Upload
vuthuy
View
212
Download
0
Embed Size (px)
Citation preview
A Call to the Joy of living, (Joie de vivre)
Dr. A. John Siluvai,Head, Postgraduate Department of English,
St.Philomena’s College (Autonomous), Mysore.
Abstract
The objective of this write-up is to explore from Literature the secret to the
joy of living. In the words of Mathew Arnold, the study of Literature, more
so English literature has the universality of its appeal to man as man and
offers consolation and stay in life. Poems, stories, dramas and fiction help
us work through the challenges we face from every day irritations to
loneliness, heartache and death. Literature is as vital to our lives as food
and shelter. It is a call to make our life happy and to drink it to its lees. The
real,perpetual, undying and eternal joy is assured for all the just only in the
life after life, although one can already have the taste of it in this mundane
life itself. This is the tenacious conviction of a few thinkers and poets and it
is imperative for us to unpack and unfold their thoughts and feelings so that
we can also live a life of joy (la joie de vivre).
Keywords:joie de vivre – the joy of living; carpe diem – Seize the day or
pluck the day; parousiac joy – the supreme spiritual or eternal or perennial
joy in life after life.
Introduction: The topic sentence is an invitation to man as a man to a life of
joy.Immediately the question arises to what kind of joy we are called? Is it a physical or
sensual joy? Or Is it an intellectual joy? Or is it a spiritual joy, the supreme bliss, the undying
eternal joy beyond the temporal? These are the questions that come uppermost to our
minds.Let us approach this string of questions in a literary perspective, for the simple reason
that great poets enjoy more sensibility than most of us and they manifest the truth remarkably
of what they have felt profoundly in their head and heart. For an example, you and I have
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 1
seen very often the rainbow. And it does not sensitize us as it does with men of sensibility.
When Wordsworth saw it, he shouted out of joy:
My heart leaps up when I behold
A rainbow in the sky:
So was it when my life began,
So is it now I am a man,
So be it when I grow old.
Or let me die!
The child is the father of the man
And I could wish my days
Bound each to each by natural piety
John Keats expressed his joy while seeing beauty embedded in all we behold and believe:
A thing of beauty is a joy for ever.
G.M. Hopkins was a Jesuit priest and poet. When he saw a falcon, soaring in the sky in the
morning, he bursts out: My heart in hiding stirred for a bird. He calls it the windhover. “I
caught this morning morning’s minion, kingdom of daylight’s dauphin, dapple-dawn-drawn
Falcon in his riding, the achieve of, the mastery of, the mystery of the thing, brute beauty and
valour and act, pride and plume: O my chevalier! He then slips into a deep meditation of the
beauty of Christ’s passion and death on the cross, which is more beautiful, a billion times told
lovelier and more dangerous because of the gash gold-vermillion of his precious blood.”
Most of us have read or heard several times the first miracle of Christ at the wedding party in
Cana in Galilee. But it does not stir us. When young Lord Byron in his class was asked by the
teacher to write a composition on the first miracle of Jesus, he did not write pages after pages
as expected by the teacher. He just wrote a single line: ‘The water saw its master and
blushed’ to the great intellectual joy of the teacher.
The joy of ‘Carpe Diem’:The Roman poet Horace in 65 B.C with his Epicurean background
declared: “while we're talking, envious time is fleeing: “Seize the day”, put no trust in the
future”.1 His famous saying ‘Carpe diem’, “Seize the day”, “Pluck the Day” has its
repercussions and reverberations in the life of priests, religious and the lay persons even to
this day. People repeat the words: Enjoy yourself while you have the chance. Enjoy the
pleasures of the moment without any concern for the future. In his poem, “Mignonne,
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 2
allonsvoirsi la rose”, Pierre Ronsard (1524-1585) advises a young girl that her age is like a
beautiful rose that has bloomed in the morning. Before it gets withered by the cruel sun, she
should pluck and enjoy it; otherwise, old age will soon dull and dim, sully, tarnish and ruin
her beauty. Similarly in his poem ‘To the Virgins, to Make Much Time’, Robert Herrick
advises us to gather the moments like the flowers:
Gather ye rosebuds while ye may,
Old Time is still a-flying;
And this same flower that smiles today
Tomorrow will be dying.
Andrew Marvell in his poem “To his Coy Mistress” says
But at my back I always hear
Time’s winged chariot hurrying near;
Now let us sport us while we may,
And now, like amorous birds of prey,
Rather at once our time devour
Than languish in his slow-chapped power.
This ‘carpe diem’ philosophy continues to haunt the present generation because we tend to
seek our joy in www (wealth, wine and women). Firstly most people are mad after money,
wealth, pelf and power. As Ben Jonson puts in his play ‘Volpone’, we seek joy in the
accumulation and possession of the shrine of gold and money which is nothing but the bane
of bliss. That is why D.H. Lawrence said: ‘Money is our madness, our vast and collective
madness’. You will all agree with me that the dirty money and wealth can never give us a
permanent joy of life. With money, one can procure a cart load of books, big libraries and
bookstalls. But can one get knowledge with money? With money one can buy tons of tablets.
But can one buy good health? One can buy and possess the whole world, but one cannot buy
heaven.
Secondly most people these days find real joy and happiness in drinking wine and alcohol.
Even the ancients believed that when the wine is in, the wit is out. And to corroborate this
statement, the reputed French poet Charles Baudelaire (1821 – 1867) rightly said: “You have
to be always drunk. That’s all there is to it.., it’s the only way. So as not to feel the horrible
burden of time that breaks you to earth, you have to be continually drunk. But on what?
Wine, poetry or virtue, as you wish. But be drunk!” 2
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 3
I am reminded of the Victorian poet Alfred Lord Tennyson who wants us to enjoy by
drinking in a different way. In “Ulysses” he makes the speaker state bluntly and baldly: “I
cannot rest from travel. I will drink life to the lees.” 3 He intends to drain the whole wine
glass of life, bottoms up, and swallow even the grainy dregs and sediments. Similarly in the
play, “The Admirable Crichton”, James Barrie makes one of the characters say: “Life is like a
cup of tea; the more heartily we drink, the sooner we reach the dregs”. Life must be enjoyed
to its last drop, to the maximum possible extent with its implications and ramifications.
Thirdly we are baffled at the sad situation of the pursuit of man on the carnal and sexual joy,
libidinal and erotic pleasure as stipulated by Sigmund Fraud. He says that people who are
behaviourally abnormal are always sexually abnormal, but many people who are normal
behaviourally are otherwise sexually abnormal. T. S. Eliot also blames sex, or rather
its commercialization, as both the cause and the symptom of the decay of Western
civilization in his famous poem ‘The Waste Land’(1922). He says that modern man seeking
after sex and wealth and neglecting his faith in God is a hollow man stuffed with straw. There
is in the present world a total pell-mell, a spiritual sterility and vacuum, loss of faith and
moral values, commercialization of life, and the paranoia of sexual perversion and
abnormality as postulated by Sigmund Freud.
At one time sex was considered sacramental, a consummation of conjugal love and means of
human development. But unfortunately in modern time, sex has become an animal urge with
no moral or social commitment. It is perverted and is utilized for carnal pleasure and
monetary benefits. It has therefore, become a source of degeneration and disease. It has also
led to the erosion of moral values and has turned to be a hurdle in man’s spiritual joy and
progress. Easy sexual relationship is found among all sections of society high or low, lay or
religious.Sex is the same as any other commodity. It could be bought and enjoyed without
any sense of morality. The poet, Eliot calls London, unreal city just like Baudelaire called
Paris unreal, because unbelievable things happen in such cities. Rape, lust, molestation and
cheating and corruption prevail without any hindrance.
In ‘Sailing to Byzantium,’ W. B. Yeats affirms that in the land of sexually charged youth in
Ireland, it is not suitable for old people to live there. “That is no country for old man. An aged
man is a paltry thing, / A tattered coat upon a stick,”4 because the young in one another’s
arms are caught in that sensual music and neglect the monuments of unaging intellect. Life
over there is all physical and sensual. He longs to sail to Byzantium and live in a place of
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 4
wisdom, devoid of sex, where he may once again feel at ease and devote his mind to things of
beauty which is a joy for ever in Byzantium.
A number of modernist poets and writers have expressed their social alienation and the
necessity to a life of joy in different terms. Therefore, ‘ acall to joy’ means for them not
wealth, wine and women. To E. Forster, it means“ aneternal moment”; James Joyce calls it
“epiphany”; Virginia Wolf terms it “a moment of being” and T. S. Eliot feels it as “a
moment in and out of time” as a possible means of salvation in the face of the
meaninglessness of a spiritually and emotionally arid, modern existence. These modern
writers and poets are almost reflecting what the metaphysical poet, Henry Vaughan
visualized in the 17th century in his famous poem ‘The World’. He expressed the real joy of
life by saying so beautifully: “I saw eternity the other night like a great ring of pure and
endless light, all calm, as it was bright” 6.Similarly in the poem ‘The Retreat’, he declares:
“Happy are those early days when I shined in my angel infancy….Oh! how I long to travel
back and tread that ancient track.... But ah, my soul with too much stay is drunk and staggers
in the way.” He seeks nothing but eternal joy. It is what the theologians call ‘Parousia’ the
effulgent light. It is undoubtedly the joy of accepting God and his teachings as revealed in the
sacred scriptures. Happy is the man who has placed his trust in the Lord. The poet firmly
believes that all men and women are liberated from the slavery of sin and Satan by Christ’s
death on the cross and the joy of resurrection and the assurance of eternal life by Christ. The
paradise lost has been regained and restored to man by the suffering and death of Christ on
the cross which has turned out to be the power and wisdom for the believers.
What is this perpetual, eternal life of joy promised to us and to which all of us are called? I
am really fascinated by the Victorian poet Robert Browning who says: “Life is probation and
the earth no goal, but a starting point of man”5. After the death of his wife, Elizabeth in 1861,
the poet is not dismayed and frustrated but has the hope and optimism of meeting her in the
life after life. He puts the appropriate Latin title to his poem “Prospice” (Look forward).
Taking death as a challenge, he makes a naked declaration: Fear death! To feel the fog in my
throat! the press of the storm, the power of the night, the post of the foe, the black minute!
Let death come in any form. He will confront it fully with indomitable courage, taste the
whole of it, endure its pain and misery and fight to the finish the full fury of death, not like a
dastard but heroes of the past. Like a true Christian, he has the optimism to fight gallantly the
black minute of death, because it is only a gate way to that illuminated peaceful world where
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 5
he will meet the ‘soul of his soul’, his wife and experience a profound joy and peace. This is
the ultimate joy and promise to which all of us are called, with no discrimination.
It may be difficult for us to comprehend the eternal and parousiac joy. It is an indwelling in
the triune God. It is something like a plunge in the immensity of God’s life and love which is
infinite and inexhaustible. God’s inexhaustible riches will never be comprehensibly seen,
enjoyed and loved by man. If you drop a stone on the surface of the ocean, the stone will
slowly sink down but eventually its downward trend will cease, once the bottom is reached.
But God being a bottomless abyss of Trinitarian life and love, man will sink ever deeper into
it without ever reaching the end of the process. Man will drink in life, God’s own life, and he
will never be entirely satiated, for as he drinks, his capacity of reception will further expand
and this newly expanded capacity will be the receptacle and repertoire of a further outpouring
of divine life Eternity is not a concept an abstraction. It is a person. It is an immersion into
the ever present Now of God’s own love and life7 (Bermejos). Past and future tenses are
incompatible with God who is simply is in the present. “Before Abraham was, I am” (John
8:58). Nor eternity is a frozen immobility, for God is essential Life replete with love. He is
the eternal present in whom we live and love mutually in a state of immortal and immense
joy (Mine).
Shakespeare has put it in short and succinct expression the secret of the joy of living in three
important phrases: firstly ‘Perfection is all.’ Be ye perfect as the heavenly Father is perfect.
Secondly ‘Ripeness is all’ 9. In King Lear, Edgar says to his Father “What! In ill thoughts
again, men must endure their going hence, even as their coming hither: ripeness is all” (King
Lear V, ii) and thirdly, “There is a special providence in the fall of a sparrow. If it be not
now, yet it will come. “The readiness is all” 10.
Finally it all depends upon our attitude to make life either blissful like heaven or horrible like
hell. As Milton says: “The mind is its own place, and in itself can make a heaven of hell, a
hell of heaven”11. Hamlet thought of the World as a prison with different cells, wards and
dungeons and Denmark as one of the worst dungeons. But there is nothing either good or bad,
but thinking makes it so. One must think well and work well, be righteous and upright,
honest, just, candid, sincere and outspoken, because ‘perfection is all’, ‘ripeness is all’ and
‘readiness is all’.
Works cited:
1. Horace: ‘Odes’ Book 1.112. Baudelaire Charles: ‘Enivrez-vous’ Les fleurs du Mal .
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 6
3. Tennyson Alfred Lord: ‘Ulysses’ 6-7
4. Yeats, W.B: ‘Sailing to Byzantium’ 9-10
5. Browning Robert: ‘The Ring and Book’, the Pope 1435 f.
6. Vaughan Henry: ‘The World’ 1-4.
7. Bermajos, A. M. Eschatology, Pune: JnanaDeepa, 1976.
8. Shakespeare: King Lear V, ii, 8-10
9. Shakespeare: Hamlet, V, ii, 234.
10. Milton John: ‘Paradise Lost’ Book I, 22.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 7
USAGE OF MASS MEDIA IN CONTEMPORARY SOCIETY
DR. Sukanya
Head, Department of Journalism and Mass Communication
St. Philomena’s College, Mysore -570015
Email: [email protected]
Abstract
These technological advances of the Internet and mobile phones have created
a new global culture and seem to impact on people’s perspectives. The
Internet culture has dared to take on to unbeaten paths to initiate educational,
cultural and psychological revolutions. Internet technology has raised the
level of awareness to hitherto unknown levels. A cursory glance at the studies
conducted across the globe compels one to take notice of the 'digital divide'
that has come about in the society. Usage of Mass Media in contemporary
society is considered for study because, to understand which medium is more
used by the public and to analyze whether the new media have made any
inroad into the existing media. This study was confined to four districts in
Karnataka (IT bowl of India). The sample consisted of 801 respondents. The
Survey method was found to be appropriate to conduct a study of this nature.
1. The print media is still a more popular medium than the new media. There
is no significant relation between age and newspaper and magazine reading
which means irrespective of age everybody reads newspapers and magazines
with few exceptions. 2. Television is watched by everyone irrespective of age
unlike radio which is being listened to more by youngsters than adults. 3.
There is a correlation between age and listening to the radio, age and using
computer, and age and surfing Internet both at home and office. 4. There is no
relation between age and owning personal mobile phone
Key terms: Society, Internet, Surfing, Browser, To chat, Social Networking
Introduction
Mass media which have proved to be the most successful channels of communication
excelled in creating a common culture. The advent of TV, in particular promoted the isolation
of human beings. Now, finally, there is a counter-trend. Howard Rheingold framed it
beautifully, when he wrote The Virtual Community, nearly 15 years ago: "Perhaps cyberspace
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 8
is one of those informal public places, where people can rebuild the aspects of community
that were lost when the malt shop became a mall. Theorists such as Louis Wirth and Talcott
Parsons have emphasized the importance of mass media as instruments of social control. In
the 21st century, with the rise of the internet, the two-way relationship between mass media
and public opinion is beginning to change.1
The mass media constitute a powerful and pervading force in our lives. We are exposed daily
to a bombardment of media messages. Most of the information we receive about our
community, our state, the nation and the world comes to us through newspapers, magazines,
television and radio.
The information and views communicated through these media have great impact on our
attitudes toward people, events and problems. Mass media expose people to a flood of
information almost narcotic sing reader, listener or viewer. Due to mass media the range and
amount of information available to the people has vastly increased.2
Significance of the Study: The new generation is now being raised with widespread
availability of Internet connectivity, with consequences on privacy, identity, and copyright
concerns. These "Digital natives" or netizens face a whole set of concerns that was not
present for earlier generations. Karnataka is one of the more advanced states with Bangalore
being the IT capital of the country. It is the right time to study whether people still are
exposed to traditional mass media when they have access to new media for more than a
decade now.
In the mid1990s one of the hot topics that dominated the sphere of discourse was regarding
sociability and the Internet. On the one hand people argued that there was something
innovative about the virtual communities whereas others were of the opinion that online
social networking would adversely affect the real life relationships of people.3
With the extending impact of media of mass communication on individuals and groups, the
Indian society overall is reacting swiftly. The pervasive effects of the various media on the
various spheres of the Indian life- economic, social, cultural, intellectual, religious and even
moral values are transforming rapidly.
Mass media are capable of creating various kinds of impact on mankind. They play a crucial
role in the function and change of any society. A study of social change cannot be done
without studying mass media. Therefore, in the present times when technology has brought
about changes in the society, mass media studies have become important.4
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 9
Research Methodology: The study makes an effort to measure the exposure of the
respondents to various media. The statistical techniques employed for data analysis are
described.
Primary Data: Primary data was collected from students and people by the use of structured
questionnaire method.
Sample Profile: The sample (800) was selected on the basis simple random sampling
technique. Since the study also pertains to Internet, it requires respondents who are the users
of Internet as well. Therefore the sample consists of users of media like newspapers, Radio,
magazines, TV and new media and excludes non users.
Specific Objectives
The specific objectives are as follows:
1. To analyze the frequency of utilization of mass media
2. To analyze the exposure to various media
Table-1:Showing frequency of media exposure by respondents:
MediaYES NO
Frequency Percent Frequency Percent t-value
Newspaper 706 88.1 95 11.9 21’.58
Magazine 447 55.8 354 44.2 3.29
Radio 508 63.4 293 36.6 7.59
TV 708 88.4 93 11.6 21.73
Computer 472 58.9 329 41.1 5.05
Internet at Home 312 39.0 489 61.0 -6.05
Internet at Office 239 29.8 562 70.2 -11.41
Personal Mobile Phone 600 74.9 201 25.1 14.09
t=21.58, p<0.01 df:799
From the table it can be deciphered the print media is still a more popular medium than the
new media. The reasons could be newspapers are cheap, easily available, portable, anywhere
and everywhere could be read, personal touch towards newspaper and people have been used
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 10
to read newspaper since their childhood as against new media . It is interesting to note that
TV as well as newspapers has the highest viewership and readership. A good percentage of
people (75%) own mobile phone whereas only 39% of them have Internet connection at
home.
Table- 2: shows reading of newspapers by respondents of different age groups
AgeNewspaper
TotalYes No
18-24 485 74 559
25-34 128 18 146
35-44 38 2 40
45-54 41 1 42
55 and Above 14 0 14
Total 706 95 801
2 = 8.34; NS; p > 0.05, df: 4There is no significant relationship between age of the respondents and the newspaper
reading (2 = 8.34; NS; p > 0.05 df: 4). It may be inferred that irrespective of age, people of
all age groups read newspapers. Age is independent of newspaper reading.
Table-3: shows the reading of magazines by respondents of different age groups
AgeMagazine
TotalYes No
18-24 296 263 559
25-34 81 65 146
35-44 27 13 40
45-54 31 11 42
55 and Above 12 2 14
Total 447 354 801
2 = 15; NS; p > 0.05, df: 4Magazines are read by everybody irrespective of age. But the type of magazines read may
vary from one age group to another so also time spent on reading. The table also reveals that
the number of youth who read newspaper and those who don’t is almost equal. But age is not
the factor for reading or not reading magazine
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 11
Table-4: shows listening radio by respondents of different age groups
AgeRadio
TotalYes No
18-24 367 192 559
25-34 74 72 146
35-44 28 12 40
45-54 27 15 42
55 and Above 12 2 14
Total 508 292 801
2 = 15.76; p < 0.05 df: 4It may be inferred that listening to radio varies from one age group to another. Younger the
age higher is the listening pattern. Radio appears to be more popular among the younger
people than older ones. There is high listening in the age group of 18-35 years.
Table-5: shows watching TV by respondents of different age groups
AgeTV
TotalYes No
18-24 490 69 559
25-34 129 17 146
35-44 35 5 40
45-54 41 1 42
55 and Above 13 1 14
Total 708 93 8012 = 4.09; NS; p > 0.05 df: 4,
Television is watched by everybody irrespective of age as it is an attractive audio visual
medium unlike radio where youngsters listen more compared to adults.
Table-6 shows using of Computers by respondents of different age groups
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 12
AgeComputer
TotalYes No
18-24 307 252 559
25-34 95 51 146
35-44 26 14 40
45-54 32 10 42
55 and Above 12 2 14
Total 472 329 8012 = 15.92; p < 0.05, df: 4
The reasons for the popularity of computers among the youngsters could be attributed to the
fact that they are exposed to computers since their childhood days where as adults were not,
as the computers set strong foot in India only after 1990s and the present adults most of them
are computer illiterates and or not computer savvy.
Table-7: shows owning personal mobile phone by respondents age wise
AgePersonal Mobile Phone
TotalYes No
18-24 412 147 559
25-34 109 37 146
35-44 34 6 40
45-54 34 8 42
55 and Above 11 3 14
Total 600 201 801
2 = 3.52; NS; p > 0.05, df: 4 The data shows that mobile phones are owned by everybody irrespective of age. Though it is
an assumed notion that youth are the maximum users of mobile phones the data indicates
there is no relation between age and owning personal mobile phone.
Analysis and Discussion:
The analysis of data was done by using percentage analysis and graphical representation. The
interpretation of data was done using chi-square and t- tests.
1. The print media is still a more popular medium than the new media. There is no significant
relation between age and newspaper and magazine reading which means irrespective of age
everybody reads newspapers and magazines with few exceptions.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 13
2. Television is watched by everyone irrespective of age unlike radio which is being listened
to more by youngsters than adults.
3. There is a correlation between age and listening to the radio, age and using computer, and age and surfing Internet both at home and office.
4. There is no relation between age and owning personal mobile phone.
Inferences and Implications of the StudyMedia have many facets in our daily life. It affects our thoughts, feelings and emotions
sometimes it affects our total behavior. The study in general reveals that though internet has
grown exponentially in India, surprisingly access to Internet among the respondents is very
limited. While newspapers and television rule the roost, radio and magazine follow suit. But
computers are still a far cry.
There is no significant relation between age and newspaper, magazine reading and television
viewing. But there is a significant relation between age and exposure to computers.
New media (Internet and mobile phone) are considered to be the marvels of the twentieth
century. It is an assumption that exposure to Internet is high among the younger generation.
The data revealed that people have embraced computers as one among mass media in their
day-to-day life.
Reference
1http://en.wikipedia.org/wiki/Louis_Wirth
2 PayalKamat, Essay on the Impact of Mass Media on people,http://www.preservearticles.com/2012011721059/essay-on-the-impact-of-mass-media-on-people.html
3 “Sociability and the Internet,” http://www.netinfluencer.com/mediapedia/sociability-and -
the internet, accessed September 18, 2011.
4http://www.preservearticles.com/2012011721059/essay-on-the-impact-of-mass-media-on-people.html
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 14
SYNTHESIS AND EVALUATION OF HYDROXYL BENZOPHENONE DERIVED METAL COMPLEXES AS ANTIDIABETIC AGENTS
RanjaniRao**, Gagan Patel**, Prof. Orthbert Pinto** and Dr. Asha M.S**Department of chemistry, St. Philomena’s College, Mysore-570015
ABSTRACT:
The M(II) complexes derived from hydroxyl benzophenone and o-
phenylenediamine have been synthesised. All the compounds were
characterized by elemental analysis, 1H NMR, FT-IR, UV-visible, Mass
spectroscopy, molar conductometry, magnetic susceptibility and thermal
analysis study. The FT-IR spectral study reveals that the ligand behaves as a
dibasic tetradentate ligand with N2O2 donor atoms sequence towards central
metal ion. The physico-chemical study reveals octahedral geometry for the
complexes. The results show the formation of 2:1(ligand: metal chloride)
complexes with amine and screened for anti-diabetic activity.
INTRODUCTION:
During the past two decades, considerable attention has been paid to the chemistry of metal
complexes containing nitrogen and other donor1. The tetradentate Schiff base complexes are
well known to form stable complexes, where coordination takes place through the N2O2
donor set2-4. N, O- bidentate and N2O2 -tetradentate ligands (soft and hard donor) possess
many, advantages such as facile approach, relative tolerance, readily adjusted ancillary
ligands, and tunable steric and electronic coordination environments on the metal center5.
This may be attributed to their potential application in many fields such as oxidation
catalysis6 and electrochemistry7. Transition metals are involved in many biological processes
which are essential to life process. The metals can coordinate with O- or N-terminals from
proteins in a variety of models and play a crucial role in the conformation and function of
biological macromolecules8, 9. This paper reports the synthesis, characterization, thermal and
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 15
biological studies of metal(II) complexes derived from the reaction of hydroxyl
benzophenone and o-phenylenediamine in alcohol.Diabetes mellitus (DM), which develops
many secondary complications such as atherosclerosis, microangiopathy, renal dysfunction
and failure, cardiac abnormality, diabetes retinopathy and ocular disorders, is classified as
either insulin-dependent type 1 or non-insulin-dependent type 2, according to the definition
of WHO. Although several types of insulin preparations for type 1 DM and those of synthetic
drugs for type 2 DM have been developed and clinically used, they have several problems
such as physical and mental pain due to daily insulin injections and defects involving side
effects, respectively. Over thousands of years, people have produced many types of inorganic
compounds, and the modern concept of chemotherapy was achieved by Ehrlich, who used an
arsenic-containing compound to treat syphilis. In the 21st century, a new class of
pharmaceuticals should be introduced. For this reason, metallopharmaceutical compounds
containing vanadium and zinc ions are expected to treat both types of DM, by making
effective use of unique characteristics of the metals. Focusing on the preparations and
coordination structures of the complexes and in vitro and in vivo evaluations as well as the
possible mechanism. Since then, many metallopharmaceutics have been developed
worldwide. This review will be helpful to researchers who are interested in the current states
of anti-diabetic metal complexes.
CHEMISTRY
Materials and Methods:
All the chemicals used in the preparation of Schiff base and its metal complexes were of AR
grade. A Perkin-Elmer CHN analyzer (model 2400) was used for C, H and N analyses.. The
electronic absorption spectra of the complexes were recorded as dilute solutions on a
Shimadzu 160A/240A UV-visible spectrophotometer. The 1H NMR spectra were recorded
using Bruker DRX 400 spectrometer at 400 MHz with TMS as the internal standard. Mass
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 16
spectra were obtained with a VG70-70H spectrophotometer. The infrared spectra of the solid
samples were recorded in the range 4000-500 cm-1 on a Perkin-Elmer 597/1650
spectrophotometer using KBr pellets.
