DiversityManagement-anoverview
DiversityManagement-anoverview
DiversityManagement-anoverview
net/publication/345317089
CITATIONS READS
0 6,344
2 authors:
All content following this page was uploaded by Sudha Ganesh on 05 November 2020.
Published by
Sucharitha Publications
Visakhapatnam
Andhra Pradesh – India
Email: [email protected]
Website: www.ijmer.in
Editorial Board
Editor-in-Chief
Dr.K. Victor Babu
Associate Professor, Institute of Education
Mettu University, Metu, Ethiopia
®
© Editor-in-Chief, IJMER
Typeset and Printed in India
www.ijmer.in
IJMER, Journal of Multidisciplinary Educational Research, concentrates on
critical and creative research in multidisciplinary traditions. This journal
seeks to promote original research and cultivate a fruitful dialogue between
old and new thought.
CONTENTS
S.No Pg.No
1. Quality of Life among Elderly 1
K. Krishna Veni,S.Hemalatha and A.Kusuma
2. Hkkjrh; mPp f”k{kk iz.kkyh % n”kk ,oa fn”kk 17
Jherh izse ifjgkj
3. Decoding The Jaypee Judgment: Preferential Transactions 21
Binoy J. Kattadiyil
4. On Development of Estimation Procedure for Estimating 24
Population Variance Under Simple Random Sampling
Chandni Kumari and Ratan Kumar Thakur
5. Supply Chain Risk Management in Times of Pandemic 39
Deepti Gupta
6. How Digital Marketing Helps Higher Education Institution 45
Branding
Dhiraj Kelly Sawlani and Donny Susilo
7. An Analysis “To Understand The Effect of Online Video Games 56
on The Behaviour of Children” Less Than 15 Years
Anjali Singh and Rishika Goel
8. Factors Influencing The Consumers to Prefer Organic Food 68
Products: A Literature Review
K.K.Gomathi
9. Mobile App Platform for License Verification and Validation 74
P. Sruthi Mol,S. Gnana Prakash, V. Karthikeyan
and M. Muthu Kumaran
10. Pink Bus - An Intelligent Prototype System for Women Safety in 81
Public Transport
Rahul Mohandas, Sreelakshmi P J,Devika K M
and Mariya Joy
11. “I Am A Lover of America”. Representation of A Muslim- 90
American in The Reluctant Fundamentalist
Monica Sabharwal
12. Future Trends in Fiber Optics Communication - April 2020 103
Tushar Agrawal
13. Analyses of Optical Absorption Coefficient, Thermal, SEM, 114
TEM and Nonlinear Optical Properties of Thiourea Sodium
Sulphate Crystal
M.Uday Bhaskar, S.Senthilkumar and G.Shankar
14. Self-Determination Have An Impact on Academic 123
Achievement – A Study
M.Amala Jayanthi and R.Lakshmana Kumar
15. Diversity Management – An Overview 131
G.Sudha and V.Sornaganesh
16. A Study on Usage of Social Network Sites as Source of Talent 137
Acquisition
R.Jayanthi and Rajesh.C
17. A Study On Customers Perception Towards E- Governance 146
Through Akshaya Centres In Thrissur District with Special
Reference To Valapad Panchayath
Anila Balan
18. Diversity Assessment of Benthic Macro Invertebrate 154
Communities of Sagar Tal, Gwalior, Madhya Pradesh, India
A. K. Parihar and R. K. Dubey
19. High Speed Packet Access- April 2020 164
Ajeet Rathore
20. A Study on The Effective Usage of Mobile Banking 175
Applications with Special Reference Pathanamthitta District
Amala Sara John
21. IoT Based Smart E- Mirror with Raspberry PI 184
Akshay Peettar, Devika Chandhran, Reshmi Mohan,
Shifna Abdul Rahiman and Veena K Viswam
22. Transforming Smart Phone Into Women Safety Device Via Face 189
Identification Technique
Anjali Sharma, Pranjal Gupta and Pranjul Goel
23. Image Classification Model Using Deep Residual Network 195
Ashutosh Agarwal , Kunal Garg and Babli Kumari
24. Min-Max Dom Saturation Number of A Graph 199
S.Sudha and K.Sreelatha
25. Advaitha Elements in Sri Jagannatha Sthotra Kavyas 208
Mitarani Dash
ISSN : 2277 – 7881
Dr. K. VICTOR BABU Impact Factor :6.514(2020)
M.A.,M.A.,M.Phil.,Ph.D.,PDF, (D.Lit) Index Copernicus Value: 5.16
Associate Professor, Institute of Education
& Editor-in-Chief
International Journal of Multidisciplinary
Educational Research (IJMER) &
Sucharitha: A Journal of Philosophy and
Religion
Mettu University, Metu, Ethiopia.
Editorial……
It is heartening to note that our journal is able to sustain the enthusiasm
and covering various facets of knowledge. It is our hope that IJMER would
continue to live up to its fullest expectations savoring the thoughts of the
intellectuals associated with its functioning .Our progress is steady and we are in
a position now to receive evaluate and publish as many articles as we can. The
response from the academicians and scholars is excellent and we are proud to
acknowledge this stimulating aspect.
The writers with their rich research experience in the academic fields are
contributing excellently and making IJMER march to progress as envisaged. The
interdisciplinary topics bring in a spirit of immense participation enabling us to
understand the relations in the growing competitive world. Our endeavour will be
to keep IJMER as a perfect tool in making all its participants to work to unity
with their thoughts and action.
The Editor thanks one and all for their input towards the growth of the
Knowledge Based Society. All of us together are making continues efforts to
make our predictions true in making IJMER, a Journal of Repute
Dr.K.Victor Babu
Editor-in-Chief
ABSTRACT
Components of quality of life includes changes in the body function, keeping the
physically fit living arrangements and family relations ,retirement and management of
leisure time, economics of ageing, spirituality, maintaining good interpersonal relations
and happiness through good health. It includes optimum intake of fresh air, clean water,
nutritious food, good recreation, exercise and adequate rest and a happy mind set etc.
While quality of life is inevitably subjective and dependent upon individual perceptions.
The main objective of study is to assess and compare the quality of life among elderly
in urban and rural areas of tirupati.
.A descriptive research approach, 2X2 factorial design was selected. A total number of
120 subjects (30 men + 30 women from urban area, 30 men + 30 women from rural
area) aged between 60-80 years were randomly selected from four surrounding areas of
Tirupati. The quality of life of older persons was assessed by using demographic data
with WHO Quality of Life BREF field version. This contains 26 items. . The reliability
score ‘r’=0.965. data was collected by using Interview Technique and it was analyzed
with decriptive and inferential statistics and results were presented .
Introduction to Aging
www.ijmer.in 1
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Indian Urban and Rural Population Census .In India the population of elderly is steadily
increasing according to the decennial censuses. The proportion of elderly who were
5.6% of the total population in 1961 has increased to 7.7% in 2001. In comparison to the
proportion of elderly in the urban areas, the proportional elderly in the rural areas to the
total population in India has been higher all through these decades. According to 2001
census the share of elderly in rural areas is 8.3% and in urban areas 6.5%. Though in
proportion it is not very obvious, the increasing magnitude of these elders is very
alarming.
The increasing numbers of older people indicates higher expectations of a good life.
Public policy is increasingly likely to be concerned with enabling older people to
maintain their mobility, independence, their active contribution to society, and to
respond effectively to the physical, psychological and social challenges of older age; in
effect, to add quality to years of life.
The elder persons in India facing a number of problems ranging from absence of
assured and sufficient income to support themselves and their dependents, for healthcare
and other social securities, loss of a social role and recognition, and non-availability of
opportunities for creative and effective use of free time. Hence, the trend clearly reveals
that aging will emerge as major social challenge in the future: and vast resources will
be required toward the support, service, care and treatment of the elderly persons. There
is emerging need to pay greater attention to ageing-related issue and to promote holistic
policies and programmes for dealing with ageing society. Equally important to older
persons mean recognizing and respecting the dignity, authority, wisdom, and
productivity of older persons in all societies, particularly in their roles as volunteers and
multi-generational caregivers. And that, in turn, means promoting a more positive image
of ageing.
For the above reasons the researcher wants to assess and compare the quality of life
among the elderly in urban and rural areas of tirupati. The present study mainly
concentrates on Quality Of Life among the elderly in the age group of 60-80 years.
OBJECTIVES
METHOD
A wide review of literature was collected related to research study The conceptual
frame for the study was adopted from SUSAN.L quality of life model. A descriptive
www.ijmer.in 2
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
research approach, 2X2 factorial design was selected. A total number of 120 subjects
(30 men + 30 women from urban area, 30 men + 30 women from rural area) aged
between 60-80 years were randomly selected from four surrounding areas of Tirupati.
1) Independent variables: Gender: Men and Women
Locality of residence: Urban and Rural
2) Dependent variable: Quality of life
Men Women
Rural 30 30 60
Urban 30 30 60
60 60 120 N
.
DEVELOPMENT AND DESCRIPTION OF TOOL
The data collection tool used in the present study was WHO Quality of Life BREF Scale
structural interview schedule. The instrument was organized under the following
sections.
Section I: Demographic Data Personal ProfileModified Kuppuswamy socio
economical scale (2007)
Section II: Contains Standard Quality of Life WHO-BREF Scale
The WHO quality of life BREF field version is a 26 items self administered
questionnaire scale which emphasizes the subjective responses of elder people rather
than objective life conditions with assessment made over preceding two weeks.
It covers the four domains
Physical health-Items (3, 4, 10, 15, 16, 17, 18)
Psychological health-items (5, 6, 7, 11, 19, 26)
Social relationship-Items (20, 21, 22)
Environment-Items (8, 9, 12, 13, 14, 23, 24, 25) in addition to item on general
well being item 1 and 2. Each item is scored between 1 to 5 except for 3, 4 and 26 which
are scored in reverse manner. The main aim is to assess the individual overall perception
of quality of life and health. If, higher the score higher the quality of life.
www.ijmer.in 3
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
It was inferred that majority 25(41.67%) of the urban respondents were in the age group
of 60-65 years, 55(91.67%) were belongs to Hindu community, 31(51.67%) were
married, 27(45%) were completed primary school and 25(41.67%) were semi skilled
workers.
The majority 27(45%) of the rural respondents were in the age group of 60-65 years,
52(86.67%) were belong to Hindu community, 35(58.33%) were belongs to
widow/widower category, 45(75%) were illiterates and 20(33.33%) were semi skilled
workers
The majority 30(50%) of the urban respondents living in rental house with their
children, 28(46.67%) were having good health status. The rural respondents 58(96.67%)
were living in own house with their family, 29(48.33%) were having moderate health
status.
The results of the present study supported by the earlier study carried out by Ankur
barua et al., (2003) an “Assessment of the domains of quality of life in geriatric
population”. The aim of this study is to examine the different domains of QOL
according to socio-demographic variables. The size of the sample was in the geriatric
age group above 60 yrs. The results revealed that the mean scores of subjects in various
age groups differed significantly in the domain of physical, psychological and social
relations. Overall well being was significantly affected with unmarried/widowed in the
aged group of 60-69yrs.
Bramston et al., (2005) stated that quality of life has been defined as multidimensional
evaluation, by both intrapersonal and social normative criteria, of the person
environment system of the individual. Most attempts to conceptualize (or) measure the
overall quality of life propose some constellation of objective and subjective
dimensions. The objective part of the quality of life refers to resource availability and
objective life conditions, while the subjective one refers to the individual subjective
feeling and evaluation towards his life
www.ijmer.in 4
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
OBJECTIVE 2 To assess and compare the quality of life among older people in
urban and rural areas
3
70.00
63 . 3
0
60.00
50 . 0
0
45.0
50.00
P e r c e n ta g e
40.00
3
30.00
23 . 3
3
13.3
20.00
3. 3 3
1.67
0 . 00
10.00
0 . 00
0 . 00
0.00
Very Poor Poor Moderate Good Very Good
Overall Quality of Life
Urban Rural
3
70.00
63.3
60.00
50 .0
0
4 5.0
50.00
P e r c e n ta g e
40.00
3
30.00
2 3.3
3
1 3.3
20.00
3.33
0 .00
1 .67
10.00
0.00
0.00
0.00
Very Poor Poor Moderate Good Very Good
Overall Quality of Life
Urban Rural
www.ijmer.in 5
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Results revealed that the urban older people 38(63.33%) had good quality of life,
14(23.33%) had moderate quality of life, and 8(13.33%) had very good quality of
life.
As for as rural area is concerned 30(50%) had good quality of life, 27(45%) had
moderate quality of life and finally 1(1.67%) had very good quality of life.
The rural women differ significantly (‘t’=3.22) with urban men in all domains
of QOL at 0.01 level. The rural men differ significantly with urban women (‘t’=2.24)
and urban men (‘t’=2.53) in all domains of QOL at 0.05 level.
The results of the present study was supported by the earlier study carried out by
Easwara Murthy et al., (2007) on quality of life among the 580 respondents (305
men, 275 women) from five districts of Tamil Nadu. The finding of the study suggests
that the rural older woman are disadvantaged in terms of economic, physical,
psychological and social indicators, indicating that they are having comparatively poor
quality of life than their counter parts.
Table2 : Mean, Standard Deviation, ANOVA and ‘t’ values on physical health
domain of Quality of Life
Men Women
Mean 11.88 11.52
Rural
S.D 2.44 2.48
Mean 13.93 13.69
Urban
S.D 2.28 2.55
N=120
Grand Mean Men: 12.90 Rural: 11.77
Women: 12.60 Urban: 13.81
www.ijmer.in 6
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 7
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
11.88
Women 0.072 @
--
13.69
Urban
Men
--
13.93
Note: @ Not Significant
Summary of ANOVA Scores on Psychological Aspects of Quality of Life
The elderly living in urban areas have better QOL (Mean: 13.48) i.e., in
psychological health domain when compared to rural area (Mean: 13.11) (F:
0.623 not significant).
The ‘F’ values of 0.001 for the interaction effect are not significant. Suggesting
that there is no significant interaction between the gender and locality of
residence with regard to psychological health aspect of QOL
The mean differences are not significant at any level.
Table 4 :Mean, Standard Deviation, ANOVA and ‘t’ values on social relationship
aspect of Quality of Life
Men Women
Mean 2.14 1.83
Rural
S.D 3.90 4.39
Mean 12.22 10.66
Urban
S.D 2.43 1.854
N=120
Grand Mean Men: 7.18 Rural: 1.98
Women: 6.24 Urban: 11.44
www.ijmer.in 8
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 9
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
N=120
Grand Mean Men: 11.57 Rural: 6.29
Women: 7.18 Urban: 12.46
Rural Urban
Women Men Women Men
11.52 11.88 13.69 13.93
Rural Women
-- 0.22 @ 3.83 ** 2.42 *
11.52
Men
-- 3.58 ** 2.21 *
11.88
Women 1.10 @
--
13.69
Urban
Men
--
13.93
Note: @Not Significant *Significant at 0.05 level **Significant at 0.01 level
Summary of ANOVA scores on environmental aspect of Quality of Life
Sum of Mean Level of
Source df F@
Square Square Significance
Gender 2.241 1 2.241 0.567 0.453 @
Locality 68.705 1 08.705 17.384 0.000 **
Gender and Locality 4.033 1 4.033 1.021 0.314 @
Error 458.448 116 3.952
Corrected Total 533.428 119
Note: @Not significant **Significant at 0.01 level
The elderly people living in urban areas have better QOL (Mean: 12.46) i.e., in
environmental domain when compared to elderly people living in rural areas
(Mean: 6.29) (F: 17.384 significant at 0.01 level).
The ‘F’ value of 1.021 for the interaction effect is not significant, suggesting that
there is no significant interaction between the gender and locality with regard to
environmental aspect of QOL.
The rural women differ significant with urban women (‘t’” 3.83) and urban men
(‘t’: 2.42) in their environmental aspect of QOL is significant at 0.05 levels. The
rural men differs significant with urban men (‘t’: 3.58) and urban women (‘t’: 2.21)
in their environmental domain significant at 0.05 level, where as other mean
differences are not significant.
www.ijmer.in 10
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Table 6: Mean and Standard Deviation Scores on Quality of Life in all domains
Men Women
Mean 12.18 11.84
Rural
S.D 2.12 1.98
Mean 13.54 13.37
Urban
S.D 2.03 1.98
N=120
Grand Mean: Men: 12.86 Rural: 12.01
Women: 12.60 Urban: 13.45
www.ijmer.in 11
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
The ‘F’ value of 0.047 for the interaction effect is not significant, suggesting
that there is no significant interaction between the gender and locality of residence with
regard to all domains of QOL.
The elderly people living in urban areas have better QOL (Mean=12.86) i.e., in
all domains when compared to elderly people living in rural areas (Mean: 12.01) (F:
14.67 significant at 0.01 level).
Since the ‘F’ value 14.67 is significant beyond 0.01 levels, the assumption
predicted difference between the urban and rural elderly in their quality of life is
accepted as warranted by that result.
The ‘F’ value of 0.047 for the interaction effect is not significant, suggesting that
there is no significant interaction between the gender and locality of residence with
regard to all domains of QOL.
The rural women differ significantly with urban men (‘t’: 3.27) in their all domains
of QOL is significant at 0.01 levels, rural men differ significantly with urban
women (’t’: 2.24) and urban men (‘t’: 2.53) in their all domains, where as other
mean differences are not significant.
Since the ‘F’ value 0.047 for the variable gender is not significant, the
assumption which predicted that there would be a significant difference between the
men and women elderly in their quality of life is not accepted.
OBJECTIVE 3
To correlate the socio-demographic variables with their quality of life among the
urban and rural older people
The chi-square test revealed that there was a significant association between the
QOL with their education, occupation, family income per month, socio-economic
class, financial support, place of residence and current health status to last four
years.
There was no significant association between the QOL with their gender, age in
years, religion, marital status, regular income, type of family, type of house, living
status, and idea regarding medical help, government funded schemes.
Since the assumption is predicted certain demographic variables would
influence on quality of life among the older people is accepted as warranted by the
results.
The results of the present study was supported by the earlier study carried out by
Yamazaki S et al., (2005) National Institute for Environmental Studies on
household income is strongly associated with health-related quality of life among
men but not women. The objective of the study is to assess the socio-economic
status (SES) is strongly reflects individual economic status, to measure the health-
related quality of life (HRQOL) by using Short Form-36 Health Survey (SF-36)
questionnaire. Sample size is 4,500, cross sectional survey was conducted by using
stratified random sampling among above 60 years older people. The study results
www.ijmer.in 12
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
revealed that men with lower levels of annual household income had lower scores
in all SF-36 domains that indicate lower the quality of life.
MAJOR FINDINGS
The results revealed that the urban older people 38(63.33%) had good quality of
life, 14(23.33%) had moderate quality of life, and 8(13.33%) had very good quality
of life.
As per as rural area concerned 30(50%) had good quality of life, 27(45%) had
moderate quality of life, 2(3.33%) had poor quality of life and finally 1(1.67%) had
very good quality of life.
The chi-square test revealed that there was a significant association between the
QOL with their education, occupation, family income per month, socio-economic
class, financial support, place of residence and current health status to last four
years.
There was no statistical significant association between the QOL with their gender, age
in years, religion, marital status, regular income, type of family, type of house, living
status, and idea regarding medical help, government funded schemes respectively.
CONCLUSION
The study concludes that the urban older people 38(63.33%) had good quality of life,
14(23.33%) had moderate quality of life, and 8(13.33%) had very good quality of life
and as per as rural area concerned 30(50%) had good quality of life, 2(3.33%) had poor
quality of life, 27(45%) had moderate quality of life and finally 1(1.67%) had very good
quality of life.
The elderly people living in urban areas have better QOL (Mean=12.86) i.e., in all
domains when compared to elderly people living in rural areas. The ‘F’ value of 0.047
suggesting that there is no significant interaction between the gender and locality of
residence with regard to all domains of QOL. The rural women differs significantly with
urban men in their all domains, rural men differ significantly with urban women and
urban men in their all domains, where as other mean differences are not significant.
The Self Instructional Module (SIM) was given to men and women separately after data
collection for future reference with the help of SIM, they can improve the quality of life,
promotes good health and preserves the life.
IMPLICATIONS The study findings had thrown new light on the implication of the
future.
www.ijmer.in 13
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Prevent and reduce common risk factors that contribute to functional decline and
impaired quality of life.
Evaluate the utility of complementary and integrative health care practices on health
promotion and symptom management of elderly.
Guide elderly and their family members regarding the various resources (money
and material) available in the community setting to utilize the rehabilitative health
care services.
Educate the elderly and their family members regarding various health care policies
and facilities that are available to fulfill the various needs.
EDUCATION
Curriculum should provide opportunity to the students to assess, compare and
contract living environment of elderly. To analyze the effectiveness of community
resources in assisting older adults and their families to attain the personal goals and
minimize the functioning, maintain independence and to live in the least restrictive
environment.
Students get exposure to various available resources provided by government and
nongovernmental organizations in provision of care, cure and rehabilitative services
to the elderly.
Students should get opportunity to render, assess and evaluate the case provided by
family members and also the individuals to participate in their own health care
through evidence based nursing practice during community, clinical rotations.
The teaching faculty should plan for various programmes by using advanced
educational technology to flourish the student’s minds and divert them to provide
maximize their efforts towards the care of elderly in improving their Quality of life.
RESEARCH
The mentors of research should focus their attention especially on improvement of
quality of life among elderly, based on the needs elicited by various researchers.
The experienced researchers should prepare the younger researcher to focus their
attention on community needs of the elderly and guide them to conduct various
studies in improving quality of life of the elderly.
Government also should take interest and allot resources to conduct various
research projects for the improvement of quality of life.
RECOMMENDATIONS
On the basis of the findings of the study the following recommendations are made.
The study can be replicated with a large population to draw generalizations in this area
of research.
A similar study can be conducted at institutionalized and non institutionalized homes.
A study can be made to assess the quality of life in various old age problems.
A study can also be done to assess the knowledge of family members regarding old age
problems.
A study can be done to asses the knowledge regarding old age problems.
www.ijmer.in 14
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
BIBLIOGRAPHY
TEXT BOOKS
1. Aabha Choudary (2001), Active ageing in the new millennium-An Indian
Scenario, (1st edition), Jaypee Publications, P.P 10-12.
2. brams, W., Beers, M., & Berkow R (1995), The Merck manual of geriatrics,
(2nd edition), Whitehouse Station, Merck & Company, P.P 110-116.
3. Benjamin James Sadock (2003), Synopsis of Psychiatry (4th edition),
Philadelphia, Lippincott William Wilkins P.P 75-78.
4. Edward (2005), A text book Geriatric Neuro Psychiatric (2nd edition), Jaypee
Publications, P.P: 530-535
5. Gallo, J.J., Reichel, W., & Anderson, L.M. (1995), Handbook of geriatric
assessment (2nd edition), Gaithersburg, MD: Aspen Publications, P.P 30-35.
6. Indira Jaya Prakash (2006), Training Module Gerontology (2nd edition),
Jaypee Publications, P.P: 122-123.
7. Irudaya Rajan (1999), Indian Elderly, Burden or Challenge (1st edition), New
Delhi, Sage publications, P.P 48-52.
8. Kothari C.P (2001), Research Methodology (2nd Edition), New Delhi, Gupta
Publishers P.P 60-72.
9. Mary Bhat PN (1992), Changing Demography of elderly in India. Current
Science (3rd edition), Jaypee Publications, P.P 85-88.
10. .Park K (2000), Text Book of Preventive and Social Medicine (16th edition),
Bharat Publishers, Jabalpur, P.P: 408-410.
11. sendlatt DE (2002), Text Book of Premier on Geriatric Care (1st edition),
Pixal Publicaions, P.P 7-11.
JOURNALS
12. A B Dey., “Emerging Challenges of Old Age Care in India”, Journal of the
Indian Academy of Geriatrics 2006, Vol. 2, No 4.
13. Anindya Banerjee., “Quality of life in patients with age related macular
degeneration”, Quality of Life Research 2007, Feb; 17(1):51-59.
14. Ann Bowling & Catherine Kennelly., “Adding quality of quantity. Older
people’s view on quality or life and its enhancement”, Age concern England
2003, Vol. 3, 41.
