand
0.30 X1 0.69 image
e image

0.56 (3.97*)
0.25 X1 0.73

0.81 0.63 (3.44**) Positive


0.5 X1 WOM
5
0.5 X1 0.7 Sensor 0.6
8 9 y 5
image Y2 0.68
0.6 X1 0.80
5

Fig.4: Final structural model

The models were tested for significant difference with 2 difference. The result produce
insignificant difference between the models ( 2=2.19, df=3). Therefore the
parsimonious Model-1 was retained.

Conclusion and implication

The study postulated a conceptual model of destination branding and aimed to test it. The
destination brand image was conceptualised as a three construct build-up namely
cognitive image, affective image and sensory image. Sensory image as a brand
association concept has been introduced for the first time based on theoretical inputs. It
was proposed that the brand association inputs have an impact on destination brand
image which subsequently had antecedent effects on post-travel behaviours namely
repeat visitation and positive WOM. It was further proposed that destination brand image
mediates the relationship between brand associations and post-travel behaviours. The
results revealed that the brand association inputs had a strong and positive impact in
shaping up destination brand image. Destination brand image was also found to have a
significant impact on the post-travel behaviours. Lastly, destination brand image was
found to have mediating effect on the relationship between brand associations and post-

www.bitm.org.in Volume: 6 No: I February 2017 20 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
travel behaviours. The destination marketers, therefore, pursue destination brand building
on the basis of visitors perception of cognitive, sensory and affective image about the
same to ensure a favourable post-travel behaviour. The study confirmed earlier studies (in
retail sectors) by Russel (1981) regarding the impact of sensory perception of visitors
towards framing a brand image. The results also confirmed the previous observation that
the image of a destination influences the repeat visitation and positive WOM on the part
of the visitors (Alcaniz et al., 2005). It was also noted that destination brand image as a
holistic variable had a more deterministic role in post-travel behaviours compared to the
individual brand association components and as a result supported the earlier notion of
Baloglu and Brinberg (1997) that the brand association components are often converged.
Cognitive image was found to have a significant impact on the overall destination brand
image thereby supporting the earlier studies made by Baloglu & McCleary, 1999; Stern
& Krakover, 1993).
Sensory brand association as a brand image input has been introduced in the study.
Although the inherent criticality of service industry with regard to its intangibility and
lack of standardization (heterogeneity) inhibits the usage of sensory perception to a lesser
extent compared to a more tangible product market; sensory image input, apart from the
tactile image, was found to have a prominent role to play in the destination brand-image.
Sensory image should not be confused with the cognitive image. Sensory image imparts a
physical assimilation of feelings as opposed to psychological interpretations made by the
cognitive self. Examinations are required with regard to the contribution of sensory
perception in capturing the unique image of a destination. The study confirmed a
significant impact of affective brand associations in projecting destination brand image
and thereby supported the notion of Baloglu & McClearys (1999) observations. The
study also confirmed the interpretations of Qu et al. (2011) regarding the role played by
the brand association components in framing the overall destination brand image and that
the perceived destination brand image (by the visitors) must be congrual with the
destination brand identity (projected by the destination marketers) to have a significant a
positive imapct on the behavioural consequences of the visitors.
The present study identified a number of differentiating factors to position Santiniketan
as a unique destination, specifically, on the ground of sensory image inputs namely visual
image related to local festivals, culture and tradition, gustative image namely farm-to-
table cuisine and auditory image namely local folklores and hymns. Therefore while
projecting a destination identity for Santiniketan these sensory inputs may be
incorporated to facilitate a positive destination brand image of the same.

Limitations & future study


The study has been restricted to a specific destination namely Santiniketan, therefore,
needs to be expanded in other geo-demographical destinations for generalization. Further
the study used five top hotels/ resorts of Santiniketan as a basic sampling frame and did
not consider a host of other accommodations. The top five accommodations for the study
were chosen on the basis of occupancy rate. In future other staying options should be
explored to incorporate probable different layers of visitors. Destination brand image may
be influenced by other variables namely travel motives and therefore travel motives
should be explored as a brand association component.

www.bitm.org.in Volume: 6 No: I February 2017 21 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Reference

[1] Aaker, D. A. (1996). Building strong brands, New York: The Free Press.
[2] Alcaniz, E. B., Garcia, I. S., & Blas, S. S. (2005). Relationships among
residents image, evaluation of the stay and post-purchase behavior, Journal of
Vacation Marketing, 11(4), 291-302
[3] Baker, B. (2007). Destination branding for small cities: The essentials for
successful place branding. Portland: Creative Leap Books
[4] Baksi, A. K. (2013), Moderating effects of CRM on e-tail atmospherics-
shopping behaviour link: A case of modified Mehrabian-Russell model, SIT
Journal of Management (online), Siliguri Institute of Technology 3 (Spl.), 1-27.
[5] Baloglu, S., & Brinberg, D. (1997). Affective images of tourism destination,
Journal of Travel Research, 35(4), 11-15
[6] Baloglu, S., & Mangaloglu, M. (2001). Tourism destination images of Turkey,
Egypt, Greece, and Italy as perceived by US-based tour operators and travel
agents. Tourism Management, 22(1), 1-9.
[7] Baloglu, S., & McCleary, K. (1999). A model of destination image formation,
Annals of Tourism Research, 26(4), 868-897.
[8] Bign, J. E., Snchez, M. I., & Snchez, J. (2001). Tourism image, evaluation
variables and after purchase behavior: inter-relationship, Tourism Management,
22(6), 607-616.
[9] Blain, C., Levy, S. E., & Ritchie, J. R. B. (2005). Destination branding: insights
and practices from destination management organizations. Journal of Travel
Research, 43(4), 328e338.
[10] Burns, A. C., & Bush, R. F. (1995). Marketing research, New Jersey: Prentice
Hall.
[11] Cai, A. (2002). Cooperative branding for rural destinations. Annals of Tourism
Research, 29(3), 720-742.
[12] Fan, Y. (2005). Branding the Nation: What is being branded, Journal of
Vacation Marketing , 12 , 1, 5-14.
[13] Florek, M., Insch, A., & Gnoth, J. (2006). City council websites as a means of
place brand identity communication, Place Branding, 2(4), 276-296.
[14] Gartner, W. C. (1993). Image formation process, Journal of Travel and Tourism
Marketing, 2(2/3), 191-215.
[15] Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998). Multivariate
data analysis (5th ed.). New Jersey: Prentice Hall.
[16] Hosany, S., Ekinci, Y., & Uysal, M. (2007). Destination image and destination
personality. International Journal of Culture, Tourism and Hospitality Research,
1(1), 62-81.
[17] Bertil, H., Broweur, N. & Van Dijk, M. (2009). Sensory Marketing. New York:
Palgrave Macmillan.
[18] Joshua G Giordmaina, (2008). Multisensory Marketing and its Application in
Tourism. [online] Available at http://www.scribd.com/doc/9296907/Multi-
Sensory-Marketing-and-Its-Application-in-Tourism [Accessed 11/11/2016]
[19] Kapferer, J. (1997). Strategic brand management. Great Britain: Kogan Page.
[20] Keller, K. L. (2008). Strategic brand management: Building, measuring, and
managing brand equity (3rd ed.). New Jersey: Prentice Hall.
www.bitm.org.in Volume: 6 No: I February 2017 22 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
[21] Keller, K. L. (1998). Strategic brand management: Building, measuring, and
managing brand equity, New Jersey: Prentice Hall
[22] Konecnik, M., & Go, F. (2008). Tourism destination brand identity: the case of
Slovenia. Brand Management, 15(3), 177e189.
[23] Lindstrom, M. & Kotler, P. (2005). Brand sense build powerful brands through
touch, taste, smell, sight, and sound. New York: Free press
[24] Low, G. S., & Lamb, C. W. (2000). The measurement and dimensionality of
brand associations, Journal of Product & Brand Management, 9(6), 350-368.
[25] Morrin, M. and Chebat J-C. (2005), Person-Place Congruency: The Interactive
Effects of Shop.er Style and Atmospherics on Consumer Expenditures, Journal
of Service Research, 8(2), 181-191.
[26] Morrison, A., & Anderson, D. (2002). Destination branding. Available from:
http:// www.macvb.org/intranet/presentation/DestinationBrandingLOzarks6-10-
02. ppt accessed on 11.11.16.
[27] Murray, K. B. (1991). A test of services marketing theory: consumer
information acquisition Activities, Journal of Marketing, 55(1), 10-25.
[28] Nandan, S. (2005). An exploration of the brand identity-brand image linkage: a
communications perspective, Brand Management, 12(4), 264-278.
[29] Oppermann, M. (2000). Tourism destination loyalty, Journal of Travel Research,
39 (1), 78-84
[30] Pawaskar, P. & Goel, M. (2014), A conceptual model: Multisensory marketing
and destination branding, Symbiosis Institute of Management Studies Annual
Research Conference (SIMSARC13), Procedia Economics and Finance, 11,
255-267.
[31] Pike, S. (2009). Destination brand positions of a competitive set of near-home
destinations. Tourism Management, 30(6), 857e866.
[32] Qu, H, Kim, L. H. & Im, H. H. (2011). A model of destination branding:
Integrating the concepts of the branding and destination image, Tourism
Management, 32, 465-476.
[33] Rewatkar, S. (2014). Factors Influencing Consumer Buying Behavior: A Review
(with reference to Online Shopping), International Journal of Science and
Research, 3(5), 1346-1349
[34] Russell, J. A. & Pratt, G. (1980). A Description of the Affective Quality
Attributed to Environments, Journal of Personality and Social Psychology, 38
(2), 311-22.
[35] Russel, J. A., Ward, L. M., & Pratt, G. (1981). Affective quality attributed to
environments: a factor analytic study, Environment and Behavior, 13(3), 259-
288.
[36] Ryan, C., & Gu, H. (2008). Destination branding and marketing: the role of
marketing organizations. In H. Oh (Ed.), Handbook of hospitality marketing
management (pp. 383-411). Oxford: Butterworth-Heinemann.
[37] Stern, E., & Krakover, S. (1993). The formation of composite urban image.
Geographical Analysis, 25(2), 130-146.
[38] Tasei, A. D. A., & Kozak, M. (2006). Destination brands vs destination images:
do we know what we mean? Journal of Vacation Marketing, 12(4), 299-317.
[39] Uysal, M., Chen, J., & Williams, D. (2000). Increasing state market share
through a regional positioning. Tourism Management, 21(1), 89-96.
www.bitm.org.in Volume: 6 No: I February 2017 23 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
[40] Weaver, D. B., & Lawton, L. J. (2002). Overnight ecotourist market
segmentation in the gold coast hinterland of Australia. Journal of Travel
Research, 40(3), 270-280.
[41] Woodside, A. G., & Lysonski, S. (1989). A general model of travel destination
choice, Journal of Travel Research, 27(4), 8-14.
[42] Yvette, R., & Turner, L. W. (2002). Cultural differences between Asian markets
and Australian hosts, part I. Journal of Travel Research, 40(3), 295-315

www.bitm.org.in Volume: 6 No: I February 2017 24 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Doing good is doing well-Indias take on CSR:


Indias Issues and Challenges
Sreyasi Ray1, Arpita Sil 2
1
Assistant Professor, The Heritage Academy, Kolkata,
Email: sreyashi.ray@heritageit.edu
2
Assistant Professor, The Heritage Academy, Kolkata,
Email: arpita.sil@heritageit.edu
The Heritage Academy, Maulana Abul Kalam Azad University of Technology, Kolkata,
India

Abstract
This research paper, based on secondary observation moves around developing an
understanding of the concept of Corporate Social Responsibility and finding out its scope
in India taking the case studies of Infosys, Aditya Birla Nuvo Group, Bandhan and
Piramal. While most of the companies routed their CSR spends in the area of their
business operation, this research can be helpful for the development of the overall
economy of the country as encouragement of investment in CSR activities in the rural
unorganized sector would ultimately lead to an equitable development thereby reducing
the disparity of wealth distribution among the various strata of the society, leading to
inclusive development.
Keywords: CSR, Rural Development, Inclusive Growth

INTRODUCTION

As Indian corporates are constantly striving to be more efficient in the competitive global
business scenario, they need to become equally proactive, accountable and socially
receptive to their immediate environments. The concept of creating a shared value has
very much entered into the discussion in the Indian Corporate scenario. CSR policies help
companies win new business; increase customer retention; improve relationships with
customers and suppliers: attract, motivate, and retain a satisfied work force; save money
on operating and energy costs; manage risk; differentiate itself from competitors; provide
access to investment and funding opportunities; and generate positive publicity and
media opportunities; and generate positive publicity and media opportunities. Dispersing
a percentage of the accruing benefits to the millions of people who are in need of food,
healthcare, education and growth is only a part of Corporate Social Responsibility
(CSR).As far as India is concerned, in spite of a lot of developmental endeavor and
optimistic projections, growth and development of the country has really not been very
inclusive. To cater to an inclusive growth of the country, it has been found out that
government reforms have to be complemented with private sector through their corporate
social responsibility activities and hence, corporates have to play a proactive part to
achieve this inclusive growth by ensuring the prosperity of the poorer section of the
population (Carroll, 2015).

www.bitm.org.in Volume: 6 No: I February 2017 25 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
A. a) CORPORATE CASE STUDY- I: INFOSYS:
Infosys Foundation is one of such platform which was established as a not-for-profit
nodal body aimed at providing a dedicative approach to community development and
also to fulfill their CSR commitments.In accordance with the requirements of the
Companys Act 2013, Infosys CSR activities will focus on five thrust areas to bring
meaningful impact: Healthcare, Education, Art and Culture, Destitute Care, Rural
Development.Other than this Infosys has also founded Infosys Foundation USA which
mainly focuses on bridging the digital divide in America. It aims to give children, young
adults, and workers across the United States the skills they need to become creators, and
not just consumers, of technology.
Infosys Science Foundation is another intiative by Infosys which institutes the Infosys
Prize, an annual award, to honor achievements of researchers and scientists across
engineering, computer science, physical sciences, social sciences, humanities,
mathematical sciences & life sciences
The provisions pertaining to corporate social responsibility as prescribed under the
Companies Act, 2013 are applicable to Infosys Limited.
b) Graph : 1 Sector wise allocation of CSR Funds: Infosys

c) INFOSYS: Findings and Analysis


Infosys has definitely lived upto the commitment as far as its social activities are
concerned and has crossed beyond the boundaries with their social activities. Total
amount spent for CSR in the financial year 2014-2015 was Rs. 239.54 crores as per
Annual Report (Annexure-VIII- Annual Report on CSR activities). Highest spending
was in the sector of Education, which was Rs. 102.63 crores. In the sector of
Healthcare it was Rs. 44.83 crores, in the sector of Malnutrition it was Rs. 38.83
crores, in the sector of Rural development it was Rs. 31.55 crores and in Art and
Culture it was Rs. 3.44 crores. From the above data it can be concluded that Infosys
in collaboration with Govt, various NGOs and premiere institutes has tried to focus
on an overall holistic development focusing primarily on education, health care,
removing malnutrition, preserving heritage and culture thereby encouraging and
popularizing the concept of Private Public Partnership (PPP), highlighting on the
rural development, leading to an overall inclusive development. It definitely focuses
on the aspect of sustainability as it is education which would ultimately create
www.bitm.org.in Volume: 6 No: I February 2017 26 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
employment opportunities thereby creating economic sustainability, leading to social
sustainability and finally bringing about environmental sustainability. However a
little more focus on the rural sector and a pan-India approach, covering the much
neglected parts of our country, instead of just focusing on South India is something
that should be taken care of.
B. a) CORPORATE CASE STUDY-II: ADITYA BIRLA
NUVO LTD.
All the community projects/ programmes are carried out under the aegis of The Aditya
Birla Centre for Community Initiatives and Rural Development and is led by Mrs.
Rajashree Birla, the Chairperson. The companys collaborative partnerships are formed
with the Government, the District Authorities, the village panchayats, NGOs and other
like-minded stakeholders. This helps widen the Companys CSR reach and leverage upon
the collective expertise, wisdom and experience that these partnerships bring to the table.
In collaboration with FICCI, the company had set up Aditya Birla CSR Centre for
Excellence to make CSR an integral part of corporate culture.
The Company also engages with well established and recognized programs and national
platforms such as the CII, FICCI, ASSOCHAM to name a few, to live up to their
commitment to inclusive growth.
b) Graph : 2 Sector wise allocation of CSR Funds: ADITYA
BIRLA NUVO LTD.

c) ADITYA BIRLA NUVO LTD. : Findings and Analysis

The work on several CSR initiatives has gained momentum during the year, resulting in a
spend of Rs. 9.61 crores (the same being 2.04% of the average net profits of the last 3
years as defined for the purposes of CSR). Highest spending was in the sector of Health
which is Rs. 518.16 lakhs, then Education, which is Rs. 102.63 lakhs, in the sector of
Environment, it was Rs. 75.78 lakhs, in the sector of rural development it was Rs. 25.64
lakhs, in the sector of Social Empowerment it was Rs. 30.15 lakhs.
The amount spend for CSR activities of Aditya Birla Nuvo Ltd. though is much less than
Infosys but its activities clearly depicts an effort to create inclusive development
www.bitm.org.in Volume: 6 No: I February 2017 27 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
concentrating mainly on health- which still remains a major area of lacunae in our
country. From the above data we also see that Aditya Birla Nuvo Ltd. concentrates on
creating a lot of awareness at the grass-root level and create an environment of social
empowerment and sustainability among the rural people of the country. Though from the
Annual Report we do not get the names of the collaborative partners of the company for
their CSR activities but their activity clearly implies that they have made the concept of
Private Public Partnership (PPP) a success in our country.
Aditya Birla Nuvo Ltd. in comparison to Infosys caters to much more states in India with
its social activities covering North, West and South and parts of the East. But North East
region of the country still remains an ignored area for their social activities too. Artistry
as an occupation which comprises as the second largest occupational sector after the
agriculturists, also require some attention in the CSR activities of the company.
C) a) CORPORATE CASE STUDY-III: BANDHAN GROUP
The focus of the Bandhans CSR activities is healthcare, education, livelihood
development, food security and physical living conditions. New areas are planned to be
added as and when required with the approval of the CSR Committee of the Board. The
services provided under the programmes, could be free or subsidized as per the
requirements of the beneficiaries, and the nature of the program. Different projects are
Bandhan Education Programme (BEP), Bandhan Health Programme (BHP)- , Targeting
the hardcore poor (THP), Employing the Unemployed Programme (EUP), Market
Linkage Programme (MLP), Renewable Energy Programme (REP)
b) Graph 3 Comparison with respect of number of states covered by various
Bandhan Programmes in the year 2012 and 2016

8
7
6
5
4
2012
3
2016
2
1
0 2016
THP 2012
BHP
BEP
EUP

c) BANDHAN GROUP: FINDINGS AND ANALYSIS

From the above literature, facts and figures of Bandhan we can clearly make out that
Bandhans CSR activities have spreaded in wings in wide number of geographical areas
and cover a large number of beneficiaries at present than before. One of the major
www.bitm.org.in Volume: 6 No: I February 2017 28 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
programmes of Bandhan- Targetting the Hardcore Poor (THP) which covered 4 states in
2012, now covers 8 states in 2016 and has increased the no of beneficiaries from 8706 to
41,589. In August 2011, with an additional impetus by Axis Bank Foundation, the
programme became all the more intensified in the villages of Murshidabad and South 24
Parganas- the two districts of West Bengal. This particular programme has helped
Bandhan to increase their commercial venture too by identifying all the more people as
borrowers of their microfinance and targeting the people who are interested in various
savings and banking policies of their banks too. As huge population of this poor segment
includes artisans of various indigenous art and crafts, this programme has also helped
Bandhan Creations to identify various artisans, link them to the market linkage
programme, provide them the platform to supply products for their retail store, provide
technical training, transform designs and provide financial impetus thereby creating a
trickledown effect of creation of livelihood which is nevertheless a very crucial part of
inclusive development.

D) a) CORPORATE CASE STUDY-IV: PIRAMAL


The Company has already established the following entities through which it pursues its
CSR activities: a) PiramalUdgam Data Management Solutions; This is a company
incorporated under Section 25 of the erstwhile Companies Act, 1956 (corresponding to
Section 8 of the Companies Act, 2013). This Company is a wholly controlled subsidiary
of the Company. Piramal Udgam is engaged in the business of rural BPO that provides
top-quality BPO services to global clients at competitive prices thus empowering rural
India with employment opportunities (particularly for women). b) Piramal Foundation for
Education Leadership; This is a company incorporated under Section 25 of the erstwhile
Companies Act, 1956 (corresponding to Section 8 of the Companies Act, 2013). This
Company is a wholly controlled subsidiary of the Company. PFEL works towards
building capacity of public school head-masters to constructively solve the challenges
and devising strategies to deliver quality education to the students. It invests in resources
in developing leadership capabilities of the school head-masters to facilitate school
reforms. c) Health Management Research Institute; This is a Society in which the
Company has a majority control. This Society is registered under the Andhra Pradesh
Societies Registration Act, 2001. HMRI works towards making healthcare accessible,
affordable and available to all segments of the population, especially those most
vulnerable. In order to achieve this goal, HMRI leverages cutting edge information and
communication technologies to cut costs without compromising quality as well as public-
private partnerships to scale its solutions throughout India and beyond. The Company
also pursues CSR Activities either on its own, including through donations or through
other entities engaged in CSR activities. Where the Company undertakes CSR Activities
through an entity which is not established by the Company or its holding company or
subsidiary or associate company, the entity is required to have an established track record
of three years in undertaking similar programmes or projects. In such cases, the projects
to be undertaken through these entities, the modalities for utilization of funds on such
projects and the monitoring and reporting mechanism would be specified. Thus keeping
in mind its core areas of intervention Piramal foundation mainly runs three projects

www.bitm.org.in Volume: 6 No: I February 2017 29 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Piramal Swasthya- Piramal Swasthyas services spread across 11 states in the
country. PiramalSwasthya possesses technological and management strengths
and specialized medical expertise and has impacted more than 76 million
beneficiaries. The Health Information Helpline (HIHL) is a health contact centre
that aims to reduce minor ailment load on the public health system. The
Telemedicine Services brings the much needed specialist healthcare services to
remote areas and Mobile Health Services(MHS) deploys mobile health units
vans equipped with technology, medical devices, medicines and health workers
to villages where public health system is not easily accessible.
Piramal Sarvajal- Sarvajal is committed to providing pure and safe drinking
water for the under-served at an ultra-affordable price. Sarvajal provides
affordable clean drinking water to around 3, 00,000 people on a daily basis.
Sarvajal is a social enterprise implementing an innovative and technology-
centric solution for decentralized filtration and distribution. Working with rural
entrepreneurs, Sarvajal is creating a self-sustaining solution which uses remote
sensing, solar power and RFID technology to ensure quality, transparency, and
accountability. Sarvajal has dispensed more than 8.99 billion litres of clean
drinking water to people across twelve states.
Piramal Foundation for Education Leadership (PFEL)- PFEL believes that there
is a need for inculcating the 'right' mindsets, leadership skills and imparting
relevant knowledge to school principals, in order to positively impact the quality
of education in public schools. PFEL runs two parallel programs- Principal
Leadership Development Program (PLDP) and Piramal Fellowship.

b) PIRAMAL FINDING AND ANALYSIS:

From the above literature we can establish the fact that Piramal thoroughly believes in
holistic development creating a sustainable society. It concentrates on health, hygiene and
education, all the three creating a trickledown effect all around. Through their Principal
Leadership programme Piramal believes in empowering millions through the eyes of few.
They believe that one Principal can change an entire school full of hundreds thereby
creating an atmosphere of motivation and reduce drop outs creating more literacy around.
For the youth involved in the programme, the fellowship has re-changed and re-shaped
their lives creating a transformation of their lives in totality thereby creating a
transformation of the society. There are direct stakeholders and subsidiary stakeholders
benefitting from the project as well.

LIMITATIONS

The drawbacks of the above research have been mentioned below:


Absence of a lot of primary data has restricted the scope of the paper as primary
data would have given a much wider view of the case studies taken.

www.bitm.org.in Volume: 6 No: I February 2017 30 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
A lot more beneficiaries need to be addressed to understand the impact of
Corporates role in CSR.
Limitation of time has also restricted the research. A lot more in depth analysis
of the subject is required in future.
Legal aspects like corporate governance, concept of private public partnership
(PPP), labour employee welfare and related issues needed explanation and
study.
Lack of Community Participation in CSR Activities: There is a lack of interest
of the local community in participating and contributing to CSR activities of
companies. This is largely attributable to the fact that there exists little or no
knowledge about CSR within the local communities as no serious efforts have
been made to spread awareness about CSR and instill confidence in the local
communities about such initiatives. The situation is further aggravated by a lack
of communication between the company and the community at the grassroots.

CONCLUSION AND RECOMMENDATIONS


Analysing all the findings we can come to the conclusion that many corporates like
Infosys and Aditya Birla Nuvo Ltd, has started considering social responsibility as an
important business issue. Indian companies irrespective of size, sector, business goal and
location of the company has initiated various social projects for the upliftment of the
society. Indian companies have realized that without proper socio-economic development
at the grass-root level there cannot be any inclusive development of the country thereby
leading to an unsustainable and instable situation to do business and face the fierce
competition at the global level.
However the concept is not free from criticisms. Milton Friedman (1970) has rightly
pointed out that mere existence of CSR was a signal of an agency problem within the
firm. An agency theory perspective implies that CSR is just a misuse of corporate
resources that could be better spent on valued-added internal projects or returned to
shareholders. It also suggests that CSR is an executive perk, in the sense that managers
use CSR to advance their careers or other personal agendas.
A paper by Reinhardt (1998) finds that a firm engaging in a CSR-based strategy can only
generate an abnormal return if it can prevent competitors from imitating its strategy.
However in competitive markets this is unlikely, since CSR is highly transparent, with
little causal ambiguity.
From the Indian perspective the new Companies Act has though made CSR a financial
obligation, but it still remains a secondary priority for the investors, policy makers and
the corporate. Funds have been allocated for social projects, but seldom out of social
conviction. It has been mostly done to please the political and bureaucratic leaders, or to
secure public support for specific project investments. Today, companies are not engaged
with the beneficiary community. They provide money to build toilets, but they leave
unaddressed the problem of locating the septic tank. They construct schools but do little
about enhancing the quality of education. They give money but have no understanding of
the sub-culture of poverty-the result being a limited impact of their contribution.
So the question that comes to our mind is should the company limit its CSR involvement
to simply meet the financial obligations set down in the act? Or should it get more deeply

www.bitm.org.in Volume: 6 No: I February 2017 31 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
engaged in tackling the systemic problems of society? This objective can be nearly
achieved following few recommendations:
Concept of Corporate Social Responsibility should be a multidisciplinary
concept, involving well trained, qualified and experienced professionals from
various disciplines like Sociology, Social Work, Economics, Demographers,
Psychologists, Management Personnel should be engaged for better planning,
implementation and evaluation of CSR initiatives.
The concept of private-public partnership (PPP) i.e collaboration of the Govt
along with the corporates should be applied in the effective implementation of
CSR activities.
CSR programmes being implemented by Indian companies should be based on
the felt-need of the local people so that their participation in the programme is
maximum.
The Human Resource Department both at the political and private level should
be entrusted with the responsibility of measuring and evaluating CSR activities.
It can be done by analyzing the direct results like economic and financial
savings and by analyzing indirect results like increase in employee satisfaction,
less absenteeism, less employee turnover etc
Periodic review of CSR activities should be conducted by every corporate so as
to identify the pitfalls and the lacunae
Periodic review in the form of social audit should be conducted by an external
agency
Innovation should essentially be a matter of concern; be it searching and delving
into the untouched areas or formulation of new CSR strategy
NGOs should be encouraged to act in collaboration for the CSR activities under
different schemes and projects as they play a crucial role in the upliftment of the
masses.
Combination of expertise and domain knowledge of the different companies
together rather than singly can create a better and meaningful contribution in the
various social activities.
With these above recommendations the corporates can engage themselves in
good social activity, be nice and not use the same for competitive advantage that
forestalls competition. Managers should act benevolently about making choices
about the social investments of corporations and also do so in ways that align
with our conceptions of what is socially right. This would definitely help the
companies to sustain itself in the long run and also can really be a meaningful
endeavour by corporates in creating a sustainable society, thus taking India at its
apex of development and proving that doing good is really doing well.

References:

[1] Aguilera R. V., Rupp D. E., Williams C. A., Ganapathi J. (2007), Putting The
S back in Corporate Social Responsibility: A Multilevel theory of Social Change
in Organisations, Academic of Management Review Vol.32 No. 3, pp 836-863

www.bitm.org.in Volume: 6 No: I February 2017 32 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
[2] Carroll A. B. (2015), Corporate Social Responsibility: The centerpiece of
competing and complementary frameworks Elsevier, Organisational Dynamics
44, pp 87-96
[3] Chatterjee, D. (2010), Corporate Governance and Corporate Social
Responsibility: The Case of Three Indian Companies International Journal of
Innovation, Management and Technology, 1(5), pp. 507-510
[4] Chatterji, M. (2014), Corporate social Responsibility, Oxford University
Press, India, pp. 5-94
[5] Dahlsrud A.,(2006),How Corporate Social Responsibility is Defined: an
analysis of 37 Definitions, Wiley Interscience, DOI:I0.I002/csr.132
[6] Elshorbagy N. I., (July-Aug 2014), The Reality of Corporate Social
Responsibility in small and medium enterprises, International Journal of
Technical Research and Application e-ISSN: 2320-8163, Vol.2, special issue 4,
pp 34-37
[7] Gautam, R. and Singh, A. (2010), Corporate Social Responsibility Practices in
India: A Study of Top 500 Companies. Global Business and Management
Research: An International Journal, 2(1), pp. 41-56
[8] Kumar, N. (2014) Corporate Social Responsibility: An Analysis of Impact and
Challenges In India, Abhinav International Monthly Refereed Journal of
Research in Management & Technology, 3(5), pp.97-104
[9] Mandal, B.N., (2012) Corporate Social Responsibility in India, Global Vision
Publishing House, New Delhi, pp. 1-26
[10] Mehta, V.S., (2015) CSR: Corporate Should Reach out, Indian Express, pp. 9
[11] Pradhan, S. and Ranjan, A. (2010), Corporate Social Responsibility in Rural
Development Sector: Evidences from India, School of Doctoral Studies
(European Union) Journal, pp. 139-147
[12] Sharma, A. and Kiran, R. (2013), Corporate Social Responsibility: Driving
Forces and Challenges, International Journal of Business Research and
Development , 2(1), pp. 18-27
[13] Srivastava, A. K., Negi, G., Mishra, V. and Pandey, S. (2012) Corporate
Social Responsibility: A Case Study Of TATA Group, IOSR Journal of
Business and Management (IOSRJBM), 3(5), pp. 17-27
[14] http://www.adityabirla.com/csr/overview/ accessed on 30.10.2015
[15] http://www.adityabirlanuvo.com/ accessed on 30.10.2015
[16] http://www.bandhan.org/ accessed on 15.03.2016
[17] http://www.bandhanbank.com/ accessed on 15.03.2016
[18] http://www. gandhifellowship.com/ accessed on 15.11.2016
[19] http://www.grantthornton.in/service-areas/business-advisory/corporate-social-
responsibility-sustainability/ accessed on 30.10.2015
[20] http://www.infosys.org/ accessed on 30.10.2015
[21] http://www.piramal.com/ accessed on 15.11.2016
[22] https://www.pwc.in/assets/pdfs/publications/2013/handbook-on-corporate-
social-responsibility-in-india.pdf/ accessed on 30.10.2015

www.bitm.org.in Volume: 6 No: I February 2017 33 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Computing Reflectivity of Fiber Bragg Structure for


Optical Communication
Payel Halder1, Arpan Deyasi2
Department of Electronics and Communication Engineering
RCC Institute of Information Technology
Kolkata, INDIA
payelh139@gmail.com1; deyasi_arpan@yahoo.co.in2

Abstract
Reflectivity spectrum of fiber Bragg grating (FBG) based sensor is analytically
calculated for optical communication at 1550 nm. Effect of grating length, induced
refractive index perturbation and number of grating periods are considered for
computation purpose; and spectrum is optimized by reducing the number of side lobes.
Coupled mode theory (CMT) is considered for analysis; and fiber parameters for
single mode propagation are incorporated for design purpose centered at 1550 nm
operating wavelength. FWHM is calculated as figure of merit of the proposed
sensor, and its variation with the number of grating layers is computed. Result
reveals that with proper choice of design parameters, the structure can be utilized
photonic sensor in all-optical circuit.
Keyword: Reflectivity; Bragg sensor, 1550 nm; FWHM; Coupled mode theory

Introduction

The Fiber Bragg grating is a one-dimensional optical structure with periodic variation of
refractive indices along the direction of electromagnetic wave propagation [1]. Its
narrow bandwidth reflectance property is utilized in making sensing device [2], after
successful experimental demonstration of permanent grating inside optical fiber [3].
The Bragg grating inside the fiber core produces Distributed Bragg Reflector [DBR]
which reflects the Bragg wavelength along with generation of minor side lobes in
the otherwise transmission zone [4]. This sensor has already replaced conventional
electronic sensor due to inherent immunity from electromagnetic interference,
multiplexing ability, better sustainability from environment [5], structural health
monitoring [6], communication [7], chemical sensing [8]. It is widely used in
communication applications now-a- days due to the properties of dispersion
compensation [9], EDFA gain stabilization, optical CDMA in high frequency
spectrum [10]. Proper suppression of side lobes by apodization technique makes it an
efficient candidate for WDMA [11], reduced cross-talk. It is already proposed for band-
notch filter applications [12].
The historical beginnings of photosensitivity and fiber Bragg grating (FBG) technology
are recounted [13]. Wider bandwidth is needed to reorganize the fiber Bragg grating,
which can be achieved by using a short grating length in design of fiber Bragg
grating [14-15]. Use of Fabry-Perot filter for observing the wavelength deviation of a
www.bitm.org.in Volume: 6 No: I February 2017 34 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
fiber Bragg grating sensor elements along a common fiber path is described by
researchers [16]. Researchers also analyzed the temperature and strain sensing
principle of FBG based sensor [17]. This variation occurs due to thermo-optic and
elasto-optic effects. In this paper, effect of induced refractive index modulation and
length of grating structure are investigated on the reflectance property of the FBG
structure where only single-mode property is considered. FWHM is calculated by
varying the number of grating periods. Results suggest that constant FWHM may be
optimized for large grating periods along with the tuning o f reflectivity bandwidth
for different application requirements.
Mathematical Modeling

For electromagnetic wave propagation inside Brag grating structure, reflectivity is given
by
sinh L
R
sinh L j cosh L (1)

Fig 1: Schematic diagram of Fiber Bragg Grating

where we assume the forward and backward waves are coupled inside the structure
(following coupled mode theory), is the difference of propagation constants, is the
coupling coefficient, L is the grating length, and

2 2
(2)
Coupling coefficient is defined by


(3)
where is overlap integral between the forward and reverse propagating guided modes
calculated over the fiber core of Bragg grating. It is defined as
=nF (4)
F is fractional modal power in fiber core given by
1
F=[1- ]
V2 (5)
www.bitm.org.in Volume: 6 No: I February 2017 35 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
where V is normalized frequency and n is amplitude of induced refractive index
perturbation. V is defined as
2
V= a n12 n2 2
(6)
where a is the core radius and n1 and n2 are core and cladding indices respectively. is
defined as

1 1
2 neff
B (7)
where neff is the effective refractive index of the fiber core at the free space centre
wavelength.
Results and Discussion

Fig 2 shows the reflectivity profile as a function of operating wavelength for different
grating lengths. From the plot it is observed that major lobe is centred on at 1550 nm.
Result is potted for three different lengths 40m, 50m, and 60m. From the graph, it can
be evaluated that respective maximum reflectivity are 91.2%, 97.8%, 99.98%. Thus higher
grating length provides higher reflectivity which speaks in favour of band-notch
application. But this is associated with increase in side-lobe. This restricts its operation for
electromagnetic wave sensor.

Fig 2: Spectral profiles for uniform fiber Bragg gratings with different grating lengths

www.bitm.org.in Volume: 6 No: I February 2017 36 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Fig 3a: Spectral profiles for uniform fiber Bragg gratings with amplitude of induced
refractive index perturbation at 40 m grating length

Fig 3 exhibits reflectivity profile for different grating lengths individually by varying the
amplitude of induced refractive index perturbation. From Fig 3a, it is observed that higher
the perturbation, better the reflectivity. At grating length of L=40m amplitude of induced
refractive index is varied from n = 10-2 , 210-2, 310-2, the maximal reflectivity is
40.2%, 85%, 99.91%. Corresponding bandwidth is also increased.