METHODOLOGY:
A mixture of o-phenylenediamine (iii) and substituted hydroxybenzophenone (ii) in 1:2 molar
ratio in methanol was refluxed with constant stirring. This condensation reaction was carried
by using 3 drops of acetic acid for 5 hours. The formed water was removed from the reaction
mixture by using sodium sulphate as dehydrating agent. After completion of the reaction, the
mixture was reduced to half of its original volume and kept aside at room temperature. The
white precipitate (iv) was formed on slow evaporation.
iv: Yield 85%; M.p. 167oC; IR (Nujol): (C=N) 1665, (O-H) 3505 cm-1, 1H NMR (DMSO):
6.9-8.1 (m, 20H, Ar-H), 10.7 (bs, 2H, -OH phenolic). MS: m/z 536Anal.Calcd.for
C32H22Cl2N2O2: C, 71.51; H, 4.13; N, 5.21. Found: C, 71.63; H, 4.22; N, 5.62%.
A solution of ligand (iv) and cobalt(II) chloride hexa hydrate in 1:1 molar ratio in ethanol was
refluxed for 6 hours. The resulting solution was reduced to half of its volume and kept aside.
On standing, the obtained solid product was filtered off and washed with water and ethanol.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 17
RESULTS AND DISCUSSION
All the complexes vM1-M5 are colored, stable at room temperature, soluble in DMSO and
melt with decomposition above 250°C. Therefore the ligands and their complexes were
characterized on the basis of elemental analysis, 1H NMR, IR, magnetic susceptibility
measurement, electronic spectra data, melting point, partial elemental analyses and molar
conductivities.Benzophenone derivatives showed inhibition for alpha glucosidase. The
inhibition was measured by IC50 value calculation. The compound V-M5 showed maximum
inhibition at a concentration of 6.4µg/ml
BIOLOGY:Antidiabetic Activity:Some of the reported antidiabetic metal complexes are
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 18
The activity was performed using assay mixture of 5μl of enzyme alpha-glucosidase, 50μl of
substrate p-nitrophenyl-alpha-D-glycopyranoside and 10μg concentrations of different
inhibitors were taken in test tubes and they were incubated for 30mins at 30°c.Then, the
volume was made upto 1ml using phosphate buffer(0.1M,pH7). A tube containing only the
enzyme and substrate was used as the control. The absorbance was measured at 405nm.
Inhibitory activity was calculated by,
Inhibition(%)=Absorbance of the control-Absorbance of the sample/ Absorbance of the
control× 100
COMPOUNDS
IC50 value (μg/ml)
iv Ligand 7.7
V-M1 Co(II) 7.1
V-M2 Ni(II) 8
V-M3 Cd(II) 8.6
V-M4 Cu(II) 8.1
V-M5 Ag(I) 6.4
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 19
CONCLUSION
In conclusion, we have achieved efficient method for the preparations of Schiff bases and
evaluated antidiabetic activity. Some of the compounds exhibit minimum inhibition and
compound VM5 prove to be important antidiabetic agent.
REFERENCES
1. K. Y. ,A.Mayer , K.K.Cheung , Inorg, Chem, Acta. 1999, 285:223-232.
2. A.A.A. Emara, B.A. El-Sayed, et al. SpectrochimicaActaA 2008, 69 , 757–769.
3. H. Keypour, M. Shayesteh, et al. Molecu. Stru.2013,1032, 62.
4. A.A. El-Sherif, M.R. Shehata, et al. SpectrochimicaActa A.2012, 96, 889.
5. Mei Wang, Hongjun Zhu, et al. J. Catal.2003, 220, 392-398.
6. S. S. Djebbar , B. O Benanli, et al. Trans.Met. 1998, 23, 443-447.
7. Y. J. Hamada , Electron Transition. 1997 , 44 , 1208.
8. E. Colacio, M. Ghazi, et al. Inorg.Chem. 2000, 39, 2882.
9. A. Karaliota, O. Kresti, et al. J. Inorg. Biochem.2001, 84, 33.
10. Asha M S, Bushra Begum A, et al. International Journal of Medicine and
pharmaceuticalSciences. 2014,4, 3, 41-52.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 20
Financial Performance of Private Sector Banks With Reference to ICICI Bank And
Selected Private Banks.
Dr. Oshma Rosette Pinto & Mr. Mohammed Hussein Ali Al-ShaweshDept. of Commerce St Philomena’s College Mysore
ABSTRACT
For the development of the economy of the country, a sound, effective and
hassle- free banking system is important. A study is conducted to compare the
financial performance of the ICICI bank with major selected banks in the same
private sector.The objective of the study was to compare the performance of
ICICI bank with major selected banks. The selected banks for the study are
AXIS, HDFC and Kotak Mahindra. The ratios taken for the study are Interest
spread, Net profit margin, return on net worth, Total assets turnover ratio,
return on assets, Credit deposit ratio, Cash deposit ratio and Liquid assets to
demand deposit. The sample for the study taken was 5 years (2012 to 2017) of
financial statements. To analyze the variance of the mean among the selected
banks, Variance analysis and ANOVA test has been conducted. Through
analysis it is found that the ICICI bank has achieved a better position on net
profit margin and debt coverage ratio with positive differences in comparison
of ICICI Bank and selected private banks. On the contrary it has not fared well
in terms of Return on Assets, Return on Net worth, total assets ratio. The main
recommendation of the study is Merger of Axis bank and ICICI which has more
potential in terms net worth and return on assets. The combination of these two
banks will become the greatest private bank in India and shall be easy to
expand in the world.
.
Key words-Banks, Performance, Ratios, Variance Analysis, ANOVA,
INTRODUCTION
The banking sector plays an important role in efficient functioning of the economy of the
country. It plays an essential role our day to day transactions. They act as intermediaries, help
us to pool and channelize the savings. From past few years Indian banks have made
achievements which are outstanding. Since a diversity of models and advance technology
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 21
have been emerged among finance industries, some of the traditional banking eminences
between banks, insurance companies, and securities firms have belittled. Though there are
changes in the banking sector still banks maintain and perform their primary role of accepting
deposits and lending funds from these deposits. In India the banks have been sported by an
expectant network of branches that cater the financial needs of all walks of people. Today
those who have no education or minimal literacy are keen to know the financial performance
of the banks in which they deposit or make an invest. Earlier financial analysis was done
through only by going through the records and files but now we use tools or techniques to
make analysis. Some of them are Ratio Analysis, Comparative statement analysis, Time
series analysis, Common size analysis. The selection of these tools is mere choice of the user
as well as interpretation of the same depends on the need and intelligence of the user.
Literature Review
1. Biswal, B. P., & Gopalakrishnan, R. (2014). Here the author examines the factors and their
effect on profitability in banks which is estimated by Net Interest Margin. By using
secondary data, the study classifies banks operating in India under high Credit Deposit ratio
and low Credit Deposit ratio.
2. Chandran, D., & Francis, P. (2014).Here the authors in their study have made an attempt to
analyze the relationship between inflation rate and prime lending rate in India. Comparison of
inflation with prime lending rates of SBI and ICICI Bank with the help of tools like
correlation, regression, and ANOVA. The results showed that the lending and inflation rates
are negatively correlated.
3. D. Padma and V.Arulmathi (2013)- The authors have conducted study to compare the
efficiency and solvency position of SBI and ICICI banks. The findings of the study are both
the banks are maintaining required standards and running smoothly. Further study of SBI
shows that there are significant differences on the performance of SBI and ICICI Bank in
terms of Deposits, Advances, Investments, Net profit, and Total assets
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 22
4. Jaiswal, A., Jain, C (2016)- To study the financial performance between SBI and ICICI
banks, the author has not only compared financial performance through ratio analysis but also
found the market position of the both banks.
5. Malhotra, N. (2015). Here the author has explained the financial soundness of the three
banks SBI, ICICI and Standard Bank. The data used is secondary for the study. The study
results in terming that growth of assets is more in ICICI bank. The SBI shows growth in
advances and deposits whereas standard charted bank efficiently controls expenditure as well
income compared to the other banks. The study suggests that SBI has to improve its financial
position to match with these two banks.
6. Prakash P., Sundararajan, S. (2016) The study is quantitative analytical research with
fundamental and technical analysis. Here the research is based on the secondary data and the
tools used for analysis are Ratio analysis, Beta Analysis (β), Relative Strength Index (RSI)
and Rate of Change (ROC).
7. Sharma, R., Goswami, A., & Kumar, P. (2014). The authors have made an evaluation of
performance of Indian privatization. Since liberalization, the banking system in India has
under gone a various reform. Current new privatization has best technology, manpower and
efficiency. It is managed by professionals. Due to the new era of banking system it has
attracted customers and marketed the financial products.
8. Singh, A. K. (2015). The author has conducted study in analysis of profitability position of
private bank in India like AXIS, ICICI, Karur Vysa bank (KVB), YesBank,and highlight the
overall profitability of bank (i.e.) Interest spread, Net profit margin, return on long term fund,
return on net worth & Return on assets, Adjusted cash margin.
9. Singh, A., & Tandon, P. (2012). The authors conducted a study in financial performance: a
comparative analysis of SBI and ICICI bank. The study found that the mean of Credit
Deposit Ratio and interest expenses in ICICI was higher than in SBI. The interest income in
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 23
SBI was higher as compared to ICICI. This clearly indicated that people prefer ICICI to
invest their savings and SBI to take loans & advances.
10. Singh, J. P., Seth, M. (2017)- The author has taken CAMEL approach to compare the
Capital Adequacy with public and private sector banks. He has selected only one parameter
from Capital Adequacy, Asset Quality, Management Quality, Earning Quality and Liquidity.
RESEARCH GAP
Though there is much studies on this sector, the researchers have not focused on comparison
of Banks interms of total assets and Market Capitalization. There is no research on the study
of mean differences performance among the selected private sector banks.
OBJECTIVES OF THE STUDY
1. To analyze and comparethe financial performance of ICICI bank with selected private sector
banks.
2. To find the variance of mean among selected private sector banks.
Hypotheses of The Study
H01: There is no significant difference between net profit margin among different selected
private sector banks in India.
H02: There is no significant difference between Return on net worth among different selected
private sector banks in India.
H03: There is no significant different between Return on assets among different selected
private sector banks in India.
H04: There is no significant difference between interests spread among different selected
private sector banks in India.
H05: There is no significant difference between credit deposit ratio among different selected
private sector banks in India.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 24
H06: There is no significant difference between cash deposit ratio among different selected
private sector banks in India
H07: There is no significant difference between asset turnover ratio among different selected
private sector banks in India.
H08: There is no significant difference between liquid assets to demand deposit among
different selected private sector banks in India.
Methodology
The research design adopted for the study are experimental and Descriptive in nature. The
data collected is based on secondary data. It is collected from Financial Statements published
from 2012-2017, books Magazines, thesis and websites of the banks taken for the study and
from Reserve Bank of India.
To analyze and interpret the collected data, the financial and statistical tools are used to find
the financial performance of the ICICI bank in comparison with selected private sector banks.
The financial tools used for the study is Ratio analysis. The ratios are selected for this Study.
Interest spread, Net profit margin, return on net worth, Total assets turnover ratio Return on
assets Credit deposit ratio, Cash deposit ratio and Liquid assets to demand deposit. he
Statistical tools used for the study are Mean, Standard deviation, Co-efficient of variance and
ANOVA.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 25
ANALYSIS OF THE RESULTS
1. RATIO ANALYSIS
Table-1 Financial Performance of Private Sector Banks with Reference to ICICI Bank and Selected Private Banks
Banks Net Profit Margin
Return on Net worth
Return on Assets
Interest spread
Credit deposit Ratio
CashDepositRatio
Total AssetsTurnover ratio
Liquid assets todemand deposit ratio
ICICI 20.65 13.294 1.5 7.304 106.818 6.678 6.878 111.136HDFC 19.93 18.006 1.858 8.092 83.808 6.51 9.26 38.698AXIS 19.99 16.59 1.68 7.206 82.552 5.942 8.3 50.976Kotak Mahindra 20.438 13.116 2.092 8.788 130.434 5.37 10.36 62.674
Source: Annual Reports Of ICICI, HDFC, AXIS AND KOTAK MAHINDRA Banks
Graph- 1 Financial Performance of Private Sector Banks with Reference toICICI Bankand Selected Private Banks
0
20
40
60
80
100
120
140
20.6
5
13.2
94
1.5 7.
304
106.
818
6.67
8
6.87
8
111.
136
19.9
3
18.0
06
1.85
8
8.09
2
83.8
08
6.51 9.26
38.6
9800
0000
0001
19.9
9
16.5
9
1.68 7.
206
82.5
52
5.94
2
8.3
50.9
76
20.4
38
13.1
16
2.09
2
8.78
8
130.
434
5.37 10
.36
62.6
74
FINANCIAL PERFORMANCE OF PRIVATE SECTOR BANKS WITH REFERENCE TO ICICI BANK AND SELECTED PRIVATE BANKS.
ICICI HDFC AXIS Kotak Mahindra
Interpretation: In the table we can find that the average net profit margin of ICICI bank is
more than the other private banks, followed by Kotak Mahindra Bank, Axis and HDFC bank
respectively. The average return on net worth of HDFC bank is the highest compare to other
banks followed by Axis Bank, ICICI Bank and Kotak Mahindra Bank respectively. From
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 26
the table. it’s clear that Kotak Mahindra bank has highest average return on assets compared
to other banks, followed by HDFC bank, Axis Bank and ICICI bank respectively. It
indicates the weak position of the ICICI bank in return on total assets. It is clear that Kotak
Mahindra Bank has got highest average interest spread compared to other banks, followed by
HDFC Bank, ICICI Bank and Axis Bank respectively. It indicates the weakness of ICICI
bank in total interest income and expenses to average working fund.
Kotak Mahindra Bank has the average highest Credit deposit ratio compared to other banks,
followed by ICICI bank, HDFC Bank and Axis Bank respectively. Though ICICI bank is
second in line for Credit deposit ratio, it still shows that ICICI bank is able to generate more
loans for the deposit received as compared to HDFC and AXIS banks. ICICI Bank has
highest Cash deposit ratio compared to other banks, followed by HDFC Bank, Axis Bank and
Kotak Mahindra Bank respectively. It indicates that ICICI Bank has more deposit compared
to other banks. Kotak Mahindra Bank has highest total assets turnover ratio compared to
other banks, followed by HDFC bank, Axis Bank and ICICI Bank respectively. It shows that
ICICI bank is less efficient in generating revenue from their assets. The ICICI Bank has
highest Liquid assets demand deposit ratio compared to Kotak Mahindra Bank, Axis Bank
and HDFC Bank respectively. It shows that ICICI bank has the highest ability to meet
immediately and short-term deposit by cash or online banking or ATM. But in another side
the high percentage will reflect that the bank did not mobilize the cash effectively in short-
term investment.
2. ANALYSIS OF VARIANCES
PARTICULARS ICICI HDFC AXIS KOTAK MAHINDRAMEAN 20.65 19.93 19.99 20.438SD 2.147 1.022 0.752 2.210CV 0.104 0.051 0.038 0.108
Table-2 Analysis of mean Standard deviation, Coefficient of Variance of Net profit marginSource: Annual reports of ICICI,HDFC,AXISAND KOTAK MAHINDRA banks
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 27
Interpretation-From the table, it has been evident that ICICI has the highest mean valueof
net profit margin (20.65) compare to other banks. Kotak Mahindra bank has the highest
standard deviation of net profit margin (2.210) as well as co efficient of variance (0.108)
compared with other banks, followed by ICICI Bank, HDFC Bank and Axis Bank
respectively. ICICI Bank has highest Mean value (20.65) with moderate standard deviation
(2.147) and co-efficient of variance (0.104) on Net Profit Margin.
Table -3 Analysis of mean, standard deviation, coefficient of variance of Return on net worthPARTICULARS ICICI HDFC AXIS KOTAK MAHINDRAMEAN 13.294 18.006 16.59 13.116SD 1.446 1.218 1.198 1.638CV 10.877 6.764 7.221 12.488Source:Annual reports of ICICI, HDFC, AXISAND KOTAK MAHINDRA banks
Interpretation- As per the table it has been found that Axis Bank has highest Mean value of
returns on net worth compare to other banks. The Standard Deviation and Coefficient
variance of Kotak Mahindra BankF Return on Net worth is higher than other banks. ICICI
Bank has moderate Mean Value(13.294) which is lesser than HDFC and AXIS Banks,
moderate Standard deviation (1.446) and co-efficient variance (10.877) lesser than Kotak
Mahindra bank followed by AXIS and HDFC Bank respectively on Return on Net worth.
Table-4 Analysis of Mean,Standard deviation, co-efficient of variance of Return on assets
PARTICULARS ICICI HDFC AXIS KOTAK MAHINDRAMEAN 1.5 1.858 1.68 2.092CD 0.173 0.095 0.06 0.197CV 11.556 5.083 3.572 9.424Source: Annual reports of ICICI, HDFC, AXISAND KOTAK MAHINDRA banks
InterpretationFrom the table, it has been evident that the return on assets of Axis Bank has
highest mean value (2.092) of Return on assets compare to the other banks.The Standard
deviation of Kotak Mahindra bank (0.197) of Return on assets is highest compare to ICICI
bank, followed by HDFC and Axis Banks.ICICI Bank has the lowest mean value (1.5),
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 28
moderate standard deviation (0.173) and highest coefficient variance (11.556) compared to
other banks on Return on assets.
Table 5: Analysis of Mean, Standard Deviation, Coefficient of Variance of Interests SpreadPARTICULARS ICICI HDFC AXIS KOTAK MAHINDRAMean 7.304 8.092 7.206 8.788SD 0.322 0.528 0.650 0.643CV 4.413 6.525 9.016 7.317Source: Annual reports of ICICI, HDFC, AXISAND KOTAK MAHINDRA banks
Interpretation-From the table, it has been evident that The Kotak Mahindra Bank has the
highest interest spread (8.788) compare to other banks The Axis Bank has highest standard
deviation (0.650) and co efficient of variance (9.016) of interests spread compare to other
banks, followed by Kotak Mahindra Bank, HDFC Bank and ICICI Bank respectively. The
ICICI Bank has moderate Mean value (7.304) with lowest standard deviation (0.322)and Co
efficient Variance (4.413) compare to other banks on Interests spread.
Table 6: Analysis of Mean, standard deviation, coefficient of variance Credit deposit ratioPARTICULARS ICICI HDFC AXIS KOTAK MAHINDRAMEAN 106.818 83.808 82.552 130.434SD 4.288 3.233 6.606 13.951CV 4.014 3.858 8.002 10.696Source: Annual reports of ICICI, HDFC, AXIS AND KOTAK MAHINDRA banks
Interpretation As per Table, it has been found that Kotak Mahindra Bank has highest Mean
value (130.434), Standard deviation (13.951) and Co-efficient of variance (10.696)of Credit
deposit compare to other banks. ICICI Bank has the moderate mean value (106.818),
Standard deviation (4.288) and Co efficient of variance (4.014) compare to other banks on
credit deposit
Table 7: Analysis of Mean, standard deviation, coefficient of variance of cash to deposit
PARTICULARS ICICI HDFC AXIS KOTAK MAHINDRAMEAN 6.678 6.51 5.942 5.37SD 0.638 1.338 0.316 0.658
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 29
CV 9.559 20.547 5.309 12.251Source:Annual reports of ICICI, HDFC, AXIS, AND KOTAK MAHINDRA banks Interpretation- As per Table it has been found that ICICI bank has the highest mean value
(6.678) of cash to deposit compared to other banks. The standard deviation of the Kotak
Mahindra bank (0.658) is the highest compared to others and has the highest coefficient of
variance (12.251) of cash to deposit. ICICI Bank has highest mean value (6.678), Moderate
Standard deviation (0.638) and lower co efficient of variance (9.559) on cash deposit
Table -8 Analysis of mean, standard deviation, coefficient of variance of Total assets turnover ratio
PARTICULARS ICICI HDFC AXIS KOTAK MAHINDRAMEAN 6.87 9.26 8.3 10.36CD 0.14 0.2 0.22 0.43CV 2.038 2.160 2.650 4.151Source: Annual reports of ICICI, HDFC, AXISAND KOTAK MAHINDRA banks
Interpretation As per the table it has been found that Kotak Mahindra bank has the highest
mean value (20.36), highest standard deviation and Co efficient of variance (4.151) of total
assets ratio. ICICI bank has the lowest mean value (6.87), standard deviation of Asset
turnover ratio of the ICICI bank (0.14) with the coefficient of variance (2.037846) when
compared to other banks
Table-9 Analysis of mean, standard deviation, coefficient of variance of liquid assets to demand depositPARTICULARS ICICI HDFC AXIS KOTAK MAHINDRAMEAN 111.136 51.77 50.976 62.674CD 12.9 8.251 12.189 11.98CV 11.60 15.93 23.91 19.11Source: Annual reports of ICICI, HDFC, AXIS AND KOTAK MAHINDRA banks
Interpretation From the above table it is clear that ICICI Bank (111.136) has the highest
mean value, Standard deviation (1.290) and co efficient of variance (1.160) of liquid assets to
demand deposit compare to the other banks. it is clear that the position of ICICI Bank is
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 30
better in compassion with HDFC, AXIS, KOTAK bank because high liquid assets indicate
better position to meet the immediate and short-term deposits
HYPOTHESIS TESTING
3. ANALYSIS OF ANOVA
H01 : There is no significant difference between Net profit margin among selected private
sector banks in India.
Table 10Sources of variation
Sum of Squares
Degrees of freedom
Mean Square
F(calculated value)
Table value (at 5% level of significant)
Between Groups 1.827 3 .609 0.219 0.881Within Groups 44.400 16 2.775Total 46.227 19
Interpretation- As per the table the calculated value of F (0.219) is less than the table value
(0.881). We accept Null Hypothesis and conclude that, there is no significant difference
between net profit margin amongICICI, HDFC, AXIS and KOTAK Mahindra private sector
banks in India.
H02: There is no significant difference between Return on net worth among different selected
private sector banks in India.
Table 11:
Sources of variation
Sum of Squares
Degrees of freedom
Mean Square
F(calculated value)
Table value (at 5% level of significant ).
Between Groups
88.855 3 29.618 15.395 .000
Within Groups
30.781 16 1.924
Total 119.636 19Interpretation: As per the table, the calculated value of F test (15.395) is more than the
tabulated value, hence reject null hypothesis and conclude that there is a significant
difference between Return on net worth among ICICI, HDFC, AXIS and KOTAK Mahindra
private sector banks in India.
H03: There is no significant difference between Return on assets among selected private
sector banks in India.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 31
Table 12:Sources of variation
Sum of Squares
Degrees of freedom
Mean Square
F(calculated value)
Table value (at 5% level of significant ).
Between Groups .959 3 .320 15.701 .000Within Groups .326 16 .020Total 1.285 19
Interpretation: As per the table, the calculated value of F test (15.701) is more than the
tabulated value, hence reject null hypothesis and conclude that there is a significant
difference between Return on Return on assets among ICICI, HDFC, AXIS and KOTAK
Mahindra private sector banks in India.
H04: There is no significant difference between Interests spread among selected private
sector banks in India.
Table 13:
Sources of variationSum of Squares
Degrees of freedom
Mean Square
F(calculated value)
Table value (at 5% level of significant ).
Between Groups 8.256 3 2.752 9.034 0.001Within Groups 4.874 16 .305Total 13.130 19Interpretation:As per the table, the calculated value of F test (9.034) is more than the
tabulated value, hence reject null hypothesis and conclude that there is a significant
difference between Interest spread among ICICI, HDFC, AXIS and KOTAK Mahindra
private sector banks in India.
H05: There is no significant difference between credit deposit ratio among selected private
sector banks in India.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 32
Table 14: Sources of variation
Sum of Squares
Degrees of freedom
Mean Square
F(calculated value)
Table value (at 5% level of significant ).
Between Groups 7680.327 3 2560.109 38.337 .000Within Groups 1068.461 16 66.779Total 8748.788 19Interpretation- As per the table, the calculated value of F test (38.337) is more than the
tabulated value, hence reject null hypothesis and conclude that there is a significant
difference between credit deposit ratio among ICICI, HDFC, AXIS and KOTAK Mahindra
private sector banks in India
H06: There is no significant difference between cash deposit ratio among selected private
sector banks in India.
Table 20: Sources of variation
Sum of Squares
Degrees of freedom
Mean Square
F(calculated value)
Table value (at 5% level of significant ).
Between Groups 5.287 3 1.762 2.583 .089
Within Groups 10.917 16 .682
Total 16.205 19
Interpretation- As per the table, the calculated value of F test (2.583) is more than the
tabulated value (0.089), hence reject null hypothesis and conclude that there is a significant
difference between cash deposit ratio among ICICI, HDFC, AXIS and KOTAK Mahindra
private sector banks in India.
H07: There is no significant difference between Asset Turnover ratio among selected
private sector banks in India.
Table 21:
Sources of variation Sum of
SquaresDegrees of freedom
Mean Square
F(calculated value)
Table value (at 5% level of significant ).
Between Groups 32.744 3 10.915 144.869 .000Within Groups 1.205 16 .075Total 33.950 19
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 33
Interpretation-As per the table, the calculated value of F test 144.869) is more than the
tabulated value (0.000), hence reject null hypothesis and conclude that there is a significant
difference between Asset Turnover ratio among ICICI, HDFC, AXIS and KOTAK
Mahindra private sector banks in India.
H08: There is no significant difference between liquid assets to demand deposit among
different selected private sector banks in India
Table 22:
Sources of variation Sum of
SquaresDegrees of freedom
Mean Square
F(calculated value)
Table value (at 5% level of significant ).
Between Groups 12184.216 3 4061.405 30.849 .000Within Groups 2106.475 16 131.655Total 14290.691 19Interpretation-As per the table, the calculated value of F test (30.849) is more than the
tabulated value (0.000), hence reject null hypothesis and conclude that there is a significant
difference between liquid assets to demand deposit among ICICI, HDFC, AXIS and KOTAK
Mahindra private sector banks in India.
