Top Banner
Diffusion of Mobile Commerce Application in the Market ABSTRACT The rapid growth of mobile applications has given rise to a new term—mobile commerce, or m- commerce. Due to the fact that m-commerce is still at its initial stage, there is no unified definition of it. Any transaction or economic values managed through at least one kind of mobile terminal equipment on the mobile telecommunication network are considered a part of mobile commerce. In general mobile commerce is defined as the application of wireless communications networks and devices to the execution of transactions with monetary value either direct or indirect. Mobile applications have become especially valued in an age where time is precious and the weight attached to convenience is high. Also, the rapid proliferation of wireless devices, including mobile phones, personal digital assistants (PDAs), and other handheld devices, has made mobile commerce a major driving force for the next wave of electronic commerce. In addition, mobile commerce is expected to have an
168
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Abstract

Diffusion of Mobile Commerce Application in the Market

ABSTRACT

The rapid growth of mobile applications has given rise to a new term—

mobile commerce, or m-commerce. Due to the fact that m-commerce is still at its

initial stage, there is no unified definition of it. Any transaction or economic values

managed through at least one kind of mobile terminal equipment on the mobile

telecommunication network are considered a part of mobile commerce. In general

mobile commerce is defined as the application of wireless communications

networks and devices to the execution of transactions with monetary value either

direct or indirect.

Mobile applications have become especially valued in an age where time is

precious and the weight attached to convenience is high. Also, the rapid

proliferation of wireless devices, including mobile phones, personal digital

assistants (PDAs), and other handheld devices, has made mobile commerce a

major driving force for the next wave of electronic commerce. In addition, mobile

commerce is expected to have an even greater impact on organizations, as wireless

technologies and application begin to challenge the existing process, strategies,

structures, roles of individuals, and even cultures of organizations.

Many scholars and analysts have asserted that there is a huge market

potential for mobile commerce applications. It is becoming one of the major topics

of interest for the IS research community and a key priority for many business

organizations. The eyes of scholars and industry representatives are now on the

Page 2: Abstract

Diffusion of Mobile Commerce Application in the Market

opportunities offered by wireless media, envisaging that the next –or the real phase

of e-business growth will be in the area of mobile commerce.

Nowadays, our world is characterized by the development of communication

technologies. World of information is a reality through the evolution of the Internet

and people can have access to a vast amount of data by just clicking on their

personal computer. Moreover, as the standard of living becomes higher, people

want efficient and effective access of information anytime and anywhere. Mobile

phones and other mobile devices contribute to the effective and efficient access to

information. People can call a call center and get informed about what they want.

However, handling routine phone requests can consume a substantial amount of

staff time and money. For this reason many companies have replaced live operators

with an automated system which is based on IVR (interactive voice response)

technology. More advanced IVR systems allow callers to retrieve customized

information. A system with text-to-speech recognition can read aloud information

that is stored in a database. Banks and credit card companies use IVR systems as

well, so that their customers can receive up-to-date account information instantly

and easily without having to speak directly to a person. IVR technology is also

used to gather information, as in the case of telephone surveys in which the user is

prompted to answer questions by pushing the numbers on a touch-tone telephone.

VoiceXML is a substantial element for the implementation of IVR systems. The

typical VoiceXML browser runs on a specialized voice gateway node that is

connected both to the public switched telephone network and to the Internet. These

voice gateways extend the power of the web to the world’s 1,300,000,000 phones.

Page 3: Abstract

Diffusion of Mobile Commerce Application in the Market

Here a web based application, in particular a dynamic voice portal which

allows users to access dynamic cultural content that is stored in a database. This

application is based on IVR systems and is designed with VoiceXML and JSP.

Page 4: Abstract

Diffusion of Mobile Commerce Application in the Market

CONTENTS

1. Introduction

2. Literature Survey

2.1. Classification of Mobile Commerce Application

2.2. Diffusion of Mobile Commerce Application

3. Project Description

3.1. Job Hunting

3.2. Mobile Voting

3.3. Programming Modules

4. System Specification

4.1. Hardware Specification

4.2. Software Specification

5. Architecture

5.1. Architecture for Job Hunting

5.2. Architecture for Mobile Voting

6. Code

6.1 .Job Hunting

6.2 .Mobile Voting

7. Implementation

Page 5: Abstract

Diffusion of Mobile Commerce Application in the Market

7.1. Implementation of job hunting

7.2. Data flow diagram for job hunting

7.3. Use case diagram for job hunting

7.4. Implementation of mobile job hunting

7.5. Mobile voting speech process

7.6. Data flow diagram for vote casting

7.7. Use case diagram for voter login

8. Testing

8.1. Testing for mobile system

9. Snapshot

9.1. Snapshot for job hunting

9.2. Snapshot of mobile voting

10. Performance analysis

10.1. Building the house of quality model mobile commerce to improve performance

10.2. performance analysis of mobile voting

11. Future Enhancement

11.1. Wireless use equipment and system

11.2 .radio frequency Identification

11.3. Location determination

11.4. Software defined radio

11.5. Adaptive modulation and coding

11.6. Digital signal compression

Page 6: Abstract

Diffusion of Mobile Commerce Application in the Market

11.7. Biometrics

12. Conclusion

13. Bibliography

Page 7: Abstract

Diffusion of Mobile Commerce Application in the Market

CHAPTER 1

INTRODUCTION

The rapid growth of mobile applications has given rise to a new term—mobile

commerce, or m-commerce. Due to the fact that m-commerce is still at its initial

stage, there is no unified definition of it. Any transaction or economic values

managed through at least one kind of mobile terminal equipment on the mobile

telecommunication network are considered a part of mobile commerce. In

general mobile commerce is defined as the application of wireless

communications networks and devices to the execution of transactions with

monetary value either direct or indirect.

Mobile applications have become especially valued in an age where time is

precious and the weight attached to convenience is high. Also, the rapid

proliferation of wireless devices, including mobile phones, personal digital

assistants (PDAs), and other handheld devices, has made mobile commerce a

major driving force for the next wave of electronic commerce. In addition, mobile

commerce is expected to have an even greater impact on organizations, as

wireless technologies and application begin to challenge the existing process,

strategies, structures, roles of individuals, and even cultures of organizations.

Many scholars and analysts have asserted that there is a huge market

potential for mobile commerce applications. It is becoming one of the major

topics of interest for the IS research community and a key priority for many

Page 8: Abstract

Diffusion of Mobile Commerce Application in the Market

business organizations. The eyes of scholars and industry representatives are now

on the opportunities offered by wireless media, envisaging that the next –or the

real phase of e-business growth will be in the area of mobile commerce.

Nowadays, our world is characterized by the development of

communication technologies. World of information is a reality through the

evolution of the Internet and people can have access to a vast amount of data by

just clicking on their personal computer. Moreover, as the standard of living

becomes higher, people want efficient and effective access of information

anytime and anywhere. Mobile phones and other mobile devices contribute to

the effective and efficient access to information. People can call a call center and

get informed about what they want. However, handling routine phone requests

can consume a substantial amount of staff time and money. For this reason many

companies have replaced live operators with an automated system which is based

on IVR (interactive voice response) technology. More advanced IVR systems allow

callers to retrieve customized information. A system with text-to-speech

recognition can read aloud information that is stored in a database. Banks and

credit card companies use IVR systems as well, so that their customers can

receive up-to-date account information instantly and easily without having to

speak directly to a person. IVR technology is also used to gather information, as in

the case of telephone surveys in which the user is prompted to answer questions

by pushing the numbers on a touch-tone telephone. VoiceXML is a substantial

element for the implementation of IVR systems. The typical VoiceXML browser

runs on a specialized voice gateway node that is connected both to the public

Page 9: Abstract

Diffusion of Mobile Commerce Application in the Market

switched telephone network and to the Internet. These voice gateways extend

the power of the web to the world’s 1,300,000,000 phones.

Here a web based application, in particular a dynamic voice portal which

allows users to access dynamic cultural content that is stored in a database. This

application is based on IVR systems and is designed with VoiceXML and JSP.

Page 10: Abstract

Diffusion of Mobile Commerce Application in the Market

CHAPTER 2

LITERATURE SURVEY

Several applications based on VoiceXML have been developed in following

different approaches. Many companies have invested in this technology. We

present some of them. One popular company which is one of the prevalent

companies in the world and is based on IVR systems is Nuance. Nuance is one of

many providers of speech and imaging solutions for businesses and consumers

around the world. Nuance 8.5 supports voice automation services that are built

using VoiceXML 2, the open, standards-based voice application programming

language. With the VoiceXML 2.0 standard and Nuance 8.5 speech recognition

software, carriers and enterprises can leverage their existing expertise and

investments in Web infrastructure to reduce the cost and effort of deploying

voice-driven services. Hearsay is a non-visual Web browser developed at Stony

Brook University in collaboration with the Helen Keller Services for the Blind in

Hempstead, NY. hearsay features a flexible dialog interface and innovative

context-directed browsing not used by any existing screen - readers. HearSay

helps visually impaired and blind users browse the Web more efficiently and

quickly by identifying relevant information on Web pages. The technology

underlying hearsay brings together the fields of content analysis, natural language

processing, and machine learning.

In the past, voice-enabled applications were based upon prerecorded

audio. New information models and speech synthesis tools have boosted the

development of voice enabled applications. The text-to-speech synthesis feature

Page 11: Abstract

Diffusion of Mobile Commerce Application in the Market

of advanced VoiceXML tools has opened new perspectives in the fields of e-

commerce and e-learning too. We are no longer restricted to prerecorded audio

but can bring any text to the ear of the user - a user that could be visually

impaired and needs a voice channel to communicate - or a user who can read but

who prefers to listen. Voice-enabled applications can support e-learning in many

ways. They can open e-learning systems to visually impaired users.

A bank can let its customers access their account balances, obtain

information on interest rates and mortgages, calculate loan payments, or transfer

funds, all using voice response applications. Using a voice response application,

brokerage firms can make current stock prices, quotations, and portfolio balances

available over the telephone. Clients can perform complex transactions without

the intervention of a broker. The design of the Voice XML dialogues which enable

the interaction is informed by the experience of workers on the Age Resource

Desk at Age concern Oxford shire and comments from their clients who

experimented with a VoiceXML system. A synthesis of work was carried out by

tutors at Age Concern Oxford shire and research work from the Speech Project at

Oxford Brookes University. It describes the Voice Access Booking System (VABS)

which enables clients at Age Concern Oxford shire to organize their IT taster

session by booking, cancelling or rearranging them using a speech dialogue over

the telephone from their own homes.

2.1 CLASSIFICATION OF MOBILE COMMERCE APPLICATION

There are potentially an unlimited number of mobile commerce applications,

which leads to a demand for classification, since currently, it is almost impossible

Page 12: Abstract

Diffusion of Mobile Commerce Application in the Market

to cover the whole range of potential mobile commerce application. To help

understand mobile commerce, we reviewed the classification of mobile

commerce application. It will allow developers and providers to strategize and

effectively design and implement mobile commerce applications.

In general, mobile commerce applications have two major attributes:

mobility and reachability. According these attributes, mobile commerce

application can be classified into the following six categories: Time critical services

(e.g. SMS-based notifications or alerts);

Location-aware and location-sensitive service (e.g. mobile advertising, product

location tracking); Identity enacted service (e.g. mobile bank, mobile

micropayments); Ubiquitous communications and content delivery services (e.g.

video-on-demand, interactive game); Business process streamlining; Mobile

office. Senn classified mobile commerce applications into three main categories:

transaction management (e.g. payment, shopping), digital content delivery (e.g. E-

mail, short messages) and telemetry services (e.g. status monitoring, smart

messaging). Varshney and Vetter developed a more detailed class of mobile

commerce applications roughly categorized by mobile commerce models based

on mobile characteristics. The applications are classified into 11 categories,

including mobile financial applications, mobile advertising, mobile inventory

management, locating and shopping for products, proactive service management,

wireless re-engineering, mobile auctions or reverse auctions, mobile

entertainment services and games, mobile offices, mobile distance education, and

wireless data centers .Yuan and Zhang argue that value propositions in mobile

commerce which define the relationship between seller offerings and buyer

Page 13: Abstract

Diffusion of Mobile Commerce Application in the Market

purchases by identifying how the seller achieves the buyer’s needs originate from

mobility and location awareness and are contrary to Internet-based ecommerce.

Therefore, they group various mobile commerce applications based on these

value propositions into six categories (Ubiquitous communication, Emergency and

time critical information services, Location-sensitive service, Pocket e-wallet,

portable entertainment, Improving productivity of mobile workforce).

From the perspective of marketing, Nysveen, Pedersen, and Thorbjornsen

propose a grid of mobile Internet service classification that employs four primary

axes: person-interactive versus machine interactive, and goal-oriented versus

experiential service. “Person interactivity” occurs between people through a

medium, while “machine interactivity” refers to the interaction between people

and the medium. In the latter, users can freely modify the content and form of a

mediated environment. A goal-oriented process is defined by utilitarian benefits,

while an experiential process provides hedonic benefits. From the perspective of

market, we could perceive the diffusion trend of mobile commerce application in

market, from communication service, information service to transaction service

and interaction service. In this paper, we incorporated the diffusion of mobile

commerce application with perspective of marketing as a new analytic framework

(Figure 2.1).