Fig 3b: Spectral profiles for uniform fiber Bragg gratings with amplitude of induced
refractive index perturbation at 50 m grating length

Results are also plotted for 50 m and 60 m grating lengths respectively, which are
shown in Fig 3b and Fig 3c. The maximum reflectivities are obtained for these cases are
70%, 97%, 100% and 83%, 98%, 100% respectively. Hence a comparative analysis
suggests that for a specified magnitude of induced refractive index perturbation, higher
www.bitm.org.in Volume: 6 No: I February 2017 37 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
grating length provides higher reflectivity. But again for a given grating length, higher
magnitude of r.i perturbation leads to higher sidelobe magnitude. Hence optimization is
required.

Fig 3c: Spectral profiles for uniform fiber Bragg gratings with amplitude of induced
refractive index perturbation at 60 m grating length

Fig 4a: Spectral profiles for uniform fiber Bragg gratings with different number of
grating periods at 40 m grating length

Fig 4 shows the reflectivity profile for different number of grating periods. In Fig 4a, it is seen that
at grating length of 40m, no of grating is varied from N = 50, 100, 200; corresponding maximum
reflectivities are 46%, 87%, 98 %. Similar variations are observed in Fig 4b and Fig 4c.

www.bitm.org.in Volume: 6 No: I February 2017 38 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Fig 4b: Spectral profiles for uniform fiber Bragg gratings with different number of
grating periods at 50 m grating length

Hence it may be stated that with increase of period, better noise rejection is achieved. But
again this enhances the magnitude of sidelobes, which limits its application. Thus a trade-
off is made. For L=50 m, maximal reflectivities are 58.6%, 92.3%, 99.98%; whereas for
60 m grating length, maximal reflectivities are 70.63%, 98.91%, 100%. These are
computed from Fig 4b and Fig 4c respectively.

Fig 4c: Spectral profiles for uniform fiber Bragg gratings with different number of
grating periods at 60 m grating length

www.bitm.org.in Volume: 6 No: I February 2017 39 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Full-width-half-maximum is computed and plotted as a function of grating periods. Result
is plotted in Fig 5. It is seen from the figure that FWHM is very high for lower number of
period, but at that condition, reflectivity becomes low. With increase in grating layers,
FWHM becomes almost s constant at lower values; but with the increase in noise rejection
property. Hence optimization is again required for sensing application.

Fig 5: FWHM with number of grating layers

Conclusion
Optical sensor using fiber Bragg grating structure is presented at 1550 nm. From the
analysis, it may be concluded that higher reflectivity is desired for better noise rejection,
which can be achieved with large grating length. But this advantage is coupled with
generation of larger sidelobes, which suggests excess power loss. Again, increase of
magnitude of induced refractive index perturbation enhances the noise rejection property
with the disadvantage of more sidelobes and also of greater magnitude. Increase in grating
period also enhances the reflectivity at center wavelength as well as FWHM. But this is
also associated with similar disadvantage. Hence optimization is required considering the
need of application.
References
[1] Ghatak, K. Thyagarajan, Introduction to Fiber Optics, Cambridge University
Press, 1999
[2] Kersey. A. D., Berkoff. T. A., Morey. W. W., Multiplexed Fiber Bragg Grating
Strain-Sensor System with a Fiber Fabry-Perot Wavelength Filter, Optics
Letters, 18, 1370-1372 (1993)
[3] Hill. K. O., Meltz. G., Fiber Bragg Grating Technology Fundamentals and
Overview, Journal of Lightwave Technology, 15(8), 1263-1276, 1997
[4] Ugale. S., Mishra. V., Fiber Bragg Grating Modeling Characterization and
optimization with different index profiles, International Journal of Engineering
Science and Technology vol.2 (9), 4463-4468, 2010

www.bitm.org.in Volume: 6 No: I February 2017 40 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
[5] Kawasaki. B. S., Hill. K. O., Johnson. D. C., Fuji. Y., Narrow Band Bragg
Reflectors in Optical Fibers, Optics Letters, 3, 66-68 (1978)
[6] Antunes. P., Lima. H., Alberto. N., Bilro. L., Pinto. P., Costa. A., Rodrigues. H.,
Pinto. J. L., Nogueira. R., Varun. H., Andr. P. S., Optical Sensor Based on Fiber
Bragg Gratings for Structural Health Monitoring (Springer), New Developments
in Sensing Technology for Structural Health Monitoring, 96, 253-295 (2011)
[7] Kersey. A. D., Davis. M. A., Berkoff. T. A., Bellemore. D. G., Koo. K. P.,
Jones. R. T., Progress towards the Development of Practical Fiber Bragg
Grating Instrumentation Systems, Proceedings of SPIE, Fiber Optic and Laser
Sensors XIV, 40-63 (1996)
[8] Wolfbeis. O. S., Fiber-Optic Chemical Sensors and Biosensors, Analytical
Chemistry, 76, 3269-3284 (2004)
[9] Navruz. I., Guler. N. F., A Novel Technique for Optical Dense Comb Filters
using Sampled Fiber Bragg Gratings, Optical Fiber Technology, 14, 114-118
(2008)
[10] Magn. J., Wei. D. P., Ayotte. S., Rusch. L. A., LaRochelle. S., Experiment
Demonstration of Frequency-Encoded Optical CDMA using Superimposed
Fiber Bragg Gratings, Bragg Gratings, Photosensitivity, and Poling in Glass
Waveguides, Technical Digest (Optical Society of America), (2003)
[11] Ugale. S., Mishra. V., Optimization of Fiber Bragg Grating Length for
Maximum Reflectivity, International Conference on Communication and Signal
Processing, 28-32 (2011)
[12] Vengsarkar. A. M., Lemaire. P. J., Judkins. J. B., Bhatia. V., Spipe. J. E.,
Erdogan. T., Long-period Fiber Gratings as Band-Rejection Filters, Journal of
Lightwave Technology, 14(1), 58-65 (1966)
[13] Jiang. Q., Minghao. Y., Zhou. X., Guo. T., Song. J., A Novel Fiber Bragg
Grating Accelerometer based on Fiber Vibrating Wire, 8th International
Conference on Sensing Technology, 529-532 (2014)
[14] G. Meltz, Overview of Fiber Grating-based Sensors, Proceedings of SPIE:
Distributed and Multiplexed Fiber Optics Sensors VI, vol. 2838, 1996
[15] T. Erdigan, Fiber Grating Spectra, Journal of Lightwave Technology, vol. 15,
pp. 1277-1294, 1997
[16] A. D. Kersey, M. A. Davis, H. J. Patrick, M. Leblanc, K. P. Koo, C. G. Askins,
M. A. Putnam, E. J. Friebele, Fiber Grating Sensors, Journal of Lightwave
Technology, vol. 15, pp. 1442-1468, 1997
[17] Khan, I. Ahmed, Sensing Principle Analysis of FBG based Sensors, IOSR
Journal of Electrical and Electronics Engineering, vol. 1(3), pp. 1-6, 2012

www.bitm.org.in Volume: 6 No: I February 2017 41 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Filtering Signal by Wavelet Transform


Tanay Mondal
Department of Computer Science and Engineering
Bengal Institute of Technology and Management, Santiniketan

Abstract
Noise results in faulty information after processing the signals reducing their usability.
Daubechies wavelet was used to filter out the noise from a discretely sampled signal
by implementing a low pass filter in this work. H e r e Discrete wavelet transform has
been applied on the input vector, threshold it then inverse transformed it to finally
achieve a signal with very low noise. The main aim for this research work was to
develop wavelet based filters for ECG signal filtering and feature extraction with
better results as compared to FIR filters. To reduce the cost of the equipments where
such filter is being used as a component, the other primary aim.

Keyword: Noise, DWT, Daubechies Wavelets, Denoising.

Introduction
Some noise in signals associated with them, we find rare signals in real-life situations,
free from noise and can be directly employed for extracting information. Noise can
result in an output which may not be intended or not the characteristic of the quantity
being observed, giving rise to faults in the system of which the signal is a
component. It can also cause judgmental errors if the signal is being directly observed
and the impact can range from being minute in some cases to destructive in certain
critical systems like ECG machines.
For this, it is important that signals should comprise of components which are
relevant to the system and be free from unwanted, random values so that the errors
caused due to faulty representation of the original signal can be minimized. Many
times the noise found in the signals is of higher frequency as compared to the signal
produced by the quantity being measured or represented. It is, therefore, of utmost
importance that the noise from the signal is removed to the optimal extent.
The problem of noise in signals is not new as above explanation. Various solutions
have been proposed and are being employed in a number of systems. The solutions
range from hardware implemented active filters to Finite impulse response (FIR) filters.
The problem with most of the current filters in place is that they do not give sufficiently
good output results or alter the original signal itself, for e.g. the FIR filters effect the
signal because of the sinc function. Although such effects can be removed by the
application of appropriate processes, the involved overhead results in increase in the
cost of the system.
Also, in some cases, the desired output levels are still not observed.

www.bitm.org.in Volume: 6 No: I February 2017 42 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Here wavelet transform and inverse wavelet transform were used. Since there are a
huge number of wavelet families having several different wavelets having high
number of vanishing moments and capable of representing complex polynomials, it
was not difficult to find a wavelet which was similar to the signal being processed [2].
When transformed with the similar wavelet, the disturbances caused in the original
signal were minimized which reduced the overhead.
Analyzing the signal to find a suitable wavelet, applying the transform in
algebraic form are the key points in this approach, performing threshold operations
and inverse transforming it. The main limitation was that the hard thresholding
scheme that had been followed in our work, although gave better results but also
introduced about 1% random values of the size of the input vector which were within
4-5 % of the correct value.

Review of literature
Wavelets are mathematical functions with oscillatory nature similar to
sinusoidal waves with the difference being that they are of finite oscillatory
nature[1]. Essentially a finite length, decaying waveform, when scaled and
translated results in what is called a daughter wavelet of the original mother
wavelet. Hence different scaling and translation variables result in a different
daughter wavelet from a single mother wavelet.
Continuous wavelet transforms (CWT) and discrete wavelet transforms (DWT) are
the classification of Wavelet transforms [9]. The finite oscillatory nature of the
wavelets m a k e s t h e m e x t r e m e l y u s e f u l i n r e a l l i f e situations in
which signals are not stationary. While Fourier transform of a signal only offers
frequency resolution, wavelet transforms offer variable time- frequency resolution
which is the hallmark of wavelet transforms.
Decomposing by Wavelet transform, a signal into basis functions which are known
as wavelets [7]. Wavelet transform is calculated separately for different segments of
the time-domain signal at different frequencies resulting in Multi-resolution analysis. It
is designed in such a way that the product of time resolution and frequency resolution is
constant. Therefore it gives good time resolution and poor frequency resolution at high
frequencies whereas good frequency resolution and poor time resolution at low
frequencies. This feature of MRA makes it excellent for signals having high frequency
components for short durations and low frequency components for long duration .e.g.
noise in signals, images , video frames etc.
A. Discrete Wavelet Transform (DWT)
A wavelet transform in which the wavelets are discretely sampled are known as
discrete wavelet transform. The DWT gives a multi-resolution description of a signal
which is very useful in analyzing "real-world" signals [6]. Essentially, a discrete multi-
resolution description of a continuous-time signal is obtained by a DWT. It converts a
series a0, a1, a2. am into one low pass coefficient series known as approximation
and one high pass coefficient series known as detail. Length of each series is m/2.In

www.bitm.org.in Volume: 6 No: I February 2017 43 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
real life situations, such transformation is applied recursively on the low-pass series until
the desired number of iterations is reached.
Examples of discrete wavelets are the Haar wavelets, Daubechies wavelets,
Symmlets etc. For any input comprising of 2n numbers, the Haar wavelet transform
simply pairs up input values, storing the difference and passing the sum. This
process is recursive, pairing up the sums to provide the next scale: finally resulting
in 2n 1 differences and one final sum and this is done in O(n) time i.e. linear time [3].
Daubechies wavelets are families of wavelets whose inverse wavelet transforms are
adjoin of the wavelet transform i.e. they are orthogonal [4]. They have maximal number
of vanishing moments and hence they can represent higher degree polynomial
functions. With each wavelet type of this class, there is a scaling function known as
father wavelet that generates an orthogonal multi-resolution analysis .Daubechies
orthogonal wavelets D2-D20 (even index numbers only) are commonly used. The
numbers associated with the name refers to the number N of coefficients. Each wavelet
has vanishing moments equal to half the number of coefficients. For example, D2
which is the Haar wavelet has one vanishing moment, D4 has two, etc. The number of
vanishing moments is what decides the wavelet's ability to represent a signal. For
example, D2, with one moment, easily encodes polynomials of one coefficient, or
constant signal components. D4 encodes polynomials with two coefficients, i.e.
constant and linear signal components etc. The wavelet transform using Daubechies
wavelets result in progressively finer discrete samplings using recurrence relations.
Every resolution scale is double that of the previous scale. Daubechies derived a
family of wavelets, the first of which is the Haar wavelet. Since then interest in this
field has shot up and many variations of Daubechies original wavelets have been
developed. The discrete wavelet transform has applications ranging from data
compression to signal coding. In our work, Daubechies wavelet was used to filter a
noisy signal to extract information from the signal.

Objective of the study


Most of the signals in real life are always accompanied with noise which may
be random, Gaussian white noise etc [8]. Till this noise is present with the signal,
the received signal may be of very little use. Noise makes the process of
information extraction from the signal a difficult task and results to incorrect output.
Signal filtering can be thought as a preprocessing step for information extraction
from the signal. Generally noise is a low amplitude high frequency signal imposed
on the higher amplitude lower frequency signal.
Let S(n) be the original signal with no noise, V(n) be the high frequency noise
added to the signal before it is received for analysis or information extraction. The
signal received be represented by VS(n) as follows:
VS(n) =S(n)+V(n)
The purpose of the procedure of denoising is to extract S(n) from VS(n) so that it
can be used for intended purposes. Noise added to the signal is higher in frequency
as compared to the original signal. Hence if we can remove the high frequency
components of the signal, we would be able to separate the noise. This can be
www.bitm.org.in Volume: 6 No: I February 2017 44 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
achieved by passing VS(n) through a low pass filter which will filter out the high
frequency components and give the output which would be approximately close to
S(n).

Methodology & Data analysis


The properties of discrete wavelet transforms were employed to recover a
signal from the signal with noise in this work. The process of filtering can be broken
into further steps which are: Analysis, Applying wavelet transform, Threshold and
Inverse wavelet transform. In some cases first two steps can be combined.
A. Analysis Step
In this step selecting an appropriate wavelet was a very important task . The wavelet
chosen should be similar to the signal that has to be filtered to give the best possible
results. This similarity can be decided on the basis of the cross- correlation between
the two functions. In this work the Daubechies family of wavelets i s
p r e f e r e d because of their high number of vanishing moments making them
capable of representing complex high degree polynomials. The result in simulations
showed that D4 wavelet provided sufficiently good signal output. The wavelet has 4
constants (c0, c1, c2, c3) related to it whose values have been derived by Daubechies
in her research work. These are normalized according to the need of the application
where they are being used. The matrix operations shown in figure below reveal
that a vector with 2n elements is numerically transformed to 2 vectors both having
2n-1 elements each. One of the vectors has the approximate or smooth coefficients
and the other has detail coefficients. The vector with smooth coefficients served as
input for the next iteration of the same procedure. This procedure was carried out
till the size of the smooth coefficients vector was greater than or equal to 4.
B. Threshold Step
In this step, after applying the selected wavelet transform to the input vector,
obtained a numerically transformed vector which had the detail coefficients that are
carried from one level to the next as it is and the final left approximation values. To
denoise the signal, the detail coefficients were made 0 after applying the transform.
Then, the size of the input vector, which had sampled values of the signal, was
known and it was also known that each time the size of the resultant vector had been
reduced to half the original size.

www.bitm.org.in Volume: 6 No: I February 2017 45 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Figure 1. Signals sine wave with noise, after applying the wavelet transform to
the signal: a6 is the approximation at 6th level, d1- d6 are the detail coefficients
at respective levels which are set to 0in the threshold step.

C. Inverse Wavelet Transform


The inverse wavelet transform was applied after applying the wavelet transform
and threshold procedures. The output of this step, as seen in the figure, was the
original signal with very less noise as compared with the earlier signal. All the detail
coefficients up to level 6 had been set to zero in the threshold step to obtain this output.

Figure2.Difference between original and filtered signal.

Conclusion and discussion


Properties such as MRA and high number of vanishing moments and Wavelets
with their variable time frequency resolution provide an effective way to analyze a
signal. The process of signal filtering can be performed in quick time following this
approach. The simulations that had been performed reveal that wavelets can be used
to separate different frequency components of the signal efficiently. After separating
the signal into components, the unwanted signal components can be removed by
setting the detail coefficients related to those particular components to zero. The
www.bitm.org.in Volume: 6 No: I February 2017 46 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
inverse transform can then be applied on the semi processed vector to get back the
original signal which is free from noise components. It was observed that there is a
close similarity between original signal without noise and the signal obtained after the
filtering procedure
This process, as shown in this work, can be used to filter out noise from signals like
ECG signal etc. and the algorithm c a n e a s i l y b e i m p l e m e n t e d i n C l a n g u a g e
resulting in direct practical implementations. This process can also be used for ECG
feature extraction with suitable modification in the threshold step in the future.
References
[1] I. Daubechies, Ten Lectures on Wavelets (PA SIAM, Philadelphia, 1992).

[2] Kaiser, G., A Friendly Guide To Wavelets. Boston: Birkhuser, 1994.

[3] Ali N. Akansu, An Efficient QMF-Wavelet Structure, 1st Wavelet Symposium,


New Jersey Institute Of technology, April 1990.

[4] http://www.amara.com/current/wavelet.html

[5] Brani Vidakovic, Peter Mueller, Wavelets for Kids, A tutorial introduction
by Duke University.

[6] Matthias Schwab , Transformation of Discrete Arrays by Daubechies


Wavelets, Stanford Exploration Project.

[7] The Wavelet Digest, www.wavelet.org .

[8] S.G. Mallat, A Wavelet Tour of Signal Processing Second Edition (Academic
Press, New York, 1999).

[9] http://www.bearcave.com/misl/misl_tech/wavelets/index.html350.

www.bitm.org.in Volume: 6 No: I February 2017 47 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

A Study on Corporate Social Responsibility (CSR) in


West Bengal
H. R. Biswas1, Pradip Laha 2
BITM, Santiniketan,Department of Hospitality & Tourism 1, 2 BITM,
Santiniketan,Dept. of Business Administration

ABSTRACT

The social responsibilities are almost equally applicable to both private and public
enterprises, though there is some basic difference between the two. The basic difference
centres round profit motive so far as the social responsibilities are concerned. In this
respect, absence of profit motive differentiates the public sector from the private sector.
It is true that public enterprises can produce and distribute goods and services at cost
price or below price for public welfare, but that will, no doubt, amount to relief work and
increase public taxation. So in order to diminish the burden of taxation and to avoid
inefficient ant uneconomic working, the public enterprises should also be self-supporting
and reasonably profitable. Even the Soviet economists recommend profitability as the
standard to measure efficiency of a public enterprise. The extension of State-ownership
should not invite a crisis of confidence. Public sector is needed to supplement the private
sector which is generally shy in basic industries, heavy investments and in industries
demanding long gestation period. It is also required to improve abuses and malpractices
of private sector. So both of them should act as the two complementary wings of the
national economy and they should not forget their organic links. Every sector should play
its respective role to strengthen the national economy by showing a splendid sense of
urgency and high organisational ability with full use of the talent and resources of the
country.
Key Words: CSR,MNC,PSU,PAT,Stakeholders,Social Audit,PPP Model.

INTRODUCTION

The term 'social responsibility' has three different meanings, viz., social obligation, social
reaction and social responsiveness.According to Milton Friedman and his followers, a
corporation engages in social responsible behaviour when it pursues a profit within the
constraints of law as imposed by society. Since society permits business to exist, business
is obliged to repay society for that right by taking profits. This means that legal behaviour
in pursuit of profit is socially responsible behaviour, and any behaviour not legal or not in
pursuit of profit is socially irresponsible. As Friedman stated: "There is one and only one
social responsibility of business to use its resources and engage in activities designed
to increase its profits so long as it stays within the rules of the game, that is to say,
engages in open and free competition without deception or fraud".

www.bitm.org.in Volume: 6 No: I February 2017 48 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Following figure depicts how this environment takes meaning for a business firm as a
network of other organisations and institutions with which it must interact. In this
context. Corporate social responsibility is defined as an obligation of the organisation to
act in ways that serve both its own interests and the interests of its many external publics.
These publics are considered shareholders, the persons and groups who are affected is
one way or another by the behaviour of an organisation. They are people affected by the
organisation's performance and who may be affected in one way or another by its
commitment to social responsibility.

Influence on the Corporate Social Responsibility Decision

The three general meanings of social responsibility can be depicted as a continuum. The
continuum formed by the three classes of socially responsible behaviour ranges from an
emphasis on profit making to an emphasis on social and economic concerns.

A Continuum of Social Responsibility

Type of Behaviour Components Factors


Primary emphasis Socially The organisation's economic and legal
Obligated responsibilities
Socially Reactive the organisation's economic, legal and social
responsibilities
Socially The organisation's economic, legal, social and
Responsive citizenship responsibilities

From the above table shows that at one extreme is social obligation business
behaviour that reflects the firm's economic and legal responsibilities. Social reaction
occupies the middle position behaviour that is demanded by groups having a direct
www.bitm.org.in Volume: 6 No: I February 2017 49 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
stake in the organisation's actions. The farthest extreme, social responsiveness is
anticipatory, proactive and preventive behaviour.

In the real world, a corporation can choose to be anywhere along the continuum. To be
socially reactive implies the firm's acceptance of social obligation as well. In a like
manner, to be socially responsive requires both social obligation and social reaction. In
short, the three meanings refer to different degrees of departure from the normal activities
and performance of profit-seeking business firms. Few terms have been defined in as
many different ways as social responsibility. Some of the more popular meaning include
"profit making only," "going beyond profit making", "voluntary activities," "concern for
the broader social system," and "social responsiveness." Most of the debate has focused
at the extremes. On one side, there is the classicalor purely economicview that
management's only social responsibility is to maximise profits. On the other side stands
the socio-economic position, which holds that management's responsibility goes well
beyond making profits to include protecting and improving society's welfare.

The classical view holds that management's only responsibility in running a business is to
maximise profits. This narrow "shareholder" model is supported by Milton Friedman, a
Nobel prize winner economist, who argues: "Few trends could so thoroughly undermine
the very foundations of our free society as the acceptance by corporate official of social
responsibility other than to make as much money for their stockholders as possible",
Among the arguments of this viewpoint against corporate social responsibility are:

(i) Loss of business profits.

(ii) Increased business costs.

(Hi) Dilution of business purpose.

(iv) Too much social power for businesses.

(v) Lack of business accountability to public.

The socio-economic view holds that any organisation must be concerned for the broader
social welfareand not just for corporate profits. Among the arguments for social
responsibility are :

1. Long-run profits for businesses.


2. Public expectations support business social responsibility.
3. Public image of business will improve.
4. Better environment for everyone.
5. Businesses may avoid more regulation.
6. Businesses have the resources.
7. Businesses have the ethical obligation.

The phases of CSR for sustaining of corporate objectives:


www.bitm.org.in Volume: 6 No: I February 2017 50 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527

There are four phases of CSR Development in West Bengal which are follows
(a) The First Phase
(b) The Second Phase
(c) The Third Phase
(d) The Fourth Phase

The history of CSR in West Bengal has its four phases which run parallel to India's
historical development and has resulted in different approaches towards CSR. However
the phases are not static and the features of each phase may overlap other phases.

The First Phase:


In the first phase charity and philanthropy were the main drivers of CSR. Culture,
religion, family values and tradition and industrialization had an influential effect on
CSR. In the pre-industrialization period, which lasted till 1850, wealthy merchants shared
a part of their wealth with the wider society by way of setting up temples for a religious
cause.
Moreover, these merchants helped the society in getting over phases of famine and
epidemics by providing food from their go downs and money and thus securing an
integral position in the society. With the arrival of colonial rule in India from 1850s
onwards, the approach towards CSR changed. The industrial families of the 19th century
such as Tata, Godrej, Bajaj, Modi, Birla, Singhania were strongly inclined towards
economic as well as social considerations.
However it has been observed that their efforts towards social as well as industrial
development were not only but also the driven by selfless and religious motives but also
influenced by caste groups and political objectives.

The Second Phase:


In the second phase, during the independence movement, there was increased stress on
Indian Industrialists to demonstrate their dedication towards the progress of the society.
This was when Mahatma Gandhi introduced the notion of "trusteeship". Various
Industrialists act towards building the nation and its socio-economic development.
According to Gandhi, Indian companies were supposed to be the "temples of modern
India". Under his influence businesses established trusts for schools and colleges and also
helped in setting up training and scientific institutions. The operations of the trusts were
largely in line with Gandhi's reforms which sought to abolish untouchability, encourage
empowerment of women and rural development.

The Third Phase:


The third phase of CSR (196080) had its relation to the element of "mixed economy",
emergence of Public Sector Undertakings (PSUs) and laws relating labour and
environmental standards. During this period the private sector was forced to take a
backseat. The public sector was seen as the prime mover of development. Because of the
stringent legal rules and regulations surrounding the activities of the private sector, the
www.bitm.org.in Volume: 6 No: I February 2017 51 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
period was described as an "era of command and control". The policy of industrial
licensing, high taxes and restrictions on the private sector led to corporate malpractices.
This led to enactment of legislation regarding corporate governance, labour and
environmental issues.

In 1965 Indian academicians, politicians and businessmen set up a national workshop on


CSR aimed at reconciliation. They emphasized upon transparency, social accountability
and regular stakeholder dialogues.

The Fourth Phase:


In the fourth phase (1980 until the present) Indian companies started abandoning their
traditional engagement with CSR and integrated it into a sustainable business strategy. In
1990s the first initiation towards globalization and economic liberalization were
undertaken. Controls and licensing system were partly done away with which gave a
boost to the economy the signs of which are very evident today. Increased growth
momentum of the economy helped Indian companies grow rapidly and this made them
more willing and able to contribute towards social cause. Globalization has transformed
India into an important destination in terms of production and manufacturing bases of
TNCs are concerned.

CONDITIONS PREVAILING IN INDIA


Translating the philosophy of social responsibility into real action is not, however, an
easy task. Yet many Indian companies have moved in this direction.
The Coca-Cola Company has spent several million dollars to improve the health, living
conditions, and working conditions of its workers. The Tatas provided financial resources
for scholarships, research awards, and aid-to-education grants. It is a matter of common
knowledge that recently in India a number of companies in the private corporate sector
have taken initiative in promoting rural development. Indeed there is now talking
everywhere of integrated rural development, and about the social responsibility of
business.
Effort to harness industrial enterprises to the task of rural development has gained
momentum in recent years. The Tatas, Sandoz (India) ITC Ltd. ,A.C.C. and quite a few
others have gone ahead with their rural development programmes. The most important
thing that is being asked of industry is to make available its managerial resources; it
seems that without raising real purchasing power it would not be possible to create a
strong demand for industrial goods.
In India the stress is now being placed on social audit. It is now widely believed that
corporate management and professional auditors have social obligation to shareholders
and other interested parties in the matter of fullest disclosure about the company's real
state of affairs. The Government of India has incorporated social audit rules in the
Companies Act (1956)
However, in developing countries like India, the major social responsibility of business
lies in planning, organising and managing on a scale appropriate to the magnitude of
technical and managerial resources required for modern technology, economical
operations, low-cost production and mass distribution. Business enterprises will also have
www.bitm.org.in Volume: 6 No: I February 2017 52 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
to make a signal contribution in social capital formation, viz., construction of rural roads,
digging and repairing of wells and tanks, planting trees, land improvement, drinking
water supply, participation in programme of health and education, water supply,
participation in programme of health, education, etc.
Another direction in which the business community can make a major contribution is by
promoting the growth of small-scale industries. Such industries have enough employment
potential and in which capital-output ratio is low. The private sector can survive in India
or elsewhere only it discharges its social responsibilities and proves its value to society.
It had been declared by the Government of India in 1997 that the main objectives of the
Government's industrial policy would be to maximise production of consumer goods and
the use of human and natural resources, prevent monopoly and concentration of
economic power in private hand, develop employment-oriented industries and make
industry responsive to social needs. Maximum priority should be given to industries
where there exist maximum employment opportunities.

ROLE & IMPORTANCE OF CSR:

The issue of corporate social responsibility drew little attention before the 1960s. But
managers are now regularly confronted with decisions that have a dimension of social
responsibilityphilanthropy, pricing, employee relations, resource conservation and
product quality.

It depicts how this environment takes meaning for a business firm as a network of other
organisations and institutions with which it must interact. In this context. Corporate social
responsibility is defined as an obligation of the organisation to act in ways that serve both
its own interests and the interests of its many external publics. These publics are
considered shareholders, the persons and groups who are affected is one way or another
by the behaviour of an organisation. They are people affected by the organisation's
performance and who may be affected in one way or another by its commitment to
social responsibility.

The main importances of CSR are as follows:

1. Public expectation: Social expectations of business have increased much since the
1960s. Public opinion in support of business pursuing social as well as economic goals is
now very strong.

2. Long-run profits: Socially responsible businesses tend to have more secure long-run
profits. This is the normal result of the better community relations and improved business
image that responsible behaviour brings.

3. Ethical obligation: A business firm can and should have a conscience. Business should
be socially responsible because responsible actions are right for their long-term survival.

www.bitm.org.in Volume: 6 No: I February 2017 53 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
4. Public image: Firms seek to build or improve their public image to gain more
customers, better employees, access to money markets, and other benefits. Since the
public considers social goals to be important, business can create a favourable public
image by pursuing social goals.

5. Better environment: Involvement by business can solve difficult social problems, thus
creating a better quality of life and a more desirable community in which to attract and
hold skilled employees.

6. Discouragement of further government regulation: Government regulation adds


economic costs and restricts management's decisions flexibility. By becoming socially
responsible, business can expect less government regulation.

7. Balance of responsibility and power: Business has a large amount of power in society.
An equally large amount of responsibility is required to balance it. When power is
significantly greater than responsibility, the imbalance encourages irresponsible
behaviour that works against public (social) welfare.

8. Shareholder interests: Social responsibility will improve the price of a busincss's slocks
of shares in the long run. The stock market will view the socially responsible company as
less risky and open to public attack. Therefore, it will give its shares a higher price-
earning ratio.

9. Possession of resources: Business has the financial resources, technical experts, and
managerial talent to provide support to public and charitable projects that need assistance.

10. Superiority of prevention over cures: Social problems must be dealt with and if
necessary solved at some time. Business should act on them before they become more
serious and costly to correct and take management's energy away from achieving its goal
of producing goods and services.

LEVELS OF SOCIAL INVOLVEMENT

The activities through which corporations meet their social responsibilities range from
producing safe, reliable, quality products to supporting the arts; from providing safe and
healthful working conditions to assisting minority enterprises. Each of these activities
benefits some group, often to the disadvantage of some other group. Managers must
make choices among various interests both inside and outside the corporation.
The beneficiaries of corporate action are either internal or external. Internal beneficiaries
include customers, owners, and employees. External beneficiaries include groups
representing minorities, women, the disabled, and the aged. The contemporary demands
placed on corporations are the result of an evolutionary process. In earlier times, when
corporations were relatively insignificant, society expected them to meet their social
obligations. As corporations became larger and more pervasive, society's expectations
shifted towards social reaction and responsive corporate behavior.

www.bitm.org.in Volume: 6 No: I February 2017 54 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Managers are the referees of competing demands on corporate resources. Their ethical
standards filter these demands and determine which will be satisfied. Ethical standards
are influenced by the principles of maximum personal benefits (egoism), maximum social
benefits (altruism), and obligation to a formal principle. Managers and the public are
increasingly concerned about ethics in US business because many believe that ethics have
declined in the last decade, the costs of unethical conduct by management are often high,
and the dynamics of ethics in management are complex and challenging.Some
organisations are responding to these concerns by developing ethics codes and
establishing training seminars in ethics for employees.
In addition to the arguments in favour of a liberal corporate social responsibility, there
are other influences on corporate social responsibility decisions. These are regulatory,
ethical, societal and competitive influences.
Mainly due to concern over environmental protection managers must be cognizant of
their own responsibilities for instilling acceptable ethical standards throughout their
organisation. They must also be cognizant of the necessity to create organisational
procedures and policies that encourage disclosure of unethical behaviour. The standard of
process and management behaviour must not only be legal but ethical, too. All
management and organisation action must be the lawful conduct of behaviour
Social responsibility adds an ethical imperative to do those things that make society
beUt-r and not to do those that could make it worse. Social responsiveness refers to the
capacity of a firm to adapt to changing social conditions.
Social involvement provides a number of benefits to a firm that more than offset their
cost. This would include a positive consumer image; a more dedicated and motivated
work-force and less interference from regulators (government authorities).
The question here is: how are the people to whom business managers are responsible?
Classicists would say that shareholders or owners are their only legitimate concern. The
modern view is that managers are responsible to any individual or group that is affected
by the organisation's decisions and policies. These stakeholders are any constituency in
an organisation's environment; government agencies, trade unions, employees,
customers, suppliers and public at large
Few terms have been defined in as many different ways as social responsibility. Some of
the more popular meaning include "profit making only," "going beyond profit making",
"voluntary activities," "concern for the broader social system," and "social
responsiveness." Most of the debate has focused at the extremes. On one side, there is the
classicalor purely economicview that management's only social responsibility is to
maximise profits. On the other side stands the socio-economic position, which holds that
management's responsibility goes well beyond making profits to include protecting and
improving society's welfare.
The classical view holds that management's only responsibility in running a business is to
maximise profits. This narrow "shareholder" model is supported by Milton Friedman, a
Nobel prize winner economist, who argues : "Few trends could so thoroughly undermine
the very foundations of our free society as the acceptance by corporate official of social
responsibility other than to make as much money for their stockholders as possible",
Among the arguments of this viewpoint against corporate social responsibility are :
(i) Loss of business profits.
(ii) Increased business costs.
(Hi) Dilution of business purpose.
www.bitm.org.in Volume: 6 No: I February 2017 55 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
(iv) Too much social power for businesses.
(v) Lack of business accountability to public.

The socio-economic view holds that any organisation must be concerned for the broader
social welfareand not just for corporate profits. Among the arguments for social
responsibility are:

1. Long-run profits for businesses.


2. Public expectations support business social responsibility.
3. Public image of business will improve.
4. Better environment for everyone.
5. Businesses may avoid more regulation.
6. Businesses have the resources.
7. Businesses have the ethical obligation.

EVALUATING CORPORATE SOCIAL PERFORMANCE


There are many areas in which social responsibility can be pursued by business
Firms and other types of organisations. These include concerns for ecology and
environmental quality, consumer protection, aid to education and service to com-
munity needs, employment practices affecting weaker sections of society,
progressive labour relations and employee assistance, and general corporate
philanthropy, among others.

At the organisational level , a social audit can be used at regular intervals to


systematically assess and report on an organisation's resource use and actual per-
formance in these and other areas of social performance. One way of evaluating
corporate social performance is a social audit which is based on the following
four criteria:

1. Is the organisation's economic responsibility met?


2. Is the organisation's legal responsibility met?
3. Is the organisation's ethical responsibility met?
4. Is the organisation'a discretionary responsibility met?

As per the list, the criteria progress toward ever-greater demonstrations of socially
responsible activities. As organisation is meeting its economic responsibility when it
earns a profit through the provision of goods and services desired by customers. This is
consistent with the classical view of social responsibility presented earlier. Legal
responsibility is fulfilled when an organisation operates within the law and according to
the requirements of various external regulations. This means that the organisation meets
minimum expectations of society's governing legal framework. Ideally economic
www.bitm.org.in Volume: 6 No: I February 2017 56 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
responsibilities are met in a legally responsible manner. An organisation meets its ethical
responsibility when its actions voluntarily conform not only to legal expectations, but
also to the broader values and moral expectations of society.

The highest level of social performance comes through the satisfaction of an


organisation's discretionary responsibility. Here the organisation voluntarily moves
beyond basic economic, legal, and ethical expectations to provide leadership in
advancing the well-being of individuals, communities, and society as a whole.