www.ijmer.in 15
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 16
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
lkjka”k
lkekU;r;k dqN o’kksaZ ds fy, fofHkUu izdkj ds laLFkkuksa esa i<+us ,oa izf”k{k.k ysus dks f”k{kk ds :i esa tkuk
tkrk gSA orZeku esa uohu f”k{kk uhfr ds fuekZ.k dk dk;Z rsth ls gks jgk gSA f”k{kk dks gh gj ckj ifjorZu
dk ek/;e ekuk tkus yxk gSA ftrus iz;ksx bl {ks= esa gksrs gS mrus “kk;n gh fdlh vU; {ks= esa gksrs gksA
1947 esa ns”k esa 18 fo”ofo|ky;] 518 egkfo|ky; vkSj Nk= la[;k 2]28]881 FkhA vc bl fLFkfr esa cgqr
ifjorZu vk x;k gSA ns”k esa 1 vizSy 2018 ds vka¡dMksa ds vuqlkj 903 fo”ofo|ky; gSA ns”k esa 285
fo”ofo|ky; lEc)rk okys] 343 futh fo”ofo|ky; ,oa 357 fo”ofo|ky; xzkeh.k {ks= ds gSA Xykscy
dfEiVhfVo baMsDl 4-0 o’kZ 2018 ds vuqlkj Hkkjr dk blesa 140 ns”kksa dh lwph esa 58oka LFkku gSA bl baMsDl
dh x.kuk 12 LrEHkksa ds vk/kkj ij dh tkrh gS ftlesa baLVhV~;w”kal] vkbZlhVh ,MkWI”ku] fLdYl vkSj bUuksos”ku
dSisfcfyVh Hkh “kkfey gSA ns”k ds vusd egkfo|ky;ksa esa vR;f/kd Nk= la[;k] Qhl vf/kd vkSj lS)kfUrd
f”k{kk nh tk jgh gS] tks Nk=ksa dks jkstxkj ;ksX; cukus esa vlQy gSA ftlls csjkstxkjh dh nj esa o`f) gks jgh
gSA vkt fo|kfFkZ;ksa dk bathfu;fjax] esfMdy ,oa eSustesaV ds dkslksZsa ls yxko [kRe gksrk tk jgk gSA
mnkjhdj.k ds nkSj esa vusd ns”k Hkkjr ds “kS{kf.kd laLFkkuksa esa vikj lEHkkouk,¡ ryk”k jgs gSA ,sls esa
vko”;drk gS ns”k ds uhfr fuekZrk f”k{kk dh n”kk ,oa fn”kk cnyus esa nyxr jktuhfr ls ij mB dj lkFkZd
vkSj O;kogkfjd dk;Z iz.kkyh dk fuekZ.k djasA
eq[; 'kCn& f”k{kk] fo”ofo|ky;] egkfo|ky;] orZeku n”kk
lkekU;r;k dqN o’kksaZ ds fy, fofHkUu izdkj ds laLFkkuksa esa i<+us ,oa izf”k{k.k ysus dks f”k{kk ds :i esa tkuk
tkrk gS] ;g f”k{kk dk ladqfpr vFkZ gSA foLr`r vFkZ esa f”k{kk vukSipkfjd f”k{kk gksrh gS tks izR;{k ;k ijks{k
:i ls dgha ls Hkh yh tk ldrh gS tks euq’; ds Kku ,oa dkS”ky esa o`f) djrh gksA
v/;;u ds mn~ns';&
1- f”k{kk dk vFkZ tkuuk ,oa fofHkUu izdkj dh f”k{kk O;oLFkk dks tkuukA
2- mPp f”k{kk dh fLFkfr dks tkuukA
3- mPp f”k{kk esa lq/kkj gsrq lEikfnr gksus okys dk;ksZa dks tkuukA
'kks/k fof/k&
izLrqr “kks/k i= fooj.kkRed “kks/k fof/k ls fy[kk x;k gSA “kks/k i= fy[kus esa f}fr;d lzksrksa dk iz;ksx fd;k
x;k gSA bl gsrq fofHkUu izdkj dh iqLrdksa] if=dkvksa] lekpkj i=ksa] “kks/k i=ksa ,oa osclkbV~l dk iz;ksx fd;k
x;k gSA
'kks/k leh{kk&
vxzoky ih- 2018 us fy[kk gS fd mPp f”k{kk iz.kkyh ds fodkl esa jkT; dh Hkwfedk dks l”kDr fd, tkus dh
vko”;drk gSA mPp f”k{kk ,oa “kks/k esa fo”ks’k rkSj ij mHkjrs gq, Kku us egRoiw.kZ cuk;k gSA ;|fi bl vksj
vf/kd /;ku fn, tkus dh vko”;drk gSA
dksBkjh vrqy 2019 us crk;k gS fd fdlh Hkh ns”k ds mRFkku dh uhao f”k{kk gh gksrh gSSA ijUrq ns”k esa vktknh
ds 21 o’kZ ckn 1968 esa igyh f”k{kk uhfr vkSj 1986 esa nwljh f”k{kk uhfr dk fuekZ.k fd;k x;kA orZeku esa
uohu f”k{kk uhfr ds fuekZ.k dk dk;Z rsth ls gks jgk gSA igyh vkSj nwljh nksuksa gh uhfr;ksa esa ldy ?kjsyw
mRikn dk 6 izfr”kr f”k{kk ij O;; fd, tkus dk leFkZu fd;k x;k ijUrq ns”k esa jktuhfrd bPNk “kfDr ds
vHkko esa bu vuq”kalkvksa dks gdhdr ds /kjkry ij mrkjk gh ugha tk ldkA 1947 esa ns”k esa 18 fo”ofo|ky;]
518 egkfo|ky; vkSj Nk= la[;k 2]28]881 FkhA vc bl fLFkfr esa cgqr ifjorZu vk x;k gSA
ik.Ms; ftrsUnz dqekj 2019 us fy[kk gS fd f”k{kk l”kDrhdj.k dk lcls cM+k ek/;e gSA ,d jk’Vª ds vkfFkZd
fodkl ,oa yksxksa dh vkthfodk ds lrr~ miktZu esa mPp f”k{kk dk egRoiw.kZ ;ksxnku gSA mPp f”k{kk lafo/kku
ds vkyksd esa Hkkjr dks ,d yksdrkaf=d] U;k;iw.kZ] lkekftd ,oa O;fDrxr le> ls ifjiw.kZ vkSj lkaLd`frd
www.ijmer.in 17
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
vkSj ekuoh; :i ls ln`<+ jk’Vª ds :i esa LFkkfir djus dk iz;kl djrh gSA ftlesa lcds fy, Lora=rk]
lekurk] U;k; ,oa Hkkr`Ro dh Hkkouk gSA Hkkjr us viuh lk{kjrk ,oa mPp f”k{kk ds {ks= esa vHkwriwoZ o`f) dh
gSA
tk;loky 2019 esa fy[kk gS fd orZeku f”k{kk iz.kkyh ;qokvksa dks jkstxkj gsrq dkS”ky iznku ugh djrhA dksbZ
Hkh O;kikjh@m|eh vdq”ky ,oa vuqHkoghu] izf”k{k.kghu O;fDr;ksa dks jkstxkj iznku ugha djrk gSA blls
csjkstxkjh esa o`f) gks jgh gSA Hkfo’; esa vPNs ekuo lalk/ku dk fodkl djus ds fy, mfpr uhfr;ksa dk
fuekZ.k djuk t:jh gSA
f'k{kk dh ifjHkk"kk&
Ýkscsy ds vuqlkj f”k{kk dk dk;Z izkd`frd fodkl dks mlds y{; dh vksj ys tkus esa lgk;rk djuk gSA th-
,p- FkkWelu ds “kCnksa esa f”k{kk ls esjk vk”k; O;fDr ds fopkj] O;ogkj vkSj vfHko`fr dh vknrksa esa ,d LFkk;h
ifjorZu mRiUu djus okys ifjos”k ds izHkko ls gSA Vh- ih- uu dk ekuuk gS fd f”k{kk O;fDr dk iw.kZ fodkl
gS rkfd og viuh loksZÙke lkeF;Z ds vuqlkj ekuo thou esa ,d HkkSfrd ;ksxnku iznku dj ldsA foosdkuUn
ds vuqlkj euq’; dh vkUrfjd iw.kZrk dks vfHkO;Dr djuk f”k{kk gSA bl izdkj f”k{kk dk vFkZ O;fDr dh
“kkjhfjd] ekufld] vk/;kfRed] O;fDrxr vkSj lkekftd fodkl ds :i esa mlds O;fDrRo dk lexz fodkl
djuk gSA
orZeku esa mPp f'k{kk dk /kjkry&
f”k{kk fodkl ,d ,slk dk ?kVd ftlds fy, vyx ls lsl ¼,d izdkj dk dj½ olwyk tkrk gSA f”k{kk dks gh
gj ckj ifjorZu dk ek/;e ekuk tkus yxk gSA ftrus iz;ksx bl {ks= esa gksrs gS mrus “kk;n gh fdlh vU;
{ks= esa gksrs gksAns”k esa 1 vizSy 2018 ds vka¡dMksa ds vuqlkj 903 fo”ofo|ky; gSA ns”k esa 285 fo”ofo|ky;
lEc)rk okys] 343 futh fo”ofo|ky; ,oa 357 fo”ofo|ky; xzkeh.k {ks= ds gSA dsoy efgyk fo”ofo|ky;ksa
dh la[;k 15 gS ftuesa ls jktLFkku esa 4 gSA ns”k esa ,d dsUnzh; eqDr fo”ofo|ky;] 14 jkT; eqDr
fo”ofo|ky; vkSj 1 jkT; futh eqDr fo”ofo|ky; gSA ns”k esa 110 ,sls fo”ofo|ky; Hkh gS tks
egkfo|ky;ksa@foHkkxh; f”k{kk ds lkFk&lkFk nwjLFk f”k{kk Hkh iznku djrs gSA ns”k esa 1 vizSy 2017 ds vka¡dM+ksa
vuqlkj 42]338 egkfo|ky; gS vkSj 10]011 LVS.M vyksu f”k{k.k laLFkku Hkh gSA ns”k esa lokZf/kd egkfo|ky;
mRrj izns”k esa 6]943 gSA jktLFkku esa 3]319 egkfo|ky; gSA ns”k esa 60-48 izfr”kr egkfo|ky; xzkeh.k {ks=ksa esa
gSA dsoy efgykvksa ds fy, 11-04 izfr”kr egkfo|ky; gSA 36-7 izfr”kr egkfo|ky;ksa esa ijkLukrd ikB~;Øe
,oa ek= 3-6 izfr”kr egkfo|ky;ksa esa gh ih-,pMh- Lrj dk f”k{k.k gksrk gSA 33-75 izfr”kr egkfo|ky;ksa esa
,dy ikB~;Øze gh lapkfyr fd;k tkrk gS buesa ls Hkh 55-1 izfr”kr esa dsoy ch-,M ikB~;Øe gh lapkfyr
gksrk gSA o’kZ 2017&18 esa mPp f”k{kk esa dqy ukekadu 366 yk[k Fkk] ftuesa 192 yk[k ;qod Fks tcfd 174
yk[k ;qofr;k¡a Fkh tks fd dqy dk 47-6 izfr”kr FkhA nwjLFk f”k{kk esa v/;;ujr fo|kkfFkZ;ksa esa 41-9 izfr”kr
efgyk,¡ gSA ns”k esa ch-,- esa lokZf/kd Nk= v/;;u djrs gS mlds ckn ch- ,llh- ,oa ch- dkWe- dk LFkku
vkrk gSA mPp f”k{kk ds 188 ikB~;Øeksa esa ls dsoy 10 ikB~;Øeksa esa gh dqy fo|kkfFkZ;ksa dk 81-2 izfr”kr
fgLlk gSA foKku ladk; ds fo|kkFkhZ lcls vf/kd ih-,pMh djrs gSA ns”k esa 166 ns”kksa ds fons”kh Nk= Hkh
v/;;u gsrq vkrs gS ijUrq vf/kdrk usiky] vQxkfuLrku] HkwVku vkSj ukbthfj;k ds Nk=ksa dh jgrh gSA Xykscy
dfEiVhfVo baMsDl 4-0 o’kZ 2018 ds vuqlkj Hkkjr dk blesa 140 ns”kksa dh lwph esa 58oka LFkku gSA bl baMsDl
dh x.kuk 12 LrEHkksa ds vk/kkj ij dh tkrh gS ftlesa baLVhV~;w”kal] vkbZlhVh ,MkWI”ku] fLdYl vkSj bUuksos”ku
dSisfcfyVh Hkh “kkfey gSA ij bl fjiksVZ ls bruk rks r; gS fd mPp f”k{kk ds {ks= esa vHkh Hkh cgqr dqN djus
dh vko”;drk gSA bl gsrq vko”;d lq/kkj ds iz;kl fd, tk jgs gS&
1- futh {ks= dks c<+kok& mPp f”k{kk dh 80 izfr”kr f”k{k.k laLFkk,¡a futh {ks= esa lapkfyr gks jgh gSA ijUrq
blds lkFk ;g nks’k Hkh gS fd bu futh laLFkkvksa esa ls 90 izfr”kr esa xq.koÙkk ds izR;sd Lrj ij le>kSrs
fd, tkrs gSA vr% ljdkj dks bl vksj Hkh /;ku nsuk pkfg,A
2- jk’Vªh; mPprj f”k{kk vfHk;ku& bls :lk ds uke ls Hkh tkuk tkrk gSA bldh LFkkiuk 2013 esa dsUnz
ljdkj }kjk dh xbZ gSA mPp f”k{kk esa fodkl gsrq jkT;ksa dks 60 izfr”kr foÙk dsUnz ljdkj iznku djrh
gS vkSj jkT; dks bl gsrq 40 izfr”kr foÙk dh gh O;oLFkk djuh iM+rh gSA fo”ks’k ntkZ izkIr jkT;ksa ds
fy, dsUnz 90 izfr”kr rd dh foÙk O;oLFkk djrh gSA :lk ds izeq[k dk;Z bl izdkj ls gS&
fo|eku Lok;Ùk egkfo|ky;ksa dks fo”ofo|ky;ksa ds :i esa mPphd`r djukA
www.ijmer.in 18
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 19
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
fn”kkfunsZ”k tkjh dj pqdk gSA izkFkfed f”k{kk ls ysdj mPp f”k{kk rd dkjksckfj;ksa ds gokys gksus ls bl fn”kk
esa iz;kl lQy ugha gks ik jgs gSA fo”ofo|ky;ksa dh Lok/khurk vc igys tSlh ugha jgh gS vkSj dqyifr;ksa dh
fu;qfDr esa Hkh jktuhfr gks jgh gSA blh dkj.k ls 2020 esa tkjh nqfu;k “kh’kZ 300 fo”ofo|ky;ksa esa ns”k dk
,d Hkh fo”ofo|ky; ugha gSA ,slk 2012 ds ckn igyh ckj gqvk gSA izkFkfed f”k{kk ls ysdj mPp f”k{kk ij
csgn /;ku nsus dh vko”;drk gSA mPp f”k{kk esa ljdkj }kjk tks [kpZ fd;k jgk gS mls vf/kd rkfdZd ,oa
y{; dsfUnzr cukus dh t:jr gSA mPp f”k{kk esa tks vuqnku fn;k tk jgk gS ml ij Hkh fopkj djus dh
vko”;drk gSA ;g vkfFkZd vk/kkj ij l[rh ls nh tk, rks T;knk csgrj gS] gj fdlh dks ;w¡gha vuqnku dk
forj.k ugha djuk pkfg,A tSlk fd fnYyh fo”ofo|ky; esa gksrk gS fd ogk¡ lHkh dks gh vuqnku feyrk gS
;g ugha gksuk pkfg, D;ksafd vkfFkZd :i ls l{ke fo|kkFkhZ Hkh i<+rs gS ftudks bl izdkj ds vuqnku dh
vko”;drk gh ugha gSA blls okLrfod :i ls xjhc yksxksa dk uqdlku gksrk gSA tcfd Hkkjrh; izca/ku
laLFkku esa vuqnku de dj fn;k x;k gS ;|fi blesa v/;;u djus okys Nk= ns”k dk lalk/ku gksrs gS tks
vkfFkZd fodkl esa lgk;d gksrs gSA ubZ f”k{kk uhfr] Hkkjrh; mPp f”k{kk vk;ksx] uohu ekU;rk iz.kkyh vkSj
mPp f”k{k.k laLFkkuksa esa 5 yk[k QSdYVh dh fu;qfDr dk iz;kl ubZ f”k{kk uhfr 30 ebZ 2019 ds 100 fnolh;
,ts.Ms esa fd;k x;k gSA
f”k{kk esa lq/kkj ds fy, ;g Hkh t:jh gS fd f”k{kdksa dks i;kZIr izf”k{k.k fn;k tk,A f”k{kk dks f”k{kk ekfQ;k ds
pqaxy ls ckgj fudkyus dh vko”;drk gSA f”k{kdksa dh fu;qfDr ,oa rcknyk uhfr Hkh Li’V gksuh pkfg,A
f”k{kdksa ds fjDr inksa dks “kh?kz Hkjuk pkfg,A ;g Hkh ,d eqn~nk gS fd ,d rjQ ljdkj f”k{kk ra= /ku dh
deh dh ckr dj jgh gS tks nwljh rjQ futh {ks= f”k{kk esa u, midze yxkkuk pkgrk gSA futh {ks= ykHk
dek jgk gS vkSj mlds fo|ky;ksa ,oa egkfo|ky;ksa esa fo|kkfFkZ;ksa dh Hkkjh HkhM+ jgrh gSA ljdkj buds ykHkksa
ij dj olwy dj vk; dek ldrh gSA ns”k ,oa lekt dh vko”;drk vuq:i mPp f”k{kk dk fodkl gksuk
pkfg,A O;olk;ijd ,oa rduhd vk/kkfjr f”k{kk ij tksj fn;k tkuk pkfg,A
dukZVd ,oa jktLFkku esa f”k{kk esa dkQh ifjorZu fd, tk jgs gSA nf{k.k ds jkT; dsjy esa u rks f”k{kdksa dh
deh gS vkSj u gh lalk/kuksa dhA tcfd mRrj izns”k ,oa fcgkj dh f”k{kk O;oLFkk ds gkykr~ fdlh ls fNis ugha
gS ftl ij /;ku nsus dh vko”;drk gSA f”k{kk dk {ks= gh ,slk gS tgk¡ ij fd;k x;k fofu;ksx dHkh Hkh csdkj
ugha tkrkA f”k{kk esa ckj ckj uohu ifjorZu djus dh ctk, ekStwnk ;kstukvksa dks gh lgh O;oLFkk ,oa rjhdksa
ls ykxw djuk pkfg,A ns”k ds vusd egkfo|ky;ksa esa vR;f/kd Nk= la[;k] Qhl vf/kd vkSj lS)kfUrd f”k{kk
nh tk jgh gSA tks Nk=ksa dks jkstxkj ;ksX; cukus esa vlQy gSA ftlls csjkstxkjh dh nj esa o`f) gks jgh gSA
vkt fo|kfFkZ;ksa dk bathfu;fjax] esfMdy ,oa eSustesaV ds dkslksZsa ls yxko [kRe gksrk tk jgk gSA mnkjhdj.k
ds nkSj esa vusd ns”k Hkkjr ds “kS{kf.kd laLFkkuksa esa vikj lEHkkouk,¡ ryk”k jgs gSA ,sls esa vko”;drk gS ns”k
ds uhfr fuekZrk f”k{kk dh n”kk ,oa fn”kk cnyus esa nyxr jktuhfr ls ij mB dj lkFkZd vkSj O;kogkfjd
dk;Z iz.kkyh dk fuekZ.k djasA ftlls ns”k esa jkstxkkj ds voljksa dk fodkl gks lds rkfd f”k{kk vius izkphu
egRo dks iqu% izkIr dj ldsA
lanHkZ&
1- vfXugks=h jfoUnz] vk/kqfud Hkkjrh; f”k{kk] jktLFkku fgUnh xzaFk vdkneh] t;iqj] 1987
2- vMoky] lqcks/k ch-] Hkkjrh; f”k{kk dh leL;k,¡ ,oa izo`fr;k¡a] mÙkj izns”k fgUnh xzaFk vdkneh] 1974
3- dksBkjh vrqy] f”k{kk fodYi ,oa vk;ke] izHkkr izdk”ku ubZ fnYyh] 2019
4- esgrk vkyksd] rc vkSj vc] fdrkc ?kj izdk”ku ubZ fnYyh] 2007
5- “kekZ vkj- ,u- ,oa “kekZ vkj- ds-] “ksSf{kd lekt”kkL=] vaVykafVad ifCy”klZ ,.M fMfLVC;wVlZ ubZ fnYyh] 2006
6- Ikk.Ms; ftrsUnz dqekj] mPp f”k{kk lEHkkouk,¡ vkSj pqukSfr;k¡] ;kstuk flrEcj 2019] Ik`’V la[;k 61&64
7- fQfyi th- vYVck[k vuqoknd vxzoky ih-] Hkkjrh; mPPk f”k{kk ds ik¡ap n”kd] lst ifCyf”kax bf.M;k fnYyh] ekpZ
2018
8- jktLFkku if=dk ukxkSj] 28 tuojh 2020] lEikndh; i`’V
9- jktLFkku if=dk t;iqj] 20 Qjojh 2020] lEikndh; i`’V
10- vkmVyqd fgUnh] 1 tqykbZ 2019
11- izfr;ksxrk niZ.k] vDVwcj 2018] i`’V la[;k 77&81
12- izfr;ksxrk niZ.k] fnlEcj 2018] i`’V la[;k 58
13- tk;loky ih- ts-] eksnh ,jk] us”ku izsl psUUbZ] 2019
www.ijmer.in 20
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
On February 26, 2020, the Supreme Court gave its verdict in the long-drawn litigation
between JaypeeInfratech Limited (JIL) and Jaiprakash Associates Limited (JAL). These
two entities had brought forth competing creditor claims. While deciding the case,
Supreme Court held that the JIL claims were preferential transactions and that third
party security does not amount to financial debt. Through this article, we shall analyse
the judgment and its implications.
Background
The statutory appeal is made to SC from NCLAT order dated 01.08.2019 which set
aside the order passed by NCLT, Allahabad Bench where the application was moved by
IRP of JaypeeInfratech Ltd. (JIL) for setting aside the transaction of mortgage of certain
properties made by the corporate debtor (CD) in favour of its holding company
Jaiprakash Associates Limited (JAL), having 71.64% equity shareholding in JIL, as
being preferential, undervalued and fraudulent, in terms of Sections 43, 45 and 66 of
IBC. JIL was set up as a special purpose vehicle for construction of an expressway from
Noida to Agra and finance was obtained from a consortium of banks (including
Respondents) against the partial mortgage of land acquired and a pledge of 51% of the
shareholding held by JAL. IDBI Bank Limited instituted CIRP against JIL alleging that
it committed a default in repayment of its dues of Rs. 526.11 crores. After passing an
order of moratorium and public declaration, IRP was permitted to take over
management of JIL and in the process made an application u/s. 43 of IBC to NCLT
which ordered the security interest was ordered to be discharged and the properties
involved therein were vested in the corporate debtor, with release of encumbrances.
NCLAT however upturned the order of NCLT holding that the transactions in question
do not fall within the mischief of being preferential or undervalued or fraudulent; and
that the lenders in question (the lenders of JAL) were entitled to exercise their rights.
The Respondent banks namely, ICICI Bank Limited and Axis Bank Limited, sought
inclusion in the category of FC of JIL but IRP declined to recognize them as such.
Being aggrieved by the IRP decision it preferred separate applications u/s. 60(5) of IBC
before NCLT asserting their claim on account of the securities provided by JIL for the
facilities granted to JAL. NCLT rejected the applications. Aggrieved banks approached
the NCLAT which didn’t address the issues and has consequently appealed to SC.
www.ijmer.in 21
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Arguments of Respondents:
The impugned mortgages had not been created on account of any antecedent debt
liability owed by the CD; they had been within the ordinary course of business of and
were not within the statutory period of one year and, therefore, Section 43 of IBC would
not apply. The ‘relevant time’ in the present circumstances could be only one year as
Bank is an unrelated party as the land parcels were mortgaged on 24.02.2015, which is
beyond even the two years formulation, the relevant time being from 10.08.2016 to
09.08.2017. The security was provided on account of the debt obligations of JAL, and
not any antecedent debt obligations of the corporate debtor. The transfer has no effect
whatsoever on the relative position of JAL in the distribution waterfall as it remains an
operational creditor without any security interest. A mere transfer of the assets within
the look-back period (relevant time period) would not make the transaction preferential
except when it is coupled with the intent to prefer one creditor over the other.
www.ijmer.in 22
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
debts and other liabilities owed to such related person as JAL had entered into Promoter
Support Agreement to the lenders of JIL to meet the obligation of JIL towards its
lenders; and had further extended Bank Guarantees of Rs. 212 crores to meet the
obligation of JIL.
1(iii) Evidently, by way of the impugned transfers, JAL is put in a much beneficial
position than it would have been in the absence of such transfers as JAL received a huge
working capital (approx. Rupees 30000 crores), by way of loans JAL’s liability towards
its own creditors shall be reduced, in so far as the value of the mortgaged properties is
concerned. Other creditors and stakeholders of JIL shall have to bear the brunt of the
corresponding disadvantage because such heavily encumbered assets will not form the
part of available estate of the CD.
1(iv) Merely because look-back period is envisaged under IBC, for the purpose of
finding ‘relevant time’, it cannot be said that the provision itself is retrospective in
operation as contended by the Respondents. The concept of re-mortgage is equivalent to
fresh mortgage and thus Respondent’s contention that the mortgages were formed prior
to commencement of IBC or were re-mortgaged falls flat.
Banks contention that they were unaware of third-party encumbrances was legally
untenable as they are hit by doctrine of due diligence (notice) and should’ve inspected
for any encumbrances.
2 The debts in question are in the form of third party security; said to have been given
by the corporate debtor JIL so as to secure the loans/advances/facilities obtained by JAL
from the respondent-lenders. Such a ‘debt’ is not and cannot be a ‘financial debt’ within
the meaning of Section 5(8) of the Code; and hence, the respondent-lenders, the
mortgagees, are not the ‘financial creditors’ of the corporate debtor JIL. As per ration in
Essar Steel and Swiss Ribbons, as being subsumed in financial creditors, is only that of
such secured creditors who are directly engaged in advancing credit to the corporate
debtor and not the indirect creditors who had extended any loan or facility to a third
party but had taken a security from the corporate debtor, whose resolution is under
consideration.
This decision of the Supreme Court will have a huge impact on how third party security
transactions are viewed within the context of IBC. Classifying them as preferential
transactions means that now insolvency professionals will have to re-think before
approaching the NCLT for third-party security transactions. Moreover, the composition
of committee of creditors would also have to undergo a change, as third-party security
beneficiaries may not fall under the scope of financial creditors, post this decision.
www.ijmer.in 23
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 24
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 25
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 26
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 27
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 28
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 29
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 30
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 31
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 32
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 33
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 34
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 35
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 36
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 37
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 38
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Abstract
For the businesses to deliver their promises to their customers, it must have a supply
chain that operates properly and fulfil the purpose. The impact of COVID-19 has taken
a toll on economy globally, causing crash in stock prices and distressing earnings
projections. The scope of this pandemic disease, with regard to the number of people
affected and for how long it will last, seems to be distinctive and new remembrance.
This paper aims to suggest that corona virus risk is a wakeup call for many companies
to manage their supply chains.
INTRODUCTION:
The global effects on supply chain management have occurred because of the outbreak
of corona virus in Wuhan, China. This has affected the supply of inputs for large
number of manufacturers and retailers globally because China is an extremely large
source of components and finished goods. Manufacturers are forced to suspend their
operations as their key inputs have exhausted. Big Brands like Apple, Microsoft, JCB
and Nissan have perceived the interruption as their factories in China are operating at
limited capacity or suspended their production. Local economies in the world that are
dependent on China as a customer are also facing the facts.
Although there are some indications that exports from China have started again, there is
an increasing likelihood that situation will get worse before getting better. Now, the
outbreak has spread throughout the globe. This has resulted in labour shortage and
restrictions on travel within and outside the country, further disrupting the supply chains
of businesses around the world.
The COVID-19 outbreak has made the supply chains fragile and vulnerable because of
sudden supply shortages. The main reason for this is rigid supply chains and suppliers
www.ijmer.in 39
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
are not able to switch easily to an alternative in times of stress. One more reason is
consolidated production zones, where a country or a city is specialized in production of
some key components, parts or products. This reduces the overall cost of supplying
goods from one part of the world to another in good times but is a matter of concern in
the times of distress.
The complication of supply chains call for an estimation of types of risks involved as
these risks are related to each other. The three types of risks involved are: supply risk,
demand risk and operational risk.
Supply Risk affects procurement of raw material, components, parts, products and
services from suppliers, indicating that the supply chain is not able to meet the demand
concerning quantity and quality of finished products. The end result is described as
supply disruption.
Demand Risk affect outbound supply chain which means movement of finished goods
including storage, transportation and delivering to end customer, especially in times of
epidemic when fluctuation in demand is unforeseen.
Operational Risk affect segments within a supply chain, reducing its capacity to supply
raw material, parts or finished products within a stipulated time and cost. Carrying
goods from one place to another is not easy during disturbance.
Companies with diversified supply chains from geographic viewpoint are at less risk in
comparison to one’s dependent on one region or country for their supplies. Such
companies have developed and executed supply chain risk management strategies to
keep continuing their businesses. They procure their key components from different
sources to reduce their dependency on one supplier and keep buffer stock to mitigate
risk against supply chain disruption. Companies who have better visibility beyond the
expanded supply chain network can better respond to adverse situation.
www.ijmer.in 40
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
The motivation towards writing this research paper is to suggest some ways in which
supply chain disruptions can be managed.
2. Shifting production facilities: Companies along with their key suppliers (Tier-1
and Tier-2 suppliers) should work together to understand the workability to shift
production and purchase order fulfilment to some other regions or locations as an
alternative. This proves to be critical in minimizing supply chain disruptions.
4. Locating substitute suppliers in the not affected regions: All the companies that
are heavily dependent on Chinese supply have to find substitute sourcing markets
for raw materials. These industries can diversify to countries like India, Brazil,
Chile and Mexico for procurement of components and parts for their operations.
5. Upgrading inventory policy and plans: From past few decades, large companies
have been applying various ways to reduce their inventory across the supply chain
and safety stocks are set statistically, only to buffer normal variations in demand
and supply. Companies have not kept buffer stock for the enormity of destruction
caused due to corona virus epidemic. It’s high time to upgrade inventory planning
and framing policies so that companies are at least risk during such disturbances.
www.ijmer.in 41
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
7. Need for supply network mapping: There is an urgent need to do supply chain
network mapping as a risk reduction strategy. Companies avoid doing mapping
because of sizeable labour and time requirement in doing this activity. They
continue to depend on human intelligence for the information of key suppliers of
their businesses. The information gathered by procurement staff is informal which
is collected via personal relationships. When the staff quit the company or gets
retired or their roles change within the firm, their acquired knowledge and
experience leaves with them. The new employee will take some time to get to know
about these key (tier-1, tier-2, tier-3) suppliers and their reach. The benefit of
locating supply network map is greater than the time and cost of developing it.
8. Ensuring supplier’s data privacy: The upstream suppliers do not want to disclose
their information to the end customer because of the mistrust and fear of losing
commercial dominance, if their customers are aware about their functioning,
sourcing and pricing policies. Conventional supply chains are centralised and
cannot provide individual access controls, but a decentralised arrangement which is
owned by a single large buyer is the optimum way by which supplier and buyer can
have the privacy they need.
www.ijmer.in 42
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
The other way by which supplier can be encouraged to give his information to the
buyer is through incentives. If the buyer worth supplier data, he should pay for the
data also in addition to the goods sourced from tier-1 supplier so that the data
narrates the information of tier-2 or even further upstream supplier’s data in the
network.
Digital supply chains have become essential for the competitiveness of large companies.