SUMMARY OF FINDINGS
1. Ratio Analysis
a. The average net profit margin of ICICI bank is more than the other private banks, followed
by Kotak Mahindra Bank, Axis and HDFC bank respectively.
b. The average return on net worth of HDFC bank is the highest compare to other banks
followed by Axis Bank, ICICI Bank and Kotak Mahindra Bank respectively.
c. The Kotak Mahindra bank has highest average return on assets compared to other banks,
followed by HDFC bank, Axis Bank and ICICI bank respectively. It indicates the weak
position of the ICICI bank in return on total assets.
d. The Kotak Mahindra Bank has got highest average interest spread compared to other banks,
followed by HDFC Bank, ICICI Bank and Axis Bank respectively. It indicates the weakness
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 34
of ICICI bank in total interest income and expenses to average working fund.
e. Kotak Mahindra Bank has the average highest Credit deposit ratio compared to other banks,
followed by ICICI bank, HDFC Bank and Axis Bank respectively. Though ICICI bank is
second in line for Credit deposit ratio, it still shows that ICICI bank is able to generate more
loans for the deposit received as compared to HDFC and AXIS banks.
f. ICICI Bank has highest Cash deposit ratio compared to other banks, followed by HDFC
Bank, Axis Bank and Kotak Mahindra Bank respectively. It indicates that ICICI Bank has
more deposit compared to other banks.
g. Kotak Mahindra Bank has highest total assets turnover ratio compared to other banks,
followed by HDFC bank, Axis Bank and ICICI Bank respectively. It shows that ICICI bank
is less efficient in generating revenue from their assets.
h. The ICICI Bank has highest Liquid assets demand deposit ratio compared to Kotak Mahindra
Bank, Axis Bank and HDFC Bank respectively. It shows that ICICI bank has the highest
ability to meet immediately and short-term deposit by cash or online banking or ATM. But in
another side the high percentage will reflect that the bank did not mobilize the cash
effectively in short-term investment.
2. Analysis of Variances
a. The ICICI has the highest mean value of net profit margin (20.65) compare to other banks.
Kotak Mahindra bank has the highest standard deviation of net profit margin (2.210) as well
as co efficient of variance (0.108) compared with other banks, followed by ICICI Bank,
HDFC Bank and Axis Bank respectively. ICICI Bank has highest Mean value (20.65) with
moderate standard deviation (2.147) and co-efficient of variance (0.104) on Net Profit
Margin.
b. The Axis Bank has highest Mean value of returns on net worth compare to other banks. The
Standard Deviation and Coefficient variance of Kotak Mahindra Bank of Return on Net
worth is higher than other banks. ICICI Bank has moderate Mean Value (13.294) which is
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 35
lesser than HDFC and AXIS Banks, moderate Standard deviation (1.446) and co-efficient
variance (10.877) lesser than Kotak Mahindra bank followed by AXIS and HDFC Bank
respectively on Return on Net worth.
c. The return on assets of Axis Bank has highest mean value (2.092) of Return on assets
compare to the other banks. The Standard deviation of Kotak Mahindra bank (0.197) of
Return on assets is highest compare to ICICI bank, followed by HDFC and Axis Banks.
ICICI Bank has the lowest mean value (1.5), moderate standard deviation (0.173) and highest
coefficient variance (11.556) compared to other banks on Return on assets.
d. The Kotak Mahindra Bank has the highest interest spread (8.788) compare to other banks The
Axis Bank has highest standard deviation (0.650) and co efficient of variance (9.016) of
interests spread compare to other banks, followed by Kotak Mahindra Bank, HDFC Bank and
ICICI Bank respectively. The ICICI Bank has moderate Mean value (7.304) with lowest
standard deviation (0.322) and Co efficient Variance (4.413) compare to other banks on
Interests spread.
e. The Kotak Mahindra Bank has highest Mean value (130.434), Standard deviation (13.951)
and Co-efficient of variance (10.696) of Credit deposit compare to other banks. ICICI Bank
has the moderate mean value (106.818), Standard deviation (4.288) and Co efficient of
variance (4.014) compare to other banks on credit deposit
f. The ICICI bank has the highest mean value (6.678) of cash to deposit compared to other
banks. The standard deviation of the Kotak Mahindra bank (0.658) is the highest compared to
others and has the highest coefficient of variance (12.251) of cash to deposit. ICICI Bank has
highest mean value (6.678), Moderate Standard deviation (0.638) and lower co efficient of
variance (9.559) on cash deposit
g. The Kotak Mahindra bank has the highest mean value (20.36), highest standard deviation and
Co efficient of variance (4.151) of total assets ratio. ICICI bank has the lowest mean value
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 36
(6.87), standard deviation of Asset turnover ratio of the ICICI bank (0.14) with the coefficient
of variance (2.037846) when compared to other banks
h. The ICICI Bank (111.136) has the highest mean value, Standard deviation (1.290) and co
efficient of variance (1.160) of liquid assets to demand deposit compare to the other banks. it
is clear that the position of ICICI Bank is better in compassion with HDFC, AXIS, KOTAK
bank because high liquid assets indicate better position to meet the immediate and short-term
deposits.
3. Hypothesis Testing
There is no significant difference between net profit margin among ICICI, HDFC, AXIS and
KOTAK Mahindra private sector banks in India, Since the calculated value of F is less than
the table value. We accept Null Hypothesis. The other hypothesis (H02 to H08)there is a
significant difference between Return on net worth, return on assets, Interests spread, credit
deposit ratio, cash deposit ratio, Asset turnover ratio and liquid assets to demand deposit
among ICICI, HDFC, AXIS and KOTAK Mahindra private sector banks in India, Since the
calculated values are higher than the table value. Hence, we reject the null hypothesis (H0 2 to
H08) and accept the alternate hypothesis. This clearly indicates that there are positive
differences in comparison of ICICI Bank and selected private banks.
SUGGESTIONS
1. ICICI Bank has to increase its net profit margin.
2. ICICI bank has to increase its return on equity percentage by buying back their stock,
increasing earning, or using more debt to fund operation.
3. ICICI bank should review the managerial performance to improve the efficiency of
management in the future and increase generating revenue from its assets because it has the
lowest return on assets and Asset turnover ratio
4. In credit and cash deposit ratio ICICI bank has good position. So, the bank has to continue in
the same policy and standard to successes.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 37
5. It’s important for ICICI bank to mobilize the cash effectively in short-term investments
6. It’s important to conduct study in depth financial analysis adequacy capital of ICICI bank
with its peers.
7. In depth merger of ICICI bank with AXIS bank which has more potential in terms net worth
and return on assets. The combination of these two banks will become the greatest private
bank in India and shall be easy to expand in the world.
CONCLUSIONS
With various techniques applied in finding the financial performance of the ICICI Bank,
HDFC Bank, AXIS Bank and Kotak Mahindra Bank, we find that ICICI bank has got the
highest net profit margin, Cash deposit ratio and liquid assets demand ratio with the positive
differences in terms of the variances and ANOVA testing for Hypothesis. Overall ICICI bank
has got satisfactory financial position irrespectiveof having moderate and lowest ratios in
terms of return on net worth, return on assets, interest spread and assets turnover ratio. In
order to achieve best financial position in all factors, it must make efforts to increase its
current assets and maintain a safety margin which will provide better liquidity position.
Reduce the dependence on external equities for meeting capital requirementsby focusing on
internal equities and other sources of internal financing. Introduce schemes for public that
provides higher rate of interest and shorter maturity period. In order to bring confidence and
build their image, banks need to provide finance to more projects. The banks should simplify
the procedure of advances for quick disbursement.
REFERENCES
1. Balasubramaniam, C. S. (2012). Non-performing assets and profitability of commercial banks
in India: assessment and emerging issues. National Monthly Refereed Journal of Research in
Commerce & Management, June, volume, (1), 41-52.
2. Biswal, B. P., & Gopalakrishna, R. (2014). CD Ratio and Bank Profitability: An Empirical
Study. International Journal of Financial Management, 4(2).
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 38
3. Chandani, A., Mehta, M., & Chandrasekaran, K. B. (2014). A Working Paper on the Impact
of Gender of Leader on the Financial Performance of the Bank: A Case of ICICI
Bank. Procedia Economics and Finance, 11, 459-471.
4. Chandran, D., & Francis, P. (2014). Inflation Versus Prime Lending Rates: An Empirical
Analysis. Indian Journal of Finance, 8(2), 5-14.
5. D.Padma and V.Arulmathi (2013)- Financial Performance of State Bank of India and Icici
Bank – A Comparative Study, International Journal on Customer Relations, (18-24)
6. Gupta, Shikha (2014). An empirical study of financial performance of ICICI bank-
acomparative analysis. IITM Journal of Business Studies (JBS,) 1(1).
7. Jaiswal, A., Jain, C. (2016). A Comparative Study of Financial Performance of SBI and
ICICI Banks in India. International Journal of Scientific Research in Computer Science and
Engineering,4(3),1-6.
8. Kumar, J., Selvan T. R. (2014). Capital Adequacy Determinants and Profitability of Selected
Indian Commercial Banks GJRA - global journal for research analysis,3(11), 57-58.
9. Malhotra, N. (2015). Standard Chartered Bank, ICICI and SBI-A Comparative Analysis in
Post Reforms Scenario. EXCEL International Journal of Multidisciplinary Management
Studies, 5(10), 15-20.
10. Malik, Sonika (2016) Study of Indian Banking Industry. IRACST – International Journal of
Commerce, Business and Management (IJCBM),5(4),103-109.
11. Nagarajan, G., Ali, A. A., & Sathyanarayana, N. (2013). Financial Performance Analysis of
State Bank of India And ICICI Bank in India: A Comparative Study. International Journal of
Management Research and Reviews, 3(10), 3649.
12. Pooja Sharma (2014). Financial Performance of ICICI Bank and SBI bank: A Comparative
Analysis. International Journal of Research Aspects of Engineering and Management ISSN:
2348-6627, Vol. 1, Issue 1,2014, pp. 20-24.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 39
13. Prakash, P., & Sundararajan, S. (2016). An Analytical Research on Fundamental and
Technical Analysis of ICICI Bank Stocks in India. Asian Journal of Research in Social
Sciences and Humanities, 6(9), 895-907.
14. Prasad, K.V.N. And Ravinder, G. (2011). Performance Evaluation of Banks: A Comparative
Study on SBI, PNB, ICICI and HDFC. Advances in Management, 4(2), pp. 43-53.
15. Sharma, R., Goswami, A., & Kumar, P. (2014). Private sector Banks in India: An assessment
of Financial performance. Midas Touch Indian Journal of Multidisciplinary Research, 2(1-3).
16. Shukla, S. S., (2015). Analyzing Financial Strength of Public and Private Sector Banks: A
CAMEL Approach. Pacific Business Review International 7(8).
17. Singh, A. K. (2015). An Analysis of Profitability Position of Private Banks in
India. International Journal of Scientific and Research Publications, 5(5), 1-11.
18. Singh, A., & Tandon, P. (2012). A study of financial performance: A comparative analysis of
SBI and ICICI Bank. International Journal of Marketing, Financial Services & Management
Research, 1(11), 56-71.
19. Singh, J. P., & Seth, M. (2017). An Inclusive Study on Capital Adequacy performance of
Selected Public Sector and Private Sector Banks in India. International Journal of
Multifaceted and Multilingual Studies, 3(10).
20. Srinivasan, P., & Saminathan, Y. P. (2016). A Camel Model Analysis of Public, Private and
Foreign Sector Banks in India.,Pacific Business Review International,8(9).
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 40
Automated Attendance System Using IOT
*Wasim Ali, **Manasa K.N & **Dr. Basit. A. Darem
*Research Scholar, Department of MCA, VTU-RC, Mysore,
**Department of Computer Science, St.Pholimena’s College, Mysore
[email protected],[email protected], [email protected]
Abstract
In this modern era with Internet and Web, everything is possible, which made the entire world as a small global village. With the help of Internet and web, people can access required valuable information and communicate with others through verbal chat, instant messaging, email etc… This paper proposes an approach which can be applied in Universities, schools, colleges and various Organizations. With the aid of Proposed work employees can be monitored automatically without any conventional methods and with a reasonable price compared to already existing programs. The proposed work depends on smart devices which are inclined to members of schools, organizations, where each smart device has a special MAC (physical) address. Students can be connected to the application through MAC address and results can be saved finally, we can generate the report on daily or weekly or Monthly basis. The proposed system consists of two parts; the first one is a website, which can be accessed through the main screen of the system management like registration of student data, adding the admin to the system and so on. The second part is a system work environment which is a controller (Raspberry Pi) and running the main script of the system.Finally results can be obtained automatically based on students MAC address. For some exceptional cases, an Android application has been developed for admin to update all future plans. At present the system can be operated by itself and also can be a part of other integrated systems.
Keywords: IOT, Raspberry Pi, MAC address, Android Application.
Introduction
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 41
Nowadays with the concept of the Internet of Things, it is possible to
connect millions of devices and let them to communicate with each other. As
almost all organizations have the IoT infrastructure they can make use of
this facility to monitor the attendance of employees automatically. Some of
the benefits of automatic attendance over manual and semi automated
attendance are: saves manpower, time, easier reporting, and lower margins
of error. This paper proposes a system known as Automated Attendance
System using IoT which can record the attendance of students automatically
with less human interaction. The Automated Attendance System works on
the basis of Machine to Machine (M2M) interactions. By using the unique
MAC (Media Access Control) address of Wi-Fi devices, such as a laptop
network card, phone, media player etc. the proposed system automatically
records the user. When this is done, manual verification of the user can be
easily performed by the administrator. This system will use the MAC
address of each student which will be stored in the beginning. The Proposed
System also allows a teacher to add attendance manually for the student who
doesn’t have a smart phone. The Automated Attendance System includes
some other features like print the final attendance report directly from the
website, monthly notification about the attendance for each student and the
ability to remark the student as present in case of any emergency.
Literature Review
Studies so far show that automated attendance system without human
intervention is important and gaining more attention. Mahesh Sutar et. al
[1] proposed Smart Attendance System Using RFID in IOT. In This system,
an effort is made to solve regular lecture attendance monitoring problem in
developing countries using RFID technology. This system will ease is
school/collage to monitor the student as it reduces manpower, gives time
saving, easy control and reliability.
Chethana Gosal S et. al [2] proposed a method of taking attendance using
Bluetooth and Wi-Fi in Specific Region has been presented here which is
automatic, paperless, quick, and accurate. A Bluetooth receiver along with a
camera for face detection is used to overcome the disadvantage of proxy and
biometric.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 42
Mahesh P et. al [3] presented an automated attendance management system
using Raspberry Pi and NFC which is a smarter and more efficient way .with
the help of such system the attendance management system in
school/colleges/universities and hence reducing the time required for
attendance in class. This system is applicable to not only students but also
teachers, employees, workers.
Rajat Chaudhary et. al [4] developed a wireless automatic attendance
system using fingerprint identification technique which automates the whole
process of taking attendance and maintaining it. The fingerprint
identification technique was used for maintaining the attendance record.
K.Lakshmi et. al [5] Authors proposed system is to help the teachers in
college to avoid maintaining the registry book. This project uses a barcode
scanner. B.B.S.A.S uses Barcode scanner to take the attendance of students
entering the lab. Each student’s ID card will have a barcode at the back side
of it which contains unique data of the student such as roll number, branch
and year. Etc. It will reduce the teacher’s efforts to manually mark
attendance and their headache of maintaining the register since everything
would be stored in the database. It will also help in generating the defaulters
list on its own and send email to those students whose attendance is below
the required amount.
Methodology
The system architecture shown in Figure consists of the students (MAC
addresses), wireless router (getaway), Raspberry pi3 (system), Internet (web
server), and administrator for the web application
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 43
Figure1 : System Architecture.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 44
Students (MAC addresses): Each student must open his/her WIFI network when he
reaches the college morning and he must be pre-registered in the college network by
Admission and Registration Department.
Wireless router (getaway): A wireless router is an electronic device that works as a
router meaning it sends data from the internet cable to a device and as a wireless access
point. The students devices will connect with this device via WiFi service, the wireless
router is responsible to identify the MAC addresses of all phones which is connected and
sent it to the system.
Raspberry pi3 (System): The Pi is a tiny computer about the size of a credit-card, the
board features a processor, RAM and typical hardware ports you find with most
computers. This means you’re able to do most things a desktop computer can do such as
document editing, playing HD video, and playing games, coding and much more. In this
part we have installed the system, which is responsible to make most of tasks in project,
such as sending a request to the router to ask about connected devices and bring them
MAC addresses, store those MACs in a database to do some of the processes in case of
future ,this card can be a web server , getaway also.
Internet (web server) : The Internet is a worldwide system of computer networks - a
network of networks in which users at any one computer can, if they have permission,
get information from any other computer, to achieve the principle of Internet of things
(IOT). We have built our server in the network and will make a simple website on it to
do some tasks on our system such as generate reports and add student’s details to the
system including the MAC addresses.
Administrator (admin): is a person who is responsible for the systems which are
behind our Web sites. Admin will be responsible of add student details and generate the
reports any time through internet from anywhere.
The Proposed system will start every day morning at 9:00AM to scan college network.
When a Student enters into the college campus, he must connect with college network;
in turn Router is connected to Raspberry Pi which has system. When a student enters
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 45
into a college campus, system checks database to ensure whether the student’s MAC
address is stored or not. If a Particular student has been registered with his MAC
address, then the system is going to monitor the student by his MAC address for a
particular period of time (9:00 AM to 1:00 PM).
System can automatically record all traffic for each MAC address i.e. how many classes
a student has attend and store this information into a database.
System Administrator can access the interface from anywhere, at anytime via website
and he can generate daily report, monthly report. He can also add new students, admin,
teachers into the system. An Admin can also add new Admin, teachers, students and
delete & update existing users in the system.
There may be some exceptional cases like if a student does not have Smartphone, if a
student loss his/her phone, if a student has to leave the class in middle in some
emergency situation. To handle these issues an Android Application has been
developed, with the help this Android Application teachers can mark the student’s
attendance manually.
Module Description
Proposed system consists of two modules
[1] Administrator Module[2] Confirmation Module
Administrator Module
In this module Admin is responsible for adding a new Admin, Teachers, and Students;
remove and display information about the people who are included into the system. Also
it is the responsibility of the Admin to maintain Attendance report and if necessary, print
the reports monthly.
Confirmation Module
This module is designed for teacher to update the student’s attendance in exceptional
cases. If any student does not have Smartphone like a phone without WiFi facility, if a
student loss his phone then their attendance can be updated manually by the teacher.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 46
Conclusion and Future Work
Traditionally student attendance has to taken by professor and it is wastage of time and
much proxy attendance can be recorded in manual system. This can be replaced with
computerized system. Most of the existing system needs some techniques or some
applications have to be installed in student’s phone.
In proposed system application just needs personal phone MAC address of each student
and that make the system cost is low. In this work , the web based Automated attendance
system is developed using python object oriented programming language , PHP server-
side scripting language and CSS,HTML ,JavaScript for designing which is fully meet
the system’s goals.
This system represents the machine to machine interaction (M2M), which is the basic
concept of internet of things (IOT) and take the advances of this new techniques to
simplify management works in organizations. The system has overcome many
limitations incorporated in attendance, and saves a great amount of time and reduces
errors which may occur during attendance calculation.
The proposed system is fully responsive which can be used flexibly in mobile, tablets
and different operating systems.
As a future work Evasion of the attendance in organizations and colleges can be
implemented. For this seek it is better to use IP camera to recognize the student face and
connect it with collage database to improve the system’s accuracy.
As we get huge amount of data from IoT platform, so with the concept Big data we can
Analyze the collected data, Predict the future based on historical data and ease the
organizations management work.
In some organizations manager need to track the employees. For this purpose we have to
develop model which uses GPRS module to track the location of employee within
organization only.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 47
References
[1] Mahesh Sutar, Mahesh Patile, Sachin Waghmare, “Smart Attendance System Using
RFID In IOT “International Journal of Advanced Research in Computer Engineering &
Technology Vol. 5 (4), 2016.
[2] Chethana Gosal S, Nithinkumar k, Nandan.R, “Automatic Student Tracking and
Attendance Analysis System” International Journal of Information and Technology,
Vol. 2 (3), 2016.
[3] Mahesh P, Sangewar, Shubham R, Waychol, Amitkumar Manekar, “Automated
Students Attendance Management System using Raspberry Pi And NFC”,
International Journal of Research in Computer & Information Technology, Vol. 1
(1), 2015.
[4] Rajat Chaudhary, Priyaranjan, Deepak Kumar, Durgesh Deep, “Fingerprint Based
Attendance System”.
[5] Lakshmi Sudha. K, Shirish Shinde, Titus Thomas, Aris Abdugani “Barcode
based Student Attendance System“, International Journal of Computer
Applications”, Vol. 119, 2015.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 48
ICT Programmes and Policies for Agricultural Extension in India: A Review on Karnataka
*Dr. Nandeesha H K &*Ms. Sowmyashree* Dept. of Economics, St. Philomena’s College, [email protected]
Abstract
An information and communication technology (ICT) in agriculture is an emerging
field focusing on the enhancement of agricultural sector in India. It involves
application of innovative ways to use ICT in the rural domain. It can provide with
accurate information necessary for the farmers which facilitates better Agricultural
output. In recent year farmers attitude to access to agricultural information have
been changed because of very fast networking of information and communication
technology. Farmers can get the information regarding fertilizers, pesticides, crop
patterns and weather forecasting and other information through zero affordable cost
or low cost. Many of the organizations like government, private, co-operatives and
public have also attempted to facilitate the information technology transfer in the
agriculture sector. ICT is crucial in facilitating communication and access to
information for agriculture and rural development. With this perspective present
study is going to find out the relevant ICT applications for agricultural extension in
India with respect to Karnataka government initiative policies and programmes
perspective.
Keywords: ICT (Information and Communication Technology), Agriculture,
Farmers, Policy and programmes.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 49
Introduction
Agriculture sector is predominant sector in Indian economy. Most of the families are depending
on agriculture sector; nearly 60 % of the Indian populations are engaged in agriculture sector in India.
Agriculture sector contribution is 16% of total GDP in India. The performance of agriculture basically
means the performance of small holder farming. It is only by empowering small and marginal farmers to
overcome their handicaps that, they can become instruments of evergreen revolution and growth in
agriculture sector. ICT in agricultural extension will provide much needed impetus to agricultural sector
and ICT can complement the traditional extension system for “Knowledge Resource” delivery to the
millions of the farmers. Present study deals with the Karnataka’s agriculture profile and performance of
ICT tools in Karnataka with respect to agriculture sector. Study also reviews on successful ICT
programmes in agriculture and allied activities.
Information and Communication Technology (ICT) consists of three main technologies. They
are: Computer Technology, Communication Technology and Information Management Technology.
These technologies are applied for processing, exchanging and managing data, information and
knowledge.
Any system applied for getting information and knowledge for making decisions in any industry
should deliver accurate, complete, concise information in time or on time. The information provided by
the system must be in user-friendly form, easy to access, cost-effective and well protected from
unauthorized accesses. ICT can play a significant role in maintaining the above mentioned properties of
information as it consists of three main technologies. ICT is the integration of technologies and the
processes to distribute and communicate the desired information to the target audience and making the
target audience more participative in nature.
Special Features of Information and Communication Technology
Some of special features are can be summarized as follows;
Speed is one of the special features of ICT; the tremendous progress of telecommunication has killed
the vast distance in between, and turned the world to a global village.
It is an astounding store-house of information which enhances the knowledge of people for new
innovation and ability to access them for free.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 50
Saves time and opens up new vistas in various agricultural activities.
Unifying and magnifying features of digital technology. The technology of virtual reality is helping
areas of research in certain disciplines.
The information is available instantaneously from any point on the globe round the year and twenty
four hours a day
Here communication is interactive as it also involves the farmers
The communication is dynamic and ever growing.
Improving Information Availability and Delivery of Services for sustainable agricultural growth
and livelihood are the main aims of providing ICT services to the farming community. The well
accessed information by the ICT results in increasing productivity thereby increasing sustainability of
agriculture. The importance of ICTs application is summarized on the following accounts;
Improved information access and delivery of services to the farming community.
Improved productivity and profitability of farmers through better advisory systems.
Efficient and Increased utilization of information by stakeholders for their decision
making.
Faster and efficient redressal of farmers’ grievances.
Better monitoring of government schemes, which directly impact the farmers.
Improved transparency and accountability.
Direct feedback from farming community to the decision makers in the state.
Efficient management (Development, Conservation, allocation and utilization) of
resources
Reasons for Delay in Agricultural Information in India:
The main purpose of extension is to transfer the agricultural advanced technology and research to
the farmer, and feedback of field problems to the research system. Latest information and knowledge on
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 51
the subject play a major role to full fill this purpose. There is an information delay between farmers and
agriculture researcher in India because:
• Media, Information Management and ICT are not properly used
• Lack of adequate extension workers
• Lack of Agricultural information literacy in India
• Lack of updated agriculture information with the farmers and most of the extension workers
• Poor technological knowledge of farmers and village level extension personnel
• Economic problems of rural people
• The top-down approach is adapted for extension activity. So the linkages between research-
extension and farmer remained weak etc.
Significance of the Present Study
The present study forms part of agricultural economics by emplacing on the primary sector
growth and development. Services and facilities those are available for farmers to become efficient and
smart to enhance their agriculture production particularly. Information and Communication Technology
is of utmost importance which determines the effectiveness and utilization of services and facilities to
improve farmer. In particularly the agricultural production of the nations and farmers cultivation method
and knowledge depends on innovation technology as well as information technology. Thereby,
Information and Communication Technology is very important variable in determining agricultural
production and farmers’ efficiency in farming activities. So present study focuses on how ICT
programmes and policies are emphasized in agriculture sector and awareness to the farmers in
Karnataka.
Literature Review
Rabindra Kumar M (2012) in the work entitled, “Role of Information in Agricultural
Development of Odisha”, aims to discuss areas of information needs for various stakeholders in
agricultural sector in the developing state of Odisha. Access to right information and its proper
utilization for the farming community is the order of the day which needs to be practiced in the state.
Author suggested that extension professionals should carry publicity materials and distribute success
stories in agriculture so that it may make great impact upon farmers with needed information. Hence,
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 52
extension professionals working in agricultural sector should develop better visioning and empower the
farmers with latest technology and farming practices.