Page 14: Abstract

Diffusion of Mobile Commerce Application in the Market

Fig 2.1: Diffusion of m-commerce application in market

2.2 DIFFUSION OF MOBILE COMMERCE APPLICATION

To promote mobile commerce, there should be less focus on increasing the

speeds of wireless data networks now and more on developing compelling

applications. With an increasingly mobile society, more and more people are one

the move. Many interesting services can be offered to these people through

mobile device and wireless networks. This includes mobile communication

service, mobile information service, mobile transaction service, and mobile

interaction service.

2.2.1 Mobile Communication Services

Mobile communications facilitate personal contact anytime, anywhere. While

voice and short messages are currently the primary form of mobile

communication, future mobile devices such as 3G phones are capable of handling

much more information and providing broader bandwidth. As a result, ubiquitous

communications can become an important application in m-commerce.

Page 15: Abstract

Diffusion of Mobile Commerce Application in the Market

Some researchers seem to agree that e-mail services will become an initial

killer wireless application for mobile commerce. Gordon Xu.et.al carried out a

Delphi survey and the result indicated that short message service (SMS) was most

likely killer application of m-commerce. They also identified four features of SMS

and the critical success factors in m-commerce.

2.2.2 Mobile Information Services

Since people have different information needs and preferences, one of the

challenges for mobile information systems is to take advantage of the

convenience of handheld devices and provide personalized information to the

right person in a preferred format. Dongsong Zhang proposed a generic

framework for delivering personalized and adaptive content to mobile users. It

introduced a variety of enabling technologies and highlights important

issues in this area.

Finding the geographic location of a person is commercially valuable

because, in a mobile society, people and goods are in motion, and tend to

become lost in this mobile environment. If a service could help pinpoint the

location of a mobile device to the degree of precision appropriate for different

applications, significant value could be added.

Location–based services (LBS) are services that generate commercial

activity by using geographic location (i.e., place-related) information of the mobile

Page 16: Abstract

Diffusion of Mobile Commerce Application in the Market

devices, along with information about services and products available in (certain

degree of) physical proximity. LBS include locate-info service, mobile advertising,

product location tracking service, locate-a friend service, mobile inventory

management, and patient monitoring service. These services generated great

interest among researchers and developers, primarily due to the presumed

potential for: (1) user empowerment, (2) the estimated market for location based

advertising, (3) and the ability to handle many emergency situations(e.g., airline

flight schedule changes, stock price alerts and quotations, home burglar alarms).

Varshney presented integrated location management architecture to

support the diverse location requirements of m-commerce applications. The

proposed architecture is capable of supporting a range of location accuracies,

wider network coverage, wireless multicast, and infrastructure dependability for

m-commerce applications. Varshney (2005) also identified and discussed several

vehicular mobile commerce applications as well as wireless and networking

challenges. He presented possible solutions for vehicular mobile commerce and

defined several research problems that should be undertaken.

Mobile adverting can also be a very important part of mobile commerce

applications. Using demographic information collected by wireless service

providers and the information on the current location of mobile users, much

targeted advertising can be done. The advertisements sent to a user can also be

location sensitive to inform a user about various on-going specials (shops, malls,

and restaurants) in surrounding areas.

Page 17: Abstract

Diffusion of Mobile Commerce Application in the Market

2.2.3 Mobile Transaction Services

The power of mobile commerce is primarily due to the anytime-anywhere

connectivity of wireless devices, which provides enormous opportunities for

business process innovation. Mobile services can also be used to enhance the

efficiency of business processes and reduce transaction costs or improve service

quality.

Mobile financial applications are likely to be one of the most important

components of mobile commerce. These could involve a variety of applications

such as mobile banking and brokerage service, mobile money transfer, and

mobile micro-payment. These services could turn a mobile device into a business

tool, replacing bank, ATM, and credit cards by mobile money. Certainly more

work is needed in providing transaction support in the applications and network

infrastructure. Secure transactions are required before any of these applications

are widely deployed.

Herzberg believed the use of secure and convenient mobile personal

devices could revolutionize the payment, banking, and investment industries

worldwide. He also discussed some of the challenges and opportunities involved

in their use for making secure payments and authorizing banking transactions.

Clayton.et.al presented a classification scheme of m-commerce, examined the

relative strengths and weaknesses of the models, and discussed developing

trends and their implications for mobile commerce in the brokerage industry.

Niina.et.al investigated some mobile financial applications, including both mobile

payments and banking services, showing how the new financial services can be

Page 18: Abstract

Diffusion of Mobile Commerce Application in the Market

deployed in mobile networks and identifying the main players in the mobile

financing value chain. They used examples from the European context to highlight

the features of the new services as they explored the players’ particular strengths

and weaknesses in providing the services.

2.2.4 Mobile Interaction Services

Entertainment is an important interactive service that mobile commerce could

provide. It includes mobile games, mobile music, video-on-demand and other

services. The convergence of entertainment, Internet and telecommunication

industries has taken steps towards creating completely new ways to spend time,

so mobile games are revolutionizing entertainment. Mobile games are interactive

in nature and it allows players to experience virtual worlds far more exciting than

everyday life. In Japan the downloadable wireless entertainment is become

extremely popular. It has changed the way people wait for transportation or just

kill time. This development has begun also in western world and China.

Kleijnen.et.al published an interesting study of mobile gaming adoption in

the Netherlands. They applied a series of sophisticated multivariate analyses to

examine mobile gamers’ profiles. Pavlos and Adam investigated customers’

preferences and attitudes towards mobile music services in Europe through an

exploratory research approach. Their findings suggested mobile music providers

should design tailored marketing mix programs towards sufficiently meeting the

needs of customers in the emerging mobile music industry.

Page 19: Abstract

Diffusion of Mobile Commerce Application in the Market

Page 20: Abstract

Diffusion of Mobile Commerce Application in the Market

CHAPTER 3

PROJECT DESCRIPTION

Our project’s ideal goal is to enable the mobile phone to Vote and hunt for a job

Mobile communication systems of today provide increased availability,

miniaturization and enhanced data rates. This emergence is expected to enhance

the deployment of mobile systems in many services.

3.1 JOB HUNTING

In India all earlier job Hunt the employer and the jobseeker need to depend fully

on the website and text based information display is there. In this voice based job

hunt the job seekers can easily get the information through the landline or mobile

with the help of IVRS based system through voice xml.

3.1.1 Existing System

Job Hunter can get the job information only if they have internet connection or

only through newspaper and its fully text based information system.

3.1.2 Drawbacks of Existing System

If internet is not available say some remote area the job hunters won’t get

the correct information at correct time. So there is a major chance of losing

their interviews.

The job hunter cannot always read all the papers which and displaying all

job related rules.

Page 21: Abstract

Diffusion of Mobile Commerce Application in the Market

There are lot web site and newspapers are available so they cannot predict

in which paper or in which website they may get the correct information.

3.1.3 Proposed System

Our system is purely based on voice and it can be transmitted to both mobile and

landline phones. Existing systems were mainly based on text but in the proposed

system the main aim is to deliver the service through speech.

3.1.4 Features of the Proposed System

Nowadays Telecommunication is the basic for all people.

Delivering a job hunt based on IVRS through telecommunication will easily

reach the jobseeker.

3.1.5 Advantages of the Proposed System

The jobseeker can easily get the information only if they have a mobile or

landline.

This increases the number of candidates attending interview so it will be

helpful for the company to get the right candidate.

3.2 MOBILE VOTING

In this Project, Mobile technology-IVR is used for election polling.

3.2.1 Existing System

Voting is done in voting stations where voters cast their votes using electronic

Page 22: Abstract

Diffusion of Mobile Commerce Application in the Market

voting device.

3.2.2 Drawbacks of Existing System

Voting station might be far and the voters cannot go there.

Voters will have to stand in long queues to cast their votes.

3.2.3 Proposed System

A Person needs to call a Number authorized by the Election Committee. First the

person will be evaluated asking for the biometric election card number. An

algorithm is implemented for security reasons. Once the person is authorized, he

can continue with the polling process. After that, IVR will play the various parties

contesting in elections. Based on the User inputs, polling will be recorded. User

inputs can either be DTMF or Speech Recognition.

3.2.4 Features of Proposed System

If voters want to vote through Mobile, they have to be registered in

Election Commission or they can register online provided they must have a

unique identification number like pan card number, license number etc.

This means that the voters have already registered their real names and

addresses by presenting their eligible credentials at the time of

subscription.

The mobile users have to dial a designated phone number and follow the

instructions using a password already provided.

Privacy: All votes remain secret while voting takes place and each individual

3.2.5 Advantages of Proposed System

Mobile Voting can be used in cases where it is physically impossible for the

Page 23: Abstract

Diffusion of Mobile Commerce Application in the Market

voter to travel to the polling station to vote.

Mobile Voting for persons who are physically disabled or who cannot

come to the polling station for other valid reasons.

1. Blind peoples.

2. Handicapped peoples.

To achieve democracy, Voters need to be properly registered and

authenticated, and then there should be a convenient way for them to cast

their votes, for example, availability of different language choices, special

aid for disabled voters, and proper ways for absentee voting and early

voting.

Voters can also choose not to vote.

3.3 PROGRAM MODULES

3.3.1 Sip Phone

Sip phone is an emulator with the help of which user can call IVRS. Here there is

more than one line. So based on their application which they want to contact, the

customer can call that particular line. In this, emulator is used to receive the user

input in the format of DTMF or Speech and it also delivers the output to the user

in the form of speech.

3.3.2 Call Routing

You may have one or many inbound telephone numbers. Set up a call route to

specify which application to play when a call is placed to a specific telephone

number or DID. You can also define a default application to play when an

Page 24: Abstract

Diffusion of Mobile Commerce Application in the Market

unassigned number is dialed. Here in our application we have set the routing by

giving our default local server URL.

3.3.3 Voice Browser

Voice Browser is a web Browser in which the voice xml (VXML) is embedded in

Java Server Pages(JSP) and its is ready to get the user input in the format of

DTMF or Speech mode and it analyze the user input and based on that it will

deliver the output in the format of voice.

Page 25: Abstract

Diffusion of Mobile Commerce Application in the Market

CHAPTER 4

SYSTEM SPECIFICATION

4.1 HARDWARE SPECIFICATION

Processor : Pentium IV

Processor Speed : 1.8 GHz

Hard Disk Capacity : 40 GB

Clock Speed : 650 MHz

RAM Capacity : 1GB

4.2 SOFTWARE SPECIFICATION

Operating System : Windows XP

Front End : JSP, VXML, SIP Phone Emulator

Back End : MYSQL SERVER

Page 26: Abstract

Diffusion of Mobile Commerce Application in the Market

CHAPTER 5

ARCHITECTURE

5.1 ARCHITECTURE FOR JOB HUNT

The Architecture for job hunt is as per the figure 5.1 shown below.

The customer can call IVRS using a mobile or a Landline phone which

connects to the host IVRS server with the help of PSTN (public switched telephone

network). In the server there will be an option to route more than one call with

the call Router. This helps to run more than one IVRS application simultaneously

in time sharing basis.

Page 27: Abstract

Diffusion of Mobile Commerce Application in the Market

Fig 5.1: Architecture for Job Hunt

In the IVRS server, our server program containing jsp and voice xml will be

embedded and it is useful for getting the input from the user as well as delivering

output to the user through sip phone emulator. Our server application will

contact the particular database and it will get all the resources and deliver to the

end user in the form of voice.

5.1.1 Interactive Voice Response System (IVRS)

IVRS is a technology that allows a computer to detect voice and Dual Tone Multi

Frequency signaling (DTMF) keypad inputs. IVR technology is used extensively in

telecommunication, but is also being introduced into automobile systems for

hands-free operation. Current deployment in automobiles revolves around

satellite navigation, audio and mobile phone systems. In telecommunications, IVR

allows customers to access a company’s database via a telephone keypad or by

Page 28: Abstract

Diffusion of Mobile Commerce Application in the Market

speech recognition, after which they can service their own inquiries by following

the instructions.

IVR systems can respond with pre-recorded or dynamically generated audio

to further direct users on how to proceed. IVR systems can be used to control

almost any function where the interface can be broken down into a series of

simple menu choices. In telecommunications applications, such as customer

support lines, IVR systems generally scale well to handle large call volumes.

5.1.2 Public Switched Telephone Network (PSTN)

The PSTN is the network of the world's public circuit switched telephone

networks. Originally a network of fixed-line analog telephone systems, the PSTN is

now almost entirely digital in its PSTN operators.

Regulation of the PSTN

In most countries, the government has a dedicated to monitoring the provision of

PSTN services in that country. Their tasks may be for example to ensure that end

customers are not over-charged for services where monopolies may exist. They

may also regulate the prices charged between the operators to carry each other’s

traffic.

Technology in the PSTN

Network Topology

The PSTN network architecture had to evolve over the years to support increasing

numbers of subscribers, calls, connections to other countries, direct dialing and so

on. The model developed by the US and Canada was adopted by other nations,

with adaptations for local markets.