Provision for CSR in companies Bill 2012


Under the Companies Act, 2013(amended), any company having a net worth of rupees
500 crore or more or a turnover of rupees 1,000 crore or more or a net profit of rupees 5
crore or more should mandatorily spend 2% of their net profits per fiscal year on CSR
activities. The rules will come into effect from 1 April 2014.
Till date it is very difficult exercise to analyze the spending of CSR by various firms and
private companies and such information is not maintained at government level, even
among the top 100 firms by revenue, there are many who dont report their CSR spends
or even declare the social causes they support, that is because they are not required to do
so by law and no provisions for CSR exists in the Companies Act, 1956 so currently the
Ministry does not maintain such details.

The Companies Bill, 2012 incorporates a provision of CSR under Clause 135 which
States that every company having net worth Rs. 500 crore or more, or a turnover of
Rs.1000 crore or more or a net profit of rupees five crore or more during any financial
year, shall constitute a CSR Committee of the Board consisting of three or more
Directors, including at least one Independent Director, to recommend activities for
discharging corporate social responsibilities in such a manner that the company would
spend at least 2 per cent of its average net profits of the previous three years on specified
CSR activities. It is proposed to have detailed rules after passing of Companies Bill 2012
by Rajya Sabha to give effect to this provision.

According to Schedule VII of Companies Bill, 2012 the following activities can be
included by companies in their CSR Policies:-
(i) Eradicating extreme hunger and poverty;
(ii) Promotion of education;
(iii) Promoting gender equality and empowering women;
(iv) Reducing child mortality and improving maternal health;
(v) Combating human immunodeficiency virus, acquired immune deficiency syndrome,
malaria
and other diseases;
(vi) Ensuring environmental sustainability;
(vii) Employment enhancing vocational skills;
www.bitm.org.in Volume: 6 No: I February 2017 57 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
(viii) Social business projects;
(ix) Contribution to the Prime Ministers National Relief Fund or any other fund set by
the Central
Government or the State Governments for socio-economic development and relief
and funds
for the welfare of the Scheduled Caste, the Scheduled Tribes, other backward classes,
minorities and women; and
(x) Such other matters as may be prescribed.
The Companies Bill, 2012, Clause 135 also provides for constitution of a CSR
Committee of the Board. The CSR Committee is required to;
(a) Formulate and recommend to the Board, a CSR Policy which shall indicate the
activities to be undertaken by the company as specified in Schedule VII;
(b) Recommend the amount of expenditure to be incurred on the activities referred to in
clause (a); and
(c) Monitor the Corporate Social Responsibility Policy of the company from time to time.
(d) The format for disclosure of CSR policy and the activities therein as part of Boards
report will be prescribed in the rules once the Bill is enacted.

The principles of corporate social responsibility (CSR) and good corporate citizenship are
key for success of any corporate sector. The four key areas should be the motto of any
business enterprise i.e. Client and marketplace, workplace, environment and community.

www.bitm.org.in Volume: 6 No: I February 2017 58 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Client and marketplace: It is expected for sustaining development of business with due
skill, care and diligence, client and market place should be considered first.
Workplace: for increasing productivity any corporate sector a healthy and safe working
environment.
Environment: The internal & external business environment has greater influence in the
area of CSR. Their should be the aim for the suppliers who demonstrate global
environmental and social concerns, through continued commitment for actively engaging
in CSR.
Community: Community has the greater impact for the prosperity of business. Health
local community enhances business profit by distributing goods and services in proper
time with reasonable prices and accurate quantity.

CRITICISM
1. Violation of profit maximization: This is the essence of the classical viewpoint.
Business is most socially responsible when it attends strictly to its economic interests and
leaves other activities to other institutions.
2. Loss of purpose: The pursuit of social goals leads to loss of business's basic purpose
economic productivity. Society may suffer as both economic and social goals are poorly
accomplished.
3. Costs: Many socially responsible activities dont pay their own way. Someone has to
pay these costs. Business normally passes them on to consumers in the form of higher
prices,
4. Too much power: Business is already one of the most powerful institutions in our
society. If it pursues social goals, it would have even more power. Society has given
business much power.
5. Lock of skills: The outlook and abilities of business leaders are oriented primarily
toward profits and gains. Business people are not competent enough to deal with social
issues and solve social problems.
6. Lack of accountability: Political representatives pursue social goals and are held
accountable for their actions. Such is not the case with business leaders.
7. Lack of broad public support: These are not much support from society for business to
become involved in social issues.

CONCLUSIONS
From the above discussions it can be concluded that not only PSUs are performing social
responsibilities but also private sector plays an important role in performing CSR. The
Top 35 companies of India performed in the CSR in the financial year 2015 and spent
funds in the following areas:
*The datum are expressed all in Rs. in crores.
S.L COMPANY REVENUE AVG PAT ACTUAL 2% OF
SPEND PAT
1 INDIAN OIL CORPORATION 442,459 7,783 83 156
2 RELIANCE INDUSTRIES 368, 571 21,138 288 423

www.bitm.org.in Volume: 6 No: I February 2017 59 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
3 BHARAT PETROLEUM 223,315 1,438 8 29
CORPORATION
4 HINDUSTAN PETROLEUM 195,891 1,118 27 22
CORPORATION
5 TATA MOTORS 170,678 8,437 15 169
6 OIL & NATURAL GAS 151,121 23,660 121 473
CORPORATION
7 STATE BANK OF INDIA 147,197 13,056 71 261
8 TATA STEEL 135,976 3,895 146 78
9 PNB GILTS 104,628 29 N/A 1
10 HINDALCO INDUSTRIES 82,549 3,597 28 72
11 COAL INDIA 78,410 11,759 119 235
12 BHARTI AIRTEL 71,506 6,511 33 130
13 MMTC 67,023 129 3 3
14 NTPC 66,366 9,334 49 187
15 LARSEN & TOUBRO 64,960 4,818 70 96
16 ESSAR OIL 63,428 -201 NA N/A
17 MAHINDRA & MAHINDRA 63,030 2,948 22 59
18 MANGALORE REFINERY & 57,214 1,066 NA 21
PETROCHEMICALS
19 TATA CONSULTANCY SERVICE 48,894 8,935 51 179
20 BHARAT HEAVY ELECTRICALS 50,654 5,823 37 116
21 STEEL AUTHORITY OF INDIA 51,428 5,153 61 103
22 GAIL(INDIA) 44,861 3,891 54 78
23 STERLITE INDUSTRIES(INDIA) 43,116 6,831 7 137
24 CHENNAI PETROLEUM 45,397 392 3 8
CORPORATION
25 ADANI ENTERPRISES 39,416 1,940 14 39
26 ICICI BANK 37,995 6,366 24 127
27 PUNJAB NATIONAL BANK 37,447 4,460 NA 89
28 WIPRO 37,308 5,152 NA 103
29 MARUTI SUZUKI INDIA 40,050 2,162 12 43
30 JSW STEEL 36,964 1,569 32 31
31 INFOSYS 33,734 7,128 26 143
32 STATE TRADING 30,905 60 NA 1
CORPORATION OF INDIA
33 CANARA BANK 30,816 3,313 NA 66
34 BANK OF BARODA 30,488 4,262 NA 85
35 RUCHI SOYA INDUSTRIES 30,332 167 0 3

*Source National bulletin 2015

www.bitm.org.in Volume: 6 No: I February 2017 60 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

30000
20000
10000 AV PAT
0
ACTUAL SPEND

The spending money for CSR purposes have emerged like Education, Health care,
Sustainable livelihood, Infrastructure development, and espousing social causes etc. All
of community projects are carried out under the aegis of The Aditya Birla Centre for
Community Initiatives and Rural Development. In Education, ones endeavour is to spark
the desire for learning and knowledge at every stage through :-
Formal schools
Quality primary education
Girl child education
Adult education programmes

In Health care ones goal is to render quality health care facilities to people living in the
villages and elsewhere through our Hospitals:-
Primary health care centres
Mother and Child care projects
Immunisation progr ammes with a thrust on polio eradication
Health care for visually impaired, and physically challenged
Preventive health through awareness programmes.
In Sustainable Livelihood, programmes aim at providing livelihood in a locally
appropriate and environmentally sustainable manner through:-
Formation of Self Help
Groups for women empowerment
Agriculture development and better farmer focus Watershed development
Partnership with Industrial Training Institutes.
In Infrastructure Development for setting up essential services that form the foundation of
sustainable development through:-
Basic infrastructure facilities
Housing facilities
Safe drinking water
To bring about Social Change, one should advocate and support:

Dowryless marriage
Widow remarriage
Awareness programmes on anti social issues
De-addiction campaigns and programmes

www.bitm.org.in Volume: 6 No: I February 2017 61 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Espousing basic moral values etc.
The following noted companies earned net profit during the financial year 2015-2016.
Under the companies Act 2013(Amened) , any companies having a net profit of 5 crores
or more should mandatorily spend 2% of their net profit per fiscal year on CSR
activities. The amended Act come into force from 1 st April,2014 but none company
contributed to CSR activities.

S.L COMPANY NET PROFIT(Rs. In Crores) 2% OF PAT

1 RELIANCE 22417 448.34

2 TCS 22882.7 457.7

3 INFOSYS 15786 315.72

4 HDFC BANK 12296.21 246

5 WIPRO 8099 162

6 COAL INDIA 16343.53 327

7 SBI 9950.65 199.01

8 ICICI BANK 9726.29 195

9 AXIS BANK 7357.82 147.16

10 LIC HOUSING FINANCE 1660.79 33.22

11 ASIAN PAINTS 1597.43 32

12 BRITANIA 749.09 14.98

25000
20000
15000
10000
5000
0 NET PROFIT
COAL

ASIAN
HDFC

LIC
TCS
RELIANCE

SBI
WIPRO

ICICI BANK
INFOSYS

AXIS BANK

BRITANIA

2% of PAT

School Social Responsibility at school by the companies in West Bengal

www.bitm.org.in Volume: 6 No: I February 2017 62 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
The following schools successfully participated in the workshop on "Cross Culture
Innovative Exposer on Education and Social Work System in India & Ireland" for the
young generation, with schools from Ireland.
South City International School
Birla High School
Sushila Devi Birla
South Point High School
Mahadevi Birla World Academy
Gokhale Memorial Girls'
Julien Day School, Elgin Road
Lashmipat Singhania Academy
Garden High School
Nava Nalanda High School
G.D. Birla High School
La Martinere Girls School
La Martinere Boys School
Future Foundation
Future Campus School
Calcutta International School
Apeejay School, Kolkata organized an Art Competition on 26th February'2012.
The boys had to draw on the T-shirts. It was a remarkable experience for our
children; Sheikh Guljar, Subho Shaw and Sheikh Sani got certificates for their
painting.
Sushila Birla High School had three days workshop with Hope home girls with
Ireland school children
REFERENCES:
[1] Chahoud, Dr. Tatjana; Johannes Emmerling, Dorothea Kolb, Iris Kubina,
Gordon Repinski, Catarina Schlger (2007). Corporate Social and
Environmental Responsibility in India - Assessing the UN Global Compact's
Role.
[2] Understanding and Encouraging Corporate Responsibility in South Asia.
MAY,2001.
[3] state of CSR in India& Executive summary and recommendations:CSR in
India-perspectives for business. 1 May 2007.
[4] Khanna, Parul; Gitika Gupta (January 2011). PARUL KHANNA Paper-
_Corporate_Social_Responsibility.
[5] Sathish, Ramya. "Corporate Social Responsibility in India - Putting Social-
Economic Development on a Fast Track".
[6] "Implications of Companies Act, 2013 Corporate Social Responsibility".
Grant Thornton India LLP. Retrieved 7 March 2014.
[7] "The Flag Off of CSR Rules: India Inc.s To-Do List for Compliance to
Section-135". Forbes, 4 March 2014.

www.bitm.org.in Volume: 6 No: I February 2017 63 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

A LITERATURE SURVEY ON LSB COLOR IMAGE


STEGANOGRAPGY
Soumen Bhowmik1, Sheetal A Dabhi2, Soumya Mukherjee3, Aditi Ghosh4
1,3
Assistant Professor, 2M. Tech Student, Department of Computer Science &
Engineering
Bengal institute of Technology & Management, Santiniketan
4
Assistant Teacher, Ruppur High School (HS), Bolpur

Abstract

In this paper we studied a secure data hiding process, where the existence of the data will
not been perceive by others except the intended recipient. It also provides a level of
security beside the cryptography. The main objective of cryptography is to secure
communications by changing the data into a form so that it cannot be understand by an
eavesdropper. On the other hand, steganography techniques tend to hide the existence of
the message itself, which makes it difficult for an observer to figure out where exactly the
message is. The spatial domain techniques manipulate the cover-image pixel bit values to
embed the secret information. The secret bits are written directly to the cover image pixel
bytes. Consequently, the spatial domain techniques are simple and easy to implement.
The Least Significant Bit (LSB) steganography is one of the main techniques in spatial
domain, where images are used as a cover medium. In this literature survey we tried to
figure out the advantages and disadvantages of Least Significant Bit (LSB) method.
Key Word: LSB; data hiding; embedding; extraction; gray scale;
Introduction
Steganography is the art and science of writing hidden messages in such a way that no
one apart from the intended recipient knows the existence of the message [1]. Due to
growing need for security of data, image steganography is gaining popularity .The main
goal of steganography is to communicate securely in a completely undetectable manner
and to avoid drawing suspicion to the transmission of a hidden data .This idea of data
hiding is not a novelty, it has been used for centuries [2] all across the world under
different regimes but to date it is still unknown to most people. Historical tricks include
invisible inks, tiny pin punctures on selected characters, minute differences between
handwritten characters, pencil marks on type written characters, grilles which cover most
of the message except for a few characters, and so on [3].
Cryptography was created as a technique for securing the secrecy of communication
and many different methods have been developed to encrypt and decrypt data in order to
keep the message secret. Unfortunately it is sometimes not enough to keep the contents of
a message secret, it may also be necessary to keep the existence of the message secret.
The technique used to implement is called steganography. Steganography is a technique
used to hide information within images. Using stenography, watermarks and copyrights
can be placed on an image to protect the rights of its owner without altering the
appearance of the image. Almost like magic, images, executable programs, and text
www.bitm.org.in Volume: 6 No: I February 2017 64 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
messages can hide in images. The cover image does not appear to be altered. People look
at the cover image and never suspect something is hidden. Your information is hidden in
plain sight

Liturature Servey
The traditional Image steganography algorithm is Least Significant Bit [4]
embedding, the advantage of LSB is its simplicity to embed the bits of the message
directly into the LSB plane of cover-image and many applications use this method [5].
But it can be easily detected by the attackers as it embeds data sequentially in all pixels.
If a steganography method causes someone to suspect that there is secret information in
the carrier medium, then this method fails [6].

Least Significant Bit embedding (LSB)

In a gray scale image each pixel is represented in 8 bits. The last bit in a pixel is
called as Least Significant bit as its value will affect the pixel value only by 1. So, this
property is used to hide the data in the image. Here we have considered last two bits as
LSB bits as they will affect the pixel value only by 3. This helps in storing extra data.
The Least Significant Bit (LSB) steganography is one such technique in which least
significant bit of the image is replaced with data bit. As this method is vulnerable to
steganalysis so as to make it more secure we encrypt the raw data before embedding it in
the image. Though the encryption process increases the time complexity, but at the same
time provides higher security also. This approach is very simple.In this method the least
significant bits of some or all of the bytes inside an image is replaced with a bits of the
secret message. The LSB embedding approach has become the basis of many techniques
that hide messages within multimedia carrier data. LSB embedding may even be applied
in particular data domains - for example, embedding a hidden message into the color
values of RGB bitmap data, or into the frequency coefficients of a JPEG image. LSB
embedding can also be applied to a variety of data formats and types. Therefore, LSB
embedding is one of the most important steganographic Techniques on use today.
In this algorithm data is hidden randomly i.e., data is hidden in some randomly
selected pixel. Random pixel is generated by using Fibonacci algorithm. The fatal
drawback of LSB embedding is the existence of detectable artifacts in the form of pairs
of values (PoVs). The proposed scheme breaks the regular pattern of (PoVs) in the
histogram domain, increasing the difficulty of steganalysis and thereby raising the level
of security. Two values whose binary representations differ only in the LSB are called a
pair of values (PoVs). For example, 68(01000100)2 and 69(01000101)2 are a PoVs. If
the numbers of 1s and 0s are equal and distributed randomly in the secret message that is
to be embedded steganographically, the frequency of two values in each PoVs will be
equal after message embedding. This regular equality pattern, called the PoVs artifact, is
an unusual characteristic in the histogram domain [7]. The sample value that will be
incremented or decremented depends on a series of predefined thresholds that are
generated by the user-specified stego-key. The new sample value not only depends on the
generated pseudorandom number but also depends on the original sample value. Using
the RLSB is therefore more secure than using traditional LSB embedding types.
www.bitm.org.in Volume: 6 No: I February 2017 65 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527

Advantages and Disadvantages of LSB

The advantages of LSB are its simplicity to embed the bits of the message directly
into the LSB plane of cover-image and many techniques use these methods . Modulating
the LSB does not result in a human-perceptible difference because the amplitude of the
change is small. Therefore, to the human eye, the resulting stego-image will look
identical to the cover-image. This allows high perceptual transparency of LSB Efficient
Steganography using LSB and encryption technique

We noticed that in the approach discussed above, the time taken for generating the
random numbers depends on the size of the key. In our approach it means that it also
depends on the cover-image size.
Although the LSB embedding methods hide data in such a way that the humans do
not perceive it, such schemes can be easily destroyed by an opponent such as using lossy
compression algorithms or a filtering process.
Any process that modifies the values of some pixels, either directly or indirectly, may
result in degrading of the quality of the original object. A slight variation of this
technique allows for embedding the message in two or more of the least significant bits
per byte. This increases the hidden information capacity of the cover-object, but the
cover-object is degraded more, and therefore it is more detectable. Other variations on
this technique include ensuring that statistical changes in the image do not occur. Some
intelligent software also checks for areas that are made up of one solid color. Changes in
these pixels are then avoided because slight changes would cause noticeable variations in
the area and. While LSB insertion is easy to implement, it is also easily attacked. Slight
modifications in the color palette and simple image manipulations will destroy the entire
hidden message. Some examples of these simple image manipulations include image
resizing and cropping.

Conclution

In the present world, the data transfers using internet is rapidly growing because it is
so easier as well as faster to transfer the data to destination. So, many individuals and
business people use to transfer business documents, important information using internet.
Security is an important issue while transferring the data using internet because any
unauthorised individual can hack the data and make useless or obtain information
unintended to him. The future work on this project is to improve the compression ratio of
the image to the text.this project can be used for different types of image formats like.
Bmp. Jpeg. Tif, etc in the future. The security using lsb algorithm is good but we can
improve the level to a certain extent by varying the carriers as well as using different keys
for encryption and decryption.

www.bitm.org.in Volume: 6 No: I February 2017 66 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
References
[1] Yang, Chunfang, Liu, Fenlin., Luo, Xiangyang., and Zeng, Ying., Pixel Group
Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits
Steganography, IEEE Transactions on Information Forensics and Security, Vol. 8,
No. 1, January 2013.
[2] Swati malik, Ajit Securing Data by Using Cryptography with Steganography,
International Journal of Advanced Research in Computer Science and Software
Engineering, Volume 3, Issue 5, May 2013
[3] Ishwarjot Singh ,J.P Raina, Advance Scheme for Secret Data Hiding System
using Hop field & LSB, International Journal of Computer Trends and Technology
(IJCTT) volume 4 Issue 7July 2013.
[4] S. Bhowmik, A. Ghosh and A. K. Bhaumik, A SURVEY ON DIGITAL IMAGE
STEGANOGRAPHY, INTERNATIONAL JOURNAL OF MULTIDISCIPLINARY
RESEARCH CENTRE (IJMRC), Volume I, Issue 7, pp 7-11, 2015
[5] Shabir A. Parah, Javaid A. Sheikh, G.M. Bhat, Data Hiding in Intermediate
Significant Bit Planes, A High Capacity Blind Steganographic Technique,
International Conference on Emerging Trends in Science, Engineering and
Technology , pp.192-197, July 2012.
[6] S. Bhowmik and A. K. Bhaumik, A New Approach in Color Image
Steganography with High Level of Perceptibility and Security, IEEE 2016
International Conference on Intelligent Control Power and Instrumentation (ICICPI),
pp-284-287, October 2016.
[7] Anil Kumar and Rohini Sharma,A Secure Image Steganography Based on RSA
Algorithm and Hash-LSB Technique, International Journal of Advanced Research in
Computer Science and Software Engineering, Volume 3, Issue 7, July 2013.

www.bitm.org.in Volume: 6 No: I February 2017 67 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Submarine Wireless Sensor Networks (SWSN),


Architecture, Routing Protocols, Simulation in
MATLAB
Arun Kumar Bag1, Shayma Nand Kumar2, Swagata Das3
1,3
Assistant Proffesor, 2M.Tech Student
Department of Electronics and Communication Engineering
BengalInstituteof Technology & Management, Santiniketan

Abstract
Submarine wireless sensor networks (SWSNs) are becoming popular everyday due to
their important role in different applications, such as offshore search and Submarine
monitoring. Submarine wireless sensor networks face unique conditions. Therefore,
particular routing protocols are needed to route the packets from a source to a destination.
Moreover, numerous SWSNs applications require deploying the security issue; which
routing protocols dont take in consideration. A survey on SWSN architectural view and
the routing protocols used for SWSNs are given in this paper. The routing protocols
studied and compared with respect to packet delivery ratio, packet delay, energy
consumption. Priority and drawbacks of each routing protocol are listed. In addition, a
survey of the security issue for SWSNs is presented, and the security requirements in
order to secure communication medium in this environment are listed

KeywordsWSN, SWSN, Application, Design, Geographical routing, Security.

INTRODUCTION
The field of Wireless Sensor Networks (WSNs) has captured the imagination of the
world with their potential to enhance human lives. WSN has wide applications in fields
like agriculture monitoring, industrial monitoring, smart housing, automobile industry,
and in military applications. Wireless sensor network (WSN) consists of a large number
of small sensors capable of sensing, processing, and transmitting information to each
other. These sensors communicate with other parts of networks using wireless interface.
Figure 1 shows an example for WSN.
The design of WSNs depends on the environment, the applications objective, cost,
hardware, and system constraints such as a limited energy, shortage of communication
range and bandwidth, and limited processing and storage in each node. The environment
determines the networks factors like size, topology andschemes. There are five types of
WSNs: Terrestrial WSN, Underground WSN, Submarine WSN, Multi-media WSN, and
Mobile WSN [1].

www.bitm.org.in Volume: 6 No: I February 2017 68 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Fig. 1: Wireless Sensor Network

Terrestrial WSNs: Consist of a number of inexpensive wireless sensor nodes


deployed in a given area.
Underground WSNs: a number of nodes deployed underground to sense the
surrounding conditions. Besides that, sink node is deployed to gather these
sensed data to base station.
Submarine WSNs: sensor nodes and vehicles form the networks used to monitor
Submarine conditions.
Multi-media WSNs: Consist of a number sensor nodes equipped with cameras
and microphones. Used to monitor and track events in the form of video, audio,
and imaging.
Mobile WSNs: Consist of nodes moves by itself which have the ability to
reposition and organize itself in the network.
Large portion of ocean research conducted by placing sensors (that measure current
speeds, temperature, salinity, pressure, chemicals, etc.) into the ocean and later physically
retrieving them to download and analyze their collected data. This method does not
provide real-time analysis of data, which is critical for event prediction. The real-time
monitoring of Submarine introduces the need of Submarine wireless sensor networks.
Submarine wireless sensor network communication has received increased attention
motivated by many scientific, military, and commercial interests because it can enable a
broad range of applications.
The major contribution of this paper is to give an introduction to Submarine wireless
sensor networks (SWSNs) its characteristic, challenges, applications, and architectures. A
comparative study of some existing routing protocols, gives the advantages and
limitations of one protocol over the others. Due to resource limitation, it is quite difficult
to provide a strong security to SWSNs. This paper identifies the security requirements for
SWSN, attacks against SWSNs, and particular solutions for these attacks. Furthermore, a
security comparison between the existing routing protocols is given. This comparison
clarifies the vulnerability of those routing protocols to various security attacks. Finally,
the paper suggests new research directions as a future scope of study in SWSNs. In the
rest of this paper, introduction to SWSNs its characteristic, challenges, applications, and
architectures introduced in Section 2. Section 3 discusses some existing SWSNs routing
protocols and give a comparison between them. In section 4, the security requirements,
security attacks, and attacks defenses are presented. Section 5 elaborates the different
model and simulation tools are used. Localization methods are outlined in Section 6. The
proposed new directions of study are discussed in section 7. Finally, a brief conclusion is
given in Section 8.

2. Submarinewireless Sensor Network (SWSN)


From many decades, there has been a big interest in monitoring the Submarine
environment for scientific, commercial and military operations. Real time monitoring is
very important for many applications, this calls the need of building Submarine Wireless
Sensor Networks (SWSNs). SWSNs as seen in figure 2 consist of sensor nodes, surface

www.bitm.org.in Volume: 6 No: I February 2017 69 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
stations and autonomous Submarine vehicles (AUVs) networked to perform collaborative
monitoring tasks.

Fig. 2: Submarine Wireless Sensor Network.

I. Hop-by-Hop Vector-Based Forwarding Protocol (HH-VBF)


It based on the same idea of routing vector as VBF, therouting virtual pipe redefined to
be a per-hop virtual pipe, instead of a single pipe from the source to the sink [13]. As we
can see in figure 9, in HH-VBF, the impossible paths in VBF can be used here.
In HH-VBF the Self-Adaptation Algorithm is different from that in VBF. Each forwarder
maintains a self-adaptation timer, which based on the desirableness factor. The timer
defines the time the node waits before forwarding the packets.

2.1The Self-Adaptation Algorithm


In HH-VBF, the desirableness factor determines a self-adaptation timer Tadaptation which is
done in each forwarder. It is the time the packet be held before forwarding. The
desirableness factor of a node A, is defined as

d is the distance between node A and candidate forwarder F.


is the angle between vector and vector .
R is the transmission range.

Fig. 3: VBF vs. HH-VBF [1].


www.bitm.org.in Volume: 6 No: I February 2017 70 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527

The node with the lowest desirableness factor will forward the packet first. In this way, a
node may hear the same packet multiple times. The node computes its range in various
vectors from the packet received to the sink. If distance become more minimum but still
higher than the pre-defined lower distance threshold , this node will send the packet. if
not, it discards the packet. The bigger is the more nodes will forward the packet. So,
adjusting will control forwarding redundancy in HH VBF.
2.2 Advantages of HH-VBF
Less sensitive to the routing pipe radius than VBF.
The packet delivery ratio increased in dense networks.
Provide more paths to deliver data than VBF.
3. Void Detection
Void can be detected by node when listening to neighbours nodes transmission of
packets. For forwarding vector and a node N, we define the advance of node N as the
projection of the vector on the forwarding vector . Void node is node which all
neighbours advances are smaller than its own on sending data. In figure 4, the advances
of nodes B, C and F denoted as . Node F hasgreater advances than all
neighbours. Thus, node F is a void node [1]

Fig. 4: Void Detection [6].

3.1 Clustering Vector-Based Forwarding Protocol (CVBF)


The whole network divided into a predefined number of clusters. All nodes assigned to
the clusters based on their geographic location. One node at the top of each cluster
selected as a virtual sink. The rest of nodes in each cluster transmit the data packets to
their respective cluster virtual sink. The routing inside each cluster follows the VBF
routing protocol. CVBF defines one virtual routing pipe for each cluster, instead of one
virtual routing pipe for all network nodes in VBF. The routing pipe radius is equal to the
transmission range of a node. After receiving the data packets from the sensor nodes,
cluster virtual sinks perform an aggregation function on the received data, and transmit
them towards the main sink using single-hop routing. Cluster virtual sink nodes are
responsible for coordinating their cluster members and communicating with the main
sink [1, 6]. Data delivery ratio in sparse networks is higher than VBF.

4. Localization
Due to unavailability of GPS signal Submarine, WSN localization techniques cant be
applied to SWSN. Submarine communication is based on acoustic waves. These
www.bitm.org.in Volume: 6 No: I February 2017 71 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
localization methods are divided into two approaches: Range-based approaches and
Range-free approaches [4].
4.1 Range-Based Localization Schemes
Time of Arrival (TOA), Time Difference of Arrival (TDOA) or Received Signal Strength
Indicator (RSSI) is used for distance estimation. Some nodes which are known in
advance by anchor are known its location to localize the other nodes in the network. By
measuring the distance between anchor and the node, it can be specify the coordinates.
An Anchor Free Localization Algorithm (AFLA) is scheme, where no anchor nodes are
deployed. Nodes are tied to anchor by cable to prevent it from its mobility. It is self-
localization algorithm. It benefits from of adjacent nodes.
A Hierarchical Localization Approach (LSL) for large-scale 3D network is a distributed
approach used that is based on 3D Euclidean distance estimation. It classifies nodes into
three types: surface buoy, anchor node and normal node. GPS locate the surface buoy
where it locates the anchor node which is responsible for ordinary nodes localization. It is
simple and has low overhead communication.
A Time Synchronization Free Localization Scheme (LSLS) for large scale SWSN. Three
surface buoys hear each other using TDOA measured at a sensor

Table 1: Comparison of SWSN simulation programs [1].


Programming Open Source and
Simulator Limitations
Language/Platform Online Documents

Complicated, Time consuming GUI


NS-2 C++ Yes
didn't support.

Limited scalability, low reality, real


EmStar Linux Yes
time simulation accessed only.

Only wireless network, limited in IP


GloMoSim Parsec Yes
network and routing protocols.

It doesnt care of low layer and


Shawn Java Yes
restricted to postscript files.

Restricted number of functionalities,


UWSim C++
used only for SWSN.

VisualSense Ptolemy II Limited in protocols.


J-Sim Java Yes Difficulty and latency.

Noncommercial
Bug report Compatibility and
OMNeT++ C++ License,
probability.
Commercial License

Aqua-Sim C++ Yes An acoustic signal is very slow

QualNet C++ Commercial License

www.bitm.org.in Volume: 6 No: I February 2017 72 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
node. Reactive beaconing is used for time synchronization. A localized node becomes a
reference node to the others iteratively to maximize coverage besides scheme to evaluate
the variable sound speed.
Submarine Sensor Positioning (USP). It changes the problem from 3D to 2D by
employing sensor nodes depth Bilateration and determineslocalizationof all nodes using
iterative localization in 3D network with three surface buoys to help. It is based on find
out the node location in 2D which helps to determine it in 3D planes.
Submarine Positioning System (UPS) scheme: it is silent scheme which no time
synchronization is used. It is used four reference nodes with one deployed Submarine for
this purpose. TDOA from reference nodes is used to measure sensor nodes range. UPS
reach out to Wide Coverage Positioning Scheme (WPS)which use five references to
overcome infeasible region in UPS. But it is lowest Performance than UPS in spite of its
high probability localization.
Dive and Rise (DNR): GPS locate its coordinate when it float to sea surface and after that
sink down to a certain depth and backonce more. During this, sensor nodes listen
passively to DNR massage and use three or more messages to localize itself. It uses TOA
as a silentpositioning scheme for distance calculation.
Multistage localization using mobile beacon (PL). It solve the problem of low depth of
DNR diving. Meandering Current Mobility (MCM) model is used to consider node
mobility.
A Three Dimensional Submarine Localization (3DUL) Localization process is classified
into two steps: 1. ranging and 2. Projection and dynamic trilateration. 1ST phase, distance
measurement between sensor nodes is done by estimated sound speed and two ways
message and three neighboring anchor nodes. Three anchors are used in next phase to
project to plane to localize nodes. Robustness of anchor helps trilateration to locate.

4.2 Range-Free Localization Schemes


It does not use TOA, TDOA, RSSI which it estimate the position of nodes.
An Area Localization Scheme (ALS): it estimates the certain location using acoustic
signal from reference nodes with different power. For acoustic signal, the model of
spherical propagation is used. the minimum power level received is recorded and send to
a central server. This server uses its information to localize the node. Communication
range, centralization and estimation of coordinate are the major limitations.
A localization scheme Using Directional Beacons (UDB). An AUV tour with directive
antenna sending signals at some angle toward nodes Sensor nodes watch these signals to
find outits position. It is an energy efficient technique because passive listen. Time
synchronization is not used [4].
UDB is developed for 3D Submarine network by Localization with Directional Beacon
(LDB). LDB is a distributed approach which use for sparse and dense networks. An AUV
use directive device while surfing over certain area in the network and sends directional
beacons toward sensor nodes. The first and last herd beacons determine the nodes
coordinates. Use different depth to node is the basic difference from UDB and nodes are
tied to sea ground to prevent them from moving. It is saving energy as silent scheme.
Localization inaccuracy is upper bounded [4]. The comparison between schemes is
mentioned in Table 11.
5. Future Work

www.bitm.org.in Volume: 6 No: I February 2017 73 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Based on current research work in SWSN routing protocols, it is clear that many issues
are unsolved. Some of these issues listed as follows:
The routing must be self-configuring because in case of failure;
equipment is deployed far from the experts.
Implementing the existing routing protocols with security mechanisms
involvement.
Design routing protocols that handle multi-copy mechanism, when one
copy of the packet reached the destination, then how the intermediate
nodes know to discard the other copies of the same packet, for the best
use of the resources.
Most existing void handling techniques in SWSNs employ flooding
techniques to find the turn link, proposing new void handling methods
with low overhead.
Design an efficient routing protocol that balance between the nodes
energy and the communication overhead.
Design a new technique which converts different energy types such as
moving energy to electrical energy
In location-based routing protocols, it is necessary to devise efficient
Submarine location discovery techniques.
In location-based routing protocols, since each transmitted data packet
contain location information, it is necessary to focus on the node
location privacy.

In general, the various research issues facing SWSN researchers are in the following
aspects: network topology, physical layer, MAC layer, Network layer, and Application
layer. Reference [5] stated the problems related the network layer as follows:-

TABLE II: Comparison of localization schemes [4].


Range Time Node Iterative
Scheme Range Silent
based/Range Measurement Synchronization Mobility
Localization
Using Positioning
Used
free Required Considered

DNR range based TOA Yes Yes Yes No

PL range based TOA Yes Yes Yes Yes

www.bitm.org.in Volume: 6 No: I February 2017 74 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974 -9527
Range Time Node Iterative
Scheme Range Silent
based/Range Measurement Synchronization Mobility Localization
Using Positioning
free Required Considered Used

LSL range based TOA Yes Yes Yes Yes

AFLA range based TOA Yes No Yes No

LSLS range based TDOA No Yes No Yes

USP range based TOA Yes No Yes

Two way
3DUL range based message No No Yes Yes
exchange

UPS range based TDOA No Yes No No

WPS range based TDOA No Yes No No

UDB range free N/A No Yes No No

LDB range free N/A No Yes No No

ALS range free N/A No Yes No No

Connectivity loss management without provoking immediate


transmissions, delay-tolerant applications have to be developed for.
Healthy routing algorithms is required, Due to the quality of acoustic
links is highly unpredictable, with respect to intermittent connectivity
of acoustic channels.
Connection failure must be addressed through protocols besides,
mobility of nodes and battery depletion.
Development of Submarine location discovery efficiently in
geographical routing protocols.
Development of simulation models and tools to understand data
transmissions dynamics.
The propagation delay depends on the distance betweenthe nodes and it is larger in
horizontal acoustic links than vertical one because of multipath.

6. Conclusions
Interest in SWSNs is increasing, and related research studies are in progress. However,
Submarine environment is a special environment that has many restrictions. Considering
this restriction, many challenges face the design of the routing protocols of SWSNs. The
routing protocols in SWSNs have the common objective of trying to increase the delivery
ratio while decreasing the resource consumption and End-to-End delay. However, current
routing protocols have not designed to defend against security attacks that can block or
degrade network communication and performance.

www.bitm.org.in Volume: 6 No: I February 2017 75 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
In this paper, we introduced an overview of SWSNs its characteristic, challenge,
communication system nature, network architecture, localization and applications. We
discuss some of SWSNs routing protocols and study their advantages and disadvantages.
The comparison is necessary in order to point out which routing protocol is best
according to the desirable use. We also explored security issues and attacks of SWSNs.
We present comparison between the surveyed routing protocols according to its
vulnerability against various security attacks. Security issues in SWSNs remain open and
we expect to see more research activities on these topics in the future.