New supply chain technologies are coming that can improve end to end visibility to a
large extent. The conventional outlook of a linear supply chains are transforming into
digital supply chain network, making it possible for businesses to connect to their whole
supply network. Digital supply chain networks will enhance optimization and
collaboration. These are being set up and arranged in a manner to predict disruptions
and are configured differently to mitigate the risk in times of pandemic.
www.ijmer.in 43
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
CONCLUSION
Supply chain risk management becomes a challenge for the companies during times of
epidemic and disturbances. If the supply chains are made anti fragile, they will become
company’s considerable strength. The consolidated centres of production should also be
minimized. New digital supply chain models will play a significant role to help supply
chain managers to mitigate the risk of disruption and provide a network where they can
serve their customers better. New digital techniques like cloud computing, robotics,
artificial intelligence, 5G are pivotal to enable the future of digital supply chain network.
The lesson to be learned from the pandemic covid-19 is to build a supply chain network
which will remain unaffected or return to normal swiftly from difficult times.
References:
Levi, David and Haren, Pierre (2020). How Corona virus could Impact the Global
Supply Chain by Mid-March, Harvard Business Review
Retrieved from https://hbr.org/2020/02/how-coronavirus-could-impact-the-global-
supply-chain-by-mid-march on 24.04.2020
Kapadia, Shefali (2020). Three ways to manage corona virus risk in the supply
chain Retrieved from https://www.supplychaindive.com/news/coronavirus-risk-
supply-chain-modex/573886/ on 24.04.2020
“COVID-19 Managing supply chain risk and disruption” report by Deloitte
Retrieved from https://www2.deloitte.com/global/en/pages/risk/articles/covid-19-
managing-supply-chain-risk-and-disruption.html on 24.04.2020
https://www.publicissapient.com/insights/coronavirus_and_managing_the_supply_c
hain_amid_a_crisis on 25.04.2020
Retrieved from https://www.weforum.org/agenda/2020/04/supply-chains-resilient-
covid-19/ on 25.04.2020
https://www.supplychaindigital.com/supply-chain-management/coronavirus-and-
antifragile-supply-chain on 26.04.2020
Retrieved from https://hub.jhu.edu/2020/03/06/covid-19-coronavirus-impacts-
global-supply-chain/ on 26.04.2020
https://www.weforum.org/agenda/2020/04/supply-chains-resilient-covid-19/ on
26.04.2020
Retrieved from https://transportgeography.org on 27.04.2020
Block chain enhanced supply chain - Scientific Figure on Research Gate.
Retrieved from: https://www.researchgate.net/figure/Shift-from-traditional-supply-
chain-to-digital-supply-network-adopted-from-Gaus-Olsen_fig3_331166927 on
27.04.2020
www.ijmer.in 44
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Abstract
In this era of industry 4.0, company ability to adapt with technology is mandatory. One
unavoidable change in marketing related to technology radical development is digital
marketing. Digital marketing plays major role in developing brand of company today.
Digital marketing is considered cheaper and fit to products that are targeted to
millennial. However, a lack of research related to its relationship with brand image
remains. BundaMulia University as a reputable university in Indonesia with target
market of millennial has suffered from the uncertainty. Therefore this research aims to
understand how social media, website and search engine marketing affect the university
brand image.This type of research is associative research that is research conducted to
connect one variable with another variable. The purpose of this study is to find out the
relationship between two or more variables. By utilizing questionnaire as data collection
tool, this research got 180 valid and reliable student respondents. The data had passed
validity, reliability and classic assumption pre-tests, and then it was analyzed by
multiple linear regression method in SPSS. It resulted in fact that social media, website
and search engine marketing simultaneously and partially affect the university brand
image. The positive correlation suggests university to increase their attention on
improving their social media, website and search engine marketing in order to build up
better brand image among their students or customers. The adjusted R square value has
reached up to 77%, which explains that brand image is affected by social media, website
and search engine marketing by 77% and the rest 23% is explained by other variables
out of the proposed mode.
1. INTRODUCTION
Along with technological developments in industry 4.0, internet can no longer
be separated from everyday life. At this era of modern society, many activities are
carried out by utilizing internet technology. One of internet technology implementation
that has been applied in business world is digital marketing. The application of digital
marketing to search engines such as Google, Yahoo, and Baiducan enhance a company's
www.ijmer.in 45
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
brand image. By registering a website on search engines using certain keywords and
good search engine marketing techniques, it is very possible for a website to be more
often found by public compared to other companies and therefore enhance brand image
of the company.
BundaMulia Universityis one of famous Indonesian universities that apply
digital marketing to build up its brand image such asregistering its website on Google,
Yahoo, and Baiduwith the keywordsexample “university”, ”scholarship”, “Jakarta”.
Every search on Google that contains keywords will direct consumer
toBundaMuliaUniversity website so that it can increase the university brand image and
finally it can lead to new student registration. BundaMulia University is a university that
implements digital marketing in its marketing process well. However, the university is
lack of information and research about how significant the effect of digital marketing on
their brand image. While there are many theories support that digital marketing can
increase their brand image, internal marketing department cannot confirm it therefore
research gap occurs.
This research is intended to examine the effect of social media, websites and
search engine marketing simultaneously and partially on brand images of BundaMulia
University. This research can be used as an evaluation and study material for companies
to be able to maintain the success of the digital marketing program in their effort to
attract new students while enhancing brand images in their head. It can also provide
inspiration and references for other relevant studies in digital marketing field.
2. LITERATURE REVIEW
2.1 Digital Marketing
According to Tarigan&Sanjaya (2009), digital marketing is a brand marketing
activity which includesthe use of various web-based media such as blogs, web sites, e-
mails, adwords, or social networking. Digital marketing is more than just term internet
marketing. According to Heidrick&Struggless (2009), the development of digital
marketing through the web, mobile phones, and gaming devices, offers new access to
advertising that is not heralded and it is very influential. Thus marketers should shift
from spending budget on traditional marketing such as TV, radio and print to new
technology and more interactive media such as in digital marketing.There are many
types of digital marketing method along with its own advantages and disadvantages.
Urban (2004) explain that the type of digital marketing exists includes online banner
advertisement, sponsorship, classified listings, email marketing, partnership/affiliate
marketing, search engine marketing, social media and website.
2.2 Brand Image
Kotler& Keller (2009)defined brand image as a set of beliefs, ideas, and
impressions that a person has towards a brand. He further said that brand image is the
perception and belief carried out by consumers, as reflected in the association that
occurs in consumer memory. Brand image is considered as how abrand is perceived by
consumers. Dealing with perceptions, brands can be described through adverb
objectives, or phrases. Kotler& Keller (2009) also said that brand image has two
components, which are brand association and brand personality.Iglesias et al (2019)
www.ijmer.in 46
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
stated that image is reality. Therefore if market communication does not match reality,
normally reality will win. The image will eventually become good, when consumers
have enough experience with the new reality. The new reality is acceptable when
organization works effectively and has good performance. Some benefits that can be
obtained by companies when they have satisfied their customers through the delivery of
quality services are a positive corporate image.
Therefore, consumers' attitudes and actions towards a brand are very much
determined by the brand's image. Kotler& Keller (2009)also added that brand image is a
requirement of a strong brand and image is a relatively consistent perception in the long
run. Building image is not an easy process and once it has been built up, it is difficult to
change it. The developed image must be clear and has an advantage compared to
competitors. When brand differences and advantages are confronted with other brands,
brand positionwill emerge. Thus, basically it is the same as the process of perception,
because image is formed from perceptions that have been formed over time. After going
through the stages that occur in the process of building up perception, then company can
proceed to the stage of consumer involvement. This level of involvement does not only
affect perception, but also affect memory function.
2.3 Digital Marketing and Brand Image
Marketers used social media to build up brand image and communicate brand
related matters to consumers. It is more impactful than traditional broadcast or massage
because people are more willing to read customized information on social media
platform rather than traditional platform (Schulze et al., 2015). The application of e-
marketing such as social media, website ownership and search engine marketing has an
influence on brand image. By using e-marketing, the brand will be easily recognized so
that it will increase the possibility of product purchasing transactions by customers
(Ridho, 2013).
Picture 1. Research Framework
www.ijmer.in 47
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
3. METHOD
This type of research is associative research that is research conducted to
connect one variable with another variable. The purpose of this study is to find out the
relationship between two or more variables. Through this research a theory can be built
that can function to explain, predict, and control a phenomenon. In conducting the
analysis, the authors shared questionaiare to about 223 scholar respondents. A total of
223 respondents were obtained using the Stratified Random Sampling technique with
the population being students at Bunda Mulia University, Jakarta. But after removing
incompleted surveys, 180 valid and reliable questionaires are left. The statistical
methods used by the authors are inferential, parametric, and correlative statistics. This
includes multivariate regression. The required data is obtained based on the formulation
of the problem. The qualitative descriptive method is used for fact finding with the
correct interpretation and the aim is to look for a systematic picture that is used for
accurate fact finding. This type of research is basically to determine what methods will
be used in research, including data collection methods, methods of analysis and
hypothesis testing.
The statistical method used is multiple regression analysis. Multiple regression
analysis is a tool used to predict the effect of two or more independent variables on one
dependent variable to determine whether there is a correlational relationship or causal
relationship between two or more independent variables X1, X2, X3, ........ Xi with
respect to a dependent variable Y.The analysis is used to determine effect caused by the
implementation of Social media, Website, and Search Engine Marketing to increase
Brand Images of Bunda Mulia University.
The multiple linear regression equation is Y = a + b1X1 + b2X2 + B3X3
Where :
Y = Variabel dependen
a = konstanta / intercept
b = koefisien regresi
X1= Social media
X2= Website
X3= Search Engine Marketing
In terms of gender, the authors obtained data that 96 respondents were male
and 84 respondents were female. When they were asked about the most used social
media, 98 respondents most often access Facebook social media, 55 respondents most
www.ijmer.in 48
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
often access Twitter social media, and 27 respondents most often access Instagram
social media. The majority of respondents access Facebook because Facebook is the
first popular social media, while social media Instagram is the least accessed because it
is not popular among their social circles and their smartphone memory is not enough to
save good quality photos. While analyzed from the frequency of respondents' visit to the
Bunda Mulia university website in 1 week, 34 respondents accessed the website
www.ubm.ac.id about 1-3 times a week, 63 respondents accessed the website
www.ubm.ac.id 4 - 6 times in 1 week and 83 respondents access the website
www.ubm.ac.id> 6 times in 1 week. The majority of Bunda Mulia University students
access the website www.ubm.ac.id> 6 times a week, because Bunda Mulia University
useswebsite to provide a lot of information ranging from announcements, schedules,
grades, to the package registration process and seminar.
Reliability Statistics
Cronbach's
Alpha N of Items
.825 11
Source: Developed from data analysis
In accordance with Malhorta (2007) who stated that the statement is declared reliable if
it has a Cronbach’s Alpha> 0.6. Therefore the digital marketing statement item in this
research questionnaire is justified reliable because it has cronbach’s alpha> 0.6.
Item-Total Statistics
Scale Variance Corrected Squared Cronbach's
Scale Mean if if Item Item-Total Multiple Alpha if Item
Item Deleted Deleted Correlation Correlation Deleted
social1 48.34 51.276 .564 .605 .835
social2 48.21 51.125 .558 .628 .835
social3 48.14 52.366 .509 .579 .838
social4 48.19 54.445 .319 .380 .848
web1 47.91 50.350 .597 .483 .832
web2 48.29 51.626 .512 .608 .838
www.ijmer.in 49
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Reliability Statistics
Cronbach's
Alpha Based on
Cronbach's Standardized
Alpha Items N of Items
.849 .848 15
Source: Developed from data analysis
In accordance with Malhorta (2007) who stated that the statement is declared reliable
when it has a Cronbach’s Alpha> 0.6. Therefore the brand images statement item in this
research questionnaire is considered reliable because it has cronbach’s alpha> 0.6.
www.ijmer.in 50
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
In accordance with Naga (2008) who stated that the statement item is considered valid if
it has a Corrected Item - Total Correlation> 0.2. Therefore, the brand images statement
item is considered valid because it has a Corrected Item - Total Correlation value> 0.2.
Coefficientsa
Standardized
Unstandardized Coefficients Coefficients Collinearity Statistics
Model B Std. Error Beta t Sig. Tolerance VIF
1 (Constant) 1.104 .283 3.895 .000
SOCIAL .154 .114 .138 1.355 .177 .389 2.569
WEBSITE .087 .099 .088 .880 .380 .407 2.459
SEO .419 .077 .395 5.437 .000 .764 1.308
a. Dependent Variable: BRAND
Source: Developed from data analysis
Based on table 4.8 above, it can be concluded that multicollinearity does not occur
because VIF <10.
Autocorrelation Test
Table 6. Result of Autocorrelation Test
Model Summaryb
Adjusted R Std. Error of the
Model R R Square Square Estimate Durbin-Watson
1 .531a .282 .270 .57740 1.363
a. Predictors: (Constant), SEO, WEBSITE, SOCIAL
b. Dependent Variable: BRAND
Source: Developed from data analysis
From the test results using SPSS, the Durbin-Watson statistical value is 1.363.
According to Sudarmanto (2005) when Durbin-Watson statistical value approaches
value 2, it can be stated that the observational data does not have autocorrelation. Thus,
it can be concluded in this observation there is no autocorrelation because the Durbin-
Watson statistical value is 1.363.
www.ijmer.in 51
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Heteroscedasticity Test
Picture 2. Scatterplot
Heteroscedasticity occurs when for each value of the independent variable, there are
several scores of dependent variables with different variances. The purpose of the
heteroscedasticity test is to test whether in the regression model. There is an inequality
of variance from the residuals of one observation to another. A good regression model
should not haveheteroscedasticity. Detection of heteroscedasticity can be observed
using scatterplots. Heteroscedasticity does not occur in the data because the points that
are spread randomly without any particular pattern (Nisfianoor 2009).
Normality Test
Picture 3. Normal P-P Plot
www.ijmer.in 52
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
The normal P-P diagram aboveprovides standardized regression plot which illustrates
the existence of points on the scatterplot line proves that the data is normally distributed.
www.ijmer.in 53
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
implementation on Bunda Mulia University brand image if social media and search
engine marketing were controlled with a 95% confidence level.
Search engine marketing and brand image
H3 is accepted for variable search engine marketing, t = 5,437. Sig = 0,000 and
significance <0.05; thusH3 is accepted. Ho was rejected therefore, there was a
significant effect of the implementation of search engine marketing on the brand image
of Bunda Mulia University if social media and website were controlled with a 95%
confidence level.
4.6 F Test
This test aims to determine whether the independent variables simultaneously affect the
dependent variable. The independent variables together are simultaneouslyconsidered to
have a significant effect on the dependent variable if the Sig (P-value) <0.05 at α = 0.05.
Table 9. Result of F Test
Model Summary
Adjusted R Std. Error of the
Model R R Square Square Estimate
1 .831a .782 .770 .57740
a. Predictors: (Constant), SEO, WEBSITE, SOCIAL
Source: Developed from data analysis
The research model works well by adjusted R square value of 77%, which explains that
brand image is affected by social media, website and search engine marketing by 77%
and the rest 23% is explained by other variables out of the proposed mode.
www.ijmer.in 54
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
5. CONCLUSIONAND RECOMMENDATION
The research results in significant and positive effect from social media,
website and search engine marketing to brand image in Bunda Mulia University,
Indonesia. The positive and significant correlation occurs both partially and
simultaneously. The research model is proven works out well since adjusted R square
value has reached up to 77%, which explains that brand image is affected by social
media, website and search engine marketing by 77% and the rest 23% is explained by
other variables out of the proposed mode. It however gives conclusive explaination that
universities need to pay attention on their social media, website and search engine when
they need to build up positive brand image. When university performs digital marketing
better, more positive brand image can be achieved. Many universities in Indonesia is
still lack of attention to their digital marketing and therefore their social media account
and website are so conventional and very often found that universities don’t provide
updated materials on the website, SEO is also key to build up brand image in consumer
mindset. Getting easier people find the website in search engine, getting better the brand
image will be achieved.
Future researcher is expected to figure out other variables that contribute to
brand image of education institution such as university. Another suggestion for future
research is to expand the use of this research model accross industry to figure out the
effect of digital marketing implementation on brand image. Application accross
popoulation and country is also suggested because different culture can create different
result and each country has its own population charateristic, there could be another
factor such as internet use and speed that can affects the result, for instance in country
like Cambodia where most of the universities still conduct their registration and
promotion offline, the people may not really care about website and emphasizes on
word of mouth marketing, traditional newspaper and referalls to judge brand image of a
university.
REFERENCES
Heidrick&Struggless. (2009). Digital Marketing: Past Trends and Future Prospects.
Iglesias, O., Markovic, S., Singh, J. J., & Sierra, V. (2019). Do customer perceptions of corporate
services brand ethicality improve brand equity? Considering the roles of brand heritage,
brand image, and recognition benefits. Journal of Business Ethics, 154(2), 441-459.
Kotler, P dan Keller, K.L. (2009).ManajemenPemasaran. Edisike 12. Jakarta: Erlangga
Malhotra, N, (2007), Marketing Research. Pearson Education, Prentice-Hall Inc. New Jersey.
Naga, D. S. (2008).ProbabilitasdanSkorpadaHipotesisStatistika. Jakarta: UPT
PenerbitanUniversitasTarumanegara.
Nifsiannoor, M. (2009).PendekatanStatistika Modern. Jakarta: SalembaHumanika.
Ridho, M. R. (2013). Pengaruh E-Marketing Terhadap Citra Merek Nay@ Dam PadaPtKreasi
Putra Serayu. Computer Based Information System Journal, 1(1).
Schulze, C., Schöler, L. and Skiera, B. (2015). Customizing social media marketing.MIT Sloan
Management Review. Vol. 56, No. 2, pp.8–10.
Sudarmanto.(2005). AnalisisRegresi Linier Gandadengan SPSS. Yogyakarta: GrahaIlmu
Tarigan, J., Purbo, O., &Sanjaya, R. (2010). Business-Driven Information System.Elex Media
Komputindo.
Urban.(2004). American Marketing Association.Columbus: McGraw Hill
www.ijmer.in 55
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Abstract
In the new era of globalization science and technology development cause a lot of
changes in many fields including the form of popular online video games among the
children. The traditional games that are famous formerly have been replaced by the
modern games like online video game. This paper examined that which are the main
attributes which influence the consumers/children to play the online video games having
age of less than 15 years. The final goal of the study is to understand the behaviour of
children after playing video games. In previous study it has been observed that video
game industry has surprised both the music and video industry as it captures the highest
share of market. This study reveal that students play video games online due to peers’
pressure; and online video games are liked because they are considered more modern,
practical, realistic and varied but subsequently, they are becoming addicted, and reach a
condition that they find it difficult to stop playing games. This condition will directly
affect their progress and behaviour. The purpose of doing this research is to compare the
attitude and preference of children towards different video. The research suggests that it
is necessary to activate the patterns of social communication networks such as friendly
footing, taking more responsibilities, and highlighting social life to diminish game
addiction.
Keywords: Effect, Video Games, Social, Communication, Footing And Attitude Etc.
INTRODUCTION:
Children spend a huge time in online video games, which have positive and negative
effects on children’s behaviour. for example, when we talk about the positive skills and
abilities and negative consequences that are there on the online gaming. in today’s
scenario. Today in every house children spend most of the time in playing video games
on the internet or on console or Xbox, Wi-Fi , PlayStation and similar other electronic
gadgets and devices. Earlier it was thought that video games are entertainment and
sometimes educational for the children, as per what parents shared. The people who are
in favor of online gaming say that it has helped control diseases, manage
disappointment and depression, improve dead eyesight and other neurological and
physiological processes. There had been negative impact as well on the children because
these games on making this generation to violent because they play the games that do
use lot of violence in combating, further leading to social isolation anxiety, Distraction
from studies and lack of patience
www.ijmer.in 56
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Video games become most popular entertainments in today’s time period. They target
adults and they are engage in games for their entertainment and time pass. They engage
their self so much in games which make them separate from the society and their
surroundings. Online Video games also play positive role in making children smarter in
thinking higher level things while playing the games. Sometimes online gaming also
play negative role in life of children as it makes them aggressive . Nowadays students
play the video games to reduce boredom , for enjoyment and to make them alone from
their surroundings. In today’s time students are so much attracted towards video games
because parents and authorities did not have a well planned for students leisure time so
that’s why students are getting engaged in video games.
They also become lazy because they don’t have any physical work to do. Playing video
games up to some extent can be useful but playing long term leads to physical and
mental problems in the students, pressure of completing the level fatly to be at the top of
the score board. It makes nervous system of the body sensitive and it also creates
anxiety symptoms in the player. Development of these video games may prove a threat
for youth . In traditional scenario children play with other children for their enjoyment
but in the modern scenario children only play video game they do not have any type of
face to face interaction with the children. The increasing craze of video games among
children made many researchers to do research on the positive and negative effects of
these games on children. Online games are one of the way for students to learn
something new .In the last few years it has been seen that there is rise in the online
games. Online games have become one of the paths to motivate the students for doing
their work in a better way.
Internet plays an important role in developing person’s mind by creating or innovating
productive works. In today’s time period internet become the effective and efficient tool
to enhance themselves and updating the according to upcoming new technologies. No
doubt those students are learning more from the internet but it will make the students
away from the curricular activities held in the school and society.
It is observed and believed that the people who are engaged so much in games are so
much addicted to the online video games. Existing studies shows that craze of online
video games among adults have highly negative affect on the health of the them it also
affects the studies of adults. They are also suffering from the psychological issues.
There are mostly negative effects in comparison of positive effects of addicted to online
video games. It is said that addiction to anything is harmful for health. Online video
game also plays an important role in grooming of the children and through internet
students also become updated with the new and upcoming technologies in the market
but regular and permanent usage of internet make the children lazy. It also affects the
education and life style of the children. But many people play the game for their
entertainment and to reduce the tension. There is a correlated relationship between the
online video game and the aggressiveness.
some online video games are educational these educational games help the children to
increase their motivation level, communication skills, improve their concentration level
through playing these educational games students can easily achieve their goals, task
and objectives in their real life also. Their learning skills and problem skills were gets
improved. It helps them to take their decision in a right way. Their decision was proved
www.ijmer.in 57
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
to be effective and efficient. Playing video games also improves reaction times and
visual skills.
But nowadays to decrease the negative effects of violent video games on the behavior of
children owners restricts the age limit of games the 18 plus age students can only play
some games.
In today’s time period government of India take measures to reduce aggressiveness,
violence among the students which force them up to the limit of committing suicide,
murders and not obeying their parents.
Online video games have affected the society in negative aspects. After coming of the
online video games children are not aware about the traditional games if they are aware
they were playing those games on their mobile phones, laptops etc. Modern video
games have replaced the traditional games and make the children to play the games
online and which decreases the interaction of one child with another one. It also the cuts
the social link of the children with the society because he/ she gets so much engaged in
the games and think of winning the game every time and reach on the higher or next
level.
It has been seen that there are positives as well as negative when we talk about online
gaming and it’s effect on the behaviour of children. There are both positive skills and
abilities and negative consequences that are there on the online gaming in today’s
scenario
REVIEW OF LITERATURE
Geithner, S., & Menzel, D. (2016). “Attention to the potential effects that technology
has on health, education, and society. Parents to pay attention on what kind of games
their children are playing”.
Fu, K., Hainey, T., & Baxter, G. (2016). “said youth is moving towards online video
games are on trial and the case has been given to the Supreme Court for the further
proceedings”.
DePorres, D., & Livingston, R. E. (2016). “The Relationship between Internet and
Computer Game Addiction Level and told about the positive and negative effects of
computer games”.
Crocco, F., Offenholley, K., & Hernandez, C. (2016) “he talks about the changing
behavior of children”
Carenys, J., & Moya, S. (2016) “He speaks about the effect of changing technology in
the market on the online video games”.
Angelini, M. L. (2016) “He talks about the Age and Violent-Content Labels which
Make Video Games Forbidden Fruits for Youth”.
Adams, D. M., Pilegard, C., & Mayer, R. E. (2016) “talks about the Effects of violent
videogames on aggressive behavior, aggressive cognition, aggressive affect,
physiological arousal, and pro social behavior”.
Clark, D. B., Tanner-Smith, E. E., & Killingsworth, S. S. (2015) “said that Video games
and aggressive thoughts, feelings, and behavior in the life”.
Chen, C. H., Wang, K. C., & Lin, Y. H. (2015). “said about the violence of video games
on the behavior of children. Aggression and Violent Behavior”
Beuk, F. (2015). “talks about the separation of children from the society”.
Badea, M. (2015).“talks about does video game use grow children's aggressiveness”.
www.ijmer.in 58
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Bolliger, D. U., Mills, D., White, J., &Kohyama, M. (2015) “Talks about the
relationships between video game play and aggressiveness”.
Thursten,C.(2015) “talks about the relationships with aggressive and prosaically
behavior”.
Ariffin, M., Oxley, A., &Sulaiman, S. (2014). “Talks about effect of video Games on
educational skills. talks about the language learning through computer games”.
Shariarpour N., Kafi Z., (2014) “Said that video games are used for teaching the
students”.
Ashraf, H., Motlagh, F.G., Salami, M. (2014) “Talks about the Computer-assisted
language learning”.
SCOPE OF THE STUDY
Main purpose of doing the study is concerned with impacts of online video games on
the behaviour of children. This study will help the readers to understand the positive and
negative effects of online video games. This study tells us about what children are
perceiving what is video game and what parents perceive that the children are doing.
OBJECTIVES OF THE STUDY
To Understand the Effect of Online Video Gaming on Behavior of Children
To know perception of children towards online video games.
RESEARCH METHODOLOGY
It is defined as a process where a researcher collects information and relevant data for
the purpose of research and if talk about business scenario then it is a key which helps in
taking business decisions. It can comprise of both past and current information. It
includes all the methods and techniques used such as surveys, personal interviews and
work of various publications.
Descriptive and Exploratory research design is adopted in this study.
Sampling
It can be defined as a process wherein a limited number of people are chosen or selected
from a large population and those limited ones represent and consist of all the
characteristics of the population.
sample size: 100
Population: parents whose children are involving in playing video games.
Type of sampling:
Sampling can be of two types –
Random and Non Random sampling.
Random sampling – Every item of the universe has equal chance of getting selected
Non-random sampling- Selection is done as per the choice and convenience of the
researcher.
Convenience and judgement sampling are used in this study
Sample area: Faridabad
Method of data collection
There are two methods of data collection which are primary and secondary.
www.ijmer.in 59
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Primary method includes data collected by researcher himself in the form of survey.
Secondary method includes data is someone else’s data collected by researcher for
reference purpose.
In this study primary data is used for research purpose.
Statistical tool : Correlation
Research method: survey method( questionnaire)
Hypothesis
Ho(null hypothesis)- There is no significant effect of online video games on
children.
Ha( alternate hypothesis)- is significant effect of online video games on children.
No 3
INTERPRETATION: From the above figure, it has been found that the majority of the
respondents were aware about the increasing rise in inline games and only 3 percent of
respondents were not aware.
2 . Do you think children are not aware about the overall effects of online gaming?
Agree 43
Strongly agree 37
Neutral 13
Disagree 7
www.ijmer.in 60
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
INTERPRETATION: From the above figure, it has been found that majority of the
respondents were agree that the children are not aware about the overall effect of online
gaming.
Agree 46
Strongly agree 24
Neutral 18
Disagree 12
INTERPRETATION: From the above figure, it has been seen that the majority of the
respondents were agreed that digitalization is the major cause towards online gaming
and the rest were strongly agree neutral some were disagree.
4.Do children perceive that online gaming is trendy?
Agree 55
Strongly agree 31
Neutral 10
Disagree 04
www.ijmer.in 61
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
INTERPRETATION: From the above figures, it has been observed that the majority of
the respondents were agreed that online gaming is trendy and rest of the respondents
were strongly agreed neutral and disagree.
5. Marketers of online gaming have been responsible for unlimited options?
Agree 53
Strongly agree 24
Neutral 19
Disagree 04
INTREPRETATION:From the above figures it has been observed that the majority of
the respondents are agree that the marketers are responsible for unlimited options of
online gaming.
6. online gaming on mobile is more attractive as compared to computer gaming?
Yes 74
No 14
None 3
Can’t say 9
www.ijmer.in 62
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
INTERPRETATION: From the above figures and graphs it has been seen that majority
of the parents say yes that the playing games on mobile is more attractive than the
computer gaming.
7. perception of your children towards online gaming is influenced by peer group?