Page 29: Abstract

Diffusion of Mobile Commerce Application in the Market

The original concept was that the telephone exchanges are arranged into

hierarchies, so that if a call cannot be handled in a local cluster, it is passed to one

higher up for onward routing. This reduced the number of connecting trunks

required between operators over long distances and also kept local traffic

separate.

However, in modern networks the cost of transmission and equipment is

lower and, although hierarchies still exist, they are much flatter, with perhaps

only two layers.

Digital channels

Most automated telephone exchanges now use digital switching rather than

mechanical or analog switching. The trunks connecting the exchanges are also

digital, called circuits or channels. However analog two-wire circuits are still used

to connect the last mile from the exchange to the telephone in the home (also

called the local loop). To carry a typical phone call from a calling party to a called

party, the analog audio signal is digitized at an 8 kHz sample rate using 8-bit pulse

code modulation (PCM). The call is then transmitted from one end to another via

telephone exchanges. The call is switched using a call set up protocol (usually

ISUP) between the telephone exchanges under an overall routing strategy.

The call is carried over the PSTN using a 64 Kbit/s channel, originally

designed by Bell Labs. The name given to this channel is Digital Signal 0 (DS0). The

DS0 circuit is the basic granularity of circuit switching in a telephone exchange. A

DS0 is also known as a timeslot because DS0s are aggregated in time-division

multiplexing (TDM) equipment to form higher capacity communication links. A

Digital Signal 1 (DS1) circuit carries 24 DS0s on a North American or Japanese T-

Page 30: Abstract

Diffusion of Mobile Commerce Application in the Market

carrier (T1) line, or 32 DS0s (30 for calls plus two for framing and signaling) on an

E-carrier (E1) line used in most other countries. In modern networks, the

multiplexing function is moved as close to the end user as possible, usually into

cabinets at the roadside in residential areas, or into large business premises.

These aggregated circuits are conveyed from the initial multiplexer to the

exchange over a set of equipment collectively known as the access network. The

access network and inter-exchange transport use synchronous optical

transmission, for example, SONET and Synchronous Digital Hierarchy (SDH)

technologies, although some parts still use the older PDH technology. Within the

access network, there are a number of reference points defined. Most of these

are of interest mainly to ISDN but one – the V reference point – is of more general

interest. This is the reference point between a primary multiplexer and an

exchange. The protocols at this reference point were standardized in ETSI areas as

the V5 interface core and includes mobile as well as fixed telephones.

5.1.3 Dual Tone Multi Frequency Signals (DTMF)

DTMF signals (entered via the telephone keypad) and natural language speech

recognition interpret the caller's response to voice prompts. Other technologies

include the ability to speak complex and dynamic information, such as an e-mail,

news report or weather information using Text-To-Speech (TTS). TTS is computer

generated synthesized speech that is no longer the robotic voice generally

associated with computers. Real voices create the speech in fragments

(phonemes) that are spliced together (concatenated) before being played to the

caller.

An IVR can be utilized in several different ways:

Page 31: Abstract

Diffusion of Mobile Commerce Application in the Market

1. Equipment installed on the customer premise

2. Equipment installed in the PSTN (Public Switched Telephone Network)

3. Application service provider (ASP).

4. Hosted IVR

A simple voice mail system is different from IVR in that it is person-to-

person, whereas an IVR is person to computer. IVR voice forms can be used to

provide a more complex voice mail experience to the caller. For example, the IVR

could ask if the caller wishes to hear, edit, forward or remove a message that was

just recorded.

An automatic call distributor (ACD) is often the first point of contact when

calling many larger businesses. An ACD uses digital storage devices to play

greetings or announcements, but typically routes a caller without prompting for

input. An IVR can play announcements and request an input from the caller. This

information can be used to profile the caller and route the call to an agent with a

particular skill set. (A skill set is a function applied to a group of call-center agents

with a particular skill.)

Interactive voice response can be used to front-end a call center operation

by identifying the needs of the caller. Information can be obtained from the caller

such as account numbers. Answers to simple questions such as account balances

or pre-recorded information can be provided without operator intervention.

Account numbers from the IVR are often compared to caller ID data for security

reasons and additional IVR responses are required if the caller ID data do not

match the account record.

Page 32: Abstract

Diffusion of Mobile Commerce Application in the Market

IVR call flows are created in a variety of ways. A traditional IVR depended

upon proprietary programming or scripting languages, whereas modern IVR

applications are structured similar to Web pages, using VoiceXML, CCXML, SRGS,

SALT or T-XML languages. The ability to use XML developed applications allows a

Web server to act as an application server, freeing the developer to focus on the

call flow. It was widely believed that developers would no longer require

specialized programming skills; however this has been proven to be misguided as

IVR applications need to understand the human reaction to the application dialog.

This is the difference between a good user experience and IVR hell. Higher level

IVR development tools are available in recent years to further simplify the

application development process. A call flow diagram can be drawn with a GUI

tool and the application code (VoiceXML or SALT) can be automatically generated.

In addition, these tools normally provide extension mechanisms for software

integration, such as HTTP interface to Web site and Java interface for connecting

to a database.

In telecommunications, an audio response unit (ARU) is a device that

provides synthesized voice responses to DTMF key presses by processing calls

based on (a) the call-originator input, (b) information received from a database,

and (c) information in the incoming call, such as the time of day. ARUs increase

the number of information calls handled and to provide consistent quality in

information retrieval.

5.1.4 VoIP

Page 33: Abstract

Diffusion of Mobile Commerce Application in the Market

The increased usage of VoIP in voice networks is likely to affect how IVR will be

used in voice networks, this is due to the introduction of protocols such as Session

Initiation Protocol (SIP). The introduction of SIP means that point to point

communications is no longer restricted to voice calls but can now be extended to

multimedia technologies such as video. This will bring a new meaning to

automated services as IVR extends its reach to video calls. Many IVR

manufacturers are currently working on IVVR (Interactive Voice and Video

Response) systems, especially for the mobile phone networks.

The use of video will give IVR systems the ability to use graphical and video

information to assist the caller. The introduction of video IVR may allow systems

in the future the ability to read emotions and facial expressions. It may be used to

identify the caller, using technology such as Iris scan or other biometric means.

Recordings of the caller may be stored to monitor certain transactions, and may

be used to reduce identity fraud.

Unified communications in the SIP contact center

With the introduction of SIP contact centers, automation has finally come of age.

Calls arriving at a SIP contact center must now be queued against a SIP IVR

system. Call control in a SIP contact center is controlled by VXML scripting which

is an extension of the language used to write modern IVR Applications. As calls

are queued in the SIP contact center, the IVR system can provide treatment,

automation, wait for a fixed period, or play music. Inbound calls to a SIP contact

center must be queued or terminated against a SIP end point. In addition SIP IVR

Page 34: Abstract

Diffusion of Mobile Commerce Application in the Market

systems can be used to replace agents directly by the use of BBUA (Back to Back

User Agents).

Interactive Messaging Response (IMR)

As communications have migrated to multimedia so has Automation. The

introduction of Instant Messaging (IM) in Contact Centers is starting to take off.

Agents can handle up to 6 different IM conversations at the same time and so

agent productivity is increasing. IVR systems are now starting to handle IM

conversations using existing Speech Recognition Technology. This is different from

email handling as email automated response is based on key word spotting. IM

conversations are different to email as IM is conversational. The use of text

messaging abbreviations and simile’s requires different grammars than those

currently used for speech recognition. IM is also starting to replace text

messaging on Multimedia Mobile handsets and is expected to become more

widely used.

5.1.5 Virtual Private Network (VPN)

VPN is a computer network that is layered on top of an underlying computer

network. The private nature of a VPN means that the data travelling over the VPN

is not generally visible to, or is encapsulated from, the underlying network traffic.

Similarly, the traffic within the VPN appears to the underlying network as just

another traffic stream to be passed. A VPN connection can be envisioned as a

"pipe within a pipe", with the outer pipe being the underlying network

connection.

Page 35: Abstract

Diffusion of Mobile Commerce Application in the Market

The term VPN can be used to describe many different network

configurations and protocols. As such, it can become complex when trying to

generalize about the characteristics of a VPN. Some of the more common uses of

VPNs are described below, along with more detail about the various classification

schemes and VPN models.

Fig 5.2: Virtual Private Network

Mobile VPNs handle the special circumstances when an endpoint of the

VPN is not fixed to a single IP address, but instead roams across various networks

such as data networks from cellular carriers or between multiple Wi-Fi access

points. Mobile VPNs have been widely used in public safety, where they give law

enforcement officers access to mission-critical applications, such as computer-

assisted dispatch and criminal databases, as they travel between different

subnets of a mobile network. They are also used in field service management and

by healthcare organizations, among other industries.

Increasingly, mobile VPNs are being adopted by mobile professionals and

white-collar workers who need reliable connections. They allow users to roam

seamlessly across networks and in and out of wireless-coverage areas without

Page 36: Abstract

Diffusion of Mobile Commerce Application in the Market

losing application sessions or dropping the secure VPN session. A conventional

VPN cannot survive such events because the network tunnel is disrupted, causing

applications to disconnect, time out, or fail, or even cause the computing device

itself to crash.

Instead of logically tying the endpoint of the network tunnel to the physical

IP address, each tunnel is bound to a permanently associated IP address at the

device. The mobile VPN software handles the necessary network authentication

and maintains the network sessions in a manner transparent to the application

and the user. The Host Identity Protocol (HIP), under study by the Internet

Engineering Task Force, is designed to support mobility of hosts by separating the

role of IP addresses for host identification from their locator functionality in an IP

network. With HIP a mobile host maintains its logical connections established via

the host identity identifier while associating with different IP addresses when

roaming between access networks.

5.1.6 Hypertext Transfer Protocol (HTTP)

HTTP is an Application Layer protocol for distributed, collaborative, hypermedia

information systems. HTTP is a request-response standard typical of client-server

computing. In HTTP, web browsers or spiders typically act as clients, while an

application running on the computer hosting the web site acts as a server. The

client, which submits HTTP requests, is also referred to as the user agent. The

responding server, which stores or creates resources such as HTML files and

images, may be called the origin server. In between the user agent and origin

server may be several intermediaries, such as proxies, gateways, and tunnels.

Page 37: Abstract

Diffusion of Mobile Commerce Application in the Market

HTTP is not constrained in principle to using TCP/IP, although this is its most

popular implementation platform. Indeed HTTP can be "implemented on top of

any other protocol on the Internet, or on other networks." HTTP only presumes a

reliable transport; any protocol that provides such guarantees can be used.

5.1.7 Transmission Control Protocol (TCP)

TCP is one of the core protocols of the Internet Protocol Suite. TCP is one of the

two original components of the suite (the other being Internet Protocol, or IP), so

the entire suite is commonly referred to as TCP/IP. Whereas IP handles lower-

level transmissions from computer to computer as a message makes its way

across the Internet, TCP operates at a higher level, concerned only with the two

end systems, for example a Web browser and a Web server. In particular, TCP

provides reliable, ordered delivery of a stream of bytes from a program on one

computer to another program on another computer. Besides the Web, other

common applications of TCP include e-mail and file transfer. Among its other

management tasks, TCP controls segment size, flow control, the rate at which

data is exchanged, and network traffic congestion.

TCP provides a communication service at an intermediate level between an

application program and the Internet Protocol (IP). That is, when an application

program desires to send a large chunk of data across the Internet using IP, instead

of breaking the data into IP-sized pieces and issuing a series of IP requests, the

software can issue a single request to TCP and let TCP handle the IP details.

Page 38: Abstract

Diffusion of Mobile Commerce Application in the Market

IP works by exchanging pieces of information called packets. A packet is a

sequence of bytes and consists of a header followed by a body. The header

describes the packet's destination and, optionally, the routers to use for

forwarding until it arrives at its final destination. The body contains the data

which IP is transmitting.

Due to network congestion, traffic load balancing, or other unpredictable

network behavior, IP packets can be lost, duplicated, or delivered out of order.

TCP detects these problems, requests retransmission of lost packets, rearranges

out-of-order packets, and even helps minimize network congestion to reduce the

occurrence of the other problems. Once the TCP receiver has finally reassembled

a perfect copy of the data originally transmitted, it passes that datagram to the

application program. Thus, TCP abstracts the application's communication from

the underlying networking details.

TCP is used extensively by many of the Internet's most popular applications,

including the World Wide Web (WWW), E-mail, File Transfer Protocol, Secure

Shell, peer-to-peer file sharing, and some streaming media applications.

TCP is optimized for accurate delivery rather than timely delivery, and

therefore, TCP sometimes incurs relatively long delays (in the order of seconds)

while waiting for out-of-order messages or retransmissions of lost messages. It is

not particularly suitable for real-time applications such as Voice over IP. For such

applications, protocols like the Real-time Transport Protocol (RTP) running over

the User Datagram Protocol (UDP) are usually recommended instead.