R.Saravanan (2012) worked on “ICT for agricultural extension in India: Policy implications for
developing countries”, This article was concise reviewed ICT projects implemented since 1990’s in
India, elaborating best practices and its ingredients for success and also draws policy implications for
the effective ICT based agricultural advisory services in developing countries. Study revealed the
national policies with respect to ICT in agricultural extension services in India. It also found the impact
of information and communication technology on agricultural sector with the view of the successful
implemented programs.
Jenny C. Aker (2011) in the article entitled “Dial “A” for agriculture: a Review of information
and communication technologies for agricultural extension in developing countries”, outlines the
potential mechanisms through which ICT could facilitate agricultural adoption and the provision of
extension services in developing countries. Public sector programs have attempted to overcome
information-related barriers to technological adoption by providing agricultural extension services. They
reviewed existing programs using ICT for agriculture, categorized by the mechanism and the type of
services provided. According to author identifying potential constraints to such programs in terms of
design and implementation is important. It concluded with some recommendations for implementing
field-based research on the impact of these programs on farmers’ knowledge, technological adoption,
and welfare.
Claire J.et.al (2010) in their work entitled, “Review of Agricultural Extension in India”
ascertain why farmers are not accessing information and where information gaps exist, despite the
variety of extension approaches in India. They focused on some of the major agricultural extension
programs in India by considering their ability to provide information and facilitate information sharing
and use in farming communities. Author examines the challenges and constraints of each agricultural
extension approach as it attempts to provide farmers with access to information that is relevant to their
farm enterprises. They concluded that there is an increasing need to work in partnership and to share
knowledge and skills in order to provide locally relevant services that meet the information needs of
marginal and smallholder farmers in India.
Objectives of the Study
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 53
To review the various Government policies and programmes in promoting ICT in agriculture sector in
Karnataka.
Methodology
The present study is based on the secondary source of information
Secondary sources were collected from various government reports, i.e., Ministry of Agriculture and
Allied activities of both Central and State governments. Karnataka State agricultural policies, which are
Karnataka Agriculture Policy 2006, Integrated Agribusiness Policy 2011, Karnataka Agriculture Market
Policy 2013 and Karnataka Agribusiness & Food Processing Policy 2015.
Karnataka Agriculture Sector
Agriculture plays a vital role in economy of Karnataka. Karnataka is heavily dependent on the
agricultural sector. About 1.8 m ha (million hectare) area of the state is under irrigation which
constitutes about 16 percent of the gross cropped area. Karnataka with its diversified agro climatic
conditions is home for the production of variety of agriculture crops such as Sunflower, Maize, Tur,
Jowar, Sugarcane, Bengal gram, Soybean, Groundnut, Green gram, Black gram, Sunflower, Paddy,
Cotton etc. The State also grows variety of small and minor millets such as Foxtail Millet (Navane),
Little Millet (Sawe), Finger Millet (Ragi), Bajra (Sajje), Haraka etc.
Karnataka State Agricultural Policies Review
Karnataka agricultural policies reviewed here are with respect to importance of ICT applications for
agricultural development in Karnataka.
Karnataka Agriculture Policy 2006
The Policy stated a “Farmers Centric” approach, which means policy, would have concern on farmers,
how to empower the farmers and how to enhance the production capacity with available resources and
mainly on eradicating or address the impediments of agricultural sector.
The philosophy of the 2006 agricultural policy lies in the concept of ‘Pancha Sutra’. The five
components of sutra’s are: 1) to protect and improve soil health. 2) Conservation of natural resources,
with special emphasis on water and micro irrigation 3) Timely availability of credit and other inputs to
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 54
the farmers, 4) Integrated post-harvest processing with the production process, and 5) Reducing the
distance between “Lab to Land” in transfer of technology.
With these five components policy has given the more importance for ICT to enrich the knowledge of
farmers on farm cultivation, input supply, pre and post harvesting of the agriculture and allied activities
etc. IT being a ‘farmer centric’ policy, the focuses of the policy has to generate an honorable level of
growth in the net income of the farmer through value addition and agro-processing. ICT has taken a
prominent role in this policy to provide accurate and adequate information and to make skilled
agricultural laborer. Policy has recommended a scheme of Raitha Mithra Pusthaka (RMP) it has
information about the farmers and many other agricultural related information has Consisted .Another
step of the policy was to strengthen the Bhoomi project which is one of the ICT based project, this
project has the information about the computerized land records from the information kiosks in this
direction farmers can easily get land records. Another major program is Soil Health Card, it has
consisted the information regarding soil health Nutrition, it would help to farmers to maintain the soil
health. Therefore ICT play a prominent role in the Agriculture Sector.
Integrated Agribusiness development Policy 2011
The Karnataka government has taken a lead initiative in developing sustainable agriculture or
agribusiness enabled through an ‘Integrated Agribusiness Development policy’, covering agriculture
and allied activities (like horticulture, animal husbandry, fisheries, sericulture and food processing) both
in infrastructure and industrial segments on an end to end concept. In this view policy aims to create an
enabling institutional structure for addressing the aforesaid thrust areas, facilitates flow of information,
technologies, skill sets and modern management practices. In order to facilitate agribusiness in
Karnataka and to keep abreast of latest technology and information in the sector, central product
information, cultivation knowledge support cell and market intelligence cell shall be established. This
knowledge support cell would cover creation of agri- portal, university-farmer interaction ,knowledge
dissemination, corporate knowledge and farmer FAQ, technologies, guidance solution support, schemes
and services of GoK and GoI, key events, e-extension, distribution of literature, soil and water testing
services, single window delivery system for technology products, diagnostic services and information
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 55
through hub and spoken model, creating awareness of improved agricultural technologies among the
farmers ,promotion of IT in agriculture.
Karnataka Agricultural Marketing Policy 2013
The Policy stated that Information Technology contribution is very high in providing better market
practices. Harnessing information technology for marketing extension will receive high point in the
policy agenda. Effectively use of modern ICT, it would be promote the transparency and avoided the
malpractices in marketing activities. Extensive use of information technology will be promoted for
communication between farmers and stakeholders. Online marketing system is one of the effective
programme for generating the price competition and in encourage the use of effective modern
technology and also make use to get good price, accurate weighting and timely accessibility of the
payment etc. Farmers easily can get the information on agricultural commodities through the well-
known ICT programmes of KrishiMarataVahini, online marketing, e-tendering etc. In order to this role
of ICT in agriculture market, policy initiative has been concern on regulated marketing, increasing
competition and empowering farmers and so on.
Karnataka Agribusiness & Food Processing Policy 2015
The Agribusiness and Food Processing sector in the State requires a special focus and thrust.
There is a need to have an exclusive Agribusiness and Food Processing Policy to give focused attention
for the overall development of Agribusiness and Food Processing sector to give value addition to farm
produce for the benefit of farmers.
Vision of the Policy, ‘to position Karnataka in a sustained growth path in the field of agricultural and
allied sectors through global technologies and innovative tools, by creating enabling frameworks and
state of the art infrastructure facilities, thereby generating higher returns to farming communities’.
Mission of the Policy, to make Karnataka as the most sought after investment destination for the
agribusiness and food processing with focused attention and landholding.
To provide more and more opportunities for the agribusiness and food processing sector, there by
generating large scale employment in rural and semi urban areas of the State.
Information & Knowledge Support Centres
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 56
Under 2015 policy ICT has been given much importance to enrich the activities in agribusiness. This
support shall include website management containing information relevant for agribusiness & food
processing sector in Karnataka. The information centre shall maintained at abases on agribusiness and
food processing enterprises, infrastructure providers, key export destinations from Karnataka, and other
such knowledge on agribusiness and food processing in the State. Raitha Samparka Kendras (RSK) /
District Industries Centres in Karnataka will be utilised as information centers.
Karnataka Agribusiness Development Corporation (KABDC) shall be empowered to empanel
consultants who can prepare bankable project reports. The supporting institutions like University of
Agriculture Sciences, Horticulture Sciences University, Veterinary Sciences University, National Bank
for Agriculture and Rural Development, Central Food Technological Research Institute, Defence Food
Research Laboratory and other accredited institutions, etc. shall be pooled to the fold of knowledge
centre.
Karnataka State Agricultural Portal
SAP(State Agricultural Portal) is one of the ICT based programme in Karnataka. A farmer would
typically come to SAP to find information / avail any service through CSC / Internet. SAP would be in
English and local language, and have easy to use navigation, search and browse features. SAP would be
connected to the State gateway through firewall and SWAN / Internet and would be accessible to
department, SAUs, KVKs for information update and to various service delivery channels like CSCs /
State Call Centre, Kisan Call Centers, RSK’s (Raita Samparka Kendra) and internet for public access.
The State Agricultural Portal is a conceptual design of service delivery channel at the state level.
e-Mandi
The Department of Agricultural Marketing (DAM) had requested the NIC for the design and
development of software for activities of Agricultural Produces Marketing Committee (APMC). After
studying the requirements and activities in the APMC, National Informatics Centre (NIC), Karnataka
had developed the e-tendering application in 2006 to automate the process of tendering of farmers’
agricultural produces in the APMC. Subsequently, this system is improved and called as e-Mandi
system, which captures all the activities of the APMC, from in-gate entry to out-gate entry including
tendering, billing, DCB (Digital Cash Bill) preparation.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 57
e-Mandi is a web-based application with 3-tier architecture. The e-Mandi system is a comprehensive
system, meeting all the requirements of the APMCs. It has been built with number of features for easier
use by the APMC staff, traders and Commission Agents. e-Mandi has been designed by incorporating
the rules and regulations defined in APMC Act.
Advantages of e-mandi
An electronically unified agriculture market will introduce transparency and reduce
intermediation and multiple handling costs.
It facilitates efficient price discovery and utilizes transaction functions of the marketplace
It enables participation and benefits for the entire agri value chain. i.e. from farmer to consumer.
It eliminates multiple tax levies and licences.
Better logistics and infrastructure facilities will be made available to the farmers as it will
encourage private sectors to invest.
It is a single licensing system, and thus the farmers/trader need not register in all APMC’s of the
state.
Karnataka’s system has accommodated lakhs of farmers, traders and commission agents for
trading in all the 92 regulated commodities.
Bhoomi
Historically, maintenance of land records system in India has been a prime social activity for land
owners, tenants and the state for land reforms, taxes, administration, survey and various other purposes.
Land records contain geophysical data of the land e.g. land size, forms and soil, information on crops,
irrigation, land use, legal entitlements, liabilities and taxation. State land reform measures, thus, depend
much on the land records management system. Further, it helps in protecting the legal ownership,
assignment and settlement of land titles. Farmers utilise land records also to obtain bank loans, resolve
legal disputes, collection of accurate crop data, insurance and ensuring efficient land markets. The need
to reform the land record management system has long been recognised because in its current state, the
system breeds bribery and corruption. In this project, the Department of Revenue in Karnataka has
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 58
computerised 20 million records of land ownership belonging to 6.7 million farmers in the state.
Computerisation of land records allowed the farmers to sidestep the village accountants for acquiring a
copy of the Record of Rights, Tenancy and Crops (RTC), a process that earlier entailed delays,
harassment and payment of bribes. Farmers today can obtain a print RTC copy for a fee of Rs.15 from a
computerised land record kiosks (Bhoomi centers) located in 177 taluka offices.
Radio
Radio is one of the most important and cheapest mass media. It has been one of the traditional media for
information seekers. Information revolution in rural India through radio has helped green revolution. It
is very useful in rural development programme. It has a great variety content related to farm, home,
community and entertainment.
Hassan Akashwani is one of the creative radio program stations in Hassan district. This station is
broadcasting farmers centric programmes like Dhumbi- on agricultural commodity price disseminating
program; Krishikarigemahithi- providing information on agriculture with personal interview of
progressive farmers; Petevishleshane, Ritharigesalahe, Manninamahathva, Maralibaamannige etc., are
broadcasted by Hassan Akashvani. In Hassan district this radio station is trying to create good
agriculture awareness among the farmers with the help of Kandly krishiVigyan Kendra. Farmers are
showing positive response and radio station is also conducting interactive sessions for farmers with the
support of concerned officers in the district. Akashwani this is trying to enrich farmers knowledge in
district.
AIR Mysore is unique in broadcasting regular farmer friendly programmes like KrishiChinthana,
Raitarigesalahe, KrushiNudimuttu, KrishiPathagalu, Krishikare, Krishivani, which are all motivating
and bringing them to single platform for sharing ideas, to learn and adopt latest technologies and pursue
agriculture as a profession under the banner of Banuli Krishi Belagu programme. Under this programme
one day training programme is conducted at the farmers’ field on the last Monday of every month by the
progressive farmers themselves. Importance is given for promoting organic farming and reduce the
usages of fertilizers and other chemicals in agriculture apart from income generating allied activities.
Krishi Community Radio
The first krishi community radio in Karnataka was established in 2007 under University of Agricultural
Science, Dharwad. It is recognized as one of the FM medium for transfer of agricultural technology to
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 59
the needy farmers in coverage area. Krishi radio produces the programmes like interview with the
farmers, successful events of farmers, Krishi Chintana, feedback of farmers’ trainee, market
information, weather report, seasonal hints for agricultural operation, etc. The Krishi community radio
produces and broadcasts latest information like cropping pattern, improved agricultural practices, animal
husbandry, fisheries, environment, poultry farming etc.
Television
Agricultural programmes on television started with introduction of Krishi Darshan programme in DD
National channel on January 26, 1967. With the launching of satellite instructional television experiment
in 1975 and Indian satellite in 1982, these programmes became familiar to a vast majority of rural
viewers and Krishi Darshan was the first rural program. This programme created awareness among the
rural viewers and acquainted them with the latest technical and scientific knowledge with regard to crop
cultivation practices, use of fertilizers, soil testing, dairying animal husbandry, sericulture, horticulture,
fishery, poultry, weather forecasts, etc.
In Karnataka DD Chandana Channel has been telecasting Krishi Darshan program for farmers, daily
twice in morning 6.00-6.30 am and evening 5.30 to 6.00pm. ETV Kannada News channel also has been
telecasting the farmer centric programme known as Annadata (Kannada). The programme telecasting
time is morning 6.30-7.00AM many other TV channels also provide the information on Market price,
subsidy related issues and some special programmes of success stories etc. These television
programmes are creating awareness on farm activities to farmers with adequate and affordable
information.
FAO (2001) reported that television is the most important medium for communicating information
among rural people of developing countries in rural area as people are facing many problems and
hindrances to get information relating to agriculture.
Mobile
Mobile access to technology is one of the most important enablers for small holders to improve
productivity sustainably. Innovative mechanisms for technology transfer are required to bring relevant
tools, knowledge and knowhow to farmers. ICT applications can foster dissemination of information on
technology, market demand, price information, weather, pest, and risk-management information, best
practices to meet quality and certification standards. Farmer Call Centre (Kissan Call Centre) the
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 60
Department of Agriculture & Cooperation (DoA&C), Ministry of Agriculture, Government of India
launched Farmer Call Centres across the country on January 21, 2004, to deliver extension services to
the farming community. The purpose of these call centres is to respond to issues raised by farmers,
instantly, in the local language. National level universal eleven digit number 1800-180-1551 has been
allotted for Kissan Call Centre. The number is accessible through all mobile phones and landlines of all
telecom networks including private service providers. Calls are attended from 6.00 AM to 10.00 PM on
all seven days of the week at each KCC location.
Krishi Vigyan Kendras and State Agriculture Universities
Agriculture research and education in India is spearheaded by the Indian Council of Agricultural
Research (ICAR), an autonomous organization under the Department of Agricultural Research and
Education (DARE), Ministry of Agriculture and farmers Welfare, Government of India. This apex body
is mandated for coordinating, guiding and managing research and education in agriculture and allied
activities. It has the largest network of agricultural research and education in the world with 109
institutes, 78 all India coordinated projects/networks,642 Krishi Vigyan Kendras (KVKs), 71state
agricultural/ veterinary /horticultural /fishery universities and four general universities with agricultural
faculty spread across the country. There are 31 Krishi Viogyan Kendras and 05 Agricultural Universities
are in Karnataka. They have been working for enhance the technological innovation in farming
activities.
Raita Samparka Kendrs (RSKs)
The Department of Agriculture established Raitha Samparka Kendras at hobli level with the objective of
providing updated crop production related knowhow, arrangement of critical agricultural inputs, primary
soil and seed testing facilities and arranging interface with public and private sector technologies.
Developing country like India is carrying forward nationwide programmes of modernizing agriculture
with a view to achieve food security and to bring about socio-economic changes among farming
community since majority of population in the country depend on agriculture for their livelihood.
Karnataka’s agriculture, as in the rest of the country, has been making impressive strides, since mid-60s.
Out of the total population, rural contributes to about 70 percent and most of them are engaged in
agriculture and allied activities. According to the recent Economic Survey report of 2011, the
contribution of agriculture and allied activities accounts to 16.78 percent of the state income.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 61
Considering the importance of the need to provide effective extension services to the farmers, Raitha
Mitra Yojane, a demand driven Agricultural Extension System was initiated in Karnataka state in 2001,
replacing the earlier extension system by establishing agricultural extension centers at hobli level called
Raitha Samparka Kendras (RSKs). So far in Karnataka state, 745 Raitha Samparka Kendras
(Agricultural Extension centers) are established at Hobli/Sub-block level in 177 taluks (Anon., 2000)
These RSKs cater to the need of 5628 Gram Panchayaths covering 78 lakh farmer families. These RSKs
located in proximity to the farming community are aimed at addressing wide range of local issues
related to agriculture. They also act as a common platform and create terminal linkage to the farmers to
access and interact about agriculture based technology and information at the grass root level.
Conclusion
The study reviewed some of the agricultural extension approaches currently in operation in Karnataka
and also revealed policy interventions that promote ICT for agricultural extension in Karnataka.
In the contest of providing information system, an innovation can emerge from many sources and
through complex interactions and knowledge flows, with the farmer being at the center of the process.
Some of them are Kissan Call Centre, Karnataka Government Websites of Agriculture and allied sector,
innovative mobile applications like e-mandi, Krishi Vigyan Kendras, All India Radio, television,
agricultural magazines, newspaper and so on. There is no scarcity of information sources, but the
receivers are very less because of lack of awareness on ICT programmes and their utilization. Hence,
public sector should provide information at grass root level for accessing innovative technologies and
innovative knowledge to create smart farming community.
References
Aker, J. C. (2011). Dial “A” for agriculture: a review of information and communication technologies
for agricultural extension in developing countries. Agricultural Economics, 42(6), 631-647.
Claire, J., Glendenning, S. B., & Kwadwo, A. (2010). Review of Agricultural Extension in India, Are
Farmers’ Information Needs Being Met. IFPRI Discussion Paper 01048.
Ghatak, P. (2010). Development of mass media and its extension in agriculture: a feedback review of
audience research survey in Air, Murshidabad, West Bengal. Global Media Journal: Indian
Edition, 21.
Hanumanaikar, R. H., Manjunath, L., & Natikar, K. V. (2012). Reading behavior of farmers-farm
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 62
magazines. Karnataka Journal of Agricultural Sciences, 24(4).
Kameswari, V. L., Kishore, D., & Gupta, V. (2011). ICTs for agricultural extension: A study in the
Indian Himalayan region. The Electronic Journal of Information Systems in Developing
Countries, 48.
Karippai, R. S., Menon, A. G. G., & Bhaskaran, C. (1995). Credibility and utilization pattern of farm
information sources by small farmers. Journal of Extension Education, 6(1), 1071–1074.
Meera, S. N., Jhamtani, A., & Rao, D. U. M. (2004). Information and communication technology in
agricultural development: A comparative analysis of three projects from India. Network Paper
No, 135.
Mittal, S. (2012). Modern ICT for agricultural development and risk management in smallholder
agriculture in India. CIMMYT.
Nandeesha, H., & Dos in, e. C. O. N. O. M. I. C. S. Impact of Information and Communication
Technology on Agricultural Sector in Karnataka.
Nandeesha, H. K., & Thimmaiah, N. (2014). Impact of Information and Communication Technology on
Agricultural Sector in Karnataka: a study on Raitha Samparka Kendras. International Journal of
Advanced Research in Management and Social Sciences, 3(7), 151-160.
Nandeesha, H., & Thimmaiah, N. (2016). ICT Programmes and Policies for Agricultural Extension in
India: A Review. Journal of Media and Social Development, 4(2), 78-89.
Saravanan, R. (2012). ICTs for Agricultural Extension in India: Policy Implications for Developing
Countries. In Proc. of 8th Asian Conference for Information Technology in Agriculture, AFITA
(pp. 1–11). Saravanan, R., & Bhattacharjee, S. (n.d.). Mobile Phone Applications for
Agricultural Extension in India.
Saravanan, R., & Bhattacharjee, S. Mobile Phone Applications for Agricultural Extension in India.
E-Governance Initiatives’ of Karnataka State Department of Agriculture (2012), Government of
Karnataka, Department of Agriculture.
State Agriculture Profile (2014), Government of Karnataka, Department of Agriculture.
Karnataka Agricultural Policy (2006), Government of Karnataka, Department of Agriculture.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 63
Integrated Agribusiness Development Policy (2011), Government of Karnataka, Department of
Agriculture.
Karnataka Agricultural Marketing Policy (2013), Government of Karnataka, Department of
Agriculture.
Karnataka Agri-Business and Food Processing policy (2015), Government of Karnataka,
Department of Agriculture.
Karnataka Economic Survey (2014-15) and (2015-16). Planning Commission,GOK.
The Analysis of Different Types of IoT Sensors for smart agriculture and Management
Sureshkumar P.H & Maria Akshatha
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 64
PG Dept. of Computer Science,
St. Philomena’s College, Mysore
Abstract:
The human life on planet highly depends on agriculture and management. The sensors can be utilized for smart agricultural management. So this study deeply reviews various sensors available that can be used for smart agricultural management. Remote sensor hubs are regularly minimal effort, low-control; little gadgets outfitted with sensors, information preparing and remote correspondence abilities. Step by step, these are getting to be plainly littler, less expensive, while all the more effective and more inescapable. Sensors of numerous kinds attempt to copy certain sense organs of living creatures talented by nature keeping in mind the end goal to associate with the environment [3].. Sensor innovation speaks to one of the developing zones of material science, hardware and biotechnologies, and is the one that can be used for the applications like Smart agriculture management. As of late sensors have been considered as an exceedingly potential field of logical research. Be that as it may, biosensors likewise have rising now days. The IoT sensors can be adequately utilized for water, transport, garbage, environment and so for smart farming that assumes an indispensable part being developed of the nation keeping in thought this paper clarifies about various sensors utilized as a part of the field for development and yield enhancement and smart management. . This consist of guaranteeing standard methodology with latest advances as web about things with also remote sensor Networks could provoke farming modernization.
Keywords: Internet of Things, IoT Sensors, Smart agriculture
Introduction
The words 'sensor' and 'transducer' are both broadly utilized as a part of the portrayal of estimating
frameworks and IoT's(Internet of Things).A sensor is a gadget that measures a physical amount and
changes over it into a flag which can be perused by an onlooker or by an instrument. For instance a
thermocouple [1], Which changes over temperature to the yield voltage which can be sustained to an
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 65
IoT framework. A sensor is a gadget that gets a boost and reacts with an electrical signal
response .Sensors are utilized as a part of various fields of science and innovation. Numerous sensors
are utilized as a part of agribusiness fields, sensors like physical sensors, dampness sensors, synthetic
sensors, biosensors, and so on are utilized for assurance of harvests. The IoT sensors can be adequately
utilized for water, transport, garbage, environment and so for farming
Sensors
A word reference meaning of 'sensor' is a gadget that identifies an adjustment in a physical boost and
transforms it into a flag which can be estimated or recorded. Another relating meaning of 'transducer' is
'a gadget that exchanges control starting with one framework then onto the next in the same or in the
diverse shape [2]. A sensible qualification is to utilize 'sensor' for the detecting component itself and
'transducer' for the detecting component with the related circuits. All transducers would subsequently
contain a sensor and the greater part of the sensors likewise transducers. By and large terms, the
transduction procedure includes the change of one type of vitality into another frame. A sensor is a
gadget that distinguishes or measures an outer boost and records, shows or generally reacts to it [3]. As
indicated by the idea of outside boost sensors can be of two essential composes viz. physical sensor and
substance sensor. Every electrical transducer are comprehensively arranged under two classes, viz.
dynamic and detached. Dynamic transducers are self-generators, working under vitality transformation
standards. They create a comparable electrical yield motion without utilizing any outside vitality source.
Sensors in farming and ranger service assume a vital part today. In farming , the requirement for
expanding the generation and at the same time the endeavors for limiting the natural effect and for
sparing costs make the sensor frameworks the best united device. The utilization of sensors misuses
every accessible asset fittingly and to apply perilous items modestly. At the point when supplements in
the dirt, moistness, sun based radiation, thickness of weeds and all components influencing the creation
are known, this shows signs of improvement and the utilization of concoction items, for example,
composts, herbicides and other contamination items can be diminished impressively. These exercises
fall inside the developing zone known as Precision Agriculture. a great deal of number of exercises is
arranged towards wood creation or woodland inventories with the points of controlling parameters of
intrigue, for example, width of trees, stature, crown tallness, bark thickness and different factors, for
example, shade, stickiness, brightening, CO2transformation, where the social approval is of intrigue. in
charge of changing over any physical wonder into an amount quantifiable by an information obtaining
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 66
framework. Latent transducers work under vitality controlling standards. They rely on the adjustment in
the electrical parameter like protection, inductance or capacitance excitation and requires optional
electrical vitality from an outside source. A portion of the more typical transducers are talked about in
underneath segments. system. Passive transducers work under vitality controlling standards. They rely
on the adjustment in the electrical parameter like protection, inductance or capacitance excitation and
requires auxiliary electrical vitality from an outside source. A portion of the more typical transducers are
talked about in underneath segments..
Physical sensor
Physical sensor are for the most part estimating for physical amounts, for example, length, temperature
weight, power, weight, sound and so on. It can be characterized as a gadget which react to physical
property, called boost, and create a corresponding measurable electrical flag [4, 5].these sensors help
agriculture system to maintain the physical property of the field.