Yes 72
No 27
Can’t say 1
INTERPRETATION: From the above figures, it has been seen that the majority of the
respondents say that perception of the children is perceived by the peer group.
8. Parents and family has effect on perception of children about online gaming?
Agree 57.6
Strongly agree 20.2
Neutral 14.1
Disagree 8.1
www.ijmer.in 63
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
INTERPRETATION: From the above graphs and data it has been found that the
majority of the respondents are agree that the family has an effect of the perception of
children.
9. what are the positive effects on behaviour of children for online games ?
Hand eye coordination 21.8
Concentration level 33.7
Critical thinking 44.6
INTERPRETATION :From the above data it has been seen that most of the parents are
saying that critical thinking is increased through online gaming.
10. what are the negative effects on behaviour of children for online games?
Aggressiveness 24
Violent 27
Social isolation 41
Depression 8
www.ijmer.in 64
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
INTERPRETATION: From the above data and graphs it has been observed that the
children are getting social isolated.
11. should online gaming has governmental controls?
Yes 48
No 23
Can’t say 29
INTREPRETATION: Most of the parents says that the online gaming has governmental
controls also.
12. Age group
25-30 36
30-35 26
35-40 23
40-45 15
www.ijmer.in 65
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
INTERPRETATION: From the above it is analyzed that there are different categories of
children, so it all depends upon the taste and preferences of the different group of
children in society.
13. Gender
Male 51
Female 49
INTERPRETATION:It has been analyzed that the preference of games and online
games are most popular in male as compare to female children in society.
www.ijmer.in 66
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
After conducting the study, the researchers would like to have more government control
steps towards online video games to control the negative effects of games on their
children.
LIMITATIONS
CONCLUSION
The online video games are now heavily played by the children these days and therefore
the number of marketers are increasing considerably in online video games industry.
The research is focused on understanding the effect on the behaviour of children in
Faridabad city.According to the survey, parents observed that children are very much
engaged in playing video games and getting away from the society and becomes
aggressive.From the survey it has clear that children are more influenced by the online
video games and they purchased many playstations for playing video games .It is
found from the research that children make a habit of playing the video games on a
regular basis because they are not aware about the traditional games.
Finally the objective of the study has been achieved and it has been seen that video
games has become a Fashion for the children, either some play it as a source of
entertainment and some play it as a source of learning. So that it is concluded that now-
a-days online video games has the negative effect on the behaviour of children.
REFERENCES
www.ijmer.in 67
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Dr. K.K.Gomathi
Assistant Professor,PG & Research Department of Commerce,
Gobi Arts & Science College,Gobichettipalayam, Erode Dt., Tamil Nadu
Abstract
Consumers’ buying behaviour is changing day by day worldwide. In this view,
demand of the organic products is increased gradually. Organic products are made from
materials produced by organic agriculture, i.e., organic products refer to products that
are grown on the farm without the application of synthetic fertilizers or pesticides and
without using genetically modified organisms. Health, more nutrition, safer, animal
welfare, environmental friendly, perceived product quality, taste etc. are some factors
influencing the consumers to prefer the organic food products. Against this background,
the present study is an attempt to understand the factors influencing consumers to prefer
organic food products through existing research studies which are conducted on organic
food products.
INTRODUCTION
www.ijmer.in 68
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Based on the literature review, the specific objective of the present study is as
follows:
1. To study various research aspect widespread in the ground of factors
influencing consumers to prefer organic food products.
Most of the consumers have started to purchase the organic products instead of
conventional product because of so many factors. Most important factor has been
identified through a broad review of earlier studies.
Padmathy and Saraswathy (2016) conducted a study on consumers’ buying
behaviour towards organic food products. This study was based on primary data. The
required primary data have been collected from 175 sample respondents through
questionnaire. Such collected data have been analysed with the help of statistical tools
like percentage and chi-square test. It is concluded that consumers have positive
behaviour towards purchasing organic food products, when it comes to actual purchase,
price, environmental concerns and quality are still the key factors influencing their
purchase decisions.
Uma and Selvam (2016) conducted a study on awareness among consumers
towards organic food products. This study was based on primary data. The required
primary data have been collected from 200 sample respondents by using convenience
sampling through questionnaire. Such collected data have been analysed by using
statistical tools like percentage and chi-square test. It is concluded that organic food
consumption is increasing due to environmental and health concerns associated with
food products. As consumer awareness on organic food products and trust are increasing
the most effective way for raising the market share.
Konda Kalyani (2017) conducted a study on consumer perception towards
organic food products. This study was based on primary data. The required primary
data have been collected from 50 sample respondents by using simple random sampling
technique through questionnaire. Such collected data have been analysed with the help
of Microsoft excel by using bar diagrams, pie charts etc. It is found that most of the
respondents relied that organic products are grown using natural methods, have health
www.ijmer.in 69
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
benefits and better taste and most of the respondents are agree that organic food is
expensive and price should match quality.
Pardeep Kumar and Hema Gulati (2017) conducted a study on consumer’s
perception towards organic food products. This study was based on both primary data
and secondary data. The required primary data have been collected from 110 sample
respondents by using stratified random sampling technique and the secondary data have
been collected from published books, reports, journals, magazines and internet. Such
collected data have been analysed with the help of statistical tool percentage and charts.
It is found that rural respondents are facing lot of problems while purchasing organic
products in the markets. Organic products are not easily available in the rural area and
limited varieties are available.
Abisha and Kannan (2018) conducted a study on consumer awareness and
satisfaction towards organic products. This study was based on both primary and
secondary data. The required primary data have been collected from 680 sample
respondents by using stratified random sampling method. It is found that most of the
sample respondents are satisfied because of taste and quality of organic products. Lack
of awareness is the main problem faced by the organic consumers. Further, it is
concluded that majority consumers were awake to organic food, its edges and issues
related to conventional food.
Akankshya Patnaik (2018) made a study on consumer perception towards
organic food. This study was based on primary data. The required primary data have
been collected from 60 sample customers and from 10 sales persons of retail outlet
through structured questionnaire. Such collected data have been analysed with the help
of statistical tools like percentage, charts and five point likert scale. It is found that
consumers mostly perceive organic products as eco-friendly and healthier and they
agree that organic food products are superior in quality.
Padmaja and Nikhil Parashar (2018) conducted a study on consumer buying
behaviour towards organic food product. This study was based on primary data. The
required primary data have been collected from 100 sample respondents by using non
probability sampling through questionnaire. Such collected data have been analysed
with the help of statistical tools like percentage, chi-square test and SPSS. It is found
that healthy and nutritious are the reasons for purchasing organic food products and
majority of the consumers felt that organic products are too expensive and majority of
the sample respondents says that television advertisement and other marketing media
helps in creating awareness about organic products.
Galina Mladenova (2019) made a study on motives affecting consumer
attitudes and consumption of organic foods. This study was based on primary data. The
required primary data have been collected from 1600 sample respondents through
personal interview and from 800 sample respondents from online survey. Such collected
data have been analysed with the help of statistical tool percentage. It is found that
majority of the sample respondents are agree the organic food are tastier and healthier
than conventional food and also agree the price of organic food are unreasonably high.
Mania and Nedumaran (2019) made a study on consumer perception and swot
analysis of organic food products. This study was based on both primary and secondary
data. The required primary data have been collected from 100 sample respondents
www.ijmer.in 70
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
through questionnaire and secondary data have been collected from various journals,
articles, magazines etc. Such collected data have been analysed with the help of
statistical tools percentage and chi-square test. It is found that there is a significant
relationship between educational qualification and level of buying behaviour of organic
food products and majority of the consumers’ perception had been nutritional value
towards the usage of organic food products in Rajapalayam Taluk.
Jeyalakshmi and Arthi (2020) made a study on consumers awareness towards
organic food products. This study was based on both primary data and secondary data.
The required primary data have been collected from 100 sample respondents through
questionnaire and the secondary data have been collected through various journals
magazines etc. Such collected data have been analysed with the help of statistical tools
percentage and chi-square test. They found that there is huge gap between the
agriculture and consumer awareness and most of the sample respondents came to know
about Organic foods through doctors or professionals. Further, it is concluded that
consumer awareness plays a vital role in determining the buying behavioural aspect for
selecting organic food.
Kavitha (2020) conducted a study on organic consumers’ awareness and
attitude of organic vegetables. This study was based on primary data. The required
primary data have been collected from 160 sample respondents by using convenient
sampling method through questionnaire. Such collected data have been analysed with
the help of statistical tools like percentage garret ranking technique and correlation. It
is found that consumers are getting awareness about the organic product through
neighbours. Further, it is suggested that the seller’s duty is not only selling the products,
it is their duty to convey the buyers’ requirement and market information to the
producers. In this regard the organic products seller has to give adequate information to
the farmers.
Khushleen Kaur (2020) made a study on consumers’ attitude and behaviour
towards organic products. This study was based on both primary data and secondary
data. The required primary data have been collected from 100 sample respondents by
using questionnaire and the secondary data have been collected from various books,
reports, journals, magazines and internet. Such collected data have been analysed with
the help of statistical tool percentage. It is found that information and wakefulness
about the products which are organic in nature can affect viewpoint about the product
and eventually, purchasing decisions of the consumers. Further, the quality uniqueness
affects consumers’ preferences for organic products.
Marin Cagalj et al. (2020) made a study on consumer preferences towards
organic food in the market. This study was based on primary data. The required
primary data have been collected from 113 respondents through questionnaire. Such
collected data have been analysed with the help of statistical tools like percentage and
Likert five point scale. It is found that when consumers purchasing organic food with the
greatest importance of protection of the environment and at the least importance are
they retain the taste. The most significant constraint on purchasing organic food of
surveyed consumers is the high cost of the product.
Nethra and Rathina Prabha (2020) conducted a study on consumer attitude
towards organic food products. This study was based on both primary and secondary
www.ijmer.in 71
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
data. The required primary data have been collected from 100 sample respondents
through questionnaire and secondary data have been collected from journals, magazines,
websites and articles. Such collected data have been analysed with the help of statistical
tools percentage and chi-square test. It is found that more trust and long life are the
important factors influencing purchasing of organic food products and less varieties is
the main problem faced by sample respondent while purchasing organic food products.
Further, it is concluded that consumer attitude plays a vital role in determining the
buying behavioural aspect for selecting organic food products.
Sivasankari and Jothi (2020) conducted a study on consumers buying
behaviour towards organic food products. This study was based on both primary data
and secondary data. The required primary data have been collected from 90 sample
respondents by using convenience sampling method through structure questionnaire.
The secondary data have been collected from various published books, reports, journals,
magazines and internet. Such collected data have been analysed with the help of
statistical tools like Percentage, Chi-square and Weighted Average method. It is found
that Quality is the most influencing factor in buying organic food products.
REFERENCES
www.ijmer.in 72
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 73
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
The main process of license verification and validation is a difficult task for the
government to monitoring because of the population is the major factor to be consider.
As a result, shows the number of vehicles are growing by his, her, their, etc. increasing
the problem of license registration, license issue and transfer that requires a lot of work.
Similarly, people are make some licensed based crimes and regulates traffic rules. This
kind of problem can occur in day today life, but it does not contain any proper records
also. This project can be approaching to solve such problems that store the information
about the related license owner at database. Especially now when the mobile
communication technology is developed quickly. Most of the people have their android
mobile and easy to take anywhere which contain internet facility also. By the android
application is provided to cops to retrieve license information.
INTRODUCTION:
In the current scenario the key issue faced by commuters while travelling is to
deal with inefficiency and discrepancy in the traffic systems and people are involved in
managing same. If any commuters caught by police, they have to submit the driving
license and other documentation for the verification.If the commuters are forgot to bring
their license. So, they can be fined. In the road sides are many traffic violations can be
occurred by the any commuters. But it does not contain any proper records also. So,
that traffic violation can be raised in our country.Even traffic police also don’t know
about the statistics for the traffic violations. In case vehicle has been stolen the vehicle-
owner has to complaint by nearest police station. So, the process of complaint and
subsequent response will be slow. By the todays age of science and technology, where
the internet is in the palm of everyone hand.So, the better system can be used for
managing above process can be setup which could be reduce the traffic violations and
we can insure the proper rule for the commuters.To verify a license details of a person,
cops no need to cross-check the person, they can simply enter their driving license
number in their android device to communicate with the web server. So, that he can
grab the user’s details with a second with whole information including their photo. In
the android application we added provision to track stolen vehicle. If the vehicle owner
informs to cops, they can be updated the stolen vehicle status. Then it will be forward to
all the cops they will be find out easily by using the application. In order of using these
processes most of the road side crimes can the avoided, and we can insure a proper rule
www.ijmer.in 74
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
for the vehicle users. This can be applicable for all kind of drivers throughout India and
all kind of vehicles.
LITERATURE SURVEY:
The formation and enhancement of the license system is necessary requirement for
peoples, especially now when the mobile communication technology is developed
quickly. In this paper which considering the android mobile phone for license
system to verify the license they can simply enter their driving license number in
their android device to communicate with the web server, they can get the license
information. Now the population is major factor to be considered. As a result,
shows number of vehicles are increased and traffic violation also increased. In the
existing system they can check only person license information, but they don't
know the how manytimes he made traffic violation and road crimes. So,that we
developed android application system manages the punishment data for the
multiple person of various date and time. If the person can be punished for traffic
violation or road crimes, then cops can add punishment star in license that should
be updated.In order to verify a license details of a person cops no need to cross
check the person, they can simply enter their driving license number in their
android device to communicate with the web server. So that he can grab the user’s
details with a second with whole information including their photo. If cops can be
seen the person got above the five stars in license means, then person license
should be cancelled. In the android application we added provision to track stolen
vehicle. If the vehicle owner informs to cops, they can be updated the stolen
vehicle status. Then it will be forward to all the cops they will be find out easily by
using the application. In order of using this process most of the road side crimes
can the avoided and we can able to insure a proper rule for the vehicle users. This
can be applicable for all kind of drivers throughout India and all kind of vehicles.
SYSTEM MODEL:
The following architecture diagram explains the overall process of this project here the
larger system decomposed in to subsystems. That provides some related set of services.
Through the android phones and the requires internet for the data transfer. In the
architecture new applier can be submit the document to admin. then the information is
stored in the database. Then the admin can create the user has inspector and constables
and their information also stored in the centralized databases. On client side an android
application will be provided to both commuters and police. Then inspector or any higher
officer can be logging into system can retrieve license information form databases. If
the commuters made any traffic violations or any crimes the inspector or any higher
officer can update punishment in the license, then it will be stored in centralized
databases. Then we can able to check statistics of station and police.
www.ijmer.in 75
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
IMPLEMETATION:
MODULE IMPLEMENTATION
License server
This is the initial module of this project. This will work after validating the
license to the user. Here a license details will be created for user and even a card will be
issued to a new user. All the basic information of the user will be issued here like their
date of issue, driving for two wheelers or four wheelers or for heavy vehicles. While
issuing the card there will be no punishment details updated.
Centralizing the data
This is most important module in this project; this is because the updating details
will be stored in the centralized server and the sub servers. A prior admin will be
allocated to access these details. They will be permitted to update the details too. All the
centralized details will be available in the web server so that user or admin can able to
access the server anywhere at any time. There will be more security provided to the
centralized server and high bandwidth will be allocated to access more number of users
at a same time.
User Rights
Here 2 types of users are available; these users are decided by the admin.
Viewer (Police and Constables) and Updates (Inspectors or Higher officials)
The viewer will be the lower officials, so that using their android devices they can able
to view the details of the license holder. The responsibility of these users will be less. So
that in case of any criminal activates done by the license holder that details can be
viewed by the police constable and they will be produces in the police station.The
higher officials will have an individual login for viewing the license details. So that
using this login higher officials can able to apply punishments to the license holder, and
one applied punishment cannot be removed even by the admin.
www.ijmer.in 76
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Information Warehouse
A special server will design to store all this confidential information as well as
prior security will be provided by the system admin. User will be permitted to access
any details from the card; they are simply the card holders. The accessing agents are the
admin here. That detail too will be stored in the centralized server.
Admin plays a most important role here, Admin having a special login to access
the license card from the user. Here the data will be mine according to the admin role. In
case of a police man they can mine the license and other information relevant to license.
And even they can able to update the black marks for the users. In can accessing other
policeman in some other area, he can able to see the black mark updated by the other
admin.
This module deals with user. User can update their vehicle theft information. The
updated information will be shared to all inspector and constable’s login. So, they can
take necessary steps to capture the theft vehicles.
CREATE LLR:
To get permanent driving license first we need register for the learner license
registration which allow you to learn driving with an experienced instructor on Indian
roads. To get LLR where client need to fill registration. In the registration client need
give total information about his/her to make records.
LOGIN
The system provides protection of information through the mechanism of the id and
password. Therefore, only authorized people can be access the database. After the
registration process can be done successfully. User can login with his/her unique id and
password.
ADMIN
After the registration can be done successfully, admin can be login the system by using
unique id and password. then admin can be able to create the license for the user by
giving his/her details. Even admin can able to create the user has inspector and
constables by his/her details for license verification and validation.
www.ijmer.in 77
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Create constable
Create inspector
www.ijmer.in 78
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
INSPECTOR:
After the admin can create the inspector by his/her details then it will generate unique id
and password for inspector to their system login. If they get their unique id and
password they can be login and check the commuters license and also update the
punishment that can be stored in the databases.
CONSTABLE:
After the admin can create the constable by his/her details then it will generate unique id
and password for inspector to their system login. If they get their unique id and
password, they can be login and check the commuters license and also updated the
stolen vehicle status.
USER VIEW:
In the process user can be seen the license by using android application by entering
his/her license number and details. Because if user can have made any road crimes then
the inspector or higher officer updates the punishment in the user license that should be
viewed by user.
CONCLUSION:
This project is done according to the committed concepts. And followed all
the valid implementation methods and testing methods. Our mission in this project
is to develop a highly deliverable output. This is an ideal implementation of the
Single Responsibility Principle (SRP). Furthermore, by careful application of
abstractions can reduce dependency on concrete classes and increase the
expansibility and reliability of our Android applications. Thus, this project was
successfully completed and satisfied all the needs from the requirement.
REFERENCES:
www.ijmer.in 79
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 80
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
ABSTRACT:
Pink bus is a smart public transport bus which will provide the customer more safety
and smart option to make the travelling experience more reliable, a user-friendly
dependable system. Compared to the ordinary public transportation system. Women’s
Safety in Public Transport is one of the key challenges across the world. Pink bus
address this problem by concentrate on providing safety inside the vehicles, ensure the
safety of women from origin to destination, Safe and accessible First and Last Mile
Connectivity, Safe Passengers Facilities, Bus stops , Safe Boarding and Alighting,
Safety inside the vehicle. Ordinary public transport uses the outdated technology of
paper ticket machine which have many disadvantages like Outdated Technology, high
unskilled employment etc. Pink bus as a smarter transport system will solve this
problem through Smart Bus Fare Collection System implemented by RFID card. This
system is user friendly , which will automatically identify the passenger and deduct the
passenger’s fare according to the distance travelled. Compared to the paper-based
ticketing system using of RFID cards are more convenient and reusable. Crime
concentrates and is potentially specialized within and around the public transport system
are increasing at immense rate. Pink bus is a secured public transport system which will
give the law enforcement more control over the ordinary public transport system. It also
enables the law enforcement to prevent the use of public transport as a tool to achieve
coordinated criminal activities. Various sensors implemented on the transport will make
the pink bus more accessible when they are in dangerous situation like accident, over
speed uncontrollable situation etc. This project “PINK BUS” is designed with the hope
that it is very much economical and helpful for passengers and as well as conductors
during Journey.
I.INTRODUCTION
In recent times, acts of assault and violence against women are increasing at a menacing
rate. With increasing percentage of female employees in industries and other sectors of
the commercial market, now it is becoming a necessity for females to travel at late hours
and visit distant and isolated locations as a part of their assigned duties. However, the
exponential increase in assault, violence and attacks against women in the public
transportation, is posing a threat to the growth and development of
women.Sexualharassmentagainst
womeninpublictransportreportedtopoliceup160%inaYear. Around 315 cases of “insult to
modesty of women” (under section 509 of the IPC) in public transport were reported in
www.ijmer.in 81
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
2015 an increase of 160% over the preceding year, according to government data.Up to
57% of these cases were registered in the southern state of Telangana, followed by
Maharashtra (28), Andhra Pradesh (24), Delhi (19) and Assam (14).New Delhi, along
with Brazil’s Sao Paulo, ranked as the worst megacity for sexual violence and
harassment of women, according to a poll released by Thomson Reuters Foundation on
October 16, 2017.Rape cases reported in Delhi more than tripled over the last five years,
registering an increase of 277% from 572 in 2011 to 2,155 in 2016, IndiaSpend reported
on July 8, 2017. So Defence isn't the only measure that can suffice against this
increasing abuse. We propose a prevention method smart public transport buswhich will
provide the customer more safety and smart option to make the travelling experience
more reliable, a user-friendly dependable system. So precaution can be arranged to
eliminate such threat before it could happen. We also provide a defensive method for
female customers in dangerous situations when they face real time harassments during
their travel which is a simple push button, which will alert the law enforcement through
a SOS message.
Fig: Details of abuse against women during travelling in the years of 2014 and 2015
Pink bus is a secure smart public transport system, which help women to travel safe at
any time any where. Some of our features are implemented in many of the developed
countries with the help of its nation. However, in our country, littering is a norm.
Authorities encourage women safety and empowerment but they could not take any
lukewarm responses. Our main motivation for creating the proposed project PINK BUS
is to provide a smart and secure transport facilities mainly focus on female passengers.
In our country, we have already existing public transport system which have many
drawbacks. Our project addresses various features to avoid these problems. Pink bus is a
simple public transport which will provide user friendly experience and security for
customer while their time in travelling. At present we have bus pass for the convenience
of the passengers issued by the transport corporation and have zero percentage of
security foe consumers. The bus pass is issued for one month and the procedure for bus
www.ijmer.in 82
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
pass renewal is manual. The passengers should wait for long time queues to get a
monthly bus pass, which is very time consuming. The limitations of existing system are
manual process, which time consuming and the passengers should wait in long lines.
[1]A security solution which creates a sense of safety among women needs to be
devised. In instance of attack, it is largely reported that women are helpless. There is
thus, a need of simplesafety solution that can be activated simply by pressing a switch
and can instantly send out alert message to the near ones of the victim. The objective of
research work is to create a safety system in the form of a portable safety device for
women, which does the following tasks: Alerts family, police and gives location of the
woman being attacked. Captures, stores and streams image/video of the real time
scenario to maintain a proof for legal actions. Incorporates an on-the-spot defensive
mechanism by giving a mild electric shock to the attacker.The wearable section consists
of a switch which is to be triggered manually by a woman, in instance of an attack. This
switch triggers the shock mechanism and the on-body controller. The controller has a
combined camera and audio module attached to it (in the form of a combinational and
compact accessory such as a webcam). Along with the webcam, an RF module is
interfaced with the controller to trigger the in-bag unit.The portable in-bag unit consists
of a controller interfaced with an RF module, a GPS module and a GSM modem. The
portable unit will activate only after receiving a wireless trigger from the wearable unit.
Such a distribution of the hardware as wearable and portable was done to reduce the
total wearable weight and divide the different processes between two sections resulting
in faster simultaneous functioning.
[2]The device are used to learn the individual pattern of temperature and heartbeat,then
it find out the threshold for generating alarm. It design deals to a wearable women
safety device that automatically read and create patterns of body temperature and pulse
rate during running. If readings are higher than the normal readings then it will
automatically call and message more than one person along with the location so that
actions can be taken. It used temperature and pulse sensors which will detect the activity
of the woman and the data from the sensors will be sent to cloud where machine
learning algorithm is applied to analyse the data generated. Initially the data is collected
by sensors in non-danger conditions to train the algorithm, after that data is used for
testing to find out the accuracy and how close it is to our trained data. More accuracy
gets more surety of danger and the emergency alarm will be there on emergency
contacts. Finally,deals with scenarios where there is no internet facility. To overcome
this problem of internet we have used ZigBee mesh network, which helped the device to
send the data to multiple hop distance.
www.ijmer.in 83
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
total system acts to bring out the consistency among various bus agencies for conclude a
uniform access for passengers for their daily travels through an automated server which
is updated every single time, when passengers travel by carrying their RFID based
tickets.
[4]Vehicle accidents cause lot of damage. Detection and timely action will help a lot
more in accident situations. Researchers proposed methods to analyse vehicle mounted
sensor data to detect accidents. To get a big clear picture, we need to correlate and
analyse pieces of sensor data instead of analysing them independently. Along with it, if
we also analyse traveller’s health data, it will be helpful to take rescue actions. It may
not be straightforward to correlate and analyse all these data sets in real time. A big
system and framework is together is needed to implement the system. An architecture
and design methodology is proposed in this paper to analyse the data provided by the
vehicle mounted sensors and health data sent by passenger's wearable devices to detect
accidents in real time. After detecting the accidents, system assesses the impact of the
accident. Then it either alerts relevant people for rescue action or it does needful actions
(as described by the domain experts) on its own.
[5]The paper investigates various causes related to the demand modelling and line-
planning for bus transport systems based on data from Electronic Ticket Machine
(ETM). The ETM data is not explored thoroughly for travel planning although it is
collected and compiled by public transport on a regular basis. The electronic fare
collection system is a key element in automated data collection system in the public
transport industry. In the case of a developing country like India where smart card or
travel card facilities are not commonly available, it is required to develop tool for
eliciting data compiled using ETMs. The ETM database is also known as the fare box
data. The ETM is a machine that records the data when a passenger pays for the ticket.
It records the trip number, fare stage code, ticket number, origin, destination, passenger-
count, time of issue of the ticket, fare, and the type of the ticket. These details can be
derived from the ETM database to determine the effectiveness and efficiency factors of
the public transport mode.
[6]In recent years, acts of physical attack and violence against women are rising at a
menacing rate. With escalation of female employees in industries and other sectors of
the commercial sector, it is now becoming a necessity for females to travel at late hours
and visit distant locations as a part of their work regime. However, the exponential
increase in violence and attacks against women in the past few years, is posing a threat
to the growth and development of women. Defence isn’t the only measure that can
suffer against this increasing abuse. A security explanation that creates a sense of safety
among women needs to be devised. In instances of attack, it is largely reported that
women are immobilized. There is thus, a need of simpler safety solution that can be
activated as simply as by pressing a switch and can instantly send out alerts to the
neurones of the victim. In this paper we intend to design and implement such a system
in to the form of a partial wearable and partial portable system.
[7]he system incorporates all the unique features mainly as real-time location tracking
and integrate all the features offered by the existing system such as GPS tracking, SOS.
www.ijmer.in 84
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
The application requires an initial registration and along with that, emergency contacts
and the user is asked to update the emergency contacts from time to time. When the user
is travelling from one place to another place, the dynamic GPS tracking offered by Pub
Nub’s channel is turned on to view the user’s location on a map. Users with this app
can monitor other users with the same app through the dynamic GPS Tracking system
through the Pub Nub channel. When the SOS button is pressed and then an alert
message which contains the name of the user, GPS Location and a help message is sent
via SMS. The user has all access to first-aid information and toll free helpline phone
numbers. All the information and data is integrated with Firebase.
[8] In today’s world, security is the major issue for an individual persons. Although
harassments on women, elders and children are increasing gradually .In this project the
system consists of a monitoring device, which gets activated when the device is tapped
upon and then a text message along with voice alert message is received by the
respective emergency contacts. Further the person who receives the notifications can
find and track the current location without the interaction of the victim’s application at
each and every function.
[9]Safety for women has become a major factor and issue in most of the countries.
Conducted Survey results shows that every year almost above 25000 crime against
women were filed across India. In last ten years, the statistics shows women abusement,
sexual harassment have been steadily increasing. It became a mandatory factor to come
up with a solution to protect the women from being a victim and to reduce the attacks.
The main goal or objective of this paper is to design and implement a highly reliable
system for protecting women from being harassed. In this paper, we have developed an
intelligent women safety system using Radio Frequency Identification (RFID) and
Global positioning system. The main idea here is using a active RFID tag with passive
RFID reader to scan the information and this information is transferred to the AT89C52
microcontroller where in the contacts of around 4 to 5 people is stored in the data base.