Page 39: Abstract

Diffusion of Mobile Commerce Application in the Market

TCP is a reliable stream delivery service that guarantees delivery of a data

stream sent from one host to another without duplication or losing data. Since

packet transfer is not reliable, a technique known as positive acknowledgment

with retransmission is used to guarantee reliability of packet transfers. This

fundamental technique requires the receiver to respond with an acknowledgment

message as it receives the data. The sender keeps a record of each packet it

sends, and waits for acknowledgment before sending the next packet. The sender

also keeps a timer from when the packet was sent, and retransmits a packet if the

timer expires. The timer is needed in case a packet gets lost or corrupted.

TCP consists of a set of rules: for the protocol, that are used with the

Internet Protocol, and for the IP, to send data "in a form of message units"

between computers over the Internet. At the same time that IP takes care of

handling the actual delivery of the data, TCP takes care of keeping track of the

individual units of data transmission, called segments that a message is divided

into for efficient routing through the network. For example, when an HTML file is

sent from a Web server, the TCP software layer of that server divides the

sequence of bytes of the file into segments and forwards them individually to the

IP software layer (Internet Layer).

The Internet Layer encapsulates each TCP segment into an IP packet by

adding a header which includes (among other data) the destination IP address.

Even though every packet has the same destination address, they can be routed

on different paths through the network. When the client program on the

destination computer receives them, the TCP layer (Transport Layer) reassembles

Page 40: Abstract

Diffusion of Mobile Commerce Application in the Market

the individual segments and ensures they are correctly ordered and error free as

it streams them to an application.

5.2 ARCHITECTURE FOR MOBILE VOTING

The Architecture for Mobile Voting is as shown in figure 5.3.

Fig.5.3: Architecture for Mobile Voting

5.2.1 Server Module Description

Voting Device (Mobile/Land Phone)

In our scheme, the voting device corresponds to the mobile equipment (ME),

which consists of a SIM card. The device needs to provide a platform to run the

Page 41: Abstract

Diffusion of Mobile Commerce Application in the Market

voting application, which consists of the candidate information, the key storage

and generation functions.

Authentication Centre (AC)

AC is an entity within the GSM network. AC generates the authentication

parameters and authenticates the mobile equipment. Apart from authenticating

the mobile equipment, AC is also an important information distribution server in

the proposed scheme. AC needs to be trusted to transfer the messages as

required.

Verification Server (VS)

VS belong to the voting authority, who organizes the voting event. It verifies the

legitimacy of the voter and issues a voting token to the voter. VS also publish a list

of voter information.

Collecting and Counting Server (CS)

CS is the server that collects and counts the votes to give the final result. CS’s

action need to be audited by all candidate parties.

Page 42: Abstract

Diffusion of Mobile Commerce Application in the Market

CHAPTER 6

CODE

6.1 JOB HUNT

DTMF Mode

//Main.jsp

<?xml version="1.0" encoding="UTF-8" ?>

<vxml version="2.0">

<nomatch>

No Match! I'm sorry, I didn't understand you. Could you please try that again?

<reprompt />

</nomatch>

<noinput>

No Input! I'm sorry, I didn't hear anything. Could you please try that again?

<reprompt />

</noinput>

<menu id="menu">

<property name="inputmodes" value="dtmf"/>

Page 43: Abstract

Diffusion of Mobile Commerce Application in the Market

<prompt bargein="false">Welcome to mobile. Job Hunting.

select the category of job. from the following options.

Please press the related number. to choose the job category.

</prompt>

<prompt>

<enumerate>

<value expr="_prompt"/> press <value expr="_dtmf"/>,

</enumerate>

</prompt>

<choice next="http://localhost:8080/jobHunt/jobCategory/ComputerIT.jsp" dtmf="1">

.Computers and I T.

</choice>

<choice next="http://localhost:8080/jobHunt/jobCategory/Medical.jsp" dtmf="2">

.Medical.

</choice>

<choice next="http://localhost:8080/jobHunt/jobCategory/Sales.jsp" dtmf="3">

.Sales and Marketing.

</choice>

Page 44: Abstract

Diffusion of Mobile Commerce Application in the Market

<choice next="http://localhost:8080/jobHunt/jobCategory/BPO.jsp" dtmf="4">

.B.P.O.

</choice>

<choice next="http://localhost:8080/jobHunt/jobCategory/Accounting.jsp" dtmf="5">

.Accounting and Tax.

</choice>

<choice next="http://localhost:8080/jobHunt/jobCategory/HR.jsp" dtmf="6">

.H. R and Top management.

</choice>

</menu>

</vxml>

//ComputerIT.jsp

<?xml version="1.0" encoding="UTF-8" ?>

<%@ page language="java" import="java.sql.*,java.util.*,com.matrix.*" %>

<%@ page import="java.io.*,java.util.*,java.net.*,java.sql.*"%>

<vxml version="2.0">

Page 45: Abstract

Diffusion of Mobile Commerce Application in the Market

<nomatch>

No Match! I'm sorry, I didn't understand you. Could you please try that again?

<reprompt />

</nomatch>

<noinput>

No Input! I'm sorry, I didn't hear anything. Could you please try that again?

<reprompt />

</noinput>

<menu id="menuCategory">

<property name="inputmodes" value="dtmf"/>

<prompt bargein="false">

..please press the related number. to choose the job role. from the following list.

</prompt>

<prompt>

<enumerate>

<value expr="_prompt"/> press <value expr="_dtmf"/>,

</enumerate>

</prompt>

<choice next="#hardware" dtmf="1">Hardware and Networking.</choice>

<choice next="#web" dtmf="2">Web Designing and Graphics.</choice>

Page 46: Abstract

Diffusion of Mobile Commerce Application in the Market

<choice next="#software" dtmf="3">Software Development and Programming.</choice>

<choice next="#testing" dtmf="5">Software Testing.</choice>

</menu>

<%

String driver = "com.mysql.jdbc.Driver";

Class.forName(driver).newInstance();

Connection con = null;

ResultSet rst = null;

Statement stmt = null;

String dbUname = "root";

String dbPass = "root";

try {

String url = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";

con = DriverManager.getConnection(url);

stmt = con.createStatement();

rst = stmt.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM networking");

while (rst.next()) {

%>

}

Page 47: Abstract

Diffusion of Mobile Commerce Application in the Market

<form id="hardware">

<block>

<prompt>...Date...<%=rst.getString(1)%></prompt>

<prompt>...Company...<%=rst.getString(2)%></prompt>

<prompt>...Position...<%=rst.getString(3)%></prompt>

<prompt>...Elegibility...<%=rst.getString(4)%></prompt>

<prompt>...Location...<%=rst.getString(5)%></prompt>

<goto next="#gotomenu"/>

</block>

</form>

<%}

rst.close();

con.close();

stmt.close();

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

<%

String driver1 = "com.mysql.jdbc.Driver";

Class.forName(driver1).newInstance();

Connection con1 = null;

Page 48: Abstract

Diffusion of Mobile Commerce Application in the Market

ResultSet rst1 = null;

Statement stmt1 = null;

try {

String url1 = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";

con1 = DriverManager.getConnection(url1);

stmt1 = con1.createStatement();

rst1 = stmt1.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM web");

while (rst1.next()) {

%>

<form id="web">

<block>

<prompt>...Date...<%=rst1.getString(1)%></prompt>

<prompt>...Company...<%=rst1.getString(2)%></prompt>

<prompt>...Position...<%=rst1.getString(3)%></prompt>

<prompt>...Elegibility...<%=rst1.getString(4)%></prompt>

<prompt>...Location...<%=rst1.getString(5)%></prompt>

<goto next="#gotomenu"/>

</block>

</form>

<%}

rst1.close();

Page 49: Abstract

Diffusion of Mobile Commerce Application in the Market

con1.close();

stmt1.close();

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

<%

String driver2 = "com.mysql.jdbc.Driver";

Class.forName(driver2).newInstance();

Connection con2 = null;

ResultSet rst2 = null;

Statement stmt2 = null;

try {

String url2 = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";

con2 = DriverManager.getConnection(url2);

stmt2 = con2.createStatement();

rst2 = stmt2.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM software");

while (rst2.next()) {

%>

Page 50: Abstract

Diffusion of Mobile Commerce Application in the Market

<form id="software">

<block>

<prompt>...Date...<%=rst2.getString(1)%></prompt>

<prompt>...Company...<%=rst2.getString(2)%></prompt>

<prompt>...Position...<%=rst2.getString(3)%></prompt>

<prompt>...Elegibility...<%=rst2.getString(4)%></prompt>

<prompt>...Location...<%=rst2.getString(5)%></prompt>

<goto next="#gotomenu"/>

</block>

</form>

<%}

rst2.close();

con2.close();

stmt2.close();

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

<%

String driver3 = "com.mysql.jdbc.Driver";

Class.forName(driver3).newInstance();

Connection con3 = null;

Page 51: Abstract

Diffusion of Mobile Commerce Application in the Market

ResultSet rst3 = null;

Statement stmt3 = null;

try {

String url3 = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";

con3 = DriverManager.getConnection(url3);

stmt3 = con3.createStatement();

rst3 = stmt3.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM testing");

while (rst3.next()) {

%>

<form id="testing">

<block>

<prompt>...Date...<%=rst3.getString(1)%></prompt>

<prompt>...Company...<%=rst3.getString(2)%></prompt>

<prompt>...Position...<%=rst3.getString(3)%></prompt>

<prompt>...Elegibility...<%=rst3.getString(4)%></prompt>

<prompt>...Location...<%=rst3.getString(5)%></prompt>

<goto next="#gotomenu"/>

</block>

</form>

<%}

rst3.close();

Page 52: Abstract

Diffusion of Mobile Commerce Application in the Market

con3.close();

stmt3.close();

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

<menu id="gotomenu">

<property name="inputmodes" value="dtmf"/>

<prompt bargein="false">

.Goto.

</prompt>

<prompt>

<enumerate>

<value expr="_prompt"/> press <value expr="_dtmf"/>,

</enumerate>

</prompt>

<!--<choice next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml" dtmf="1">-->

<choice next="http://localhost:8080/jobHunt/jobCategory/ComputerIT.jsp" dtmf="7">

Previous Menu.

</choice>

<!--<choice next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml" dtmf="1">-->

Page 53: Abstract

Diffusion of Mobile Commerce Application in the Market

<choice next="http://localhost:8080/jobHunt/Main.jsp" dtmf="8">

Main Menu.

</choice>

</menu>

</vxml>

//HR.jsp

<?xml version="1.0" encoding="UTF-8" ?>

<%@ page language="java" import="java.sql.*,java.util.*,com.matrix.*" %>

<%@ page import="java.io.*,java.util.*,java.net.*,java.sql.*"%>

<vxml version="2.0">

<nomatch>

No Match! I'm sorry, I didn't understand you. Could you please try that again?

<reprompt />

</nomatch>

<noinput>

No Input! I'm sorry, I didn't hear anything. Could you please try that again?

<reprompt />

</noinput>

<menu id="menuCategory">

<property name="inputmodes" value="dtmf"/>

Page 54: Abstract

Diffusion of Mobile Commerce Application in the Market

<prompt bargein="false">

..please press the related number. to choose the job role. from the following list.

</prompt>

<prompt>

<enumerate>

<value expr="_prompt"/> press <value expr="_dtmf"/>,

</enumerate>

</prompt>

<choice next="#hardware" dtmf="1">Admin Excecutive.</choice>

<choice next="#web" dtmf="2">H.R.manager.</choice>

<choice next="#software" dtmf="3">payroll.</choice>

</menu>

<%

String driver = "com.mysql.jdbc.Driver";

Class.forName(driver).newInstance();

Connection con = null;

ResultSet rst = null;

Statement stmt = null;

String dbUname = "root";

String dbPass = "root";

try {

Page 55: Abstract

Diffusion of Mobile Commerce Application in the Market

String url = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";

con = DriverManager.getConnection(url);

stmt = con.createStatement();

rst = stmt.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM admin");

while (rst.next()) {

%>

}

<form id="hardware">

<block>

<prompt>...Date...<%=rst.getString(1)%></prompt>

<prompt>...Company...<%=rst.getString(2)%></prompt>

<prompt>...Position...<%=rst.getString(3)%></prompt>

<prompt>...Elegibility...<%=rst.getString(4)%></prompt>

<prompt>...Location...<%=rst.getString(5)%></prompt>

<goto next="#gotomenu"/>

</block>

</form>

<%}

rst.close();

con.close();

stmt.close();

Page 56: Abstract

Diffusion of Mobile Commerce Application in the Market

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

<%

String driver1 = "com.mysql.jdbc.Driver";

Class.forName(driver1).newInstance();

Connection con1 = null;

ResultSet rst1 = null;

Statement stmt1 = null;

try {

String url1 = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";

con1 = DriverManager.getConnection(url1);

stmt1 = con1.createStatement();

rst1 = stmt1.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM hr");

while (rst1.next()) {

%>

<form id="web">

<block>

<prompt>...Date...<%=rst1.getString(1)%></prompt>

Page 57: Abstract

Diffusion of Mobile Commerce Application in the Market

<prompt>...Company...<%=rst1.getString(2)%></prompt>

<prompt>...Position...<%=rst1.getString(3)%></prompt>

<prompt>...Elegibility...<%=rst1.getString(4)%></prompt>

<prompt>...Location...<%=rst1.getString(5)%></prompt>

<goto next="#gotomenu"/>

</block>

</form>

<%}

rst1.close();

con1.close();

stmt1.close();

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

<%

String driver2 = "com.mysql.jdbc.Driver";

Class.forName(driver2).newInstance();

Connection con2 = null;

ResultSet rst2 = null;

Statement stmt2 = null;

Page 58: Abstract

Diffusion of Mobile Commerce Application in the Market

try {

String url2 = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";

con2 = DriverManager.getConnection(url2);

stmt2 = con2.createStatement();

rst2 = stmt2.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM payroll");

while (rst2.next()) {

%>

<form id="software">

<block>

<prompt>...Date...<%=rst2.getString(1)%></prompt>

<prompt>...Company...<%=rst2.getString(2)%></prompt>

<prompt>...Position...<%=rst2.getString(3)%></prompt>

<prompt>...Elegibility...<%=rst2.getString(4)%></prompt>

<prompt>...Location...<%=rst2.getString(5)%></prompt>

<goto next="#gotomenu"/>

</block>

</form>

<%}

rst2.close();

con2.close();

stmt2.close();

Page 59: Abstract

Diffusion of Mobile Commerce Application in the Market

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

<menu id="gotomenu">

<property name="inputmodes" value="dtmf"/>

<prompt bargein="false">

.Goto.

