Monday, September 30, 2019

Importance, Highlights of the 20th Century English Literature

The Importance of the 20th Century Literature The dawning of a new century marked a distinct change in the style and subjects of literature. Rural, agrarian lifestyles were fast becoming a thing of the past as industrialization made factory work the norm, and many people began to feel isolated despite living in big cities. Writers who identified as â€Å"modernists† reflected this new sense of isolation and displacement in their works. The entire Western world was also deeply affected by the devastation of World Wars I and II, and writers responded by evaluating humanity's seemingly boundless inhumanity.Women and minority voices became more prominent in the 1930s and beyond, further expanding the canon. The Beat Generation began in the late 1940s and writers reflected the growing trend of anti-conformist thought. By centuries end, Generation X writers were inspired by the fall of the Berlin Wall and the decline of imperialism but were often seen as cynical and self-serving. Th e material, intellectual and social advancements of this century, has led to literary pieces made in the 21st century.There will no doubt be lasting effects from the twentieth century that will surely have a direct influence on the political, social and interpersonal relationships that develop from now on. The use of the label â€Å"Celtic fringe† as applied to non-English, or traditionally non-English-speaking, territories to marginalise these cultures is now analysed as a colonial attitude, and literatures of Ireland, Scotland and Wales may be studied through the methodology of postcolonialism.But a legacy of Britishness also survives around the world: a shared history of British presence and cultural influence in the Commonwealth of Nations has produced a substantial body of writing in many languages, known as Commonwealth literature. The year 1922 marked a significant changed in the relationship between Britain and Ireland, with the setting up of the Irish Free State in t he predominantly Catholic South, while the predominantly Protestant Northern Ireland remained part of the United Kingdom.This separation also leads to questions as to what extent Irish writing prior to 1922 should be treated as a colonial literature. Nationalist movements in other parts of Britain, especially Wales and Scotland, also significantly influenced writers in the twentieth and twenty-first centuries. During the 20th Century, much advancement and change occurred throughout English Literature. All of the works we studied from this period were heavily influenced by current events in the world.The writers all examined the world around them and tried to express it through their writings. The three things that weave a common thread throughout all 20th Century English Literature are global warfare, radical artistic experimentation, and the effects of colonial expansion. The first point of global warfare is an easily identifiable and widespread one. All of the poetry we examined w as centered around warfare and the effects of it on those involved. Sources: http://www. enotes. com/topics/century-literature http://en. wikipedia. org/wiki/British_literature

Sunday, September 29, 2019

Lead Change Ba

lead Leading Change – British Airways case: references MBA 2013 Core Grugulis, I. , Wilkinson, A. (2002) Managing Culture at British Airways: Hype, Hope and Reality. Long Range Planning, 35, 2, 179-194. Kotter, J. (2007) `Leading Change: Why Transformation Efforts Fail’, Harvard Business Review, January 2007, pp. 96 – 103 Recommended Beer, M. & Nohria, N. 2000, â€Å"Cracking the Code of Change†, Harvard Business Review, vol. May-June, pp. 133-141. Vermeulen, F. , Puranam, P. & Gulati, R. 2010, â€Å"Change for Change's Sake†, Harvard business review, vol. 8, no. 6, pp. 70-76 Supplementary Burnes, B. 2004, Managing Change, Fourth edn, Financial Times/Prentice Hall, London. Grey, C. 2003, â€Å"The Fetish of Change†, TAMARA: Journal of Critical Postmodern Organization Science, vol. 2, no. 2, pp. 1-19. Jick, T. D. & Peiperl,M. A. (2003) (2nd edn) `Managing Change: cases and concepts’, Boston: McGraw-Hill (pp 26-44) Kegan, R. & Lahey, L. L. 2001, â€Å"The real reason people won't change†, Harvard Business Review no. November, pp. 84-92. Kotter, J. P. (1996) Leading change, Boston, Mass. Harvard Business School Press (658. 406) 4 copies in UniS library, and available as an e-book Morgan, G. 2006, Images of Organization, 4th edn, Sage, London. Robbins, H. and Finley, M. (1997) Why Change Doesn’t Work, London: Orion Business Books (out of print, sections 1,2, and 3 are available at http://mfinley. com/bizbooks/list-changebook. htm) Watzlawick, P. , Weakland, J. , & Fisch, R. 1974, Change: principles of problem formation and problem resolution W. W. Norton & Co. , New York.

Saturday, September 28, 2019

Air Pollution Coursework Example | Topics and Well Written Essays - 250 words - 6

Air Pollution - Coursework Example This essay explores significant impacts global warming has. First, increase in global temperature can accelerate the melting of polar ice, and this can result in flooding of coastal areas. In addition, global warming can affect crops by upsetting their optimal temperature. Perhaps most significant, global warming can cause an increase in pests or diseases that can affect crops and animals. Other economic areas such as tourism that rely on snow such as Alpine regions will also suffer due to global warming. Reducing carbon emissions is one of the best approaches to reducing global warming. Many factors cause global warming, but carbon emissions are the most significant causal factor. To reduce global warming, industrialized nations and developing nations must cut down on their carbon emissions by reducing reliance on fossil fuels. This will call for a shift from the use of fossil fuel such as coal and oil to the exploitation of green energy such as solar and hydropower. This strategy c an help reduce the rate of global warming.

Friday, September 27, 2019

Environment and Sustainable Development Assignment - 1

Environment and Sustainable Development - Assignment Example This ensures that all life forms are equitably taken care of and extinction of certain species is eluded (Williamson 12) . Assist the government and corporations as well as the public to make strides in utilization and full beneficial access from natural resources. By doing so they ensure that there are maximum use and colossal benefits from the environment mutually. The role of environmentalist relates to the various techniques taught in class such as botanical and zoological conservation methods to delve into the core role of environmental conservation. Subsequently, every approach was undertaken in class in terms of practical work links in unison to the practical approach undertaken by environmentalists. The interview conducted involved an expert in the environmental field. Name; Contact no: The main method of interview used was question and answer and from the results achieved the report was written. Preceding the tour of an environmental based scene/ zone it was evident that conservation of the species was paramount among all (the basis of our class topics-conservation of an environment). Furthermore, there was clear evidence of improvement in the sustainability of the environment in various ways such as aquariums of indigenous fish species as a way of protecting them.  Ã‚  

Thursday, September 26, 2019

Supply chain manage Case Study Example | Topics and Well Written Essays - 750 words

Supply chain manage - Case Study Example All the parties will be happy and co-exist and eventually the supplier can even be the sole supplier. Bose uses the purchased items to make finished products of audio premium speakers for different companies which deal with automobiles, high fidelity systems and both consumer and commercial broadcasting systems. These final products are not for local use only but are supplied to other foreign nations as well. Since they are also not the only ones in the market making these products, they need to ensure that their final products meet the highest quality standards in order to not only beat the competitors but retain their customers as well. This therefore means that the products they purchase must be of the highest quality possible if they are to achieve the above mentioned goals. Quality raw materials always leads to quality finished products and this is the logic that Bose as a company employs when purchasing quality goods. Certification means that the supplier company is well qualified to handle the supplies according to the instructions of the customers. Bose Company is very specific and very demanding of its suppliers even to the extent of having them fill inventories and have a performance system which is used to evaluate them. If this same strict company on performance of the supplier is the one handling the certification, it means that the suppliers are really qualified in proving their supply work. Bose wants to ensure that suppliers are really taking their performance systems seriously which in turn mean that company is taking care of delivering on time and make improvements when their customers demand some areas to be improved. Handing certification is also a sign of appreciation on the part of Bose Company as the supplier company that is certified has gone an extra mile of improving all their services in case of complains or abides fully to the suggestions provided by

Wednesday, September 25, 2019

Psychological influences on health and wellbeing Case Study

Psychological influences on health and wellbeing - Case Study Example Anna’s late biological development, in her puberty, is another biological factor to her condition. Delayed development in her body induced a sense of inferiority complex and developed a social barrier between her peer and her. Poor interpersonal potentials, low self-steem, and inferiority complex are however social factors to her condition. She was not able to relate with her peer at school, had a poor self-opinion about her, and these caused a social gap that induced the condition. One of the effects of Anna’s cognitions of her state during high school was acceptance and ownership of the problem. In identifying anxiety with her uncle, other relatives, and her sister, Anna perceived it as a normal thing, at least within her family, and this could have reduced her efforts in dealing with the problem. When she identified anxiety and alcoholism in her uncle that led to his mobility across jobs, Anna perceived fault in her uncle’s drug problem and not the anxiety problem, an indicator that she overlooked associated problems with anxiety because of the condition’s existence in her family. Recognizing that she was cognitively and physically fine is another factor that contributed to her problem at early adulthood by limiting her from external help. This is because she believed that based on her cognitive potentials into outstanding academic performance and active engagement in physical activities; she could solve the anxiety problem on her own. Anna’s decision to be excluded from physical education identifies one of the interactions between her emotions and her lifestyle. Feelings of inferiority complex from which she identified herself as awkward and unskilled influenced her decision to seek her parents’ intervention so that she could not participate in physical education, and hence physical activities. Anna also led a quite lifestyle in school, especially in class, and her emotions caused this. Based on her delayed physiological

Tuesday, September 24, 2019

Strategic Management Essay Example | Topics and Well Written Essays - 2500 words - 4