REFERENCES
[1] Dina M. Ibrahim, Mohmoud M. Fahmy, Tarek E. ElTobely, and ElSayed A.
Sallam, Modelling and Performance Enhancement of Submarine Wireless
Sensor Networks by Petri Nets, Thesis submitted to the Engineering Faculty,
Tanta University, for the degree of Doctor of Philosophy in Electrical
Engineering, 2014.
[2] Jian S., Jin W., Jianwei Z. and Shunfeng W., A Comparative Study on Routing
Protocols in Submarine Sensor Networks, Advanced Technologies, Embedded
and Multimedia for Human-centric Computing, Lecture Notes in Electrical
Engineering 260, Springer Science & Business Media Dordrecht, 2014.
[3] M.Kiranmayi1and Dr. Kathirvel Ayyaswamy; Submarine Wireless Sensor
Networks: Applications, Challenges and Design Issues of the Network Layer - A
Review, International Journal of Emerging Trends in Engineering Research
(IJETER), Vol. 3 No.1, January 27, 2015, pp. 05 11.
[4] Mukesh Beniwal and Rishipal Singh, Localization Techniques and Their
Challenges in Submarine Wireless Sensor Networks, International Journal of
Computer Science and Information Technologies, Vol. 5 (3) , 2014, 4706-4710.
[5] Bhanu K., Muti-Metric Adaptive Routing Algorithm for Submarine Wireless
Sensor Networks, a thesis submitted in partial fulfillment of the requirements
for the Degree of master of science, Texas A&M University - Corpus Christi
Corpus Christi, Texas, 2011.
[6] Ahmed M., Iraqi Rivers Pollution Monitoring System Based on Submarine
Wireless Sensor Networks, a thesis submitted to the Computer Engineering
Department University of Technology in Partial Fulfillment of the requirements
for the Degree of Master of Science in computer engineering, 2013.

[7] Salvador Climent, Juan Vicente Capella, Nirvana Meratnia and Juan Jos
Serrano, Submarine Sensor Networks: A New Energy Efficient and Robust
Architecture, Sensors 2012, 12, pp.704-731.
[8] MohsinMurad, Adil A. Sheikh, Muhammad AsifManzoor, EmadFelemban, and
SaadQaisar, A Survey on Current Submarine Acoustic Sensor Network
Applications, International Journal of Computer Theory and Engineering, Vol.
7, No. 1, February 2015, pp.51-56.
[9] Parul Garg and Sandeep Waraich, Parametric Comparative Analysis of
Submarine Wireless Sensor Networks Routing Protocols, International Journal
of Computer Applications, Vol.116 No. 11, April 2015, pp. 29-35.
[10] Sihem Souiki, Maghnia Feham, Mohamed Feham and Nabila Labraoui,
Geographic Routing Protocols for Submarine Wireless Sensor Networks: A
www.bitm.org.in Volume: 6 No: I February 2017 76 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
SurveyInternational Journal of Wireless & Mobile Networks (IJWMN) Vol. 6,
No. 1, February 2014, pp.69-87.
Kifayat Ullah Jan and Zahoor Jan, Survey on Routing Protocols for Under
Water Sensor Networks, Journal of Computer Engineering (IOSR-JCE), Vol.
16, Issue 1, Ver. VI, Feb. 2014, pp. 44-46.
[11] Xie P., Cui J., and Lao L, Vector-based Forwarding Protocol for Submarine
Sensor Networks, International conference on networking (IFIP networking), 2

www.bitm.org.in Volume: 6 No: I February 2017 77 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

E-Learning: Opportunities and Challenges as a


Prospective Sector of E-Commerce in India
Sudakshina Dutta Roy1
1
Assistant Professor
The Heritage Academy, Kolkata,
Maulana Abul Kalam Azad University of Technology
sdutta.roy@heritageit.edu

Abstract
E-Commerce in the retail sector is emerging at a rapid pace. E-Learning which is a
prospective sector of e-commerce is yet to gain that momentum. This paper studies the
advantages and disadvantages of e-learning in the Indian context to ascertain the
opportunities of e-learning and also looks at the challenges which are posing as barriers
towards the efficient implementation of e-learning in business organizations and more
prominently in the education sector. The paper looks at the literature review of the past
researches in this area to draw the inference that elearning in India is growing at a slow
pace and the same can be addressed by improving the infrastructure and elearning
strategies for educational and economic growth of the country.
Key Words: E-Commerce; E-Learning; Synchronous; Asynchronous; Blended Learning

Introduction
E-learning or electronic learning is learning with the help of electronic technologies like
the internet, intranet or extranets to acquire education outside the traditional classroom.
E-learning utilizes a computer and an internet to conduct a part or the entire course either
in a school or college or a distance learning course or even to provide training to
employees in business organizations.
E-learning includes computerized electronic learning, online learning, distance education,
MOOCs, mobile learning and many other forms (Arun Gaikwad and others, 2015).
Another characteristic of e-learning is in this process of imparting education the teacher
and the learners are separated by distance, time or both. Tarhini (2016) observes that e-
learning enhances the learner's learning experiences as well as performance of the learner
by eliminating the barriers of time and distance as the learners can take responsibility of
their own lifelong learning. (Almajali et al., 2016; Bouhnik and Marcus, 2006; Fletcher
2005).

E-commerce is anything that involves an online transaction (Alka Raghunath & Murli
Dhar Panga). This can range from ordering online, to financial transactions such as
transfer of money between bank accounts. E-commerce has been divided into two parts,
namely, e-merchandise and e-finance (Elizabeth Goldsmith and others, 2000). E-learning
falls under e-merchandise which is the selling of goods and services electronically. The
revolution in information technology has brought about a sea change in the way business
www.bitm.org.in Volume: 6 No: I February 2017 78 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
is conducted. The physical environment of buying and selling with which we had been
familiar has given way to online business which offers ubiquitous buying and selling, at
our own convenient time, from the comfort of our home and all this has been achieved
due to the extremely flexible nature of the internet which helps us to carry out a wide
range of tasks from online ordering, publishing, teaching and learning, banking and other
services (Farooq Ahmed, 2001).

E-commerce has created a new dimension and diverse opportunities for business.
Likewise, it has also created new opportunities for education and academics. It is quite
evident that there is tremendous potential for providing e-business education. E-learning
can serve as a catalyst to boost education and literacy in India. Acceptance and adoption
of e-learning in all spheres namely schools, colleges and universities and business, is
quite negligible at present. The Indian e-commerce market has gained popularity more in
the retail sector rather than the education sector. Compared to the potential of the Indian
market e-learning has a lot to achieve. Moreover, the Indian market is not considerable in
comparison to the International market (Sunil Kumar Sharma, Javed Wasim, Dr. Jamshed
Siddiqui, 2014).

This paper studies the opportunities and challenges along with the scope of e-learning as
a prospective sector of e-commerce in India by doing a literature review of the various
researches that have been conducted in this field over the decade. The concept of
electronic learning has been existing for more than a decade but it has witnessed
exponential growth in the last few years, mostly because of the revolution in information
technology and the internet.

Types of E-Learning
E-learning can be broadly divided into two types, namely, asynchronous and
synchronous.

Asynchronous generally means learning that does not occur at the same place or time. In
this form the students learn from pre recorded lectures or lessons that students complete
at their own pace and time. This kind of learning is not delivered in person or in real time.
Asynchronous learning is student centered that uses online learning resources to facilitate
information and knowledge sharing outside the constraints of time and place usually
among a group of people. Symbiosis center for Health Care (SCHC) has successfully
applied asynchronous elearning and is successfully conducting Post Graduate courses in
MedicoLegal and Health Care Management for doctors, nurses and other medical related
professionals.

Synchronous stands for learning 'at the same time'. Synchronous learning requires
advanced tools like video conferencing, interactive webinars, chat-based online
discussions and lectures. This is a more effective way of imparting online education as it
is in real time and helps to minimise the challenges associated with distance. Indian
Institute of Management Ahmedabad (IIMA) has started an initiative in this direction by
providing management education to working executives through Virtual Learning

www.bitm.org.in Volume: 6 No: I February 2017 79 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Programmes in collaboration with NIIT Imperia using Synchronous Learning Software.
A two way video interaction guided by the faculty has been set up in the studio at IIMA.

Other than these two types of e-learning, blended learning and self paced independent
study is gaining popularity among learners and educators. Blended learning is a
combination of traditional classroom teaching and learning and e-learning for better
learning experiences and outcomes. Blended learning carries with it the advantages of
both online learning while ripping the benefits of face to face classroom interaction. It
provides greater flexibility to the learner as they help to meet the different learning styles
and levels of the learner. In self paced independent study students determine their pace of
completing a course. They can examine and analyse the study material for as long as they
deem essential for knowledge acquisition. There is no instructor or guide to help them
during the program. Self motivation should be highest in self paced independent study.

Advantages of E-learning
E-Learning is being accepted and is gaining popularity in India but at a rather slow pace
compared to other countries. It is an effective medium to achieve the target of the Indian
constitution to provide quality education to all the citizens as e-learning can take literacy
to the remotest areas of the country. The government has identified the advantages of e-
learning and taken a huge step towards achieving this goal by initiating the Digital India
Programme which aims to connect rural areas with high speed internet networks.
Amongst the many advantages of e learning, a few prominent ones are listed below:

a) Large target audience base


With the help of internet and e-learning literacy can be spread to the remotest parts of the
country, to places where we have failed to reach till now. A module or course can be
uploaded in any machine using the internet or intranet without having to build or develop
courses for each system or platform. There is no need for a different means of distribution
as the machines are connected to the internet or intranet and can be accesses from any
part of the world.

b) Cost effective and time saving


The only essential requirement for Electronic Learning is an internet connection. The
learner can study or complete a course curriculum at his/her own pace and time, from the
comfort of their homes, without having to travel to any other place. This provides the
rural citizens to earn and learn at the same time without compromising their daily chores.
It also helps to increase revenues for the academic institutions and business
organizations.

c) Self paced
This is the most advantageous characteristic of e-learning, though it requires a lot of self
motivation. E-learning provides the learner with the option of ubiquitous learning or
anytime, anywhere learning. The study material can be reviewed by the learner as long as
the learner wants to understand and grasp the concept. It helps in achieving learner
autonomy.

www.bitm.org.in Volume: 6 No: I February 2017 80 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
d) Higher knowledge retention
E-learning supports the use of multimedia components like video, audio and interactive
media which makes learning interesting and a visual feast. It also facilitates global
communication and interaction to make learning meaningful. E-learning programs are
unique for the learners as they include blended learning, project based learning,
integration of technology, peer to peer coaching, and game based learning to make
acquisition of knowledge effective and efficient.

e) Easy course tracking


The learners can track their progress along with the entire process of completing the
course and accordingly prepare a schedule to complete the course at their own pace and
time. Moreover, the learners gain access to global resources and study materials that can
satiate their thirst for in depth knowledge and meet their interest level.

f) Room for individualization


Course curriculum can be customized and designed according to the level and
requirement of the individual learner who can learn according to his/her needs. The pace
of learning can be adjusted depending on a slow or quick learner which in turn, reduces
stress and increases satisfaction.

g) Mobile Learning
It is worthwhile to mention here that a vast percentage of Indian population has accepted
mobile phones and are comfortable navigating the different applications. E- Learning
courses can also be accesses with the help of smart Mobile phones which would make
knowledge sharing even more accessible.

Disadvantages of E-learning

E-Learning is multifaceted and has innumerable advantages, but, at the same time it is
important to note that there are certain disadvantages which we need to bear in mind.

a) Lack of social interaction


In a traditional classroom interaction with fellow classmates and intervention of the
teacher or facilitator acts a great motivator in the process of learning. In the process the
learner acquires important social skills. There is little or almost no interaction with a
physical instructor or facilitator in an e-learning scenario which sometimes leads to
feelings of isolation. Synchronous learning tries to address this problem by including
interpersonal and direct interaction among students and teachers.

b) Lack of confidence in navigating the computer


For a vast population in India computers and the internet is an enigma. It is of paramount
importance that teachers and staff members require adequate training to implement e-
www.bitm.org.in Volume: 6 No: I February 2017 81 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
learning in their course curriculum. The technology demands of an online course can
cause confusion and chaos for students as well as teachers (Sharma, Wasim, Siddiqui,
2014).

c) Problems with technology


Limited bandwidth is a major hurdle in the process of e-learning. It results in poor quality
of audio, video and intensive graphics which in turn affects the efficiency of learning.
Technologies are being upgraded and updated with each passing day. A developing
country cannot keep pace with the constantly changing technologies. In a developing
country like India fund to purchase the updated technology is also a barrier.

d) Need for Self Motivation


In e-learning the mandatory requirement is that the student should be actively involved in
learning (Holmes and Gardner, 2006). It becomes difficult for learners with low
motivation and low level of self discipline to pursue online self paced programs.

e) Student resistance to use the e-learning system (Wagner, 2008)


Though there are enormous benefits of e-learning, it cannot be utilized properly if the
learners resist to use or accept the system. Distance learning or online learning is not
recognized by several organizations. Hence there is an apathy and apprehension amongst
learners to pursue an online course. This perception has changed to a certain extent
amongst the urban Indian but for the rural Indian the traditional classroom is still the only
option. Awareness regarding online courses has not yet sufficiently spread in the rural
parts of the country.
Table 01 A Brief Review of Literature on E-Learning: Opportunities and Challenges
S.No Title Author Area of Research Findings
1. A Review of Literature on (Tagreed Kattoua, Current e-learning environments Successful e-learning
E-Learning Systems in Prof. Musa Al- including their limitations, system should consider
Higher Education Lozi, Dr. Alaaldin advantages and the factors that the personal, social,
Alrowwad, 2016) affect the acceptance of such cultural, technological,
technologies organizational and
environmental factors
2 Challenges and (Mark Tayar, 2013) Investigates larning as a mode Strategic and
opportunities for growth of of University internationalization technological responses
e-learning enrolments: an to help overcome
international business challenges to nhance
perspective teaching quality and
profitability

3 E-Learning in India: (Arun Gaikwad, Understands the concept of e E-Learning in India is


Wheel of Change Vrishali S Randhir, learning and examines types of e- the main wheel of
2015) learning development of
education

www.bitm.org.in Volume: 6 No: I February 2017 82 | P a g e


International Journal BITM Transactions on EEC C
ISSN No.0974-9527
4 Current Trends of E- (Depali Pande, Dr. Current situation of e-learning in Although e-learning has
Learning in India VM. Wadhai, Dr. India and its future a potential in India, the
V.M. Thakre, adaptation to this is very
2016) slow

5 E-Learning in India (Sunil Kr. Sharma, Indian education scenario, E-Learning should be
Javed Wasim, Dr. presentation tools for e-learning, used for informal and
Jamshed Siddiqui, challenges faced by e-learning in vocational training in a
2014) India and the future of e-learning developing country like
in India India where majority of
the population live in
rural areas and has
received negligible
formal education
6 E-Learning: New trend in (Ekta Srivastava, Advantages and disadvantages of E-learning is growing in
Education and Training Dr. Nisha Agarwal, e-learning and the types of e- education and training
2013) learning sector

7 E-Learning Revolution: (Sanjay Rajpal, Comprehensive insight to the Successful e-learning


Status of Educational Sanjay Singh, current status of e-learning models can b developed
Programs in India Awadhesh education in India and implemented by
Bhardwaj, Alok various universities
Mittal, 2008) across the country

8 Models for Measuring E- (Iuliana Dorobat, Research conducted in order to E-Learning system offers
Learning Successin 2014) develop a comprehensive model many advantages and
Universities: A Literature for measuring e-learning system compensates the
Review successfully in Univrsities weaknesses of the
traditional learning
methods

9 Future of E-Commerce in (Nisha Chanana, Factors essential for the growth Overall E-Commerce
India Sangeeta Goele, of Indian E-Commerce will increase
2012) exponentially in coming
years in the emerging
market of India

Challenges Faced by E-Learning in India

a) Majority of the Indian population stays in rural areas and to make them aware of the
concept and benefits of e-learning is a major challenge.
b) Lack of proper infrastructure, internet bandwidth and connectivity is another major
constraint in executing e-learning in rural areas. Government has taken initiatives in the
form of Digital India Programme to overcome these barriers.
c) Culture, gender, lifestyle, geographical barriers, religious barriers, literacy, disabilities,
are some of the social repercussion of e-learning in India.
i) Culture: Content, multimedia and writing styles might not be
acceptable and conducive for all cultures.
ii) Gender: Women are conscious about gender neutrality. The instructor
has to maintain a balance and be sensitive towards them.
www.bitm.org.in Volume: 6 No: I February 2017 83 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
iii) Lifestyle: Rural and urban India does not have the same lifestyle.
Further people from different countries have different lifestyles
and hence their learning styles are also different.
iv) Geographical barriers: In a chat room or video conference the
different time zones need to be considered.
v) Religious Beliefs: Sensitivity to religion is crucial. Different
cultures observe different religions on different days.
vi) Digital Divide: Accessibility to technology and the adequate
training to use the technology can reduce the digital divide even
when learners come from diverse backgrounds.
Scope of E-Learning in India
The first adopters of e-learning have been the business organizations who used it for
trainings, lectures, meetings and so on as a substitute for face to face communication. E-
learning can be adopted at two levels the educators level and the trainers level.
Educators can use it in both elementary education in schools and for higher education in
colleges and universities, whereas, trainers can use it for imparting trainings and
upgrading the employees knowledge. But, at both these levels adoption of e-learning is
very slow paced. Internationally e-learning has become widely accepted as compared to
India.
It can be said that e-learning has been successful in the corporate sector for achieving
business goals and for motivating employees. It is used by organizations to educate their
employees on knowledge distribution, training and the like. In this way the organizations
can save huge amounts of money. A long road has to be traveled as far as inculcating e-
learning in formal and informal education is concerned. It is essential for learners to
develop faith in online degrees conducted by universities other than the renowned Indian
institutions like IIT.
The most important step is to take e-learning to the rural areas of the country and make
the rural people aware of the benefits of e-learning. E-learning can reach out to the
masses and provide them with necessary knowledge in all relevant fields. The only
requirement for this is proper internet connectivity.
Moreover, the present universities are unable to accommodate all aspiring learners. E
learning can play a critical role here by providing Distance and Online Education to all.
India is one of the leading IT service provider countries internationally. India can become
one of the leading E-Learning service providers as we have the best IT professionals. We
need to build world class infrastructure to support e learning. The government is also
taking active measures to encourage the e-learning environment in India. Internet kiosks
have been set up in rural areas which can be utilized for e-learning.
According to a report Indias online education market size is expected to grow to $40
billion by 2017 from the current $20 billion. India has more than 1 million schools and
18,000 higher education institutions which is one of the largest education systems in the
world. Each and every industry and educational institution is required to connect with e-
learning.

www.bitm.org.in Volume: 6 No: I February 2017 84 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Conclusion

E-Learning is the way to increase the percentage of literate population of India. To


achieve the same it is imperative to develop our infrastructure both in the form of internet
facilities and developing e-learning strategies. The trainers and educators also need to be
provided with effective training so that they can us the technology efficiently. E-learning
would not only bring about literacy, it would also help in the countrys economic
development. E-learning as a prospective sector of e-commerce needs proper planning to
reach the target audience to bring about educational and economic development of the
country.
E-Learning is here to stay and it will unquestionably continue to grow. Governments,
business companies and educational institutions should work towards achieving the goal
by recognizing e-learning as one of the most prominent sectors of e-commerce for
revenue generation and for the growth of the country.

References

[1] Almajali, D., & Al-Lozi, M. (2016). Determinants of the Actual Use of E-
Learning Systems: An Empirical Study on Zarqa University in Jordan. Journal
of Social Sciences, 5 (2), 1-29.
[2] Almajali, D. A. Masa'deh, R., & Al-Dmour, R. (2016). The Role of
Information Technology in Motivating Students to Accept E-Learning Adoption
in Universities: A Case Study in Jordanian Universities. Journal of Business &
Management (COES&RJ-JBM), 4 (1), 36-46.
[3] Bouhnik, D., & Marcus, T. (2006). Interaction in Distance Learning Courses.
Journal of the American Society for Information Science and Technology, 57,
299-305.
[4] Chanana, N., Goele, S. (2012) Future of E-Commerce in India
International Journal of Computing & Business Research
[5] Diana Oblinger(2001); Will E-business Shape the Future of Open and Distance
Learning? Open Learning; Vol. 16, No. 1, 2001; pp.9-25.
[6] Dorobat, I. (2014) Models for Measuring E-Learning Success in Universities:
A Literature Review Informatica Economica, Volume 18 no. 3
[7] Elizabeth Goldsmith and Sue L.T. McGregor (2000); Ecommerce: consumer
protection issues and implications for research and education; J Consumer
Studies & Home Economics; Vol.24, No.2, June 2000, pp.124127.
[8] Fletcher, K. M. (2005). Self-Efficacy as an Evaluation Measure for Programs
in Support of Online Learning Literacies for Undergraduates The Internet and
Higher Education, 8 (3), 307-322
[9] Farooq Ahmed (2001); Electronic Commerce : An Indian perspective;
International Journal of Law and Information Technology; Vol.9, No.2,
2001;pp.133- 170.
[10] Gaikwad, A., Randhir, V.S. (2016) E-Learning in India:
Wheel of Change IJEEE, Volume 6, Issue 1, page 40-45
[11] Holmes, B., & Gardner, J. (2006). E-Learning: Concepts and Practice. Sage.
www.bitm.org.in Volume: 6 No: I February 2017 85 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
[12] Kattoua, T., Al-Lozi, M., Alrowwad, A., (2016) A Review of Literature
on E-Learning Systems in Higher EducationIJBMER, Volume 7, Issue 5, 754-
762
[13] Pande, D., Wadhai, V.M., Thakre, V.M. (2016) Current Trends of E-
Learning in India IRJET Volume 3, Issue 1, January 2016
[14] Raghunath, A., Panga, M.D. (2013) Problem and Prospects of E-Commerce
IJRDMR Volume-2, Issue 1
[15] Rajpal, S., Singh, S., Bhardwaj, A., Mittal, A. (2008) E-Learning Revolution:
Status of Educational Programs in India IMECS, 19-21 March, 2008, Hong
Kong
[16] Sharma, S.K., Wasim, J., Siddqui, J. (2014) E-Learning in IndiaIJARCET
Volume no. 3, Issue no. 1, January 2014
[17] Srivastava, E., Agarwal, N. (2013) E-Learning: New trend in Education and
Training International Journal of Advanced Research, Volume 1, Issue 8, 797-
810
[18] Tarhini, A., Elyas, T., Akour, M. A., & Al-Salti, Z. (2016). Technology,
Demographic Characteristics and E-Learning Acceptance: A Conceptual Model
Based on Extended Technology Acceptance Model. Higher Education Studies,
6 (3), 72-89.
[19] Tarhini, A., Teo, T., & Tarhini, T. (2016). A Cross-Cultural Validity of the E-
Learning Acceptance Measure (ElAM) in Lebanon and England: A
Confirmatory Factor Analysis. Education and Information Technologies, 21
(5), 12691282
[20] Tayar, M. (2013) Challenges and opportunities for growth of e-learning
enrolments: an international business perspective 30th ascilite Conference,
1-4 December 2013
[21] Wagner, E. D. (2008). Minding the Gap: Sustaining eLearning Innovation.
World Conference on E-Learning in Corporate, Government, Healthcare, and
Higher Education AACE.

www.bitm.org.in Volume: 6 No: I February 2017 86 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

A New Approach for Image Cryptography Supported


by Image Compression
Sourav Dinda1, Raj Kumar Shravan2
1
Department of Computer Science and Engineering, Bengal Institute of Technology and
Management,Santinketan, West Bengal, India
2
Department of Computer Science and Engineering, Bengal Institute of Technology and
Management,Santinketan, West Bengal, India

Abstract

This paper proposes a lossless symmetric key image cryptographic technique which is
based on thespatial domainand frequency domaincryptographic techniquefollowed by a
compression technique. Here, the image pixels are at first shuffled by taking image
blocks of size 2x2 and entered it into a row vector. From the shuffled image the
symmetric key is generated for identifying the true sender at receiver side. Now the
shuffled image isdecomposed into frequency domain using haar wavelet transformation.
By using Birge-Massart strategy the encrypted image is compressed and ensure a high
level of secured image. In the reverse way, by using its decryption technique where the
image converted from frequency domain to pixel domain and formed lossless decrypted
image.Empirical results are presented to show the satisfactory performance of its
imperceptibility and security.Efficiency of the proposed method is also measured for the
compression scoreand compression ratiofor different gray scale images.
Keywords: Image Cryptography; Haar wavelet; Birge-Massart strategy, Symmetric key,
Security analysis

Introduction

In the cryptographic concept, hide sender's original message (in form of a text, audio,
video and image) from the intruder and send over a unsecured network medium in a
unrecognizable form to the intended recipient and decrypted by human or machine to get
the original message[1][29]. In Figure (1), the basic schematic view of image
cryptography is shown where the plain image is converted into a cipher image by an
encryption technique and an encrypted key. Again the cipher image will be decrypted
using a decryption technique and with a decrypted key [8].

www.bitm.org.in Volume: 6 No: I February 2017 87 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Key-e Key-d

Convert
Image Image Recove
cipher
Encryption Decryption r Plain Image
Plain Image image
Technique Technique

Figure 1 Procedure for Image Cryptography

Image compression [4] plays a key role in many important applications, including image
database, image communications and remote sensing (the use of satellite imagery for
weather and other earth-resource application).

Encoding Process

Input
Transform Symbol
Image Quantization Encoding Bitstream
Coding

(a)
Decoding Process

Symbol Transform Recovered


Bit stream
Decoding Decoding Image

(b)

Figure 2 Basic image compression model (a) Encoding Process (b) Decoding Process
The image(s) to be compressed are gray scale with pixel values between 0 to 255. An
image is called compressed image when the number of bits is reduced in with compared
to original pixel value. Fig 2 [4] shows the basic image compression model for encoding
and decoding technique.The rest of the paper organised as in section 2 related work have
been done for the image cryptography and image compression. In section 3 the propose
image encryption and image compression are illustrated. In section 4 result analysis with
quality assessment and compression are measured. In section 5 different security and
statistical analysis have been done. In that respect the histogram analysis, coefficient
correlation and image entropy have been done. In the last section conclusion, future
scope and algorithm limitation are also incorporated.

Related Works
Sofar many research papers has been accepted in pixel based cryptography. S. Zhang, M.
Karim [13] proposed for color image encryption technique where the color image are
www.bitm.org.in Volume: 6 No: I February 2017 88 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
converted into indexed image format and image are encrypted with white noise filter
using two mask, one for input plane and other for Fourier plane. The color image is
reconstructed by converting decrypted index image into RGB format. Chen and Li [15]
presented a technique where multiple secrete images are encrypted into two circular
cipher-grids. By stacking the two circular cipher-grids, decrypt the first secret image and
gradually rotating one circular cipher-grid at a fixed degree decrypt the other. In this
regards, S.Tedmari, N.A.Najdawi [3] proposed a lossless image encryption technique
where image is sub-banded into frequency domain up to second level using haar wavelet
and diminish the LL bands by diving its dimension, change the sign of other bands and
swap the contents of bands and after IDWT on the image the encoded image is found.
Samson and Sastry [5] proposed an image Encryption with lossy compression using
multilevel wavelet transformation. In their work, the image is decomposed using
multilevel 2-D wavelet transform and based on Birge-Massart strategy threshold is
applied on decomposed image to get compressed image.
In [30], the authors introduce a compressive sensing technique to achieve lossy
compression of encrypted image data, and a basis pursuit algorithm is appropriately
modified to enable joint decompression and decryption.

Proposed Algorithms
In this paper authors presented the proposed algorithm for compression followed by
encryption and decryption technique.

Algorithm 1: Compression and Encryption

Shuffling Pixel elements in Image:


Step 1: Read any gray scale image of size N by N.
Step 2: Find 2 by 2 matrix from N by N Matrix and interchange diagonally of each
sub-matrices.
Step 3: Insert each element of each newly formed sub-matrix in row-wise into a
Vector(V). where V=1 x (N*N)
Step 4: Construct a Shuffled Image Matrix (SIM) from Vector.
Symmetric Encrypted Key Generate
Step 5:From the SIM the key has been generated by summation of diagonal element
and the last row. This key will be send to the receiver side.
Decomposition of the Shuffled Image Matrix(SIM)
Step 6: By considering haar wavelet and we decompose (wavedec2) the matrix SIM
on Level(L)=1. The outputs are in decomposition vector C and the corresponding
book keeping matrix
Step 7: From the decomposition vector (c) where co-efficient elements have been
stored
andformed a matrix and made the matrix as negative to change the contrast. Lets
say this is called Encrypted Image Matrix ( EIM).
ThresholdingUsing Birge-Massart Strategy:
Step 8: For level depending thresholding authors apply Birge-Massart Strategy as
method
wdcbm2 on c and s.aslo we apply ALPA=1.5 for compression and M the length
www.bitm.org.in Volume: 6 No: I February 2017 89 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
of number of co-efficients to be kept at level I,j. The Birge_massart strategy
return threshold (THR) and NKEEP as number of coefficient to be kept.
Step 9:Authors use wdencmp method for compressing the image using the THR value
obtained by Birge-Massart Strategy with soft thresholding.
Step 10: By taking compressed image from the previous step, authors apply Step -2 to
Step-7 on the compressed image and found the compressed and encrypted
image which is now ready to send from send to receiver through a transmission channel
with less bandwidth.

Algorithm 2: Decompression and Decryption

Decompression:

Step 1: Read the compressed and encrypted image at the receiver end.
Step 2: By using haar wavelet authors done the wavelet reconstruction
Decrypted Key Generate:
Step 3: From the reconstructed image matrix authors found the decrypted key from the
reconstructed image details by summing the diagonal and last row of the matrix.
Decryption:
Step 4: Put all pixel element into a vector in row-wise from the reconstructed image
matrix.
Step 5: Construct 2 by 2 matrix subsequently taking elements from the vector and
interchange element diagonally from each sub-matrices.
Step 6: Construct the decrypted image matrix from the shuffled sub-matrices and that
is exactly similar to the original image matrix.

Experimental Results, Analysis and Quality Assessment

In this research authors proposed a lossless technique i.e., original and decrypted
images are identical. For measuring quality of the processed image with respect to
original image Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) are
measured. [21][22]
PSNR: The most important terms with respect to measure the equality of an original
and processed image (encrypted or decrypted). The following mathematical equation (1)
is used for measuring PSNR

M
PSNR 10 log 10 .........................................(1)
MSE 2
Where M stands for maximum pixel value (for gray scale image M=255) of the image
and MSE is measured by the following mathematical equation (2):

MSE
1 N ,N

N i 1, j 1
2

xi , j yi , j .......... .......... .......... .( 2)

www.bitm.org.in Volume: 6 No: I February 2017 90 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
N is the number of pixel value in the frame and xi,j ,yi,j are the ith and jth pixels in the
original and processed frames respectively.

Standard Images, Dimension and type Proposed Work


O-D O-E (Compressed &
Encrypted)
Lena, (512 x 512), png undefined 5.8861

Boat, (512 x 512), png undefined 5.5048

Lake, (512 x 512), png undefined 5.6327

Fingerprint,(512x512),png undefined 4.9201

Peppers(256x256),png undefined 5.8883

Table 1. The PSNR(dB) results of the proposed work applied using the original,
encrypted and decrypted images, O-D: Original-Decrypted, O-E: Original-Encrypted

Results of these tests are summarized in Table 1 where the proposed technique ensure
the less PSNR value for original to encrypted images and indefinite for original to
decrypted images.

Result Analysis using Compression Score and Compression Ratio


In the proposed encoding technique authors analysis the Compression Efficiency by
measuring the Compression score and Compression Ratiowhich are measured by the
following formula [20]:
Compression score in percentage = 100*(number of zeros of the current decomposition)/
number of coefficients)
size _ after _ compression
Compression _ Ratio
size _ before _ compression

Compression factor: This is the reverse of compression ratio.


1
Compression Factor = ....................(3)
Compression _ Ratio

Standard Images, Dimension and type Compression Score (%) Compression Factor

Lena.png(512x512) 51.2142 2.0498


Boat.png(512x512) 51.1539 2.0472
Finerprint.png(512x512) 51.1478 2.0470
Peppers.png(256x256) 51.2650 2.0519
Lake, (512 x 512), png 51.1677 2.0478

www.bitm.org.in Volume: 6 No: I February 2017 91 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Average 51.1897 2.0487

Table 1The Compression Score and Compression Ratio obtained from the Proposed
Technique
In the Table 2 shows the compression score (%) and the compression ratio result for
some gray scale images. The average result shows that the proposed method compressed
a still image more than 51% and with respect to an original image size the compressed
image size reduces by 2.0487.

Conclusion, Future Scope and Limitation


In this paper authors addressed three issues: (a) The Image Encryption (b) The Image
Compression (c) The Quality and Security Assessment using the proposed method. The
Quality Assessment shows the encryption efficiency by measuring PSNR(dB) and
compression efficiency by measuring compression score and ratio.
This research can be thought for lossless image compression and tested by applying
different wavelet, label and threshold value.
Though this algorithm proves its efficiency towards encryption and compression and this
algorithm is time consuming for the large size of images.