</prompt>

<prompt>

<enumerate>

<value expr="_prompt"/> press <value expr="_dtmf"/>,

</enumerate>

</prompt>

<!--<choice next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml" dtmf="1">-->

<choice next="http://localhost:8080/jobHunt/jobCategory/ComputerIT.jsp" dtmf="7">

Previous Menu.

</choice>

<!--<choice next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml" dtmf="1">-->

<choice next="http://localhost:8080/jobHunt/Main.jsp" dtmf="8">

Page 60: Abstract

Diffusion of Mobile Commerce Application in the Market

Main Menu.

</choice>

</menu>

</vxml>

//Medical.jsp

<?xml version="1.0" encoding="UTF-8" ?>

<%@ page language="java" import="java.sql.*,java.util.*,com.matrix.*" %>

<%@ page import="java.io.*,java.util.*,java.net.*,java.sql.*"%>

<vxml version="2.0">

<nomatch>

No Match! I'm sorry, I didn't understand you. Could you please try that again?

<reprompt />

</nomatch>

<noinput>

No Input! I'm sorry, I didn't hear anything. Could you please try that again?

<reprompt />

</noinput>

<menu id="menuCategory">

<property name="inputmodes" value="dtmf"/>

<prompt bargein="false">

Page 61: Abstract

Diffusion of Mobile Commerce Application in the Market

..please press the related number. to choose the job role. from the following list.

</prompt>

<prompt>

<enumerate>

<value expr="_prompt"/> press <value expr="_dtmf"/>,

</enumerate>

</prompt>

<choice next="#hardware" dtmf="1">general nursing.</choice>

<choice next="#web" dtmf="2">lab technician.</choice>

<choice next="#software" dtmf="3">orthopaedist.</choice>

<choice next="#testing" dtmf="5">Surgeon.</choice>

</menu>

<%

String driver = "com.mysql.jdbc.Driver";

Class.forName(driver).newInstance();

Connection con = null;

ResultSet rst = null;

Statement stmt = null;

String dbUname = "root";

String dbPass = "root";

try {

Page 62: Abstract

Diffusion of Mobile Commerce Application in the Market

String url = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";

con = DriverManager.getConnection(url);

stmt = con.createStatement();

rst = stmt.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM general");

while (rst.next()) {

%>

}

<form id="hardware">

<block>

<prompt>...Date...<%=rst.getString(1)%></prompt>

<prompt>...Company...<%=rst.getString(2)%></prompt>

<prompt>...Position...<%=rst.getString(3)%></prompt>

<prompt>...Elegibility...<%=rst.getString(4)%></prompt>

<prompt>...Location...<%=rst.getString(5)%></prompt>

<goto next="#gotomenu"/>

</block>

</form>

<%}

rst.close();

con.close();

stmt.close();

Page 63: Abstract

Diffusion of Mobile Commerce Application in the Market

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

<%

String driver1 = "com.mysql.jdbc.Driver";

Class.forName(driver1).newInstance();

Connection con1 = null;

ResultSet rst1 = null;

Statement stmt1 = null;

try {

String url1 = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";

con1 = DriverManager.getConnection(url1);

stmt1 = con1.createStatement();

rst1 = stmt1.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM lab");

while (rst1.next()) {

%>

<form id="web">

<block>

<prompt>...Date...<%=rst1.getString(1)%></prompt>

<prompt>...Company...<%=rst1.getString(2)%></prompt>

<prompt>...Position...<%=rst1.getString(3)%></prompt>

Page 64: Abstract

Diffusion of Mobile Commerce Application in the Market

<prompt>...Elegibility...<%=rst1.getString(4)%></prompt>

<prompt>...Location...<%=rst1.getString(5)%></prompt>

<goto next="#gotomenu"/>

</block>

</form>

<%}

rst1.close();

con1.close();

stmt1.close();

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

<%

String driver2 = "com.mysql.jdbc.Driver";

Class.forName(driver2).newInstance();

Connection con2 = null;

ResultSet rst2 = null;

Statement stmt2 = null;

try {

String url2 = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";

con2 = DriverManager.getConnection(url2);

Page 65: Abstract

Diffusion of Mobile Commerce Application in the Market

stmt2 = con2.createStatement();

rst2 = stmt2.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM ortho");

while (rst2.next()) {

%>

<form id="software">

<block>

<prompt>...Date...<%=rst2.getString(1)%></prompt>

<prompt>...Company...<%=rst2.getString(2)%></prompt>

<prompt>...Position...<%=rst2.getString(3)%></prompt>

<prompt>...Elegibility...<%=rst2.getString(4)%></prompt>

<prompt>...Location...<%=rst2.getString(5)%></prompt>

<goto next="#gotomenu"/>

</block>

</form>

<%}

rst2.close();

con2.close();

stmt2.close();

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

Page 66: Abstract

Diffusion of Mobile Commerce Application in the Market

<%

String driver3 = "com.mysql.jdbc.Driver";

Class.forName(driver3).newInstance();

Connection con3 = null;

ResultSet rst3 = null;

Statement stmt3 = null;

try {

String url3 = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";

con3 = DriverManager.getConnection(url3);

stmt3 = con3.createStatement();

rst3 = stmt3.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM surgeon");

while (rst3.next()) {

%>

<form id="testing">

<block>

<prompt>...Date...<%=rst3.getString(1)%></prompt>

<prompt>...Company...<%=rst3.getString(2)%></prompt>

<prompt>...Position...<%=rst3.getString(3)%></prompt>

<prompt>...Elegibility...<%=rst3.getString(4)%></prompt>

<prompt>...Location...<%=rst3.getString(5)%></prompt>

<goto next="#gotomenu"/>

Page 67: Abstract

Diffusion of Mobile Commerce Application in the Market

</block>

</form>

<%}

rst3.close();

con3.close();

stmt3.close();

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

<menu id="gotomenu">

<property name="inputmodes" value="dtmf"/>

<prompt bargein="false">

.Goto.

</prompt>

<prompt>

<enumerate>

<value expr="_prompt"/> press <value expr="_dtmf"/>,

</enumerate>

</prompt>

<!--<choice next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml" dtmf="1">-->

<choice next="http://localhost:8080/jobHunt/jobCategory/ComputerIT.jsp" dtmf="7">

Page 68: Abstract

Diffusion of Mobile Commerce Application in the Market

Previous Menu.

</choice>

<!--<choice next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml" dtmf="1">-->

<choice next="http://localhost:8080/jobHunt/Main.jsp" dtmf="8">

Main Menu.

</choice>

</menu>

</vxml>

//sales.jsp

<?xml version="1.0" ?>

<vxml version="2.0">

<form id="Pharmacist">

<var name="reqType" expr="'it'"/>

<block>

<prompt>

Sales Executive Keysoft Solutions Private Ltd.

Experience.1 to 3 years.

Location. Bangalore...

Marketing/Sales Manager (Female)

Page 69: Abstract

Diffusion of Mobile Commerce Application in the Market

Ecole Solitalre .

Experience.3 to 5 years,

Location.Delhi.

Proactive R P O. and Staffing Solutions Private Limited .

Experience.11 to 16 years.

Location.Mumbai.

</prompt>

<goto next="#gotomenu"/>

</block>

</form>

<menu id="gotomenu">

<property name="inputmodes" value="dtmf"/>

<prompt bargein="false">

.Goto.

</prompt>

<prompt>

<enumerate>

<value expr="_prompt"/> press <value expr="_dtmf"/>,

</enumerate>

</prompt>

<!--<choice next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml" dtmf="1">-->

Page 70: Abstract

Diffusion of Mobile Commerce Application in the Market

<choice next="http://localhost:8084/jobHunt/jobCategory/ComputerIT.jsp" dtmf="7">

Previous Menu.

</choice>

<!--<choice next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml" dtmf="1">-->

<choice next="http://localhost:8084/jobHunt/Main.jsp" dtmf="8">

Main Menu.

</choice>

</menu>

</vxml>

Entering Job Openings into the Database

<%@ page import="java.sql.*" %>

<html>

<head>

</head>

<body>

<form method="post" action="jobhunt">

<table>

<tr>Enter the values for Job Search.</tr>

<tr><td ><b>Job Date:</b></td><td>

<input type="text" name="jobdate" value=""></input></td></tr>

Page 71: Abstract

Diffusion of Mobile Commerce Application in the Market

<tr><td><b>Company:</b></td><td>

<textarea type="text" name="companyname" value=""></textarea></td></tr>

<tr><td ><b>Position:</b></td><td>

<textarea type="text" name="position" value=""></textarea></td></tr>

<tr><td><b>Eligibility:</b></td><td>

<textarea type="text" name="eligibility" id="ename" value=""></textarea></td></tr>

<tr><td ><b>Location:</b></td><td>

<textarea type="text" name="location" value=""></textarea></td></tr>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;

<tr><td><input type="submit" name="EnterDetailsHW" value="Submit"></input></td>

<td><input type="button" name="jobdate" value="Cancel"></input></td></tr>

</table>

</form>

</body>

</html>

6.2 MOBILE VOTING

//login using user name and password

<?xml version="1.0" ?>

Page 72: Abstract

Diffusion of Mobile Commerce Application in the Market

<vxml version="2.0">

<var name="reqType" expr="'login'"/>

<form id="init">

<block>Welcome to Mobile Voting.</block>

<field name="username" type="digits?length=8">

<prompt>Please enter your 8 digit Bio.metric Card number.</prompt>

<noinput>I am sorry. You have not given any input try connecting again at a later time.<exit/></noinput>

<nomatch>I am sorry. This is an invalid voter ID number.<reprompt/></nomatch>

</field>

<field name="password" type="digits?length=4">

<prompt>Please enter the last 4 digits of the Voter ID .</prompt>

<filled>

<!--<submit next= "mainpage.vxml"/>-->

<submit next="http://localhost:8080/MobilVoting/VServer" namelist = "username password reqType" method="post"/>

</filled>

<noinput>I am sorry. You have not given any input try connecting again at a later time.<exit/></noinput>

<nomatch>I am sorry. This is an invalid passcode.<reprompt/></nomatch>

Page 73: Abstract

Diffusion of Mobile Commerce Application in the Market

</field>

</form>

</vxml>

//login using name and pincode of city

<?xml version="1.0" ?>

<vxml version="2.0">

<var name="reqType" expr="'login2'"/>

<form id="init">

<block></block>

<field name="age" type="digits?length=4">

<prompt>Please enter 4 digit year of Birth .</prompt>

<noinput>I am sorry. You have not given any input try connecting again at a later time.<exit/></noinput>

<nomatch>I am sorry. This is an invalid voter ID number.<reprompt/></nomatch>

</field>

<field name="pincode" type="digits?length=6">

<prompt>Please enter your 6 pincode number.</prompt>

<filled>

<!--<submit next= "mainpage.vxml"/>-->

<submit next="http://localhost:8080/MobilVoting/VServer" namelist = "age pincode reqType" method="post"/>

Page 74: Abstract

Diffusion of Mobile Commerce Application in the Market

</filled>

<noinput>I am sorry. You have not given any input try connecting again at a later time.<exit/></noinput>

<nomatch>I am sorry. This is an invalid passcode.<reprompt/></nomatch>

</field>

</form>

</vxml>

//No match of given input

<?xml version="1.0" encoding="ISO-8859-1"?>

<vxml version="2.0" lang="en">

<form>

<block>

<prompt bargein="false">sorry you have entered wrong information.</prompt>

</block>

</form>

</vxml>

//multi.jsp

<%@ page language="java"%>

Page 75: Abstract

Diffusion of Mobile Commerce Application in the Market

<%@ page import = "java.io.*,java.util.*,java.net.*,java.sql.*"%>

<%

String appName = request.getContextPath().substring(1);

String appHost = request.getServerName() + ":" + request.getLocalPort();

%>

<?xml version="1.0" ?>

<%@ page import="java.io.*,java.util.*,java.net.*,java.sql.*"%>

<vxml version="2.0">

<nomatch>

No Match! I'm sorry, I didn't understand you. Could you please try that again?