Strategic Management - Essay Example This report analyses the industry as well as the company with the help of the various strategic tools like the SWOT Analysis, PEST, Porter’s Five Forces, Porter’s Generic Strategies as well as the Ansoff Matrix. These would provide an insight to the feasible strategic alternatives that are available to the company which would help the company survive in the long-run. Contents Contents 2 Introduction 4 Strategic review 5 Industry Competition 10 Suppliers 11 Buyers 11 New Entrants 11 Substitutes 11 The Generic Strategies 12 Conclusion and Strategic Options 13 Introduction Hutchison Whampoa Limited is a group of companies that has a number of operations across different countries of the world. The company is highly committed to the development of technology and innovation. The brand has international presence in almost 52 countries of the world. 260000 people comprise the human resource strength of the organisation. The company has a customer base of 23.5 million as on 201 2 which is experiencing and upward trend since its inception. The company is listed in the Hong Kong stock exchange and has a high market capitalisation. The six main areas where the company’s businesses are specialised are the telecommunications, infrastructure, property and hotels, ports and related services, retail as well as energy. In order to carry out the different businesses the company has to maintain proper business relations with the suppliers and the various dealers. The company strives to maintain a multicultural environment and therefore there is a wide range of mix in the human resources that drive the company towards its goals. The aim of the company is to maintain a very high standard of corporate governance which would ensure accountability and transparency in the process in which the work is carried out. These attitude and work cultures have won the company various accolades and honours. The vision of Hutchison Whampoa Limited is the attainment and maintena nce of the highest standard in the corporate governance which would suit the interests and the necessities of the company. At the same time the interests of the subsidiaries also have to be taken care of. Sound corporate governance would ensure that the equity holders of the company are getting the right value for the money that they have invested into the company. The company should strive at enhancing the interest of all the stakeholders of the company. The mission of Hutchison is to attain these agenda by ensuring that all the corporate governance principles have been applied. The board of directors should be of good quality who would exercise internal control in the most effective manner. The disclosure practices of the company should be carried out in the most stringent manner. The company should adhere to its values of maintaining transparency in the corporate practices which results from the accountability of Hutchison to its shareholders. The goal of the company is to improv e these practices in the most efficient manner. The company also intends to maintain a sustainable communities and business for a long run. Strategic review Hutchison Whampoa Limited operates in six different sectors which include telecommunication, energy, infrastructure, retail, ports and properties as well as financial services

Monday, September 23, 2019

The Role Of Physical Education In The Universities Essay

The Role Of Physical Education In The Universities - Essay Example Life is full of expectations and it is important that physical education is provided to students so that they can be fully equipped to meet difficulties in life. Therefore physical education is important as it teaches so much more than just education. Education is limited to the classroom only while physical education is within the field or play area of a school or university. It is important that physical education is given to students so that they become stronger and their minds can open up in a very good way. Their strength would focus on building up the society within the future. Also, physical education is a must in today’s times because it puts the students ahead of those students who do not receive physical education. These students remain alert and very active on a day to day basis. They can do their work tasks in a very quick way and get rid of the problems that are within their lives. Their minds become stronger and thus they are always on alert about the environment where they live in. It is a fact that physical education takes care of the mind and the body more than just education, which is boring at times. The sports and fitness classes within universities and schools are important because they look to make the students very fit and sporty. The physical education is necessary as so much more takes place than just physical education. The students become very fit and their bodies come in proper shape. They look like active citizens of society. They start contributing more and more when they are physical educated. These sports and fitness classes bring the best within the students and make them look like good human beings.

Sunday, September 22, 2019

Statistic project Assignment Example | Topics and Well Written Essays - 750 words

Statistic project - Assignment Example If the null hypothesis is rejected, we would recommend Yoplait’s Research and Development department to start developing new flavors and products utilizing Greek yogurt. If the null hypothesis is not rejected, we would recommend Yoplait to focus instead on creating a better marketing campaign so as to create a demand for its present line up of Greek products. All data gathered in this survey are interval measures. The respondents were asked the question: What factors do you consider in purchasing Greek yogurt? They were then asked to rate three factors: variety of flavors, amount of calories in each product and the price of the product, where 1 is the least important factor and 5 is the most important factor. Based on table 1 above, we can see that the average age of respondents is 27 years old. Standard deviation is pretty high at 7.7, which meant that some of the respondents were much younger and much older than the average age. In the case of the factors considered by customers in purchasing Greek yogurt, the average rating for the variety of flavors is 4.4, amount of calories is 3.7 and price of product is at 4.0. From these rating we can already see that most respondents consider the variety of flavors the most in deciding which yogurt brand to choose. Standard deviation was 0.115475 for variety of flavor responses, 0.17266 for amount of calories responses and 0.175345 for price of product responses. 3. For the purpose of this study, we will use a single factor ANOVA because the responses of the respondents were numerical, but they were in fact categories of responses. We cannot use the t-test or z-test because we are not looking for actual increases in sales. For this study, we will use ÃŽ ±=.05, and we will test at 95% confidence level. We are also using a one-tailed test because we only want to know if adding more flavors will increase sales for Greek yogurt. One tailed tests are always directional

Saturday, September 21, 2019

Egocentricity of Pechorin vs Jason Essay Example for Free

Egocentricity of Pechorin vs Jason Essay In this essay I will compare the egocentricity of the characters of Pechorin from the Russian novel, A Hero of Our Time by Lermontov, and Jason from the Greek Tragedy Medea, written by Euripides. I have selected the topic of egocentricity or self-absorption for it is prevalent in both works in respect to Pechorin and Jason where they show little if any regard for anyone but themselves throughout the works. However the time differences and social and cultural conditions of the time and place the works were written must be taken into consideration. I feel that the theme of complete selfishness and the consequences that follow is strongest in respect to Jason and Pechorin and I will compare and provide evidence for such an argument in both works. I will start by analysing Jasons utterly selfish behaviour throughout the Ancient Greek play Medea, written by Euripides. Jason is a completely egocentric character but he doesnt have as much depth or complexity as Pechorin in A Hero of Our Time which is partly due to when this play was written in ancient Greece. Society was very different people were devouted Pagans and lived in a world of superstition. Also literature was no way near as advanced however Medea still contains the fundamentals such as psychology. Jason is motivated solely by self-interest, his only motivation to court Medea in the play is the fact that she has mystical powers to get him what he wants; the Golden Fleece, for which he will get a generous reward in return. Jason even allows Medea to kill her own brother out of lust and be banished from her homeland forever by her father as a consequence. Unfortunately Jason is to self-involved to even comprehend how his Actions would affect Medea and their children. Again we see further evidence of Jasons egocentricity when he divorces Medea and abandons his kids for Glauce, princess of Corinth. He doesnt consider the affect on Medea and their children for he is blinded by his selfishness, he doesnt even mind that they are going to get banished as long as he increases his political and social status. His only defence is that he will one day be king and they will inherit the kingdom, which has no validity for he has already betrayed her trust and showed no sign of guilt and is just trying to justify himself. Even the nurse says that his marriage is for social status not love, Jason has betrayed his own sons, and my mistress, for royal bed.i Unfortunately we dont get to see Jasons interaction with friends in this play, which I would guess to be very short sighted and shallow as usual. Jason seems to have an extreme lack of morals when it comes to his own actions such as abandoning his wife and kids simply for political gain. Also his motivation for this immoral action was money and political power not love for Glauce, which is immoral. The final similarity between the two characters is regret. Jason ends up in deep regret for his action for the outcome is the death of his new wife Glauce and his children as well as his almost social castration as a result. He learns that egocentricity leads to self-destruction for you lose sight of other peoples feeling and dont take them into consideration. Where Jasons Character differs from Pechorin is in respect to his emotion place in the work and his inability to except his faults. Jasons only real sign of emotion throughout the play is the within respect to the murder of his children. What? Killed my sons? That word kills me.ii This shows the pain he must have felt inside with this loss. Jason also seems to have an inability to admit his faults. He is blinded by his self-involvement, which is evidence of insecurity for living in your own world protects your from reality. Finally I feel that Jasons role in the play is more of a villain, which could be because the play is mainly Medeas view. A template of how not to get caught up in shallow insecurities, where as Pechorin in A Hero of Our Time is portrayed as more of a modern Hero where he has faults which make him easier to relate to and a much more believable character. Pechorin is also a portrayed with an immoral and selfish attitude in the Novel, A Hero of Our time. Yet Pechorin is given a lot more human characteristics and is described in much more detail with points probing on the physiological aspects even though its just pre-Freud. It was written 2332 years after Medea from a different culture and is a much larger work therefore is bound to be different in style. Pechorin is definitely as selfish as Jason is, if not more so. He uses all his so-called romantic relationships to gain control and domination over the hearts of young women. Firstly with Bela he trades her for a Horse he stole. How immoral is firstly stealing and then trading a women as an object? Because of this her father is killed and her brother rides off so shes left with literally nothing. He soon got bored of her and barely felt anythin at her death. Later on in his relationship with Princess Mary he is similarly selfish. He wants Princess Mary for shes in high demand as wee as a challenge and he feels the need to win her, in part of this was due to his old friend Grusnitski who also desired Mary. Pechorin saw this as a challenge and didnt even consider the effect it would have on Mary and Grusninski and didnt really care for hes caught up in his own world. He even sets out to destroy Grusnitskis reputation and ends up killing him. He is also very immoral in respect to the treatment of friends such as Maxim Maxyvich. He is disrespectful towards Maxim for he feels that he is now old and useless to him, which is shown at their unexpected reunion where Pechorin is very selfish and immoral. Pechorin also experiences regret like Jason in Medea, but his regret builds up and turns into bitterness. Passions are merely ideas in their initial stage. They are the property of youth, and anyone who expects to feel their thrill throughout life is a fool.iii Pechorin has not been able to find true passion or love throughout his life. He has quickly got bored of every relationship he has been in and is bitter to the fact that true love has never found him. Evidence that he could once feel emotion would lie in when he felt joy in the memory of the sulphur springs. Now this has forced him to become callus and use everyone to hide from his empty heart. However Pechorin does admit he has faults, Ambition has been crushed in me by circumstances, but it comes out in another way, for ambition is nothing more than a lust for power and my chief delight is to dominate those around me.iv But doesnt justify them or even try to change. I believe his self-analysis is shallow and this ties in to his duality as a person, which prevents him from expressing emotion. For a long time now Ive lived by intellect, not feeling. I weigh and analyse my emotions and actions with close interest, but complete detachment. There are two men within me one lives in the full sense if the word and the other reflects and judges him.v Finally I feel that Pechorin is portrayed more as the new Hero of our Time.vi Who isnt old fashioned but strong and unconventional with human faults that we can relate to therefore hes definitely the protagonist of the novel and an affective chara cter.