Once the information is received by the controller, it sends the message to the contacts
through GSM module and the location is tracked through the GPS.
Pink bus is a smart public transport bus which will provide the customer more safety
and smart option to make the travelling experience more reliable, a user-friendly
dependable system. The Proposed prevention smart ticket machine which will collect
the data that are required to identify the threats against women and send those data with
a warning message to nearby law enforcement station throughout their journey. So
precaution can be arranged to eliminate such threat before it could happen. By
introducing Smart Bus Fare Collection System implemented by RFID card the users
traveling experience is made smarter, digital and user friendly.
www.ijmer.in 85
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
The proposed project consist of 3 modules in the below figure. Provide necessary trip
information along with an additional parameter which will identify the gender of the
customer to the ticket machine. Ticket machine accumulate and processes the data given
by the operator and check for special conditions where women faces real time threat.
Special conditions such as a woman travelling alone in a public transport, when speed of
the vehicles exceeds the limit, when number of passengers exceeds the limit, when the
vehicle is not on time etc. If the real time threat are real then the ticket machine will
simply inform thelaw enforcement via SMS and provide ticket to the customer. If the
above mentioned real time threat become reality then the customer simply press a
simply button which will enable the customer to give an alert message to the law
enforcement through the SMS and assistance will be provided.If the real time threat is
not real then the ticket machine will simply perform as a ordinary ticket machine and
provide ticket to the customer. The fair reduction or expense for travel will be through
contact less smart card system or using liquid money.
Main goal of the proposed project make ordinary public transport ticket machine
smarter and identify all those real-time threat through a simple program which will safe
guard women’s in their time during travel. Identified real-time threat will be given to
law enforcement through SMS, which will give the law enforcement more control on
public transportation system and identify the threat and eliminate it before it could
happen.
SYSTEM DESCRIPTION
This system has basically 3 types of modules.
1.Ticket machine
2.Women safety detection and prevention
www.ijmer.in 86
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
3.Accident detection
TICKET MACHINE
This is a smart bus Fare Collection System implemented by RFID card. This system is
very user friendly , which will automatically identify and deduct the passenger and the
passenger’s fare according to the distance travelled. The Radio Frequency Identification
(RFID) card is used to identify the passenger and make transaction very precise.
When compared to the paper based on ticketing system using of RFID cards are more
convenient and reusable. RFID cards are distributes among the public. By collecting the
personnel details of a customer, an account will be created and unique ID will be
assigned to that particular person with RFID cards.
By accessing the database, it is thus possible to identify the traveller and check his
account then deduct the fare from his/her account. Creating database facilitates efficient
filtering of anti-social elements and gives firm assurance to both passenger and Public
Transport System (PTS) about the transaction. The web based application is
used to send push notifications and also for the RFID card renewal process. IOT based
web-page monitor system helps to overcomes all the problems faced in bus with.
This feature of the proposed method is provide assistance to the customer when they are
in an Emergency Situation. Pink bus will provide the customer the needed assistance
through informing the law enforcement .During the time in the pink bus ,the proposed
method will simply identify various situation that could be an potential threat to female
customer such as when they are travelling along, or any potential criminal nearby etc.
through the help of IR sensors and the given trip information’s etc. When such
identified situation occurs the proposed method will simply inform the law enforcement
through an warning message so that they could make precaution that could eliminate the
presence of the threat being real. If such situation occur or the female customer had
some difficulty while using pink bus. Customer can simply press a button for assistance
from the law enforcement. Through the GSM module implemented in the proposed
method.
www.ijmer.in 87
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
ACCIDENT DETECTION
This feature of the proposed system is to identify the situations where the public
transport are in danger of accidents that happen during their travel. The public transport
is implemented in a way that the entire system is monitored by the vibration sensors
which are connected to the main micro controller.
When such scenario of accident occurs the sensor identify the situation and provide an
warning or sos message to the respective authorities through the gsm module. In Such
way faster and much efficient assistance can be provided to the accident victims.
IV. CONCLUSION
REFERENCES
www.ijmer.in 88
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Computing & Communications, Cloud & Big Data Computing, Internet of People and
Smart City Innovations.
[3]Md. FoisalMahedi Hasan, Golam Tangim, Md. Kafiul Islam, Md. Rezwanul Haque
Khandokar, Arif Ul Alam “RFID-based ticketing for public transport system:
Perspective megacity Dhaka”, 2010 3rd International Conference on Computer Science
and Information Technology, Chengdu, China.
[4] Venkata Krishna Kota, Nagendra Kumar Mangali, Thirumal Kumar
Kanakurthi,Rakesh Kumar, T. Velayutham “Automated accident detection and rescue
system”, 2017 International Conference on Wireless Communications, Signal
Processing and Networking (WiSPNET), Chennai, India.
[5]AnilaCyril,Dr.VargeseGeorge,Dr.Raviraj H.Mulangi,”Electronic Ticket Machine Data
Analytics for Public Bus Transport Planning”,2017 IEEE International Conference
Energy, Communication, Data Analytics and Soft computing(ICECDS-2017).
[6]Madhura Mahajan, KTV Reddy, Manita Rajput, “Design and Implementation of a
Rescue System for Safety of Women”,2016 IEEE.
[7]Dantu Sai Prashanth ,Gautam Patel , Dr.B.Bharathi Computer Science and
Engineering Sathyabama University Chennai,India “Research and development of a
mobile based women safety application with real-time database and data-stream
network” 2017 international conference on circuits power and computing technologies
[ICCPCT].
[8] Prof.Kiran.Mensinkai,ChaitraB.V,Chinmayi V Pandith,Goutam P Nayakand
Jyothsna.C.SAssistant Professor,Department of CSE, EWIT,Bangalore,India, Student at
Department of CSE,EWIT,Bangalore,India “An Intelligent Safety Systemfor
Individual’s Security” International Conference on Energy, Communication, Data
Analytics and Soft Computing (ICECDS-2017).
[9]Shaik Mazhar Hussain, Shaikh Azeemuddin Nizamuddin, Rolito Asuncion,
Chandrashekar Ramaiah, Ajay Vikram Singh , Middle East College, Muscat, Sultanate
of Oman “Prototype of an Intelligent System based on RFID and GPS Technologies for
Women Safety”2016 5th International Conference on Reliability, Infocom Technologies
and Optimization (ICRITO) (Trends and Future Directions), Sep. 7-9, 2016, AIIT, Amity
University Uttar Pradesh, Noida, India .
www.ijmer.in 89
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Monica Sabharwal
Assistant Professor,Department of English,Panjab University
Patiala (Punjab),India
Abstract
The paper focuses on how one’s religion is marked as a critical identity signifier in
times when globalization claims to cross and merge all boundaries. It attempts to
explore the conflicts a Muslim-American faces post 9/11 with regard to his identity as a
Muslim and as an American through various character studies varied in their depiction
of his experience which may focus on the various social, economic and political issues
that encompass the tragic event. These issues bring forth the dilemmas a Muslim-
American faces in light of Islamophobia which intensifies both in nature and in
magnitude post 9/11 and provide a better understanding of the complexities of identity
issues faced by them. It would enable us to look at the complex dynamics of the
interactions of one aspect of one’s identity with another.
The fall of the Twin Towers on September 11, 2001 will always be remembered as one
of the most horrible atrocities ever experienced by the people of the United States. It is
perceived as a watershed moment in history that had a huge impact on world politics,
local and global culture, the sense of community and world history at large. The
assessment of the event as a crucial moment in American and world history began soon
after and consequently gained momentum. It was accompanied by a mood of paranoia
and fear that gripped not just the people of America but from all across the world. The
most apparent consequence of the event was the emergence of discourses of ‘War on
Terror’ propounded by Bush administration which further raised political debates about
the credibility of the attacks the ripples of which are felt to this day. The other social
consequences may include the rise of inner anxieties, conflicted identities, and
intertwined relationships between individuals and communities that was shaped as a
result of their experiences in the aftermath of 9/11.
In its immediate aftermath, it has ensued complex reactions that surround the issues of
identity and national allegiance while constructing simplified discourses that have led to
generalisations harvesting the feelings of hate and prejudices among people from
different communities. A large body of academic writing attests that the attempt to find
meaning in the chaos that 9/11 ushered led to complex inquiries into its meaning and
significance in history. It has not only been measured as a significant and deeply tragic
loss of human lives but also with its impact on social and cultural climate not only of
America but the world at large.
www.ijmer.in 90
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
The attempt to fictionalise a politically and emotionally charged event like 9/11
poses unusual challenges and a number of limitations. How does one write about the
trauma and horror of the event by eluding the polarising discourse of the binaries around
9/11? How can one engage with the political aspect of the event without allowing the
narrative to turn into a propagandist tool driven by some form of ideological
apparatuses? How can fiction subtly urge the readers to a humanistic response rising
beyond the politics of hate and propaganda? How can fiction entail a morally and
intellectually sound analysis of 9/11 by exploring the interconnection between political,
ethical, emotional and the literary aspects surrounding it?It also reiterates the role and
function of art and literature in a time of conflict and crisis. The attempt is to understand
and explore the role of fiction in negotiating the personal and collective trauma post
9/11. Do the novels reiterate or disrupt the dominant discourses that perpetuate
paranoia, chauvinistic nationalism, and xenophobia? Do the post 9/11 novels address the
larger context of the event or merely explore personalised and individualistic accounts?
Does post 9/11 fiction succumb to the psychosis constructed in the aftermath of 9/11 or
shed light on the victimisation of people on the basis of their religious identities? How
far can a writer's geographical location and cultural and ethnical identity influence one’s
responses to 9/11, specifically between American and non-American, Western and non-
Western?
Among all the writers who are writing in a world after 9/11, writers of
Pakistani origin have largely been credited to have integrated the themes of identity and
belonging to the impact of 9/11. The Reluctant Fundamentalist by Mohsin Hamid,
Home Boy by H.M. Naqvi and Burnt Shadows by KamilaShamsie are the prominent
three works that have successfully done so. The representation of Muslim-Americans in
these novels and the kind of identity issues they experience post 9/11 owing to their
ethnic background is the most striking feature of their writings. These novels explore
and validate Bhabha's theory of hybridity in the narratives centering on immigrants who
have come to America to live the American Dream but end up feeling out of place
everywhere, at home nowhere pushing them farther to the peripheries. An explicit
manifestation of Bhabha's definition of hybridity as new, neither the one nor the other,
which is struggling to free itself from a past ancestry, is depicted through the characters
of these novels, consequently replacing "temporal linearity with a spacial plurality"
(Ashcroft B. G. 1989). The struggle of the protagonists in these novels with the issues of
www.ijmer.in 91
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
identity renders them vacillating between their ethnic backgrounds where they were
born and the city they have moved to in the hope of a better life.
In light of the massive altercations in the social and economic frontiers, the present
paper focuses on the corresponding changes in the idea of Self and identity in the post
9/11 scenario in which an individual is coping with multiple identities that one has
ascribed to oneself in a globalised world which has promised the homogenisation of
identities and cultures through the analysis of Mohsin Hamid’s novel, The Reluctant
Fundamentalist. The consequences of 9/11 resulted in exposing the ‘Muslimness’ in the
various literary representations of Muslim characters as immigrants seeking
reformulation of identity post 9/11.
The novel, The Reluctant Fundamentalist offers a framework with which the
author has sought to re-examine the prejudices as well as relationships between the East
and West in the aftermath of post 9/11. He has avoided mimicking many other literary
works drawn in the tradition of the West and thus displacing and dispelling the varied
assumptions with regard to the cultural interactions between the two. In this process,
with its deliberate design in terms of narrative action and setting that has positioned a
Muslim and a Western character in a close proximity, Hamid has offered a fertile
ground for the exploration of the issues like the negotiation of identity, hybridity and
cultural assimilation in light of the perceived distrust in the post 9/11 world. The
structure of the novel necessarily invites the reader to think and question and challenge
the essentialising of Muslim behavior and practices. Through the interaction of the two
characters in a conversation that is one-sided only, there is an evident shift in the frames
of identity, otherness and normative behavior. Even as it portrays a seemingly engaging
and balanced American culture, there is a covert hostility that is barely acknowledged in
the novel. The negotiation of identity and otherness, however comprise a stark feature of
the novel with direct observation of the Other. By adopting the dramatic monologue
form, Hamid has effectively demonstrated how external gaze is effective in creating a
distance between the characters and cultures by reframing the gaze from the Eastern
Other to the American subject.
The author of the novel being a Muslim has an advantage over western writers
in his effort to deal with a “Muslim” character. Being a Muslim-American himself, he
has been able to encounter both the cultures and can certainly give a better
understanding of his protagonist’s experience in a post 9/11 America. Hamid seems to
re-evaluate the treatment given to Muslims post 9/11, how the stereotypes and clichés
attached to a Muslim intensified after the fall of the Twin Towers. In the increasingly
politicized atmosphere post 9/11 which is characterized by fear and suspicion of ‘Other’,
Hamid’s novel seeks to allow a Muslim to narrate the experience of the ‘Other’ in
America which also marks the disillusionment of the multicultural America.
www.ijmer.in 92
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
“ascendancy and rapid politicizing of a single term: culture. Americans are trapped in
“Culture Talk,” a way of framing the problem of terrorism which assumes that culture
was made,
only at the beginning of creation, as some extraordinary, prophetic act.
After that, it seems Muslims just conformed to culture. According to
some, our culture seems to have no history, no politics, and no
debates, so that all Muslims are just plain bad. According to others,
there is a history, a politics, even debates, and there are good Muslims
and bad Muslims. In both versions, history seems to have petrified
into a lifeless custom of an antique people who inhabit antique lands.
Or could it be that culture here stands for habit, for some kind of
instinctive activity with rules that are inscribed in early founding texts,
usually religious, and museumized in early artifacts?
Culture talk after 9/11 […] explained the practice of terrorism as “Islamic”. “Islamic
Terrorism” is thus offered as both description and explanation of the events of 9/11. It is
no longer the market (capitalism), nor the state (democracy), but culture (modernity)
that is said to be the dividing line between those in favour of a peaceful, civic existence
and those inclined to terror. It is said that our world is divided between those who are
modern and those who are premodern. The moderns make culture and are its masters;
the pre-moderns are said to be but conduits. (16–17)
He questions the notions that are being placed as the dominant narrative in the West.
If this world is after all divided into two: on the one hand, savages
who must be saved before they destroy us all and, on the other, the
civilized whose burden it is to save all? Is it really true that people’s
public behaviour, specifically their political behaviour, can be read
from their religion? Could it be that a person who takes his or her
religion literally is a potential terrorist? And only someone who thinks
of the text as not literal, but as metaphorical or figurative, is better
suited to civic life and the tolerance it calls for? How, one may ask,
does the literal reading of religious texts translate into hijacking,
murder, and terrorism? Is there not less and less talk of the clash of
civilizations, and more and more talk of the clash inside civilizations?
www.ijmer.in 93
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
particular, he points out, “The illusion of destiny, particularly about some singular
identity or other […] nurtures violence in the world through omissions as well as
commissions” (xiv)
In illuminating this mutual construction of culture, studies of hybridity can
offer a juncture for a counter-narrative, through which the dominated can reclaim shared
ownership of a culture that relies upon them for meaning. Hybridity can be seen as a
powerful tool for liberation from the domination imposed by bounded definitions
marked by the notions of difference. Identities owe their formation and position in
society to the operation of social, economic, cultural and political forces that are
inseparable from the forces that create and maintain socio-economic groups. In this
view, rather than being opposed, identity politics and class politics, while distinct, have
the potential to be allied actors in a commonplace political process.
Much anthropology in this field demonstrates how identities have been, and are
invented, reinvented and shaped for political and other purposes, out of disparate
historical and cultural experiences. Other studies have repeatedly shown that identities
are driven with contradictions and are not to be understood as seamlessly unified
comprehensive cultural entities, therefore impossible to go back to the original one.
The protagonist of the novel and the narrator, Changez, is a successful graduate
in a prestigious university hired by a reputed financial firm, living the American dream
who eventually “awakens” in a post 9/11 scenario. The novel is a journey of the
changing dynamics of his relation with America keeping 9/11 in focus.
These lines highlight the tension of the post 9/11 world where tension is located in the
manner in which a person is represented and how he perceives himself. The dynamics of
www.ijmer.in 94
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
his representation changed drastically post 9/11 which also impacted upon his self-
understanding as a Muslim-American and his identity oscillates between his loyalties
towards Pakistan and America.
The story is narrated by Changez at the time when he has left America and
moved to Lahore as a university lecturer. The identity of the American with whom
Changez is in conversation isn’t revealed. Just like Chuck in Home Boy, Changez is
thrilled to be in a multicultural America as at that time he does not feel culturally
inferior. On the contrary, he feels proud of his Eastern lineage.
After his graduation, he goes to Greece with the help of his friend as “he was
well-liked as an exotic acquaintance by some of the others.” (19) He met and was
immediately attracted to a girl named Erica. Erica also reciprocates to his feelings and
starts a romantic relationship with him after his cautious efforts to make an impression
upon her which gets complicated as the story unfolds. His nationality doesn’t seem to be
a problem here and on the contrary might have given him some added advantage over
other handsome and rich boys in their group. He is not made conscious of the
“difference,” maybe because he is perceived as a “good” Muslim.
After his stay at Greece ends, Changez returns back to New York and starts
working for Underwood Samson. Here also his background and his roots pose no
problem in his success as he becomes the most praised employee in the firm. In fact he
takes it to his advantage and claims, “I was aware of the advantage conferred upon me
by my foreignness, and I tried to utilize it as much as I could.” (47) His tenacity and
sense of formality and natural politeness which lacks in his American counterparts is
appreciated by his new colleagues, as he “stood out from the pack.” Apart from being a
story of infatuation and disenchantment with America, the story also sheds light on the
binary relations between East/West and also on the (mis)representation of the two.
Where Erica’s father associates fundamentalism with Changez’s religion, Changez’s
employer Underwood Samson’s motto “Focus on the fundamentals” forces one to
reconsider one’s preconceptions about such words and their meanings and hence
subverts the idea that the real fundamentalism here is that of US capitalism.
www.ijmer.in 95
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Changez tries to assimilate with American identity and often basks in the glory
of being a “New Yorker with the city at his feet,” but his identity is subjected to
inevitable dichotomies. There is an ambivalence in his tone even when he attempts to
assimilate and at various points in the novel he is shown conflicted with his identity.
Four thousand years ago, we, the people of the Indus River basin, had
cities that were laid out on grids and boasted underground sewers,
while the ancestors of those who would invade and colonize America
were illiterate barbarians. Now our cities were largely unplanned,
unsanitary affairs, and America had universities with individual
endowments greater than our national budget for education. To be
reminded for this vast disparity was, for me, to be ashamed. (38)
Where he is proud to take advantage of his foreignness, he is also resentful that the rich
heritage of his country had faded away at the hands of globalization led by America and
Europe. He finds himself unable to resonate with the American life and struggles to
associate with it. It irks him when he meets Erica’s father the first time as he remarks,
Changez experiences what Hamid himself has put that there are “first order and second
order citizens in our globalized world, and although we interact at offices and dinner
parties as equals, were not treated as equals.” (“Seven Questions”) Changez also shares
this feeling as he states,
www.ijmer.in 96
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
“I feel like a distant runner who thinks he is not doing too badly until
he glances over his shoulder and sees that the fellow who is lapping
him is not the leader of the pack, but one of the laggards.” (74)
The 9/11 attacks in New York further distances him from the American dream that he
has been living. The impact was very widespread in magnitude to the extent that his
position as an outsider in America was further accentuated. The representation of 9/11
attacks in the media and its impact on the lives of Muslim-Americans propelled
Changez to reconsider his ideas about American life where he sees himself as an
outsider. He further believes that there is no possibility of his full inclusion into
American life. The inner struggle that Changez had been going through intensified as he
tries to resolve his identity crisis post 9/11. His reaction to the images of the attacks
surprises him. He was on a trip to Manila when it happened,
I turned on the television and saw what at first I took to be a film. But
as I continued to watch, I realized that it was not fiction but news. I
stared as one – then the other – of the twin towers of New York’s
World Trade Center collapsed.” And then I smiled. Yes, despicable it
may sound, my initial reaction was to be remarkably pleased. (83)
Though he tries to defend his sense of perplexity at this sense of pleasure at the horror of
the attacks. He reflects,
But at that moment, my thoughts were now with the victims of the
attack – death on television moves me most when it is fictitious and
happens to characters with whom I have built up relationships over
multiple episodes – no, I was caught up with the symbolism of it all,
the fact that someone had so visibly brought America to her knees.
(110)
Clearly he had already started to associate himself more with his Pakistani identity. The
source of his pleasure is the realization of being an outsider to a society he is
simultaneously connected to.
After the attacks, when Changez was about to board the plane for New York,
Changez is escorted by armed guards to a room at the airport and was stripped down to
his boxer shorts. He recalls,
He was subjected to another investigation upon his arrival in New York. He travelled
“very much alone” to Manhattan that evening as his team didn’t wait for him.
www.ijmer.in 97
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Changez avoids the evening news for two weeks after America began to bomb
Afghanistan. Then one evening he chances “upon newscast with ghostly night-vision
images of American troops dropping into Afghanistan for what was described as a
daring raid on a Taliban command post.” Changez unsettles the boundaries of the
definition of terrorism and by using the concept of fundamentalism against America. His
engagement with American society and his eventual disillusionment with what he sees
as American fundamentalism cause him to voice his disagreements with American
society publically. Changez, now a possible terrorist figure from the perspective of
America, repositions concepts and unsettles the distinction between terrorism and
counter terrorism in the US led War on Terror. He explains,
A common strand appeared to unite these conflicts, and that was the
advancement of small coterie’s concept of American interests in the
guise of the fight against terrorism, which was defined to refer only to
the organized and politically motivated killings of civilians by killers
not wearing uniforms of soldiers. I recognized that if this was to be the
single most important priority of our species, then the lives of those of
us who lived in the lands in which such killers also lived had no
meaning except as collateral damage. This, I reasoned, was why
America felt justified in bringing so many deaths to Afghanistan and
Iraq, and why America felt justified in risking so many more deaths
by tacitly using India to pressure Pakistan. (202-3)
Changez also experiences racist attack. A man calls him “fucking Arab” and tries to
pick up fight with him. Changez’s experience resonates Hamid’s own experience in the
aftermath of 9/11.
Earlier this year [2010], on a trip from Pakistan to New York with my
wife and baby daughter, I had my usual lengthy encounter at J.F.K.
Airport. Sent to secondary inspection, I waited my turn to be
investigated. Eventually it came, the officer questioning me about
such things as whether I had ever been to Mexico or received combat
training. As a result, we were the last passengers on our flight to claim
luggage, a lonely set of suitcases and a foldable playpen on a now-
stationary baggage carousel. And until we stepped out of the terminal,
my heart kept pounding in a way incongruent with my status as a
visitor with papers in order. (Hamid “Discontent”)
After 9/11 Changez’s resentment towards America grows. He starts identifying himself
with his Pakistani identity. He is further infuriated by the “War on Terror” and
America’s foreign policy in Asia in general. According to him, America succumbed to
self-righteous rage and nationalistic nostalgia and his perception towards America
changes.
www.ijmer.in 98
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
He was enraged and blamed America for many ills and wrongs all over the world.
In such an atmosphere Changez becomes even more aware of his position as an outsider
in America and is able to identify more with his Pakistani identity. He visits Pakistan to
see his family. He decides to grow a beard to assert his newly found identity and wage a
war against his American self. “It was perhaps a form of protest on my part, a symbol
of my identity, or perhaps I sought to remind myself of the reality I had left behind.”
(147-48)
The turmoil in Changez’s mind grows more intense during his stay in Chile. He
meets Juan-Batista, the chief of the company he was sent to evaluate. He grows reluctant
to continue with his job as he sees himself as a traitor, “a modern-day janissary*.”
(During the Ottoman empire, Janissaries were the most loyal, elite and powerful crops
serving the sultan. They were recruited from Christian boys, severed from their families,
brought up as Muslims and given the best military education. At the time, they were one
of the most effective and best trained soldiers in Europe, well-paid and enjoying high
social status, who were actually fighting against their own Christian civilization.) He
exclaims,
www.ijmer.in 99
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Consequently, he refuses to work for Underwood Samson by saying that his “days of
focusing on the fundamentals were done” and goes back to New York.
In using words like “diaspora, displacement, relocation,” Bhabha illustrates the dynamic
nature of culture, and the flimsy consistency of the historical narratives that cultures rely
upon to draw boundaries and define themselves. As a result, culture cannot be defined in
and of itself, but rather must be seen within the context of its construction. More
significantly, Bhabha draws attention to the reliance of cultural narratives upon the
Other. In illuminating this mutual construction of culture, studies of hybridity can offer
www.ijmer.in 100
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
the opportunity for a counter-narrative, a means by which the dominated can reclaim
shared ownership of a culture that relies upon them for meaning.
Hamid seems to suggest that Changez’s story has its contentions towards the
ways that West can produce the so-called “terrorist” through and by false propaganda
that construct any Muslim or Arab as outsider to the nation. The novel, poses questions
on the various guises fundamentalism takes with regard to domestic and foreign policies
that the West adopts post 9/11. In this regard Jean Baudrillard has written,
Though Changez has been able to convince his readers of the intensity of his narrative,
he implicitly shows his unreliability as a narrator in the very beginning of the story
itself,
I cannot now recall many of the details of the events I have been
relating to you. But surely it is the gist that matters; I am, after all,
telling you a history, and in history, as I suspect you – an American –
will agree, it is the thrust of one’s narrative that counts, not the
accuracy of one’s details. (118)
Throughout the narrative, Changez has been seen wearing a mask hiding his real self
from everyone he encounters in the narrative. He tries to assimilate with his fellow
friends as an “exotic acquaintance”. He does want his peers to know that he is on a
scholarship and works part time to make his ends meet. During his assignment in
Manila, he pretends to be one among his fellow American colleagues even though he
himself acknowledges that he could relate more with the Filipino driver of the jeep who
returned his gaze which “got under his skin.” (67) Pondering upon this incident he says
that he shared “sort of Third World sensibility” (67) with him. Later on when he goes
out for a drink with his team, he feels that his “Pakistaniness was invisible, cloaked by
my suit….” (71) He pretended to be Chris, Erica’s ex-lover while making love to her.
This puts his entire narration into focus of critical inquiry.
He claims that America changed his world but he himself lived his entire life in
a nostalgia. As he begins to narrate the experience of his stay in America, he claims,
www.ijmer.in 101
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
“Princeton made everything possible for me. But it did not, could not, make me forget
such things as how much I enjoy the tea in this, city of my birth….” (15)
WORKS CITED
www.ijmer.in 102
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Mr .TusharAgrawal
B.Tech Extc
SVKM’s NMIMS Mukesh Patel School of Technology Management & Engineering, Shirpur
ABSTRACT:
Fiber optic systems are important telecommunication infrastructure for world-wide
broadband networks. Wide bandwidth signal transmission with low delay is a key
requirement in present day applications. Optical fibers provide enormous and
unsurpassed transmission bandwidth with negligible latency, and are now the
transmission medium of choice for long distance and high data rate transmission in
telecommunication networks. This paper gives an overview of fiber optic
communication systems including their key technologies, and also discusses their
technological trend towards the next generation.
Index Terms- Bandwidth, Broadband, Fiber optics, Latency, Telecommunication.
1.INTRODUCTION
The major driving force behind the widespread use of fiber optics communication is
the high and rapidly increasing consumer and commercial demand for more
telecommunication capacity and internet services, with fiber optic technology capable
of providing the required information capacity (larger than both wireless connections
and copper cable). Advances in technology have enabled more data to be conveyed
through a single optical fiber over long distances. The transmission capacity in optical
communication networks are significantly improved using wavelength division
multiplexing .
A desirable feature for future optical networks is the ability to process information
entirely in the optical domain for the purpose of amplification, multiplexing, de-
multiplexing, switching, filtering, and correlation, since optical signal processing is
more efficient than electrical signal processing.
Division Multiple Access networks using optical signal processing techniques have
recently being introduced.
Despite the associated benefits of utilizing optical fiber for communication (such as
its high reliability over long distances, low attenuation, low interference, high
security, very high information capacity, longer life span and ease of maintenance),
research is still ongoing to further improve on the present fiber optics communication
system, and also to solve some of the challenges facing it. Future optical
communication systems are envisioned to be more robust than the present system.