References
[1] Y.Chen Cheating in visual cryptography in visual cryptography, IEEE Trans.
Image Process.21 (7) (2012), 3319-3323
[2] S.Tedmari, N.A.Najdawi, Noiseless image cryptography algorithm based on
discrete cosine transform, Int.ArabJ.Inform, Techno.9 (5) (2012) 471-478

www.bitm.org.in Volume: 6 No: I February 2017 92 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
[3] S.Tedmari, N.A.Najdawi, Image cryptography algorithm based on the Haar wavelet
transform, Elsevier Inc. Information Sciences 269(2014) 21-34
[4] R. Gonzalez, R. Woods, Digital Image Processing, third ed., Prentice Hall, Upper
Saddle River, 2008.
[5] C. Samson, V. Sastry, A novel image encryption supported by compression using
multilevel wavelet transform, Int. J. Adv. Comput. Sci. Appl. 3 (9)(2012) 178183.
[6] Ch.-H.Lin, T.-H.Chen, Ch.-S.Wu, A batch image encryption scheme based on
chaining random grids, ScientiaIranica D (2013) 20 (3), 670681
[7] A.Kanso,M.Gheblel A novel image encryption algorithm based on a 3D chaotic
map, Elsevier Commun. Nonlinear Sci.NumerSimul. 17(7)(2012) 2943-2959
[8] K. Sakthidasan@Sankaran and B. V. Santhosh Krishna A New Chaotic Algorithm
for Image Encryption and Decryption of Digital Color Images, International Journal
of Information and Education Technology, Vol. 1, No. 2, June 2011
[9] C.E. Shannon Communication theory of secrecy system, journal of Bell Systems
Technology 28(1949) 656-715.
[10] G.R.Chen,Y. Mao,C.Chui, A Symmetric Image encryption scheme based on 3D
Chaotic cat map,Chaos,solitons and Fractals 21 (2004) 749-761.
[11] S.S. Maniccam, N.G. Bourbakis, Lossless image compression and encryption using
SCAN, Elsevier J. Pattern Recognit. 34 (6) (2001) 12291245.
[12] Wang R, Lin C, Lin J. Image hiding by optimal LSB substitution and genetic
algorithm Pattern Recognit 2001; 34(3):67183.
[13] S. Zhang, M. Karim, Color image encryption using double random phase
encoding, J. Microwave Opt. Technol. Lett., 21(5) (1999) 318-323.
[14] Liu S, Chen T, Yao H, Gao W. A variable depth LSB data hiding technique in
images, Proceedings of 2004 international conference on machine learning and
cybernetics, vol. 7. IEEE; 2004. p. 39904.
[15] T.H. Chen, K.C. Li, Multi-image encryption by circular random grids, Elsevier
Inform. Sciences, 18 (2012) 255265.
[16] S. Fateri, R. Enayatifar, A new method for image encryption via standard rules of
CA and logistic map function, Int. J. of Physical Sci., 6(12) (2011) 2921-2926.
[17] X. Xu, J. Feng, Research and Implementation of Image Encryption Algorithm
Based on Zigzag Transformation and Inner Product Polarization Vector, Proc. of
IEEE Int. Conf. on Granular Computing, (2010) 556-561.
[18] N. Sethi, D. Sharma, Novel Method of Image Encryption Using Logistic Mapping,
Int. J. Comput. Sci. Eng.,1(2) (2012) 115-119.
[19] D. Engel, R. Kutil, A. Uhl, A symbolic transform attack on lightweight encryption
based on wavelet lter parameterization, in: Multimedia and Security, ACM, 2006,
pp. 202207
[20] Z. Liu, J. Dai, X. Sun, S. Liu, Triple image encryption scheme in fractional Fourier
transform domains,Elsevier Optics Commun., 282(4) (2009) 518-522.
[21] Wang Z,Bovik A. Sheikh H. Simoncelli E. Image quality assessment: from error
visibility to structural similarity. IEEE Trans Image Process 2004;13(4):600-12.
[22] Yusra A. Y. Al-Najjar, Dr. Der Chen Soong, Comparison of Image Quality
Assessment: PSNR, HVS, SSIM, UIQI, International Journal of Scientific &
Engineering Research, Volume 3, Issue 8, August-2012 ISSN 2229-5518.
[23] R. Ye, A novel chaos-based image encryption scheme with an efficient permutation
diffusion mechanism, Elsevier Opt. Commun. 284 (2011) 52905298.
www.bitm.org.in Volume: 6 No: I February 2017 93 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
[24] F. Sun, Z. Lu, S. Liu, A new cryptosystem based on spatial chaotic system, Elsevier
Opt. Commun. 283 (10) (2010) 20662073.
[25] Yue Wu, Joseph P. Noonan, SosAgaian NPCR and UACI Randomness Tests for
Image Encryption Multidisciplinary Journals in Science and Technology, Journal of
Selected Areas in Telecommunications (JSAT), April Edition, 2011
[26] WenzhongShi ,ChangQing Zhu, Yan Tian, Janet Nichol Wavelet-based image
fusion and quality assessment Elsevier International Journal of Applied Earth
Observation and Geoinformation 6 (2005) 241251
[27] R C Gonzalez, R E Woods, S L.Eddins Digital Image Processing Using MATLAB
T.Srinivasa Rao, BEC, Bapatla.
[28] T A. Davis,KSigmon,MATLAB Primer Seventh Edition, CHAPMAN &
HALL/CRC, A CRC Press Company, Boca Raton London New York Washington,
D.C
[29] William Stallings, Cryptography and Network Security, Principles and Practice,
Third edition, Pearson, 2003
[30] A Kumar, A Makur, Lossy compression of encrypted image by compressing sensing
technique, in Proceedings of the IEEE Region 10 Conference.(TENCON 2009),
2009, pp. 16

www.bitm.org.in Volume: 6 No: I February 2017 94 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Impedence Estimation for Channel Estimation


through OFDM Method for PLC
Debprasad Sinha1, Vipin Kumar Singh2, Swagata Das3
1,3
Assistant Professor, 2M. Tech Student, Department of Electronics & Communication
Engineering
Bengal institute of Technology & Management, Santiniketan

Abstract
With the approach of latest Communication technologies, there are such an outsized
range of enhancements has been placed. Further the channel from that the
Communication knowledge sends are thus very important and therefore the technique
used is likewise exceptionally basic a part of the specialized development within the line
of Communication. This research work can show an influence line Communication and
therefore the strategy used to it. Orthogonal frequency division multiplexing (OFDM) is
one key technology most used so OFDM based system is the fundamental center of this
paper.Details of PLC communication model is given in this paper. It's channel line
device, and therefore the rising plan for communication and which may be engineered up
effectively and existing wiring of power. In this research paper we estimate the
impedence and channel for broadband PLC. PLC as of currently provides a medium to
broadband net network and observant management capacities for each business enterprise
and houses. The electric resistance mismatching is taken into account and, with the
channel model, are calculable at the receiver. Completely different schemes were
simulated to check the bit error rate (BER) for various impulsive noise parameters. More
results indicate that the projected approach enhances the transmission throughput
provides higher performance for impulsive noise, and will increase the efficiency of the
PLC system as a whole.
Key words: Power Line Communication, OFDM, impulsive noise, CAZAC, Zimer model,
Channel and impedance estimation

1. INTRODUCTION

The majority of us have a wirelessnetwork in our homes to empower us to appreciate


liberated access to the web and share data between two PCs and network peripherals like
printers. Most as of late, the pattern towards using so as to associate home stimulation
devices, Ethernet ports to interface with TVs, Blu-beam players and gaming devices has
expanded in like manner spot. Kaspersky Labs appraise that the present number of the
UK's homes with a wireless LAN introduced is around 57 for every penny. Ofcom
gauges that 1.5 million family units (out of an aggregate of roughly 22 million families)
have sent Power Line Technology to associate them. The most intriguing angle in regards
to PLC is the capacity to utilize existing system for sign transmission and lessening
sending costs. Up to this point, the most concerning issue for PLC was low separation

www.bitm.org.in Volume: 6 No: I February 2017 95 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
scope and low data rate was eliminated with the presentation of the new
standard.PLCtechnologies are mostly characterized into two; narrowband and broadband
depending upon the frequency band of operation. Broadband PLC works the frequency
range between 1MHz to 300 MHz. Narrowband PLC works in the frequency range
between 3 kHz to 500 kHz. The PLC organizes likewise shape some portion of
neighborhood arrangements [Berger 2013] [Ferreira 1996]. Be that as it may, the PLC
channel is a threatening domain for use as a Communications channel. This is principally
in light of the fact that the attributes of channels are exceedingly changing with
frequency, time, burdens and topology. The channel is likewise tormented with various
sources of noise which are harder to successfully portray parametrically. The primary
sorts of noise in PLC include foundation noise, narrowband impedance and impulsenoise.
Likewise the sign is constructed as it exchange the channel from the transmitter to the
recipient. This lessening is basically ruled by frequency specific blurring. The best
possible decision of tweak strategies, channel estimation networks, and impedance
befuddling revision techniques for the PLC channel is a prickly issue [Berger 2013],
[Ferreira 1996] [Zwane 2014], [Lazaropoulos 2012], [Zimmermann 2002], [Mulangu
2011] and [Mulangu 2012]. The greatest danger to PLC execution is noise; and
impulsivenoise is the most prevailing. This noise and its effect on the execution of
aadaptive OFDM based system is the fundamental center of this paper.

1.1 Two-port models

Using the formulae presented, it is possible to derive a two-port model for the line.
Consider the circuit in figure 1. It can be made to represent a stub-less transmission line
were 0 is the near end and 1 is the far end.

Fig. 1 A two-port network circuit with the indication of the current and voltage signals.

This circuit can be represented by a two-port network, using the hybrid parameters as The
hybrid parameters were chosen because they have a simple physical connection. Note
that the inverse of the matrix is itself. Considering a frequency dependent attenuation as
in the Zimmermann model results in the following model.

------------------------------------(1)

---------(2)

www.bitm.org.in Volume: 6 No: I February 2017 96 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

------(3)

---------------------(4)

------(5)

1.2 Power Line Communication:


PLC is an economical and practically implementable technology that provides often high
speed internet access while consuming less power. It also provides utility applications
such as vehicle data communication, advance metering in real time of energy pricing
control, peak shaving, monitoring, distributed energy generating, traffic light and street
light control and other municipal applications. This technology has been also used for
smart grid application.
A PLC system consists of a broadband and narrowband communication. Broadband PLC
provides faster internet access and supports small Local area networking [1], while
narrowband serves specific applications such as central management of power
consumption, remote meter reading, commanding and many more. The primary
differences between narrowband (low speed) and broadband (high speed) PLC are
bandwidth and carrier frequency. Narrow band PLC uses carrier frequencies lower than
500 KHz, which have higher noise. While the broadband PLC is used in higher
frequency, which have lower noises in comparison to lower frequencies. The higher
frequency range improves the data rate for transmissions over longer distances. In figure
1.1 it shows the transfer characteristics of the power line channel. In this figure we have
shown that high frequency has lower noise. For the purpose of understanding PLC it can
be broadly viewed as:
1. Narrowband PLC
2. Broadband PLC

Fig 1.1- transfer characteristics of the power line channel

I. Impulsive Noise
www.bitm.org.in Volume: 6 No: I February 2017 97 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527

Impulsivenoise is the most worsttype of noise in PLC channels. It is basicly brought


about by the exchanging ON/OFF of power apparatuses or issues in the network. It is
arranged into three principle classifications [Zimmermann 2002]:

1-Impulsive noise that is synchronous with the mains frequency and is occasional: This
sort of impulsivenoise is cyclostationary and is synchronous with the mains frequency. It
is created by silicon controlled rectifiers in various power supplies.

2-Impulsive noise that is occasional yet offbeat with the mains frequency: This
classification of impulsivenoise is created by intermittent driving powers whose
redundancy rates are between 50 to 200 kHz.

Low Data Rate Medium Data Rate High Data Rate

Data Rate 0-10 kbps 10 kbps >1 Mbps

Modulation BPSK,FSK,SPSK,QAM PSK+OFDM PSK+OFDM

Standard IEC 61334, ANSI/EIA Prime,G3, P1901.2 IEEE 1901

Frequency Range Upto 50 KHz Upto 500 KHz 1 to 100 MHz

Application Control and Command Control and Broadband, home


Command, voice networking

Table 1.1 PLC technology classification on the basis of data rate

1.3 PLC Technology

PLC is like other communication technology where a sender modulates sent the data, it
injects onto medium, and the receiver de-modulates the data to read. The major
difference is that PLC does not need any extra cabling and it re-uses existing wiring.
Considering with pervasiveness of power lines. So, the PLC is virtually in all line. The
powered devices can be controlled or monitored. When we discuss about the
communication technology, it is often useful to refer to the 7-layer of OSI model. Some
PLC chips can implement only in the Physical Layer of the OSI model while others
integrate in all seven layers. One could use as a Digital Signal Processor (DSP) with a
pure software realization of MAC, PHY circuit or an optimized System-on-Chip (SoC)
solution, which includes the complete PLC like MAC and PHY. The Cypress
CY8CPLCXX series is an example of the latter with a ready-to-use Physical and
Network layer and a user-programmable application layer. Before moving to the
applications of PLC we lets first understand the various aspects of the Physical layer by
viewing it as three segments on the basis of data rate.

www.bitm.org.in Volume: 6 No: I February 2017 98 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
2. Network Model

For a making of the complete PLC Communicationsystem, there is important to make a


model of channels and in addition noise model and a transmitter and a collector model.
The complete PLC model will be made for specific models. There will be possible to
make examination of a solid powerline taking into account the reproductions of this
system with different models of lines. The examination will be possible to judge in term
of probability to utilizing of different mixes of PLC technologies, securities exchange,
tweaks and so on. So that there will be gotten to best parameters of data move in
specified systems. It is important to make the channel models for the PLC simulation.
There are more potential outcomes of powerline model making. In the first place of them
is the powerline model as environment with multipath signal engendering. The
parameters of this line are gotten from an appropriation network topology or taking into
account metering. Second of them is model, which applies anchor parameter lattices to
portraying the connection in the middle of data and yield voltage and current by two-port
network.
In configuration of PLC system, it is important to manage personality a main priority the
character of transmission medium and impedances which the PLC Communication is
affected. It is important to discover useable gatekeeper interim, tweak procedure and
encryption to guarantee of security and bonehead evidence Communication with littlest
error rate between data source and recipient. The PLC Communicationsystem is possible
to partition to specific parts for impulse behind displaying:
1-PLC Communication model
2-Models of powerlines,
3-Noise model.

A. The Proposed PLC communication model

The model of PLC Communication is made by a transmitter, recipient and channel block.
It serves for a making of a source and destination of dataCommunication for consequent
simulations of the line model which they are replaced by a blockby channel. The basic
PLC Communication model with OFDM system is appeared in the Fig.1

www.bitm.org.in Volume: 6 No: I February 2017 99 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Figure 1: The Proposed OFDM based PLC network.

The control block is utilized just to enable or incapacitating a few functionalities of the
system, similar to the estimation/evening out plan, the begin block is capable of creating
the arbitrary stream of bits and selecting the corresponding mapping in every sub-
transporter concerning the SNRs evaluated by the channel estimation block. No error
redressing code is utilized which as a part of expansion to an interleave can enhance the
exhibitions introduced underneath. A lot of images is comingbecause of the mapping; this
serial data got is changed over to parallel and the pilots are added which are important to
include to the transmission in the event of persistent channel estimation. The estimation
of the divert in an OFDM system asks for an embeddings of known images or a pilot
structure to the OFDM signal. The quantity of parallel streams coming about because of
the data and pilots ought to match to the quantity of transporters. IFFT block changes
data from frequency to time area. A secure interim is utilized as a part of OFDM to
forestall of ISI (bury image obstruction). A cyclic prefix (CP) is made by a couple of the
last specimens of OFDM images. CP makes an ensure interim between adjoining moved
OFDM images in the time range. This is a path how to keep orthogonally conveys. Once
more, the parallel streams are changed over into serial, and an insertion channel is
utilized to change over the advanced sign into simple to be unconverted by the modulator
to a specific transporter frequency, here, fc = 46.5 MHz

Figure 2 shows the power spectral density of the transmitted signals. The variety in the
powerspectral exhibited in Fig.2 is because of the diverse spectral of mapping, so
distinctive powerspectral, utilized as a part of the transmitted sign.

www.bitm.org.in Volume: 6 No: I February 2017 100 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Figure 2: Generating Basic Signals

After the channel which is considered as a multipath divert notwithstanding the noise
sources included, the beneficiary's blocks will do the backwards work of the transmitter's
blocks. So the demodulator will down-proselyte the sign into baseband, and the
obliteration channel is utilized to digitize the sign. The cyclic prefix is evacuated and the
sign is changed infrequency space. The most basicblocks here are: the line impedance
estimation, the channel estimation, and the adjustment and recognition blocks.

The line impedance estimation block works just in the main channel use, where all the
data sent from the transmitter are known at the recipient and utilized for this estimation.
This block is spoken to in Fig. 3, it is exceptionally straightforward where we ought to
make a specific division with the known data (Training) and after that a normal is done to
get the impedance evaluated on every sub-carrier. These impedances are forward to the
channel estimation block and the balance and identification obstruct for the following
channel use.

Figure 3: The block diagram of impedance estimation.

For the second channel utilize, the impedance estimator will be stopped and the channel
estimator block and the equalizer block can work typically beginning from this second
channel use until the end of the association. In this time, the sign contains data data and a
little preparing arrangement utilized by the divert estimator spoke to in Fig. 4.

www.bitm.org.in Volume: 6 No: I February 2017 101 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
The channel estimation block is capable of evaluating the channel taps and assessing the
SNR on every sub-carrier. The estimation of the channel taps is done just by doing a
division between the known preparing grouping and the comparing got arrangement,
since we work here in the frequency space. For the SNRs estimation, we are commit to
work in every sub-carrier attempting to discrete the noise from the craved flag, and
register the power of sought sign isolated by the power of the assessed noise. When we
acquire these SNRs, they will be sent back to the transmitter and spared at the collector
for the following use, which pick the mapping spectral on each subcarrier in comparing
to the SNRs got and a specific limit picked by the strategy spoke to by S (i) in Fig. 5 and
retained in the begin hinder at the transmitter.

Figure 4: The block diagram of channel estimation

Since we work in the frequency area here after the FFT, so the equalizer's work is
extremely straightforward, it has quite recently to isolate the got grouping by the
evaluated channel (ensure that the assessed direct is in frequency space). The subsequent
succession is than demapping with an alternate de-mapper on every sub-carrier. At last
the bit stream yielded by the de-mapping is contrasted and the irregular bits produced at
the transmitter and the BER is computed.
The transmission rate (or phantom proficiency) of every transmission is fundamentally
controlled by the tweak and channel coding mix. Three primary regulation plan are
considered here: i) Quadrature Phase Shift Keying (QPSK), ii) 16-Quadrature Amplitude
Modulation (16-QAM) and iii) 64-QAM. For every situation, the tweak proficiency is
equivalent to the quantity of bits per image that can be sent. On the off chance that the
channel coding is utilized the productivity is duplicated by the coding rate. By altered
Target BER, which represents application or administration sorts, the base SNR limit is
set to accomplish the sought mapping plan as appeared in the Fig. 5. We note here that
the objective BER decided for those qualities are thought to be equivalent to 10-3,
however all in all it might to take a positive worth depending upon the administration
advertised.

www.bitm.org.in Volume: 6 No: I February 2017 102 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Figure 5: SNR thresholds selection for different mapping

B. PLC Channel and Additive Noise Model

Other than simulation of Communicationsystemcharacterstics, it is important to


distinguish possiblesources of obstruction and noise in light of the fact that the powerline
has a critical lessening of sign and different noises. Accordingly the data exchange has a
high error rate with no checking calculation. The basic impact on data transmission over
powerlines is primarily the negative qualities of powernetworks. These qualities can be
outlined in:

Figure 6: PLC channel model.

1- Mismatched impedance
2- Attenuation on the communication channel
3- Noise and Noise changing in time.
Figure 6 shows a rearranged block model of the PLC channel, in which the depicted
qualities and parameters are included. The parameters of impedance, with the exception
of noise, are spoken to as a period variable direct channel portrayed by the frequency
parameters. Noise is delineated as added substance irregular procedure. This model
catches the entire scope of parameters which are important for a model of the
Communicationsystem with correspondence qualities, despite the fact that this model is
schematically streamlined in the figure. The impulse reaction of the direct channel and
the noise can be either evaluated from the estimation or got from the hypothetical
investigation. Here, they are figured by an immense number of estimations and the
www.bitm.org.in Volume: 6 No: I February 2017 103 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
normal of every taken estimation is considered as a delegate model for the straight
channel and the summation of various sort of noise introduced in Fig. 6. The impulse
reaction and the frequency reaction of the direct channel are spoken to in Fig.7 and figure
8 shows a one shot time area estimation of the noise considered here.

Figure 7: Magnitude Response of Digital Filter

Figure 8: Impulse response of Digital Filter

3. Simulation Result
Simulation is done in MATLAB. The info data is randomly created at the transmitted
end. The preparation grouping i.e. Constant Amplitude Zero Autocorrelation (CAZAC)
succession as appeared in figure is utilized for casing era which is one kind of poly stage
codes and has numerous applications in channel estimation and time synchronization,
since it has great intermittent connection properties.

www.bitm.org.in Volume: 6 No: I February 2017 104 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Fig.9 Training sequence

The one possible approach to see the impact of Interference is through constellation
grouping chart. Consequently the impact of obstruction to the images is simulated in
constellation grouping graph for QAM .It can be seen that the more the separation of the
sign/noise proportion (SNR) is diminished the more the images are dispersed in the
heavenly body outline.

Fig. 11 Transmitter Constellation diagram for 1024-QAM

www.bitm.org.in Volume: 6 No: I February 2017 105 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Fig. 12 Receiver Constellation diagram for 1024-QAM

OFDM modulation gives good performance in communication channel with harsh


characteristics. So the input coded data is modulated using OFDM modulation technique.
The OFDM data is transmitted through the PLC channel which contains periodic
impulsive noise. Fig. 13 shows the PSD of noise.

Fig.13 PSD of Noise

The Line impedances which is best suited for Power line communication is estimated and
shown in Fig. 14 & 15. These impedances are forward to the channel estimation block.
The Channel estimation is done before FFT, which improves BER performance of the
PLC network.

www.bitm.org.in Volume: 6 No: I February 2017 106 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Fig. 14 Transmitter Impedance

Fig. 15 Receiver Impedance

www.bitm.org.in Volume: 6 No: I February 2017 107 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Fig. 16 Signal/Noise ratio

To assess the proposed system, we ascertained the BER of PLCnetwork .Bit Error Rate
(BER) of the PLC system increments with expansion in noise meddled with the OFDM
data. The bit error rate (BER) is the rate of bits that have errors in respect to the aggregate
number of bits got. Fig.5.10 shows the BER of the PLC system with QPSK, 16QAM,
64QAM, 256QAM, 1024QAM and Proposed model. Bit error rate diminishes as vitality
per bit is expanded. The BER of proposed model is 10^-3 at 23dB SNR which is near
1024 QAM.

Fig 17 Response of FIR Interpolation Filter

www.bitm.org.in Volume: 6 No: I February 2017 108 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Fig 18 Response of Digital Channel estimation Filter

Figure 19 Impulses Response of digital channel estimation filter

In figure 20 compare BER graph with different types of modulation plans with proposed
model. MATLAB BER tool is used for trace these curve.

www.bitm.org.in Volume: 6 No: I February 2017 109 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Fig. 20 BER comparison on Eb/N0 for different modulation in OFDM network

Fig 21 Final out put on PLC Model

4. Conclusion and Future Work

We manage configuration of the PLC Communication system model. The model is made
out of the OFDM Communication show, the model of power lines and noise model. The
impedance crisscrossing is considered and, with the channel model, is assessed at the
collector. Distinctive plan was mimicked to think about the bit error rate (BER) .The
reproduction model of the PLC-OFDM system connects well with run of the mill
www.bitm.org.in Volume: 6 No: I February 2017 110 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
pragmatic systems. The error revision code is not utilized here. In the future work, we
will plan a correspondence channel code which will be adapted and particularly to this
application. The results of reproductions taking into account the model will be contrasted
and estimations future work.
REFERENCES

[1] [Mlynek 2008] P. Mlynek, J. Misurec, M. Koutny, "The communication unit for
wireless data acquisition via theInternet, In Proceedings of the 7th
WSEASInternational Conference on Circuits, networks, power, control and
signal processing (CSES'08). Puerto de La Cruz, Spain: WSEAS Press, 2008.
[2] [Achmad 2007] R. Achmad, U. Agung, F. Tetsuo, K. Hidehiro,Y. T. Kyaw, U.
Yoshiyori, U. Yuki, U. Yosuke , WirelessLAN and power line communication
platform for e-learning multichannelnetwork in underdeveloped area in Lombok
island, in 6th WSEAS Int. Conf. on Power,Hardware, Wireless and Optical
Communications, pages 2328, 2007.
[3] [Koinakis 2009] C. J. Koinakis, J. K. Sakellaris, Integration of building
envelope and services via control technologies, in Proceedings of the 13th
WSEAS international Conference on Networks, Rodos, Greece, July 22 - 24,
2009.
[4] [Orgon 2007] M. Orgon, PLC/BPL and Next Generation Networks, in
POWERCOM - Conference Communication over MV and LV power lines,
Praha, 2007.
[5] [Berger 2013] L. T. Berger, A. Schwager, and J. J. Escudero-Garzas, Power
line communications for smart grid applications, Journal of Power and
ComputerEngineering, Vol. 2013, Article 712376, 16 pages, 2013.
[6] [Ferreira 1996] H. C. Ferreira, et al., Power line communications: An
overview, IEEE AFRICON 1996,558-563, Stellenbosch, September 24-27,
1996.
[7] [Zwane 2014] F. Zwane, and T. J. Afullo, An alternative approach in power
line communication channel modeling, Progress In Electromagnetics Research
C,Vol. 47, 85-93, 2014.
[8] [Lazaropoulos 2012] A. G. Lazaropoulos, Broadband transmission
characteristics of overhead high-voltage power line communication channels,
Progress In
[9] Electromagnetics Research B, Vol. 36, 373-398, 2012.
[10] [Zimmermann 2002] M. Zimmermann, and K. Dostert, A multipath model for
the power line channel, IEEETransactions on Communications, Vol. 50, No. 4,
553-559, April 2002.
[11] [Mulangu 2011] C. T. Mulangu, T. J. Afullo, and N. M. Ijumba, Modelling of
broadband power line communication channels, SAIEE, Vol. 102, No. 4, 107-
112, December 2011.
[12] [Mulangu 2012] C. T. Mulangu, T. J. Afullo, and N. M. Ijumba,Estimation of
specific attenuation due to scattering points for broadband PLC channels,
PIERS
[13] Proceedings, Kuala Lumpur, Malaysia, 92-96, March 27-30, 2012.

www.bitm.org.in Volume: 6 No: I February 2017 111 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
[14] [Zimmermann 2002] M. Zimmermann, and K. Dostert,Analysis and
modeling of impulsive noise in broad-band powerline communications, IEEE
Transactions onElectromagnetic Compatibility, Vol. 44, No. 1, 249-258,
November 2002.
[15] [Zimmermann 2000] M. Zimmermann, and K. Dostert,Analysis of the
broadband noise scenario in powerline networks, Proc. of ISPLC, 131-138,
2000.

www.bitm.org.in Volume: 6 No: I February 2017 112 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Guardian Response Mapping to CRM System:


An Empirical Study Conducted in a Private
Institution in West Bengal
Bratin Maiti1, Madhurima Banerjee2
1,2
The Heritage Academy
Maulana Abul Kalam Azad University of Technology
Chowbaga Road, Anandapur, Kolkata 700107 Kolkata, India

ABSTRACT
Serving customers is the key essence of any business. To understand and provide
standard service to the customers, every business is trying to exploit the customer
resource management system. With advent of technology, software based CRM systems
are getting readily available in the market.
This paper analyses the education sector, which is a prime business sector as of today
where students and their parents, both form a part of customer base.
In todays education sector, student attrition is a major problem faced by the education
providers. In this paper we have considered the proposed success mantra of Kristopher
Krost and how private institutes are trying to help the attrition problem.
This paper considers the guardian customers of the institute and analyzes their responses
to comprehend the condition of the student customers, whom the institute holds the risk
of losing.
Keywords: customers, education sector, resource management, problems, attrition rate

INTRODUCTION
Every business grows with its customers. The relationship between business and
customers can be stated in a single statement as follows: No Customer, No Business.
Thus customer is an essential and non compromisable aspect of any business.
Therefore, while developing and maintaining business, acquiring new customers and
maintaining relationship with older customers are a mammoth task.
Customer relationship management (CRM) deals with managing customer base for a
business. Using CRM, business houses collect and maintain data about its customers.
This data is then analyzed and compiled to understand the requirements of the
customers and how customers can be served better by the business.
In a case study The importance of excellent customer service undertaken by
Portakabin group, following diagram has been used to show the importance of
[1]
customer satisfaction :

www.bitm.org.in Volume: 6 No: I February 2017 113 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

From the above diagram, it is clear that business revolves round customer satisfaction.

In current scenario, education sector is getting marked as service industry where students
are the most crucial and important customers. The term customers may sound
disturbing when referring to students in education sector. Faculty members may feel that
considering students as customers might weaken the pillars of discipline, respect,
courtesy and faith that exists between the preacher and the preached. However, colleges
and Universities are covered under Consumer Protection Law and thus, education falls in
the ambit of service of the Consumer protection Act. Since students pay fees for
education, they become the consumer of the education sector [2].
While expanding the scope of Consumer Law, National Commission stated that
imparting education falls within the ambit of service as defined under CPA. It was held
that fees are paid for services and thus by paying fees, any student becomes a consumer
when he/she attends an educational institution & hires the services of that institution for
attending classes and writing examinations. The educational Institute becomes service
provider on accepting the fees from him/her [2].
Kristopher Krost, an expert CRM Manager, United States in summary of CRM on
universities has stated that the major problem that troubles public and private universities
is student attrition. His article further states that many institutions are referring to student
data that include: attendance, grade, assignment completion, class participation etc., to
help the institute comprehend the shortcomings and intervene early using technology
available in many higher education CRM systems. Kristopher Krost has coined the term
at-risk for students whose performance are weak and bears a chance of leaving the
institute [3].

According to Kristopher Krost, The process of maximizing the success of enrolled


students can be summarized as the Three Is [3]: 1) Identify
2) Intervene 3) Improve

According to Kristopher Krost, the first I is to identify the at-risk students. This
can be done by maintaining database of the students, manually or using software CRM
tool. Data about the attendance of the student, performance in examinations, and
active participation in institution level activities can help the institute to judge whether
the institute holds the risk of losing the student. Some of the parameters that marks a
student as at risk students are:
www.bitm.org.in Volume: 6 No: I February 2017 114 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
1. Decreasing attendance
2. Decreasing academic performance
3. Adverse in positive attitude towards the institute or faculty members.
Though above reasons mark a student as one losing interest in the pursuing course, yet
the reasons are not exhaustive or watertight.
After identification of at-risk students, comes the crucial and critical task of
intervention by the institute. Intervention is the process or steps that the institute
follows to curtail the chance of losing the student and arrest student attrition.
The process of intervention leads to handling the problems of the at-risk students and
converting them into stable customers.

1. OBJECTIVES OF THE STUDY


1. To study the perception of the education institutes towards the utilization and
benefits of CRM for managing their students and student information.
2. To study the effect of implementation of the system of customer relationship from
the point of view of the guardians.
3. To analyze the responses of the interested guardians to understand the state of the
at-risk students from their perspective.
4. To analyze the possible reason for guardians to be disinterested in the CRM system.

2. RESEARCH METHODOLOGY

This study started as an exploratory study that eventually led to the descriptive cross-
sectional study focusing on understanding the education sector as an industry, to study
the need for using CRM tools for increasing the number of students in the institute.
The primary data has been collected using a questionnaire. The questionnaire contained
both close ended and open ended questions.
For our research, we have collected data from 478 respondents from a private college in
Kolkata, West Bengal. The secondary data has been collected using different published
and non-published papers & electronic sources and websites as given in the references.
2.1 Sampling Plan
The data has been collected from a college in Kolkata, West Bengal. The data has been
collected through questionnaire from 478 respondents.
2.2 Sampling method
The respondents were the guardians and students of a private college and they were
selected by convenience and non-random sampling; i.e. only those guardians who were
willing to respond to the questionnaire were selected. The sample size selected was 478,
out of which 290 were students and rest were guardians.

3. DATA ANALYSIS
In our study, we have used simple tabulation, pie chart for the analysis of data. We have
analyzed the respondents feedback on each question in the tables below and have
depicted the summary of responses of the respondents.
TABLE 1: Frequency Table
www.bitm.org.in Volume: 6 No: I February 2017 115 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527

Total Number of Students: 290

Number of Management Students: 107

Number of Technical Students: 183

Figure 3: Pie Chart Showing the Number of Students

Number of Students
Managem
ent Management
Technical 37% Technical
63%

Interpretation: 37% of the students belonged to management discipline and 63% of the
students belonged to technical discipline.
TABLE 2: Stream wise Frequency Table
Do you think this intervention will help you to improve your performance in college?

Stream Number of Agree Number of Percentage of Students


Students Students Stream-wise

Management 107 Yes 91 85

No 16 15

Technical 183 Yes 159 87

No 24 13

Figure 4: Pie Chart Showing Stream wise Frequency-Management

Management Students on
Whether They Think
15% Yes
85% No

Interpretation: 85% of the management students agreed that intervention system has
helped them to improve their performance in college, whereas 15% of the management
students felt that intervention system does not have any effect on their performance in
college.
www.bitm.org.in Volume: 6 No: I February 2017 116 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
Figure 5: Pie Chart Showing Stream wise Frequency-Technical

Technical Students on
Whether They Think that
13% Yes
87% No

Interpretation: 87% of the technical students agreed that intervention system helped them
to improve their performance in college, whereas 13% of the technical students felt that
intervention system does not have any effect on their performance in college.
All the students agreed that intervention system does exist in the institute, but the institute
is using a non automated, non software based CRM system.
Analyzing the response of the surveyed students, the following intervention ways were
inferred:
1. Regular monitoring of the attendance of the students
2. Regular monitoring of the students on performance paradigm in examination
and college activities
3. Regular communication to the guardians about the performance of the irregular
students.
TABLE 3: Intervention Result
Average number written communication with guardian of at-risk as student : 46

Average number telephonic communication with guardian of at-risk as student : 142

Average number of positive response from the parents: 109

Average number of no response and negative response from the parents: 80

Number of positive parents who lose interest in the intervention: 25

Figure 4: Pie Chart Showing Communication Process

Classification of
Students
Written
9%
26%
65% Communicati
on

Interpretation: Considering the total capacity of students in the institute, in average out of
the total, 35% of the students were identified every month as at-risk students and their
guardians were communicated regarding their low performance or degrading

www.bitm.org.in Volume: 6 No: I February 2017 117 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
performance. 46, i.e., 9% of the guardians had been communicated in writing and 142,
i.e., 26% of guardians had been telephoned.

Figure 5: Pie Chart Showing Guardian Response

Guardian Response
Guardian with
42%
58% positive
response
Interpretation: 58% of the guardians took this intervention positively and acted readily on
the issues faced by their wards. 42% of the guardians either did not respond to the
communication from the institute or were oblivious of performance of their wards in the
institute.
TABLE 4: Response from Interested Guardians
Possible reasons for being At-Risk student

Students Addiction to newest digital technologies 42

Disobedience towards guardians 57

Out station students being beyond the supervision of the guardians 10

Figure 6: Pie Chart Analyzing Guardian Response

Possible reasons for


Students
9% Addiction to
39%
52% newest digital
technologies

Considering the responses of the guardians, who wanted to focus on the betterment of
their wards and took the initiative from the institute seriously, brought to light the
following reasons in the socio-economic silhouette which are transforming their wards to
at-risk students.
39% of the guardians felt that their ward is addicted to the newest technical gadget which
hinders their seriousness towards their course.
9% of the students were from out station, and guardians felt that they have lost their
control on their wards.
52% of the guardians felt that the students in the current sociological scenario is
becoming disobedient towards their parents and thus going beyond their control.

www.bitm.org.in Volume: 6 No: I February 2017 118 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
TABLE 5: Response from Disinterested Guardians
Possible reasons for being disinterested in the CRM system of the college

Parents are too busy to look into the academic progress of the students 34

Only the degree is important, performance does not matter 18

Blind folded love of the parents towards their wards 13

Parents are too consumed in their own personal problems to look into the 8
progress of their kids

Did not care to respond to the call from the institute 7

Figure 7: Pie Chart showing reason for parents for being disinterest in CRM system

Possible reasons for


Parents are too
parents for being
busy to look into
academic progress
11%
18%
46% of the students
25%

The survey has shown that there are few parents who are not interested in the initiative
from the institute. The reason for such behavioral trend from the parents has been
summarized as follows:
46% of the contacted parents have declared that both parents of the student are working
and therefore they are too busy to look into the academic progress of the students.
25% of the parents feel that they are quite well to do and intend to float a self employed
job for their ward and for them the degree is the only requirement, not the academic
performance.
18% of the parents have been found to be too fond of their wards to realize their
shortcomings.
11% of the parents have their own societal and mnage issues and is not interested in the
academic performance of their wards.

2. FINDINGS
From the above study, we find that 85% of the management students and 87% of the
technical students agree that intervention initiative from the institute helps them to
improve their performance in college, whereas 15% of the management students and 13%
of the technical students feel that intervention does not have any effect on their
performance in college. When contacted, 58% of the guardians took this intervention
positively and acted readily on the issues faced by their wards. 42% of the guardians
either did not respond to the communication from the institute or are indifferent towards
the performance of their wards in the institute.

www.bitm.org.in Volume: 6 No: I February 2017 119 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Considering the total capacity of students in the institute 35% of the students are
identified every month as at-risk students and their guardians are communicated
regarding their low performance or degrading performance. 9% of the guardians in
average is communicated in writing 26% of guardians are telephoned.
According to guardian response, 39% of the guardians feel that their ward is addicted to
the newest technical gadget which affects their performance. 9% of the students staying
away from home therefore is beyond the monitoring capability of their guardian. 52% of
the guardians feel that the students in the current sociological scenario are becoming
arrogant thus they start disobeying their parents.
The survey brought to us few parents who are not interested in the initiative from the
institute. The reason for such behavioral trend from the parents has been summarized
where, 46% of the contacted parents have declared themselves as too busy to look into
the academic progress of the students. 25% of the parents are only interested in a
certificate and not the quality of learning.
18% of the parents have been found to be too fond of their wards to realize their
shortcomings.
11% of the parents have their own societal and mnage issues and is not interested in the
academic performance of their wards.

3. CONCLUSIONS
Software based CRM process can be used to maintain student database in an
institute, but for interacting with guardian and students, one to one interactive
method is preferred more. As per the study, students agree that with close
monitoring from the institute, their performance is likely to improve. Most of
the parents are also keen on understanding the position of their wards in the
institute, but there are some sociological issues that are playing part in
converting a student as an at-risk student. Some of the above mentioned
issues might even fall beyond the paradigm of the institute. The study also
shows that the initiative of the institute at creating this interactive CRM
sometimes fail for those students whose parents are themselves entangled in
various problems.