<reprompt />

</nomatch>

<noinput>

No Input! I'm sorry, I didn't hear anything. Could you please try that again?

<reprompt />

</noinput>

<menu id="menu">

<prompt bargein="false">

you have successfully logged in.

Press 1 for vote in Keypad Mode.

say 2 for vote in Speech Recognition Mode.

</prompt>

Page 76: Abstract

Diffusion of Mobile Commerce Application in the Market

<choice next="http://<%=appHost%>/<%=appName%>/dtmf/Success.jsp" dtmf="1"/>

<choice next="http://<%=appHost%>/<%=appName%>/speech/Success.jsp" > two </choice>

</menu>

</vxml>

6.2.1 DTMF Mode

//success.jsp

<%@ page language="java"%>

<%@ page import = "java.io.*,java.util.*,java.net.*,java.sql.*"%>

<%

String appName = request.getContextPath().substring(1);

String appHost = request.getServerName() + ":" + request.getLocalPort();

%>

<?xml version="1.0" ?>

<%@ page import="java.io.*,java.util.*,java.net.*,java.sql.*"%>

<vxml version="2.0">

<nomatch>

Page 77: Abstract

Diffusion of Mobile Commerce Application in the Market

No Match! I'm sorry, I didn't understand you. Could you please try that again?

<reprompt />

</nomatch>

<noinput>

No Input! I'm sorry, I didn't hear anything. Could you please try that again?

<reprompt />

</noinput>

<menu id="menu">

<property name="inputmodes" value="dtmf"/>

<prompt bargein="false">

you have chosen DTMF mode.

</prompt>

<prompt>

<enumerate>

<value expr="_prompt"/> press <value expr="_dtmf"/>,

</enumerate>

</prompt>

<choice next="http://<%=appHost%>/<%=appName%>/dtmf/VotePollJDS.jsp" dtmf="1">

Page 78: Abstract

Diffusion of Mobile Commerce Application in the Market

vote for JANATADALA

</choice>

<choice next="http://<%=appHost%>/<%=appName%>/dtmf/VotePollJDU.jsp" dtmf="2">

vote for JDU

</choice>

<choice next="http://<%=appHost%>/<%=appName%>/dtmf/VotePollCongress.jsp" dtmf="3">

vote for Congress.

</choice>

<choice next="http://<%=appHost%>/<%=appName%>/dtmf/VotePollBJP.jsp" dtmf="4">

vote for BJP.

</choice>

</menu>

</vxml>

//VotePoll BJP.jsp

<?xml version="1.0" ?>

Page 79: Abstract

Diffusion of Mobile Commerce Application in the Market

<vxml xmlns="http://www.w3.org/2001/vxml"

xmlns:conf="http://www.w3.org/2002/vxml-conformance" version="2.0"

xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"

xsi:schemaLocation="http://www.w3.org/2001/vxml

http://www.w3.org/TR/voicexml20/vxml.xsd">

<%@ page language="java" import="java.sql.*" %>

<%

try {

Class.forName("com.mysql.jdbc.Driver");

Connection connection = DriverManager.getConnection("jdbc:mysql://localhost:3306/mobilevoting", "root", "root");

Statement st = connection.createStatement();

int i = 1;

String sql = "INSERT INTO VotePollBJP (bjp) VALUES ('"+i+"')";

int res = st.executeUpdate(sql);

if (res == 1) {

out.println("Records Updated!");

} else {

out.println("Records Added Failed!");

}

connection.close();

}

Page 80: Abstract

Diffusion of Mobile Commerce Application in the Market

catch(Exception e) {

out.println(e.toString());

}

%>

<form id="insertAdmk">

<block>

<prompt>Thank u .your vote has been succesfully polled for the party BJP.</prompt>

</block>

<exit/>

</form>

</vxml>

//VotePoll Congress.jsp

<?xml version="1.0" ?>

<vxml xmlns="http://www.w3.org/2001/vxml"

xmlns:conf="http://www.w3.org/2002/vxml-conformance" version="2.0"

xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"

xsi:schemaLocation="http://www.w3.org/2001/vxml

http://www.w3.org/TR/voicexml20/vxml.xsd">

<%@ page language="java" import="java.sql.*" %>

Page 81: Abstract

Diffusion of Mobile Commerce Application in the Market

<%

try {

Class.forName("com.mysql.jdbc.Driver");

Connection connection = DriverManager.getConnection("jdbc:mysql://localhost:3306/mobilevoting", "root", "root");

Statement st = connection.createStatement();

int i = 1;

String sql = "INSERT INTO VotePollCongress (congress) VALUES ('"+i+"')";

int res = st.executeUpdate(sql);

if (res == 1) {

out.println("Records Updated!");

} else {

out.println("Records Added Failed!");

}

connection.close();

}

catch(Exception e) {

out.println(e.toString());

}

%>

<form id="insertAdmk">

Page 82: Abstract

Diffusion of Mobile Commerce Application in the Market

<block>

<prompt>Thank u .your vote has been succesfully polled for the party congress.</prompt>

</block>

<exit/>

</form>

</vxml>

//JDU.jsp

<?xml version="1.0" ?>

<vxml xmlns="http://www.w3.org/2001/vxml"

xmlns:conf="http://www.w3.org/2002/vxml-conformance" version="2.0"

xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"

xsi:schemaLocation="http://www.w3.org/2001/vxml

http://www.w3.org/TR/voicexml20/vxml.xsd">

<%@ page language="java" import="java.sql.*" %>

<%

try {

Class.forName("com.mysql.jdbc.Driver");

Connection connection = DriverManager.getConnection("jdbc:mysql://localhost:3306/mobilevoting", "root", "root");

Statement st = connection.createStatement();

Page 83: Abstract

Diffusion of Mobile Commerce Application in the Market

int i = 1;

String sql = "INSERT INTO votePollJDU (jdu) VALUES ('"+i+"')";

int res = st.executeUpdate(sql);

if (res == 1) {

out.println("Records Updated!");

} else {

out.println("Records Added Failed!");

}

connection.close();

}

catch(Exception e) {

out.println(e.toString());

}

%>

<form id="insertJdu">

<block>

<prompt>Thank u .your vote has been succesfully polled for the party JDU.</prompt>

</block>

<exit/>

</form>

</vxml>

Page 84: Abstract

Diffusion of Mobile Commerce Application in the Market

//Vote Poll JDS.jsp

<?xml version="1.0" ?>

<vxml xmlns="http://www.w3.org/2001/vxml"

xmlns:conf="http://www.w3.org/2002/vxml-conformance" version="2.0"

xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"

xsi:schemaLocation="http://www.w3.org/2001/vxml

http://www.w3.org/TR/voicexml20/vxml.xsd">

<%@ page language="java" import="java.sql.*" %>

<%

try {

Class.forName("com.mysql.jdbc.Driver");

Connection connection = DriverManager.getConnection("jdbc:mysql://localhost:3306/mobilevoting", "root", "root");

Statement st = connection.createStatement();

int i = 1;

String sql = "INSERT INTO votePollJDS(jds) VALUES ('"+i+"')";

int res = st.executeUpdate(sql);

if (res == 1) {

out.println("Records Updated!");

} else {

out.println("Records Added Failed!");

Page 85: Abstract

Diffusion of Mobile Commerce Application in the Market

}

connection.close();

}

catch(Exception e) {

out.println(e.toString());

}

%>

<form id="insertJds">

<block>

<prompt>Thank u .your vote has been succesfully polled for the party JDS.</prompt>

</block>

<exit/>

</form>

</vxml>

6.2.2 Speech Mode

//success.jsp

<%@ page language="java"%>

<%@ page import = "java.io.*,java.util.*,java.net.*,java.sql.*"%>

<%

Page 86: Abstract

Diffusion of Mobile Commerce Application in the Market

String appName = request.getContextPath().substring(1);

String appHost = request.getServerName() + ":" + request.getLocalPort();

%>

<?xml version="1.0" ?>

<%@ page import="java.io.*,java.util.*,java.net.*,java.sql.*"%>

<vxml version="2.0">

<nomatch>

No Match! I'm sorry, I didn't understand you. Could you please try that again?

<reprompt />

</nomatch>

<noinput>

No Input! I'm sorry, I didn't hear anything. Could you please try that again?

<reprompt />

</noinput>

<menu id="menu">

<property name="inputmodes" />

<prompt>

you have Choosen speech recognition mode.

say one to vote for JDS.

say two to vote for JDU.

say three to vote for CONGRESS.

Page 87: Abstract

Diffusion of Mobile Commerce Application in the Market

say four to vote for BJP.

</prompt>

<choice next="http://localhost:8084/MobilVoting/speech/VotePollJDS.jsp">

one.

</choice>

<choice next="http://<%=appHost%>/<%=appName%>/speech/VotePollJDU.jsp">

two.

</choice>

<choice next="http://localhost:8084/MobilVoting/speech/VotePollCongress.jsp">

three.

</choice>

<choice next="http://localhost:8084/MobilVoting/speech/VotePollBJP.jsp">

four.

</choice>

</menu>

</vxml>

Page 88: Abstract

Diffusion of Mobile Commerce Application in the Market

// VotePollBJP.jsp

<?xml version="1.0" ?>

<vxml xmlns="http://www.w3.org/2001/vxml"

xmlns:conf="http://www.w3.org/2002/vxml-conformance" version="2.0"

xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"

xsi:schemaLocation="http://www.w3.org/2001/vxml

http://www.w3.org/TR/voicexml20/vxml.xsd">

<%@ page language="java" import="java.sql.*" %>

<%

try {

Class.forName("com.mysql.jdbc.Driver");

Connection connection = DriverManager.getConnection("jdbc:mysql://localhost:3306/mobilevoting", "root", "root");

Statement st = connection.createStatement();

int i = 1;

String sql = "INSERT INTO VotePollBJP (bjp) VALUES ('"+i+"')";

int res = st.executeUpdate(sql);

if (res == 1) {

out.println("Records Updated!");

} else {

out.println("Records Added Failed!");

Page 89: Abstract

Diffusion of Mobile Commerce Application in the Market

}

connection.close();

}

catch(Exception e) {

out.println(e.toString());

}

%>

<form id="insertBjp">

<block>

<prompt>Thank u .your vote has been succesfully polled for the party B.J.P.</prompt>

</block>

</form>

<exit/>

</vxml>

//VotePollCongress.jsp

<?xml version="1.0" ?>

<vxml xmlns="http://www.w3.org/2001/vxml"

xmlns:conf="http://www.w3.org/2002/vxml-conformance" version="2.0"

Page 90: Abstract

Diffusion of Mobile Commerce Application in the Market

xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"

xsi:schemaLocation="http://www.w3.org/2001/vxml

http://www.w3.org/TR/voicexml20/vxml.xsd">

<%@ page language="java" import="java.sql.*" %>

<%

try {

Class.forName("com.mysql.jdbc.Driver");

Connection connection = DriverManager.getConnection("jdbc:mysql://localhost:3306/mobilevoting", "root", "root");

Statement st = connection.createStatement();

int i = 1;

String sql = "INSERT INTO VotePollCongress (congress) VALUES ('"+i+"')";

int res = st.executeUpdate(sql);

if (res == 1) {

out.println("Records Updated!");

} else {

out.println("Records Added Failed!");

}

connection.close();

}

catch(Exception e) {

out.println(e.toString());

Page 91: Abstract

Diffusion of Mobile Commerce Application in the Market

}

%>

<form id="insertCongress">

<block>

<prompt>Thank u .your vote has been succesfully polled for the party congress.</prompt>

</block>

<exit/>

</form>

</vxml>

//VotePoll JDU.jsp

<?xml version="1.0" ?>

<vxml xmlns="http://www.w3.org/2001/vxml"

xmlns:conf="http://www.w3.org/2002/vxml-conformance" version="2.0"

xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"

xsi:schemaLocation="http://www.w3.org/2001/vxml

http://www.w3.org/TR/voicexml20/vxml.xsd">

<%@ page language="java" import="java.sql.*" %>

<%

try {

Page 92: Abstract

Diffusion of Mobile Commerce Application in the Market

Class.forName("com.mysql.jdbc.Driver");

Connection connection = DriverManager.getConnection("jdbc:mysql://localhost:3306/mobilevoting", "root", "root");

Statement st = connection.createStatement();

int i = 1;

String sql = "INSERT INTO VotePollJdu (JDU) VALUES ('"+i+"')";

int res = st.executeUpdate(sql);

if (res == 1) {

out.println("Records Updated!");

} else {

out.println("Records Added Failed!");

}

connection.close();

}

catch(Exception e) {

out.println(e.toString());

}

%>

<form id="insertJdu">

<block>

Page 93: Abstract

Diffusion of Mobile Commerce Application in the Market

<prompt>Thank u .your vote has been successfully polled for the party JDU.</prompt>

</block>

<exit/>

</form>

</vxml>

//VotePoll JANATADALA.jsp

<?xml version="1.0" ?>

<vxml xmlns="http://www.w3.org/2001/vxml"

xmlns:conf="http://www.w3.org/2002/vxml-conformance" version="2.0"

xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"

xsi:schemaLocation="http://www.w3.org/2001/vxml

http://www.w3.org/TR/voicexml20/vxml.xsd">

<%@ page language="java" import="java.sql.*" %>

<%

try {

Class.forName("com.mysql.jdbc.Driver");

Connection connection = DriverManager.getConnection("jdbc:mysql://localhost:3306/mobilevoting", "root", "root");

Statement st = connection.createStatement();

Page 94: Abstract

Diffusion of Mobile Commerce Application in the Market

int i = 1;

String sql = "INSERT INTO votePollJANATADALA (jds) VALUES ('"+i+"')";

int res = st.executeUpdate(sql);

if (res == 1) {

out.println("Records Updated!");

} else {

out.println("Records Added Failed!");

}

connection.close();

}

catch(Exception e) {

out.println(e.toString());

}

%>

<form id="insertJds">

<block>

<prompt>Thank u .your vote has been succesfully polled for the party JDS.</prompt>

</block>

<exit/>

</form>

</vxml

Page 95: Abstract

Diffusion of Mobile Commerce Application in the Market

CHAPTER 7

IMPLEMENTATION

7.1 IMPLEMENTATION OF JOB HUNT

7.1.1 Calling IVRS to Get Job Information

The customer can call IVRS using mobile or a Landline phone and this connects to

the host IVRS server with the help of PSTN public switched telephone network).