This paper is organized as follows. Section II describes the basic principles of fiber
optics communication. Section III looks at the history and evolution of fiber optics
www.ijmer.in 103
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 104
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
slows the speed of some light rays, thereby allowing all the light rays to reach the
receiver at almost the same time, thereby reducing dispersion. Figure 2 gives a
description of the various optical fiber modes.
Optical fiber was first developed in 1970 by Corning Glass Works. At the same time,
GaAs semiconductor lasers were also developed for transmitting light through the
fiber optic cables. The first generation fiber optic system was developed in 1975, it
used GaAs semiconductor lasers, operated at a wavelength of 0.8 µm, and bit rate of
45Megabits/second with 10Km repeater spacing.
In the early 1980’s, the second generation of fiber optic communication was
developed, it used InGaAsP semi conductor lasers and operated at a wavelength of
1.3 µm. By 1987, these fiber optic systems were operating at bit rates of up to 1.7
Gigabits/second on single mode fiber with 50Km repeater spacing.
www.ijmer.in 105
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
The fourth generation of fiber optic systems made use of optical amplifiers as a
replacement for repeaters, and utilized wavelength division multiplexing (WDM) to
increase data rates. By 1996, transmission of over 11,300Km at a data rate of
5Gigabits/second had been demonstrated using submarine cables.
The fifth generation fiber optic communication systems use the Dense Wave
Division Multiplexing (DWDM) to further increase data rates. Also, the concept of
optical solitons, which are pulses that can preserve their shape by counteracting the
negative effects of dispersion, is also being explored. Figure 3 shows the evolution
of fiber optic communication
www.ijmer.in 106
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
1. Core: The core is that the cylindrical portion of the fiber. It’s created from
material things, and commonly created from glass. The light propagates through
primarily core.
2. Cladding: The cladding or the protective cover is that the external layer of
the core, which is additionally created from dielectric material things with numerous
refractive directories. The refractive directory of the cladding or protective cover is a
smaller amount than the refractive directory of core material. This portion is often
created from glass or plastic material. It reduces the loss of light from core in to close
air. It additionally reduces the scattering loss at the surface of the core, and protects
the fiber from interesting surface impurities and adds up the strength to the fiber.[1]
Another benefit of all optical networks is that there will not be any need to replace the
electronics when data rate increases, since all signal processing and routing occurs in
the optical domain [9]. However, before this can become a reality, difficulties in
optical routing, and wavelength switching has to be solved. Research is currently
ongoing to find an effective solution to these difficulties.
www.ijmer.in 107
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Dense Wave Division Multiplexing (DWDM) paves the way for multi-terabit
transmission. The world-wide need for increased bandwidth availability has led to the
interest in developing multi-terabit optical networks. Presently, four terabit networks
using 40Gb/s data rate combined with 100 DWDM channels exists. Researchers are
looking at achieving even higher bandwidth with 100Gb/s. With the continuous
reduction in the cost of fiber optic components, the availability of much greater
bandwidth in the future is possible.
Presently, traditional optical networks are not able to adapt to the rapid growth of
online data services due to the unpredictability of dynamic allocation of bandwidth,
traditional optical networks rely mainly on manual configuration of network
connectivity, which is time consuming, and unable to fully adapt to the demands of
the modern network. Intelligent optical network is a future trend in optical network
development , and will have the following applications: traffic engineering, dynamic
resource route allocation, special control protocols for network management, scalable
signaling capabilities, bandwidth on demand, wavelength rental, wavelength
wholesale, differentiated services for a variety of Quality of Service levels, and so on.
It will take some time before the intelligent optical network can be applied to all
levels of the network, it will first be applied in long-haul networks, and gradually be
applied to the network edge .
In the area of ultra-long haul optical transmission, the limitations imposed due to
imperfections in the transmission medium are subject for research. Cancellation of
dispersion effect has prompted researchers to study the potential benefits of soliton
propagation. More understanding of the interactions between the electromagnetic
light wave and the transmission medium is necessary to proceed towards an
infrastructure with the most favorable conditions for a light pulse to propagate.
Another future trend will be the extension of present semiconductor lasers to a wider
variety of lasing wavelengths. Shorter wavelength lasers with very high output
powers are of interest in some high density optical applications. Presently, laser
sources which are spectrally shaped through chirp managing to compensate for
chromatic dispersion are available. Chirp managing means that the laser is controlled
www.ijmer.in 108
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
such that it undergoes a sudden change in its wavelength when firing a pulse, such
that the chromatic dispersion experienced by the pulse is reduced. There is need to
develop instruments to be used to characterize such lasers. Also, single mode tunable
lasers are of great importance for future coherent optical systems. These tunable
lasers lase in a single longitudinal mode that can be tuned to a range of different
frequencies.
The laser neural network is an effective option for the realization of optical network
nodes. A dedicated hardware configuration working in the optical domain and the use
of ultra-fast photonic sections is expected to further improve the capacity and speed
of telecommunication networks. As optical networks become more complex in the
future, the use of optical laser neural nodes can be an effective solution.
G. Polymer Optic Fibers
Polymer optical fibers offer many benefits when compared to other data
communication solutions such as copper cables, wireless communication systems, and
glass fiber. In comparison with glass optical fibers, polymer optical fibers provide an
easy and less expensive processing of optical signals, and are more flexible for plug
interconnections . The use of polymer optical fibers as the transmission media for
aircrafts is presently under research by different Research and Development groups
due to its benefits. The German Aerospace Center have concluded that “the use of
Polymer Optical Fibers multimedia fibers appears to be possible for future aircraft
applications . Also, in the future, polymer optical fibers will likely displace copper
cables for the last mile connection from the telecommunication company’s last
distribution box and the served end consumer . The future Gigabit Polymer Optical
Fiber standard will be based on Tomlinson-HarashimaPrecoding, Multilevel PAM
Modulation, and Multilevel Coset Coding Modulation.
Presently, optical inter satellite links and orbit-to-ground links exists, the latter
suffering from unfavorable weather conditions . Current research explores optical
communication to and from high altitude platforms. High altitude platforms are
airships situated above the clouds at heights of 16 to 25Km, where the unfavorable
atmospheric impact on a laser beam is less severe than directly above the ground . As
shown in figure 4, optical links between high- altitude platforms, satellites and ground
stations are expected to serve as broadband back-haul communication channels, if a
high-altitude platform functions as a data relay station.
www.ijmer.in 109
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Erbium Doped Fiber Amplifier (EDFA) is one of the critical technologies used in
optical fiber communication systems. In the future, better technologies to enhance
EDFA performance will be developed. In order to increase the gain bandwidth of
EDFA, better gain equalization technology for high accuracy optical amplification
will be developed. Also, in order to achieve a higher output power, and a lower noise
figure, high power pumping lasers that possess excellent optical amplification
characteristics with outputs of more than
+20dBm, and very low noise figure are envisioned to exist in the nearest future.
K. Advancement in Network Configuration of Optical Submarine Systems
www.ijmer.in 110
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Presently, various impurities are added or removed from the glass fiber to change its
light transmitting characteristics. The result is that the speed with which light passes
www.ijmer.in 111
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
along a glass fiber can be controlled, thus allowing for the production of customized
glass fibers to meet the specific traffic engineering requirement of a given route. This
trend is anticipated to continue in the future, in order to produce more reliable and
effective glass fibers. Also, the miniaturization of optical fiber communication
components is another trend that is most likely to continue in the future.
www.ijmer.in 112
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 113
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 114
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 115
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 116
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 117
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 118
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 119
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 120
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 121
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 122
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Abstract— Educational Data Mining is one of the budding research areas in data
mining[1]. The researches in educational data mining focus on improving the quality
and profit of educational system by providing insights to understand students’ learning
process, their overall involvement in the process and comfort level in the learning
environment. Students are core stakeholder of academics, and so the motto of education
revolves around the students. The objective of the education is to improve the learners’
knowledge, skills and attitudes under expert surveillance in the academic environment.
According to bloom taxonomy, a person undergoing learning improves his/her
knowledge and mental abilities (i.e. Cognitive), skillset(i.e. Pshycomotor) as well as
his/her emotions(i.e.Affective)[2]. Emotions are subjective state of mind associated with
thoughts, feelings, behavioural responses, and a level of pleasure or displeasure[5].
Emotions are categorized into positive and negative emotions. Self-determination is the
ability to be focused and motivated to achieve one’s ambition. Self – determination is
related to the positive emotions of motivation. This paper is to investigate the influence
of self-determination in students' academic performance in the learning environment
using supervised and unsupervised learning algorithms. Self-determination and students'
academic performance is evaluated by self-determination scale and criterion reference
model. Multilayer perceptron classification algorithm and Expectation Maximization
clustering algorithm are used to group the students based on their self-determination
scale and academic performance. The relation between self-determination and academic
performance is determined using predictive and descriptive modelling. The research
shows the existence of a positive correlation between self-determination and
performance. And so this research allows the instructors to understand the students
based on their emotions and render their help to enhance the student's academic
proficiency.
I. INTRODUCTION
Educational Data mining is one of the emerging research areas of data mining. Using
supervised and unsupervised techniques, it discovers insights by exploring different
anomalous data values in a learning environment. These techniques help to establish a
better understanding of students during their learning process. Self-determination scale
has been used to discover the students' self-determination level. Criterion Reference
www.ijmer.in 123
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Bloom’s Taxonomy:
In 1956, Bloom's Taxonomy [3] was formulated by benjamin bloom and his co-workers
Engelhart, Furst, & Krathwohl based on the educational objectives. It is one of the most
appreciated learning theories in the field of education. Bloom's Taxonomy includes
three learning domains:
1. Cognitive domain - focuses on intellectual skills such as critical thinking,
problem-solving, and creating a knowledge base.
2. Affective domain - focuses on the attitudes, emotions, values, interests, and
appreciation of learners.
3. Psychomotor domain - encompasses the ability of learners to finish tasks and
perform movement and skills physically.
It states that a student grows cognitively, affectively and in skillset parallelly during his
learning process.
The Self-Determination Scale (SDS) [4] was composed to evaluate personal differences
based on their self-determined way. It is devised on considering individual personality
that reflects (1) being more aware of their feelings and their sense of self‚ and (2)
feeling a sense of choice concerning their behaviour. The SDS is a short‚ 10-item scale‚
with two 5-item subscales. The first subscale is the consciousness of self, and the
second is the perceived choice in one's actions. The subscales can either be used
separately, or they can be combined into an overall SDS score.
www.ijmer.in 124
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
The criterion reference model is a model to evaluate (and grade) the students' academic
performance concerning the set of pre-specified qualities or standards, without reference
to the achievement of others. The pre-specified qualities or standards are what students
have to do during evaluation to demonstrate that they have achieved the goal of the
course. The results are expressed in terms of relations that match the students'
performance with the given criteria. The result is assigned based on the standard that the
student has achieved on the criteria.
Multilayer Perceptron :
Multilayer perceptron(MLP)[9] is one of the classification algorithms. It is a network of
simple neurons called perceptrons. The perceptron acts as a linear classifier. Multilayer
perceptron has more than one perceptron. It has an input layer, an output layer which
allows to make decisions or predictions on input, and certain number of hidden layers
are present in between the two layers.Hidden layer is the actual computational engine of
the MLP. MLPs with one hidden layer can approximate any continuous function. The
perceptron computes a single output from multiple real-valued inputs by forming a
linear combination according to its input weights and then possibly putting the
production through some nonlinear activation function.
Apriori Algorithm:
Apriori algorithm is an association rule mining algorithm. It finds frequent itemsets in
a dataset to derive association rule. It is named as Apriori since the algorithm makes use
of prior knowledge of the properties of frequent itemsets.
Apriori Property is used to improve the efficiency in frequent itemsets generation level
wise. Apriori Property is that all non-empty subset of a frequent itemset must be
frequent. The fundamental concept of the Apriori algorithm is its anti-monotonicity of
support measure. Apriori assumes minimum support count and minimum confidence.
Step-1: K=1
i. Generate the candidate set C1 , by creating a table containing support count of each
item present in the dataset.
ii. Compare candidate set item’s support count with given minimum support count.
Remove those items whose support count is less than the minimum support. Consider
the itemset as L1.
Step-2: K=2
www.ijmer.in 125
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Create a table by joining Lk-1 and Lk-1 is that it should have (K-2) elements in
common and it is called as candidate set C2.
Check all subsets of an itemset are frequent or not and if not frequent remove
that itemset.
Now find support count of these itemsets by searching in the dataset.
(ii) compare candidate (C2) support count with minimum support count(here
min_support=2 if support_count of candidate set item is less than min_support
then remove those items) this gives us itemset L2.
Thus, the above step is repeated until all the frequent item-sets are discovered. Now
strong association rules are generated by calculating the confidence of each rule.
www.ijmer.in 126
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Correlation between the self-determination level and Performance of the 600 student
participants have been analysed.
C0 C1 SDL
188 0 Low
Cross Predicted
Validation a b Self Determination Level
A 188 0 Low
Actual
B 0 412 High
www.ijmer.in 127
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Table 3 shows the confusion matrix for Self-Determination level obtained by Multi-
Layer perceptron classification technique. It clearly shows two classes of Self-
Determination that is High and Low.
Predicted
Cross
Academic
Validation a b c
Performance
A 188 0 0 Low
Actual
B 0 216 0 High
C 0 0 196 Average
Table 4 displays the confusion matrix for the academic performance level obtained by
Multi-Layer perceptron classification technique. It clearly exhibits three classes High,
Average and Low of academic performance.
Table 5 reveals the positive correlation between self-determination level and academic
performance by employing apriori algorithm. It also depicts the best association rules
mined from the data set. It shows that the performance of the student is high/average for
whom self -determination level is high, and the performance is low for whom self-
determination level is low.
www.ijmer.in 128
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
V. Conclusion:
References:
[1] D. Gandhimathi and S. Gomathi “A Survey of Approaches and Tools Used in Educational Data
Mining”, International Journal of Innovative Research in Computer and Communication
Engineering,Vol. 3,Issue 10, Octobor 2015.
[2] http://www.learningandteaching.info/learning/bloomtax.htm
[3] http://www.nwlink.com/~donclark/hrd/bloom.html
[4] http://selfdeterminationtheory.org/
[5] Frijda, N. H. (1986). The emotions. New York: Cambridge University Press.
[6] M. Ramaswami and R. Bhaskaran, “A Study on Feature Selection Techniques in Educational Data
Mining “, Journal of Computing, Volume 1, Issue 1, December 2009.
[7] L. Arockiam., S.Charles, V.Arul Kumar and P.Cijo. “A Recommender System for Rural and urban
Learners”. Trends in Computer Science, Engineering and Information Technology Communications
inComputer and Information Science, 2011, Volume 204, Part 1, 619-627, DOI:10.1007/978-3-642-
24043-0_63
[8] Xindong Wu,Vipin Kumar , J. Ross Quinlan , Joydeep Ghosh Qiang Yang , Hiroshi Motoda , Geoffrey
J. McLachlan , Angus Ng Bing Liu Philip S. Yu , Zhi-Hua Zhou , Michael Steinbach , David J. Hand
,Dan Steinberg, “Top 10 algorithms in data mining”, Springer-Verlag London Limited, Knowl Inf Syst
14:1–37, 2008.
[9] Ayers, E, Nugent, R, Dean, N. .Skill Set Profile Clustering Based on Student Capability Vectors
Computed from Online Tutoring Data..Educational Data Mining 2008: 1st International Conference on
Educational Data Mining,Proceedings ,R.S.J.d. Baker, T. Barnes, and J.E. Beck (Eds), Montreal,
Quebec, Canada, June 20-21, pp.210-217, 2008.
[10] M. Ramaswami and R. Bhaskaran, “A Study on Feature Selection Techniques in Educational Data
Mining, Journal of Computing, Volume 1, Issue 1, December 2009.
[11] Weiner, B., & Graham, S. (1984). An attributional approach to emotional development. In C. E. Izard,
J. Kagan, & R. B. Zajonc (Eds.), Emotions, cognition, and behavior. New York: Cambridge University
Press.
[12] Ayers, E, Nugent, R, Dean, N. .Skill Set Profile Clustering Based on Student Capability Vectors
Computed from Online Tutoring Data..Educational Data Mining 2008: 1st International Conference on
www.ijmer.in 129
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 130
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
G.Sudha
M.Phil Research Scholar, V.O.Chidambaram College,Tuticorin,Tamilnadu
V.Sornaganesh
Assistant Professor,V.O.Chidambaram College,Tuticorin,Tamilnadu
Abstract
Trends in the increasing globalization of the world and demand more interaction
between people of very different cultures, beliefs and origins than in the past. Today,
people no longer live and work in an isolated market. The reality is that they are now
part of a global (or commonly known as flattened) economy with competition from
almost every corner of the world. For this reason, companies must be open to change
and accept the concept of diversity to be more creative. In everyday conversation, the
word "diversity" has the meaning of differences or variety. However, in the business
world and in the business manual, diversity often refers to the many differences between
people in the workplace and the market today that were unknown to people in the past.
In this article we are discussed about the various advantages and disadvantages of
diversity management.
Key words: Diversity, Globalization, Differences, Management,Workforce
Introduction
Diversity management is often seen as recognizing, understanding, accepting,
valuing, and celebrating differences between people in terms of age, class, ethnicity,
gender, ability, physical and mental state, race, sexual orientation, spiritual practice, and
attendance for better performance in the workplace. The term diversity management
refers to the implementation of strategies or policies to bring together a network of
diverse people in a dynamic workforce.
www.ijmer.in 131
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
remember that we are talking about people from different countries and of different ages
and genders. For a manager to manage this workforce in a contemporary business, he
must understand some basics to ensure success;
They need to create a workplace where talent from different backgrounds can
flourish and grow.
Language and communication barriers must be of a high level of importance to
ensure that everyone can communicate.
They must manage the different points of view of each person within the
workforce in relation to gender, nationality and age.
Review of literature
1. Mr. David A. Thomas (2004) in his article entitled “Diversityas Strategy “
revealed about the IBM expanded minority markets dramatically by promoting
diversity in its own workforce. The result: a virtuous circle of growth and
progress.
2. Mr.Abey Francis (October 26, 2017) MBA knowledge base, his research focus
on the case study of Jack Welch, “ Leadership that creates Innovation “
revealed about the General Electric company ready to face world competition
by managing the diversity throughout the world. Through an analysis of the
techniques employed by welch, one can gain a better understanding of how to
motivate outstanding performance by any organization.
3. Azeminamasovic (2018) in his article entitled “socio-cultural factors and their
impact on the performance of multinational companies” this paper deals with
the concepts of socio-cultural factors and performance of multinational
companies. Multinational companies operate in different host countries around
the world and have to deal with wide variety of economic, political, legal,
socio-cultural and technological factors.This paper is to describe the influence
of certain socio-cultural factors on the performance of foreign subsidiaries.
www.ijmer.in 132
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 133
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
and improve speed. This program relies on teamwork to propel quality to the
highest level.
2. International Business Machine (IBM)
IBM’s diversity task forces asked that the company allow employees who
were not at the executive level to get more involvedin the effort. The company
did, and diversity council and employee network groups were born. The
diversity councils, group of employees across diverse constituencies, were
created specifically to address local or unique diversity issues. Through these
72 councils, IBM seeks to ensure that its workforce represents an environment
that visibly encourages and values the contributions and differences of
employees from various backgrounds. 30 members of IBM’s Worldwide
Executive Council are involved in guiding specific corporate-wide diversity
initiatives. They are held accountable for recruitment, retention and
advancement of all talent and, most important, linking IBM’s diversity
initiatives to the global marketplace, which is in turn the main reason that IBM
has been able to stay on top of the business landscape for decades. The
objectives include heightening employee awareness, increasing management
sensitivity, and making the most out of a diverse workforce.
3. Sodexo
Diversity and inclusion; although gender, generation and sexual orientation
are all part of the diversity hiring strategy at Sodexo, theystate that gender
balance is our business, and their mission is to make it everyone else’s
business too. 40% of all staff members inSodexo are women-that’s up from
just 17% in 2009. 43% of the members on the board of directors are female
and the company runs 14 Gender Balance Networks worldwide. What they
have found is that when there is an optimal gender balance within an
organisation, employee engagement increases by 4% points, gross profit
increases by 23% and brand image strengthens by 5 % points. They also show
no sign of stopping on their mission to optimise gender balance, vowing that
by 2025, 40% of their workforce will be made up of women.
4. Reebok
Reebok, the well-known sport company has also been benefiting from a
diversity management program, in the year of 1980’s a group of women at
Reebok complaint, the fact that they could not find a good aerobics shoe.
Listening to that complaint, Reebok began marketing aerobics shoes. The
outcome is outstanding-within just a period of two years, the company went
from a $12 million a year shoe company to a $3 billion powerhouse. Since the
incident, the company started to be aware of the importance of diversity.
Do and Don’t in Diversity Management
Diversity is a possible source of competitive advantage and superior performance for
companies, but implementing and managing diversity is not easy. Apparently,
mismanagement of diversity or the inability of the leader or manager to define and
execute an effective diversity management program will cause problems for the
organization with a diverse workforce. In fact, for inexperienced managers, diversity is
www.ijmer.in 134
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
more of a curse than a blessing. If the presence of diversity is well managed, it can
create synergy and improve the performance of the organization. Diversity is believed to
be a powerful strategy because managers can build on the strengths of certain people on
the team while making the weaknesses of others irrelevant. One person's strengths can
offset another person's strengths, which is essential for a high-performing team.
The first thing a manager in diversity management must do is ensure the effectiveness of
the diversity management programs, managers must constantly communicate with
employees, managers, customers, shareholders and other parties. Stakeholders’ at all
stages of the program. Keeping people informed is essential as their support is necessary
for the successful implementation of a diversity management program. Execution must
involve everyone; As such, the program is not a problem solely for staff service or a
responsibility of senior management. In addition, it is also extremely important to apply
a change management process to implement the program. The leader driving change
must be aware that a long-term perspective is required to implement a diversity
management program (that is, that change involves attitudes and does not happen
overnight, and leaders must expect the program to last for years rather than a few weeks
or months), leaders must also have the correct expectations that resources are needed for
the program. Leaders must be prepared to invest money, time, and resources to
successfully complete the diversity management program. Managers should not confuse
equal opportunity with managing diversity. The equal opportunity approach can be part
of any diversity initiative, but a successful diversity management program should go far
beyond traditional equality issues. Managers should not design diversity goals and
policies for themselves (minorities), but should think of us (everyone involved in the
organization).
1. Good communication
All employees must understand the company's policies, procedural rules and
regulations and everything related to the business. In practice, there are cultural and
linguistic problems. This is overcome by translating the information in a sophisticated
way. Use common symbols, pictures to convey information.
2. Analyse employees individually
To avoid stereotypes, discrimination between employees. The success and failures of
each employee are analysed individually. Encourage employees working in the group
and discuss work-related factors, not personal ones.
3. Encourage employees to work in a diverse group.
In various groups, experience and talented people work together. It emphasizes the
transfer of new ideas and innovative thinking. A diverse work team allows employees to
get to know each other individually. Various teams also extend the experiences and
perspectives of all team workers and help them recognize the strength of their talents
and perspectives combined.
4. Base decisions on objective criteria.
Expect all employees from all walks of life to meet the required standards and
perform to the best of their ability. Do not define different criteria for different groups.
www.ijmer.in 135
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Do not apologize or allow employees to make excuses for deficiencies. Base all
employment actions, including discipline, on specific performance-related criteria.
Always focus on work-related matters, not personal matters when dealing with
employees.
5. Beopen-minded
Acknowledge and encourage employees to recognize that their own experience,
background and culture are not the only ones of value to the organization. Set an
example of promoting diversity by developing relationships with colleagues whose
backgrounds differ from yours. Find ways to integrate diverse perspectives and talents
into efforts to achieve the organization's goals.
Conclusion
If the presence of diversity is well-managed, it can create synergy and improve
organizational performance. It is believed that diversity is a powerful strategy as
managers can leverage on the strengths of some people in the team while making the
weaknesses of others, while his weaknesses are covered by others ‘ strengths and this is
essential for a high performing team. Consistent with such a view, this section will
outline some do and don’t for practitioners to follow. It may serve as a general
guideline for managers to refer to in applying the concept of diversity management to
daily management tasks.
REFERENCES
1. Mr.Abey Francis (October 26, 2017) MBA knowledge base, “ Leadership that creates
Innovation “
2. Mr. David A. Thomas (September 2004) in his article entitled “ Diversity as
Strategy “ in Harvard Business Review.
3. Azeminamasovic (2018) in his article entitled “ socio-cultural factors and their impact
on the performance of multinational companies”,Ecoforum, volume -7 Issue 1 (14)
2018.
3. https://www.socialtalent.com/blog/recruitment/10-companies-around-the-world-that-
are-embracing-diversity
4. https://www.mbaknol.com/management-case-studies/case-study-of-jack-welch-
leadership-that-creates-innovation/
5.https://www.mbaknol.com/human-resource-management/diversity-management/
6.https://study.com/academy/lesson/managing-a-diverse-workforce-in-contemporary-
organizations.html
7. https://en.m.wikipedia.org/wiki/diversity_(business)
www.ijmer.in 136
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Dr. R.Jayanthi
Professor,Acharya Bangalore B School
Dr.Rajesh.C
Associate Professor,Acharya Bangalore B School
Abstract:
The purpose of this study is to present an initial exploratory investigation on e-recruiting
and the role or relevance of social network sites (hereafter SNSs) during the process.
Particularly, the aim is to identify if companies use social media during their recruitment
processes to attract and screen application. Beyond the information generated through
the literature review, primary data were collected among recruiters in the city of
Bengaluru
The findings of this research endeavour indicate that using social media in recruitment
has a lot of benefits but also pitfalls of which recruiters should be aware. Furthermore, it
seems that the contemporary practice of employee screening through social media can
highly affect the hiring decision. On the contrary, a well-designed system and strategic
utilization of available information about potential candidates may significantly assist
the recruitment of employees with the most suitable skills and competencies.
Keywords: Employee screening, Employee Selection, Social networking, Recruitment,
Relevant skill
Introduction:
Talent management has played a decisive role in the success of any organisation. Being
a tech-intellect based business world today, finding the right talent hiring them and
retaining them has been a huge challenge. Talent acquisition with the right skill sets to
fill positions is a herculean task for HR recruiters. Moreover, the process of screening
resumes and shortlisting them turns out to be a waste of time when interviews are done.
To avoid this pitfall, many organisations are using social network sites to gather
information about the job applicant
The millennial workforce which out in the market is highly tech savvy and
communicative. Their presence is dominant in all the social media sites like Facebook,
Twitter, LinkedIn. Recruiters can post the available jobs on the websites and go through
the profiles and find a good fit. HR teams also form groups of former employees,
professionals’ acquaintances who can act as secondary connections of the job seekers.
Once a network is established, they can simply post the job openings in the status box –
this will ensure that all the groups will be notified about these announcements. They
can personalise their target viewers and groups as well. Social media hiring not only
enables a business to access a vast pool of potential talent, but it also helps HR recruiters
get to know a candidate before schedule an interview. HR professionals would be able
to gauge the candidates working style, interests, character traits, work ethics etc by
going through their profile well in advance before scheduling the interview.
www.ijmer.in 137
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Review of Literature:
Helena Pleinert, Bernhard Kolb (2015) in their study “Sourcing in Recruiting
Strategy and ROI with a focus on knowledge workers” speaks about the two main
recommendations concerning strategy and ROI optimization in sourcing in
recruiting, with a focus on knowledge workers, presented in this paper are Active
sourcing through cultivating talent communities and direct search can be likened to
the neolithic revolution: farming instead of hunting – more efficient, more effective
and more sustainable.
RESEARCH METHODODLOGY :
This study is Descriptive in nature and methods of Data collection were in two forms.
They are:
1. Primary data
2. Secondary data
Primary data : Primary data is of first hand data in nature and it does not exist
anywhere. It has to be collected as for the problem chosen. Survey methods and
questionnaires are some of the methods used to collect the primary data from the
respondents. The data thus collected from the primary sources of information are
arranged systematically and sequentially to form simple tables.