Friday, September 20, 2019

Total And Viable Counts Of Microorganisms Biology Essay

Total And Viable Counts Of Microorganisms Biology Essay The term microorganisms also called microbes refer to small tiny single celled organisms usually not visible to the naked eye. Microorganisms require magnification for proper visualization and resolution of their structure. These involve use of microscopes or magnifying lens with appropriate level of magnification (Tortora, Funke and Case 1995). Microorganisms are found in all living things all over the world i.e. plants and animals. They exist in a variety of habitats. They can live in air, on land or in water both fresh and salty. The three main classes of microorganisms are bacteria, fungi and viruses. Different microorganisms have different effects. Some are harmful while others are beneficial. Pathogenic and spoilage microbes cause diseases and food spoilage respectively thus referred to as harmful microorganisms. We also have others that are needed by living things to survive and they are termed as beneficial microbes (Tortora, Funke and Case 1995). Microbes are classified either by placing them in prokaryote or eukaryote group or by classifying them according to the temperature in their surrounding environment where they are classified as thermophilic microbes (thermophiles), mesophilic microbes (mesophiles) or psychrophilic microbes (psychrophiles). Thermophilic microbes are those microbes that grow well in high temperatures above the human body temperature. Mesophilic microbes are those that grow well in temperatures equal to that of human body while psychrophililic microbes are those that grow well in low temperatures below that of human body (Jaggi 1985). Like any other living organism, microbes reproduce for enhancement of their species. They reproduce by means of either sexual or asexual reproduction. Sexual reproduction occurs by mating of a male and a female while asexual reproduction is by cell division either by mitosis, meiosis or binary fission. 3. Counting of microorganisms. Micro-organisms can be counted. They need to be detected first before being counted. There are several techniques involved when counting microbes. One or more of the following techniques may be used when counting microbes. Direct counting techniques can be used. The oldest of these is microscopy which involves magnification of individual cells to become visible to the naked eye. Direct counting techniques do not rely on cell population growth. A more recent of the direct counting techniques involves use of immunofluorescence and epifluorescence adaptations of cell labeling used in conjunction with cytometry. In both technologies, the trigger for a count is derived from single cells (Diaper et al. 1992). We also have culture techniques that rely on growth of microbes to a level where they are visible. This is done under specific conditions of temperature, oxygen, time and nutrients among others. The last technique employed is that of reporter assays which asses the population of microbes through their metabolic activities. The population does not necessarily have to be growing. Examples of such techniques include conductance, colorimetry, adenosine triphosphate (ATP) and turbidometry (Bowden 1977). Counting of microorganisms can be done by different methods. In most cases the sample to be counted is first diluted to avoid overwhelming the whole counting procedure. However in some cases, the sample may be too dilute to give the required minimum count to be able to estimate the microbial population of that sample. In such cases, concentration of the sample is carried out. Counting can be done by use of a slide and a cover slip. A drop of the diluted sample is put on the slide with a suitable agent for proper visualization of the sample. It is then covered wit a cover slip and put under a microscope and observed at a suitable magnification. The centre area can be dimensioned with etched grids. The number of microbes in the grids is multiplied by the dilution factor to get the number in the original sample (Black 1996). The Petri dish count is where the sample is diluted to a point where the colonies will be statistically significant to be counted but not so many to overgrow each other. This method takes time for the individual cells to grow into colonies. The colonies counted are multiplied by the dilution factor to get the number in the original sample. The results here are expressed in colony forming units per milliliter i.e. CFU/ML. The time taken for the cells to grow into individual colonies is called the incubation period. Counting of microbes is important as it enables us estimate the microbial population in a variety of products (Breeuwer et al. 1994). 4. Total count. Total count is also termed as standard plate count or colony count. It gives the total number of microbes both viable and non-viable. All cells are counted. These include bacteria, yeasts and moulds. It is usually done by pour plate method. Total count generally requires employment of a microscope. For instance, when determining total microbial count in water by pour plate, a known volume of water is mixed with molten yeast-malt extract agar and given time to solidify. This is done on several plates. One set of plates are incubated at 37Â °C for about 24 hours and the other set of plates are incubated at 20-22Â °C for 3 days. You will find that most bacteria capable of growth in water do so well at 22Â °C than at higher temperatures. While the microbes that grow well at 37Â °C will not grow very well in water. This means that the two types of microorganisms need to be counted differently since they differ in their growth pattern. In this case, carrying out of total count on water is beneficial in several ways (Paulse, Jackson and Khan 2007). It helps to evaluate the efficiency of certain water treatment processes like coagulation, flocculation and disinfection. It also gives an indication of the level of cleanliness of the water distribution system. It can also be used it d etermine the suitability of water supply to firms where food and drinks are prepared on large scale. Total count is achieved either by use of direct or indirect counts. One method of direct count is the use of a haemocytometer. A haemocytometer is a specialized microscope slide important in cell counting. The central part of this slide has etched grids with precisely spaced lines to enable accurate counting. In order to get an accurate count in this method, the cell number should range between 40 to 70 cells in a one mm square. If this requirement is not met, necessary adjustments by either dilution or concentration are done as necessary (Rapposch, Zangerl and Ginzinger 2000). In indirect counts, one method is by use of a colorimeter. As the microorganisms grow with time, they make the agar more and more turbid. This turbidity can be measured by use of a colorimeter where optical density is measured. The greater the optical density the greater the number of microbes (Breeuwer et al. 1995). There is also a measure of dry weight. This method involves centrifugation followed by weighing to get the dry weight. The limitation of this method is that cells are destroyed The other indirect count method involves the use of a coulter counter. A coulter counter is a probe which measures variation in conductivity of a solution as a bacteria passes through a narrow gap (Daley 1979). The advantage of direct and indirect counts is that the process can be automated but the disadvantage is that they can not differentiate dead cells from living ones. 5. Viable count. Viable cont involves counting of colonies produced by only viable cells under favorable growth conditions. This can be accomplished by techniques like pour plating, spread plating and most probable number with an assumption that each and every viable cell gives rise to a pure colony. (Black 1996). In pour plating, the liquid media and the diluted sample are poured together in Petri dishes while still in liquid form and left to solidify. After solidifying, the Petri dishes are incubated at appropriate temperature for the required period of time during which the growth is realized. The plates are then removed and distinct colonies counted and expressed in colony forming units per ml. In spread plating, the media is prepared separately and poured in Petri dishes while still in liquid form. It is then left to solidify. After solidifying, a small known volume from the diluted sample is put to each Petri dish and with the help of a sterilized spreading rod, the sample is evenly spread over the media. The plates are then incubated at an appropriate temperature for a given period during which growth is realized. The plates are then taken for counting of colonies using magnifying lens (Black 1996). Colonies grown in Petri dishes by various methods excluding streaking method may be used to estimate the count of viable microbes since plate counts assume that every colony is founded by a single cell and that the cell must have been alive to grow and form that colony. Problems with plate counts are several. They require a long time of incubation to be able to visualize the colonies. Clumping of cells can lead to undercounting of viable cells. Cases of too many or too few colonies on a plate to accurately estimate viable count are common. Serial dilution is often required to prevent cases of overcrowding of cells. Too few cells require concentration by either centrifugation or filtration. In a case where too few colonies are present then the original culture must be concentrated before determining the plate count. Filtration is a method used to concentrate microorganisms by sieving microbes out of the medium. Centrifugation is also a separation method based on the density. This helps separate the microbes from the medium since both have different densities (Pettipher, Mansell, McKinnon and Cousins 1980). . In serial dilution, increments are made in 1000, 100, or 10. The number of dilutions to be done depends on the concentration of the original solution and the required concentration. The volume of the solution needed is also vital. If small quantities of solutions are needed then greater numbers of dilutions are necessary. Serial dilution allows small aliquots to be diluted instead of unnecessary big volumes of materials. When carrying out serial dilution, a small amount of original sample is removed to another container and its volume adjusted to original volume using a suitable buffer or distilled water e.g. if 1ml of the original solution is taken and 10Â µL removed and put in 990Â µL of media or water then we will have made a 1:100 dilution. If the original solution contained 5 x 106 cells/mL then we now have a concentration of 5 x 104cells/mL because we have divided the concentration by 100 (Pettipher, Mansell, McKinnon and Cousins 1980). Another method of determining approximate viable count is by use of most probable number. This method involves diluting the growth cultures and then growing the dilution cultures in broth tubes. This method is useful where it is beneficial to use broth other than solid media especially for highly motile organisms which are poor in forming colonies. The most probable number method is mostly used when the organism in question is not able to grow on solid agar or in situations where the microorganisms are too few to give reliable measure of population size by the standard plate count method (Black 1996). The advantage of viable count is that the method can be made very sensitive and that one can be able to count subsets of population. However the disadvantage is that sometimes the colony forming units may underestimate the number of cells because of clumping or chains of cells. It is also time consuming as the counts require at least few hours or overnight for incubation (Bowden 1977). Viable count of microbes is mostly applicable in food processing industries mostly dairy and meat processing plants where microbiology is most applicable. It helps in estimation of shelf life of processed food products as well as evaluation of sanitary conditions under which the products were manufactured. The efficiency of certain treatment processes like pasteurization, sterilization and cold storage done during production is also evaluated by viable microbial count. 6. Conclusion. Total and viable counts of microorganisms are important practices in microbiology applicable in fields of medicine, food among others. The main difference between the two is that total count determines the count of all cells both dead and alive while viable count estimate the number of viable or live cells only capable of growing into distinct colonies.