7.1.2 Getting Information from the Server

In the server itself there will be option to route more than one call with the call

Router option this helps to run more than one IVRS application simultaneously in

time sharing basis. In the IVRS server our server program containing jsp and voice

xml will embedded and it is useful for getting the input from the user as well as

delivering output to the user through sip phone emulator. Our server application

will contact the particular database it will get all the resources and deliver to the

end user in the form of voice.

7.1.3 Delivering the Information to the Job Seeker

If the server finds any job openings related to qualification of the job seeker, the

information is given which contains the details about the company name,

interview location and the interview time.

7.2 DATA FLOW DIAGRAM FOR JOB HUNTING

Job Hunting process is explained using the data flow diagram. It depicts the data

flow between various entities. When the user calls the ivr, he will be prompted to

Page 96: Abstract

Diffusion of Mobile Commerce Application in the Market

choose touch tone mode or speech recognition mode.

Once he entered into a mode he will be asked for his Job category with

respect to the mode he chose. Depends on the job category he chooses, the user

will be asked to enter the sub category within the selected job category. For

example, if the user chooses computer science as his job category the he will be

asked to enter his field of interest in the sub categories such as Networking,

testing, development and so on.

Once this information is obtained, the sever will provide the information

about job openings in various companies if the field of interest provided matches

with that present in the server.

Page 97: Abstract

Diffusion of Mobile Commerce Application in the Market

Fig.7.1: Data Flow Diagram for Job Hunt

Page 98: Abstract

Diffusion of Mobile Commerce Application in the Market

7.3 USE CASE DIAGRAM FOR JOB HUNT

Fig.7.2: Use case diagram for Job Hunt

Page 99: Abstract

Diffusion of Mobile Commerce Application in the Market

7.4 IMPLEMENTATION OF MOBILE VOTING

In this section, we outline our mobile voting scheme.

7.4.1 Voters Authentication Phase

In this phase Election commission is responsible to verify the authenticity of the

voters. If the voter is authentic then only he will be allowed to participate in the

next steps of voting.

7.4.2 Voting Phase

In this phase, the voter dial a designated phone number and follow the

instructions using a password already provided.

• The voter selects the appropriate option to vote the particular party.

• The voter checks the signature and retrieves the VS- signed voter, voter ID

• The voter sends the voting token along with voter ID and the public key

correspond to this particular voter ID to AC, these three items keep the

privacy of the voter.

• Upon receiving the encrypted key and the voting token, CS keeps its safe till

counting start as per the predefined schedule.

7.4.3 Counting Phase

Counting Phase At the scheduled time of counting CS decrypts the ballot and

checks whether the voting token is valid or not. If it is valid it will be counted else

it will be rejected. In entire process describe above it is strongly require that

whenever AC is sending data to VS. Sender Identification will not be revealed at

Page 100: Abstract

Diffusion of Mobile Commerce Application in the Market

any time. So even if somebody track a ballot can be identified with the particular

AC but not with the particular User and a single AC can have number of users

7.4.4 Security Analysis

In this section, we discuss how and to what extent the security requirements is to

be

Authenticate: only the authorized voters can vote.

First, voters are authenticated through Voter ID, which assures that voters

are who they claim to be.

Second, the eligibility of voters is checked by VS. This prevents voters from

voting more than once.

Privacy: All votes remain secret while the voting takes place and each individual

vote cannot be linked to the voter who casts it. The proposed scheme is divided

into three phases, and they are separated in time. In the voting phase, a signature

is applied to the vote in a way that vote is not linkable with voter and is signed by

the AC without revealing the vote and in the same way it is signed by the VS. In

the next step the communication between voters and CS achieves anonymity with

the help of AC. Hence, for all the components of the voting system, if the Voters

cannot be linked with the vote, the privacy of the voter is protected.

7.5 MOBILE VOTING SPEECH PROCESS

In the below diagram voter authentication process is diagrammatically explained

about how the speech recognition software loads the grammar from the database

and matches it with the user input. The system will prompt the user for his voter

Id and simultaneously loads the grammar from the database to the speech

Page 101: Abstract

Diffusion of Mobile Commerce Application in the Market

recognition system. Once the grammar is loaded, the speech recognizer starts to

look for the exact utterance from the user so that it can find a match in the

grammar. Interaction with the users will be handled by voiceXML documents. The

dynamic behavior of the user interaction like loading grammar from the database,

responding user queries based on the user input will be handled by java server

pages.

After it finds voter id match, the system now prompts the user for his

password. If his voter id and password matches then the user will be asked some

security questions to provide voter authentication. Finally he will be allowed to

cast his vote in two different modes via touch tone or speech recognition.

Page 102: Abstract

Diffusion of Mobile Commerce Application in the Market

Fig.7.3: Speech Recognition Process in Mobile Voting

7.6 DATA FLOW DIAGRAM FOR VOTE CASTING

Vote casting process is explained using the data flow diagram. It depicts the data

flow between various entities. Once the user is authenticated to cast his vote he

will be prompted to choose touch tone mode or speech recognition mode. Once

he entered into a mode he will be asked for his constituency name or

constituency number with respect to the mode he chose. For example, he has to

know his constituency number if he chooses to vote in touch tone mode.

Depends on the Constituency he chose, the ballot will be generated with

the list of candidates contesting in the constituency and their respective symbols.

The ballot will be generated with the help of information available in the tables

Party Details and Candidate Details. He can vote for the candidate by saying the

symbol of the candidate or saying the candidate number. The system will check

his vote validity like duplicate votes and illegal votes before accepting his vote. If

the system finds anything wrong with his validation of vote, his vote will be

rejected.

Page 103: Abstract

Diffusion of Mobile Commerce Application in the Market

Cast Vote

Prompt User For DTMF or Voice Input Mode

Recognize Touch Tone

Input

Recognize Voice Input

Generate Ballot to

Cast VoteValidate User

Vote

Party_Details

Constituency_Details

Voice InputDTMF Input

SuccessfulValidation

Unsuccessful Validation

Check Election ID

Reject Vote

No Match

MatchElection_Details

End User Session

Accept VoteCasting

Fig.7.4: Data Flow Diagram for Vote Casting

7.7 USE CASE DIAGRAM FOR VOTER LOGIN

Use case diagram captures the user interaction with the system. The diagram

depicts the system overview of how the user interacts with the system and

external entities, the system have to depend upon. When the user enters the

system he will be asked whether he wants to vote or know results. Once the user

selects his choice he will be directed accordingly.

Page 104: Abstract

Diffusion of Mobile Commerce Application in the Market

If the user chooses to vote he has to go through various processes like

voter authentication and vote validation as explained in the above diagram. The

system restricts the user from casting his vote second time for a particular

election and also do not accept illegal votes like forcing someone to cast his vote

against their wish.

If the user chooses result he will be asked to select overall result or

constituency wise results. Selecting overall result notifies the user about the

winner of the current election and his margin of victory with respect to other

parties. If he chooses Constituency wise result he has to provide the system with

constituency name. The system notifies the user with the winner of the

constituency, total votes secured and his margin of victory with respect to other

candidate.

Page 105: Abstract

Diffusion of Mobile Commerce Application in the Market

Generate Reports

Vote Counting

Voting SystemVote Validation

Mobile Cl ient

Voter Registration

VoiceXml Application

Cast Vote

User Authentication

<<include>>

Fi

g.7.5: Use Case Diagram for Voter Login

Page 106: Abstract

Diffusion of Mobile Commerce Application in the Market

CHAPTER 8

TESTING

8.1 TESTING OF MOBILE SYSTEM

The software, which has been developed, has to be tested to prove its validity.

Testing is considered to be the least creative phase of the whole cycle of system

design. In the real sense it is the phase, which helps to bring out the creativity of

the other phases, and makes it shine. The “Mobile System” was tested along the

following guidelines to prove its validity. It was tested using the following two

techniques of software testing.

8.1.1 White Box Testing

By using this technique it was tested that all the individual logical paths

were executed at least once.

All the logical decisions were tested on both their true and false sides.

All the loops were tested with data in between the ranges and especially at

the boundary values.

8.1.2 Black Box Testing

By the use of this technique the missing functions were identified and

placed in their positions.

The errors in the interfaces were identified and corrected.

This technique was also used to identify the initialization and termination

errors and correct th

Page 107: Abstract

Diffusion of Mobile Commerce Application in the Market

CHAPTER 9

SNAPSHOTS

9.1 Snapshots of Job Hunt

Fig 9.1 : Voxeo SIP Soft phone

Page 108: Abstract

Diffusion of Mobile Commerce Application in the Market

Fig 9.2 :Call Routing for Job Hunt

Page 109: Abstract

Diffusion of Mobile Commerce Application in the Market

9.2 Snapshots of Mobile Voting

Fig 9.3 : Voxeo SIP Soft phone

Page 110: Abstract

Diffusion of Mobile Commerce Application in the Market

Fig 9.4: Directory Listing for Mobile Voting

Page 111: Abstract

Diffusion of Mobile Commerce Application in the Market

Fig

9.5 : Call Routing for Mobile Voting

Page 112: Abstract

Diffusion of Mobile Commerce Application in the Market

CHAPTER 10

PERFORMANCE ANALYSIS

10.1 BUILDING THE HOUSE OF QUALITY MODEL OF MOBILE COMMERCE TO IMPROVE PERFORMANCE

In the Fig., Ii (where i=1…n, n is the number of the number of quality

requirements) is the degree of importance for customer quality requirements ith.

Ii can be assigned from1 meaning the least importance to 5 meaning the most

importance. Rij is the ratings of the relationship between quality requirements ith

and technical requirements jth, it can be assigned 0, 1, 3 or 5, 0 represents no

relationship between them, 1 represents weak relationship, 3 represents medium

relationship, and 5 represents strong relationship. Xj (where j=1…m, m is the

number of the number of technical requirements) is the technical importance

rating for technical requirements jth. It’s given by the weighted column sum of

each quality requirement by the quantified relationship values of technical

requirements ith. Consequently, Xj can be calculated by the flowing formulation.

According to the value of Xj, we can distinguish the priority of technical

requirements, so that we can develop a more robust service system of mobile

commerce, to reduce or eliminate the service quality gaps, and assure the service

quality in mobile commerce. Figure 10.1 . QFD calculation of compositor’s .

Page 113: Abstract

Diffusion of Mobile Commerce Application in the Market

TABLE 10.1: QFD CALCULATION OF COMPOSITORS

Page 114: Abstract

Diffusion of Mobile Commerce Application in the Market

Page 115: Abstract

Diffusion of Mobile Commerce Application in the Market

10.2 PERFORMANCE ANALYSIS OF MOBILE VOTING

We have analyzed the percentage of voting in the past 3 years in Bangalore.

aised to 55% and in 2010 it reduced to 45%. By using mobile for voting we can

increase the percentage of voting to 65%.

The expected increase in voting is calculated due to the various advantages of our

proposed system such as-

Voters do not have to wait in long queues.

Handicapped people who cannot go the voting stations

can vote conveniently

Page 116: Abstract

Diffusion of Mobile Commerce Application in the Market

Percentage

70%

60%

50%

40%

30%

20%

10%

Year

2008 2009 2010 expected

Fig 10.1: Statistics of Voting

Page 117: Abstract

Diffusion of Mobile Commerce Application in the Market

CHAPTER 11

FUTURE ENHANCEMENTS

As a measure of security features mobile devices allows the user to make use of

biometric information’s which are unique to individuals. For example voice

biometrics can be used with voiceXML to authenticate a user. Similarly finger

prints can also be used with mobiles that provide those options. Scalability is

another important feature to be addressed.