Chemical sensor
A gadget which reacts to a specific way by a synthetic response and that can be utilized for the
quantitative or subjective assurance of the change is called compound sensor. Such sensor is worried
about distinguishing and estimating a particular synthetic substance or set of chemicals [4].in the
agriculture fields to maintain the chemical components in the pesticides sprinkled and fertilizers used.
Micro sensors
Micro sensor are group of sensors that extremely small type and capable of picking up and relaying
various environmental information. Such devices capable of measuring biological, thermal, chemical,
and other types of relevant data and send them to a processor, which then converts to a meaningful
form to allow access to it for a variety of purposes [8]. The various Micro sensor devices types of
accelerometers, , combo sensor, pressure sensor, gyroscope sensor, proximity sensor, humidity sensor
and magnetic sensor etc available in market for IoT. This categories of sensors can be used for air
temperature, soil temperature at a different profundities, precipitation, leaf wetness, chlorophyll, wind
speed, dew point temperature, wind heading, relative moistness, sun based radiation, and environmental
weight are estimated and recorded at foreordained interims. This information is aggregated and sent
remotely to a focal information lumberjack at customized interims. Their convenience and diminishing
costs make climate stations alluring for ranches of all sizes.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 67
Biosensor
Biosensor is subset of synthetic sensor yet is regularly regarded as a different territory. It is an
interdisciplinary territory with correct breaking points can't be characterized effortlessly [3].
Fundamentally the biosensor is an independent logical gadget which reacts specifically and reversibly to
the focus or movement of synthetic types of natural examples, which implies any sensor physically or
artificially worked in organic examples can be considered as a biosensor utilizing living segments or a
result of living things for the estimation. Sensor range can be from extremely easy to the complex. They
are characterized in light of their properties that what it quantifies, what are its determinations, what
physical marvel it is detecting, what change strategy is utilized, what material it is made, and what is the
field of utilization [3]. Any electrical transducer is a detecting gadget that a physical, mechanical or
optical amount to be estimated and changed specifically with an instrument to an electrical voltage or
current that is relative to the information measurand.
Commonly used sensors in Internet of Things (IoT)
The large varieties and sort of sensors accessible in the market at show day. They are utilized for the
change of nature of human way of life. The significance of IoT rises step by step, a sensor in its part is
planned the estimation of physical outside jolt and records, demonstrates or reacts to it that can be
perused by a client or another gadget. The most ordinarily utilized sensors in Internet of things are
depicted in the accompanying.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 68
Figure-
1 Types of Sensors
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 69
Temperature sensors
These are one of the common utilizing sensors that measure the temperature or warmth of a given
medium. These sensors utilizes various methods for decide and evaluate the temperature. Some of the
Temperature sensors required a physical contact with the object while others not require contact as they
can distinguish fluid or gases that discharge brilliant vitality like emitting radiant energy like spike in
heat .Highly touchy semiconductors accessible in Market, which are sufficiently skilled to show slight
variety in temperature [9,10]
Proximity sensors
Proximity sensors are the best to identify any sort of movement. They are widely using in applications
such as security, safety, or efficiency. They are generally utilizing as , for example, security, wellbeing,
or productivity. These sensors are utilized to find out Pets ,Insects, Rats or any animal movement in
agricultural field so it can utilize effectively in smart agriculture management. Closeness sensors utilizes
electromagnetic radiation like radar signs to recognize movement or habitation. Proximity sensors have
best use in numerous types industry [10,11]. The retailers utilize closeness sensors to discover region of
the clients once they are close to their premises by sending them a few offers on their IoT gadgets. It
additionally can be utilized as a part of stopping frameworks, exhibition halls, airplane terminals, and so
forth.
Pressure sensors
Pressure sensors are utilized for estimating weight of a gas or fluid. Weight sensors changing over the
physical power into an electrical signal. They are additionally can be successfully utilized for estimating
different factors like speed and height or comparable circumstance somehow. Indicators and weight
checks are the normal utilizing weight sensors utilized for IoT framework. Indicators are useful in
climate estimating as it can give exact estimation of encompassing air. Weight checks are for the most
part utilized as a part of mechanical destinations as it is useful for the monitoring of weight in shut
environments. Pressure sensors are extreme answer for IoT gadgets as it can be utilized for different
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 70
territories, for example, touch screen gadgets, bio medicinal gadgets, car systems and fabricating
industry .Micro weight sensors are kind of little size sensors for the estimation of weight. The principal
small scale sensor was produced and utilized by industry preservative pressure sensors.
Optical Sensors
Optic detecting innovation is utilized to distinguish electromagnetic energies like light.It use idea of the
photoelectric impact, says that there will be a launch of electrons, when a contrarily charged plate of
some proper light-delicate material, is strike by a light emission. The electrons would then be able to be
made to stream as a current from the plate nourish as a flag. The greatness of the electric current
delivered is specifically corresponding to the light force or number of photons [9,10]. They can transmit,
get, and change over light vitality into electrical flag. The fiber optic sensor IoT interface is associated
with web and can collects various data for checking diverse parameters .These optical sensors generally
use in various sorts advanced cameras which go about as one of the major physical gadgets of an IoT
framework.. As they are uninvolved to all types of electrical interfaces, they are considered as the much
adored sensors for IoT. Optical sensors are useful for vitality, social insurance, aviation, chemicals,
natural IoT frameworks. Optical sensors can be perfect for conditions, for example, oil refineries,
mining activities, pharmaceutical organizations, and compound enterprises because of its norisk
segments[20]
Fiber optic sensors
Most remote detecting frameworks are intended to quantify photons. The indicator is most basic
segment in any optical detecting framework. It use idea of the photoelectric impact, says that there will
be a launch of electrons, when a contrarily charged plate of some suitable light-delicate material, is
strike by a light emission. The electrons would then be able to be made to stream as a current from the
plate bolster as a flag. The greatness of the electric current created is specifically relative to the light
power or number of photons. The dynamic vitality of the discharged photoelectrons shifts with
recurrence of the episode radiation. Be that as it may, distinctive materials has a limit wavelength at
which the wonder begins and a more drawn out wavelength at which it ends.[13] . The previous two
decades have seen a developing enthusiasm for the field of fiber-optic sensors. This pattern made by the
advances made in the related fields like opto hardware and optical flag preparing and the far reaching
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 71
utilization of optical fiber specialized gadgets in the media transmission industry caused decrease in
optical fiber sensor cost. So the optical fiber sensors have been produced for an assortment of
utilizations in industry, solution, guard and research [14].Optical fiber sensor framework comprises of
optical source, detecting component and optical locator . Data about the measurand is predominantly
passed on in all optical fiber sensors by a difference in either polarization, stage, recurrence, power or
can be mix of the above. The measurand like temperature, dislodging, or strain, and so forth can adjusts
at least one optical parameters of the light, for example, power, stage, and adequacy. A returning fiber
controls counter proliferating light to an optical identifier. This is then flag handled to give the
estimation of the measurand
Humidity sensor
Humidity is the nearness of water in air. The measure of water vapor in air can influence human livings
and numerous assembling forms. The nearness of water vapor likewise impacts different physical,
concoction, and natural exercises and its estimation in enterprises is basic since it might influence the
quality and cost of the item, the wellbeing and security of the staff. So humidity detecting is imperative
in the control frameworks for modern procedures and human livings [8]. Controlling or checking of
moistness is of imperative in numerous industrial, agriculture and residential applications. In
semiconductor producing process, the moistness or dampness levels should be appropriately controlled
and checked while wafer preparing. In medical science humidity control is required for respiratory
supporting framework, sterilizers, hatcheries, pharmaceutical preparing and numerous other organic
items. humidity sensor is additionally important in compound gas sanitization, dryers, broilers, paper,
material creation and nourishment preparing industry. In horticulture estimation of mugginess is
essential for plant insurance, such as dew control, soil dampness testing and checking. Residential
applications requires humidity control for living condition in structures and for microwave stoves, and
so on. So moistness sensors are utilized to give basic administrations in Agriculture field management.
Accelerometer and gyroscope
Accelerometer is utilized to distinguish vibration, tilt and straight speeding up. It is utilized for
execution of pedometer, leveling, vibration alert, anti-burglary and that's only the tip of the iceberg.
Whirligig is utilized to gauge rakish speed. Whirligig is for the most part utilized as a part of 3D mouse,
games and competitor preparing [9].It has been generally utilizing for identifying any tilt in the position
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 72
in the field, for example, Robotics and Industrial mechanization. It can be used in Agriculture robots that
supports the smart agriculture management.
Airflow Sensors
Air flow sensors in Agriculture field ensures the flow of air and eventually balances the amount of
CO2,O2etc in Green House. Agricultural Weather Stations can measure soil air penetrability.
Estimations can be made at particular areas or powerfully while in movement. The coveted yield is the
weight required to push a foreordained measure of air into the ground at an endorsed profundity.
Choosing a sensor
Factors that has to be considered when choosing a sensor [9,10]
Accuracy - The statistical variation from the exact reading.
Calibration - Required for most measuring systems since their readings will change over time.
Cost of the sensor
Environmental - Sensors typically have temperature and/or humidity limits.
Range - Limits of measurement of the sensor.
Sensors application in agriculture
Here are the various ways that accurately use above explained sensors in Smart agriculture management
for cultivating crops:
Yield Monitoring frameworks are set on edit collecting vehicles, for example,
consolidates and corn reapers. They give a product weight yield by time, separation, or
GPS area estimated and recorded to inside 30cm.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 73
Yield Mapping utilizes spatial organize information from GPS sensors mounted on
reaping hardware. Yield observing information is joined with the directions to make yield
maps. Variable Rate Fertilizer application apparatuses utilize yield maps and maybe
optical overviews of plant wellbeing controlled by hue to control granular, fluid, and
vaporous manure materials. Variable rate controllers can either be physically controlled
or naturally controlled utilizing an on-board PC guided by genuine GPS area.
Weed Mapping presently utilizes administrator translation and contribution to produce
maps by rapidly denoting the area with a GPS recipient and data logger. The weed events
would then be able to be covered with yield maps, manure maps, and splash maps. As
visual acknowledgment frameworks enhance, the manual section will soon be supplanted
via robotized, visual frameworks mounted to working gear[18].
Variable Spraying controllers turn herbicide shower blasts on and off, and redo the sum
(and mix) of the splash connected. When weed areas are distinguished and mapped, the
volume and blend of the splash can be resolved.
Topography and Boundaries can be recorded utilizing high-accuracy GPS, which takes
into account an extremely exact topographic portrayal to be made of any field. These
accuracy maps are helpful when translating yield maps and weed maps. Field limits,
existing streets, and wetlands can be precisely situated to help in cultivate arranging.
Salinity Mapping is finished with a saltiness meter on a sled towed crosswise over fields
influenced by saltiness. Saltiness mapping translates new issues and additionally change
in saltiness after some time.
Guidance Systems can precisely position a moving vehicle inside 30cm or less utilizing
GPS. Direction frameworks swap regular hardware for splashing or seeding. Self-ruling
vehicles are at present a work in progress and will probably be put into utilization in the
exact not so distant future.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 74
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 75
SL No.
Sensors Application
1 Air PollutionMonitoring of CO2or CO emissions of factories , Vehicles and toxic gases generated in farms.
2 Forest Fire DetectionMonitoring of combustion gases and fire conditions in Agriculture farms near to Forest areas
3 Farmer CareVital health signs monitoring during working in field
4 Structural HealthMonitoring of vibrations and other material conditions in buildings ,bridges and other monuments in fields
5 Agricultural EngineeringMonitoring soil moisture and Humidity and Temperature for healthy vegetation
6 Offspring CareControl of growing conditions of the offspring in animal farms for its better survival and health
7 Water QualityAnalysis of water quality and suitability in rivers and the sea for fauna and checking for drinkable
8 Quality of Shipment ConditionsMonitoring of vibrations ,Cracks, strokes, containers opening in supply chain maintenance
9 Waste Management For better waste management
10 Smartphones DetectionDetection of smartphones or any devices and in general any device which works with Wi-Fi or Bluetooth interfaces etc.
11 Perimeter Access ControlAccess control for restricted areas and detection of people in non-authorized areas
12 Electromagnetic LevelsMeasurement of the energy radiated by Radio stations or Cell towers and Wi-Fi routes
13 Smart ParkingMonitoring of vehicle parking spaces availability in the field and congestion avoidance
14 Radiation LevelsMeasurement and analysis of radiation levels in nuclear power stations surroundings to generate any leakage alerts
15 Water LeakagesDetection of liquid presence roads, Tanks, Pipe leak and canal overflow etc.
Table 1.0 Some suggestions of Sensors based on the analysis and testing in smart agricultural
management
Conclusion and Future work
The IoT sensors can be successfully utilized for Agriculture management effectively and so forth
administration in Smart agriculture areas Sensor innovation will discover numerous more application in
Smart agriculture administration in future. So this territory requires additionally inquire about in IoT
sensors and availability. Sensors are one of the rising territories of material science, hardware and
biotechnologies, and is the one that has most incredibly abused by the developments in the individual
networks
Fig3:
One model of smart agriculture
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 76
Here we have clearly analyzed in detail about various type of sensors available for smart agriculture. In
future, we want to study by implementing these type of IOT sensors for smart agricultural management
in crop cultivation for the arid environment in Mysuru district
References
[1]. Kwaaitaal Th., Sens. &Actuat. A 39 (1993) 103-110.
[2]. Vladimir J. Vaganov, Sens. &Actuat. A 28 (1991) 161-172.
[3]. Scheller F. & F. Schubert, Biosensors, Elsevier Science Publishers B VNew York, 11 (1992) pp 43-
60
[4]. Elmonds T E, Chemical sensors Champman and Hall Press New York (1989),pp 40-110
[5]. Bergveld P., Sens. &Actuat. A 56 (1996) pp 65-73.
[6]. Lowe C R, Biosensors, 1 (1985) 3-16.
[7]. Maria E B, Antonio J. R.S., Fuensanta S. R., & Catalina B.O., Sensors 7 (2007) pp 797-859
[8]. G.R.Tschulena, “Market Data - Sensors in Household Appliances”, Sensors Update, vol.12, no. 1 ,
pp.231 – 241.
[9]. C.F. Coombs(Jr), “Electronic Instrument Handboo k”, Second Edition, McGraw Hill, pp.5.1, 1994.
[10]. Grattam K T V& Dr. T Sun, Sens. Actuat. 82 (2000) 40 -61.
[11]. Kwaaitaal Th. Sens. Actuat. A 39 (1993) 103 -110.\
[12]. Muller C,Hitzmann B, Schubert F &Scheper, Sens. Actuat. B 40 (1997)71-77.
[13]. Culshaw B, Optical Fiber Sensing and Signal Processing, Peter Peregrenius Ltd. London,UK
(1989).
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 77
[14]. Yu F T S & Yin S, Fiber Optic Sensors, Marrcel Dekker, New York (2002).
[15]. Kersey A D,Opt.FiberTechonl. 2(1996)291-317.
[16]. www.libelium.com/resources/top_50_iot_sensor_applications_ranking/
[17] Nikkila, R., Seilonen, I., Koskinen, K. 2010. ‘‘Software Architecture for Farm Management
Information Systems in Precision Agriculture.’’Comput. Electron. Agric. 70 (2), 328-336.
[18]Kevin Ashton, ‘‘That Internet of Things thing’’ RFID Journal, It can be accessed at
http://www.rfidjournal.com/articles/view?4986
[19] D. Singh, G. Tripathi, A.J. Jara, ‘‘A survey of Internet-of Things: Future Vision, Architecture,
Challenges and Services in Internet of Things (WFIoT),2014
[20] Juan Felipe Corso Arias., Yeison Julian Camargo Barajas., Juan Leonardo Ramirez Lopez.,
‘‘Wireless Sensor System According to theConcept of Internet of Things’’, International Journal of
Advanced Computer Science and Information Technology Volume 3, Issue 3, 2014, ISSN: 2296-1739
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 78
Automated Speed Governor
*Akhil Chandran & **Manasa K N PG Department of Computer scienceSt. Philomena’s college, [email protected], [email protected]
Abstract
In 2016 there was 4, 80,652 accidents reported and by these accidents 1, 50,785 deaths occurred on Indian roads. Highway authority of India reported these accidents were mainly occurred because of over speed. In 2016 speeding caused 66.5% accidents and 61% deaths. Some of the existing systems reducing the accident ratio but it is not acting in a sensible way. This paper aims to make a sensible and driver friendly speed governing system with the help of GPS technology.
This paper proposes an embedded system which works based on geo-fencing technology. The vehicle speed will reduce when a vehicle enters the geo-fenced area. This kind of area details is stored in a database, and it is maintained online by the admin. This is the one part of this system and another important part of this system is a raspberry pi with a GPS module. The vehicle’s current latitude and longitude plotted by a GPS module and these values compared with the data which stored in a database by raspberry pi. If the values are matching it tells that now the vehicle is in the geo-fenced area. Then the raspberry pi will communicate with the ECU, and ECU will control the fuel injection system and it will reduce the speed of the vehicle. This embedded system used python and MySQL to connect the raspberry pi with GPS module and ECU. The other programs like PHP and SQL are used to store the values and make a website for this system.
Key Words: Raspberry pi, GPS, ECU, Geo-Fencing, Fuel Injection system.
Introduction
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 79
The speed governing systems has been implemented India since 2009. In that system, the speed is
limited to a constant range. So for all type of roads, the driver should drive within this fixed range of
speed. By because of these limitation drivers and the vehicle owners are hesitated to implement this
system.
Automated Speed Governor System is an improvisation of the existing system. The system performing
according to the condition and character of roads. That means the speed limitation of the vehicle is
restricted according to the character of road. The technology known Geo-Fencing is used to accomplish
this functionality effectively. Geo-Fencing technology allows us to fence an area. GPS module is
monitoring the system whether it enter into the fenced area or not. A database is used to store the Geo-
Fenced area details.
The Raspberry Pi is controlling all these components and make a communication between the modules.
The GPS module tracks the vehicle position continuously. The Raspberry Pi analyze the data’s what got
from the GPS with stored Geo-Fence data. When the data seems to be equal, the raspberry pi produces a
trigger to ECU. This component named ECU is the central controlling system of a vehicle. All the
operations done in a vehicle is the part of the ECU. The ECU sensors are monitoring and controlling the
system. When ECU got a trigger from Raspberry Pi, ECU will control the flow of fuel injection system
and it reduces the acceleration of the vehicle. The raspberry pi will not produce a trigger if the vehicle is
running under the speed limit which mentioned in the database. The goal of this system is when the
vehicle enters the geo-fenced area the speed should be controlled by raspberry pi.
The Automated Speed Governor giving a rapid response to control the speed of the vehicle. There is no
calculation needed to calculate the speed of the vehicle. Because of this calculation, the existing system
has accuracy problem. The data are stored in a database through online. The responsible person can add
new data, delete existing data, and they can adjust the speed of the vehicles within minutes.
Literature Review
Studies so far shows that Automated Speed Governor is gaining much more attention.
Aamir Sarwar Jahan et al. [1] proposed a GPS Enabled Speed Control Embedded System This is an
embedded speed control system, using AVR ATM mega128 microcontroller connected to EM-406A
GPS receiver. The large location data’s are stored in this system by offline. The GPS module will locate
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 80
the current location of the system. It will compare the GPS value with the data’s stored in this system. If
the data’s are matching the system output will communicate with ECU of the vehicle and that will limit
the speed of the vehicle.
Sneha Kamble et al. [2] proposed a Vehicle Tracking System. This paper tells how to track a vehicle in
an effective way. In this project, two modules are used to locate the vehicle one is GPS and another one
is GSM module. The GPS will send the location and with the help of GSM module. The data’s show in
an electronic medium via the internet or a specialized software.
Teduh Dirgahayu et al [3] proposed Location-based Request Forwarding in A Geo-fencing Application
with Multiple Providers. Geo-fencing is a technology that allows some functionality when users enter
into the specified area. In this project plotting the user current position and checking is he in this
premises and provide some functions. The user can use their mobile application to do these functions.
Fabrice RECLUS et al. [4] proposed Geo-fencing for Fleet & Freight Management [4]. This paper is
based on geo-fencing technology. They are saying about the fundamental concept of geo-fencing and
some advanced applications of this technology. In this they mentioned some applications like let the
drivers know about the weight and height restriction of the road, dangerous goods transport restriction,
etc. .
P. Mondal et al. [5] did this paper A Silent Tsunami on Indian Road: A Comprehensive Analysis of
Epidemiological Aspects of Road Traffic Accidents. This is the Indian road accident and the effect of
these accidents. The road accident reason, how to reduce it, the ratio of the accident, percentage of the
accident all the data are mentioned in this paper.
Prashant A. Shinde [6] proposed Advanced Vehicle Monitoring and Tracking System based on
Raspberry Pi. This vehicle tracking system based on Raspberry used to track a school vehicle position at
the time and provide a facility to the driver. The raspberry pi is connected GPS, GSM, and GPRS
module. Both are used to track the vehicle. The GPS is using to identify the current location; GPRS is
used to send the information to server and GSM is using to send information to the driver. The system
monitoring the vehicle speed and location. Raspberry Pi the GPS value and verify the speed and if it is
higher it will send the information to the owner.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 81
Mani Partheesh et al. [7] proposed Use of Geo-fences for Location-Based Activation and Control of
Services. In this project various automatic operations and various remote controls based on current
geographic location. The geo-fence enables the user to define the areas and when the user into the geo-
fence area it will automatically control the system.
System Description
Raspberry Pi
The raspberry pi is built with Quad Core 64 bit processor. Is used to control the entire system
and it collect the data from GPS module and compare with the database data. If the data’s are matching
it will connect with ECU.
GPS
The Global Positioning System is used to track the vehicle. It will plot the latitude and longitude
of the object. It can identify any location in the earth. The GPS module have antenna and receiver to
identify and collect the values.
Engine Control Unit
ECU is a programmable microprocessor. It is controlling all the engine part of the vehicle. All
vehicle sensors are connected with this ECU and act according to instruction. The Raspberry pi is
connected to ECU and it send instruction to ECU to control the fuel injection. When it gets instruction
from the Raspberry pi it will act according to the instruction.
Database
Databases are used to store the values like latitude, longitude and speed. The data which stored
in the database is well ordered. The Raspberry pi is connected with the database and continuously
communicating each other. The data get from GPS will compare with the data stored in the database.
Id Speed Latitude longitude
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 82
1 30 11.568975 76.254878
2 30 12.587854 77.369582
3 50 10.256879 79.214569
4 40 15.258794 75.369745
5 55 16.587987 75.125489
6 55 13.568794 78.254697
Methodology
Figure 1: System Architecture
The above figure 1 shows the system architecture.
Automated Speed Governor built with three hardware component and one website. The major hardware
components are Raspberry Pi, GPS module and ECU. Raspberry Pi 3 model B is used in this system to
establish a connection between these components and control the components. The power supply for
raspberry pi is getting from the car.
Another important component of Automated Speed Governor is GPS module. The Geo-Fencing
technology is accomplished with the help of this module. The latitude and longitude of a vehicle plotted
by GPS module and this values used to calculate whether the vehicle is in the fenced area or not. The
website is providing the data to check the details.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 83
The engine control unit is microcontroller used in modern vehicle to monitor the function. This is very
highly sensitive and costly equipment. Raspberry pi is communicating with this equipment. When the
GPS data and the data stored in database seems to be equal Raspberry Pi will communicate with ECU.
There is port in ECU to communicate with fuel injection system. When ECU got message from
Raspberry Pi the fuel injection port will produce a trigger to fuel injection system and that system will
reduce the fuel injection to the engine. It reduces the acceleration of the vehicle. These operations
happen when the vehicle speed is more than the assumed speed in the database. If it is less than the
speed no need of this operation.
Conclusion and Future Enhancement
Automated Speed Governor is an efficient system to control the speed. It is using geo-fencing
technology for better efficiency because the GPS module is used only to plot the location and there is no
speed calculation based on this module. All data are stored in online source and the admin can change,
add and modify the data. According to another system, there are no facilities like this. So it will be a
better solution for the Indian road accident and it will be driver friendly.
Automated Speed Governor is using Raspberry Pi and it is a programmable device. In future we can add
some more programs to this Raspberry to improve the existing system. We can add motion censoring
system to avoid collision, theft protection system, collision detection system etc
References
Aamir Sarwar Jahan, Imdadul Hoq, and David Westerfeld , “GPS Enabled Speed Control Embedded
System Speed Limiting Device with Display and Engine Control Interface” Department of Electrical
and Computer Engineering Stony Brook University,Stony Brook, USA
Sneha Kamble, Chinmaya Godbole and Rohini Gaikwad “Vehicle Tracking System”, IJIRST –
International Journal for Innovative Research in Science & Technology, Volume 2 (11), 2016, ISSN
(online): 2349-6010.
Teduh Dirgahayu and Feri Wijayanto, “Location-based Request Forwarding in A Geo-fencing
Application with Multiple Providers” , 2015 International Conference on
Technology, Informatics, Management, Engineering & Environment (TIME-E) Samosir Island,
North Sumatra, Indonesia, September 7-9, 2015
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 84
Fabrice RECLUS and Kristen DROUARD, “Geofencing for Fleet & Freight Management”
P. Mondal, Abhishek Kumar, U. D. Bhangale, and Dinesh Tyagi, “A Silent Tsunami on Indian Road: A
Comprehensive Analysis of Epidemiological Aspects of Road
Traffic Accidents”, British Journal of Medicine & Medical Research 1(1): 14-23, 2011.
Prashant A. Shinde, “Advanced Vehicle Monitoring and Tracking System based on Raspberry Pi”, IEEE
Sponsored 9th International Conference on Intelligent Systems and Control (ISCO) 2015.
Mani Partheesh, Kirupa Pushpamj , “Use of Geofences for Location-Based Activation and Control of
Services”, Pub. N0. US 2012/0172027 A1.
ANURAG KASHYAP FILMS: A CASE STUDY
Akshay SidharthDepartment of Journalism and Mass Communication,
St. Philomena's College, Mysuru
Anurag Kashyap is a prominent offbeat Bollywood filmmaker and screenwriter
who have received acclaim for his gritty and realistic films. He is considered to be
the wonder kid of modern new wave Hindi cinema. The study deals with the
deconstruction and in-depth content analysis of all his 8 films. The deconstruction
is in terms of various aspects such as the characterization, themes, the dominant
traits and other technical aspects. The researcher also aims to determine the
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 85
similar pattern or the blue print followed by all his films and look at them in a
different and unique perspective.