Thursday, September 19, 2019

Essay --

Having focused on E.M Forster’s ‘A Passage to India’ and Paul Scott’s ‘The Jewel in the Crown’ it is evident that both novels share the central theme of contrasting views of Indian culture to reflect society from the time periods of which their novels are set. The form of ‘A Passage to India’ is a retrospective diary account dictated by an omniscient third person narrator who has multiple viewpoints which endeavours into the psychological mind set of the characters. The form allows the reader to experience a first-hand account and a view on the forefront of the minds of the characters’ experiences. ‘The roads, named after victorious generals and intersecting at right angles, were symbolic of the net Great Britain had thrown over India. He felt caught in their meshes.’ From this, the main protagonist Aziz is claiming that the ‘right angles’ which are marked out by the colonial roads, connotes the British illustration on how they organise their colony. By being ‘caught in their meshes’, Aziz is affected greatly by the ordeal at a psychological level as he is feeling individually trapped. This epitomises the society’s reaction during the British ruling as the readers are able to see how it affects Aziz on a personal level, but this is a common theme through the novel – the analysis of the minds of the characters. By using an omniscient narrator, Forster can exploit the character’s f laws, especially when we learn that ‘suspicion in the Oriental is a sort of malignant tumour, a mental malady, that makes him self-conscious and unfriendly suddenly’ which claims that Aziz is naturally dubious just because he is Indian. Equally, the form of Scott’s ‘The Jewel in the Crown’ is written in a third person narrative with multiple narrations ... ...ogan of Oceania from the novel. The party’s power of the psychological control is equally contradictory to that of their testimony of power. By stating that ‘war is peace’ it is arguable that Orwell writes this to show that having an enemy within your nation will bring the nation (in this case Oceania) united together just like India becomes united with the acts of Gandhi to fight for independence. In sum, through their dichotomies of the British and Indian relationship during the emergence of India to independence, Forster and Scott allow the reader to free themselves of their prejudices and open up to their views on historical culture. Forster ‘attaches to India through extravagant metaphorical meanings and anthropomorphisms’ whilst Orwell stated that he ‘didn’t do prophecy’ and that he would not ‘put anything into it that human societies have not already done.’

Wednesday, September 18, 2019

The tragic in Antony and Cleopatra Essays -- Shakespeare Tragedy Plays

The tragic in Antony and Cleopatra His captain's heart, Which in the scuffles of great fights hath burst The buckles on his breast, reneges all temper And is become the bellows and the fan To cool a gipsy's lust. Antony and Cleopatra seems to have a special place in Shakespeare's works because it is at a crossroad between two types of play. It clearly belongs to what are generally called the 'Roman' plays, along with Coriolanus and Julius Caesar. But it is also considered a tragedy. The importance of history in the play cannot be denied, especially where it is compared to Shakespeare's 'great' tragedies such as Hamlet and Romeo and Juliet. But one might wonder what is specifically tragic in Antony and Cleopatra, and what can be said about the tragic in a play which is so different from the other tragedies. It is clear that the notion of 'tragic' in the everyday sense is not necessarily the same as the notion of 'tragedy', which is a philosophical notion whose definition depends on which philosophic system one takes into account. In this article I shall take the term tragic in its literary and dramatic sense and try to define its main characteristics. Taking into account a wide corpus of plays, from Antiquity as well as from France and England, we can detect several constant features that can define the tragic. A tragedy usually shows a character that is outstanding by his rank or/and inner abilities, falling into misfortune as a result of fate, and because of an error or a weakness for which he is not really responsible. Several tragic elements can be detected in Antony and Cleopatra. First, we find characters that have high rank because they are outstanding figures; we also see a tragic situation because from the be... ...es. In fact the tragic might be more prominent in this hybrid play (both historical play and tragedy) Antony and Cleopatra, than it is in some of Shakespeare's 'great tragedies' such as Othello. Bibliography Angel-Perez, Elisabeth. 1997. Le thà ©Ãƒ ¢tre Anglais. Paris: Hachette Anouilh, Jean. 1946. Antigone, Paris: Editions de la Table Ronde Biet, Christian. 1997. La tragà ©die. Paris: Armand Colin Cuddon, J. A . 1992. The Penguin Dictionary Of Literary Terms And Literary Theory. Penguin USA Racine, Jean. 1674. Prà ©face of Iphigà ©nie en Aulide. Editions l'Intà ©grale 1667. Premià ¨re Prà ©face of Andromaque. Editions l'Intà ©grale 1677. Prà ©face of Phà ¨dre. Editions l'Intà ©grale Suhamy, Henri (directed by). 2000. Antony and Cleopatra. Paris: Ellipses 1. Article published in Antony and Cleopatra, directed by Henri Suhamy The tragic in Antony and Cleopatra

Tuesday, September 17, 2019

The New Standard: VoiceXML Essay -- Computer Programming Languages

VoiceXML the New Standard for Voice Applications From the initial introduction of VoiceXML in March of 2000, the world of customer service and voice applications have been turned upside down. Before VoiceXML, companies were complaining about the flexibility of their voice applications. Problems were arising because consumers were growing tired of using the touch-tone keypad on their telephones to select options and companies were losing more money than they would have liked. In order to increase the portability of their applications, companies decided to find a new way to standardize their interface. The solution that came about was VoiceXML, which was created by Motorola, AT&T, Lucent Technologies and IBM. The VoiceXML language is based on the World Wide Web Consortium's XML standard. Through the use of VoiceXML speech enabled applications have begun to help companies cut costs and deliver superior service. This standard has almost revolutionized the way that companies handle automated calls. This standard has started a competitive market for other platforms that enable businesses to improve all processes of their customer care and communication over the phone. VoiceXML or VXML is an open standard for building and controlling intelligent voice applications that incorporate speech recognition and text to speech technologies. According to Xiaole Song, VoiceXML is designed to be platform independent around the same server logic pull model used for HTML applications. Developers are able to create audio dialogs that have speech, audio, and the recognition of spoken and touch tone input and mixed conversations. Most of the existing automatic call handling systems lacked intelligence because they were built on menu st... ...2001, Aug 1) Let voice XML speak [Online] 2 pages; Available: http://www.wirelessreview.com Song, Xiaole. (2004, June 14) Implementing Speech-Enables Contact Center Applications [Online], 6 pages, Available: http://www.tmcnet.com/ Mitchell, Robert L. (2005, August 22) Smart Talk: Speech-enabled apps deliver bottom line benefits [Online] 5 pages, Available: http://www.computerworld.com Mitchell, Robert L. (2005, August 22) Smart Talk: Speech-enabled apps deliver bottom line benefits [Online] 5 pages, Available: http://www.computerworld.com Mitchell, Robert L. (2005, August 22) Smart Talk: Speech-enabled apps deliver bottom line benefits [Online] 5 pages, Available: http://www.computerworld.com SPEECHTEK (2005, Aug. 1) VoiceXML Platform Certification Program Gains Momentum [Online] 2 pages, Available: http://www.voicexml.org/press/press_releases The New Standard: VoiceXML Essay -- Computer Programming Languages VoiceXML the New Standard for Voice Applications From the initial introduction of VoiceXML in March of 2000, the world of customer service and voice applications have been turned upside down. Before VoiceXML, companies were complaining about the flexibility of their voice applications. Problems were arising because consumers were growing tired of using the touch-tone keypad on their telephones to select options and companies were losing more money than they would have liked. In order to increase the portability of their applications, companies decided to find a new way to standardize their interface. The solution that came about was VoiceXML, which was created by Motorola, AT&T, Lucent Technologies and IBM. The VoiceXML language is based on the World Wide Web Consortium's XML standard. Through the use of VoiceXML speech enabled applications have begun to help companies cut costs and deliver superior service. This standard has almost revolutionized the way that companies handle automated calls. This standard has started a competitive market for other platforms that enable businesses to improve all processes of their customer care and communication over the phone. VoiceXML or VXML is an open standard for building and controlling intelligent voice applications that incorporate speech recognition and text to speech technologies. According to Xiaole Song, VoiceXML is designed to be platform independent around the same server logic pull model used for HTML applications. Developers are able to create audio dialogs that have speech, audio, and the recognition of spoken and touch tone input and mixed conversations. Most of the existing automatic call handling systems lacked intelligence because they were built on menu st... ...2001, Aug 1) Let voice XML speak [Online] 2 pages; Available: http://www.wirelessreview.com Song, Xiaole. (2004, June 14) Implementing Speech-Enables Contact Center Applications [Online], 6 pages, Available: http://www.tmcnet.com/ Mitchell, Robert L. (2005, August 22) Smart Talk: Speech-enabled apps deliver bottom line benefits [Online] 5 pages, Available: http://www.computerworld.com Mitchell, Robert L. (2005, August 22) Smart Talk: Speech-enabled apps deliver bottom line benefits [Online] 5 pages, Available: http://www.computerworld.com Mitchell, Robert L. (2005, August 22) Smart Talk: Speech-enabled apps deliver bottom line benefits [Online] 5 pages, Available: http://www.computerworld.com SPEECHTEK (2005, Aug. 1) VoiceXML Platform Certification Program Gains Momentum [Online] 2 pages, Available: http://www.voicexml.org/press/press_releases