4. LIMITATIONS OF THE STUDY & FUTURE RESEARCH


SCOPE
The present study has a number of limitations which must be acknowledged. The study is
only confined to a private college of Kolkata in West Bengal, India. Since the data used is
primary, therefore it suffers from the limitations of primary data. Due to time constraint,
the sample size is very small. Thus, sample size may not be precisely practicable for the
very large population of India.
For the purpose of the study, a convenience sample of respondents were chosen who
were willing enough to respond and consequently on the basis of the results analyzed, a
generalized inference cannot be drawn which may depict that this result is applicable for
whole of Indian education sector.
www.bitm.org.in Volume: 6 No: I February 2017 120 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527

REFERENCES
[1] Business Case Studies, The importance of excellent customer service, prepared
by Portakabin Group for Business Case Studies
[2] VakilNo1. n.d., Colleges and Universities covered under Consumer
Protection Law, viewed 7 March 2016, from
http://www.vakilno1.com/consumer-protection/colleges-and-universities-
covered-under-consumer-protection-law.html.
[3] Krost, K., n.d., Summary of Customer Relationship Management CRM,
viewed 8 March 2016, from
http://www.12manage.com/forum.asp?TB=customer_relationship_manage
ment&S=50.
[4] Gary B. Grant and Greg Anderson, Customer Relationship Management: A
Vision for Higher Education, 2002
[5] Rigo G.E., et al, 2016, CRM adoption in a higher education institution,
JISTEM: Journal of Information Systems and Technology Management,
April, Vol. 13 Iss: 1
[6] Singh S et al, 2016, CRM in Higher Education in India-A Clinical
Approach, IOSR Journal of Electrical and Electronics Engineering, April,
Vol. 11 Iss: 2, pp 14-18.
[7] 2014-2015 State of CRM Use in Higher Education Report, prepared by The
American Association of Collegiate Registrars and Admissions Officers,
USA.

www.bitm.org.in Volume: 6 No: I February 2017 121 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Calculating Surface Potential and Slope Factor using


Potential Balance Model for Long Channel MOSFET
Arijit Mazumdar1, Payel Halder2, Soumen Mukherjee3, Arpan Deyasi4
Department of Electronics and Communication Engineering
RCC Institute of Information Technology
Kolkata, INDIA
arjit.mazumdar1992@gmail.com1; payelh139@gmail.com2; soumou601@gmail.com3;
deyasi_arpan@yahoo.co.in4

Abstract

Surface potential and slope factor of long channel MOSFET are analytically calculated
by solving Poissons equation. Potential balance model is applied for computation
purpose. Effect of background concentration, relative permittivities and oxide thickness
are varied to analyze the variation as a function of gate voltage. Optimized surface
potential and corresponding slope factor gives the interpretation that proper choice of the
parameters provide reduced surface potential, and peak position of the slope can also be
controlled. Result may be extendable for medium channel MOSFET in power device
applications.
Keyword: Surface Potential, Slope factor, Long channel MOSFET, Background
concentration, Oxide Thickness, Relative permittivity

Introduction

Design of long channel MOSFET for various power electronic applications is not new in
the domain of semiconductor device. However, surface potential calculation is always
considered as one of the ever-important parameter as it reflects the operating condition of
MOSFET. Hence its variation with the applied vertical field indicates the suitability of
the device for communication applications several structural and fabrication parameters
[1] affects its variation and this is better represented by slope factor profile where peak
position reflects the maximum change.

Potential distribution in the depletion region is analytically calculated with self-


consistence [2] for low-dimensional MOSFET. Effect of trap on capacitive performances
is also analyzed [3], and time-dependent solution for surface potential [4] is obtained.
Effect of tunneling is introduced [5] for making compact models, where ultra-thin oxide
layer s considered. Different material layers are included for high temperature operation
with good electrical reliability [6]. For higher surface potential, i.e., at inversion
condition, capacitance effect is also investigated [7] and also at higher frequencies [8].
Impact of surface quantization on device parameters is recently studied [9]. Effect of
high-k dielectric on long channel is also investigated [10]. Role of interfacial layer and its
thickness on the electrical properties [11] are calculated for flatband measurement.

www.bitm.org.in Volume: 6 No: I February 2017 122 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
In the present paper, surface potential and slope factor are calculated for long channel
MOSFET using potential balance model. The results are suitable for power device
applications.

Mathematical Modeling

For analysis purpose, we consider that charges are not present inside oxide layer. Hence
Poissons equations given by

d 2 (1)
0
dz 2

Solution of Eq. (1) is given by

( z) C1 z C2 (2)

Applying the appropriate boundary conditions as


at z = 0, (x) = s, which implies C2 = s.
Also, at z = Tox, x = VGB gives C1 = (VGB s)/Tox.
Thus,

VGB s
( z) z s (3)
Tox
Differentiating both sides w.r.t. z for a given s, electric
field variation in the oxide as

VGB s
F ( z) (4)
Tox
As the surface potential is controlled by gate voltage, hence from
practical viewpoint, potential balance equation may be written as

VGB s Vox
(5)
where Vox is the potential drop across the oxide. Further detailed calculation gives

www.bitm.org.in Volume: 6 No: I February 2017 123 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527


Qx ' exp( s / t 1) (s / t )(1 exp( 2 F / t ) exp( 2 F / t ) exp( s / t 1)
VGB s
Cox

Further simplification leads to


0.5 (6)
2q Si N A 2F
VGB s (s t exp s
Cox t

The slope dVGB/ds is an important parameter, as it gives a physical insight about the way
the surface potential varies with the change of gate voltage. The slope factor n is
defined as:

dVGB
n
d s (7)

Differentiating w.r.t. s, we get

1 s 2F
n 1 1 xp (8)
2 s 2F t

s t exp
t

Result and Discussion

www.bitm.org.in Volume: 6 No: I February 2017 124 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Fig. 1: Surface potential with gate voltage for different background concentrations for Si-
SiO2 material composition

Fig. 1 shows the variation of Surface potential (s) with Gate voltage (V GS) for the given
structure for three different background concentrations (N B). From the plot, it may be
observed that for lower values of gate voltage, potential increases almost linearly and for
the given structural parameters, it starts saturating when V GS exceeds 2V. The result is
plotted for four different ranges of s in where the calculation includes effects of body
effect co-efficient. It is seen from the graph that with increase of N B slope decreases in
lower gate voltage region which makes a right shift of the saturation point. This is due to
the fact that higher background concentration increases body effect coefficient which
requires higher gate voltage to make the device in saturation condition.

Fig. 2: Surface potential with gate voltage for different dielectric thicknesses for Si-SiO2
material composition

www.bitm.org.in Volume: 6 No: I February 2017 125 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Fig. 3: Surface potential with gate voltage for different dielectric compositions with
dielectric substrate

Fig. 2 shows the variation of Surface potential (s) with Gate voltage (V GS) for three
different values of Oxide thicknesses (T ox). It is seen from the graph that with increase of
Tox slope decreases in lower gate voltage region which makes a right shift of the
saturation point. This is due to the fact that lower oxide capacitance (Cox= ox/Tox)
increases body effect coefficient which requires higher gate voltage to make the device in
saturation condition.
Fig. 3 shows the variation of Surface potential (s) with Gate voltage (V GS) for three
different dielectric materials (ox). The oxide permittivity we have taken here are for
Silicon dioxide (3.97), Hafnium Dioxide (25) and Zarconium Oxide (40). It is seen from
the graph that with increase of ox slope decreases in lower gate voltage region which
makes a right shift of the saturation point. This is due to the fact that lower oxide
permittivity increases body effect coefficient which requires higher gate voltage to make
the device in saturation condition.

Fig. 4: Surface potential with gate voltage for GaAs substrate/high-k dielectric
composition with different background concentrations

Fig. 4 shows the variation of Surface potential (s) with Gate voltage (VGS) for three
different background concentration (NB) for Hafnium Dioxide (high-k dielectric). It is
seen from the graph that with increase of NB slope decreases in lower gate voltage region
which makes a right shift of the saturation point. This is due to the fact that higher
background concentration increases body effect coefficient which requires higher gate
voltage to make the device in saturation condition.
Fig. 5 shows the variation of Slope Factor (1/n) with Gate Voltage (V GS) for three
different background concentrations (NB). It is seen from the graph that with increase of
NB, slope factor increases rapidly and attains a peak point. With further increase of N B,
the parameter decreases exponentially and becomes negligible.

www.bitm.org.in Volume: 6 No: I February 2017 126 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Fig 5: slope factor with gate voltage for different background concentrations

Fig 6: slope factor with gate voltage for different dielectric materials

Fig. 6 shows the variation of Slope Factor (1/n) with Gate Voltage (V GS) for three
different values of permittivity of oxide (ox).The oxide permittivity we have taken here
are for Silicon dioxide (3.97), Hafnium Dioxide (25) and Zarconium Oxide (40). It is
seen from the graph that with increase of ox, slope factor increases rapidly which makes
a right shift of the saturation point and attains a peak point. With further increase of ox,
the parameter decreases exponentially and becomes negligible.

www.bitm.org.in Volume: 6 No: I February 2017 127 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Fig. 7: Slope factor with gate voltage for different dielectric thicknesses for Si-SiO2
material composition

Fig. 8: Slope factor with gate voltage for GaAs substrate/high-k dielectric composition
with different background concentrations

Fig. 7 shows the variation of Slope Factor (1/n) with Gate Voltage (V GS) for three
different values of Oxide thicknesses (T ox). It is seen from the graph that with increase of
Tox, slope factor increases rapidly and attains a peak point. With further increase of T ox,
the parameter decreases exponentially and becomes negligible.
Fig. 8 shows the variation of Slope Factor (1/n) with Gate Voltage (V GS) for three
different background concentrations (NB). Noted that the semiconductor material we have
taken here is Gallium Arsenide and the dielectric permittivity we have taken here for
Hafnium Dioxide (25). It is seen from the graph that with increase of NB, slope factor
increases rapidly and attains a peak point. With further increase of N B, the parameter
decreases exponentially and becomes negligible.

www.bitm.org.in Volume: 6 No: I February 2017 128 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Conclusion

In this paper, electrical characteristic of Long channel MOSFET using Potential balance
model is studied. Surface potential and slope factor are estimated as a function of gate
voltage. Different parameters like background concentrations, dielectric thicknesses,
dielectric compositions for Si and GaAs substrate and for different substrate dielectric
compositions are varied for optimized result. Result shows that peak point of the slope
factor can be tuned for desired application.

References

[1] Choi, C. Y. Kang, J. R. Se, M. S. Abkar, S. A. Krishna, M. Zhang, H. Kim,


T. Lee, F. Zhu, I. Ok, S. Koveshnikov, J. C. Lee, Fabrication of TaN-gated
Ultra-thin MOSFETs (EOT <1.0 nm) with HfO/sub-2/ using a Novel
Oxygen Scavenging Process for sub 65 nm Application, Symposium on
VLSI Technology, pp. 226-227, 2005.
[2] S. Dasgupta, D. Jain, Self-consistent Solution of 2D-Poisson and
Schrodinger Wave Equation for Nano-metric MOSFET Modeling for
VLSI/ULSI Purposes, Conference on Optoelectronic and Microelectronic
Materials and Devices, pp. 377-380, 2002.
[3] F. P. Heiman, G.Warfield, The Effects of Oxide Traps on the MOS
Capacitance, IEEE Transactions on Electron Devices, vol. 12, pp. 168-178,
1965.
[4] J. Victory, C. C. Mcandrew, K. Gullapali, A Time-Dependent, Surface
Potential based Compact Model for MOS Capacitors, IEEE Electron
Device Letters, vol. 22, pp. 245-247, 2001.
[5] J. C. Ranvarez, M. J. Deen, C. H. Chen, A Review of Gate Tunneling
Current in MOS Devices, Microelectronics Reliability, vol. 46, pp. 1939-
1956, 2006.
[6] S. K. Nandi, S. Chakraborty, M. K. Bera, C. K. Maiti, Structural and
Optical Properties of ZnO Films grown on Silicon and their Applications in
MOS Devices in conjunction with ZrO2 as a Gate Dielectric, Bulletin
Matter Science, vol. 30, pp. 248-256, 2007.
[7] Chaudhry, J. N. Roy, Analytical Modeling of Gate Capacitance of an Ultra
Thin Oxide Mos Capacitor: A Quantum Mechanical Study, Journal of
Electron Devices, vol. 10, pp. 456-463, 2011.
[8] H. Y. Jiang, P. W. Zhang, Model Analysis and Parameter Extraction for
Mos Capacitor including Quantum Mechanical Effects,Journal of
Computational Mathematics, vol.24, pp. 401-411, 2006.
[9] M. Dey, S. Chattopadhyay, Extraction of Exact Layer Thickness of Ultra-
thin Gate Dielectrics in Nanoscaled CMOS under Strong Inversion,
Journal of Semiconductor Technology and Science, vol. 10, pp. 100-106,
2010.
[10] Y. Li, J. W. Lee, T. W. Tang, T. S. Chao, T. F. Lei, S.M. Sze, Numerical
Simulation Of Quantum Effects in High-k Gate Dielectric MOS Structures

www.bitm.org.in Volume: 6 No: I February 2017 129 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
using Quantum Mechanical Models, Computer Physics Communications,
vol. 147, 214-217, 2002.
[11] Chakraborty, Role of Interfacial Layer Thickness on High- Dielectric-
Based MOS Devices, Journal of Advanced Dielectrics, vol. 4,p. 1450023,
2014.

www.bitm.org.in Volume: 6 No: I February 2017 130 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Current and Future Trends in the Hospitality and


Tourism Marketing and Management
Md Kamaruzzaman (Asst.Prof.),
Department of Hospitality & Tourism Management, BITM.
Ph.no. - 9475936082. Email: mdkzaman80@gmail.com.

Abstract
This paper identifies some of the current and future trends affecting the tourism and
hospitality industry, including globalization, guests safety and security, the importance
of offering outstanding services, the new technologies that enhance competitiveness, the
population ageing that impacts directly on tourist demand and the correlation between
price and value. Reference is also made to the trends in the development of tourism
lodgings. Furthermore, the paper attempts to analyze the Indian tourism performance
indicators for the last 10 years and suggest ways out of the recession for the tourism
entrepreneurs. Hospitality industry in India has generated tremendous employment
opportunities and is a big source of foreign exchange for India. As per the planning
commission the hospitality sector is responsible for more jobs per million rupee of
investment than any other sector. This sector provided varieties of jobs which satisfies
unskilled people to specialized one. The govt. of India and the ministry of tourism have
contributed significantly to the development and growth of the industry by providing
various tax incentives, policy measures and other various supports. The suggestions to the
hoteliers include careful analysis of the current and future trends and application of the
proper adaptations, investing in exceptional services and sustainability of their lodging,
as well as utilizing the new technologies, the social networks and they must seek ways to
retain effective, diverse and competent staff. The hospitality industry includes the sectors
like Hotels, Hostels, Motels, Restaurants, Bars, Cafs, Nightclubs, Flight attendant etc.
Key words: employment, India, services, tourism and hospitality, trends.
1. Introduction
Hospitality means providing service to others, as well as demonstrating consistent
excellence and quality. It should also mean profitably providing value at any price level,
while demonstrating your own unique points of distinction. Most of all, hospitality should
be a place, where people can still be exceptional individuals and they can extend their
own personality and style.
The hospitality industry is part of a huge group of companies known as travel and
tourism industry, which provides the necessary or desirable goods and services to
travelers. The hospitality and tourism industries are the largest and fastest-growing
industries in the world.
The travel and tourism industry is composed of five parts: a) the tourism lodgings (hotels,
motels, camps, cruise ships), b) the transportation services (ships, airplanes, trains), c)
food and beverage operations (restaurants, bars, taverns, catering), d) retail stores (gifts,
souvenir, arts/crafts shops) and e) the activities (recreation, educational trips, business,
festivals, sport events).
www.bitm.org.in Volume: 6 No: I February 2017 131 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
The new philosophy in hospitality is that managers are counseling their associates, give
them resources and help them to think for themselves. Do whatever it takes is critical
for success.
For success in service the hospitality operations, among others, should focus on the guest,
emphasize high-touch instead of just high-tech and encourage changes, as well as
innovations
The hospitality industry includes the tourism lodgings, the catering companies, as well as
the food and beverage departments operating within the lodgings.
2. Purpose of the study
The purpose of this study is to identify, analyze, and noted the future trends that has
been done that now related to hospitality and tourism sector. This kind of study will be
helpful to identify both the advancement and some gaps in this field, thus help to
establish a more efficient, effective, and accountable tourism research to support practical
work.
3. Objectives of the study
"In this paper, attempts to analyze the Indian tourism performance indicators for the last
10 years and suggest ways out of the recession for the tourism entrepreneurs. Hospitality
industry in India has generated tremendous employment opportunities and is a big source
of foreign exchange for India. The characteristics of the hospitality industry are:
It is a truly unique and fun workplace and diverse in the scope of responsibilities that
one can attain.
It is an industry with many career options and a source for a respectful income.
Its outstanding dimension is the orientation towards guest satisfaction at ultimate level.
It offers intangible and perishable products (if for example 25 rooms are not sold on a
specific night, their revenues will be lost for ever).
The hospitality businesses make continuous efforts for maintaining a positive image
along with great guest service. It appears that quality service is the basis to industry
success. Thus, those organizations that focus on quality become the leaders for on-going
guest satisfaction, creating loyalty and influencing.

4. Research Methodology: Study analysis:


Current trends in hospitality and tourism:
Globalization: Nowadays, people more than ever travel freely around the world. The
international tourist arrivals from 674 million in 2000, reached the 797 in 2005 (increased
by 18.25%) and the 940 million in 2010 (increase 39.46% in relation to 2000 and
increase 17.94 in relation to 2005). Respectively, the international tourism receipts
(global tourism expenditure) from 475 billion US dollars in 2000, reached the 679 billion
in 2005 (increased by 42.94%) and the 918 billion in 2010 (increased by 93.26% in
relation to 2000).
Safety and security: The industrys concern with security has increased greatly due to
several terrorist attacks worldwide, as well as because of tourists kidnappings, robberies
and assaults. Security of all types of hospitality and tourism operations is critical and
disaster plans should be made for each kind of threat. Personal safety of guests must be
www.bitm.org.in Volume: 6 No: I February 2017 132 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
the first priority (Walker, 2010). Increased security measures exist in all the international
airports and most airline companies have upgraded their security measures by investing
millions of dollars. Moreover, they make plans in order to exceed the requirements of the
airline industry through technology advancements
Diversity: The tourism and hospitality industry is among the most diverse of all
industries in terms of employee population and groups of guests.
Hospitality and tourism present a unique opportunity to understand new cultural
experiences for both employees and the tourists. It is important for the personnel to
understand and appreciate different cultures in order to enhance the nature of their
interactions with tourists of different cultures, religions, races, colours, ages, genders and
sexual orientations.
Service: As global competition and market consumption change the expanding service
sector, quality plays an increasingly essential role in both attracting and retaining service
customers (Helms and Mayo, 2008).
Service quality and the degree of satisfaction derived from service quality are becoming
the most important differentiating factors in almost every hospitality environment
(ONeill and Palmer, 2004). For the hotel industry, the increasing competition and
expansion of unique services and convenience has forced hoteliers to continuously search
for the competitive advantage (ONeill, 2005).
Service is at the top of guests expectations, yet few companies offer exceptional service.
World-class service does not just happen; training is important in delivering the service
that guests have come to expect (Walker, 2010).
Hotels are increasing their investments to improve service quality and the perceived value
for guests, so as to achieve better customer satisfaction and loyalty, thus resulting in
better relationships with each customer (Jones et al., 2009)
Technology: Technology is a driving force of change that presents opportunities for
greater efficiencies and integration for improved guest services.
Technology has become a tourism business activity in development of strategic resources
and is considered as a tool to increase competitiveness. Effective use of information
technology can make significant operational improvements. Advanced software and
communication tools allow enlarging operational efficiency, for example, orders may be
made better, faster and cheaper
Demographic changes: The global population is gradually increasing and many retirees
have the time and money to travel and utilize hospitality services.
According to the United Nations, population ageing is increasingly becoming one of the
most salient social, economic and demographic phenomena of our times.
Price-value: Price and value are significant factors to the more perceptive guests of
today. Customers and their perceptions about price have changed. Guests are resistant to
paying more (instead, they prefer to get more for less) and tourism enterprises should
take measures in order to solve this problem.
The key word today is "value." Value is what you get compared to what you pay
Discussion:
Trends in the development of tourism lodgings:
In the past few years there is a certain trend towards developing green lodgings and an
increasing number of hotels worldwide apply policies friendly to the environment. This is
due to the fact that green hotels not only do save money for the owners but they save
www.bitm.org.in Volume: 6 No: I February 2017 133 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
natural resources as well, by enhancing the biodiversity, while at the same time they
promote environmental conscience to the guests. Another reason for the development of
green hotels is the fact that there are tourists who are environmentally sensitized and
even when they travel, they wish to apply resource saving practices in their everyday life.
Organizations that certify the environmental policies of various enterprises, have
conducted researches realizing that on average a hotel of 150 rooms consumes in one
week, the amount of energy consumed roughly by 1.000 households in one year. The
basic reason is that people in their residences are aware of the water and energy cost, but
in the hotels the increased consumption does not influence the rate to be paid by the
guests. The possibility of increased consumption is interwoven with the offered services
and luxury. However, is there a possibility for the guests to enjoy the luxury of a hotel
without, simultaneously, the environment to be destroyed? There are some technologies,
e.g. of water saving that decrease the operating costs. Researches have shown that the
hotels using modern technologies to save water, consume the one fifth of water per guest
in relation to hotels that do not use them.

Future trends of tourism and hospitality:

Future trends of tourism:


According to the European Tourism: Trends & Prospects, the global visitor growth
forecasts for 2012 and 2013 are as follows:

INBOUND OUTBOUND
2012 2013 2012 2013
WORLD 4.80% 3.90% 5.10% 4.10%
AMERICAS 4.90% 4.30% 5.20% 4.20%
EUROPE 3.90% 3.30% 4.20% 3.90%
ASIA 6.90% 4.70% 7.00% 4.20%
AFRICA 5.10% 4.10% 5.60% 4.80%

MID EAST 4.90% 4.10% 4.80% 4.10%

www.bitm.org.in Volume: 6 No: I February 2017 134 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Short-term global visitor growth forecasts

The above data show that for 2012 Asia is ranked first among all the other continents
concerning the outbound travels (7%). This is mainly owed to the emerging market of
China. For 2013 Africa holds the scepter with 4.8% growth. For both years Europe has
the lowest growth regarding the inbound, as well as the outbound travels.

Future trends of hospitality


The future trends in the hospitality industry can be summarized as follows:
More green and eco-lodgings.
Development of mega hotels (multi-purpose facilities with casino, shops, theatre,
theme park, etc.).
More boutique hotels.
Intelligent hotels with advanced technology using the guests virtual fingerprint in
order to perform all the operations (check-in, charges, check-out, etc.).
Increasing employee salaries in order to retain the existing staff.

ON AN EMPLOYMENT SCALE
Countries expected to generate the largest amount of Travel and Tourism Economy
Employment in 2017 (000 of Jobs):
1. China 75,710
2. India 28,322
3. United States 16,125
4. Japan 9,422
5. Brazil 7,773
6. Indonesia 6,853
7. Mexico 5,469
8. Germany 4,962
9. Spain 4,858
10. Thailand 4,766
Countries expected to generate the largest amount of travel & tourism economy
employment in 2017

5. Findings concerning the Indian tourism and hospitality


The trained manpower available in the tourism industry is insufficient to meet their
increasing needs. The total intake for various tourism related courses offered by
universities / institutes in the State is 1356 per year, which is less than the requirement of
tourism-based industries in the State. Majority of the tourists (50 per cent) belong to the
age between 40 and 60 in both the foreign and domestic categories.

Most of the organizations in the hotel industry (34 per cent) provide induction training for
the newly appointed employees. But another major part of the organizations in the

www.bitm.org.in Volume: 6 No: I February 2017 135 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
industry (29 per cent) do not provide any type of training to their employees. The
remaining organizations provide daily briefing, weekly briefing, monthly briefing and
yearly training to their employees.
Majority of the HR department in hotel industry (42 per cent) report that the absenteeism
of employees in the industry is medium. Among the professionally qualified employees
who are working in the hotel industry, most of them (55.17 per cent) have only Diploma
in Tourism and19.83 per cent have PG Diploma or Degree.
Most of the employees in hotel industry (31.50 per cent) demand more training facilities
in the field of tourism management.
Among the dissatisfied employees in hotel industry, majority of them (92.68 per cent) are
dissatisfied because of the low wages system prevailing in the industry.
6. Conclusions
There is a global increase in tourism and hospitality both in tourist arrivals and tourism
expenditure. The trends that are mostly affecting the industry are: the increased concern
with guests safety and security; the enhanced diversity in the workforce composition; the
importance of outstanding services leading to additional opportunities for increased
revenue; the new technologies which contribute to improved guest services and enhance
competitiveness; the population ageing that impacts directly on tourist demand and the
tourism labor market; and the correlation between price and value which is very
important for the perceptive guests of today.
In the field of tourism lodgings development, the trend is an increasing number of hotels
worldwide applying policies friendly to the environment. The green lodgings not only do
save money for the owners but they save natural resources as well, attracting more and
more guests who are environmentally sensitized.
The future trends in the hospitality industry include more green and eco-lodgings;
development of mega hotels; more boutique hotels; intelligent hotels with advanced
technology; and guests virtual and physical social networks to be the best distribution
channel.

www.bitm.org.in Volume: 6 No: I February 2017 136 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Important Facts About Tourism, 2016

(I)India

No. of Foreign Tourist Arrivals in India 8.03 Million

Annual Growth Rate 4.5%

No. of Indian Nationals Departures from India 20.38 Million

Annual Growth Rate 11.1%

No. of Domestic Tourist Visits to all States/UTs 1432 Million

Annual Growth Rate 11.6%

Foreign Exchange Earnings from Tourism In INR terms 135193 Crore (#2)

Annual Growth Rate 9.6%

In US$ terms US$ 21.07 Billion (#2)

Annual Growth Rate 4.1%

(II) World

No. of International Tourist Arrivals 1184 Million (P)

Annual Growth Rate 4.4%

International Tourism Receipts 1232 US$ Billion (P)

Annual Growth Rate -4.9%

(III) Asia & the Pacific Region

No. of International Tourist Arrivals 278.6 Million (P)

Annual Growth Rate 5.4%

International Tourism Receipts 418.9 US$ Billion (P)

Annual Growth Rate -0.3%

(IV) Indias Position in World

Share of India in International Tourist Arrivals 0.68%

Indias rank in World Tourist Arrivals 40th

Share of India in International Tourism Receipts (US$ terms) 1.71%

Indias rank in World Tourism Receipts 14th

(V) Indias Position in Asia & the Pacific Region

Share of India in International Tourist Arrivals 2.88%

www.bitm.org.in Volume: 6 No: I February 2017 137 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Indias rank in International Tourist Arrivals 11th

Share of India in International Tourism Receipts (US $ terms) 5.03%

Indias rank in International Tourism Receipts 7 th

P : Provisional

#2: Provisionally Revised Estimates (based on final FTA received from BOI).

References

i) Grigoroudis, E & Siskos, Y (2009). Customer Satisfaction Evaluation: Methods


for Measuring and Implementing Service Quality. Springer.
ii) Journal of Hospitality Application and Research.
iii) Krishan.K.Kamra and Mohinder Chand Basics of Tourism Kanishka
Publishers distributors, 2007, ISBN-10:8173916705.
iv) Sunil Sharma, Planning and Development of tourism and hospitality
Rajat publications, Jan2008, ISBN: 10:8178802716
Magazine: Hospitality Express.
Online Reference:
i) www.hospitalitynet.com
ii) www.hotelmarketing.com
iii) www.ehospitalitytimes.com

www.bitm.org.in Volume: 6 No: I February 2017 138 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Explaining Tourists Satisfaction and Intention to


Revisit at Tripura
Nibir Khawash1, Arup Kumar Baksi2
1
Camellia School of Business Administration, Madhyamgram, Kolkata
2
Aliah University, West Bengal, India

Abstract
The purpose of this study is to find out how tourist evaluates the various qualities of
different facets or attributes of a destination image of Tripura, how much they are
satisfied with this destination. This study is trying to find out satisfaction create any
destination loyalty or not. This paper also tries to understand how satisfaction and other
factors (e.g., demographic characteristics, variety seeking) influence destination loyalty
intention to revisit and willingness to recommend to others.The measurement scales used
here were adapted literature review.This study may provide some useful information
about local culture and prospect about tourism markets in Tripura,some strategies for
promoting and improving national and international visitor satisfaction and intentional
loyalty towards Tripura tourism.
Keywords: Destination image, Tourists satisfaction, Intentional loyalty.

Introduction
Tourism is identified as one of the most potentialindustries of Tripura. It not only creates
jobsopportunity, but increased domestic revenue. Within its small geographical area,
Tripura offers plenty of attractions for the tourists in the form of magnificent palaces. The
number of foreign tourists visiting the state grew at a compound annual growth rate
(CAGR) of 50.4 per cent from 2010-11 to 2014-15(IBEF).

Year Domestic tourist Foreign Total Revenue

2008-09 2,45,745 3,410 2,49,155 64.66


2009-10 3,20,931 4,763 3,25,694 106.50

2012-13 3,58,625 7 ,817 3,66,442 168.50


2013-14 3,59,99513,376 3,75,371 189.27

2014-15 3,61,581 29,086 3,90,667 202.4

Source-ECONOMIC REVIEW OF TRIPURA, 2014-15

This was a very low figure if compared to the average growth of the nation. The global
tourism industry has driven into an area of menacing competition, and a fundamental
challenge for marketers is to envision the distinguishing characteristics of tourist
experiences (Perdue, 2002). Towards the tourism industry of Tripura, to survive in the
fierce international environment and compete with the tourism development in the region
the authorities and the Governmentneeds a strong relationship, trying to keep up with the
www.bitm.org.in Volume: 6 No: I February 2017 139 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
development speed of nations which has more progressive in tourism. Therefore, what
motivates do tourists visit/revisit Tripura? In order to meet the competition from other
tourist destinations around the northeast, the tourism industry in Tripura needs to
understand tourists' preferences and motives for choosing Tripura as their visit
alternative. What is their main motivation for visiting Tripura and how do they evaluate
Tripura as a tourist destination? For the tourism industry, it is also important to know if
they intend to return or revisit Tripura and if they recommend this destination to others.
The objective of the study on identifying the destination attributes, and personal
characteristics which influence satisfaction and intentional loyalty of tourists toward
intention to revisit or recommend the destination to others.

Review of literature
Lawson and Baud Bovy, (1977) defined a destination image as the expression of all
knowledge, impressions, prejudices and emotional thoughts an individual or group has a
particular object or place. A Destination image as perceived quality evaluation of a
combination of five different attributes/facets such as environment, infrastructure &
accessibility, culture & social, tourist, leisure& entertainment and local food . The
destination image is not only the perceptions of individual destination attributes, but also
the holistic impression made by the destination (Echtner & Ritchie, 2003). Researchers in
several disciplines and fields agree that the image construct has both perceptual/cognitive
and affective evaluations. Baloglu and McCleary, (1999a, b) and Stern & Krakover,
(1993) show empirically that the affective evaluations have a direct influence on the
overall image.In content of tourism, satisfaction has been recognized to be the outcome
of the comparison between expectations and experiences (Truong & Foster, 2006).
Tourist experiences compared to their expectations result in feelings of gratification, the
tourist is satisfied (Reisinger & Turner, 2003) and leaves that destination with their good
memory. Chon, (1989) examined tourist satisfaction by comparing travelers previous
images of the destination and what they actually see, feel and achieve at the destination.
He reported that tourist satisfaction is the result of the relationship between tourists
expectations about the destination based on their previous images of the destination and
their evaluation of the outcome of their experience at the destination area. Loyalty has
been describing and measures in different ways. Behavioral, attitudinal and compound is
main loyalty perspectives. From a behavioral point of view,we can say that it refers to the
future product or service repeat purchase commitment despite situational influences and
marketing efforts directed at causing changes in behavior (Oliver 1997). When a touristis
satisfied they likely to recommend their friends, relatives or other potential tourists to a
product/service by acting as free word of mouth advertising agents (Shoemaker & Lewis,
1999). The degree of destination loyalty is frequently reflected in tourists intentions to
revisit the destination and in their willingness to recommend it (Chen & Tsai, 2007;
Oppermann, 2000).

Previous studies confirm that satisfaction with a tourist experience contributes positively
to loyalty (Pritchard & Howard, 1997; Oppermann, 2000; Alexandris et al., 2006;
Yuksel, 2007; Chi & Qu, 2008). Some empirical studies showing a relationship between
www.bitm.org.in Volume: 6 No: I February 2017 140 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
satisfaction and perceived or actual behavioral loyalty (not attitudinal) has a moderate to
low relationship (e.g., Mittal & Kamakura, 2001). Although satisfaction does not
guarantee loyalty, it is true that loyal customers are satisfied (Jones & Sasser, 1995).
Satisfaction and loyalty both can evaluate by revisited or by a recommendation to other
consumers (friends and family who are potential tourists) (Pine et. al., 1995; Yoon &
Uysal, 2005). Empirical research shows that tourist satisfaction is a good indicator of
intentions to revisit and recommend to others (Kozak & Rimmington, 2000; Yoon &
Uysal, 2005; San Martin et al., 2008).From a marketing point of view Dept. of Tripura
tourism can understand that satisfaction and loyalty are key to long-term survival
(Nicholls et al., 1998) and the future of any tourism products and services (Gursoy et al.,
2003, 2007). Moreover, according to Day & Crash, (2000); Oh, (2003) considered that
perceived quality and perceived value are these variables which best explain satisfaction
and loyalty. From the literature review, we can identify the first variable is perceived
quality which is influenced by the expectations of the consumer. Parasuraman et al.,
(1985) defined perceived quality as an attitude that results from the comparison of
consumer expectations with the actual performance.Tourism research,/ explained
perceived quality of a holiday destination is a combination of tourists trip experiences
and perceived service received in relation to their expectations of the actual service
performance (Bolton & Drew, 1991). The next variable is perceived value. Woodruff,
(1997) considered that value concepts differ according to the circumstances in which
customers think about the value (i.e., customers could perceive value different before and
after purchase). Perceived value is defined as the consumers overall assessment of the
utility of a product (or service) based on perceptions of what is received (results and
desired benefits) and what is given (money, effort, time) (Zeithaml, 1988). Tripura is
identified as one of the attractive tourism centers of the North-East .Its advantages are
based on unique characteristics and potential such as beautiful scenery, fresh air, fresh
food, so on. In recent years, state tourism department has organized many cultural and
tourism events which attract more tourist in future.

Objective of the study


To find how tourist evaluates the character of different attributes of a destination
image of Tripura, how satisfaction creates loyalty intention which creates revisit
and willingness to recommend to others (friends and relative).
To investigate what image is most important to explain global satisfaction
with visiting Tripura as a preferred destination.
To understand how perceived quality, satisfaction and other motivational or
dismotivational factors (e.g., demographic characteristics and variety seeking)
influence loyalty intention to revisit and willingness to recommend to others.
To understand various strategies for promoting and improving visitor
satisfaction and intentional loyalty of previous and potential tourists visiting
Tripura.

A Conceptual model of this study.


www.bitm.org.in Volume: 6 No: I February 2017 141 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527

The conceptual model of this study source-TRAN THI AI CAM Master Thesis, NOMA
FAME, 2011

Methodology
This survey has been done in Agartala the capital city of Tripura. Because Agartala is one
of the most famous tourist destinations in Tripura. The process of data collection was
divided into two groups. The first group, including 100 questionnaires was delivered to
local hotels, and second group, including 150 questionnaires was given to tourists at
restaurants and coffee bar, where most of the tourists are focused capital city. 250
questionnaires were delivered to tourists at random from 30th March to 10th April, 2016.
201 questionnaires were returned in a usable quality, account for 80.4 % of total given
questionnaires.