Secondary data Secondary data is that type of data, which already write and had gone
through some statistical analysis. Secondary data has been collected from various books,
internet downloads, business articles, journals, business periodicals etc.
www.ijmer.in 138
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Sampling:
Design: purposive sampling as recruiters who are into initial screening of candidates
were selected to identify if they used social media as well.
Size: 158 recruiters in recruiting agencies whose job profile is to select , source, screen
and shortlist the candidates were identified to give response. In most of the HR
consultancy, the recruiters were given autonomy to design their work and not restricted
to a specified process of recruitment depending on the client requirements.
This study is done to identify the effectiveness of social media in sourcing talent used in
various organizations. It identifies various ways to increase the effectiveness of sourcing
which in turn helps for entire recruitment cycle. This study also authenticates the use of
social media in identifying and selecting employees for an organisation.
Millennials are the ones born between 1985 to 1999. They are the majority workforce in
today’s organisation. The have unique qualities and they have redefined life and
products in their own way.
Some of the nature of these millennials are:-
They are loyal to brand
They are smart and calculated
Millennials grew up in the digital era. They utilize technology for everything—
grocery shopping, GPS, remote controls, communicating, working.
Their social media habits are also very unique. They divide into a lot of platform, some
platforms that should be high on your consideration list.
Facebook:- 87% of millennials use Facebook at least once a week. This number is
much higher than other generations—for example, only about 36% of Gen Z use
Facebook once a week. Facebook is has a heavy usage of this generation till now. It has
convivence of visuals, posts and texts.
YouTube: 86% of millennials use YouTube at least once a week. This number is huge,
especially when considering that video making and sharing has been very common
among millennials.
Instagram: 71% of millennials use Instagram at least once a week. Many younger
generations love platforms like Instagram for its lack of content and text. Two hundred
million users actively visit business profiles at least once a day.
Snap Chat, Twitter, Pinterest: 52% of millennials use Snapchat at least once a week.
Twitter is generally used for marketing purpose.
www.ijmer.in 139
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Table 1 can be interpreted as almost 50% of each gender of the respondents. This
finding revels that gender has no impact on the profession of recruitment.
Table 2 indicates the sectors in which recruiters are generally engaged in. there are
multiple fields that recruiters work in and that is the reason for higher total to be
depicted. The common industry the recruiters work are Health care, Hospitality /pharma,
Retail
Table No-3
External Source of recruitment generally used by companies (opinion by respondents)
www.ijmer.in 140
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
To a question asked if the recruiters use social media for sourcing employees, 38% of
them were negative, saying they do not use social network sites but majority of them
62% of them agreed to use SNSs as source of recruitment but majority of them agreed
to the fact SNSs were only used for reference checks and less for hunting candidates.
Once the candidates are shortlisted before final selection, some references of the
candidates are done on SNSs. 54% of respondents were of the opinion they do source
from SNS, LinkedIn, blogging, was the most popular SNS that were used to source
talent of particular type.
The above table depicts the common or popular social network sites, these sources are
also multiple that is at a given time recruiters tend to use more than one SNSs, the most
popular of them being LinkedIn and Blogs. They both being professional website
sourcing from them are credible. Most of the respondents were of the opinion that SNSs
are used for reference checks rather than sourcing.
Table No 6-Levels to be hired:
Level Number percentage
Executive level 38 24
Mid- level seniors 49 31
Entry level juniors 71 45
Total 158
www.ijmer.in 141
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
The above table depicts that entry level jobs are sources through SNSs, 45% agree entry
level jobs are sourced, and 31% of them feel SNSs are used for mid level jobs also.
Table No 7:- Relevance of competence acquired through social media
Degree number percentage
Irrelevant 12 7
Somewhat relevant 26 16
Just relevant 89 56
Highly relevant 31 19
Total 158
56% of respondents feel that they get ‘just relevant’ skills/competence through SNSs,
19% of them feel applicants are highly relevant, and 16% of them feel they are
‘somewhat relevant’. SNSs give info about applicant in adequate relevance to the
required job.
Table No-8: Candidates showed up for interview:
Number percentage
Yes 78 49
No 80 50
158
Table 7 indicates the response from the applicants sourced through SNSs. 49% of them
turned out for interview by cold calling potential candidates after being sourced through
various social network sites. This finding indicates that there is 50% chances that job
incumbent will take the interview call seriously and attend the same.
Table No-9 : Benefits of sourcing from social media:
Benefits number percentage
Less cost 32 20
Time saving 62 39
Relevance is high 10 6
Easy reach/communication 15 9
Easy selection process 7 5
Wider choice of applicants 29 18
Others (if any) 3 3
Total 158
The above table illustrates the benefits realised through acquiring candidates through
SNSs. Majority of then feel multiple benefits. But time saving and wide choice are the
common accepted benefits of the respondents.
Table no 10: Time taken to source/map a profile on social media
Timings number percentage
0 to 6 mins 0
7 to 12 mins 8 5
13 to 18 mins 69 43
18 mins 81 51
Total 158
www.ijmer.in 142
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Time taken to source or use SNSs of talent acquisition is not short, it takes more than 15
minutes for map or source candidates in the internet.
Table No-11:- Satisfaction towards hiring through Social media
Degree number percentage
Highly satisfied 32 20
Satisfied 73 46
Average 39 24
Inefficient 14 8
Total 158
Table 11 shows the satisfaction level of recruiters regarding information available for
sourcing through SNSs. 66% of them seemed to be satisfied about the available
information on the SNSs for talent acquisition, while 32 % of them feel inadequate and
average about the information available.
Chi-square testing:
H0: There is no significant difference in association between levels to be hired and
relevance of competency of the applicant
H1: There is significant difference in association between levels to be hired and
relevance of competency of the applicant
Table- 12 Chi Square test Cross tabulation
Level of hiring Relevance of competency of applicant
IRR SR JR HR total
Executive level 0 11 16 11 38
Mid level 5 9 21 14 49
Entry level 7 9 49 6 71
Total 12 29 86 31 158
It should be noted that the observed value of Chi-Square (X2) is 0.021 is less than the
critical values both at 5% and 1% level of significance, therefore the null hypothesis is
rejected. So, we can conclude that there exists statistically significant association
between the level of hiring and the competence relevant for the jobs.
Hypothesis 2-
Ho- There is no significant difference in association between relevant skill acquired and
satisfaction of sourcing through SNSs.
www.ijmer.in 143
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
H1- There is significant difference in association between relevant skill acquired and
satisfaction of sourcing through SNSs.
Table 14: cross tabulation :
It is observed that the test value 0.045 is less than 0.05 at 95% confidence level. Hence,
we reject the null hypothesis (H0) and accept the alternative hypothesis (H1). It is
inferred that there is significant difference in association between Relevance of skill
acquired and satisfaction level of hiring through social networking sites. Higher the
relevance of the skill acquired higher will be the satisfaction of the hiring team towards
social network sites as a sourcing tool for talent. The social network sites should have
relevant information about the right skill sets and competencies acquired by applicants.
Findings and suggestions:
Gender of the respondents was 49% and 51% respectively of men and women
The industry the respondents worked were Healthcare/Hospitality and Retail
Industry
62% of respondents were affirmative about using SNSs for recruitment of talent
LinkedIn and Blogs were the most popular SNSs sourced by respondents
56% of respondents feel that the skill/competence acquired through SNSs are ‘Just
relevant’
39% & 20% of respondents fell time saving and Cost are the major benefits of
sourcing through SNSs and most of them agree that they have a wide choice of
applicants
66% of the respondents are satisfied with using SNSs for sourcing their talent
There is significant association between ‘level of hiring’ and skill/competence
relevant to the jobs.
www.ijmer.in 144
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Higher relevance of skill acquired higher will be the satisfaction of the hiring team
towards SNSs.
Recommendations:
It is observed 66% are satisfied with information available in the social network
sites, to make a choice of the applicants. To increase the satisfaction level,
professional debates, discussions, and threads can be initiated in SNSs to increase
the visibility of skills and talents of the users.
Professional groups in the SNS can be initiated to make it easy for recruiters to
identify the applicant.
Conclusion:
Sourcing through social media cuts down on time and resources and allows employers
to schedule interviews quickly. Using social media empowers companies to step up their
talent acquisition strategy, build great talent networks and hire only the top candidates.
Social media are good measures to gauge and take references of the candidates even
before interviews are scheduled.
There is higher level of satisfaction towards the social media used when the competency
of the candidates is relevant to the job they are hired for. People should be aware and
cautious about what information they upload on there are social media as they are
subject to scrutiny of employers for references of the ideal jobs. It is likely that this
practice will increase among the recruiters of using social media as a source of talent
identification and acquisition.
Scope of further research:
This study highlighted on use of only SNSs, the study can be enhanced to larger
platforms of the digital economy
Artificial Intelligence is used to make recruitment and selection more precise and
accurate. A study on using this technology is also an emerging area of study.
References:
Dr. A Kumudha, Saranya Priyadarshini (2016), “A Conceptual study on challenges
173and Innovations in Talent Acquisition Process”, International Journal of
Advance Research in Computer Science and Management Studies, Volume 4, Issue
1, pg. 168- 173
Fred Reichheld (2015), “A study on perception of job seekers on recruitment
through social media application”, International Journal of Scientific and Research
Publications, Volume 4, Issue 3. 5.
Helena Pleinert, Bernhard Kolb (2015), “Sourcing in Recruiting Strategy and ROI
with a focus on knowledge workers”, IJTD, Volume 16, Issue 1. Ver. I , PP 14-22
Website:
www.recruiting.com
www.HR.com
Social Media in India- Statistics &Insights- www.techinasia.com/social-media-india
www.ijmer.in 145
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Anila Balan
Assistant Professor in Commerce, Sree Narayana College, Alathur,Palakkad
ABSTRACT
E-governce is the application of information and communication technology for
delivering government services, exchange of information, communication transactions
and integration of various sub alone systems between government to citizen ( G2C)
,government to business( G2B) ,government to government (G2G) , government to
employees(G2 E) as well as back office processes and interactions within the entire
government framework. Through E- governance, government services are made
available to citizens in a convenient,efficient and transparent manner.
The citizens of a country can choose how they want to interact with government. There
are, however, contradictions as to how citizens feel about using e government services.
According to researches there continues to be high expectations of governments in
respect of improved delivery of services and of close consultation with citizens. Such
expectations are not unique to one country. This indicates a possibility of
malfunctioning e-government services making continuous citizen perception evaluation
important.. The continuous evaluation of the present e-government systems is there-
fore necessary with the aim of improving these systems and indirectly satisfying citizens
and gaining citizen buy-in for improved access to e-government information services.
Hence, the present study “perception of customers on the e-governance through akshaya
centers” is undertaken to analyze the perception, awareness level and level of
satisfaction customers who approach akshaya centers for availing various government
services.
Key Words : E- governance, ( G2C), ( G2B), (G2G), (G2 E), e- government services,
akshaya centres
INTODUCTION
The ‘Akshaya’ has been a high profile project of the state government of Kerala, in
the southern- most state of India which has been hailed as one that has achieved
phenomenally high levels of ‘gender development’ compared to other states of India,
in terms of all the standard indicators of education and health. The current research
attempts an assessment of the Akshaya Project in the district of Malappuram in Kerala
where it was piloted in 2002-2003, in order to see if it has indeed been gender neutral
in its impact
As a citizen of this democracy, everyone is entitled to the fulfillment of certain
basic needs by the government. Physical resources have to be duly complimented by
an optimum communication infrastructure. The relevance of physical resources is
www.ijmer.in 146
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
The project focuses on the perception and awareness level of customers in akshaya
centers. The study will also reveal the quality of the services provided through
akshaya centers. For this study respondents are selected from valappad panchayath
only. It may provide an insight in to the satis- faction level received by customers
from the services. The result of this research will potentially contribute to the better
delivery of e-governance services, and its improved quality.
Objectives
The general objectives of the study are to evaluate the perception of the customers of
the akshaya centers.
www.ijmer.in 147
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
REVIEW OF LITERATURE
1.Murthy Narayana (2010)1, has published an article on “e-governance can help improve
accountability” IT major Infosys Chairman Narayana Murthy has said that the Indian
gov- ernment must take tough action against corrupt people and that e-governance has a
great potential to improve accountability. He said that by making the data of major
public pro- jects available online, corruption can be curbed and accountability enhanced in
the country.
2. Dwivedi Sanjay Kumar (2010)2, Bharti Ajay Kumar have published their article on
“egov- ernance in India – Problems and Acceptability. Governments and public sector
organiza- tions around the world are facing a lot of pressure to reform their public
administration organizations and deliver more efficient and cost effective services, as
well as better infor- mation and knowledge to their stakeholders. e-governance is the
effective use of ICT to improve the system of governance that is in place, and thus
provide better services to the citizens.
3. Driss Kettani, Bernard Moulin & Asmae Elmahdi (2009)3, have published their article
on “A framework to assess the impact of e-government systems on governance”. The
Fez- e-government Project aims to develop a pilot e-government system to provide the
munici- pal government of the city of Fez in Morocco with an advanced ICT platform
that enables online delivery of citizen-oriented services to the local community. The
1
Murthy Narayana, Infosys' Chairman, 2nd July 2010, The Times of India http://timeso-
findia.indiatimes.com/india/E-governance-can help improve accountability Narayana- Murthy/article
show/6119113.cms (2/7/2010).
2
Dwivedi. Sanjay Kumar, Bharti Ajay Kumar, Head, Department of Computer Science, Babasaheb Bhimrao
Ambedkar University, Lucknow (U.P.), India – 226025, Journal of Theoretical and Applied Information
Technology, July 2010 | Volume 17, No.1, Paper Id: 1311 JATIT-2K10, pp. 37-43.
3
Driss Kettani, BERNALD moulin & Asmae Elmahdi, Alakhawayn University, Infrane, MOROCCO,
and Laval University, Quebec, CANADA. http://www.loginaf-
rica.net/loginafrica/download/eFezmpactassessementframework.doc (20/7/2009).
www.ijmer.in 148
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
main research goals of this project include the elaboration of a road map to support the
development of e-government systems in Morocco and the assessment of the impact of
such systems on a Moroccan’s everyday life and on governance in general.
4. M. Ramchandran (2008)4, has published a research article on “e-Governance in
Munici- palities: A Boon”. According to M. Ramchandran the MMP on e-governance in
munici- palities focuses on improving the national element of citizen services by
defining service levels and outcomes; facilitating effective interaction between local
government, citizens and other stakeholders; improving the quality of internal
operations of the local govern- ment; enhancing transparency and accountability;
enhancing citizen interface and improv- ing service delivery to citizens.
DATA ANALYSIS
Chi Squire Test I
H0: There is no relationship between gender and sources of information regarding e-
governance
H1: There is a relationship between gender and sources of information regarding e-
governance
Chi-square table of sources of information regarding e-governance
4
M. Ramchandran, Secretary, Ministry of Urban Development, Government of India, egovernance,
Asia's First Monthly Magazine on e-Government, 05/8/2008.
www.ijmer.in 149
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
T- test- I
H0: There is no significant difference in perception about security of data among male
and female.
H1: There is significant difference in perception about security of data among male and
female.
Table showing Perception regarding security of data based on gender
Strongly Agree Neutral Dis agree Strongly
agree (4 points) (3 (2 points) disagree
(5 points) points) (1 point)
Male 8 15 1 1 0
3
Female 11 13 8 1 0
( 1) =3.81
( 2) =4.03
Calculated value of t = 1.13
Table Value =1.960
Decisi
on:
Calculated value 1.13<Table value 1.960
Calculated value is less than the table value. So, we accept the null hypothesis that
there is no significant difference in perception regarding security of data among male
and female.
T- test- II
H0: There is no significant difference in perception about clarity and simplicity of process
and procedure .among male and female.
www.ijmer.in 150
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
H1: There is significant difference in perception about clarity and simplicity of process
and procedure. among male and female..
( 1) =3.75
( 2) =3.48
Calculated value of t = 1.125
Table Value =1.960
Decisi
on:
Calculated value 1.125 < Table value 1.960
Calculated value is less than the table value. So, we accept the null hypothesis that
there is no significant difference in perception regarding regarding clarity and
simplicity of process and procedure among male and female.
www.ijmer.in 151
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Based on the analysis and interpretations made, it is clear that majority of the people are
aware and satisfied with various E-governance services provided government through
Akshaya Centres. The Akshaya project was introduced with the objective of helping
villagers in obtaining the services of government in a speedy ,reliable and efficient
manner. As the majority of the respondents agree that the fees charged by Akshaya
www.ijmer.in 152
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Centres for delivering various services are fair and their services are delivered without
any delay,it is clear that customers are satisfied with services of Akshaya Centres in
Valappad Panchayath. But measures should be taken to make its services more user
friendly and the staffs should be more efficient and experienced. For the purpose of
making it more convenient, counters and resources have to be improved. Akshaya
Centres provodes various e- governance services in the field of e- vidhya, e- payment
,online services etc,it is surely act as instrument for social and economic growth.
REFERENCES
Deloitte, & Touche. At the Dawn of e-Government: The Citizen as Customer
Deloitte Research. New York: Deloitte Consulting LLC, 2000.
M.Afanasjev, Lithuanian Institute of Public Administration, Procedeeing of
the 13th NISPAcee Annual Conference. "Democratic Governance for the XXI
Century NISPACee conference, Poland 25-27 may 2002.
Rosemary Jay and Angus Hamilton, (2003) Data Protection Law and Practice,
Sweet and Maxwell, London, 2003.
T.P. Rama Rao (2003), ICT and E-Governance for Rural Developments.
Roumeen, Islam (2003), Information flow and E-Governance.
Singh Amar Jeet & Sharma Mahinder Sharma, Hp University, Proceedings of
Interna- tional Conference on e-governance in 19- 21 December 2003,
Department of Manage- ment Studies, IIT, Delhi, pp.500-509
http://www.iceg.net/2003/pub/bookPromise.pdf (10/2/2007).
Perri, (2004) E-Governance Styles of Political Judgement in the Information Age
Polity, Palgrave Macmillan, June 2004.
Gilbert, D., Balestrini, P., & Littleboy, D. Barriers and benefits in the adoption of e-
gov- ernment. The International Journal of Public Sector Management, 286-301,
(2004)
Saxena, K.B.C. (2005) E-Governance initiatives.
Kovacic, Z. J. (2005). The Impact of National Culture on Worldwide e-Government
read- iness. Informing Science Journal, 8, 143-158.
Heeks, Richard (2005): Implementing and Managing E-Governance: An
International Text, London, Sage Publications. October.
Ch. Radha Kumari, Sri Satya Sai Institute of Higher Learning, Proceedings of
Interna- tional Conference on e-governance in 19- 21 December 2003,
Department of Manage- ment Studies, IIT, Delhi, pp. 420-427. (10/2/2007).
Mohammad Shakil Akther et al (2007) an E-Governance project in Bangladesh.
N. S. Kalsi, Ravi Kiran and S. C. Vaidyain (2008), Effective E-Governance for
Good Governance in India.
Mofleh, S., & Wanous, M. Understanding Factors Influencing Citizens Adoption
of eGovernment Services in the Developing World: Jordan as a Case Study
INFOCOMP - Journal of Computer Science, 1-11, 2008.
Gupta, D.N. (2008): E-Governance: A Comprehensive Framework, New Delhi,
Institute of Social Sciences in association with New Century Publications.
www.ijmer.in 153
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Introduction:
Within recent decades aquatic ecosystems have been altered at different scales,
and registered as negative consequences of anthropogenic activities (e.g., mining, dam
construction, artificial eutrophication, river canalization, and recreation). Detection of
resulting impacts on streams depends on the use of biomonitors combined with physical
(e.g., temperature, suspended solids) and chemical (e.g., nutrient levels, concentrations
of potential toxins) data (Dudgeon, 1994). The benthic macro fauna resides on or inside
the deposit of bottom soil and feed on debris. They play a vital role in the circulation
and recirculation of nutrients in aquatic ecosystem by accelerating the breakdown of
decaying organic matter into simpler inorganic forms. They also serve as food for a
wide range of fishes (Idowu and Ugwnmba, 2005).
Because of their sessile and sedentary behavior macrobenthos are known to be the
common indicators of time integrated environmental conditions (McLusky and Elliot,
2006). The community of benthic organisms is strongly affected by its environment,
including sediment and water quality, and hydrological factors that influence the
physical habitat. Because the macrobenthos are dependent on its surroundings, it serves
as a biological indicator that reflects the overall condition of the aquatic environment
(RAMP, 2017).
The variety and abundance of macrobenthos also vary with latitude, depth,
water temperature, salinity, locally determined such as the nature of the substrates, and
ecological circumstances such as predation and competition. Physical, chemical and
www.ijmer.in 154
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
biological qualities of water are some of the factors that influence species composition,
diversity, productivity and physiological conditions of local populations of a body of
water (Boyd, 1979). Macrobenthos are mostly found in the standing water body where
the concentration of organic carbon higher than the others. Environmental condition is
mostly responsible for the variation of benthos in different area those are substratum
type, food availability and predation (Dance and Hynes, 1980).
Macrobenthos communities are considered as a pollution index into the water
body where they live and the quantity of macro invertebrates vary with the change of
physiochemical factors and available habitats. Soft-bottom macrobenthos are used as the
tools of bio assessment due to some special characteristics such as limited mobility,
comparatively long life cycles and differential sensitivity to pollution of various types
and they reflect the impact of cultural eutrophication on aquatic habitats quite
satisfactorily (Gordon, 2000).
Material and Methods:
Study area:
The present study was carried out in the Sagar Tal, a perennial urban pond, a
small wetland in the outskirt of Gwalior City in Madhya Pradesh. Sagar Tal is a man-
made pond. It can be classified as non-drainage type artificial reservoir having regular
inflow of sewage water from nearby settlements without any outflow. The main source
of water is rainwater and sewage. The total area of the lake is 0.45 sq km. Area under
Temple and lawn is 22.37 hectare and area under scrubland is 24.56 hectare. The
boundary of the lake is artificially constructed into temple-like structures. The soil type
is loamy to sandy loam. Among the plants Prosopis species is very frequent. Besides,
there are numerous other species which are either natural or artificially planted. They are
Ficus infeltoria, Lantana camara, Bougainvillea etc. The average depth of the lake is 10
feet (Fig. 1).
www.ijmer.in 155
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Table 1: Checklist of Macro benthos with their presence status in Sagar Tal
www.ijmer.in 156
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 157
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
50 a Thiaridae Thiarids VR
51 Mud snail R
52 Apple snail VR
53 Basommatophora Lymnaeidae Pond snail VC
54 Planorbidae Orb snail C
55 Bivalvia Unionida Unionidae River mussel C
56 Corbiculidae Basket clams C
57 Sphaeriidae Pea clams VR
www.ijmer.in 158
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
36 Burrowing
Mayflies
37 Small minnow
mayflies
38 Flat-headed
mayflies
39 Prong-gilled
mayflies
40 Net-spinning
caddisflies
41 Long-homed
caddisfly
42 Water Moth
43 Alder fly
44 Dobsonfly
45 Shrimp
46 Prawn
47 Leach
48 Spider mite
49 River snails
50 Thiarids
51 Mud snail
52 Apple snail
53 Pond snail
54 Orb snail
55 River mussel
56 Basket clams
57 Pea clams
Total 14 06 10 11 09 08
www.ijmer.in 159
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 160
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
14% 21%
Very Rare
Rare
www.ijmer.in 161
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
3.5
3
2.5
2
1.5
1
0.5
0
2012-13 2013-14 2012-13 2013-14 2012-13 2013-14
Conclusion:
References:
Adedeji A., Adeniyi I.F. and Adetokunbo O.R. (2012): The sediment characteristic and
benthic macro-invertebrate fauna of some fish ponds in Ife north local
government area (LGA), Nigeria. International Journal of Fisheries and
Aquaculture, 4 (1): 7-12.
Boyd, C.E. (1979): Water quality in warm water fish ponds. Auburn University,
Agricultural Experiment Station, Auburn, Alabama, USA, 9-44.
Chakma, S. Rahman, M. M. and Akter, M. (2015): Composition and Abundance of
Benthic Macroinvertebrates in Freshwater Earthen Ponds of Noakhali District,
Bangladesh. American Journal of Bioscience and Bioengineering, 3(5): 50-56.
Dance, K.W. and Hynes, H.B.N. (1980): Some effects of agricultural land use on
stream insect communities. Environm. Pollut. Ser., 22: 19–28.
Dudgeon, D. (1994): Research strategies for the conservation and management of
tropical Asian streams and rivers. International Journal of Ecology &
Environmental Sciences, 20: 255-285.
www.ijmer.in 162
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 163
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
ABSTRACT
In this paper we present the main concepts of High Speed Packet Access Evolution
currently being standardized in 3GPP. In general HSPA Evolution consists of
introduction of MIMO, higher order modulation, and protocol optimizations and
optimizations for voice over IP. We describe these improvements in detail and show
that HSPA Evolution can reach performance comparable to those of Long Term
Evolution of UMTS Terrestrial Radio Access Network in a 5MHz deployment.
I. INTRODUCTION
The demands of packet data applications have resulted in several improvements over the
original WCDMA release 99. The downlink was improved in Release 5 with High
Speed Packet Data Access (HSDPA), which provided high speed shared channel with
fast link adaptation and scheduling, hybrid ARQ, and a short 2 ms transmission time
interval (TTI). The corresponding uplink enhancements were done in Release 6 with
Enhanced Dedicated Channel (E-DCH), which allow Node B controlled scheduling of
the uplink transmission, Hybrid ARQ, short 2ms TTI, and fast inter-cell interference
suppression.
Recently work has started to evolve the UTRAN with Long Term Evolution (LTE),
providing a new air interface. LTE will supporting flexible spectrum allocation from 1.5
MHz up to 20 MHz, and will provide significant performanceimprovements in
application performance and system capacity.
For operators with existing HSPA deployments, thepossibility to evolve HSPA should
provide an easy way to update the system. For this reason work on HSPA Evolution has
started in 3GPP. In this paper we will look at the main technologies used to evolve the
HSPA system, compare the reachable performance to the performance goals of the LTE
in 5 MHz bandwidth, and summarize the concept of HSPA Evolution. The performance
of selected technical improvements to the HSPA system has been evaluated in [4]. In
this paper we collect the various individual improvements to provide a comprehensive
overview of HSPA Evolution.
www.ijmer.in 164
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
TABLE I
SUMMARY OF PERFORMANCE GOALS FOR UTRAN LONG TERM
EVOLUTION
Performance metricGoal
The performance goals for the LTE of UTRAN have been agreed upon in 3GP [1] and
are summarized in Table I. In addition to the performance goals listed in Table I, LTE
should work with high mobility, provide large coverage, allow flexible spectrum
allocation, easy migration, and coexistence with earlier UTRAN releases. One of the
design goals for LTE work is to minimize the complexity by not allowing redundant
mandatory features or options. The performance of HSPA Evolution should target LTE
performance with two major differences: the bandwidth is limited to 5 MHz, and the
transmission time interval is 2 ms compared to 1 ms (with possibility to use only half a
TTI transmission for small amounts of data) for LTE. The longer TTI will not allow
HSPA Evolution to reach the User Plane latency target of LTE. The LTE target is 5 ms
one way delay from the UE to the edge of the radio access network. As a rough estimate
for the effect of the TTI on the latency, it is possible to assume that the UTRAN
network delays for HSPA Evolution are the same as for LTE. Then the impact of the
TTI on latency can be roughly estimated as
Latency_TTI = TTI alignment delay
+ TTI dependant TX processing
+ TTI
+ TTI dependant RX processing.
On average the TTI alignment is 0.5*TTI. For TTI dependant processing delay it is
possible to assume that the processing delays is in general less than one TTI, resulting in
the total dependency on the TTI as Latency_TTI = 1.5 – 3.5 TTI
Based on this we can expect that the user plane latency target for HSPA Evolution
should be 2.25 – 5.25 ms longer than the LTE target, which could correspond to a
possible user plane latency target of 10 ms for HSPA Evolution.
The effect of the smaller bandwidth can (in principle) be straightforwardly estimated by
assuming a similar spectrum efficiency for LTE and HSPA Evolution. This results in
peak throughput targets of 25 Mbps in downlink and 12.5 Mbps in the uplink.
www.ijmer.in 165
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
All other targets from [1] should in principle apply unmodified for HSPA Evolution as
well as for LTE.
III. TECHNIQUES
In this section we examine the techniques used to achieve targets derived in Section II.