Monday, September 16, 2019

Sms Banking

Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 SMS BASED SECURE MOBILE BANKING Manoj V, Bramhe Department of Information Technology, RTM Nagpur university St. Vincent Pallotti College of Engg. And Technology, Nagpur, India [email  protected] com Abstract— M-banking has emerged as one of the main division of m-commerce. Mobile banking services consists of information inquiry, notifications and alerts, applications and payment transfer. Mobile based application is used for connecting customer handset with bank server for all such services.Current M-banking applications used by banks are facing security challenges for payment transfer banks are using secure payment gateway and other security measures which increases cost and infrastructure for bank but major day-to-day banking applications are inquiries, notifications and alerts. The problem with current banking applications is that they send data directly to customer in plain te xt form compromising with security. We present SMS based secure mobile banking which enhances security with minimum cost.In this approach bank hides customer transaction data is secure SMS using AES symmetric cryptographic algorithm and send it customer application supported handset. Customer application decrypts data in secure manner. Keywords: M-banking, MD5, AES, MPIN I. INTRODUCTION M-banking system is one which provides all daily banking operations to customer with one click of his mobile handset with supported application. M-banking system has potential to provide access or delivery of very specific and highly necessary information to customer as given in [2].Growth in the M-Banking is driven by various facilities like convenience of banking operations, greater reach to consumers and Integration of other m-commerce services with mobile banking. In M-banking there is no place restriction, it is highly penetration coefficient as growth of mobile phones are more than computers, i t is fully personalized and private increasing transaction authenticity and is 100% available all the time with users. However, there are several challenges that need to be addressed to completely utilize the benefits of the M-Banking like handset compatibility, security, scalability, reliability.Due to increase in use of mobile handsets for many m-commerce applications, Chances of mobile hacking for financial benefits are heavily increased. Currently mostly all banks in India and outside are sending text SMS directly to the customer handset for basic bank services without any security which can be accessed by any malicious person and can use this information for getting access to customer account. OTA (Over-the-air) mobile data can be hacked in network path from bank to customer mobile handset including MPIN, a password use for user identification in M-banking.Thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. Our objec tive is to provide cost effective, secure, fast M-banking solution combining features of cryptography. In this paper we have presented SMS based secure mobile banking with minimum cost using cryptography. II. M-BANKING CHANNELS M-banking can be executed using various channels like SMS, USSD, GPRS, WAP; Phone based Application, SIM Application. All of these channels are used separately or combined for various banking operations ISSN : 0975-4024 Dec 2011- Jan 2012 472Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 A. Short Message Service (SMS) SMS is the simplest form of mobile banking. It is largely used for information-based services. SMS has the maximum reach amongst consumers since all the mobile phones support SMS. Short messages are stored and forwarded by SMS centres. These messages have some security issues. B. Unstructured Supplementary Services Delivery (USSD) USSD is a technology unique to GSM. It is a capability built into t he GSM standard for support of transmitting information over the signalling channels of the GSM network.USSD provides session-based communication. Turnaround response times for interactive applications are shorter for USSD than SMS. In USSD, the interaction is in the form of a continuous session as opposed to SMS. USSD is available on all handsets. C. Wireless Application Protocol (WAP) / General Packet Radio Service (GPRS) GPRS is a packet-switched data service available to GSM users. GPRS enables services such as WAP access, Multimedia Messaging Service (MMS), and Internet communication services such as email and World Wide Web access in mobile phones. . WAP is wireless application protocol used over GPRS. It is similar to Internet banking.The consumer’s handset needs to be WAP enabled. WAP banking is open to similar threats as Internet banking. D. Phone-based Application Phone based applications are developed in various languages like J2ME, . NET having advantages that it can use GPRS, USSD or SMS, MMS to carry the consumer data/instruction in an encrypted format and it is operator independent. These are secure application which resides on supported handset. E. SIM Application Tool Kit The SIM Application Toolkit allows for the service provider or bank to house the consumer’s mobile banking menu within the SIM card. STK is the most secure method of mobile banking.It allows the bank to load its own encryption keys onto the SIM card with the bank’s own developed application. III. CURRENT M-BANKING Even though various channels are available for M-banking most of the banks uses SMS as basic and cheap channel for basic banking operations. Currently all banks in India like ICICI, HSBC, SBI etc are not using any encryption techniques in SMS based M-banking system. They are using simple text based SMS for customer queries in which they directly send account information to customer only hiding some digits of account number which can be easily ha cked by any hacker or seen by anyone from message inbox.Even though some banks do provide some other channel like GPRS and WAP but cost of implementation is more and these facilities are not available on all types of mobile handset thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. A. Issues in M-banking 1) Lack of Standards: The lack of standards gives rise to lot of local and fragmented versions of m-payments offered by different stakeholders. Standards need to address security and privacy concerns of customers as well as interoperability between various implementations. ) Device constraints: There are technical issues related to the mobile devices . The mobile phones suffers from various constrains like less processing power and memory, bandwidth, short battery life , frequent disconnections, tiny screens, poor resolution and privacy issues. 3) Security Issues: Securing m-Commerce is even more difficult than wired tra nsaction. Device constraints raise the questions as to whether there will be adequate security for users without compromising the ease of use and speed.Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data hence any malicious user can access customer important data on mobile and used it for malicious purpose thus direct sending of data is not suggestible for M-banking. SMS are prone to spoofing and there are issues related to SMS encryption. However technology manufacturers are developing improved security for applications with authentication and encryption technologies and many claims that the ISSN : 0975-4024Dec 2011- Jan 2012 473 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 transaction using mobile device is fully secure. There are many techniques for secure M-banking operations but major research work has been done on Cryptography and steganography techn iques. Cryptography is a process of converting plaintext data into cipher text using cryptographic algorithms. They insure basic security requirements like authentication, confidentiality, integrity and non-repudiation. B. Basics of Short Message ServiceShort Message Service (SMS) is the ability to send and receive text messages to and from mobile telephones. SMS was launched as a part of GSM1 standard. Each short message is up to 160 characters in length. The 160 characters can comprise of words, numbers, or punctuation symbols. Short Message Service is a store and forward service; this means that messages are not sent directly to the recipient but via a network SMS Centre. SMS comprises two basic point-to-point services as Mobile-originated short message (MO-SM) and Mobile-terminated short message (MT-SM).Mobile-originated short messages are transported from MOcapable handset to SMSC whereas Mobile-terminated short messages are transported from SMSC to the handsets. The figure no. 1 shows a typical organization of network elements in a GSM network supporting SMS. Fig. 1. Basic model of SMS based M-banking The benefits of SMS to subscribers are convenience, flexibility, and seamless integration of messaging services and data access, delivery of notifications and alerts, guaranteed message deliver, reliable, low-cost communication mechanism, increased subscriber productivity, delivery of messages to ultiple subscribers at a time. The SMSC (Short Message Service Centre) is the entity which does the job of store and forward of messages to and from the mobile station. The SME (Short Message Entity), which is typically a mobile phone or a GSM modem, can be located in the fixed network or a mobile station, receives or sends SMS. The SMSC usually has a configurable time limit for how long it will store the message. SMS Gateway SMS Gateway is an interface between software applications mobile networks.An SMS Gateway allows interfacing software applications to send and /or receive SMS messages over mobile network. A GSM Modem modulates outgoing digital signals from a computer or other digital device to signals for a GSM network and demodulates the incoming GSM signal and converts it to a digital signal for the computer or other digital device. IV. PROPOSED SOLUTION Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data in SMS banking hence any malicious user can access customer important data on mobile.Proposed secure M-banking is based on symmetric cryptographic techniques where common secret key is shared among bank customer and bank server. Proposed Architecture consists of 4 components as Customer Mobile application, Bank Server application, Bank side mobile / GSM Modem, Bank database and wireless OTA [1]. Our solution uses windows mobile as client application platform and . NET framework as server side software. Customer interested in using M-Banking facilities has to make registration only once with corresponding bank. Bank has all necessary details of customer in database.Bank sends Customer–side mobile application developed for windows mobile to user. Application will be installed once on windows mobile supported handset. This application consists of Login screen along with get session key option, menu screen for bank services options, and encryption and decryption screens for outgoing and incoming secure SMS and send message screen to send SMS to server GSM handset /Modem. Application will be updated as and when bank updates it. ISSN : 0975-4024 Dec 2011- Jan 2012 474 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479Bank will have GSM mobile Handset / GSM modem connected to bank application server. GSM handset will be connected to application server using either Bluetooth or USB cable having SIM card installed in it which has task of receiving, processing and replying customer SMS continuou sly. GSM handset/ modem are cheaper and can be easily installed but have slow speed for message handling which can be increased by connecting modem with SMSC centre over internet. Secure M-Banking server side application is developed in windows compatible environment like VB. NET which can be installed on bank application server.Application is consisting of SMS Service, Information Manage, Account Details Manage, User Request modules to receive and process secure encrypted message from customer mobile. SMS Service module is responsible for retrieving and replying secure SMS automatically whenever they reaches server GSM handset / Modem. Bank database consists of various tables storing customer details pertaining to his personal information, Account information and transaction information. Bank database stores customer confidential information like his MPIN, Mobile identification pin and encryption keys in encrypted and secure manner.We have discussed various major types of M-Banking channels as SMS, GPRS, WAP and USSD out of which every channel has own advantages and disadvantages. WAP and GPRS are good and provide session based security but they are handset dependent and also in rural part of India all mobile operators are not providing respective services. USSD is used along with SMS and requires separate infrastructure. Thus SMS channel is simple, easy to implement, cheaper and widely used channel which is device independent. Current SMS based M-banking service has many drawbacks s SMS is inherently developed in GSM for non-sensitive message transfer among users. Mutual authentication, text encryption, end-to-end security and non-repudiation is not present in design of GSM architecture [16]. Major issues with SMS based banking are SMS Spoofing which is an attack where malicious user sends out SMS message which appears to be sent by original sender. Current SMS architecture allows hiding original sender’s address by altering respective field in origin al SMS header. Also SMS has encryption only during path from base transreceiver station and mobile station. End-to-end encryption is not available.V. IMPLEMENTATION We have implemented proposed solution in . NET platform