Keywords: Bollywood, New wave cinema, Characterisation, Auteur
Introduction
Anurag Kashyap is often termed as an auteur.Auteur is a French word which translated in English
means ‘author’, the creator of the work.The ‘Auteur Theory’ suggests that there is one prime force that
leads to the creation of the film and that individual guides all the processes of filmmaking.
(madaboutmoviez.com, 2012)The ‘Auteur Theory’ was born out of the French New Wave movement in
cinema pioneered by the critic and filmmaker Francoise Truffaut which was actually intended to be a
protest to free the global medium of cinema from its old and traditional conventions, consequently
asking for the liberation for the film maker to express himself beyond the reliance and dependence on
the literature and it also demanded due respect for the director who is to be looked as an independent
and self-reliant artist in the area and field of cinema enabling the director to invent a body of work,
similar to any other ordinary artist, focussed on themes and creating his own distinctive style.
The dark and gritty themes are the main highlight of Anurag Kashyap films. There is a different and
unique way in which the director sets the entire story which is entirely different from other
contemporary film makers of his contemporary era. The style in which the film has been portrayed will
have the typical Anurag Kashyap watermark on the entire films. There is often both off beat and
commercial flavour in all his films. It is impossible to call Anurag Kashyap films as solely offbeat or
solely commercial. Kashyap has created a new style which is one of a kind and which itself is a new
genre. Kashyap's films are always involved in controversies as most of his films are so real and they
explore the dark depths of the human conscious and it also portray the ruthless and cruel character and
behaviour of the contemporary society or world.
The genre of Kashyap films varies from romantic drama to neo- noir psychological thrillers. But the
traits in the films are following the same pattern. The nine films he has made have a new and distinctive
style on his own.
All the films are peculiar and distinct. The most notable one will be the remake of the classic Bengali
novel ‘Devdas’ by Sarat Chandra Chattopadhyay published in 1917. This movie has been chosen as it
successfully explores the space between the edges of commercial and parallel cinema. It fixes, like other
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 86
films human subject the film mainly constitutes the state apparatuses of extreme capitalism which
provided him or her with a place in relations of the production. The film explores the human emotions
such as guilt, jealousy and others in a new and distinctive style through a way which has not been
undertaken by any other film maker.
Kashyap also enthrals and also disturbs the audience by showcasing the intimidating and demeaning
nature of the contemporary society without any mercy. The audience are struck with such an impact that
they will have a whole new perception and clarity about the matters or entities portrayed in the film. He
is said to be influenced by different film forms and the narrative style of some of his films also have
similarity between western film makers such as Quentin Tarantino and Martin Scorcese. The films
selected are The Paanch (2003), Black Friday (2007), Gulaal(2009), No smoking (2007) , Dev D (2009),
Gangs of Wasseypur part 1 (2012) and part 2 ( 2012) and that girl in yellow boots (2011).
Review of Literature
Dinesh Bhugra, and Susham Gupta in their book “psychoanalysis and the Hindi cinema” says
“Psychoanalysis raises notions of individual's growth and development, and defence mechanisms are
used to suppress anxiety and stress. Portrayal of psychoanalysis in modern Hindi cinema is rare.
Psychoanalysis can determine the relationships between individuals and personalities.” (Gupta, 2008)
In another book by Ravinder Kaur “Viewing the West through Bollywood: A celluloid Occident in the
making” says that “The films sport a fantasy-like, rich look, trendy locations and designer clothes worn
by young men and women. The Hindi films are now placed in the realm of fast-changing contemporary
India with its new market-friendly economy, a globalised and upwardly mobile middle class, a vast
diaspora that constantly searches for authentic Indian values, and a huge, exportable, techno-savvy
workforce that thrives on growing western pop-dominated cultural forms such as Bhangra/Indi pop-
music and Hinglish theatre. (Mishra, 2002) The search for authentic Indian values, however
unintentionally, reveals the long-held images of the West and the eventual making of a celluloid
Occident.” (Kaur, 2002)
In a paper by M. Madhava Prasad “Realism and fantasy in representations of metropolitan life in Indian
Cinema” says that “Bollywood is dealing with the representations of metropolitan life, and it is
appropriate that we should focus at the outset, on what appears to be an intimate relation between the
city and the logic of fictional representation.” (Prasad)
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 87
In his book’ John David Slocum says that violence has been portrayed in different countries in different
ways and most of them included political violence. He talks about the cinematic representation of
violence and they have tended to represent violence as pathological. (Slocum, 2005)
In the article ‘ Sensuality , sexuality and belonging: Representations of the Anglo Indian and the western
women in Hindi Cinema’, Geetanjali Gangoli says that the Anglo Asian women represented in Hindi
films were seen as liminal as compared to Indian women. The literary projections of Anglo Indian
women saw a similar pattern. They are projected as promiscuous, sexually active, disrupting the colonial
agenda or as pathetic victims of decrement and boredom.
Methodology
The researcher is doing qualitative analysis. The researcher has analysed eight different films of Anurag
Kashyap for the purpose of deconstruction and content analysis. The researcher analyses every dominant
aspects of the film and the different crucial components of the film by comparing the films of the
director and extract the similarities and dissimilarities among all the films. The researcher has used the
coding sheet to bring out the common elements of the films or the parameters to study and analyse the
films. The analysis will be based on the parameters
Dominant traits of the male and female characteristic
Running time
Genre
Psychological aspects of thefilm
Overall setting of the story
Dominant traits of the film
Theme and genre of the film
Rationale of the Study
The study intends to find out the common strain or the basic pattern of Anurag kashyap films by
deconstructing the films in different aspects such as characterization, background of the story, execution,
and treatment etc. The study also aims to find out the existence of a common ‘blue print’ in his way of
film-making.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 88
Analysis and findings
The eight films chosen for the research are Paanch (2003), Black Friday (2007), Gulaal(2009), No
smoking(2007) , Dev D (2009), Gangs of Wasseypur part 1 (2012) and part 2 ( 2012) and that girl in
yellow boots (2011).
Running Time
The eight films are all above120 minutes of running time which follows the same track of the all other
Indian films.
Genre
The genre of the films are predominantly drama and but the sub-genre vary greatly from
romance,action,crime, thriller, political thriller and psychological thriller. All the eight films has the
dramatic element as the main genre mainly for its dramatization effect.7 out of 8 films ie apart from Dev
D are thrillers. They have a gripping story line which has an intense effect on the audience. The
characters also go through different harsh and extreme phases. They face many obstacles and
psychological trauma. Even though there are different genres the traits in the films are following a
similar pattern evidently.
Background of the story
The settings and background of the film is very crucial for any story or a narrative. The same is
applicable for Anurag Kashyap films. He has beautifully narrated the incidents and happenings of
different locales or areas with sufficient intensity and impact. The dark and the cruel atmosphere of the
modern contemporary society has been efficiently portrayed in the films.2 of the 8 films that is the two
parts of Gangs of Wasseypur has been shot entirely in the rural area of Wasseypur and the remaining of
the films are set in the backdrop of Urban locales especially the city of Mumbai which is the heart of
Indian economy and the hub of different cultures and diversities. Only one of the 8 films (DEV D) is
shot overseas that too around 10% of the entire film.
Characterization
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 89
The films of Anurag Kashyap follow a common trait in terms of characterizationas the lead characters
are having the similar traits and the emotional and psychological trauma they go through is also similar
processes. The male characters especially the lead characters have similar traits. The lead characters of
Gangs of Wasseypur,Paanch ,Gulaal and No Smoking They all have common traits.
In the films Gulaal, Paanch, No smoking, Gangs of Wasseypur the lead characters all have a similar
traitsas they are rich, spoilt, ruthless and arrogant and violent attitudes. On the other side the female
characters also have similar attitudes and character traits. The dominant traits of the female character are
manipulative,beautiful, seductive and ruthless.There are also traits of femme fatale which is a crucial
element of film – noir.
On the whole the characterization follows a same blue print which is evident from the similar and
common traits of male and female leads.
Table No.1-Dominant Male Characteristics
Characters Traits
Ransa (Gulaal) Spoilt,Rich,Carefree,
Dev (DEV D) Rich,Spoilt, Carefree,
Faizal (GOW) Authoritative, Violent
K (No
Smoking)
Arrogant,Bold,Rich
Luke (Paanch) Arrogant,Bold,Violent
TigerMamon
(Black Friday)
Authoritative,Violent,
Table No.2- Dominant Female Characteristics
Female Characters TraitsChanda(DEV D)
Seductive, Manipulative,
Kiran (Gulaal) Seductive, Manipulative,
Shiuli(Paanch) Seductive, Manipulative
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 90
Durga(GOW) Seductive, Manipulative
Ruth (That Girl in yellow boots)
Bold , Helpless
Traits
The films have a number of recurring traits which are dominant and crucial for the proceeding for the
story. In all his films there is a constant play between the human emotions and other psychological
feelings they go through in different situations and consequences. The emotions are so stark that the
characters feel so real and which also says that the characters are actually facing a problem. The
characters in the films have emotional outbursts.The emotions anger and frustration are dominant and
the characters are so much controlled by these emotions that they end up doing undesirable things which
tend to be hazardous for both the male and female characters. The emotion happiness is not at all present
in the films whereas grief also plays a crucial role in the fate of the characters along with the other
dominant emotions. This is evident from the films such as Gulaal, DevD and that girl in yellow boots as
the lead characters go through a number of relationship crises and other obstacles which tends to test
their emotional stabilities.
Psychological Abnormalities
The characters also show some psychological abnormalities. In No Smoking the character K played by
John Abraham shows extreme Narcissism which is evident from the scenes which is similar to the
original Narcissus who admires his own reflection and takes great care to preserve his own good looks.
The other major abnormality which is dominant is the ant- social personality disorder which can be
noticed in all the major characters in most of the movies especially the movies such as Gulaal, both the
parts of Gangs of Wasseypur, Paanch and Black Friday.This are mainly evident from the incidents they
get into tend the hideous and cruel things they do which are clearly unacceptable by the society.
Substance abuse
The other major trait of the films are the substance abuse which are very much recurring as the lead
main characters always indulge in substance abuse which vary from alcohol to narcotic drugs. Most of
his films portray substance abuse and the lead characters are having either extreme addiction or they
always use the intoxicants. ‘Dev D’ is the film which portrays the extensive alcohol addiction of the lead
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 91
character Dev due to his emotional breakdown which was caused by the relationship crises. The film
also portrays the usage of narcotic drugs in some part of the film.
The film ‘No Smoking’ entirely focuses on the smoking addiction and how the lead character is affected
by the consequences caused by the addiction and the cat and mouse game he himself gets entrapped into.
The film ‘Paanch’ also portrays a number of scenes in which shows the substance addiction which
forced them to do crimes and other anti-social activities especially the protagonist Luke which forces
him to fall into many undesired situations and consequently moves the story forward. The researcher as
also find out the inter relation between the crimes and the substance abuse.
Treatment and execution
The overall mood of all the films is dark. Most of the lead characters go through a series of emotional
outbursts and these outbursts result in various consequences which gives rise to a number of conflicts.
The films can also be said as the metaphor for the dark and disturbing mind-sets of the characters in the
film. The audience can feel the tension in the air as the characters go through different situations and
consequences.
In ‘No smoking’ the neo realistic atmosphere is evident all over with the unusual settings and the
colouring of the film also enhances the overall impact of the film on the audience and the character ‘K’s
mind-set also has been vividly portrayed in the film through the consequence and situation. Likewise the
films show the psychological tensions and pressure the characters go through.
Violent Content
The researcher also found out the extensive portrayal of violence in the films. All the films show
extensive verbal abuse between the characters and the high profanity is common in all the films. The
profane words differ in dialects of the respective areas. The profane words are like the integral part of a
normal conversation and The words are of Hindi origin and they vary according to the
Physical violence is also very significant in most of his films. The‘Gangs of Wasseypur’ films entirely
rely upon physical violence through arms such as guns, pistols and other variants of weapons. The blood
and gore is also very apparent in those films. The first film of Anurag Kashyap, ‘Paanch’ has intense
physical violence where the protagonist himself indulges into criminal activities such as murder and
hand assaults. Blood and gore is also apparent in this film. Similarly the film ‘Gulaal’ also has a number
of physical violence and gore.Which shows the common trait of violence is present in most of his
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 92
films.‘No smoking’ too shows extreme gore wherein the finger of one of the characters has been cut off.
In films ‘Gangs of Wasseypur’, Black Friday, ‘Paanch’ and ‘Gulaal’ the innate human violence and the
human atrocities are vividly portrayed and shown.
There are a number of films in which there is a dominant trait of political violence where the power is
misused and it is reflected through violence and other means of aggression. The movies also reflect how
politics cannot survive without violence and aggression. The significance of violence is that it is vital in
all aspects as the films which vary from different genres such from romance to political thriller there is a
significant amount of violence in the films portray how violence is dominant in the society now.
The human negativities such as manipulation,betrayal,greed and violence are portrayed in a stark
manner which actually has an impact on the audience. Kashyap has also tried to show the consequences
of the conflict areas as in all the films’ lead characters get consumed by the ill effects or the
consequences of the negativities and find their own doom. The plot of the films majorly involves these
conflicts which actually pushes the story forward. The corruption of the characters (political and non-
political) also has a great impact on the story. The films also depict the misuse of authority and power
and use them for their own selfish purposes.
The female characters are the main play a major role in the manipulation and other negativities. In the
film ‘Gulaal’ there are the character Kiran manipulates the protagonist Dilip Singh and other characters
for her own selfish purposes. They use their seductive nature to enhance their manipulative abilities. The
films are dark moral stories and they convey a message in the end.The violence of the films are too
brutal and most of the films are actually true life incidents which have marked some impact on the
history. (Booth, 1995)
The psychological aspects of the film are very crucial as there are a number of psychological elements
are dominant in the films and they have influence on the characters.The researcher has found out a
pattern followed by Anurag Kashyap in making films.
Conclusion
As per the analysis and findings the researcher has found out that all the eight films of Anurag Kashyap
have recurring themes and they portray different emotional variations of the characters portrayed in the
film. The researcher has also found that the films have tried to convey different messages or
implications to the audience. They have tried to cater to the specific needs of the audience which applies
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 93
to the uses and gratification theory.The films take the audience to a whole new level of cinematic
experience which disturbs the very perception and the basic understanding of the audience.
The researcher has analysed all the films follow a same pattern and it has a unique style pertained to the
director Anurag Kashyap.
Reference
(2012). Retrieved from madaboutmoviez.com.
Booth, G. D. (1995). Traditional content and narrative structure in Hindi commercial cinema.Gupta,
D. B. (2008). Psychoanalysis and the Hindi Cinema. Acta Neuropsychiatrica , 96- 97.
Kaur, R. (2002). Viewing the West through Bollywood: A celluloid Occident in the making.
Contemporary South India , 199-209.
Mishra, V. (2002). Bollywood cinema:Temples of desire.
Prasad, M. M. (n.d.). Realism and fantasy in representations of metropolitan life in Inian
Cinema.
Slocum, J. D. (2005). terrorism, media, libaration. London: Rutgers University Press.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 94
Modernism
Suhan Poovaiah, Carolyn Malsawmtluangi & Arjun PrakashPG Dept. of English, St. Philomena’s College (Autonomous) Mysore
Abstract:
Modernism has played an important role in ushering Literature into a new
era. The works be it in the form of literature, arts or architecture produced during the
period reflected the thoughts, ideals, doubts and anguish which are the results of
scientific, political and economic influence brought about by the advancement in
science and technology. This paper aims to highlight the shift in literary works
produced during Modernism and the participation of prominent figures during the
period.
Keywords: modernism, ideals, prominent figures.
Introduction:
The term ‘modernism’ is not as simple a question as getting a date or a time period and labelling
everything that falls within the time frame as ‘modern’. It does not specifically have an exact date as to
its historical emergence with not much evidence of spirited scholarly discussion about when or how it
actually began. However, its standard definition would be:
“a general term applied retrospectively to the wide range of experimental and avant-garde trends in the
literature(and other arts) of the early twentieth century”
According to M.H.Abrams;
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 95
“The term ‘modernism’ is widely used to identify new and distinctive features in subjects, forms,
concepts and styles of literature and other art in early decades of the present century”
But what about the artists who already thought of their art as “modern”.Witcombe in his essay, What is
art? What is an artist?(1997) points out to the 14th century artist who in his 1437 book “Il
Librodell’Art” describes Giatto as having made painting ‘modern’. This dilemma of what modernity or
‘modernism’ exactly means raises the question to the level that it becomes a necessity to have a broader
perspective of its true nature.
Roots of Modernism:
Modernism was said to have begun during the Renaissance as a revolt against the conservative values of
Realism. It was a traditional pattern to use God or nature as the centre of all the measures of life, but the
spirit of Renaissance already evoked the modernist trend of thought that human beings ultimately held
the power to “create, improve, and reshape their environment with the aid of Scientific Knowledge,
technology and practical experimentation”. It evolved and expanded as the Age of Enlightenment and
Scientific Revolution of the 18th century formalized this belief as credible. The open-mindedness of the
18th century allowed the people to think freely and apply reason to find truth. Arguably the most
paradigmatic motive of modernism is the rejection of the traditional forms of art, the rejection of the
certainty in Enlightenment thinking and the existence of the Omnipotent God.
Important intellectual precursors of Modernism in this sense are thinkers that questioned the certainties
that had supported traditional modes of social organisation, religion and morality and the traditional
ways of conceiving the human self. In biology, Charles Darwin’s theory of evolution by natural
selection undermines the religious certainty creating an aura of doubt regarding human being’s
superiority and the creation of man. Other thinkers and philosophers like Karl Marx in the field of
economics, Friedrich Wilhelm Nietzsche and Arthur Schopenhauer radically question the truth and of
the individual’s place in the society.Nietzsche offered the notion in 1883 that ‘God is dead’, and
questioned where this has left humanity and its morality. He concluded that we live in a meaningless
universe and are therefore truly free to explore the capabilities of human endeavour. Psychoanalysts
such as Sigmund Freud provided society with the means or the blueprint to go about this re-examination
of society and the self and Carl Jung further expanded on the exploration of the subconscious to find the
connection and bond among all individuals.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 96
Prominent Figures and their influence in Modernism:
Sigmund Freud:
Virginia Woolf said, “On or about Dec 1910, human character changed”. However,the whole of an
individual character or of the society cannot be changed within a day or even a month. But the statement
rings the truth. Character has been changed not because personality has altered, but literature had. By
1910, Modernism reached its peak with the emergence of new knowledge and technology and the
culture of that era began to look at things in an entirely different yet original way. Therefore, human
character didn’t really change but what really changes was the way it was perceived and the way that
perception has been put into written form. This brings light to the theory brought forth by Sigmund
Freud when he gave the ideas of the subconscious and the conscious state of mind. This single
hypothesis about the human mind can have the power to change an entire literary era. The subconscious
is the area of mind that is the deep feelings and desires that we are often unaware of. He goes on to
mention the different developments within our psyche which he labelled as id, ego and superego.
Writers up to the point before the notion of modernism were mainly concerned with the plot and their
descriptions, things that take place externally. Though they did not leave the internal human thought
completely they did not give extended attention to the internal workings of the individual mind. T.S.
Eliot’s The Love Song of J. Alfred Prufrock is a modernist poem which reflected the influence of Freud
on Modernism by the use of ‘Stream of consciousness’ technique. In the poem, Prufock fell in love with
a girl, but his shyness prevented him from pouring out his feelings. He is often caught in an endless
dilemma, to either confess his feelings or not. The reader is allowed to open a window into the thoughts
and desires of the protagonist. Freud’s concept of the role of the conscious and the subconscious within
the mind of an individual is presented in this poem.
“The mind is its own place, and in itself can make a heaven of hell, a hell of heaven” wrote John Milton
in his Book 1 of Paradise Lost. This presented the notion that the internal mind and thought itself is a
powerful weapon.
Karl Marx:
Karl Marx’s Philosophy is known as, “Dialectical Materialism” where no place is being given by him to
the soul and spirit. Being the ‘Father of Communism’, his basic concept lies with the class conflict. He
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 97
wanted to eliminate the hierarchical structure in the society and has concerns for the poor exploited
masses. His teachings inspired many revolutions like the Russian and Chinese Revolution and deeply
influenced the writings of D.H. Lawrence and George Orwell. Animal Farm, a novel written by George
Orwell is a 1945 modernist novel that has the influence of Marxism. It’s an allegory written in the form
of a fable, where animals are used as a metaphor to represent a satire on the Bolshevik Revolution.
There are class differences and inequality among the animals themselves. This shows the influence of
Marxism in Modernist Novel.
Modernism, which had been a minority taste before the war, came to define the 1920s. It appeared in
Europe in such critical movements as Dada and then in constructive movements such as surrealism, as
well as in smaller movements such as the Bloomsbury Group.The 1920s were known as the "Jazz Age",
or ‘the roaring twenties’ and the public showed considerable enthusiasm for cars, air travel, the
telephone and other technological advances. The “Jazz Age” is most identified in the novels of F. Scott
Fitzgerald, especially in The Great Gatsby.
A prominent feature of Modernism is the phenomenon called the avant-garde that is a small, self-
conscious group of artists who deliberately undertake Ezra Pound’s, ‘make it new’. These famous words
reflect the modernist movement approach to the old ways which they saw as obsolete. These Avant-
garde artists represented themselves as ‘alienated’ from the established order.Among these artists are
writers that include James Joyce, Luigi Pirandello and Samuel Beckett.
The literary trends of Modernism change to a certain extent within the field of poetry, novel and drama.
Major modernist poets include T.S.Eliot, Stephen Spender, Dylan Thomas, W.H.Auden, W.B. Yeats and
Robert Brook. Prominent novelists are Virginia Woolf, Aldous Huxley, James Joyce, Joseph Conrad,
D.H. Lawrence, H.G.Wells and Franz Kafka. They wrote about human conditions at its worst and at its
best while the woman counterparts began to champion the causes of women as an important influence to
a truly modern age.
Poetry in Modernism has no set rules and patterns like sonnets or the poems of John Keats and
P.B.Shelley which has rhyme schemes and definite metre. Free verse came into existence with the
breaking away from this tradition followed by the ‘stream of consciousness’ technique which is found in
the poem of T.S. Eliot, The Wasteland.
Conclusion:
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 98
Modernism has affected the individual and the society as a whole by its elevation into a new level of
development and creation of a new mode of thought and a way of life. It has genuinely proved the
dynamic nature of human life in this world and how we are not to be bound by a singular and absolute
law. It has played an important role in ushering ‘optimism’ in the part of literature.
Works Cited
Abrams, M.H. A Glossary of Literary Terms.New Delhi; Cengage Learning, 2012. Print.
Barry, Peter. Beginning Theory.Bengaluru; Viva Books, 2010. Print.
Computer Security Folder with Image Processing
*Bashir Omar Ali & **Manasa K NDepartment of Computer ScienceSt.philomena’s college, Mysore.
[email protected] [email protected]
Abstract
Folder security protection is one of most important system that can save and protect your
data. Folder security is the practice of preventing unauthorized access, use, disclosure,
disruption, modification, inspection, recording or destruction of information , information
security is the balanced protection of the Confidentiality, Integrity and Availability of data .
folder security its allow to protect your sensitive information from unauthorized users
using folder password and image comparison and detection (image processing) that
allow to enhance the security of the system , when user is pass the password form it will
display another form that check his/her image is recognized already if it match will
display the files but if it not match it will capture the image of the un authentication user
and send that image to authorized user using sms and also its provide locking, encryption
decryption, and hidden the files. you will provide the method that allow to encrypt and
decrypt the data , files , images and documents that allow to protect your data from un
authorized users, this encrypt method we use AES algorithm that its strong and advanced
other algorithm. The Advanced Encryption Standard, or AES, is a symmetric block cipher
to protect classified information and is implemented in software and hardware
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 99
throughout the world to encrypt sensitive data. The process of decryption of an AES
cipher text is similar to the encryption process in the reverse order.
Keywords: Cryptography, Face Reorganization, Face Compression and Detection, Security
Introduction
Secure Folders provides protection for your sensitive files and documents by hiding them or locking
them, and creating password-only access authorized user. No matter what you're trying to keep safe, this
system gives you the tools to do it the way you want through its intuitive and streamlined interface and
provide a good security system for computer folders. This proposed system provides various features
like authorized face register or save , receive notification about un authorized access your folder via
message, and keeping the un authorized image captured encryption decryption method and data hiding
methods.
Image processing is a method to convert an image into digital form and perform some operations on it,
in order to get an enhanced image or to extract some useful information from it.
This paper proposes a System to provide a security for folders. After passing the password will provide
next form of image compression and image detection this image compression will need to detect the
original image if it match the images you will get the file but if it’s not match it will capture and
recognize your face and send message to authorized user about someone tried to access your
information. The face recognition is a good authentication system which makes your confidential files or
folders more secured. Having the face recognition login system with the Windows computer folders
ensures that no one can break into your system without you as there is no chance of stealing your log-in
password. In the earlier of this decade, this was a myth for the general computer users since the use of
webcams or any security camera with compute was rare.
But, from the last 2-3 years, the usage of webcam has been grown significantly. Almost every laptop or
note book is now featured with an inbuilt webcam which can be used for not only communicating with
your friends but also integrating the face recognition log-in system with Windows or other operating
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 100
systems easily and costless. If you do not have any inbuilt webcam with your computer (Desktop PC or
older laptops) you can always assemble a webcam (is not so much costly these days) with it.
Literature Review
Studies so far shows that Folder Security by using Image processing is becoming popular.
San Jose et.al [1] proposed Fingerprint Authenticated Secure Android Notes. This System is Simple used
to secure notes via Finger Print Authentication. This System can also be referred as Keyless
Authentication unlike traditional way where it needed a password to enter. This System doesn’t have
any Registration but only the owner of the phone can access these notes as it searches for the owners
print.
Findphone.cmcm.com. [2] implemented CM Security. It will ask you to set a CM Security password and
you will be able to locate your phone on a map you can also lock your device to protect your privacy. If
anyone tries to break into your phone and enters the incorrect password 3 or more times, the app will
take a picture of the infiltrator and keep it.