Measurement of variables
Travel behavior . The travel behavior was measured by past and present experience of
visitors . The tourists were asked to indicate by nine-point scale, 1 = 1-2 days, 2 = 3-6
days, 3 = 7-10 days, 4 = 11-14 days, 5 = 15-20 days, 6 = 3-5 weeks, 7 = 6-9 weeks, 8 =
10 weeks, 9 = more 10 weeks the level of experience they are familiar with Agartala.

www.bitm.org.in Volume: 6 No: I February 2017 142 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Destination image The 25 items of attributes were adapted from Beerli & Martin, (2004),
Chi & Qu, (2008) and revised to appropriate the characteristics of Tripura. The
attributes/aspects destination were measured using a single 7-point Semantic-differential
type scale, ranged from very bad (1) to very good (7).
Perceived quality In this section was asked to indicate the perceived quality or general
attractiveness (the destination image) of Tripura. A 7-point Semantic-differential scale
was constructed of the five items, based on the work of Walmsley & Jenkins,
(1993).Varying from 1 (dull/ unattractive/ negative/ bad/ distressing) to 7 (exiting/
attractive/ positive/ good/ relaxing).
Satisfaction The scale to measure satisfaction based on Oliver, (1997), Quintal &
Polczynski, (2011) and revised to fit the characteristics of Tripura.Eight items was
measured by a 7 point likart scale, strongly disagree (1) to strongly agree (7).
Intention to revisit itwas evaluated with four items and each of four statements were
using a single 7-point Likert-type scale. This scale ranged from very unlikely (1) to
very likely (7). Its adapted from Oliver, (1997), Kozak & Rimmimgton, (2000).
Recommendation Recommendation the destination to others (friends and relative) are
measured by four items. Each of four statements were using a single 7-point Likert-type
scale. This scale ranged from from strongly disagree (1) to strongly agree (7). Its
adapted from Oliver, (1997), Kozak & Rimmimgton, (2000), Wnag & Hsu, (2010).
Variety seeking To measure the variety seeking, we use a scale of Van Trijp et al.,
(1996). It consists of six items and measured using a single 7-point Likert-type scale
ranged from strongly disagree (1) to strongly agree (7).
Demographic characteristics Based on the result of previous studies, in this study,
demographic characteristics measurement with 5 items, including gender, age, country,
the level of education and incomes.

Data analysis interpretation

Exploratory factor analysis was performed in order to select the most appropriate items
for the confirmatory model: to reduce a set of multivariate observations into a set of
variables (called factors) to make them more meaningful (Hair, 1998). Principal
component analysis (the most common form of factor analysis) was applied with rotation
(varimax) to test the convergent validity and factor loadings of items (Hair et al, 1995).
Bartlett's Test of Sphericity and Kaiser-Meyer-Olkin Measure of Sampling Adequacy
(KMO) are used to determine the factorability of the data (Pallant, 2005). Items of factors
are retained only if a factor loading greater than or equal 0.5, 0.5 =< KMO <= 1). Bartlett
test of sphericity suggests the probability is less than 0.05 (Pallant, 2005). Reliability
analysis for each of the factor was obtained using the calculation of a Cronbach a
coefficient. The value of Cronbachs alpha of 0.6 is the criterion-in-use (Nunnally,
1978; Peterson, 1994).Two-tailed t-test and One-way Analysis of Variance (ANOVA)
were used to identify the mean differences of satisfaction by demographic characteristics
of the respondents and identify the demographic characteristic differences influenced to
loyalty intention to revisit and recommendation. Finally, we used Statistical Package for
Social Sciences (SPSS 16.0) and Amos 16.0 software.

www.bitm.org.in Volume: 6 No: I February 2017 143 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Confirmatory factor analysis and testing of the structural relationships

CFA was used in this study to confirm the convergent validity, discriminate validity and
to test appropriate constructs in the conceptual model in figure. Convergent validity is
tested by the standardized factor loading. Composite reliability and variance extracted a
measure for each construct were calculated via a standardized factor loading and
measurement error for the each indicator (Hair at el, 1995). An acceptable value for
composite reliability is above 0.7 and the variance extracted is exceeded 0.5 (Fornell &
Larcker, 1981 and Hair et al., 1998). Moreover, some indexes will be used to assess
overall model fit (Chen & Chen, 2010). such as: Chi-square (2), 2/d.f ratio, Goodness
of fit index (GFI), Comparative fit index (CFI), Root mean square error of
approximation (RMSEA). The 2/d.f. ratio of less than 5 is used as the common decision
rule of an acceptable overall model fit (Chen & Chen, 2010). Following the
recommendation of Hair et al., (1998), an acceptable model fits are indicated that the
values for Comparative fit index (CFI), and Goodness of fit index (GFI) were greater
than 0.9; values for Root mean square error of approximation (RMSEA) were less than
0.08 represent a moderate fit, while values less than 0.05 are close fit (Browne & Cudeck,
1992). In this study, the author uses the value of Chi-square, 2/d.f. ratio, GFI, CFI and
RMSEA to test the Goodness of Fit of the models. After confirming convergent validity
and discriminant validity by measurement models, Structural Equation Modeling (SEM)
were estimated to test the relationship among constructs.

Discussion and Conclusions

Both the exploratory and confirmatory factor analysis of the structure of destination
image confirmed a five-factor solution: environment, local food, culture & social,
infrastructure & accessibility and tourist leisure & entertainment. In this study, the
tourists reported that they had strongly positive interesting the local food toward visiting
Tripura . Moreover, local food is found to significantly affect on satisfaction with visiting
Tripura a destination . Environment and culture & social are slightly attractiveness to
tourists visiting. Beside that, the causual effect environment and culture & social on
satisfaction are significant. In addition, the findings explore that variety seeking had a
positive influence on satisfaction. This indicates that travellers who want to discover and
find to the variety that they have not experienced yet in their life before.

Implications

Based on the findings of this study, several implications could be made to promote and
increase international tourist satisfaction and intentional loyalty toward recommend to
other and revisit to Tripura. This study has shown that the environment, local food,cuture
& social have a significant relationship with the satisfaction of tourists. This result can be
useful to the tourism planners and marketers focus more on enhancing, improving and
maintaining factors that contribute to tourists satisfaction. For environment, local
authorities and planners should educate citizen to have a sense of protect life environment
and tourism environment; behave to tourists cuturally, friendly and condescending. For

www.bitm.org.in Volume: 6 No: I February 2017 144 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
local food and cuture & social, marketers should extend many kinds of tourism product
such as swim underwater, climb up a mountain, casino, modern dance hall, building
many shopping ward, eating and drinking, music and song place, so on. Especially,
holding common peoples festival, eating and drinking,cultural,festival, classical drama.
Moreover, holding many tours of island tourism and traditional village tourism.
In addition, the findings have indicated that tourist,leisure & entertainment and
infrastructure & accessibilty have not a significant relationship with the tourists
satisfaction. For infrastructure & accessibilty, the marketers may need some effort to
improving in public transport facilities, providing quality service of a hotel; special
events; developing tour with a diversity of activities at night to attract to international
tourists such as singing & dancing, theatres, camps in the countryside or music camps in
ancient houses. It is hoped that these results and this recommendation will be valuable
information to tourism marketers and planners in Tripura in evaluating and giving
marketing strategies and management in the future. Tripura will attract more foreign
tourists and potential tourists from many different countries over the world.

References.
[1] http://www.ibef.org/states/tripura.aspx.
[2] ECONOMIC REVIEW OF TRIPURA, 2014-15.
[3] Alexandris, K., Kouthouris, C. & Meligdis, A. (2006). Increasing customers
loyalty in a skiing resort: the contribution of place attachment and service
quality. International Journal of Contemporary Hospitality Management, 18(5):
414425
[4] Baloglu, S. & McCleary, K. W. (1999a). A model of destination image
formation. Annals of Tourism Research, 26: 868897.
[5] Baloglu, S. & McCleary, K. W. (1999b). US international pleasure travelers
images of four Mediterranean destinations: A comparison of visitors and non
visitors. Journal of Travel Research, 38 (2), 114129.
[6] Beerli, A. & Martin, D. (2004). Factors influencing destination image. Annals of
Tourism Research, Vol. 31, No. 3, pp. 657 681
[7] Bolton, R. N. & Drew, J. H. (1991). A multistage model of customers
assessments of service quality and value. Journal of Consumer Research,
17(March), 375384.
[8] Browne, M. W. & Cudeck, R. (1992). Alternative ways of assessing model fit.
Sociological Methods & Research, 21: 230 -258
[9] Chen, C. & Tsai, D. (2007). How destination image and evaluative factors affect
behavioral intentions? Tourism Management, 28: 11151122.
[10] Chon, K. (1989). Understanding recreational travelers motivation, attitude and
satisfaction. Tourist Review, 44 (1): 3-7.
[11] Chi, C. & Qu, H. (2008). Examining the structural relationship of destination
image, tourist satisfaction and destination loyalty: an integrated approach.
Tourism Management 29(4): 624636.
[12] Chen, C. & Chen, F. (2010). Experience quality, perceived value, satisfaction
and behavioral intentions for heritage tourists. Tourism Management, 31: 2935.

www.bitm.org.in Volume: 6 No: I February 2017 145 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
[13] Day, E. & Crask, M.R. (2000). Value assessment: the antecedent of customer
satisfaction. Journal of Consumer Satisfaction, Dissatisfaction and Complaining
Behaviour, 13: 4250
[14] Echtner, & Brent Ritchie, J.R. (2003). The meaning and measurement of
destination image. The journal of tourism studies, vol. 14, no. 1.
[15] Fornell, C. & Larcker, D. F. (1981), Evaluating Structural Equation Models
with Unobservable Variables and Measurement Error. Journal of Marketing
Research, 18(2): 39-50
[16] Gursoy, D., McCleary, K. W. & Lepsito, L. R. (2007). Propensity to Complain:
Affects of Personality and Behavioral Factors. Journal of Hospitality &
Tourism Research, 31 (3): 358-386.

[17] Gursoy, D., McCleary, K. W. & Lepsito, L. R. (2003). Segmenting Dissatisfied


Restaurant Customers Based on Their Complaining Response Styles. Journal
of Food Service Business Research, 6 (1): 25-44.
[18] Hair, J.F., Anderson, R.E., Tatham, R.L. and William, C.B. (1995). Multivariate
Data Analysis with Readings, Prentice-Hall, Englewood Cliffs, NJ.

[19] Hair, J. F. J., Anderson, R. E., Tatham, R. L. & Black, W. C. (1998).


Multivariate data analysis with readings. Englewood Cliffs, NJ: Prentice-Hall.
[20] Jones, T.O. & Sasser, W.E. (1995). Why satisfied customers defect. Harvard
Business Review, 73(6): 8999.
[21] Kozak, M. & Rimmington, M. (2000). Tourist satisfaction with Mallorca, Spain,
as an off-season holiday destination. Journal of Travel Research, 38(1), 260
269.
[22] Lawson, F. & Baud-Bovy, M. (1977). Tourism and recreational development.
London: Architectural Press.
[23] Mattila, A.S. (2001). The impact of relationship type on soncumer loyalty in a
context of service failure. Journal of Service Research, 4(2): 91101.
[24] Nicholls, J.A.F., Gilbert, G.R. & Roslow, S. (1998). Parsimonious measurement
of customer satisfaction with personal service and the service setting. Journal of
Consumer Marketing, 15(3): 239253.
[25] Nunnally, J. C. (1978). Psychometric theory. New York: McGraw-Hill
[26] Oh, H. (2003). Price fairness and its asymetric effects on overall price, quality
and value judgements: the case of an upscale hotel. Tourism Management, 24:
397399.
[27] Oppermann, M. (2000). Tourism destination loyalty. Journal of Travel Research,
39(1): 7884.
[28] Oliver, R.L. (1997). Satisfaction: A Behavioral Perspective on the Consumer.
New York: McGraw-Hill
[29] Perdue,(2002). The influence of behavioral experience, existing images, and
selected website characteristics. Journal of Travel & Tourism Marketing,
Volume 11, Pages 21 38.
[30] Pritchard, M. & Howard, D.R. (1997). The loyal traveller: examining a typology
of service patronage. Journal of Travel Research 35(4): 210.

www.bitm.org.in Volume: 6 No: I February 2017 146 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
[31] Parasuraman, A., Zeithaml, V. A. & Berry, L. (1985). A conceptual model of
service quality and its implications for future research. Journal of Marketing,
49(4): 4150.
[32] Pine, B. J., Peppers, D. & Rogers, M. (1995). Do you want to keep your
customers forever? Harvard Business Review, March-April, 103-14.
[33] Pallant, J.J. (2005). SPSS survival manual: a step by step guide to data analysis
using SPSS for Windows (Version 12).
[34] Peterson, R. (1994). A meta-analysis of Cronbachs coefficient alpha. Journal of
Consumer Research, 21(2), 381391.
[35] Quintal, V.A. & Polczynski, A. (2011). Factors influencing tourists revisit
intentions. Asia Pacific. Journal of Marketing and Logistics, Vol. 22 No. 4, pp.
554-578.
[36] Reisinger, Y. & Turner, L. W. (2003). Cross-cultural behavior in tourism:
Concepts and analysis. Oxford: Butterworth-Heinemann.
[37] Stern, E. & Krakover, S. (1993). The formation of a composite urban image.
Geographical Analysis, 25(2):130-146.
[38] San Martin, H., Collado, J. & Rodriguez, I. (2008). El proceso global de
satisfaccion bajo multiples estandares de comparacion: el papel moderador de la
familiaridad, la involucracion y la interaccion cliente-servicio. Revista Espanola
de Investigacion de Marketing ESIC, 12(1): 6595.
[39] Shoemaker, S. & Lewis, R. C. (1999). Customer loyalty: the future of hospitality
marketing. International Journal of Hospitality Management, 18, 345370.
[40] Tran,Thi Ai Cam.(2011).Explainin tourist satisfaction and intention to revisit
NHA TRANG, VIET NAM, Master Thesis, NOMA FAME, 2011
[41] Truong & Foster, (2006). Using HOLSAT to evaluate tourist satisfaction at
destinations: The case of Australian holidaymakers in Vietnam. Tourism
Management, 27: 842855.
[42] Van Trijp, H.C.M., Hoyer, W.D. & Inman, J.J. (1996), Why switch? Product-
category level explanations for true variety-seeking behavior. Journal of
Marketing Research, Vol. 33 No. 3, pp. 281-92.
[43] Wnag & Hsu, (2010). The relationships of destination image, satisfaction, and
behavioral intentions: An integrated model. Journal of Travel & Tourism
Marketing, 27: 829843
[44] Walmsley, D. J. & Jenkins, J. M. (1993). Appraisive images of tourist areas:
Application of personal construct. Australian Geographer, 24(2), 113.
[45] Woodruff, R. B. (1997). Customer value: The next source for competitive edge.
Journal of the Academy of Marketing Science, 25(2), 139153.
[46] Yuksel, (2007). Shopping risk perceptions: effects on tourists emotions,
satisfaction and expressed loyalty intentions. Tourism Management, 28(3): 703
713.
[47] Yoon, Y. & Uysal, M. (2005). An examination of the effects of motivation and
satisfaction on destination loyalty: a structural model. Tourism Management,
26(1): 4556.
[48] Zeithaml, V.A. (1988). Consumer perceptions of price, quality and value: a
means-end model and synthesis of evidence. Journal of Marketing, 52(July): 2
22.

www.bitm.org.in Volume: 6 No: I February 2017 147 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Design and Measurements Linearly Polarized Dielectric


Antenna Design and Measurements
Deepshikha Mishra
M.Tech Student, ECE
Bengal Institute of Technology & Management, Santiniketan

Abstract
The first300GHz linearly-tapered slot antenna with the average gain of 13dBi has been
designed, fabricated, and tested. To reduce the cost of testing, this paper also proposes to
pair relatively low-cost 300-320GHz communication system with 10MHz-30GHz vector
network analyzer and use the signal processing techniques.

Keywords: Terahertz antenna design, terahertz antenna measurements, planar antenna,


linearly tapered slot antenna.

1. Introduction
Ultra-broadband terahertz (THz) communication systems are expected to help satisfy the
ever-growing need for smaller devices that can offer higher speed wireless
communication anywhere and anytime. In the past years it has become obvious that
wireless data rates exceeding 10 Gbit/s will be required in several years from now [1].
The opening up of carrier frequencies in the terahertz-range is the most promising
approach to provide sufficient bandwidth required for ultra-fast and ultra-broadband data
transmissions [2]. A suitable frequency window can be found around 300 GHz, offering
an unregulated bandwidth of 47 GHz [2]. This large bandwidth paired with higher speed
wireless links opens up the door to a large number of novel applications such as ultra-
high-speed cellular links, wireless short-range communications, secure wireless
communications for military and defense applications, and on-body sensors for health
monitoring systems. To design

THz communications systems, we need wideband, high-gain antennas to cover large


frequency range and compensate for high propagation losses. In addition, THz antennas
need to be planar and suited to be realized in integrated or printed circuit board (PCB)
technology.

2. Antenna Design and Fabrication


Figure 1 shows the layout of the proposed 300 GHz LTSA. The layout consists of 2
copper layers, each having a slot tapered from the top of the WR-3 waveguide to the top
of the antenna. The antenna has been simulated with CST [19] and fabricated on a 15 mil
Rogers RT/Duroid 5880 R3 board using a standard PCB milling machine.

The dielectric constant of the material is 2.2 and the copper thickness is 36 m. The
design parameters (i.e., initial slot width, a, tapered end slot width, b, slot length, h,
www.bitm.org.in Volume: 6 No: I February 2017 148 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
substrate thickness, t, and the flare angle of the tapered slot, ) and their numerical values
are summarized in Table 1.

To connect our LTSA to the measurement system described in Section 3, we had


toinclude a tail section that is inserted into the WR-3 waveguideas shown in Fig. 5. We
have designed the tail in a way that it not only serves as the connection between the
antenna andthe waveguide, but it also helps reducing the reflections inside the
waveguide. By introducing the tail section, the propagatingwave does not experience an
abrupt change of medium (fromair to Duroid), which leads to smaller reflections at
thewaveguide-antenna interface. The CST simulation results areshown in Fig. 2. We can
observe that the average antenna gainis around 13 dBi and the return loss is below -10 dB
acrossall frequencies. The ripples observed in the LTSA gain are theresult of multiple
reflections off the face of the horns, as itwill be confirmed in the measurements in
Section 5.

3. Measurement Setup
The measurement setup consists of the N5224A PNA vectornetwork analyzer (VNA), the
VDI transmitter(Tx210) andthe VDI receiver (Rx148). The input signal provided bythe
VNA at the Intermediate Frequency (IF) port of the Schottky diode mixer is mixed with
the Local Oscillator(LO) signal, generated by subsequent doubling and triplingof the 25
GHz signal from a phase-locked dielectric resonatoroscillator (DPRO). The sub-harmonic
mixer plays a dual roleof doubling the carrier frequency and mixing it with thebaseband
signal (10 MHz20 GHz, delivered by the VNA).The resultant terahertz-range signal is
then transmitted bythe horn antenna that has a gain of 23 dBi in the range280-320 GHz.
At the receiver side, the same componentsare used to down-convert the signal, except
that the DPROis tuned to 24.2 GHz, resulting in a down-conversion ofthe received RF
signal to an IF signal of 9.6 GHz. Theupper sideband of the down-converted signal is
thenrecordedby the VNA in the frequency range of 9.6-29.6 GHz. Thecorresponding
block diagram is shown in Fig. 3. By recordingthe frequency dependent scattering
parameter S21 for the test signal frequencies ftest = 10MHz20 GHz at the VNA,
thechannel transfer function at f = 300GHz+ ftest is measured.

It has been found that the inherent loss in the transceiver isvery high (40-50 dB) and that
this loss has to be de-embeddedfrom any S21 measurements to obtain true S21 transfer
functions.The bandwidth of 15 GHz is used in all measurements toavoid the Tx amplifier
distortions present in the range of 300305 GHz. This provides the temporal resolution of
0.067 ns.

The start frequency is bound to a minimum of 10 MHzby the VNA and the stop
frequency could not exceed the system limitations of 20 GHz. Due to input power
restrictionsof the mixers, a test signal with a power of 5 dBm isused, providing a
dynamic range of approximately 90 dBfor the chosen intermediate frequency filter
bandwidth of IF = 10 kHz. The number of sweep points is set to 801,and the maximum
excess delay is 53 ns.

www.bitm.org.in Volume: 6 No: I February 2017 149 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
To obtain the gain and the return loss of the fabricatedLTSA, two measurement scenarios
have been employed. First,the channel transfer function, S21, is measured between
thetwo identical horn antennas, one on the Tx and the other onthe Rx module as shown in
Fig. 4. This measurement setup isused to find the frequency dependent gain and return
loss ofthe horn antenna. Second, S21 is measured between the horn antenna on theTx and
the LTSA on the Rx side, as shown in Fig. 5, to find the frequency dependent gain and
return loss of the LTSA. The post-processing of the measured data is described inSection

4.Post-Processing of Measured Data


This section describes the signal processing used to obtainthe gain and the return loss of
the LTSA. The steps of signalpost-processing are as follows:

1)The transceiver loss is de-embedded from the measuredS21. This step is necessary
because the systemcalibrationcan only be performed at the input and the output ofthe Tx
and Rx modules, while the transceiver introducessignificant frequency-dependent loss
into the system.

2)The measured channel transfer function between twohorn antennas is used to calculate
the frequencydependentgain and S11 of the horn.

3)The obtained gain and S11 of the horn from Step 2 alongwith the measured S21
between the horn and LTSA areused to calculate the frequency dependent gain and S11of
the LTSA.
The following two subsections describe the detailed signal processing techniques used in
steps 2 and 3.

A. Horn-to-Horn Measurement Scenario

Figure 6 shows the diagram of the horn-to-horn measurementscenario. To obtain the


frequency dependent gain of the horn antenna,we use the Friis equation [20]:
[dB] = [ ] + 2 [ ] [ ],

(1) where is the measured transfer function S21, Ghornis the frequency-dependent gain
of the horn antenna, and PListhe free-space path loss, which can be theoretically
calculatedas [21]
PL = 20 10 4 ,(2)

where ddenotes the distance between two horn antennas, andis the wavelength. In this
measurement scenario, the distancebetween the horn antennas was d = 10 cm.

To find the S11 of the horn, we consider the diagram shownin Fig. 6. Here, the Tx and
the Rx antennas have the samereflection and transmission coefficients, S11 and S21 ,
since twoidentical horn antennas are used. Assuming that the horn has100% efficiency,
the relationship between the Sh11 and Sh21 canbe defined as [22]:
| 11 |2 + | 21 |2 = 1.(3)

www.bitm.org.in Volume: 6 No: I February 2017 150 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
The measured S21 includes path loss and twice the horn gain,which need to be
compensated for to find the truechanneltransfer function. Therefore, 21 in Fig. 6 is
calculated as
21 = 21 + 2 , (4)

whereS21deembed refers to the measured S21 after the de-embeddingof the transceiver
loss, and Gh is the average ofthe frequency dependent horn gain. From Fig. 6, we can
relate 21 and 21 as follows:
| 21 |2 = | 21 |2| 21 |2 ,(5)

which leads to
| 21 |2 = | 21 |. (6)
Finally, 11 can be found by substituting (6) into
(3) as
| 11 | = 1 | 21 |. (7)

The measured (i.e., post-processed) S11 and gain of the hornare shown in Fig. 7. They
are also compared with simulatedS11 and gain of the horn antenna to verify our
approach. Thecomparison is further discussed inSection 5.

B. Horn-to-LTSA Measurement Scenario


The algorithm described in Section 4-A is also used in thesecond measurement scenario
to find the gain and the returnloss of the LTSA. The only modification from the first
scenariois that the Rx horn antenna is now replaced with the proposedLTSA, and the 11
and 21 on the Rx side, and 21 in Figure 6are substituted with 11 , 21 , and 21 ,
respectively. Note thatthe separation distance of d = 1.5 cm has been chosen in
thismeasurement scenario to ensure direct line of sight betweenthe horn and LTSA, as
illustrated in Fig. 5.

Following the similar reasoning as in the horn-to-horn measurementscenario, we can


observe that (5) can berewrittenas
| 21 |2 = | 21 |2| 21|2, (8)

where 21 is the de-embedded S21 between the horn and theLTSA that has been
compensated for path loss and the gainsof the two antennas, 21 is the S21 of a single
horn that wasfound in the previous section, and 21 is the S21 of the LTSAthat needs to be
calculated.
The measured S11 and gain of the LTSA are shown in Fig. 8.They are also compared
with the simulated S11 and gain ofthe LTSA to verify our approach. The comparison is
furtherdiscussed in Section 5.

5. Comparison Between Simulated and Measured Results


Figures 7 and 8 compare the simulated and measured gainand return loss of the horn and
the proposed LTSA, respectively.For the simulated results, the measurement
scenariosdescribed in Section 4-A and 4-B are simulated in CST [19],and the obtained
S21s have been subject to the identical post-processingproceduredescribed in Section 4.
www.bitm.org.in Volume: 6 No: I February 2017 151 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527

In Figs. 7 and 8, it is observed that the measured gainand S11 are quite comparable with
the simulated ones forboth the horn and LTSA. The ripples seen in the measuredgain are
confirmed by simulation, and it has been found thatthey are the result of multiple
reflections between Tx andRx hardware. The fabricated LTSA achieves a high gain
ofaround 13 dBi, and below 10 dB return loss for most of themeasured bandwidth of
305 320 GHz, as observed in Fig. 8.Although the measured results have been plotted for
only theupper sideband with additional loss of 5 GHz due to amplifierdistortion present
in 300305 GHz, simulation has proven that,in principle, the LTSA has a high gain and
low S11 below10 dB across the entire bandwidth of 280320 GHz asshown in Fig. 2,
confirming the wideband (13.3 % fractionalbandwidth) characteristic of the proposed
antenna. The slightdiscrepancies observed between measurement and simulationcan be
attributed to imperfections in fabrication, transitionsbetween the waveguide and antenna,
rough surfaces, etc.that would introduce additional losses not accounted in ourpost-
processing algorithm. It can be expected that at suchhigh frequencies, the slightest
dimensional irregularity of thestructure that is in direct contact with the propagating
wavecan result in considerable reflections.

6. CONCLUSIONS

A broadband linearly-tapered slot antenna with the average gain of 13 dB across 280320
GHz range has been designed,fabricated, and tested. The LTSA has been fabricated
usinga standard PCB milling machine and the Rogers RT/Duroid5880 material. To
reduce testing cost, this paper proposed topair relatively low-cost 300320 GHz
communication systemwith 10 MHz30 GHz vector network analyzer (VNA) anduse
signalprocessing to extract the gain and return loss of thetested antenna. The results show
that the measured averagegain and return loss are in good agreement with the
simulationresults, suggesting that the fabricated LTSA has a high gainand wideband
characteristics.

References
[1] S. Cherry, Edholms law of bandwidth,IEEE Spectrum, vol. 41, pp. 58-60,
July 2004.
[2] P. H. Siegel, Terahertz technology, IEEE Transactions onMicrowave Theory
and Techniques, vol. 50, pp. 910928, March 2002.
[3] J. D. Kraus, Antennas, McGraw-Hill Book Company, 2nd edition, New York
NY, 1988.
[4] D. B. Rutledge and M. S. Muha, Imaging antenna arrays,IEEE Transactions
on Antennas and Propagation, vol. 30, no. 4,pp. 535540, July 1982.
[5] D. F. Filipovic, S. S. Gearhart, and G. M. Rebeiz, Doubleslot antennas on
extended hemispherical and elliptical silicon dielectriclenses, IEEE
Transactions on Microwave Theory and Techniques,vol. 41, no. 10, pp. 1738
1749, October 1993.
[6] X. Wu, G. Eleftheriades, and T. E. van Deventer-Perkins,Design and
characterization of single- and multiple-beam mm- wavecircularly polarized

www.bitm.org.in Volume: 6 No: I February 2017 152 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
substrate lens antennas for wirelesscommunications, IEEE Transactions on
Microwave Theory andTechniques, vol. 49, no. 3, pp. 431441, March 2001.
[7] A. V. Boriskin, G. Godi, R. Sauleau, and A. I. Nosich, Smallhemielliptic
dielectric lens antenna analysis in 2-D: boundaryintegral equations versus
geometrical and physical optics, IEEETransactions on Antennas and
Propagation, vol. 56, no. 2,pp. 485492, February 2008.
[8] P. Focardi, W. R. McGrath, and A. Neto, Design guidelinesfor terahertz
mixers and detectors, IEEE Transactions on MicrowaveTheory and
Techniques, vol. 53, no. 5, pp. 16531661,May 2005.
[9] A. Neto, S. Bruni, G. Gerini, and M. Sabbadini, The leaky lens:A broad band,
fixed beam leaky wave antenna, IEEE Trans.Antennas Propag., vol. 53, no. 10,
pp. 32403246, Oct. 2005.
[10] S. Bruni, A. Neto, and F. Marliani, The UWB leaky lensantenna, IEEE
Transactions on Antennas and Propagation,vol. 55, no. 10, pp. 26422653,
October 2007.
[11] A. Neto, UWB, non-dispersive radiation from the planarly fedleaky lens
antenna-part I: theory and design, IEEE Transactionson Antennas and
Propagation, vol. 58, no. 7, pp. 22382247,July 2010.
[12] .A. Neto, S. Monni, and F. Nennie, UWB, non-dispersiveradiation from the
planarly fed leaky lens antenna-part II:demonstrators and measurements, IEEE
Transactions on Antennasand Propagation, vol. 58, no. 7, pp. 22482258,
July2010.
[13] .N. Llombart, G. Chattopadhyay, A. Skalare, and I. Mehdi,Novel terahertz
antenna based on a silicon lens fed by a leakywave enhanced waveguide, IEEE
Transactions on Antennas

www.bitm.org.in Volume: 6 No: I February 2017 153 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Decay Channels of Higgs Boson


PriyaMaji1, Debika Banerjee and SukadevSahoo2
Department of Physics, National Institute of Technology, Durgapur-713209, West Bengal, India
1 2
E-mail: majipriya@gmail.com, E-mail:sukadevsahoo@yahoo.com

Abstract

The discovery of Higgs boson has marked a new era of exploration in fundamental
physics. It is an important particle because it is responsible for the Higgs mechanism by
which all particles acquire mass. There are certain decay modes of Higgs boson which
are relevant events of Standard Model(SM) such
as: (l is a lepton).Apart from
these, Lepton Flavor Violating (LFV) decays of Higgs boson )
are precisely excluded under SM theory. But recently some evidences are found at LHC
signalswith 95% CL in the CMS experiment which could be conclusive for beyond
SM(BSM) theory. In this paper, we discuss different decay channels of Higgs bosonwith
the recent searches of LFV Higgs decays.
Keywords: Higgs boson, Higgs mechanism, Higgs decays, Standard Model, Beyond
Standard Model

1. Introduction

The Higgs boson is a special boson which was proposed by Englert,Brout& Higgs [1-3]
around 50 years ago and finally confirmed on 4 th July, 2012 by CERN at LHC. It is
responsible for the mass generation of the gauge bosons (W and Z bosons) of SM [4]
which are carrying the weak forces. When we impose the spontaneous breaking of gauge
symmetries to the electroweak theory, the solution of this mass conundrum could be
found by presuming a complex scalar field. This field is called as Higgs field and it
permeates over the whole space from the instant of Big Bang. All particles acquire some
mass due to the dragging force given by this Higgs field while moving through itand
stronger the interaction of the particle with Higgs field, larger the mass is. As the Higgs
field is constant over whole space so the mass becomes a fixed property for any particle.
The quantum excitation of this field is known to be the Higgs boson. As the field is
scalar, the Higgs boson has spin-0 and this property provides the uniqueness to it. If it
were spin-1, like other bosons then all the particles moving through it would be
accelerated in ground state violating momentum conservation laws.The Higgs boson also
has self-interaction which means it also provides the mass to itself. The mass of the Higgs
boson has been found to be aboutmH~125-126 GeV by ATLAS [5] and CMS [6].
From the signals of various colliders it is found that Higgs boson is very unstable
(lifetime ~ 10-22sec) and decays very fast into fermion-anti fermion pair or pair of other
www.bitm.org.in Volume: 6 No: I February 2017 154 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
bosons. To interpret the experimental measurements, computation of all Higgs boson
partial decay widths i is essential. Because the fraction of each decays modes (that could
not be observed in colliders) has a relation with total decay width total. A Higgs boson
with mass mH~125 GeV has been observed by LHC with some dominant decays which
are followed by . The Higgs decays
are difficult to detect due to their low decay rates. The total width of
SM-like Higgs with mH= 125 GeV is measured to be H= 4.07 10-3GeV with an
uncertainty of 4% [7].Besides these decay channels there is no tree level flavour changing
neutral current (FCNC) [8] in SM. Therefore FCNC processes are excellent probes to
reach the extent of BSM [9]. Run-I results of CMS collaboration have found a surplus of
events of the decay mode with local significance 2.4 [10]. In the following
sections we will get a review of decays of the Higgs boson under SM background and
also follow up some signals of BSM theory.

2. Higgs boson decay modes


2.1. Standard Model events

In the last few decades, many theoretical computations have been built up for Higgs
boson production and its decay channels, which are having a good agreement with the
experimental claims till today. To get the evidence of the Higgs boson one needs enough
high experimental energy of the order of TeV range.A Higgs-boson coupling to SM
particles is the origin for their corresponding masses. For the SM-like Higgs boson, its
couplings to the intermediate gauge bosons W, Z and to the top and bottom quarks as
well as -leptons are the most relevant ones for decay and production processes.Among
all events of SM, Higgs boson decays to various heavy particles through different decay
modes. But not all modes are equally significant or easy to detect in high energy colliders
(e.g. LHC, Tevatron).

i) Diphotonicdecay of Higgs boson

The possible decay modes as shown


in Fig 1 [11] are mediated by W boson or
heavy fermionic loops. Since photons are
massless so it does not couple directly to the
Higgs particle in SM and hence the decay
should proceed with W or heavy fermionic Fig 1
(top quark) loops. This decay process has
advantage of less background since final
state contains only photons. From the
measurements of CMS and ATLAS it is
found that, this decay gives a good mass
determination of Higgs particle. The lowest order partial decay width is given by eq. 1
[12]

www.bitm.org.in Volume: 6 No: I February 2017 155 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

where, the parameter and and are form factors.

ii) Higgs decays to intermediate gauge bosons

While studying the decay of Higgs boson into WW * and ZZ*, it is observed that
each gauge boson pair decays into four fermions (leptonic, semileptonicetc). In the
decay channel (Fig 2(a)[7]] (where l refers to e or ) under the
background of dominant Higgs production from gluon gluon fusion process, Z 2 is
always produced via an off-shell Z boson and tends towards highest possible masses.
Whereas, for annihilation background, Z2 tends toward lower mass. Signal
strength for this decay channel ( is measured by ATLAS and CMS
experiments as and respectively [7].