Future enhancements for mobile commerce can be done in the following

systems. This improves the service quality in the below systems.

11.1 WIRELESS USER EQUIPMENT AND SYSTEMS

Today’s communication-centric and computing-centric devices are becoming a

single intelligent wireless device. The future user wireless devices, dubbed as

universal wireless handheld devices, will have numerous functionalities, all aiming

to establish communications, enhance education, furnish entertainment, provide

information, and conduct

transactions for mobile users. Few of the device features are already available in

handheld devices, but many of them, yet to be incorporated, will need to increase

the device size, weight, complexity, power, memory, and processing

Page 118: Abstract

Diffusion of Mobile Commerce Application in the Market

requirements. To this end, engineering design trade-offs will be required to form

the right balance between devices’ capabilities and their constraints.

With low-power requirements and long-lasting batteries, the universal

wireless handheld devices will be small, low cost, light-weight, easy-to-use, and

IC-card-reader equipped. They can be attached to desk-/lap-top computers and

their peripherals, including keyboards, printers, scanners, loud speakers, and fax

machines. They will have high-resolution color screens to present pin-point

information, thus minimizing the burden on users’ attention. The wireless devices

and networks will employ intrusion detection systems to detect cracking attempts

in real time and to take effective protective measures based on the information it

has. These devices include anti-virus software to handle malicious code and to

support for authenticating users, servers, and applications.

11.2 RADIO FREQUENCY IDENTIFICATION (RFID)

RFID is a generic term for technologies that use radio waves to automatically

identify individual items or some of their attributes. RFID possesses several

benefits over bar codes. First, it does not need to meet line-of-sight requirements

as long as the RFID tags are within the range of a reader. Second, quite many

number of RFID tags can be read simultaneously. Third, every unique item can

have its own RFID tags. The mobile consumer will use RFID readers in their mobile

phones to scan RFID tags, say in the packaging of products on store shelves, to

pay for tolls and access fees, to purchase at vending machines and points of sales,

to access secure rooms, buildings, and other partitioned areas, and to control

home and office appliances.

Page 119: Abstract

Diffusion of Mobile Commerce Application in the Market

With RFID, a scanner can read the encoded information even when the tag

is concealed. For example, it may be embedded in a product’s casing, or sewn into

an item of clothing, or sandwiched between a banknote’s layered paper. The

stealthy nature of RFID technology has raised concerns among privacy advocates

that RFID tags could be tracked beyond their intended use. For example, security

agencies might use them to covertly monitor individuals or their belongings.

Lower frequencies (LF and MF) usually are cheaper, use less power, are better

able to penetrate non-metallic substances, and are ideal for scanning objects with

high-water content.

On the other hand, higher frequencies (HF and UHF) typically offer a better

range and can transfer data faster; they tend to be more directed and, thus,

require a clearer path. Active tags can have a farther read range than passive tags,

but passive tags are less expensive and require no maintenance. RFID will play a

critical role in emerging wireless access and monitoring applications, especially in

today’s security-aware era.

11.3 LOCATION DETERMINATION

Location determination is seen to be an indispensable feature for mobile

commerce. Network-based positioning is carried out by terrestrial systems

through various techniques,

such as cell of origin, time of arrival, angle of arrival, and enhanced observed time

difference. The device-based positioning is carried out by satellite systems

typically using

Page 120: Abstract

Diffusion of Mobile Commerce Application in the Market

three or four MEO satellites, also known as GPS. However, a hybrid approach

delivering the accuracy of device-centric option, while avoiding a line-of-sight

requirement as well as increased cost, size, and power consumption, is also used.

Though FCC does not require the mobile network operators to use a specific

technology, it has indicated specific performance metrics for location-enabled

technology. For network-based technology, location information accuracy is

required to be within 100 meters 67% of the time and within 300 meters 95% of

the time . But for the device-centric technology, these distances must be halved.

In view of possible launches of LEO satellites and the significant increase in the

processing capabilities of the wireless devices, as well as the fact that the cell

sizes are shrinking from macro to micro to pico, the location-based technologies

are expected to become more accurate and less costly in the future

11.4 SOFTWARE DEFINED RADIO (SDR)

SDR enables reconfigurable system architectures for wireless networks and user

devices. To provide users with m-commerce services under an array of

heterogeneous networks, certain design problems (such as limitations in device

size, cost, power consumption, and backward compatibilities to systems) must all

be overcome. The most viable way of implementing these types of wireless

devices is to adopt a software radio approach. The received analog signal is

processed by a reprogrammable baseband digital signal processor in accordance

with the wireless environment. However, certain problems then need to be

addressed—such as an analog radio interface with multiple antennas and

amplifiers and very fast high-speed analog-to digital conversions and DSP

functions—which can all, in turn, add to the circuit complexity and high-power

Page 121: Abstract

Diffusion of Mobile Commerce Application in the Market

consumption and dissipation. SDR can provide the user with a single piece of

scalable hardware that is at once compatible

at a global scale

11.5 ADAPTIVE MODULATION AND CODING (AMC)

AMC is one of the most viable and effective means to dynamically combat

wireless channel degradation and meet performance requirements. In AMC, for

the same symbol rate (i.e., occupied bandwidth), the signal power, the

modulation technique, the information rate, and the channel-coding rate, can all

be adjusted in accordance with instantaneous variations in channel conditions

(such as multi-path and proximity to the base station) and quality of service

requirements. Forward-error correcting (FEC) codes (whose rates may range from

1/2 to 5/6) and digital modulation techniques (ranging from QPSK to 64 QAM) will

be dynamically adapted for every single 5 individual, giving rise to up to a six-fold

spectral efficiency (bits per second per Hz)

11.6 DIGITAL SIGNAL COMPRESSION

Digital signal compression also known as source coding, is employed to reduce

the bit rate requirements (bandwidth demands). It is widely applied to all sources

of modality. Both proprietary and standard techniques are widely available and

are constantly being improved upon. Texts, software, and faxes generally employ

lossless compression techniques, such

as the Lempel-Ziv and Huffman codes. On the other hand, MPEG video, JPEG

image, and MP3 audio coding standards employ lossy compression, where known

limitations of the human visual and audio systems are exploited to introduce

losses but in a controlled manner. With advances in compression, a wider array of

Page 122: Abstract

Diffusion of Mobile Commerce Application in the Market

feature-rich m-commerce applications and/or lower service costs can be

provided.

11.7 BIOMETRICS

Biometrics as an essential security measure will play an imperative role in the

next-generation m-commerce services. Traditionally, most security systems

authenticate the user

based on something that he/she knows, such as a password. However, where

security really matters, it makes sense to add a second layer, which could be

something that he/she has (e.g., a smartcard). Also, as a third option, and

probably the most authentic method, could be something that he/she is,

something that, at least theoretically, would be virtually impossible to forge.

Biometric control measuring physical characteristics and behavioral patterns will

be widely employed to allow the user to access his/her own wireless device, to

enable the user to access certain places, and to allow the user to monitor assets.

Of course, depending on

their effectiveness, cost, intrusiveness, and accuracy, more than one biometric

controls may be simultaneously employed. Biometric control may include finger

imaging, palm print, hand geometry, iris and retina vascular pattern, facial

recognition and thermography, signature and

handwriting, key stroke dynamics, and voice recognition and speech pattern

Page 123: Abstract

Diffusion of Mobile Commerce Application in the Market

CHAPTER 12

CONCLUSION

The project consists of two applications: Job Hunt and Mobile Voting.

Regarding job hunt, m-commerce has attracted the attention of both practitioners

and academics. Research activities on m-commerce have increased significantly.

Here we have attempted to provide a general picture of the main characteristics

of mobile commerce application in the market. Through review the research

literatures of m-commerce, we can find that current research is heavily skewed

toward consumer issues. It seems that the most popular m-commerce application

is that supporting financial activities. Mobile banking and payments are issues

that have been widely discussed by researchers.

On the aspect of methodology, the existing body of research on mobile

business has a disproportionately high level of secondary research studies. So

there should be an increase of empirically-based studies (surveys, interviews,

experiments, action research, ethnography, and so on) as well as simulation. In

addition to the above conclusions, we would like to offer the following

suggestions for further research in mobile commerce applications: Firstly, Mobile

commerce researchers should begin to focus their efforts more carefully.

Page 124: Abstract

Diffusion of Mobile Commerce Application in the Market

Among the applications, m-commerce entertainment services and games

have a great deal of market potential and will dominate global m-commerce

revenues in the future. Additional research is required in other related areas such

as mobile education, mobile supply chain management, and so forth.

Secondly, since the bright prospect for mobile commerce, many industries

have sought to join this arena. The mobile commerce value chain is thus formed,

and new business opportunities are created for the participants. Among the

participants, telecommunication operators are the most critical and dominant. So

it is necessary to exploit a game-theoretic approach of based on mobile

commerce value chain for analyzing relation between the participants.

Lastly, as application of RFID technology grows, they are bound to offer

new opportunities in the future. Therefore, the combination of RFID and mobile

commerce, which can be called mobile RFID, becomes a new focus of future

business. An important research that should be pursued is suitable models for the

adoption of RFID in organizations, and the RFID’s impact on supply chains.

The major limitations of m-commerce, as viewed today, are small screens

on wireless devices, limited processing power, modest memory, restricted power

consumption, poor voice quality, low-speed data transmission, non-ubiquitous

coverage, unproven security, scarce bandwidth, and possible health hazards.

Page 125: Abstract

Diffusion of Mobile Commerce Application in the Market

In case of mobile voting, the system allows the user to cast his vote with

high level of confidentiality and keep voters away from the possible threats like

booth capturing and it may increase the voter turnouts in remote areas and even

in urban areas. People, who are uncomfortable to wait in queues, like physically

challenged persons, can use this alternative solution. Since the system operates

on IVR platform the voter session will be interactive and user friendly which

makes the user to feel in a very comfortable zone. The system provides security

features like checking the unique identification number of the voter.

Page 126: Abstract

Diffusion of Mobile Commerce Application in the Market

BIBILIOGRAPHY

[1] S.J. Barnes, The mobile commerce value chain: analysis and future developments, International Journal of Information Management 22 (2) (2002) 91– 108.

[2] I. Clarke III, Emerging value propositions for m commerce, Journal of Business Strategies 18 (2) (2001) 133–148.

[3] Ting-Peng Liang, Chih-Ping Wei, Introduction to the Special Issue: Mobile Commerce Applications, International Journal of Electronic Commerce, Vol. 8, No. 3(2004), 7–17.

[4] Senn, J.A.. The emergence of m-commerce, Computer, 33(12) (2000),148-150.

[5] Varshney, U., &Vetter, R.. Mobile commerce: Framework, applications and networking support., Mobile Networks and Applications, 7(3) (2002), 185-198.

[6] Yuan, Y., Zhang, J.J., Towards an appropriate business model for m-commerce, International Journal of Mobile Communications, 1(1/2) (2003), 35-56.

[7] Nysveen, H., P.E. Pedersen, and H. Thorbjornsen, Intentions to Use Mobile Services: Antecedents and Cross Service Comparisons, Journal of the Academy of Marketing Science, 33(3)(2005), 330 346.

Page 127: Abstract

Diffusion of Mobile Commerce Application in the Market

[8] Gordon Xu, Jairo A. Gutiérrez, An Exploratory Study of Killer Applications and Critical Success Factors in Mcommerce, Journal of Electronic commerce in Organizations, 4(3)(2006), 63-79.

[9] Dongsong Zhang, Delivery of Personalized and Adaptive Content to Mobile Devices: A Framework and Enabling Technology, Communications of the AIS , 12(2003),183-202.

[10] Karlene Cousins, Upkar Varshney, A product location framework for mobile commerce environment, Proceedings of the 1st international workshop on Mobile commerce, July 2001, Rome, Italy, 43-48.

[11] U. Varshney, Location management for mobile commerce applications in wireless Internet environment, ACM Transactions on Internet Technology, 3 (3) (2003),

236– 255.

[12] U. Varshney, Vehicular Mobile Commerce: Applications, Challenges, and Research Problems, Communications of the Association for Information Systems,16 (2005), 329-339.

[13] A. Herzberg, Payments and banking with mobile personal devices, Communications of the ACM 46 (5) (2003) 53– 58.

[14] Clayton A. Looney, Leonard M. Jessup, and Joseph S. Valacich, Emerging Business Models for Mobile Brokerage Services, Communications of the ACM, 47(6)(2004), 71-77.

Page 128: Abstract

Diffusion of Mobile Commerce Application in the Market

[15] Niina Mallat, Matti Rossi, and Virpi Kristiina Tuunainen, Communication of the ACM May 47(5)(2004), 42-46.

[16] Kleijnen, M.H.P., K. de Ruyter, and M.G.M. Wetzels, “Consumer Adoption of Wireless Services: Discovering the rules, While Playing the Game”, Journal of Interactive

Marketing, 18(2)(2004), 51-61.

[17] Pavlos Vlachos, Adam Vrechopoulos, ICEC'04, Sixth International Conference on Electronic Commerce. New York:ACM.2004: 566-574.