Raikoti Sharanabasappa1 et al.[3] A Unique Document Security Technique using Face Biometric
Template Human face is generally viewed as most flexible model when it comes to the field of
biometric applications. A unique binary string generated out of facial features of a person is called a
template. This template is used in several applications like network security, public key cryptography
and so on. A framework needs users to register with the system along with their face instances. The
instances are used for training samples. Once a user selects a folder for encryption, all the files of the
folders are encrypted with the templates generated from users face data. A decryption request needs to
be authenticated through the face data and the template generated at the time of decryption is used for
decrypting the encrypted files.
Ms. Achla Devi1 [4]: Implemented an Iris Based Security System Using Matlab Based Image Processing,
Biometrics is technology of identifying human subjects by means of measuring & analyzing more than
one intrinsic behavioral / physical traits. Iris recognition is method of biometric to be identify its use
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 101
mathematical recognition techniques on video images of one or both of irises of an individual eye,
whose difficult random patterns are unique, stable, & could be seen from some distance.
Mr. Saurabh Mitra2 [5] proposed a Secure Data Hiding Technique Using Video Steganography
Emergence of internet has made it possible to transfer the data from one place to another place rapidly
and accurately. This data when goes through the internet may become a victim of the hackers who can
steal, modify and misuse the information. Therefore it is necessary to transfer the data with utmost
security. Steganography is one such solution to this problem.
Methodology
Figure 1: System Architecture
The new system provides to protection for your sensitive information and documents by locking of the
faces, and provide to capture face from unauthorized user access . No matter what you're trying to keep
safe, this app gives you the tools to manage your computer folder efficiency and integrity. In this system
using simple service to take photo of when unauthorized user trying to access my sensitive information,
the are two cases might take either
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 102
[3] When the user insert the correct password will pass next face of the image compression and
detection of the faces if it detect the face user will get the files and also user can lock , unlock,
hidden, un hidden ,encrypt and decrypt the files, but if the user insert wrong
password can’t pass the password phase and web camera will be turned on and capture the face of
the unauthorized user that tried to access your files, and it will send you the text message about
someone tried to access your information
[3] When the user insert the correct password and pass this phase it will provide another phase of
image compression and detection that allow to detect the faces if the face is registered already, but
if the user is not registered his face already he/she will get another forms that check the code no
and birth date of the user if it match the birth date and code no the user will get the files but the
web camera will capture his face and store.
For this activity you will provide the high and strong security because we are used for the face
reorganization and detection that can allow your system can not open unless your face only , in the
password security can break and guess but in this method no one can break and guess your face unless
for you only.
And this systems will provide a lot of services that is allow to lock your folder using your password and
your face, and also you can unlock your information and hidden , un hidden , encryption and decryption
your files for you only ,no one can open your files because its require your face except some user that
provide permission for you , for those they will get extra security for checking the code no and birth
date. Also, provide SMS services that allow to notification about accessing your information from un
authorized user and also it will capture the face of the un authorized user that can allow to know who
accessed your files.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 103
Figure 2: Activity diagram
Conclusion and Future Work
This system provide high security protection using the password and image processing that it allow the
user to keep his information safely and reliability , if the unauthorized user pass the loging form he/she
cannot pass the image detection form because its required image of the user authentication
This application provides various features like an authorized face recognition, receive notification about
an authorized access your folder via message, and keeping the authorized image captured and encryption
decryption method and data hiding methods.
References
2 SAN JOSE “proposed Fingerprint Authenticated Secure Android Notes”, Google Scholar U.S.
Pat. Nos. 3,938,091, 3,587,051, 3,611,293 and 4,198,619 Owner name: Atalla Corporation,
2363 bering drive.
3 Findphone.cmcm.com.” CM Security” , findphone.cmcm.com
4 Raikoti Sharanabasappa1 and Sanjaypande M. B. 2 1 Research Scholar, “A Unique Document
Security Technique using Face Biometric Template”, IEEE Journals and Informatios.
5 Ms. Achla Devi1 , Mr. Kuldeep Kumar2 “]: Implemented an Iris Based Security System Using
Matlab Based Image Processing” , IEEE Journals and Informatios.
6 Miss. Uma Sahu1 , Mr. Saurabh Mitra2 1 M.Tech. Scholar, “proposed a Secure Data Hiding
Technique Using Video Steganography”, IEEE Journals and Informations.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 104
Usage of K-means Algorithm to Analyze Crime Dataset
*Husam Alalloush, **Manasa K.N & ***Wasim AliPG Department of Computer Scicence
St.Philomena’s College, Mysore.***Research Scholar, Department of MCA, VTU-RC, Mysore.
[email protected] [email protected] [email protected]
Abstract
Crime analysis is a set of techniques that assist the police
departments to become more effective though better
information. Our Proposed system help to predict the
probability of crime occurrence in a city by analyzing the
crime dataset and visualize the results on a google map for
better understanding.Here we can predict the most places
where the crime might occur. This is done by using K-means
clustering algorithm which group the similar objects into
clusters. This system can be used by police forcrime
prediction cases and proactive steps for catching criminals.
Keywords —Crime, Data mining, Clustering, K-Means, Google Map, Web application.
Introduction
Nowadays, the crime rate is increasing day by day and all the efforts of the
government’s worldwide aim to reduce the crime rate. With the help of data mining
which is a great field of applying high volume of dataset and it proved that it helps
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 105
to take advantages of historical data with its techniques and it is going to benefit the
police departments with analyzing the data and extract the knowledge from it. Data
mining consists of many techniques like clustering, classification, prediction, etc.
Clustering used to cluster (group) objects with similar attributes from dataset for
further analysis and one of the algorithm used in clustering is k-means algorithm.
Most of the crimes are unsolved and contained empty values so that restrict us to
choose clustering over classification. Clustering is known as the simplest and fastest
algorithm for clustering compared to other algorithms and it is the best choice when
It comes to cluster high volume of data due to its less computational speed. In this
project we are going to create a web application with five features that can be
helpful for police and this project use crime dataset that belongs to Chicago city in
USA and we implemented k-means algorithm in NetBeans software, to cluster the
crime datasetand give the results which is going to show us the crime prone areas
with the rate of crime occurred there, and it is going to determine the percentage of a
particular crime occurring in particular area as well as it is going to visualize the
results of each crime on google map including the type, number and the time so the
police can take advanced strategies for crime reduction.
Literature Review
Jyoti Agarwal et al [1] proposed a system which includes steps for crime analysis
starting with extraction of crime patterns and prediction the crime using k-means
algorithm and that lead to detection of the crime at the end with the use of Rapid
miner tool.
Manish Gupta et. al. [2] study the existing system in use by Indian police and
highlighted the basic features of the system, then he introduced a criminal analysis
tool which is based on data mining techniques that helps police department to carry
out the activities efficiently.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 106
Maloti and Santhosh Baboo [3] proposed a crime analysis tool for Indian scenario
and proved that it is effective for identifying crime patterns and prediction. To develop
the tool, he develops a data cleaning algorithm and he enhanced clustering algorithm
(Kmeans, DBScan).
Kadhim Swadi Al-Janabi [4] proposed a framework for crime and criminal data
analysis. For data classification, he used decision tree algorithms and simple K-means
for data clustering. The result is used for prediction of trends and behavior between
crimes and criminals.
Chris Delaney [5] he pointed out about the importance of identifying and make
tactical analysis of crime trends and patterns by criminal investigators all over the
world.
Priyanka Gera and Rajan Vohra [6] did a study at the use of clustering technique in
data mining to analyze the crime patterns which helped to recognize which type of
crime is more occurring and showed the distribution of each crime type in every area
category.
Methodology
Data mining techniques can be applied in crime analysis and it help to take advantage
of historical data and extract knowledge from it therefor help to take better decisions.
A data mining approach such as clustering is used to cluster the data into groups
where similar objects are placed together and in this system, clustering helps to group
the same crime types together which means crime like “murder” are grouped together
and same for “rape” cases and so on. In addition to that, the system determines the
low, medium and high areas of crime based on the dataset
K-means process consist of the following steps:
[4] choose k number of clusters as initial step.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 107
[5] choose a set of K instances as centers of the clusters.
[6] each instance assigned by the algorithm to the cluster which is closest.
[7] The cluster centroids are recalculated either after whole cycle of re-assignment
or each instance assignment.
[8] The process is iterated.
The algorithm requires to specify k number of clusters in advance. It is unable to
handle noisy data and outliers and not suitable to discover clusters with non-convex
shapes.
.
Fig. 1. K-means Clustering Algorithm
K-means is chosen to be used here because the ease of implementing it using java, plus its
simplicity and speed which is very appealing in practice and it is suitable for high volume
crime dataset and can help to extract useful information.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 108
Fig. 2. System Architecture
The dataset imported from Chicago police department included 6.54M rows of committed crimes
from 2011 until present and 22 columns such as (id, date, type, location...).
We are going to take this data and imported into NetBeans software and implement the k-
means algorithm in java and here we aimed to implement the algorithm in the best way with
an optimized code to ensure the efficacy and speed as well as the accuracy in the work.The
next part is to choose the number of clusters and it is somehow subjective in general. As we
saw, that we are dealing with a huge dataset, we decided to choose 10 clusters for better
prediction. Then we can visualize the clusters that are created by k-means on the google map
and determine the crime prone areas and each cluster is going to be denoted with a number
indicates the crimes included in it. Then it will visualize the places where a specific crime
occurs(such as there more theftincidents occurs at tourist destinations and that is the main
work which is going to help the police to focus on some areas and take more precautions to
prevent any future crimes and hence reduce the crime rate.we can also visualize all the crime
locations of the city on the google map for good understanding of the situation. Additional
feature is implemented to show the percentage of a specific crime that occur in specific part of
the city and an example of that is “rape” incidents are twice in villages than cities. In addition
to that, implementing a performance features are necessary to help to monitor the rate of the
crime to see if it is increasing or decreasing.
Finally, reports must be generated and can be download that contains the crime rate graphs and
map images.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 109
Module Description
Proposed system consists of two modules, Admin Module and User Module.
Admin module where his work is to train the dataset and uploaded to make it available to the
authorized users. The crime dataset should not contain any empty values and some dataset
contain a lot of attributes so here we filter our dataset according to some requirements to
ensure the accuracy in the clustering process.
The user module is about the user’s work of determining the cluster number which is depends
on the method used for measuring similarities and the parameters used for partitioning. Then
applying the k-means algorithm on the dataset and starting his job for analyzing the crime
patterns and monitoring the crime rate. Then generating the required reports that is going to
be demanded by the employees in the police department. So here, many users can share the
same work on analyzing the clustering results and trying with different number of clusters to
ensure the accuracy and finally they can identify common crime patterns with the help of the
system.
Conclusion and Future Work
This system is mainly used to cluster the dataset and apply k-means algorithm on the crime
dataset for crime analysis purpose and visualizing the clustering results and crime incidents
on the map and preparing reports of the crime rate. This process is to help to predict future
crime based on this historical dataset.
As a future work more features can be added to this project in the future which can be more
helpful and give more information about the crimes and criminals. For better predicting
results, different techniques can be used in crime analysis field or using a different algorithm
and comparing the results and efficiency between the different algorithms.
References
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 110
[5] Jyoti Agarwal, RenukaNagpal, Rajni Sehgal, “Crime Analysis using K-Means Clustering”, International Journal of Comupter Applications (0975-8887), Vol. 83, No. 04, 2013
[6] Manish Gupta, B. Chandra and M. P. Gupta, “Crime Data Mining for Indian Police Information
System”, Computer Society of India, Vol. 40, No. 1, pp. 388-397, 2008
[7] A. Malathi, Dr. S. Santhosh Baboo, Algorithmic Crime Prediction Model Based on the Analysis
of Crime Clusters, Global Journal of Computer Science and Technology Volume 11 Issue 11
Version 1.0 July 2011.
[8] KadhimB.Swadi al-Janabi . A Proposed Framework for Analyzing Crime DataSet using
Decision Tree and Simple K-means Mining Algorithms, Journal of Kufa for Mathematics and
Computer, Vol.1, No.3, may 2011Y.
[9] Chris Delaney, Crime Pattern Definitions for Tactical Analysis, International Association of
Crime Analysts (IACA), August 2011.
[10] Priyanka Gera and Rajan Vohra, City Crime Profiling Using Cluster Analysis, International
Journal of Computer Science and Information Technologies IJCSIT, Vol. 5 (4), 2014.
[11] Chicago Police Department (Crime dataset in Chicago city in USA).
https://data.cityofchicago.org/Public-Safety/Crimes-2001-to-present/
ijzp-
E-Bakery shop System
*Tahmeem Saba, **Manasa K N & ***Wasim AliPG Dept of Computer Science
St.Philomena’s College, Mysore.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 111
***Research Scholar, Department of MCA, VTU-RC, [email protected] [email protected] [email protected]
Abstract
This paper proposes an e-commerce bakery shop system that allows both
bakery owners and customers to manage their daily activities of online
buying and selling product by incorporating data mining technique. This
system develops an Android application for customer to purchase the
online product of their choice from different bakeries, get suggestions
based on their choices and also to get notification /bill through email
once the product delivered and a website is built for bakery owners to
predict some of the features such as Fast, Slow moving products based on
each day, area, are predicted and the system calculates which products
are sold more, depending on their respective season/period products sold
more in (monthly, yearly )are tabulated.
Keywords- Online bakery shop, data mining-classification, Decision tree classifier Notification/bill through email.
Introduction
Nowadays most of the people are purchasing the product online rather than going to the
shop to save time and to purchase the product of their choice in cheap rate anywhere and
at any time but they are so many different websites that offer the same product in cheap
price and the customer have to search in each website about the product and compare the
product price which is time consuming. The examples of online business are food
ordering, bus booking, flight ticket booking, hotel booking and others. Electronic or e-
commerce food ordering systems are one of the popular online businesses.. Various
items of food can now shop through the internet such as fast food, bakery and others.
Customers can view and select the product from bakery shop, add to cart, choose the
delivery types, make payment, give rating and the order is complete.
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 112
However, most of the existing online bakery items ordering system was done only for single bakery
shop and user have to download another app to compare the items, till now they have not included data
mining technique in bakery shop system that helps both the bakery owner and customer to increase their
efficiency and reduce the cost and time and also they do not have proper notification/bill services
through email. To solve the above problem of existing system the e-bakery shop system is been
developed.
The aim of this proposed system is to build a website for bakery shop that include n-number of bakeries
and help them to increase their sales and improve efficiency by predicting some features such as Fast,
Slow moving product based on each day, depending on area which product have sold more and based on
respective season/period which product have sold more (monthly, yearly)by incorporating data mining
technique and also to develop an android application for user to purchase the product, search the product
from different bakeries, get suggestion about the product of their choice and also to get notification/bill
through email after delivery.
Literature Review
Venkata Rajeev P et al.[1]proposed a web base system for recommending and comparing products
which is sold online, and use natural language processing that automatically read reviews and to
determine the polarity of reviews and used Naive Bayesian classification.
Rana Alaa El-Deen Ahmeda et al.[2] included eleven data mining classification techniques to find the
best classifier for consumer online shopping attitudes and also to build a recommender system using
decision table classifier to find the products that user is searching for in some websites.
Noorfa H. Mustaffa et al.[3]: build a system using rational unified process for bakery shop that provide
the Short Message Service to notify customer when the order is ready for delivered and give flexibility
in delivery options to the customer.
Dr. Bharti Joshi et al.[4]
user to buy the books
build a recommender system for online book shopping that helps the as per
the user needs and interest and this system helps to solve data
Philos Multi –Disciplinary Journal ISSN 2456-9828 e- Journal April 2018 Page 113
Sparsity problem and combined two algorithms that is the collaborative-based filtering and
association rule mining to get better performance .
Ming-Hsiung Ying et al.[5] proposed an online shopping website to search the commodity using
ontology, and web mining technique to track consumer demand like when the commodity price
of any website is lower than the consumer price conditions, then the system will notify to
consumers
Methodology
Data mining techniques can be applied in any online business to increase their sales because it
helps in extracting and identifying useful information from large amount of data that is why
retailing companies operate purchase databases in a long way, such that all transactions are
stored in arranged order.
A classification technique called decision tree classifier is used to predict some of the features
which help the bakeries to increase their efficiency and helps them to reduce time and cost such
as fast , slow moving products sold based on each day, based on area which product have sold
more, depending on respective season which product have sold more in month and year, and
customer can search items based on availability and overall rating of product and also get
suggestion of products as per user needs and interest .
Module Description
In E-bakery shop system, there are 3 modules. Admin will login through the website and he
add/view the bakeries. Once the bakery register, the admin can add the bakeries through the
website.
once the bakery is accepted from admin the bakeries can add product ,update the product ,give
discount, and also they can predict products such as fast moving, slow moving product based on
each day, depending on area which product sold more, based on respective season/period which
product have sold more in month and year using data mining technique.
User will login through android application and they can search the item, view n number of
bakeries and order different product of their choice, they can get suggestions of product based on
their interest and also they can rate the product.
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 114
Figure 1 System Architecture
MODULES
There are 3 modules
Admin:
Admin will login using user id and password.
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 115
[9] Admin will add/delete/view bakeries.Bakery shop
7 Bakery shop will register and login
8 They can add, update the product
9 They can discount on products and view the products
10 They can predict products like(fast moving, slow moving, Area wise, Season wise)
User
[12] User will register and login
[13] User can view the bakeries.
[14] Search items.
[15] User can give the suggestion and rating
Conclusion and Future Work
The E-Bakery Shop System helps both the bakery owners and users to improve the efficiency
and reduce the time and cost. Predicting features like which products have Sold More, Sold Less,
in each day ,based on area predicting particular product sold more, based on respective
season/period predict most sold products in month and year .through this the bakery owner will
improve efficiency, save time and cost. The customer will also get benefits to search product
from different bakeries and buy the best product from best bakeries with their appropriate cost
based on rating and availability of product and also get suggestions about the product based on
their choice and get notification/bill through email once the item delivered.
For further work prediction can be applied to other data mining technique and also they can add
extra features to the proposed system to help both the bakery owner and customers.
References
[1] Rana Alaa El-Deen Ahmeda, M.Elemam.Shehaba, Shereen Morsya, Nermeen Mekawiea
Arab academy for science and technology(AASTMT),“Performance study of
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 116
classification algorithms for consumer online shopping attributes and behavior using data
mining”, Fifth International Conference on Communication Systems and Network
Technologies 978-1-4799-1797-6/15 $31.00 © 2015 IEEE DOI 10.1109/CSNT.2015.50
[2] Dr. Bharti Joshi ,Suhasini Parvatikar ” online book recommendation system by using
collaborative filtering and association mining”, IEEE International Conference on
Computational Intelligence and Computing Research 978-1-4799-7849-6/15/$31.00
©2015 IEEE
[3] Noorfa H. Mustaffa*, Nur Farahin A.Razak, Nor Haizan M. Radzi, Roselina
Sallehhuddin, Erne N. Bazin, “online food ordering system with short message
notification” International Journal of Emerging Research in Management &Technology
ISSN: 2278-9359 (Volume-4, Issue-12)
[4] Ming-Hsiung Ying*, Yeh-Yen Hsu† “commodity search system for online shopping
based on ontology and web mining” Department of Information Management, Chung Hua
University, Hsinchu, Taiwan , Print ISBN: 978-1-84919-970-4,INSPEC Accession
Number: 15197126 ,DOI: 10.1049/cp.2014.1526 4-6 Dec. 2014
[5] Venkata Rajeev P, Smrithi Rekha V “ Recommending Products to Customers using
Opinion Mining of Online Product Reviews and Features”, International Conference on
Circuit, Power and Computing Technologies [ICCPCT]978-1-4799-7075-9/15/$31.00
©2015 IEEE
IOT Based SLT (Smart Line Transmission) Pole wth Electrical Lineman Safety
*Jayashree H R & **Mansa K NP G Department of Computer Science
St.Philomena’s Collge, [email protected] [email protected]
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 117
Abstract
Most of the times in TV, Newspapers we read and hear
that someone died in electrical pole accidents and it may
be a child, student, farmers, animals etc. Thus we need a
solution to avoid accidents due to electric broken lines.
As we need a solution for avoiding accidents due to
electric broken lines, the system includes smartness
where if electrical lines are broken its location should
be sent to the authorities automatically with the help of
IoT technology without any human intervention as well
as it should include a mechanism to avoid accidents and
death caused by stepping on that broken electrical line.
To modify the existing power distribution system for an
automatic electrical line breakage detection and power
supply breaking mechanism, a remote telemetry system
is implemented in which RF transceivers are used to
detect electrical line breakage. Also, the location where
electrical line is broken will be sent to the authorities
using GPS via IoT technology i.e., Wi-Fi along with the
notification of SMS using GSM. To provide localized
safety measurements of a lineman the system provides a
password protected electrical line breakage system if
automatic line breakage fails. Also to protect the entire
system, a password protected door locks is implemented.
The switching of the electrical line will be done by the
Relay. All components in the proposed system are
controlled by the Arduino Microcontroller.
Keywords: Arduino Microcontroller, GSM, GPS, Wi-Fi, RF transceivers, Relay.
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 118
Introduction
Electricity is one of the basic needs in every field. Electrical power system is non-linear and has
complex system which is very difficult to detect and monitor regarding electrical line breakage in
entire glob. Day by day the ratio of people who die due to Electrical accidents is increasing and
in that major reason is by unknowingly stepping on a broken electric line which is caused by
natural calamities, accidents, etc.
Idea of the proposed system in module1 is that every pole is designed in such a way that it is connected to each other through wireless communication (RF-Radio Frequency modules)
Consider we are having 5 poles. If the 4th pole line is broken, 5th pole senses the signal from 4th,
if there is no signal, it will alerts the public with a buzzer alarm so that anyone can get information that some danger aroused.
Once it acknowledges the breakage of the line occurred, it sends message to predefined numbers
and also disconnects the power line automatically from substation poles 1 to 4 in order to ensure
that no harm occurs to anyone. Also it sends location of that area where the line has broken to the
authorities through GPS via Wi-Fi i.e. IoT technology and the location will be displayed on web
browser.
Critical electrical accidents to line men are on the rise during electric line repair, due to lack of
communication and co-ordination between the maintenance staff and electric substation staff.
The idea of the system in module 2 provides a solution that ensures safety of maintenance staff,
i.e., line man and the control to turn ON/OFF of the line will be maintained by the line man only,
because this system has an arrangement in such a way that a password is required to operate the
circuit breaker (ON/OFF). Also to ensure the safety of the developed system, another system
which is a password protected door lock system is included. It helps in protecting the accessing
of the password protected circuit breaker system, such that only authenticated people can get
access to the system.
Literature Review
Studies so far show that there is a need to automate the existing electrical power system by
including IOT.
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 119
Dr.k.Sathiyasekar et al.[1] Proposed a scheme for minimizing the delay caused by traffic
congestion and to provide the smooth flow of emergency vehicle by providing green signal to the
path where emergency vehicle travels and also the system identifies accident location and sends
that location immediately to the main server. The main server finds the nearest ambulance to the
accident zone and sends the exact accident location to the emergency vehicle so that it reaches
the nearest hospital soon.
B.A. Jan proposed [2] Proposed a new technique of detection of faults on EHV electrical lines
up to and above 800 KV .The paper presents GPS (Global Positioning System) for detection of
faults and protection of EHV lines both + 800 KV. Relays are located at each bus bar in a
transmission network. These relays detect the fault and generate high transact signals and trace
the time instant corresponding to different fault occurring at bus bar and it generates initial
travelling wave.
Ing. Komi Agbesi et al.[3] Proposed a smart GSM based fault detection and location system
was used to adequately and accurately indicate and locates the exact spot where fault had
occurred which will ensure a shorter response time for technical crew to rectify these faults and
thus help save transformers from damage and disasters. The system automatically detects faults,
analyses and classifies these faults and then, calculates the fault distance from the control room
using an impedance-based algorithm method. Finally, the fault information is transmitted to the
control room.
Mr. Pravinkumar et al. [4] Focused on critical an electrical accident which happens to line men
which are on the rise during electric line repair due to lack of communication and co-ordination
between the maintenance staff and electric substation Staff. The proposed system provides a
solution that ensures safety of maintenance staff, i.e., line man. On detecting a fault in electric
line, the line man sends SMS and the main line is switched OFF which is again switched ON
after solving the fault.
Anjana A S et al. [5] proposed a concept where the electric line man safety system makes use of
a new concept of one time password (OTP). When the user put a request, the system generates
passwords and a relay switches to turn ON or OFF the circuit breaker. OTP plays a major role in
this system. The one-time passwords mean the generated passwords are different at each time
and also the activation or deactivation of the circuit breaker is indicating by a lamp (ON/OFF).
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 120
Prof. Manik et al. [6] proposed a system which describes a modification to existing power
distribution system with remote telemetry unit for wire break detection and a power supply
breaking mechanism. The circuit breaker with shunt trip mechanism breaks the supply and
avoids damages from electrical accidents due to overhead transmission lines conductor breakage
problems which will operate on open circuit principle rather than short circuit.
Methodology
System architecture
Figure 1.1: System Architecture
The system architecture shown in the figure 1.1
Activity Area: It is the place where the components involved in the proposed system are
implemented. It checks for electric line hazards and sends the SMS to authority
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 121
substation and line man.
Wi-Fi: It is an Internet of Thing (IoT) responsible in finding the Location of the occurred electrical line.
Authority of Substation: Authority which is responsible in viewing and maintaining the confidentiality.
Line Man: Controls ON/OFF of the particular location’s electrical line. Where, authority gets the SMS of the electrical line controlling.
The Internet: GPS location’s activity area.
Google Map: Map the location of the electrical hazard which can be viewed by the authority of substation.
Activity area sends the message about the electrical line breakage to the authority and the
lineman where, authority can access the location via Wi-Fi module through the internet. Also,
the message will be sent to the authority when the lineman tries to switch ON and OFF the
electrical line.
3.1 Block Diagram
Module 1: Automatic Lines Break Detection System Using IOT Technology
Figure 1.2 (Transmitter part)
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 122
Figure 1.3 (Reciever part)
The block diagram of module 1 is shown in the figure 1.2 and 1.3.
In the figure1.2 ie.At the transmitter part RF transmitter is connected to the Microcontroller for
sending the data to the RF receiver and also a Relay is connected to the Microcontroller for
switching ON and OFF the load line.