A. MIMO
Increasing data rates can be achieved by transmitting multiple parallel transport blocks
to a single user. This is often referred to as Multiple Input Multiple Output (MIMO).
The preferred use for MIMO is in conditions with favorable signal-to-noise ratio
distribution and for channels with favorable correlation properties, e.g., small cells or
indoor deployments.
The receiver has the possibility to separate the multiple data streams by using the
channel properties and knowledge of the coding scheme. In order for the receivers to
solve this task it is necessary to standardize the used multi-layer transmission scheme.
The MIMO scheme chosen for HSPA evolution is based on the multiple codeword
principle allowing for transmitting two separately encoded streams to a UE. This will
facilitate the use of successive interference cancellation receivers which is expected to
boost the performance compared to linear receivers such as e.g. MMSE based receivers.
Hence the data on each stream is separately encoded, modulated and spread. The up to
15 spreading codes (of spreading factor 16), available for HSDPA, are reused over both
streams. Before transmitted on the antennas, the modulated and spread signal is spatially
weighted (pre-coded) using an unitary transform. The weights are taken from the same
codebook as used for closed-loop transmit diversity mode 1.
The link adaptation is a mix of spatial and temporaladaptation. For each TTI, or rather at
a rate set by the network, the UE reports the number of streams, the spatial weight
(precoding index) and transmission rate that it prefers. This information is used in the
Node B scheduler to select a suitable transport format. To inform the UE about the
actual parameters of a transmission, the downlink control channel, HS-SCCH, has been
adapted to incorporate MIMO information. At each TTI when a particular user is
scheduled, the Node B includes the used pre-coding weight, the number of streams and
the modulation used on each stream to the first part of the HSSCCH. For MIMO
transmission, two versions of the second part of the HS-SCCH exist. One is used for
single stream transmission containing the transport block size and HARQprocessing
information. When transmitting two transport blocks (dual stream) the same information
about the second transport block is also signaled. Since the information about number of
streams is allocated in the first part, the UE can use this information when detecting the
second part. HARQ is operating independent between the streams. Thus, each stream is
separately (not)-acknowledged and retransmission of not yet detected blocks can be
doneindependently between the two streams.
In order to introduce MIMO, the uplink signaling has been modified slightly. The
Release 5/6 HS-DPCCH has been
expanded to accommodate the new MIMO signaling. Since two transport blocks can be
transmitted, each with its own HARQ process, the HARQ ACK/NACK field of the
HSDPCCH has to be expanded to accommodate signaling for the second stream. In
Release 5/6 the ACK bit is repeated to 10 bits. For MIMO, pure repetition would give a
www.ijmer.in 166
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
code with Hamming distance 5. However, if the ACK/NACK is jointly encoded, a code
with Hamming distance 6 can be found [14].
The CQI evaluation is slightly modified compared to Release 5. The main reason for
this is the code-reuse interference term that is present when transmitting two streams.
Since this term will be dependent on the actual channel realization and code allocation,
only the UE can estimate the influence on the experienced SINR. However, since the
UE is unaware of the actual code allocation it will be given at the moment the CQI is
estimated, two different types of CQI has been defined.
The Type A CQI report is referred to as the preferred single/dual stream CQI, while
Type B reports are single stream CQI reports. The network can configure the reporting
period of these two CQI reports e.g. every second or third report may be of Type B. If
the network receives Type A reports indicating that the user prefers dual stream
transmission while the network may not have sufficient resources (power and/or codes)
to support dual stream transmission, the information in Type B reports can be used to
select the proper modulation and coding format.
To support precoding, the CQI reports also contain PCI (precoding control indication)
which indicates the preferred precoding vector for the primary stream. Due to the
construction of the codebook, the weight for the secondarystream is well defined. The
weights are taken from the closedloop transmit diversity mode 1 alphabet and consists
of phase shifts applied to the second antenna. The possible entries are given by
Fromthis, it is seen that if e.g. the first entry is preferred for the primary stream, only
one other entry exists giving an orthogonal weight for the secondary stream.
The possible gains achieved from MIMO can be found in Figure 1 where the 90th
percentile throughput is depicted.Further explanations and simulation assumptions are
given inthe next section.
Release 6 HSPA systems support the use of 16QAM in the downlink and QPSK in the
uplink. These modulation schemes may provide high enough data rates given the
received symbol SNRs of macro cell environments, however, for indoor or small-cell
system deployments, higher SNRs and higher order modulation (HOM) can be
supported.
Modulation and coding scheme (MCS) tables determine the best combination of
modulation and coding rate for a given SNR. With existing MCS tables, high symbol
SNRs may “max out” the choice of MCS, giving the highest order modulation with the
least amount of coding. As a result, these high SNR systems become peak rate limited.
Besides MIMO, another means to increase this peak rate is to extend the MCS tables
into higher SNRs with the introduction of even higher order modulations: 64QAM in
the downlink and 16QAM in theuplink. While HOM can be used in conjunction with
www.ijmer.in 167
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
MIMO, itis important in its own right in those cases where deployment of MIMO
systems is prohibited by physical, zoning, or budgetary limitations at the transmitter.
In the downlink, the MCS table would be modified to include 64QAM. While the
present downlink MCS table has a maximum rate entry of QPSK modulation with rate r
= 1coding (4 information bits per symbol) at 14.5 dB SNR, 64QAM with various
coding rates would be added to extend the table up to 64QAM with r = 1 coding (6
information bits per symbol) at 22.5 dB SNR. A proposed MCS table can be found in
the appendix of [6].
As presented in [6] and [7], an “SNR/rate-lookup” simulation was used to evaluate the
impact on throughput of introducing 64QAM and MIMO into the HSPA downlink.
This method allows an expedient yet accurate assessment of the radio link in question.
Essentially, this simulation consists of generating the appropriate channel realization,
determining a G-RAKE [8] or MIMO G-RAKE [9] combining weight solution as a
function of this channel realization, analytically calculating the output symbol SNR for
the each stream in the receiver, looking up the maximum supportable rate of the output
SNR from the MCS table, and averaging this maximum supportable rate over many
channel realizations (assumes ideal link adaptation).
While the MCS table gives us the modulation and coding scheme which is best for a
given operating condition, it doe not give us the transport format, which includes the
number of spreading codes employed. Throughout, we will assume that 15 spreading
codes are available at spreading factor 16, and all codes will be used by the UE. Further,
we assume 80% of the downlink power to be devoted to the high-speed data channel,
and 20% devoted to other (pilot channels, control channels,and voice channels). We
assume ideal timing recovery, delay,channel, and impairment covariance estimation. As
we are logging the maximum supportable information rate for a given realization, ideal
link adaptation is also assumed.
Figure 1. 90th percentile throughput in Pedestrian A channel for HOM and MIMO.
www.ijmer.in 168
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Figure 1 shows the 90th percentile throughput of the downlink for 1000 realizations of
the Pedestrian A dispersive channel [10], for systems employing techniques for peak
rate improvement. For purposes of comparison, SISO and SIMO systems are shown
employing the existing MCS table (16QAM). We can see that, as expected, the peak
rate with the addition of 64QAM increases to 21.6 Mb/s as compared to the 16QAM
case. The use of multiple receiver branches (SIMO vs. SISO) extends the benefits of
HOM into lower SNRs. MIMO with 16QAM doubles the peak rate to 28.8 Mb/s, while
thecombination of MIMO and 64QAM increases the peak rate to 43.2 Mb/s: essentially
giving a similar data rate as Long Term Evolution (LTE) in a 5 MHz bandwidth. While
the combination of MIMO and 64QAM are not proposed is the next 3GPP release, the
combination is being considered for future releases.
In the uplink, the introduction of 16QAM allows the peak data rate to reach about 11.5
Mbps, featuring an increase of 100% in peak rate compared with the enhanced uplink in
release 5, where the highest peak rate with QPSK is 5.74 Mbps with coding rate equal 1.
In the 3GPP study item on uplink HOM, 8PSK was also considered, however only
16QAM is part of the work item for introduction in release 7 because of the higher peak
rate and better performance for all rates whenHOM is used.
Link-level simulations are shown here to illustrate the data rates achievable with
16QAM. In order to reach such high rates in dispersive channels, the receiver needs to
suppress the interference generated by the code multiplexed channels (spreading factor
is equal 2 or 4). The receiver used is the GRake receiver [8] with 2 antennas. The
simulator models inner loop power control and HARQ with a maximum of 4
transmission attempts. The TTI is 2ms. The power settings are c β =0.446, ec β =0.233,
and ed β =1.16 for the DPCCH, EDPCCH and E-DPDCH, respectively. Transport block
sizes
821 from 6 000 to 22 000 bits are simulated. The receiver assumesknowledge of the
channel coefficients. More simulation details can be found in [11].
Figure 2 shows the throughput for the pedestrian A channel at 3 km/h as a function of
Ec/N0, where Ec is the total receiver chip energy and N0 is the noise power spectral
density. For rates lower than 4 Mbps, QPSK is more power efficient than 16QAM. As
the rate increases, 16QAM outperforms QPSK. Inthe region between 4 Mbps and 5.5
Mbps, although bothmodulations can reach those rates, 16QAM uses more realistic
coding rates and is more power efficient. Note that at 5 Mbps, the coding rate is 0.86 for
QPSK and 0.43 for 16QAM. Rates higher than about 5.7 Mbps can be reached only
with 16QAM.
The high rates provided by 16QAM are reached at high power and therefore the likely
scenario for uplink HOM is when the user experiences favorable channel conditions.
The impact on 3GPP specifications for supporting uplink HOM concerns mostly the
physical layer and is expected to be minor. Changes will involve support for additional
signalling and larger transport block sizes. The need for an improved phase reference to
enable high rate transmission with 16QAM is currently under discussion in RAN1[12].
In Layer 2 specifications, the transport block size tables will be modified.
www.ijmer.in 169
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 170
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
In the uplink, the RNC can configure the UE to transmit discontinuously the power
control commands (on DPCCH). The base station can also enable the uplink
discontinuous transmission with a physical layer command. The UE will autonomously
enter the discontinuous transmission mode, in which there are two transmission cycles
UE_DTX_cycle_1 and UE_DTX_cycle_2. The latter is used whenever there is no
uplink data transmission activity, whilst the former is applied depending on the duration
of E-DCH inactivity. This allows uplink DPCCH transmission to adapt to the data
transmission activity. Similar to the downlink discontinuous reception, the uplink
discontinuous transmission will allow the UE to enter power saving mode between
uplink transmissions. In addition, the reduced power control transmission will reduce
the uplink interference, and increase the system capacity.
The uplink discontinuous transmission will only impact the transmission of the power
control commands. At any point of the time, the UE is able to transmit higher layer data
(e.g. signaling or user plane data). The actual transmissions are followed by a preamble
and a postamble to maintain correct power control level. However, it is also possible to
configure discontinuous reception, for example, if the base station would like to share
the receiver units between several discontinuously transmitting users. In that case the
possible time instances forinitial uplink transmission after the UE has entered
discontinuous transmission are restricted. The “HS-SCCH-less transmission” allows
initial transmission of small packets without scheduling the UE with the HS-SCCH in
advance. The retransmissions are still scheduled and thetransmission formats are
restricted to fourdifferent transport block sizes.
If the UE does not detect HS-SCCH, it will try to decode the packet received on HS-
DSCH. If the reception is successful, the UE will send a HARQ ACK. If the reception
does not succeed, the UE will store the received soft bits, but will not send a NACK.
For subsequent retransmissions, both ACK andNACK signals are transmitted normally,
and thus the retransmissions do not require blind detection. For simplicity the number of
retransmissions is limited to a maximum of two retransmissions.
The packets are protected with a 24-bits long UE specific CRC. In addition, the UE
continues to attempt reception of the legacy HS-SCCH in the configured HS-SCCH set.
To get the full advantage of the increased bit rates offered by MIMO and Higher Order
Modulation, focus in HSPA evolution is also to improve signaling and state transition
performance in the system, following the analogy: “What is the use of a highway if it
takes too long to reach it”? Analysis in [13] has shown that the setup delays and channel
switching times in WCDMA considerably affect the user perceived performance, and
that the use of HSPA for transport of the signaling messages can significantly decrease
the delays.
Another observation is that the control signaling and synchronization overhead of
moving a user to CELL_DCH state, where dedicated or shared channels with high bit
rates are available, is significant for small amounts of data. As a result of these
findings, a new work item was started in 3GPP to enable the use of HSPA also in the
www.ijmer.in 171
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
CELL_FACH state, where UEs with lower activity typically camp, to improve packet
data and signaling performance when common channelsare used.
In Enhanced CELL_FACH operation, HSDPA is activated also for users in
CELL_FACH. Connected UEs in CELL_FACH monitor the HSDPA control channels
for scheduling information with their user specific identity (HRNTI), much in the same
way as in CELL_DCH. The difference is that in CELL_FACH, no dedicated uplink
channel exists. This means that continuous transmission of Channel Quality Indicator
(CQI) and HARQ feedback will not be supported, and that link adaptation and HARQ
need to be modified. Link adaptation will be based on measurements provided in the
Radio Resource Control protocol (RRC) on the random access channel in the uplink,
and HARQ will be replaced by blind repetition on MAC. Simulations in [5] haveshown
that with link adaptation based on initial CQI and fixed number of repetitions, average
throughputs in the order of 300- 500 kbps can be achieved.
Another feature of Enhanced CELL_FACH is the target to have the same layer 2 header
format as in CELL_DCH, described in section E. This means that data transmission can
continue uninterrupted on the user specific H-RNTI during the channel switch
procedure between CELL_FACH and CELL_DCH, and provides a significant
improvement in the user perception compared to the current solution, where data
transmission is suspended during the channel switch. The work item also includes an
option to transmit paging messages on HSDPA. Most aspects and definitions of the
paging procedure remain as specified in Rel-6, e.g. usage of paging indication, paging
occasions, paging groups, pagingmessage format etc. When the paging indication has
been given for a certain paging group, the UEs of that group start to monitor the
HSDPA control channels for a common H-RNTI used to schedule the paging message.
The benefit with this approach is that it can be extended to support also
datatransmission to users in the cell paging state (CELL_PCH), without the need of first
moving the users to CELL_FACH with the Cell Update Procedure. This way, latency
and especially control signaling overhead for delivering background traffic to inactive
UEs is reduced.
It is known from work on HSDPA (e.g.[2]) that the Acknowledged Mode RLC
downlink peak data rate is limited by the RLC PDU size, the RLC round trip time
(RTT) and the RLC window size. For reasonable RLC PDU sizes, such as 320 or 640
bit, the RLC protocol can not sustain the peak data rate of the physical layer in HS-
DSCH, let alone the peak data rate targeted for HSPA evolution. There are several
solutions to solve this protocol stalling problem, such as increasing the RLC PDU size
or sequence number space. However, a slightly different approach, Flexible RLC, has
been adopted for Rel-7.
The Flexible RLC concept is based on the Packet Centric RLC concept presented in [3]
with necessary modifications to fit the specific properties of HSPA evolution. In [3] it
was proposed that the RLC PDU size could be variable such that the PDU size is
selected to exactly match the incoming SDU size (e.g. IP packet). This allows for high
peak data rates since the IP packet size for high data rate applications typically is large
www.ijmer.in 172
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
and results in low header overhead and completely eliminates the padding that is present
in Rel-6 due to the fixed RLC PDU size. The difference in overhead between fixed and
flexible RLC PDU sizes is shown in Figure 3 with the RLC headersizes taken from the
Rel-6 RLC protocol. As can be seen, theflexible RLC solution provides lower overhead
for all SDU sizes. The relative improvement in terms of padding is particularly large for
small SDU sizes when an SDU segments unfavorably into a fixed RLC PDU.
Figure 3. The sum of the padding and header overhead relative to the IP packet size for
fixed and flexible RLC PDU sizes.
In HSPA evolution the RLC segmentation possibility is kept, and the RLC SDUs are
segmented if the SDU size exceeds an upper limit. The main reason for this is to
increase the retransmission efficiency in cases of MAC HARQ failure. Segmentation
has been introduced in MAC such that the RLC PDUs are segmented into MAC PDUs
with size that is adapted to the momentary radio conditions. It would appear natural that
RLC directly creates RLC PDUs with a size adapted to the radio conditions. This is,
however, not feasiblesince the momentary radio conditions are not known in RLC. Rel-
7 also introduces the possibility to multiplex data from different radio bearers in the
same TTI through MAC multiplexing which increases the resource efficiency for
mixedservice scenarios.
IV. CONCLUSION
www.ijmer.in 173
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
REFERENCES
[1] 3GPP TR 25.913, “Requirements for Evolved UTRA (EUTRA) and Evolved
UTRAN (E-UTRAN)”.
[2] H. Ishii et al. “Effects of UE capabilities on high speed downlink packet access in
WCDMA systems”, Proceedings of the VTC 2004 Spring.
[3] H. Ekström et al. “Technical solutions for the 3G longterm evolution”, IEEE
Communications Magazine, v. 44, March 2006, pp. 38 – 45.
[4] E. Dahlman et al. “The 3G Long-Term Evolution – Radio Interface Concepts and
Performance Evaluation”, Proceedings of the VTC 2006 Spring.
[5] R1-063339, “Further analysis of HSDPA in CELL_FACH state”, Nokia, 3GPP
TSG-RAN WG1 Meeting #47
[6] Ericsson, “64QAM for HSDPA – Link-Level Simulation Results,” R1-062264,
3GPP TSG-RAN WG1 Meeting #46, September, 2006.
[7] Ericsson, “64QAM for HSDPA – Performance with Realistic Algorithms,” R1-
063499, 3GPP TSG-RAN WG1 Meeting #47, November, 2006.
[8] G. E. Bottomley, T. Ottoson, and Y.-P.E. Wang, “A generalized RAKE receiver for
interference suppression,” IEEE Journal on Selected Areas in Communications, vol. 18,
pp. 1536-1545, August 2000.
[9] S. J. Grant, K. J. Molnar, and G. E. Bottomley, “Generalized RAKE receivers for
MIMO systems,” Proceedings of the VTC 2003 Fall.
[10] 3rd Generation Partnership Project, “UE Transmission and Reception,” TS 25.101
v7.4.0, June, 2006.
[11] R1-062266, “16QAM for HSUPA – Link-Level Simulation Results,” Ericsson,
3GPP TSG-RAN WG1 #46
[12] R1-070415, “Enhanced Phase Reference for 16QAM’, Qualcomm, Ericsson, 3GPP
TSG-RAN WG1 #47-bis.
[13] 3GPP TR 25.815, “Signalling enhancements for Circuit- Switched (CS) and
Packet-Switched (PS) Connections”
[14] R1-062879, “Coding for ACK/NACK in MIMO operation”, Ericsson, 3GPP TSG-
RAN WG1 Meeting #46bis.
www.ijmer.in 174
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Introduction
India is one of the fastest growing countries in terms of mobile user. Now
mobile phones are not only a medium of voice communication but also widely used for
mobile services. Mobile based services or M-services are defined as electronic services
that are delivered to the consumers via mobile technologies using mobile devices. M-
services is limited concept of E-services which is able to provide services anywhere at
any time. Investments in M-services are growing and these services stand to offer the
promise of creating a social impact in the area of healthcare, agriculture, financing,
governance, education and banking. The m-banking is fast growing with its multitude
features offered with mobile apps. Indian Banking Association is urged to heavily invest
in technologies that can evolve and protect against future threats, as well as tackle
current pressures from malware and social engineering. The Reserve Bank of India
(RBI) has given approval to 80 banks to start mobile banking services, which includes
apps and 64 banks have commenced operations. Users are becoming more comfortable
doing banking transaction with their smart phones. With the increase of trend in m-
banking new users shows more confident in banking on mobile applications in their
handsets. The rapidly growing users and wide variety of mobile phone network service
providers have made this channel an important platform for extending banking services
to customers. Moreover, banks are using these mobile phone applications as an
alternative channel of delivery of banking services.The top five mobile banking apps
www.ijmer.in 175
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Objectives
To analyse the reasons for using M Banking applications by the respondents.
To find out the factors to be improved in mobile banking app services.
To evaluate the mostly used m- banking application services by the respondents
Hypothesis
H0: There is no significance relationship between type of bank and customer
satisfaction on service provided to m banking application
Research methodology
The data for the study is collected from both primary and secondary sources.
The primary data for this survey are collected from 143 banking customers using
Google Forms .Random sampling methods was used for the selection of respondents.
We have done online survey with the help of Google Forms where the questions are
uploaded and their response has been taken into Google Sheet.The secondary data was
collected from various published books, journals and websites. Both descriptive and
analytical study was conducted for the study. The statistical data analysis was conducted
using percentage analysis, mean comparison test, Likert’s scaling technique and Chi
square test.
Limitations of the study
This study focused only technology enabled banking services, which is available
in mobile banking applications only. The study had not discussed technology
enabled banking services available in internet banking and its quality and safety
perception of customers compared to mobile banking apps.
www.ijmer.in 176
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
The method used for data collection was a survey method using a questionnaire.
Researchers have limitations with this kind of data collection, because of low
response rate, complex and confusing questions and surveys that might be too
long.
Review of Literature
B. Arthi and E. Kavitha (2018) conducted a study on customer satisfaction
towards Mobile Banking. The study found that banks conduct financial services
through wireless and instant as per the convenience of customers between smart
phone and tablet. Mobile banking penetration in the country is greater than the
global average of 40% at more than 50%. The customers are more concerns about
the security and risk associated with technology adoption.
Suoranta.M (2016)iin her descriptive research approach tried to determine the
dimensions regarding adoption of M-Banking apps. The M-Banking technology
adoption model explains that age and education among the several demographic
variables have an influence on the adoption of mobile banking application services.
Further, relative advantage, compatibility, communication and trial ability are
influencing factors on the adoption of M-Banking apps. But, complexity, security
and trust worthiness of m-services are not major obstacles for adopting M-Banking
apps.
Analysis of data
Table 1
Gender wise classification of respondents
Gender Frequency Percentage (%)
Male 85 59%
Female 58 41%
Total 143 100%
Source: Primary data
Interpretation: Table1indicates that 59% of the respondents are male and remaining
41% are female. Out of 143 respondents 85 were male and 58 were female. Majority of
the respondents are male.
Table 2
Amount of transaction by using M-banking apps per month by respondents
Amount Frequency Percentage (%)
Less than 1000 43 30
1000-2500 48 34
2500-5000 16 11
5000-7500 6 4
7500-10000 8 6
10000 and above 22 15
Total 143 100
www.ijmer.in 177
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Interpretation:
Table 2 analyse the amount of monthly transaction using mobile banking applications.
From the study it is clear that 34% of respondents are carrying monthly transaction in
between 1000-2500 rupees using mobile banking applications. Only few are comes
under the category of 5000-7500 and 7500-10000 rupees.
Table 3
Descriptive statistics on
Reasons for using Mobile banking apps by respondents
Sl.no Reasons Mean SD MPS Decision
1 Time saving 4.42 .745 88.4 Agree
2 Convenience 4.38 .649 87.6 Agree
3 Easy to pay 4.32 .853 86.4 Agree
4 Usefulness 4.32 .600 86.4 Agree
5 Reliability 4.27 .704 85.4 Agree
6 Easy to learn 4.25 .755 85 Agree
7 Security 4.25 .746 85 Agree
8 Satisfaction level 4.22 .586 84.4 Agree
9 Easy to use 4.10 .802 82 Agree
10 Easy to access 4.08 .586 81.6 Agree
Source: Primary data, using SPSS version 17.00
Interpretation:
The table 2 shows that the highly viewed reasons for using M-Banking app services
among the respondents is times saving since its mean score is 4.42 and mps 88.4
receptively. Along with it; time saving, convenience, easy to pay, usefulness are some
of other reasons for preferring M-Banking applications as compared with traditional
method of banking.
Table 4
Mostly used M- banking application services by the respondents
Sl.no Services Mean SD
1 Balance checking in the 2.90 1.681
account
2 Domestic fund transfers 2.55 1.626
3 Bill payment processing 2.31 1.709
4 Mobile recharging 2.31 1.540
5 Access to card statements 1.33 1.393
6 Commercial payment 1.12 1.568
processing
www.ijmer.in 178
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Yes No Yes No
1 Wide range of services 122 21 85 15
2 Improved security 117 26 82 18
3 Better education 119 24 83 17
4 119 24 83 17
Better integration of mobile
and online services
5 112 31 78 22
Cheaper subscription
No Yes
Interpretation:
Table 5 depicts that majority of respondents that is 85% are in the opinion that mobile
banking application services can be improved by providing wide range of services
www.ijmer.in 179
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
within the application. Only 78% of respondents are in the opinion that subscription
need to be cheaper.
Testing of hypothesis
www.ijmer.in 180
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Interpretation:
On test it is found that null hypothesis (H0) is rejected in bill payment processing,
mobile recharging, cheque book and card requests, commercial payment processing and
access to loan statements as its p values are .019, .004, .005, .004 and .006 which are
less than .05(p<.05). Hence it is concluded that there is a significant relationship
between type of bank and satisfaction level of customers in using these mobile banking
application services. Null hypothesis is accepted in all other variables which includes
mini-statements and checking of account history, balance checking in the account,
domestic fund transfers, PIN provision, Forex Services, Transferring accounts, Access
to card statement, mutual funds / equity statements, insurance policy management and
real-time stock quotes since its p values are.922, .361 .056, .310, .422,
.260,.641,.140,.110,.578 respectively are greater than .05(p>.05).
www.ijmer.in 181
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
Findings
From the study it is clear that 34% of respondents were carrying monthly
transaction in between 1000-2500 rupees by using mobile banking applications.
Only 4% and 6% were comes under the category of 5000-7500 and 7500-10000
rupees.
All the respondents were agreed that time saving, convenience, quickness, easy to
pay, usefulness, reliability, easy to learn, security, satisfaction level, easy to use,
and easy to access were the reasons for using the mobile banking applications.
Among them highly viewed reasons for using M-Banking app services among the
respondents is times saving since its mean score is 4.42.
The study reveals that among m-banking app services mostly used mobile
banking application service is balance checking in the account since its mean
value is 2.90. Least used mobile banking application service forex services and its
mean scores is 0.63.
All the respondents have agreed that all the services provided by the banks for the
smooth functioning of the mobile banking applications were effective. The
accurate performance of the services at the first time its self by the bank is least
effective since its mean percentage is 72.4%.
Suggestions
The acceptance level of M-Banking apps is found to be moderate among the various
groups of the customers in the public and private sector banks. They have to put
extra efforts in popularizing m-banking application services amongst their
customers. So, Banks should take proper steps to organize more seminars,
workshops, and other awareness programs in order to create awareness in the minds
of the customers regarding the M-Banking applications.
The banks must confirm secure financial transactions through recent technological
advancements under M-Banking applications. It creates and increase
confidentiality, integrity, and reliability to ensure customer acceptance.
It will be better if the banks could provide financial services to the customers based
on their regional language under M-Banking applications.
Conclusion
Banks are constantly adopting technology to expand its business and to reach
different level of customers. Apart from ATM, Internet banking and other technology
enabled services Mobile Banking applications is one of the services provided by banks
to its customers. The present research, ‘study on the effective usage of mobile banking
application among its customers’ attempts to measure the overall effectiveness of
mobile banking application services with regards to usage and customer satisfaction.
With the view point of customers it was able to understand that how they are satisfied
with the mobile banking application services, how they measure the effectiveness of the
services provided by the banks for the smooth functioning of the mobile banking
www.ijmer.in 182
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
application etc.For improving its services banks will have to become more customers-
centric, offering a wide range of financial products through M-Banking apps that would
bring financial inclusion.
References
www.ijmer.in 183
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 184
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 185
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 186
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 187
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 188
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 189
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 190
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 191
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 192
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 193
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 194
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 195
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 196
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 197
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 198
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 199
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 200
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 201
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 202
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 203
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 204
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 205
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 206
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 207
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 208
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 209
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 210
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 211
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 212
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 213
INTERNATIONALJOURNAL OF MULTIDISCIPLINARYEDUCATIONALRESEARCH
ISSN:2277-7881; IMPACT FACTOR :6.514(2020); IC VALUE:5.16; ISI VALUE:2.286
Peer Reviewed:VOLUME:9, ISSUE:5(3), MAY:2020
www.ijmer.in 214