for windows mobile in windows environment. Customer mobile application in . NET framework runs on supported windows mobile handset for which we have used HTC mobile and bank server application is running in . NET along with any GSM handset connected in Bluetooth / USB mode to it. We have added secure SMS structure which provides extra security along with satisfying security parameters. This secure SMS will add extra security features like cryptographic and hashing algorithm to satisfy confidentiality, integrity, authentication and non-repudiation.Our system is based on secure SMS protocol and it uses SMS as media to send and receive encrypted information. . A. Secure SMS Message Structure The secured SMS message is divided into multiple fields’s to accommodat e for the various security checks required for the protocol. Figure no. 2 shows the structure overview for a secure SMS message. The use of each labelled structure is explained below. Account No. Session Key Cipher Text (6 digit) (Generated From MPIN) (Plain Text + MPIN) Message Digest Fig. 2. Secure SMS message Structure Secure SMS message structure proposed by us consists of 4 fields’s as shown in above figure.Account Number: – It is customer account number in bank which is first field used for authentication purpose. This information is stored in plain test format so that at the server end, information can be retrieved to get required keys from database. Session key: – It is onetime key randomly generated from customer MPIN inputted in bank server database during M-Banking registration process. This key is stored in 2nd field of message. Customer makes a request to get session key from his handset to bank server. Bank server will reply this with encrypted ses sion keys stored in file, which will be stored on customer handset. ISSN : 0975-4024Dec 2011- Jan 2012 475 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Cipher Text: – This text is created from combination of plain text and MPIN and stored in 3rd filed of message structure. Main idea behind this is to protect data from malicious attacker. As MPIN is most important data and from which session keys are created to be used for encryption and decryption purpose, hence it s send in encrypted manner. Message Digest: – Message digest is used for checking integrity. Customer message digest is calculated from combination of plain text and MPIN and stored in 4th field of secure SMS.MD5 algorithm is used to calculate message digest on both ends. This received digest will be compared with calculated digest at bank server end , if not found of same size then message will be discarded as fake transaction and no message will be send to mobile handset from which request is sent. B. Sending Secure SMS from Client Mobile Whenever customer wish to make any transaction using M-banking, he will run application installed on handset and provide all necessary details. We have used 6 transactions for testing purpose and information collected from user on his handset is used to generate secure SMS.After registration customer will get mobile application installed once on his windows mobile. Customer will enter 4-digit MPIN which will be stored in server database in encrypted format using his password. For non-repudiation purpose we have added concept of one time session key. Server uses customer MPIN to generate session key randomly and again stored them in encrypted format. Customer runs the banking application and feed details of 6-digit account number, 4-digit MPIN and 4digit password and click button to get session key. Server sends generated session key to customer handset which will be stored in encrypted format on his handset.Customer goes to menu screen, chooses requires account type and type of transaction he wish to perform and goes to next screen. Mobile client application shows 4 entries on next screen consisting of session key received, generated fixed plain text message depending upon transaction chosen, cipher text created from combination of plain text and MPIN and 4-part secure message. Secure SMS contains account number in plain text, session key in encrypted format, cipher text created from plain text and MPIN and message digest calculated from message.Customer will send message to sever using as normal message. C. Receiving and Replying Secure SMS from Server Module Proposed Server is running on computer installed with required software like VB. NET, Windows mobile device centre and SDK, . NET compact framework, MS-access and Server side application. Server side application has four modules as SMS Service, Information Manage, Transaction Manage and User Requests. SMS service module retrieves SMS received at Server side handset and decode it to get original query send by customer.Server application process query, get required data from bank database and then sends it in encrypted format to customer mobile through bank side modem. Whenever Customer sends any secure SMS containing his transaction query to server side GSM Modem, Server application automatically retrieves secure SMS and deletes it from server attached handset to avoid flooding of message inbox. We have used ActiveX control for this purpose. Bank Server application splits received secure SMS in same 4-parts. Server reads first part, a plain text 6-digit account number and compares it with database stored account number.If match is not found, it will send message â€Å"Wrong Account Number† to customer handset. If account match is found then server uses 2nd part of secure SMS, which is session key send by user to decrypt 3rd part of received secure SMS. After decrypting 3rd part of SMS, server application gets combination of plaintext as customer original transaction query followed by 4-digit MPIN. Server application compares received MPIN with stored MPIN from server table if a match is not found, will send message â€Å"Wrong Pin Number† to customer handset.Server calculates message digest of 3rd part received using MD5 algorithm and compare it with received massage digest, 4th part of secure SMS to check for message integrity. If match is not found, server generates message on server side â€Å"Fake Transaction† and sends nothing to customer side handset as it may be off any malicious user. If all security checks are proper, Server application process query of customer and get required data from database encrypts data using session key received from customer and sends automatically to customer handset.VI. EXPERIMENTAL RESULTS We have developed two applications for client and server side. Mobile client application is developed using . NET compact framewor k and VB. NET, installed on windows mobile supported HTC mobile device. This application is used by customer for various M-banking transactions to send encrypted secure SMS to bank ISSN : 0975-4024 Dec 2011- Jan 2012 476 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Server and gets back encrypted reply from bank Server.Client and Server side application performs symmetric encryption and decryption using 256-bit AES symmetric encryption algorithm. MD5 algorithm is used for hashing purpose. Server side bank application is developed using VB. NET it uses SMS toolkit, an ActiveX control to retrieve and process secure SMS automatically. Server side application also contains certain modules for database management of customer account and transactions Normally symmetric cryptographic algorithm don’t have non-repudiation as both party shares common secret key but we have used session key concept for maintaining non-repudiation propert y of encryption.Since Session key is used only once and created randomly, no two users can have common session key and it is created from MPIN, a master key which customer only knows so he cannot deny that he has done transaction. We have carried out 6 types of transaction including Account Balance, Mini transactions, Cheque Book Request, Cheque Stop request, Pay Bill and Fund Transfer. Following are some sample client application module. The figure no. 3 shows session key, user query in fixed plain text format, cipher text generated from combination of plain text and his MPIN and 4-part secure SMS message generated as per format discussed.This last message is sent to server. Fig. 3. Generating 4-Part Secure Message This secure SMS is retrieved by server side SMS service module. Server application split message and decrypt it to get original transaction query of customer. This query is processed to get response data from database which is firstly encrypted and then send to customer handset. Customer handset get auto reply from server side in cipher text, which is decrypted on mobile by client side application to get server response in plain text. The Figure no. 4 shows response obtained automatically from server for account balance.This reply consists of 3 parts. First part is common session key used by server and client. Second part is cipher text received from server application in secure manner. Third part is plain text message obtained after decrypting secure message received from server. Client mobile application uses 256-bit AES algorithm to decrypt message using common session key. This message will be hidden from customer and he will only get final query results in plain text format but for result purpose we have shown this screen. ISSN : 0975-4024 Dec 2011- Jan 2012 477Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Fig. 4. Secure Reply from Server To be a secure system, it must satisfy Confidentiality, Authentication, Integrity and Non-Repudiation Secure SMS system maintains confidentiality using AES cryptography and Non-Repudiation using session key. Here 3-factor authentication is used for authentication and security purpose whereas Message integrity is carried out using MD5 algorithm. VII. CONCLUSION AND FUTURE WORK We have implemented a secure SMS based Mobile Banking system.The system allows user to carry out all banking transaction securely from anywhere, anytime. All messages from user windows mobile are sent in encrypted format to bank server. Bank server decrypt message, process query and encrypt result in SMS. Server sends message to customer which will be decrypted on his handset. The evaluation of the system was studied for varying banking transaction and under various security threatening malicious activities were recorded. Performance of the transaction is studied. We have executed few banking transaction from HTC windows mobile and using VB.Net server side applicati on. We have used LG GSM mobile as server attached mobile device. Experiments shows that secure SMS Mobile banking provides cost effective and secure system with satisfying Confidentiality, Authentication, Integrity and Non-Repudiation using symmetric cryptography. Application can be used on any windows mobile supported handset from anywhere as no GPRS and WAP are required. We have implemented system using symmetric key AES algorithm. In future better power consumption algorithm like blowfish can be tried out.Steganogrpahy can also be applied for secure M-banking transactions. We can use concept of STK, SIM application toolkit where bank can stored the application and encryption keys on SIM. REFERENCES [1] [2] [3] [4] [5] Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, â€Å"Mobile banking Services in bank area†, SICE Annual Conference 2007, Japan Martinez Borreguero, F. Javier and Chaparro Pelaez, Julian,†Spanish Mobile Banking Services: An Adoption Study†, Proceedings of the International Conference on Mobile Business 2005.Mohammad Shirali-Shahreza,†Improving Mobile Banking Security Using Steganography â€Å", International Conference On Information Technology. Przemyslaw Krol, Przemyslaw Nowak, Bartosz Sakowicz,†Mobile Banking Services Based On J2ME/J2EE†, CADSM’2007. Yousuf S. AlHinai, Sherah Kurnia and Robert B. Johnston,†Adoption of Mobile, Commerce Services by Individuals: A Meta-Analysis of the Literature†, Sixth International Conference on the Management of Mobile Business . ISSN : 0975-4024 Dec 2011- Jan 2012 478 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. (6), 2011, 472-479 [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] T N T Nguyen, P Shum and E H Chua,†Secure end-to-end mobile payment System†. Ashutosh Saxena, Manik Lal Das and Anurag Gupta,†MMPS: A Versatile Mobile-to-Mobile Payment System†, Proceedings of the International Conference On Mobile Business 2005. Iuon-Chang Lin and Yang-Bin Lin,†An Efficient Steganography Scheme for M- Commerce†. Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, †Text Steganography in SMS†, 2007 International Conference on Convergence Information Technology.Sandeep Singh Ghotra, Baldev Kumar Mandhan, Sam Shang Chun Wei, Yi Song, Chris Steketee, †Secure Display and Secure Transactions Using a Handset†, Sixth International Conference on the Management of Mobile Business. Jiehua Wang, Song Yuan, â€Å"A Novel Security Mobile Payment System Based On Watermarked Voice Cheque†. M. Shirali-Shahreza, â€Å"Stealth Steganography in SMS†, Proceedings of the third IEEE and IFIP International Conference on Wireless and Optical Communications Networks 2006.Kewin Chikomo, Ming Ki Chong, Alpan Arnab, Andrew Hutchison, â€Å"Security of Mobile Banking†. Dilla Salama Abdul Minaam. Hatem M. Abdul Kadir, Mohily Mohamed Hadhoud ,† Evaluating the effects of Symmetric Cryptographic algorithms on Power Consumption for different data types†, International Journal of Network Security, Volume 11, September 2010. Managing the Risk of Mobile Banking Technologies, Bankable Frontier Associates. Deshpande Neeta, kamalapur Snehal,† Implementation of LSB Steganography and its Evaluation for various bits†. ISSN : 0975-4024 Dec 2011- Jan 2012 479 Sms Banking Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 SMS BASED SECURE MOBILE BANKING Manoj V, Bramhe Department of Information Technology, RTM Nagpur university St. Vincent Pallotti College of Engg. And Technology, Nagpur, India [email  protected] com Abstract— M-banking has emerged as one of the main division of m-commerce. Mobile banking services consists of information inquiry, notifications and alerts, applications and payment transfer. Mobile based application is used for connecting customer handset with bank server for all such services.Current M-banking applications used by banks are facing security challenges for payment transfer banks are using secure payment gateway and other security measures which increases cost and infrastructure for bank but major day-to-day banking applications are inquiries, notifications and alerts. The problem with current banking applications is that they send data directly to customer in plain te xt form compromising with security. We present SMS based secure mobile banking which enhances security with minimum cost.In this approach bank hides customer transaction data is secure SMS using AES symmetric cryptographic algorithm and send it customer application supported handset. Customer application decrypts data in secure manner. Keywords: M-banking, MD5, AES, MPIN I. INTRODUCTION M-banking system is one which provides all daily banking operations to customer with one click of his mobile handset with supported application. M-banking system has potential to provide access or delivery of very specific and highly necessary information to customer as given in [2].Growth in the M-Banking is driven by various facilities like convenience of banking operations, greater reach to consumers and Integration of other m-commerce services with mobile banking. In M-banking there is no place restriction, it is highly penetration coefficient as growth of mobile phones are more than computers, i t is fully personalized and private increasing transaction authenticity and is 100% available all the time with users. However, there are several challenges that need to be addressed to completely utilize the benefits of the M-Banking like handset compatibility, security, scalability, reliability.Due to increase in use of mobile handsets for many m-commerce applications, Chances of mobile hacking for financial benefits are heavily increased. Currently mostly all banks in India and outside are sending text SMS directly to the customer handset for basic bank services without any security which can be accessed by any malicious person and can use this information for getting access to customer account. OTA (Over-the-air) mobile data can be hacked in network path from bank to customer mobile handset including MPIN, a password use for user identification in M-banking.Thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. Our objec tive is to provide cost effective, secure, fast M-banking solution combining features of cryptography. In this paper we have presented SMS based secure mobile banking with minimum cost using cryptography. II. M-BANKING CHANNELS M-banking can be executed using various channels like SMS, USSD, GPRS, WAP; Phone based Application, SIM Application. All of these channels are used separately or combined for various banking operations ISSN : 0975-4024 Dec 2011- Jan 2012 472Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 A. Short Message Service (SMS) SMS is the simplest form of mobile banking. It is largely used for information-based services. SMS has the maximum reach amongst consumers since all the mobile phones support SMS. Short messages are stored and forwarded by SMS centres. These messages have some security issues. B. Unstructured Supplementary Services Delivery (USSD) USSD is a technology unique to GSM. It is a capability built into t he GSM standard for support of transmitting information over the signalling channels of the GSM network.USSD provides session-based communication. Turnaround response times for interactive applications are shorter for USSD than SMS. In USSD, the interaction is in the form of a continuous session as opposed to SMS. USSD is available on all handsets. C. Wireless Application Protocol (WAP) / General Packet Radio Service (GPRS) GPRS is a packet-switched data service available to GSM users. GPRS enables services such as WAP access, Multimedia Messaging Service (MMS), and Internet communication services such as email and World Wide Web access in mobile phones. . WAP is wireless application protocol used over GPRS. It is similar to Internet banking.The consumer’s handset needs to be WAP enabled. WAP banking is open to similar threats as Internet banking. D. Phone-based Application Phone based applications are developed in various languages like J2ME, . NET having advantages that it can use GPRS, USSD or SMS, MMS to carry the consumer data/instruction in an encrypted format and it is operator independent. These are secure application which resides on supported handset. E. SIM Application Tool Kit The SIM Application Toolkit allows for the service provider or bank to house the consumer’s mobile banking menu within the SIM card. STK is the most secure method of mobile banking.It allows the bank to load its own encryption keys onto the SIM card with the bank’s own developed application. III. CURRENT M-BANKING Even though various channels are available for M-banking most of the banks uses SMS as basic and cheap channel for basic banking operations. Currently all banks in India like ICICI, HSBC, SBI etc are not using any encryption techniques in SMS based M-banking system. They are using simple text based SMS for customer queries in which they directly send account information to customer only hiding some digits of account number which can be easily ha cked by any hacker or seen by anyone from message inbox.Even though some banks do provide some other channel like GPRS and WAP but cost of implementation is more and these facilities are not available on all types of mobile handset thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. A. Issues in M-banking 1) Lack of Standards: The lack of standards gives rise to lot of local and fragmented versions of m-payments offered by different stakeholders. Standards need to address security and privacy concerns of customers as well as interoperability between various implementations. ) Device constraints: There are technical issues related to the mobile devices . The mobile phones suffers from various constrains like less processing power and memory, bandwidth, short battery life , frequent disconnections, tiny screens, poor resolution and privacy issues. 3) Security Issues: Securing m-Commerce is even more difficult than wired tra nsaction. Device constraints raise the questions as to whether there will be adequate security for users without compromising the ease of use and speed.Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data hence any malicious user can access customer important data on mobile and used it for malicious purpose thus direct sending of data is not suggestible for M-banking. SMS are prone to spoofing and there are issues related to SMS encryption. However technology manufacturers are developing improved security for applications with authentication and encryption technologies and many claims that the ISSN : 0975-4024Dec 2011- Jan 2012 473 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 transaction using mobile device is fully secure. There are many techniques for secure M-banking operations but major research work has been done on Cryptography and steganography techn iques. Cryptography is a process of converting plaintext data into cipher text using cryptographic algorithms. They insure basic security requirements like authentication, confidentiality, integrity and non-repudiation. B. Basics of Short Message ServiceShort Message Service (SMS) is the ability to send and receive text messages to and from mobile telephones. SMS was launched as a part of GSM1 standard. Each short message is up to 160 characters in length. The 160 characters can comprise of words, numbers, or punctuation symbols. Short Message Service is a store and forward service; this means that messages are not sent directly to the recipient but via a network SMS Centre. SMS comprises two basic point-to-point services as Mobile-originated short message (MO-SM) and Mobile-terminated short message (MT-SM).Mobile-originated short messages are transported from MOcapable handset to SMSC whereas Mobile-terminated short messages are transported from SMSC to the handsets. The figure no. 1 shows a typical organization of network elements in a GSM network supporting SMS. Fig. 1. Basic model of SMS based M-banking The benefits of SMS to subscribers are convenience, flexibility, and seamless integration of messaging services and data access, delivery of notifications and alerts, guaranteed message deliver, reliable, low-cost communication mechanism, increased subscriber productivity, delivery of messages to ultiple subscribers at a time. The SMSC (Short Message Service Centre) is the entity which does the job of store and forward of messages to and from the mobile station. The SME (Short Message Entity), which is typically a mobile phone or a GSM modem, can be located in the fixed network or a mobile station, receives or sends SMS. The SMSC usually has a configurable time limit for how long it will store the message. SMS Gateway SMS Gateway is an interface between software applications mobile networks.An SMS Gateway allows interfacing software applications to send and /or receive SMS messages over mobile network. A GSM Modem modulates outgoing digital signals from a computer or other digital device to signals for a GSM network and demodulates the incoming GSM signal and converts it to a digital signal for the computer or other digital device. IV. PROPOSED SOLUTION Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data in SMS banking hence any malicious user can access customer important data on mobile.Proposed secure M-banking is based on symmetric cryptographic techniques where common secret key is shared among bank customer and bank server. Proposed Architecture consists of 4 components as Customer Mobile application, Bank Server application, Bank side mobile / GSM Modem, Bank database and wireless OTA [1]. Our solution uses windows mobile as client application platform and . NET framework as server side software. Customer interested in using M-Banking facilities has to make registration only once with corresponding bank. Bank has all necessary details of customer in database.Bank sends Customer–side mobile application developed for windows mobile to user. Application will be installed once on windows mobile supported handset. This application consists of Login screen along with get session key option, menu screen for bank services options, and encryption and decryption screens for outgoing and incoming secure SMS and send message screen to send SMS to server GSM handset /Modem. Application will be updated as and when bank updates it. ISSN : 0975-4024 Dec 2011- Jan 2012 474 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479Bank will have GSM mobile Handset / GSM modem connected to bank application server. GSM handset will be connected to application server using either Bluetooth or USB cable having SIM card installed in it which has task of receiving, processing and replying customer SMS continuou sly. GSM handset/ modem are cheaper and can be easily installed but have slow speed for message handling which can be increased by connecting modem with SMSC centre over internet. Secure M-Banking server side application is developed in windows compatible environment like VB. NET which can be installed on bank application server.Application is consisting of SMS Service, Information Manage, Account Details Manage, User Request modules to receive and process secure encrypted message from customer mobile. SMS Service module is responsible for retrieving and replying secure SMS automatically whenever they reaches server GSM handset / Modem. Bank database consists of various tables storing customer details pertaining to his personal information, Account information and transaction information. Bank database stores customer confidential information like his MPIN, Mobile identification pin and encryption keys in encrypted and secure manner.We have discussed various major types of M-Banking channels as SMS, GPRS, WAP and USSD out of which every channel has own advantages and disadvantages. WAP and GPRS are good and provide session based security but they are handset dependent and also in rural part of India all mobile operators are not providing respective services. USSD is used along with SMS and requires separate infrastructure. Thus SMS channel is simple, easy to implement, cheaper and widely used channel which is device independent. Current SMS based M-banking service has many drawbacks s SMS is inherently developed in GSM for non-sensitive message transfer among users. Mutual authentication, text encryption, end-to-end security and non-repudiation is not present in design of GSM architecture [16]. Major issues with SMS based banking are SMS Spoofing which is an attack where malicious user sends out SMS message which appears to be sent by original sender. Current SMS architecture allows hiding original sender’s address by altering respective field in origin al SMS header. Also SMS has encryption only during path from base transreceiver station and mobile station. End-to-end encryption is not available.V. IMPLEMENTATION We have implemented proposed solution in . NET platform for windows