Whereas in the figure 1.3 ie.At the receiver part it contains a Microcontroller, GPS, Wi-Fi,GSM
and Buzzer. The RF receiver receives the data sent from RF transmitter if that load line is not
broken. When the load line gets broken, RF Transmitter won’t send the data to the RF receiver.
Then the receiver will actuate GSM to send the notification and actuates GPS to fetch the
coordinates and that coordinates will be sent to the Wi-Fi module. Wi-Fi module will be
connected to the local network and using an IP address of that Wi-Fi module we can fetch the
data of the coordinates through the web browser. For the purpose of safety we are using the
Buzzer to indicate about the hazard.
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 123
Module 2: Password Automated Circuit Breaking Mechanism with Password Based Door Lock
Figure (Door lock) 1.4
Figure (Power control ON/OFF) 1.5
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 124
The block diagram of module 2 is shown in the figure 1.4 and 1.5
The figure 1.4 ie,. Password based doorlock will contain a Microcontroller with an matrix
keypad. It will allow only the authorized person to access through the system. Another system
inside this module 2 ie,. figure 1.5 contains a block of arduino which is connected to the keypad
to enter the password and an LCD display to visualize the password and other messages. LEDs
like Red and Green are connected for the indication of activation and deactivation of the
electrical lines and also a Buzzer is connected to give sound to the matrix keypad. When the
entered password is correct and the circuit breaks theelectrical line and GSM connected will send
a message to the authorization about someone accessing the system.
Conclusion and Future Scope
The automatic detection of broken electrical lines of the electrical pole and also automatic power
supply disconnection is very useful to avoid electrical shock hazards. Also, it is very easy to
detect the location where the electrical lines are broken through a local network using Wi-Fi
technology and also the wireless communication technology issued for the detection of broken
electrical lines that can be used over years and years without any maintenance. If any
malfunction occurs in the system and if automatic power supply disconnection is failed then we
can use a password based electrical line disconnection system which is localized i.e., only
authorized lineman who knows the password can disconnect the electrical line locally for certain
number of poles without affecting the main station power supply. This helps to protect linemen
from getting shock due to miscommunication between lineman and the substation authority that
monitors the power control of the electrical lines. The system also includes a password protected
door lock technique which helps to safeguard the password based electrical line disconnection
system from unauthorized people as well as the environmental hazards.
As a future work, the system can be implemented such that we can send the location of the
electrical broken line to an application instead of the web browser, for an easy accessing and
recording regarding electrical line issues, to both authorities and lineman. Also, the
authentication can be done using biometric method i.e., by using finger printer sensor.
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 125
References
[1] Dr.k.Sathiyasekar, S.Sonika, S.Jaishree, “Intelligent accident identification system using
GPS, GSM modem”, International Journal of Advanced Research in Computer and
Communication Engineering, Vol. 3(2), 2014, ISSN (Online): 2278-1021. ISSN (Print):
2319-5940.
[2] B.A. Jan, “Use of G.P.S in EHV Transmission Line Fault and Detection Transmission Line
Protection in Power System”, International Journal of Engineering Science Invention Research
& Development. Vol. 1(10), 2015, e-ISSN: 2349-6185
[3] Ing. Komi Agbesi, Felix Attuquaye Okai, “Automatic Fault Detection and Location in
Power Transmission Lines Using GSM Technology”, International Journal of Advance
Research in Science and Engineering. Vol.5 (01), 2016
[4] Mr. Pravinkumar N.Mahadik, Mr. Pratik A.Yadav, Mr. Suraj B. Ghotpagar, Harsha P.
Pawar (1, 2, 3, Student 1 Assistant Professor ),“Electric Line Man Safety using Micro
Controller with GSM Module”, IJSRD - International Journal for Scientific Research &
Development, Vol. 4(01), 2016, ISSN (online): 2321-0613.
[4] Athira P Nair, Josephin J, Anjana A S, Athira C P, Sebin J Olickal (4 students, 1
professor), “Electric Line Man Safety System with OTP Based Circuit Breaker”, IJRET:
International Journal of Research in Engineering and Technology eISSN: 2319-1163,
pISSN: 2321-7308. Volume: 04 (03), INCEPTION-2015, Apr-2015.
[5] Prof. Maniket S. Sonawane, Prof. V. N. Karande, “Power Line Conductor Breakage
Accident Avoidance using Wireless Communication”, International Journal of Electronics
Communication and Computer Engineering Vol.5(4), Technovision-2014, ISSN 2249–
071X Technovision-2014: 1st International Conference at SITS, Narhe, Pune in 2014
Published by IJECCE (www.ijecce.org)
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 126
POST MODERNISM
Suhan Poovaiah, Lalthanzami & Arjun PrakashPG Dept. of English, St. Philomena’s College (Autonomous) Mysore
Abstract
Post modernism pertains to the deepest aspects of our being and life.
Postmodern approaches antagonize methodological conventions. It
challenges established structures and belief systems in society and culture
from 1960s. It embraces complex and often contradictory layers of
appreciation. It introduced a new wave of freedom and a break from
established rules and regulations.
Key Words: Post Modernism, approaches
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 127
Introduction
Post Modernism is a theory and practice which has become popular in Literature and the Arts in
a late 20th century characterized by a broad skepticism. Post Modernism, as a Philosophical
movement is largely a reaction against the philosophical assumptions and values of the
Modernism which started after the end of the First World War. Just like post structuralism
followed structuralism, post modernism followed modernism.
Post Modernism
Modernism and Post Modernism are like two opposed moods or attitudes. The modernist is sad
and desperate at the state of affairs and possesses a tone of lament while the post-modernist is
glad and had fun on it. Postmodern philosophy tends to conceptualize the world as being
impossible to strictly define or understand. After the First World War ends, society had lost its
morality and religious faith and hope were fading away, the environment was polluted. Modern
writers wrote in hope of reforming the society and lamenting the glory of the Country’s
past .T.S. Eliot in his poem The Wasteland opened the lines,
“April is the cruellest month, breeding Lilacs
Out of the dead land, mixing Memory and desire
Stirring Dull roots with spring rain.”
The opening lines shows the contrasted situation of the land with its past when Chaucer begins
with a description of April’s “sweetest showers” in his Prologue to The Canterbury Tales. While
modernist writer T.S. Eliot lamenting the present situations with the consciousness of the past
beauty. The modernist generation was often termed as THE LOST GENERATION writers like
Ernest Hemingway,F.Scott Fitzgerald etc. often wrote about the disillusionment and moral
degradation as well as the horror of the aftermath of the war while Post-modernist writers played
with the present situations ironically in reactions to the modernism. As post modernism started
after the end of the Second World War in the 1950s somehow the problems faced with the new
generation were same with the former generation but differs is their perspective.
THE CHARACTERISTICS OF POST MODERNISM
Exploration and understanding the characteristics of Post modernism through the play
Waiting for Godot
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 128
Waiting for Godot is a play by Samuel Beckett premiered in 1953 which falls both into
the genre of both modernism and postmodernism. The play celebrates the fragmentation in all
dimensions. The language, plot, character, setting and themes are presented in a fragmented
form. The difference between The Wasteland and Waiting for Godot is that the former laments
the glory of the past which has fallen apart, but the latter never laments for the past, it celebrates
the fragmentations.
Secondly, post-modernism holds the view that irrational is real and what is real is
irrational. Post modernism rejected logical thinking. The play with its bizarre characteristics
turns irrationality in the very rationality, the very unreality into the reality.
Thirdly, in post-modernist era, there is changelessness in the life of the people and they
grew bitter towards their monotonous lifestyle. It can also be seen in the play Look Back in
Anger where the writer portrayed the unchanging life of the characters and Jimmy Porter’s
bitterness towards the unchanged. In Waiting for Godot also, there is no plot as well as action in
the play and nothing happens in the play like there is no order in post modernism and life was
hopeless.
Fourthly, in the play, there is no truth, all things are relative. Postmodernism asserts that
truth is not mirrored in human understanding of it, but is rather constructed as the mind tries to
understand its own personal reality. Thus, facts and falsehood are interchangeable.
Fifthly, Identity crisis .In the play, we do not learn anything about the two major
characters Vladimir and Estragon such as their age, status in society, job etc. They do not even
tell about their past, their loss of memory is also associated with their identity crisis. In Act 2,
Pozzo appears blind and he cannot remember that they had met Estragon and Vladimir the
previous day.
Sixthly, Post modernism emphasized the reader than the writer, so most of the themes
have multi meanings which can differ according to the reader’s interpretation. For instance the
name GODOT in the play Waiting for Godotcan have a multi meaning. For some critics asserts
that Godot represents God in life, while some interpreted as change which was eagerly awaited
by the postmodern generation and hopes.
Seventhly, the existential crisis, the characters faced an existential crisis as life seems
nothing to them; Samuel Beckett asserts that at the root of our being there is nothingness. This
frustration is expressed through the repetition of the sentence, “nothing to be done” by Estragon.
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 129
Almost all modern people after two world wars experienced the same feelings; life appears to
them as an absurd thing with full of purposeless, nothingness and meaningless.
Other characteristics of post modernism are liberal ethics which is defending the cause of
feminist and homosexuals, pro-environmentalism defending ‘Mother Earth’ they blamed the
Western society for its destruction, disillusionment and ownership.
Among the best known post-modernism philosophers are Michel Foucault, Jacques
Derrida, Jean Francois Lyotard, Jean Baudrillard, Roland Barthes etc. Lyotard is perhaps one of
the most identifiable postmodernist and he has described Post modernism as a condition of the
present state of culture, social structure and self.
As the aftermath of the Second World War many youngsters grew frustrated at the society and
corrupted authorities, birth of the concept of an ‘Angry Young Man’ to describe frustrated young
men of its era who hopefully waited for a change and security but never arrives. During this age
of despairing, Ernest Hemingway said that man is not made for defeat in his novella The Old
man And the Sea As the post modernism emerge out of skepticism, so did the movement of the
Beat Generation during its era too in America. The writers who were called Beat writers
questioned the materialism of the society, authority and environment pollutions. The Beat
generations hold many similar perspectives with the post-modernist writers and they were quiet
influential as they influenced many frustrated young people there influence was also one of the
many things which stirred the spirit of the youth when the famous ‘Counter Culture Movement’
evolved in the 1960s in America and spread all over Europe.
Works Cited
Abrams, M.H. A Glossary of Literary Terms.New Delhi; Cengage Learning, 2012.
Barry, Peter. Beginning Theory.Bengaluru; Viva Books, 2010.
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 130
Prediction of Student’s Future Interest Using Educational Data Mining.
*Sayyeda Noor Javeria & **Manasa K NDepartment of Computer Science,St.philomena’s College, Mysore.
[email protected] [email protected]
Abstract
Data mining methodology helps to extract the hidden knowledge and
information which have been inherited in the data used. Educational Data
Mining (EDM) is concerned with mounting methods to determine facts
from data, especially unknown knowledge-driven pattern from educational
repository in order to highlight the strength and weaknesses of the student.
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 131
Students Future prediction is important because it help students to reach
their goal, helps to choose a better carrier. This paper proposes a system
which can categorize the students into grade order to predict their future
Interest. By conducting aptitude test every week and by calculating the
result, systems predict the interest and notification will be send to the
parents. In all their education studies it helps to improve ‘students’
performance. Proposed System uses Educational Data Mining techniques
to improve ‘students’ performance and predict their future interest. For
predicting the student interest we are using data mining concepts like
classification.
Keyword: Educational Data Mining (EDM), Classification, Prediction.
Introduction
Education sector has a lot of data in the form of student information. An educational institution
needs to have an approximate prior knowledge of enrolled students to predict their performance
in future academics. This helps them to identify promising students and also provides them an
opportunity to pay attention to and improve those who has interest in a particular subject.
Application of computers on this data can extract valuable information to provide quality
education. Quality education does not mean high level of knowledge produced. But it means that
education is produced to students in efficient manner so that they learn without any problem. For
this purpose quality education includes features like: methodology of teaching, continuous
evaluation, categorization of student into similar type, so that students have similar objectives,
educational background etc. Educational Data Mining helps to find the hidden information,
where as in proposed system EDM helps to find the hidden talent of the student. EDM helps to
highlight the good performance of the student.
Proposed System can identify student performance in each subject suggesting them and to their
family regarding his/her more interested subject and suggestion related to respective areas of
work, test at risk students and to develop a predictive model to predict student academic
performance in educational institutions, which helps to predict their future results.
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 132
The proposed system consists of two functionalities, this system suggest student’s based on their
interest in subject so that student can think about future areas of working easily.
Literature Review
Studies so far shows that Automated Speed Governor is gaining much more attention Abeer
Badr El Din Ahmed et al. [1] proposed system which explains decision tree method is used on
student's database to predict the student's performance on the basis of student's database. They
use some attribute were collected from the student's database to predict the final grade of
student's. This study will help the student's to improve the student's performance, to identify
those students which needed special attention to reduce failing ration and taking appropriate
action at right time.
Komal Jirage1et.al [2] proposed system that has data clustering technique named k-means
clustering is applied to analyze student’s learning behavior. The student’s evaluation factor like
class quizzes, mid and final exam assignment are studied. It is recommended that all these
correlated information should be conveyed to the class adviser before the conduction of final
exam. This study will help the teachers to reduce the drop out ratio to a significant level and
improve the performance of student. This work may improve student’s performance; reduce
failing ratio by taking appropriate steps at right time to improve the quality of education.
Amjad Abu Saa [3] proposed system here multiple data mining tasks were used to create
qualitative predictive models which were efficiently and effectively able to predict the students’
grades from a collected training dataset. A survey was constructed that has targeted university
students and collected multiple personal and academic data related to them. The collected dataset
was preprocessed and explored to become appropriate for the data mining tasks. Third, the
implementation of data mining tasks was presented on the dataset in hand to generate
classification models and testing them. Then interesting results were drawn from the
classification models, as well as, interesting patterns in the Naïve Bayes model was found. it was
slightly found that the student’s performance is not totally dependent on their academic efforts,
in spite, there are many other factors that have equal to greater influences as well.
Methodology
Data mining is the process of discovering interesting knowledge, such as associations, patterns,
changes, significant structures and anomalies, from large amounts of data stored in databases.
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 133
Classification is a data mining technique that maps data into predefined groups or classes. It is a
supervised learning method which requires labeled training data to generate rules for classifying
test data into predetermined groups or classes.
Clustering technique is the task of segmenting and arranging a diverse group into a number of
identical subgroups or clusters. Clustering of data is a technique in which we form clusters of
object that are same in function and characteristics.
Proposed system has, admin who will add both students and faculties of the school .faculty is the
one who will conduct a test .students attend the test and get results. Based on the result faculty
predict the student’s future interest and admin is the one who will send the results to the parents.
Module Description
Student Module:
[6] Student register: Registration with basic details for student account.
[7] Student Login: Login with valid username and password.
[8] View performance: Student can view his/her performance based on test marks.
Faculty module:
[10] Faculty register: registration with basic details for faculty account.
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 134
[11] Faculty login: login with valid user name and password.
[12] View result and predict: faculty can view the result and predict.
Admin Module:
11 Admin Login: login with valid username and password.
12 Fill Student and faculty Details: Insert proper details of student and faculty of registered.
13 Send predicted result: marks and predicted result details of student will be send to the parents.
Conclusion and Future Enhancement
The proposed system helps students to learn more about their interested subject also helps
parents to decide their children’s future interest. It helps more to the faculty members that they
can give more concentration on each student based on their interest .This application can predict
in which particular subject the students are good.
As a future enhancement they can develop an android application for this in which parents can use it.
References
[1] Abeer Badr El Din Ahmed, Ibrahim Sayed Elaraby “Data Mining: A prediction for
Student's Performance Using Classification Method”, World Journal of Computer
Application and Technology 2(2): 43-47, 2014 http://www.hrpub.org DOI:
10.13189/wjcat.2014.020203.
[2] Komal Jirage1, Rucha Choudhari2, Varsha Gupta3, Anil Patthe4 and Disha Maind5
“Student Performance Analysis Based on Learning”,International journal for research in
emerging science and technology, volume-2, issue-3, march-2015.
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 135
[5] Amjad Abu Saa, “Educational Data Mining & Students’ Performance Prediction”,
International Journal of Advanced Computer Science and Applications, Vol. 7, No. 5,
2016
[6] Ali daud, Naif Radi Aljohani, Rabeeh ayaaz abbasi, Miltiadis D Lytras, Farhat
Abbas,Jalaal S alowibdi, “ Predicting Student Performance using Advanced Learning
Analytics”.
[5] Miss .Pooja M .Dhekankar, Dinesh S. Datar ,”Analysis of Student Performance by using
Data Mining Concept”, International Journal on Recent and Innovation Trends in
Computing and Communication ISSN: 2321
Intelligent Vehicle T³ System
*Vishwas M S, **Manasa K N & ***Wasim AliPG Department of Computer Science
St.Philomena’s College, Mysore***Research Scholar, Department of MCA, VTU-RC, Mysore
[email protected] [email protected] [email protected]
Abstract
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 136
The intelligent vehicle T³ system is a system which is going
to collect toll, anti-theft and track the vehicle using
Raspberry Pi3 and ARM 7 microcontroller with RFID TAG,
RFID TAG, LCD screen, GSM and GPS modules. This
paper proposes a System known as Intelligent Vehicle T3
which provides two facilities: such as Automatic Tool
Collection and Alert about the vehicle theft. Proposed
System uses IR sensors and RFID TAG, a unique id number
which is mounted to a vehicle that will be read by RFID
reader and deduct amount automatically this will be
displayed in the LCD screen and updated to the database.
System also tracks vehicle which indeed recovery vehicle
if it is stolen and it has as a slid switch which is used to
send information of stolen vehicle as it passes through
tool booth so that the user can trace and track the vehicle
online on website or they will receive information
through SMS. Intelligent Vehicle T3 system uses some
modules like GPS, GSM and RFID tag to perform the toll
collection, anti-theft and tracking. All these features are
achieved in an economical price which is afforded and
implemented easily
Keywords: Raspberry Pi3, RFID TAG, RFID READER, IR sensor, GSM and GPS
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 137
NTELLIGENT VEHICLE T³ SYSTEM
Introduction
Any vehicle in an automobile field, the maximum and high quality of features is given to the
luxury vehicle, even the economy vehicle deservers some features and these days automobiles
are more there are a lot of automobiles these are sometime causing traffic.
Toll gate collection in India is operated manually so it consumes more time, slow process, traffic
jam, and increases vehicle operating cost, power loss due to the continuous turning on of receiver
system, so there is need of automatic toll collection system to overcome the problem.
The security provided for the vehicle is not sufficient, the general security they provide to the
economy vehicles is locking system, few sensors and alarm system all these can be breached and
the vehicle can get stolen so there is need of tracking system which can track vehicle and send
the location.
To overcome this problems Intelligent Vehicle T3 system is IOT (internet of things) system. The system component interacts through IOT with the website, IOT help us to operate and monitor physical device. IOT is network of the device through which system communicates and share data
Intelligent Vehicle T3 system is the combination of automatic toll collection, anti-theft and
tracking. These are going to be implemented using a Raspberry pi along with other module
included in it. Using RFID TAG and Raspberry pi automatically collect toll Using GPS and
GSM in micro controller track vehicle Get vehicle location from web application and through
SMS.
Nowadays most vehicle are being theft, it is difficult to track and get back the vehicle and there
are lot of issues to deal with the police, to avoid this consequences Intelligent Vehicle T3 system which will alert the user with the SMS when vehicle is on(or start)
Some benefits such as while moving vehicles Toll will be collected and no need for the vehicle
to stop and you can avoids queue at toll booth and Saves time. It gives an additional security to
the existing system of the vehicle. Using web application we track the vehicle. Location is sent
through GSM and can be located using GPS, and Cost is affordable.
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 138
TELLIGENT VEHICLE T³ SYSTEM
Literature Review
Studies so far show that automatic tool collection system is important and gaining more attention.
Dr. S. Hussain [1] et al. proposed an automatic toll ticketing system using for transportation
system using MSP430 processor. In this work propose a minimal effort and productive system
called electronic toll collection utilizing RFID modules that consequently gathers the toll from
moving vehicles when they cross toll boot it’s pretty old system and it is slow
Atif Ali Khan et al. [2] proposed a RFID based toll collection system using Atmel8051
microcontroller and it uses active tag which consumes more power from vehicle battery and it is
difficult to modify or update the system
V. Sridhar et al. [3] proposed a smart card based toll gate automated system using 8051
microcontroller. This system describes, the smart card removes handy cash-transaction to
eliminate traffic at toll plaza. using smart card even consume time so it’s not that efficient in
saving time , It’s better to use upgraded version like raspberry pi or Arduino
N. Poornima et al. [4] proposed an automated toll plaza verification system for an automobile at
a check point using visual studio .net .08 software. The proposed system uses active RFID tags,
which are placed on the vehicles.
SeokJu Lee et al. [5] proposed a vehicle tracking system using GPS/GSM/GPRS technology and
smart phone application. An in-vehicle gadget, a server and a cell phone application are utilized
for the vehicle tracking framework. In this work in-vehicle gadget is made out of a
microcontroller Atmega328 and GPS/GSM/GPRS module. It uses google map which most of the
time it is inefficient and we don’t three module only two module is enough (GSM and GPS) to
show a vehicle area on google maps.
Pradeep V Mistary et al. [6] proposed a real time vehicle tracking system based on ARM7 GPS
and GSM technology. This system shows a vehicle tracking system to track the correct area of
moving or stationary vehicle in real time. This system is a combination of hardware module and
programming module.
Sanchit Bhargava et al. [7] proposed a Vehicle Tracking System Using “GPS” And “Google
Maps”. It only track the vehicle doesn’t give any alert when a vehicle is stolen or some try to
breach .Google maps are not always accurate
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 139
Methodology
Figure 1.1: System Architecture
System description
System architecture shown in figure consists of
Raspberry pi: Raspberry pi using RFID identifies and verifies the vehicle and interact with the
database to deduct amount and update. It stores the information that is used to trace the vehicle
IR SENSOR module: IR SENSOR emits IR rays and receiver which receives the IR rays that
falls on object and reflects back.it is used to detect vehicle and led light switch to yellow
RFID module: RFID TAG holds a unique id and can store information from 64bits to 1kb.
System uses a passive tag which is efficient in power saving. Active tag needs a power supply
to be but passive tag uses the power from the RFID tag reader (when the tag comes in the range
of reader it gets activated) RFID reader reads the RFID tag and interacts with database where its
going to verify and deduct amount and update the database
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 140
INTELLIGENT VEHICLE T³ SYSTEM
LCD screen: It is used to display information such has deduction of amount and vehicle
detail .it displays two column
ARM7 microcontroller: With InSystem programming (ISP) and inapplication program 2.0
usb device controller CPU clock up to 60mghz. The GPS and GPS is integrated ,when a user
request for vehicle location through website ,it interact with the microcontroller in which
GPS gives the location and send it through GSM to website and to the number of the user
through SMS
GPS module: Gets the location from satellite and pass this location (longitude and latitude) to GSM
GSM module: GSM is used to send the location via through SMS to user phone number (that
would be registered) and send the location to the website
There are three scenario in Intelligent Vehicle T3 system
[16] Automatic toll collection
[17] Track vehicle: trace and track vehicle to get location through website or through SMS and
store the information in the website database.
[18] Anti-theft the microcontroller will send message when vehicle is switched on
Automatic toll collection is done using raspberry pi including with modules IR SENSOR, RFID
TAG, RFID READER and LCD screen. Led lights are used to indicate vehicle detection and
amount deduction
When a vehicle pass through toll booth IR sensor detect the vehicle and the RFID reader reads the RFID tag
.raspberry pi interact with database and LCD screen display the vehicle details and the amount
deducted. If vehicle is not detected the LED light remains red else if vehicle is detected the led
switch to yellow and after amount deduction it switch to green
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 141
Figure 1.2: Toll Collection
Vehicle tracking and Anti-theft
Vehicle tracking is done using microcontroller with GSM and GPS component .user can send
a request locate their vehicle by logging in to website and send request the website interacts
with the microcontroller, GPS receive location from satellite sends the longitude and latitude
to GSM.
The GSM will send the location (latitude and longitude) through SMS and to website .user can
locate on the website or use the longitude and latitude received through SMS to locate in
different map tool online(or offline) it is best to use with online
Proposed system uses a sliding switch is used which going to send information to authorities
(police) about the stolen vehicle, if it pass through toll booth.
Conclusion and Future Enhancement
The proposed system collects the toll, anti-theft and track the vehicle in an efficient way and
the price to implement is economically affordable. System uses a required and sufficient
module, not more nor less module in the system. Intelligent vehicle t³ system is efficient and
performs well. Future enhancement is to accident detection and operating vehicle component
such as switching on light, indicators and horn through your mobile.
INTELLIGENT VEHICLE T³ SYSTEM
References
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 142
Dr. S. Asif Hussain, Sana Said Al-Ghawi, Muna Abdullah Al Rabbi, and Zahid Hussain. ”Automatic toll e-ticketing system for transportation systems” IEEE 3rd MEC international conference on big data and smart city, 2016
Atif Ali Khan, Adnan I. Elberjaoui Yakzan ,Maaruf Ali . IEEE 3rd international conference on computational intelligence, communication systems and network 2011 “Radio Frequency Identification (RFID) based toll collection system”
[7] V. Sridhar and M Nagendra. International journal of advanced research in computer engineering and technology, Vol1, issue 5, July 2012 “smart card based toll gate automated system”
[8] N. Poornima, M.P.Arvindhan, R.Karthikeyan, S.Gokul Raj International Journal of Engineering Development and Research (IJEDR) 2015”Automated Toll plaza Verification System for an Automobile at a Check Point”
SeokJu Lee, Girma Tewolde, Jaerock kwon. IEEE world forum of internet of things (WF-IOT) 2014 “design and implementation of vehicle tracking system using GPS/ GSM/ GPRS technology and smart phone application”
Pradeep, V mistary, R .H Chile. IEEE INDICON 2015 “real time vehicle tracking system based on ARM7 GPS & GSM Technology”
Sanchit Bhargava, Vishal Varshney and Vipin .VEHICLE TRACKING SYSTEM USING “GPS” And “GOOGLE MAPS” slideshare.com
Philos Multi- Disciplinary Journal ISSN 2456-9828 e-Journal April 2018 Page 143