Fig 2(a) Fig 2(b)

Another intermediate process for semileptonic Higgs decay is


shown in Fig 2(b) [7]. It has a good sensitivity but poor mass resolution due to the
occurrence of neutrinos in final state. In the decay mode both Ws decay
leptonically or one of the Ws decay leptonicallywhile other decays hadronically.
*
The transition amplitude for (A= W, Z) decay modes is given by

The partial decay width is given by [13, 14]

where, , for V= W(Z).

iii) Higgs decays to fermions

Among all other SM background events difermionic decay modes of Higgs boson,

www.bitm.org.in Volume: 6 No: I February 2017 156 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
, shown in Fig 3 [15] are most relevant. Transition amplitude for this mode is
found to be

[16]

Fig 3

Being the heaviest lepton among all, has the highest leptonic Higgs
bosonbranching ratio, 6.2% in the SM which helps in study of Higgs interaction with
fermions ( . and are denoted as radiative modes in the field
of Higgs fermionic decay. The partial decay width is given as

iv) Higgs boson decays to photon and Z Boson

(a) (b) (c)

www.bitm.org.in Volume: 6 No: I February 2017 157 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Fig 4

Same as diphotonic mode, Higgs decays to photon and Z boson ( ) (Fig 4 [15])
proceeded by fermion and W boson loops. This decay mode is considered to be a rare
decay although the branching ratio is comparable to . The partial decay width is
given by eq. 6 [17,18]

here . In this channel Z boson decays to leptons. For mH = 125GeV,


the upper limits of expected and observed signal strength by CMS are 10 and 9.5 [19]
respectively and by ATLAS are 9 and 11 [20].
Mass resolution of all possible sensitive Higgs decay events in SM are given by Table 1
[7]

Table 1

Decay channel Mass resolution

1-2%

1-2%

~15%

~15%

~10%

Branching ratios for relevant channels of a SM Higgs boson with mH= 125 GeV are given
in Table 2 [7]

www.bitm.org.in Volume: 6 No: I February 2017 158 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Table 2

Decay
channels

Branchin 2.2810-3 2.6410-2 2.1510-1 6.3210-2 5.7710-1 1.5410-3 2.1910-4


g ratio

2.2Search of BSM LFV Higgs decays

Among many different plausible non-standard decay modes of the Higgs boson, one of
the most fascinating are flavour violating Higgs decays. In the SM, these decays are
supressed by other background events due to low decay rates. LFV decays have been
studied theoretically in the context of supersymmetry, extended Higgs sectors and other
BSM models. The results observed by the Super-Kamiokande Collaboration shows
evidence for neutrino oscillation which indicate lepton number is not conserved in SM.
So, in certain extensions of SM flavour violation decays could be identified precisely. In
collider aspect, during various direct and indirect experimental searches at LHC and
comparing their sensitivities some signals of LFV decay modes, such
as , are found which are highly correlated with flavour violation
in low energy processes ( etc) [10]. These couplings of Higgs are
associated with Yukawa interactions. Considering that Higgs production cross section
and total decay width are same as that of SM,CMS ATLAS have given the best fit for the
decay mode as [21]and [22]
respectively, and the upper limit is found as [21] with local
significance of 2.4 and [22] with 1.3 respectively. Both CMS
and ATLAS are searching good results for another flavour violation of e and e
channels which are described in ref. [23,24]. The Feynman diagram for one loop radiative
lepton decay and FLV decay are given in Fig 5 [25]

www.bitm.org.in Volume: 6 No: I February 2017 159 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Fig 5

Partial decay width for this mode is given as eq. 7 [10]

3. Conclusion

Before the discovery of Higgs particle all the elementary particles have spin or 1. Since
Higgs particle has spin-0, so it opens a perception of new type particles. So the discovery
can be considered as an important step forward to particle physics. In the above
discussion we recall the dominant decays of Higgs under SM events. Results associated
with CMS and ATLAS collab. shows that mode higher event rate compared to
the SM predictions [26]. and channels play a special role
due to their excellent mass resolution (Table 3). The decay is often
referred to as golden channel due to final state of four charged leptons. On the other hand,
in spite of having poor mass resolution, channel provides the best chance of
discovering Higgs particle because of its large branching ratio. The decay can
have two possible modes, one is hadronic (with one neutrino) and another is leptonic
(with two neutrinos). Having (atleast two) neutrinos in final state the events are unable
for determination of Higgs mass, but low mass of (1.78 GeV/c2) helps to analyse the
problem. All the decay events of SM are observed within 2 measurements of LHC (run-
I worked in 7 TeV, run-II is operated in 13 TeV). Along with these possible SM Higgs
decays the LFV decays are being observed with 95% CL at LHC. Previously it was
predicted that branching ratios of the modes are sizeable uptoO (10%)
[27]. Recently various experiments are going on in search of LFV Higgs decays and they
are also assumed to be confirmed in near future. As these decays are exclusive for SM
events so their confirmation could be a notable step towards the new physics beyond SM.

Acknowledgment
P. Maji and D. Banerjee acknowledge the Department of Science and Technology, Govt.
of India for providing INSPIRE Fellowship through IF160115 and IF140258 respectively
for their research. S. Sahoo would like to thank Science and Engineering Research Board
www.bitm.org.in Volume: 6 No: I February 2017 160 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
(SERB), Department of Science and Technology, Govt. of India for financial support
through grant no. EMR/2015/000817.

References

[1] Englert,F. &Brout, R.(1964).Phys. Rev. Lett.,13 (321).


[2] Higgs,P. W. (1964).Phys. Lett.,12(132).
[3] Higgs, P. W. (1964).Phys. Rev. Lett.,13(508).
[4] Griffiths, D.(1987).Introduction to elementary particles,Singapore:John Wiley
and Sons.
[5] Aad, G. et al. (ATLAS Collaboration).(2012).Phys. Lett. B,716(1) [arXiv:
1207.7214 [hep-ex]].
[6] Chatrchyan,S. et al. (CMS Collaboration).(2012).Phys. Lett. B,716(30) [arXiv:
1207.7235 [hep-ex]].
[7] Murray,W. &Sharma,V.(2015).Annu. Rev. Nucl. Part. Sci., 65, 515-554.
[8] Grinstein, B.(2017).arXiv: 1701.06916 [hep-ph].
[9] Vicente, A. (2014).arXiv:1411.2372 [hep-ph].
[10] Banerjee,S.et al. (2016). JHEP, 1607(059)[arXiv: 1603.05952 [hep-ph]].
[11] Wu, S. L. (2014).Int. J. Mod. Phys. A, 29 (27) [arXiv: 1410.6453 [hep-ph]].
[12] Shifman,M. A. et al.(1979).Sov. J. Nucl. Phys.,30 (711).
[13] Llewellyn Smith, C. H.(1973).Phys. Lett. B, 46 (233).
[14] Lee,B. W. et al.(1977). Phys. Rev, Lett.,38(883).
[15] Spira, M. (2016).arXiv: 1612.07651 [hep-ph].
[16] Ilisie, V. (September 2011).SM Higgs Decay and Production Channels,
Thesis, Universidad de Valencia.
[17] Gunion,J. F. et al.(2000). Front. Phys., 80(1).
[18] Cahn,R. N. et al.,(1979). Phys. Lett. B,82, 113-116.
[19] CMS Collab.(2013).Phys. Lett. B,726(587).
[20] ATLAS Collab.(2014).Phys. Lett. B,732(8).
[21] CMS Collab., Report No. CMS-HIG-14-005 and CERN-PH-EP-2015-027,
[arXiv: 1502.07400].
[22] Aad,G. et al.(ATLAS Collab.)(2015).JHEP,1511(211).[arXiv: 1508.03372].
[23] CMS Collab., CMS-PAS-HIG-14-040.
[24] https://indico.in2p3.fr/event/12279/session/5/contribution/202/material/slide/0.
pdf.
[25] Lima, L. D. (2015).JHEP, 11(074) [arXiv: 1501.06923 [hep-ph]].
[26] Glashow, S.(1961).Nucl. Phys., 22(579).
[27] Harnik, R., Kopp, J. &Zupan, J.(2013)JHEP,1303(026) [arXiv: 1209.1397
[hep-ph]].

www.bitm.org.in Volume: 6 No: I February 2017 161 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Accountability of SHGs: Highlights on Accounting


Practices and The Vogue Accounting Information
System
Pradip Laha1, H. R. Biswas2
1
BITM, Santiniketan,Dept. of Business Administration, 2BITM,
Santiniketan,Department of Hospitality & Tourism

Abstract
Self help groups are basically business units. These are formed in small group to earn
profit. For earning legitimate profit SHGs are required to keep books of accounts.
Accounting is the business language in which most transactional are expressed. Language
serves as the medium of communication. Similarly what an entity expresses as results of
activities through accounting is communicated to others. SHGs are not well versed with
accounting process, not only would their reports and statements be questioned by other
interested parties but also would they fail to take proper decisions. This study there fore
first investigates into the nature and type of accounting practices followed by SHGs and
then examines their effectiveness. On the basis of findings of the prevalent practices
followed by SHGs, their limitations are delineated so that an appropriate accounting
system for these micro business unit could emerge.
Key Words: SHGs,NABARD,PPP Model,Double Entry System,Micro Business Unit

Introduction
Poverty is the greatest bane in the developing countries. India is no exception. In fact
the focus of economic planning, programmes and cognate activities in India has been
eradication of poverty. Poverty alleviation involves several challenges to the Govt. of
India and of the states for the purpose of eradication of poverty, Self help Groups (
SHGs) have emerged as a ray of hope for the poor. Being actively promoted by the State
Banking system , the movement of SHG has come to the literature in the mid-1980s in
India and it currently forms the basic constituent of microfinance. A SHG is a group of
few individuals, usually poor and often women who pool their savings into a fund from
which they can borrow as and when necessary. Such a group is linked with a bank where
they maintain a group account. Over time the bank begins to lend to the group as a unit,
without collateral, relying on self-monitoring and peer pressure within the group for
repayment of these loans (Karmakar. A, The Management Accountant Kolkata, Nov.
2008).
Moreover A Self Help Group is a small and informal association of poor having
preferably similar socio-economic background and who have come together to realize
some common goal based on self help and collective responsibility. SHGs have become
relevant because of the following reasons . First, an SHG working on the principle of
solidarity helps the poor to come together to pool their savings and access credit
facilities. An SHG builds social capital like trust and reciprocation, that helps in
replacing physical collateral, a major hurdle faced by the poor in obtaining formal credit.
Then through the principles of joint liability and peer pressure, a SHG ensures prompt

www.bitm.org.in Volume: 6 No: I February 2017 162 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
loan recovery from the members. In the process, an SHG helps the poor, especially
women, to establish their creditworthiness (Kumar. . Raj and Singh. . Rajesh Kumar )

Literature Review
In India, Andhra Pradesh has a large share of over 18% of all linked SHGs, Tamilnadu
has a share of 12%, Karnataka has a share of 11% followed by Kerala of 9%. The rest of
country accounts for about a quarter of the total number of SHGs, West Bengal has a
share of only 7.4% of the network of SHGs. Some Research Studies have recently been
initiated in the districts of Burdwan, Bankura, Howrah, Hooghly and some others.
Mention here may be made of a few of them e.g Self Employment Programme, W.B.
(Roy, Durgadas, 2007), Cost Model of SHG Bank Linkage Programme in W.B.
(Venugopalan. Puhazhundhi, 2006), Impact of SGSY Scheme on Self Help Group
members of W.B. (Kundu. Amit, 2008), Study of SHG and Microfinance in W.B.
(Sen. Manab, 2005), Womens Dependents on Forest and Participation in Forest
(Sarkar, Debnarayan, 2006), Technology and Sustainable Development in North-South
Perspective (Sinha. Shirish, 2003), Institutional credit absorption in rural areas
(Chatterjee. Manik,2001) etc. With the backdrop of the above mentioned studies, I
propose to do research work on the subject which may help the rural people of Birbhum
district. Besides this, Birbhum is industrially backward, poverty stricken and agriculture
based district. Thus this region is chosen for deeper probe into the present state of affairs
of SHG and future prospect.
Before explaining the theme of the study, a close look into the functions of the
accounting process is required so as to appreciate its role in poverty alleviation.
Custodianship and control of resources employed in enterprise activities, providing
necessary information to those individuals responsible for day-to day operations,
planning and co-ordinating business activities.These are the functions required of
accounting at any period in history and in any socio-economic environment , be it that
of a developed, developing or socialist country observed by Kyojiro Someya in a paper
entitled Socio -economic environment and its functioning of accounting-Does
accounting have a larger role than rational financial reporting?. He also expresses his
view that perhaps no persons ,no organisation or no country, would be successful in its
endeavour unless it has effective method of recording and controlling of its activities. In
fact, it is almost impossible to record and control of financial activities of an individual or
an organisation without adopting proper accounting methods and techniques. It may at
the outset appear irrelevant when one refers to accounting in the context of poverty
alleviation or activities of SHGs, but if one looks into the issue deeply and seriously,one
will realize that the role of accounting is very important for the success of gamut
activities or programmes, whether it is poverty alleviation or activities of SHGs. Failures
in Gram Panchayats are largely related to ineffective accounting and control systems.
Poor people often are exploited and cheated for their illiteracy and lack of accounting
knowledge. Unless an appropriate accounting system is developed and adopted in
practice ,activities of SHGs could hardly be sustained for long. It is important therefore
to study at depth the accountability aspects of SHGsas to wherefrom money comes and

www.bitm.org.in Volume: 6 No: I February 2017 163 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
where it goes for what results.The emphases are on both safety and effective deployment
of funds.

SHGs are basically a business unit. These are formed in small group to earn profit.
Therefore, SHGs aim at profit from their operations.. For earning legitimate profit, SHGs
are required to keep books of accounts. Accounting is the business language in which
most transactional activities are expressed .A man expresses himself through his
language. What one man speaks or writes in a language is heard or read by others.
Language serves as the medium of communication. Similarly what an entity expresses as
the results of its activities through accounting is communicated to others. A business unit
prepares financial accounts, reports or statements. It analyses and interprets its book-
keeping records through analysis. Accounting serves as the medium of communication. If
SHGs are not well versed with accounting process, not only would their reports and
statements be questioned by other interested parties, but also would they fail to take
proper decisions. In fact, all existing SHGs apply some kind of accounting systems to
record their commercial activities and determine the results of these activities at the end
of a particular period. This study therefore first investigates into the nature and type of
accounting practices followed by SHGs and then examine their effectiveness. On the
basis of findings of the prevalent practices followed by the SHGs, their limitations are
delineated so that an appropriate accounting system for these micro business units could
emerge.

Scope of the Study


The proposed study would cover a period of five years starting from 2001 to 2006. At
present, there are about 2500 villages in Birbhum district of West Bengal About 16000
groups have already been formed and have been working successfully at present in
different activities, like poultry farming, goat grazing, kantha stitching, conversion rice
from paddy, fishery, dairy, macrom, leather bags, papad, bodi, chanachur, battick etc.

Need of the Study


An SHG consists of five to twenty persons, usually from different families.
Often a group like this is given a name having a leader and a deputy leader who are
usually elected by the group members. The members decide among themselves the
amount of deposit they have to make individually to the group account. The starting
monthly individual deposit is usually as low as Rs. 10. For a group of 10, this translates
to Rs. 100 of group savings per month. On the basis of the resolutions adopted and signed
by all members, the manager of a local rural or commercial bank opens a savings bank
account. The savings are collected by a certain date (often the 10th of the month) from
individual members and deposited in the bank account.
Loans are then given out to individual members from these funds upon application and
unanimous resolution at a group meeting. The bank permits withdrawal from the group
account on the basis of such resolutions. Such loans are fully funded out of the savings
generated by the group members themselves. The repayment periods of loans are usually
short, often between 3 and 6 months. After regular loan disbursement and repayment for
six months, the bank considers giving loan to the SHGs out of its own funds. The
www.bitm.org.in Volume: 6 No: I February 2017 164 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
maximum loan amount is a multiple (usually 4:1) of the total funds in the group account.
This limit is also reached gradually starting from a lower (2:1 or 1:1) figure. Thus, a 10
member SHG with individual monthly deposit level of Rs. 20, completing a six-months
successful inter-loaning, accumulates total savings of Rs. 1200/- (part of which may be
lent out to individual members) and eligible for a maximum bank loan of Rs. 4800/-. The
groups sustainability depends on how the group promoter prepares and strengthens to
come together on self-help group motive, participate actively and manage affairs
democratically.

Objectives of the Study


The main objectives of the present study are:

1. To investigate into the present accounting system recently followed by SHGs for
recording their business activities.
2. To examine whether the present accounting systems is useful and effective in
determining the periodical results of working of the SHGs.
3. To assess whether the present accounting systems are able to provide necessary
information to internal stake holders as well as external stake holders for their purposes
upto their satisfaction. There should be no concealment of material facts , ambiguity or
distortion with a view to achieve these objectives.
In the light of the above objectives, the study proposes to examine whether the present
accounting system followed by some of the SHGs are related to the unsatisfactory
performance of several SHGs .
Lastly , if it is found that present accounting system is not proper and adequate for
effective management of the SHGs , an endeavour would be made to develop a simple
accounting model for the SHGs. The proposed model would follow the commonly
accepted rules , methods, procedures in the light of accounting concepts and conventions
, accepted principles and practices, so that members of SHGs can easily apply this model
for effectively recording transactions and other business activities of their organizations.
The proposed model may provide the Bankers and other interested persons with relevant
information.
For this purpose , the following hypotheses are sought to be tested:
a. The SHGs do follow the scientific accounting system based on double entry principles;
b. The present accounting system does not fail to provide necessary information, either
internal or external stake holders for forecasting and future decision making.
c. The vogue accounting system has not failed to determine the dependable periodical
results of the activities of SHGs.
d. The present accounting practices followed by SHGs are not incomplete in respect to
recording business transactions. The above hypotheses are desired to be tested and
verified with the help of empirical data to be collected for this study. If the hypotheses
are accepted,a thorough examination and analysis of the present system is proposed for
arriving at proper recommendations for the improvement of the accounting system
along with an appropriate accounting model for SHGs.

www.bitm.org.in Volume: 6 No: I February 2017 165 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
Research Methodology

The proposed study would cover a period of five years starting from 2001.It would
primarily be a sample study. SHGs of the district would be selected on the basis of
random stratified sampling. Data would be collected also from Self Help Group
members. For this purpose, several sets of questionnaire would be prepared and
addressed to the members of the selected SHGs. Besides, data would be collected directly
from a) District Industries Centers, b) Panchayet Offices, c) Block Offices, d) Banks and
other Financial Institutions who are offering loans to the SHGs, e) Birbhum Zilla Parisad,
f) Beneficiaries i.e, the loanee members, and g) Financial association of beneficiaries.
Secondary data would also be collected from the annual reports, newspapers, magazines,
periodical journals, internet etc. The scope and application of the secondary data would
be rather limited to benchmarking.
Proposed Data Analysis:
Data would be analyzed on the basis of Descriptive Statistics, Inferential statistics,
correlation analysis as well as Multivariate analysis and factor analysis.
In this study exploratory research design would be applied to explore the data and to
find out significant differences among and between variables. The question pattern
would be culture- free. From the above analysis the conclusions and suggestions for the
study would be drawn.

Tentative Chapter Scheme


The whole study would be divided and organized in a manner suitable for the purpose of
achieving the basic purpose of the research work. Accordingly, the study would be
organised in several chapters.Proposed descriptions and contents of the chapters are given
below:
ChapterI : First chapter of this study will be introduction covering the objectives of the
study, scope of the study, problems and hypotheses of the study.
ChapterII : Second chapter will deal with review of literature related primarily to recent
studies in this field.
ChapterIII : Third chapter will focus on the methods to be followed in the study
covering sample procedure, sampling size, research design, tools and techniques useful
for data collection, analysis and interpretation.
ChapterIV : Fourth chapter will present discussion and analysis of the primary data on
the basis of the statistical analysis . SPSS software would be basically used to analyse
the data. Descriptive statistics, Inferential statistics, Co-relation and Multivariate analysis
would be applied for assessing the accounting systems followed at present by the
selected SHGs.
Chapter-V: Accounting information system emphasies the kind of information that
managers of SHGs require for decision making purposes.In particular this chapter
underlines the basis of analysis of accounting data collected from the chosen SHGs, the
profit or loss earned or incurred during the accounting period.Accounting information
system dealt with this study in addition to the statistical analysis of the data arranged in a
time series.

www.bitm.org.in Volume: 6 No: I February 2017 166 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
ChapterVI:Sixth chapter will present on the basis of the interpretation of the results and
discussions covering the outcomes of the investigation ,the accounting transparency,
stability aspect of group members, sustainability of the groups and their analytical views.
ChapterVII :Seventh chapter will highlight the major findings and try to present a clear,
concise and simple accounting model for the SHGs.
ChapterVIII : Eighth chapter will contain summary and observations and basic
recommendations and trace an outline for the scope of the future research in this field and
suggestions for further research work directly or, indirectly related to the study.
At the end of study references would be provided covering all important books , Journals,
Magazines, Articles, paper clips consulted and used for the study. Annexures would be
presented at the end of the references.

References
[1] Basu.K and K.Jindal,Micro-Finance; Emerging Challenges, Tata McGraw
Hill Publishing Co. Delhi, 2006.
[2] Community Development 2006 on an evaluation of womens SHGs in an area
in South India.
[3] Chartered Financial Analyst, March 2007,The Icfai University Press,Hyderabad.
[4] Datt.Ruddar & Sundaram ,K.P.M , Indian Economy,-S.Chand & Co.Ltd ,New
Delhi,2007.
[5] Dash, Anup (2003): Strategies for Poverty alleviation in India.
[6] Economic Survey, 2007, The Govt of India
[7] Economic and Political Weekly,vol .XLII No.13,March 31-April 6,2008.
[8] Indian Journal of Gender Studies, Vol. 13, 56-73
[9] International Journal of Rural Studies (IJRS) Vol. 14, No. 2, Oct. 2007.
[10] Journal of Institute of Productivity & Management (IPM) Meerut (Vol. 9, No. 1,
January June, 2008).
[11] Lahiri, Dutt Kuntala and Samanta, Gopa (2006) Constructing Social Capital
(SHGs and Rural Womens Development in India).
[12] RBI, Report on Trend and Progress of Banking in India, 2005-2006
[13] Report of State Level Review Committee on SHGs-Bank Linkage Programme,
NABARD 2006.
[14] Saraswathy.A (May,2009) Micro-Finance In Krishnagiri District: A Tool for
Poverty Alleviation,Indian Journal of Marketing,vol.XXXIX,No.5.
[15] Sen, Amartya K (1985) Well being Agency and freedom (The Dewey
Lectures) Journal of Philosophy, SHGs Social Welfare Department of W.B.
(2006).
[16] Shome, M.K. (2009). A Critique of the Blue Print of SHGs in India.
[17] The Chartered Accountant ,Vol 54,No.8,Feb 2008
[18] The Indian Journal of Commerce Vol 61 ,No-4 Page-166,Oct-Dec 2008.
[19] The Management Accountant Journal Page-816,Nov. 2008.
[20] Vikalpa-The Journal for Decision Makers,vol.30,April-June,2005.
[21] Yojana,2008, The Govt of India.

www.bitm.org.in Volume: 6 No: I February 2017 167 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527

Molecular gastronomy is a scientific discipline, and


note by note cuisine is the next culinary trend
Manoj Kumar Pal
Department of Hospitality & Tourism Management, BITM, Santiniketan, Birbhum.

Abstract
The most beautiful works of life have always exhibited a dexterous blend of Arts and
Science. The Taj Mahal, for example, is the most scientifically architectured artistic
monument. Similarly, since time immemorial, cooking has been an outstanding art
inclined on a scientific plane and to specify this culinary skill the term Molecular
Gastronomy has been coined for it. Similar to molecular biology, molecular
gastronomy is a scientific discipline that looks for the mechanisms of phenomena
occurring during dish preparation and consumption. As with any other scientific
discipline, it can have many applications. One of the first was molecular cuisine but
since 1994, note by note cuisine has also been promoted. The latter involves preparing
dishes using pure compounds, or more practically mixture of compounds obtained by
fractioning plant or animal tissues, instead of using these tissues themselves. Note by
note cuisine raises issues in various fields: science, technology, nutrition, physiology,
toxicology and politics. This paper seeks to delve into the prospects of this recently
developed nomenclature along with its historic background and the scope and promise it
holds for future cuisine enhancement.
Keywords: Cuisine, Molecular cuisine, Molecular gastronomy, Note by Note cuisine.

Background
The term "molecular gastronomy" was coined in 1988 by late Oxford
physicistNicholasKurtiand the French INRAchemistHerve This. Some chefs associated
with the term choose to reject its use, preferring other terms such as multi-sensory
cooking, modernist cuisine, culinary physics, and experimental cuisine.
Molecular gastronomy is not a media-driven gimmick. Gastronomy is the intelligent
knowledge of whatever concerns mans nourishment. Its purpose is to watch over
conservation by suggesting the best possible sustenance. The term Molecular
Gastronomy is commonly used to describe a style of cuisine in which chefs explore
culinary possibilities by borrowing tools from the science lab and ingredients from the
food industry. Formally, the term molecular gastronomy refers to the scientific discipline
that studies the physical and chemical processes that occur while cooking.

Historically, molecular gastronomy is the consequence of the linkage of gastronomy to


science in the title and content of Jean-Anthelme Brillat-Savarins Physiology of Taste
(1825), made available to us in the splendid translation by M. F. K. Fisher. The science of
food, which Brillat- Savarin called astronomy,was initiated earlier by chemists in the Age
of Enlightenment, the late seventeenth and eighteenth centuries, and belongs to the
history of science.The kitchen was a laboratory like any other for famous doctor and
pioneering chemist Antoine-Laurent Lavoisier. In Germany, Justus von Liebig, working
in the Age of Positivism, applied meat extracts to the soups that still bear his name. The
test tubes were pots and ans.for him.
www.bitm.org.in Volume: 6 No: I February 2017 168 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527

Objectives
The objectives of molecular gastronomy, as defined by Herve this, are:
Current objectives
Looking for the mechanisms of culinary transformations and processes (from a chemical
and physical point of view) in three areas:

1. the social phenomena linked to culinary activity


2. the artistic component of culinary activity
3. the technical component
of culinary activity Original
objectives
The original fundamental objectives of molecular gastronomy were defined by this in his
doctoral dissertation as:
1. Investigating culinary and gastronomical proverbs, sayings and old wives' tales
2. Exploring existing recipes
3. Introducing new tools, ingredients and methods into the kitchen
4. Inventing new dishes
5. Using molecular gastronomy to help the general public understand the
contribution of science to society.
However, this later recognized points 3, 4 and 5 as being not entirely scientific
endeavours (more application of technology and educational), and has since revised the
primary objectives of molecular gastronomy.
Chronology of Development:
1995 - Sauces, or dishes made from Molecular Gastronomy
1997 - Heat in cooking
1999 - Food flavors - how to get them, how to distribute them, how to keep them
2001 - Textures of Food: How to create them?
2004 -
Interactions of food
and liquids
Discoveries :
Chemical Reactions in Cooking
Heat Conduction, Convection and Transfer
Physical aspects of food/liquid interaction
When liquid meets food at low temperature
Solubility problems, dispersion, texture/flavour relationship

Stability of
flavour
Techniques,
tools and
ingredients
Carbon dioxidesource, for adding bubbles and making foams
Foam scan also be made with animmersion blender
www.bitm.org.in Volume: 6 No: I February 2017 169 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
Liquid nitrogen, for flash freezing and shattering
Ice cream maker, often used to make unusual flavors, including savory
Anti-griddle, for cooling and freezing
Thermal immersion circulatorforsous-vide(low temperature cooking)
Food dehydrator
Centrifuge
Maltodextrin- can turn a high-fat liquid into a powder
Sugar substitutes
Enzymes
Lecithin- anemulsifierand non-stick agent
Hydrocolloids such as starch gelatin, pectinandnatural gums- used
asthickeningagents, gelling agents, emulsifying agentsandstabilizers,
sometimes needed for foams
Transglutaminase- a protein binder, called meat glue
Spherification- a caviar-like effect
Syringe, for injecting unexpected fillings

Preparations using Molecular Gastronomy


Alcohol

1. White Russian Krispies


You can now have your cult classic cocktail and eat it too. Whats great about mixologist
EbenFreemansrecipe is that its not just some cereal drowned in two kinds of liquor and
milk. Instead, the flavor of Kahlua is infused into the Rice Krispies cereal via
dehydration. The moisture disappears and youre left with a coffee-flavored cereal. So
now you can snap, crackle, pop and buzz your way to happy this morning in more ways
than one.
The Science behind It: Dehydration. Dehydration is the process of drawing moisture
(water) out of food in an effort to preserve or dry up its surface, according toMolecular
Gastronomy:Exploring the Science of Flavor by Herve This. Traditionally, this technique
been used primarily for preserving a surplus of foods like herbs or for more convenient
snacking (like dried fruit). In molecular gastronomy, however, dehydration is also used to
create crunchy textures, flavor powders or preserve the crispiness (and flavors) of foods
like Kahlua-infused Rice Krispies. Dehydration can be performed using a dehydrator or a
common household oven, provided that the oven can be set to temperatures below 200
degrees Fahrenheit.
Ingredients:
1/2 cup
of half
and half
1/2 cup
of Kahlua
liquor 1/8
cup of
Rice
Krispies
www.bitm.org.in Volume: 6 No: I February 2017 170 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
cereal 1/2
tsp. of
sugar 1/4
cup of
vodka
How to Make It: Youll want to make the Kahlua-infused Krispies ahead of time for this
crunchy cocktail. Toss the cereal with 1/4 cup of the Kahlua liquor in order to coat, then
in a dehydrator (or an oven on its lowest setting), dehydrate the Kahlua-coated cereal for
one hour. Repeat the aforementioned step for another coat of Kahlua. Depending on your
dehydrator or oven you may need to leave the cereal in it overnight to complete the
drying/crisping process. Once you have the cereal infused with the Kahlua, you can move
on to the milk part. Combine ice, vodka and sugar in a cocktail shaker and shake until
the sugar has dissolved. Strain the vodka/sugar and pour and stir it into the half and half.
When ready to serve, pour Kahlua Krispies into a bowl and add half and half/vodka/sugar
mixture. Stir to combine.

2. Oysters Topped With Passion Fruit Caviar


There are two sides to this molecular gastronomy recipe: the science of flavor pairings
and fruit caviar. According though it seems odd, oysters and passion fruit do go together
in terms of flavor. And you can always up the weird ante by turning your passion fruit
into little jelly pearls known as fruit caviar. Want to make oysters even fancier and more
romantic? Fruit caviar is the way to do it. And if youre feeling adventurous, check out
ourlist of other weird, but delicious food pairings. The Science behind It: Agar Agar. As
explained in the entry on Arugula Spaghetti, agar-agar can be used to create a variety of
gel shapes, even the passion fruit caviar pearls of this recipe. Though a different shape is
achieved this time using the agar-agar, its still considered the same process of
gelification as the entire pearl is a gummy-like gel (due to the unique properties of the
agar) rather a tough membrane encapsulating a pop of liquid, as youll see in the next
recipe.

Ingredients for Lexies Kitchens Passion Fruit Caviar:


1/2 cup of vegetable oil
1/3 cup of passion fruit juice puree
1/4 tsp. of agar agar powder
How to Make It: Chill the vegetable oil in a tall glass. Mix passion fruit juice and agar
agar in saucepan and bring to boil. Simmer for 2 minutes or until agar dissolves. Let
agar/juice mixture cool for 5 minutes. Fill a straw with the cooled mixture and let
droplets of it fall from the straw, one at a time, into the cold oil. The caviar pearls will
form on contact with the oil. Strain the caviar out of the glass and rinse with water. Until
youre ready to use them, store them in water. When youre ready to top your oysters
with the caviar, simply take them out of the water and place them on a paper towel. Pat
them dry and top your oysters.
Common Molecular Gastronomy Terms and Techniques
1. Sous-Vide: Translated as under vacuum, this French term means that the food
(usually meat or vegetables) has been cooked in an airtight plastic bag submerged in a
temperature-controlled water bath for a very long time. Food prepared this way is always
cooked evenly, with both the inside and outside equally tender.
www.bitm.org.in Volume: 6 No: I February 2017 171 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
2. Flash Frozen: With this molecular gastronomy technique, food is frozen almost
immediately often by using liquid nitrogen. This allows the water inside fruits, vegetables
and other fruits to freeze without creating large crystals or damaging the cell membranes,
thus preserving the texture of frozen foods (which would otherwise be mushy when
defrosted).
3. Faux Caviar: Using a process known as spherification, liquid food like olive oil, tea
and fruit juice can be turned into tiny little balls that look like caviar .The liquid is held in
its shape by a thin gel membrane and enjoyed as a solid.
4. Deconstructed: If you deconstruct a sand castle, you knock it down. This same idea
applies to deconstructed dishes, which feature separate building blocks instead of having
everything combined. Deconstructed dishes allow the diner to construct a customized
experience in his or her mouth.
5. Edible Paper: Made with potato starch and soybeans, these tasty sheets of paper are
often printed with edible fruit inks from a laser printer.
6. Powdered Food: Chefs use maltodextrin, a starch-like substance, to turn a high-fat
liquid like olive oil into a powder.
7. Foams: If youve ever had a meringue on top of a pie, youve eaten foam. Chefs are
now turning fruits, vegetables and cheese into foams using food stabilizers and
thickening agents.
Molecular gastronomy techniques, tools and ingredients
Techniques

Spherification - for producing acaviar-like spheres with new flavors (apple, olive
oil ...)
The use of emulsifiers
Aromatic component - gases trapped in a bag, a serving device, or the food itself
Whimsical or avant-garde presentation style
Unusual flavor combinations, such as combining savory and sweet and flavor
juxtaposition
Flash freezing
Creating new food textures (gels, foams, glass like food)
Cooking in a microwave for creating dishes that are cold or even frozen on the
outside with a hot liquid in the center
High pressure cooking
Improved temperature control
High-power mixing and cutting machines for example ultrasonic agitation to create
emulsions

Tools

Liquid nitrogen, for flash freezing without allowing the formation of large ice
crystals. Also used for freezing and shattering
Anti-griddle (chilled metal top), for cooling and freezing
Well controlled water baths for low temperature cooking
Food dehydrator
Centrifuge
www.bitm.org.in Volume: 6 No: I February 2017 172 | P a g e
International Journal BITM Transactions on EECC
ISSN No.0974-9527
Syringe, for injecting unexpected fillings
Ultrasound
Vacuum machine
Pressure cookers
pH meters
Tabletop distilleries

Ingredients
Gelling agents like methylcellulose
Sugar substitutes
Emulsifiers like soy lecithin and xanthan gum
Non-stick agents
Enzymes, for example transglutaminase - a protein binder, also called meat glue
Carbon dioxide, for adding bubbles and making foams
Hydrocolloids such as starch, gelatin, pectin and natural gums - used as
thickening agents, ellingagents, emulsifying agents and stabilizers, sometimes
needed for foams
Note by note cuisine:
Note by note cuisine was first proposed in 1994 (in the magazine Scientific American)
.The initial proposal was to improve food, and to make dishes entirely from compounds.
On 24 April 2009, the French chef Pierre Gagnaire (who has restaurants in a dozen cities
of the world: Paris, London, Las Vegas, Tokyo, Dubai, Hong Kong...) showed the first
note by note dish to the international press in Hong Kong. Then, in May 2010, two note
by note dishes were shown by the Alsatian chefs Hubert Maetz and Aline Kuentz at the
French-Japanese Scientific Meeting in Strasbourg. On 26 January 2011, at a banquet
before the Launching event of the International Year of Chemistry at the United Nations
Educational, Scientific and Cultural Organization, Paris, a whole note by note meal for
about 150 people was served by Potel et Chabot Catering Company. This meal was again
served in April 2011 to about 500 chefs receiving Michelin stars in Paris. And since the
number of note by note initiatives is becoming too big to be tracked Molecular
Gastronomy blends physics and chemistry to transform the tastes and textures of food
resulting in new and innovative dining experiences.

How Safe?
When people hear the words molecular gastronomy or molecular cuisine for the first time
they often mistakenly view it as unhealthy, synthetic, chemical, dehumanizing and
unnatural. This is not surprising given that molecular gastronomy often relies on fuming
flasks of liquid nitrogen, led-blinking water baths, syringes, tabletop distilleries, PH
meters and shelves of food chemicals with names like carrageenan, maltodextrin and
xanthan.The truth is that the "chemicals" used in molecular gastronomy are all of
biological origin. Even though they have been purified and some of them processed, the
raw material origin is usually marine, plant, animal or microbial. These additives have
been approved by EU standards and are used in very, very small amounts. The science
lab equipment used just helps modern gastronomy cooks to do simple things like
maintaining the temperature of the cooking water constant (water bath) , cooling food at

www.bitm.org.in Volume: 6 No: I February 2017 173 | P a g e


International Journal BITM Transactions on EECC
ISSN No.0974-9527
extremely low temperatures fast (liquid nitrogen) or extract flavor from food
(evaporator).
Eponymous recipes-
New dishes named after famous scientists include:

Gibbs - infusing vanilla pods in egg white with sugar, adding olive oil and
then microwave cooking. Named after physicist Josiah Willard Gibbs (1839-1903).
Vauquelin - using orange juice or cranberry juice with added sugar when whipping
eggs to increase the viscosity and to stabilize the foam, and then microwave
cooking. Named after Nicolas Vauquelin (1763-1829), one of Lavoisier's teachers.
Baume - soaking a whole egg for a month in alcohol to create a coagulated egg.
Named after the French chemist Antoine Baume (1728-1804).

References
[1] This H: La gastronomie moleculaire. Sciences des aliments. 2003, 23 (2): 187-
198. 10.3166/sda.23.187- 198. Article Google
[2] This H: La gastronomie moleculaire et physique. PhD thesis. 1995, Paris: VI
University Google
[3] Tresor de la langue franqaise: 2006, electronic version
[http://atilf.atilf.fr/tlf.htm], access 01/10/2006
[4] This H: Solutions are solutions, and gels are almost
solutions. Pure Appl Chem. ASAP article.
http://dx.doi.org/10.1351/PAC-CON-12-01-01, Published
online 2012-09-10
[5] Barham P, Skibsted LH, Bredie WL, Fr0st MB, M0ller P, Risbo J, Snitkjaer P,
Mortensen LM. Molecular gastronomy: a new emerging scientific discipline.
Chem Rev. 2010 Apr 14; 110(4):2313-65.
[6] This H.Food for tomorrow? How the scientific discipline of molecular
gastronomy couldchange the way we eat. EMBO Rep. 2006 Nov; 7(11):1062-6.

www.bitm.org.in Volume: 6 No: I February 2017 174 | P a g e

Vous aimerez peut-être aussi