mobile in windows environment. Customer mobile application in . NET framework runs on supported windows mobile handset for which we have used HTC mobile and bank server application is running in . NET along with any GSM handset connected in Bluetooth / USB mode to it. We have added secure SMS structure which provides extra security along with satisfying security parameters. This secure SMS will add extra security features like cryptographic and hashing algorithm to satisfy confidentiality, integrity, authentication and non-repudiation.Our system is based on secure SMS protocol and it uses SMS as media to send and receive encrypted information. . A. Secure SMS Message Structure The secured SMS message is divided into multiple fields’s to accommodat e for the various security checks required for the protocol. Figure no. 2 shows the structure overview for a secure SMS message. The use of each labelled structure is explained below. Account No. Session Key Cipher Text (6 digit) (Generated From MPIN) (Plain Text + MPIN) Message Digest Fig. 2. Secure SMS message Structure Secure SMS message structure proposed by us consists of 4 fields’s as shown in above figure.Account Number: – It is customer account number in bank which is first field used for authentication purpose. This information is stored in plain test format so that at the server end, information can be retrieved to get required keys from database. Session key: – It is onetime key randomly generated from customer MPIN inputted in bank server database during M-Banking registration process. This key is stored in 2nd field of message. Customer makes a request to get session key from his handset to bank server. Bank server will reply this with encrypted ses sion keys stored in file, which will be stored on customer handset. ISSN : 0975-4024Dec 2011- Jan 2012 475 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Cipher Text: – This text is created from combination of plain text and MPIN and stored in 3rd filed of message structure. Main idea behind this is to protect data from malicious attacker. As MPIN is most important data and from which session keys are created to be used for encryption and decryption purpose, hence it s send in encrypted manner. Message Digest: – Message digest is used for checking integrity. Customer message digest is calculated from combination of plain text and MPIN and stored in 4th field of secure SMS.MD5 algorithm is used to calculate message digest on both ends. This received digest will be compared with calculated digest at bank server end , if not found of same size then message will be discarded as fake transaction and no message will be send to mobile handset from which request is sent. B. Sending Secure SMS from Client Mobile Whenever customer wish to make any transaction using M-banking, he will run application installed on handset and provide all necessary details. We have used 6 transactions for testing purpose and information collected from user on his handset is used to generate secure SMS.After registration customer will get mobile application installed once on his windows mobile. Customer will enter 4-digit MPIN which will be stored in server database in encrypted format using his password. For non-repudiation purpose we have added concept of one time session key. Server uses customer MPIN to generate session key randomly and again stored them in encrypted format. Customer runs the banking application and feed details of 6-digit account number, 4-digit MPIN and 4digit password and click button to get session key. Server sends generated session key to customer handset which will be stored in encrypted format on his handset.Customer goes to menu screen, chooses requires account type and type of transaction he wish to perform and goes to next screen. Mobile client application shows 4 entries on next screen consisting of session key received, generated fixed plain text message depending upon transaction chosen, cipher text created from combination of plain text and MPIN and 4-part secure message. Secure SMS contains account number in plain text, session key in encrypted format, cipher text created from plain text and MPIN and message digest calculated from message.Customer will send message to sever using as normal message. C. Receiving and Replying Secure SMS from Server Module Proposed Server is running on computer installed with required software like VB. NET, Windows mobile device centre and SDK, . NET compact framework, MS-access and Server side application. Server side application has four modules as SMS Service, Information Manage, Transaction Manage and User Requests. SMS service module retrieves SMS received at Server side handset and decode it to get original query send by customer.Server application process query, get required data from bank database and then sends it in encrypted format to customer mobile through bank side modem. Whenever Customer sends any secure SMS containing his transaction query to server side GSM Modem, Server application automatically retrieves secure SMS and deletes it from server attached handset to avoid flooding of message inbox. We have used ActiveX control for this purpose. Bank Server application splits received secure SMS in same 4-parts. Server reads first part, a plain text 6-digit account number and compares it with database stored account number.If match is not found, it will send message â€Å"Wrong Account Number† to customer handset. If account match is found then server uses 2nd part of secure SMS, which is session key send by user to decrypt 3rd part of received secure SMS. After decrypting 3rd part of SMS, server application gets combination of plaintext as customer original transaction query followed by 4-digit MPIN. Server application compares received MPIN with stored MPIN from server table if a match is not found, will send message â€Å"Wrong Pin Number† to customer handset.Server calculates message digest of 3rd part received using MD5 algorithm and compare it with received massage digest, 4th part of secure SMS to check for message integrity. If match is not found, server generates message on server side â€Å"Fake Transaction† and sends nothing to customer side handset as it may be off any malicious user. If all security checks are proper, Server application process query of customer and get required data from database encrypts data using session key received from customer and sends automatically to customer handset.VI. EXPERIMENTAL RESULTS We have developed two applications for client and server side. Mobile client application is developed using . NET compact framewor k and VB. NET, installed on windows mobile supported HTC mobile device. This application is used by customer for various M-banking transactions to send encrypted secure SMS to bank ISSN : 0975-4024 Dec 2011- Jan 2012 476 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Server and gets back encrypted reply from bank Server.Client and Server side application performs symmetric encryption and decryption using 256-bit AES symmetric encryption algorithm. MD5 algorithm is used for hashing purpose. Server side bank application is developed using VB. NET it uses SMS toolkit, an ActiveX control to retrieve and process secure SMS automatically. Server side application also contains certain modules for database management of customer account and transactions Normally symmetric cryptographic algorithm don’t have non-repudiation as both party shares common secret key but we have used session key concept for maintaining non-repudiation propert y of encryption.Since Session key is used only once and created randomly, no two users can have common session key and it is created from MPIN, a master key which customer only knows so he cannot deny that he has done transaction. We have carried out 6 types of transaction including Account Balance, Mini transactions, Cheque Book Request, Cheque Stop request, Pay Bill and Fund Transfer. Following are some sample client application module. The figure no. 3 shows session key, user query in fixed plain text format, cipher text generated from combination of plain text and his MPIN and 4-part secure SMS message generated as per format discussed.This last message is sent to server. Fig. 3. Generating 4-Part Secure Message This secure SMS is retrieved by server side SMS service module. Server application split message and decrypt it to get original transaction query of customer. This query is processed to get response data from database which is firstly encrypted and then send to customer handset. Customer handset get auto reply from server side in cipher text, which is decrypted on mobile by client side application to get server response in plain text. The Figure no. 4 shows response obtained automatically from server for account balance.This reply consists of 3 parts. First part is common session key used by server and client. Second part is cipher text received from server application in secure manner. Third part is plain text message obtained after decrypting secure message received from server. Client mobile application uses 256-bit AES algorithm to decrypt message using common session key. This message will be hidden from customer and he will only get final query results in plain text format but for result purpose we have shown this screen. ISSN : 0975-4024 Dec 2011- Jan 2012 477Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Fig. 4. Secure Reply from Server To be a secure system, it must satisfy Confidentiality, Authentication, Integrity and Non-Repudiation Secure SMS system maintains confidentiality using AES cryptography and Non-Repudiation using session key. Here 3-factor authentication is used for authentication and security purpose whereas Message integrity is carried out using MD5 algorithm. VII. CONCLUSION AND FUTURE WORK We have implemented a secure SMS based Mobile Banking system.The system allows user to carry out all banking transaction securely from anywhere, anytime. All messages from user windows mobile are sent in encrypted format to bank server. Bank server decrypt message, process query and encrypt result in SMS. Server sends message to customer which will be decrypted on his handset. The evaluation of the system was studied for varying banking transaction and under various security threatening malicious activities were recorded. Performance of the transaction is studied. We have executed few banking transaction from HTC windows mobile and using VB.Net server side applicati on. We have used LG GSM mobile as server attached mobile device. Experiments shows that secure SMS Mobile banking provides cost effective and secure system with satisfying Confidentiality, Authentication, Integrity and Non-Repudiation using symmetric cryptography. Application can be used on any windows mobile supported handset from anywhere as no GPRS and WAP are required. We have implemented system using symmetric key AES algorithm. In future better power consumption algorithm like blowfish can be tried out.Steganogrpahy can also be applied for secure M-banking transactions. We can use concept of STK, SIM application toolkit where bank can stored the application and encryption keys on SIM. REFERENCES [1] [2] [3] [4] [5] Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, â€Å"Mobile banking Services in bank area†, SICE Annual Conference 2007, Japan Martinez Borreguero, F. Javier and Chaparro Pelaez, Julian,†Spanish Mobile Banking Services: An Adoption Study†, Proceedings of the International Conference on Mobile Business 2005.Mohammad Shirali-Shahreza,†Improving Mobile Banking Security Using Steganography â€Å", International Conference On Information Technology. Przemyslaw Krol, Przemyslaw Nowak, Bartosz Sakowicz,†Mobile Banking Services Based On J2ME/J2EE†, CADSM’2007. Yousuf S. AlHinai, Sherah Kurnia and Robert B. Johnston,†Adoption of Mobile, Commerce Services by Individuals: A Meta-Analysis of the Literature†, Sixth International Conference on the Management of Mobile Business . ISSN : 0975-4024 Dec 2011- Jan 2012 478 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. (6), 2011, 472-479 [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] T N T Nguyen, P Shum and E H Chua,†Secure end-to-end mobile payment System†. Ashutosh Saxena, Manik Lal Das and Anurag Gupta,†MMPS: A Versatile Mobile-to-Mobile Payment System†, Proceedings of the International Conference On Mobile Business 2005. Iuon-Chang Lin and Yang-Bin Lin,†An Efficient Steganography Scheme for M- Commerce†. Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, †Text Steganography in SMS†, 2007 International Conference on Convergence Information Technology.Sandeep Singh Ghotra, Baldev Kumar Mandhan, Sam Shang Chun Wei, Yi Song, Chris Steketee, †Secure Display and Secure Transactions Using a Handset†, Sixth International Conference on the Management of Mobile Business. Jiehua Wang, Song Yuan, â€Å"A Novel Security Mobile Payment System Based On Watermarked Voice Cheque†. M. Shirali-Shahreza, â€Å"Stealth Steganography in SMS†, Proceedings of the third IEEE and IFIP International Conference on Wireless and Optical Communications Networks 2006.Kewin Chikomo, Ming Ki Chong, Alpan Arnab, Andrew Hutchison, â€Å"Security of Mobile Banking†. Dilla Salama Abdul Minaam. Hatem M. Abdul Kadir, Mohily Mohamed Hadhoud ,† Evaluating the effects of Symmetric Cryptographic algorithms on Power Consumption for different data types†, International Journal of Network Security, Volume 11, September 2010. Managing the Risk of Mobile Banking Technologies, Bankable Frontier Associates. Deshpande Neeta, kamalapur Snehal,† Implementation of LSB Steganography and its Evaluation for various bits†. ISSN : 0975-4024 Dec 2011- Jan 2012 479